WorldWideScience

Sample records for analysing access control

  1. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    . Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...

  2. Modelling and Analysing Access Control Policies in XACML 3.0

    DEFF Research Database (Denmark)

    Ramli, Carroline Dewi Puspa Kencana

    and verification of properties of XACML policies. Overall, we focus into two different area. The first part focuses on the access control language. More specifically our focus is on the understanding XACML 3.0. The second part focuses on how we use Logic Programming (LP) to model access control policies. We show...... semantics is described normatively using natural language. The use of English text in standardisation leads to the risk of misinterpretation and ambiguity. In order to avoid this drawback, we define an abstract syntax of XACML 3.0 and a formal XACML semantics. Second, we propose a logic-based XACML analysis...... framework using Answer Set Programming (ASP). With ASP we model an XACML PDP that loads XACML policies and evaluates XACML requests against these policies. The expressivity of ASP and the existence of efficient implementations of the answer set semantics provide the means for declarative specification...

  3. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  4. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  5. Enterprise Dynamic Access Control (EDAC)

    National Research Council Canada - National Science Library

    Fernandez, Richard

    2005-01-01

    .... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...

  6. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  7. Access control Tutorial 5

    CERN Document Server

    CERN. Geneva; Oberknapp, Bernd

    2007-01-01

    This tutorial will review current access management technologies and invite participants to discuss use cases and requirements for access management, particularly with respect to scholarly archives and their users. The presenters will describe the concepts and architecture of Federated Access Management (FAM) with reference to some large-scale federation implementations, and discuss the challenges faced particularly in Identity Management by academic institutions. The tutorial will include a practical demonstration of how FAM can be applied to an Open Archive repository.

  8. Controlling Access to RDF Graphs

    Science.gov (United States)

    Flouris, Giorgos; Fundulaki, Irini; Michou, Maria; Antoniou, Grigoris

    One of the current barriers towards realizing the huge potential of Future Internet is the protection of sensitive information, i.e., the ability to selectively expose (or hide) information to (from) users depending on their access privileges. Given that RDF has established itself as the de facto standard for data representation over the Web, our work focuses on controlling access to RDF data. We present a high-level access control specification language that allows fine-grained specification of access control permissions (at triple level) and formally define its semantics. We adopt an annotation-based enforcement model, where a user can explicitly associate data items with annotations specifying whether the item is accessible or not. In addition, we discuss the implementation of our framework, propose a set of dimensions that should be considered when defining a benchmark to evaluate the different access control enforcement models and present the results of our experiments conducted on different Semantic Web platforms.

  9. Service-Oriented Access Control

    Science.gov (United States)

    2014-09-01

    backbone. A battalion may use this approach in conducting digital communications exercises , where the unit establishes this network test its digital...derivation, third scenario . . . . . . . . 60 ix THIS PAGE INTENTIONALLY LEFT BLANK x List of Acronyms and Abbreviations ACL access control list BGP...configuration, access control list ( ACL ) placement, or routing design). Changing the network’s logical organization affects how data flows in a

  10. Controlling Access to Suicide Means

    Science.gov (United States)

    Sarchiapone, Marco; Mandelli, Laura; Iosue, Miriam; Andrisano, Costanza; Roy, Alec

    2011-01-01

    Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs), as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies. PMID:22408588

  11. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  12. Controlling access to suicide means.

    Science.gov (United States)

    Sarchiapone, Marco; Mandelli, Laura; Iosue, Miriam; Andrisano, Costanza; Roy, Alec

    2011-12-01

    Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords "suicide means", "suicide method", "suicide prediction" or "suicide prevention" and other relevant keywords. A number of factors may influence an individual's decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing "safe rooms" in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs), as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  13. ACCESS: Detector Control and Performance

    Science.gov (United States)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  14. Fundamental data analyses for measurement control

    International Nuclear Information System (INIS)

    Campbell, K.; Barlich, G.L.; Fazal, B.; Strittmatter, R.B.

    1987-02-01

    A set of measurment control data analyses was selected for use by analysts responsible for maintaining measurement quality of nuclear materials accounting instrumentation. The analyses consist of control charts for bias and precision and statistical tests used as analytic supplements to the control charts. They provide the desired detection sensitivity and yet can be interpreted locally, quickly, and easily. The control charts provide for visual inspection of data and enable an alert reviewer to spot problems possibly before statistical tests detect them. The statistical tests are useful for automating the detection of departures from the controlled state or from the underlying assumptions (such as normality). 8 refs., 3 figs., 5 tabs

  15. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  16. Review of SDDOT's highway access control process

    Science.gov (United States)

    2000-02-01

    This report presents the results and recommendations of a review of the South Dakota Department of Transportation's (SDDOT's) highway access control process. This document presents recommendations that improve South Dakota's access policy. The docume...

  17. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    Potter, K.; Littenberg, L.

    1977-01-01

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  18. Proximity Displays for Access Control

    Science.gov (United States)

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  19. Access control and service-oriented architectures

    NARCIS (Netherlands)

    Leune, C.J.

    2007-01-01

    Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the

  20. A Component-Based Access Control Monitor

    Science.gov (United States)

    Liu, Zhiming; Morisset, Charles; Stolz, Volker

    A control of access to information is increasingly becoming necessary as the systems managing this information is more and more open and available through non secure networks. Integrating an access control monitor within a large system is a complex task, since it has to be an "all or nothing" integration. The least error or mistake could lead to jeopardize the whole system. We present a formal specification of an access control monitor using the calculus of refinement of component and object systems (rCOS). We illustrate this implementation with the well known Role Based Access Control (RBAC) policy and we show how to integrate it within a larger system. Keywords: Component, Access Control, RBAC, Composition

  1. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  2. Proximity Displays for Access Control

    Science.gov (United States)

    2012-09-01

    to evaluate the appropriateness of an ac- cess once all the facts are known. As Blakely suggests, “make users ask forgiveness, not permission” [18...control designed for individuals at the endpoints. 138 In Proceedings of the workshop on New security paradigms workshop, 2009. 2.3.1 [51] Sara Kaemer...factors in computing systems, 2010. 8.2 141 [89] Sara Sinclaire, Sean W. Smith, Stephanie Trudeau, M. Eric Johnson, and Anthony Portera. Information

  3. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  4. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  5. Time dependent policy-based access control

    DEFF Research Database (Denmark)

    Vasilikos, Panagiotis; Nielson, Flemming; Nielson, Hanne Riis

    2017-01-01

    Access control policies are essential to determine who is allowed to access data in a system without compromising the data's security. However, applications inside a distributed environment may require those policies to be dependent on the actual content of the data, the flow of information, while...... also on other attributes of the environment such as the time. In this paper, we use systems of Timed Automata to model distributed systems and we present a logic in which one can express time-dependent policies for access control. We show how a fragment of our logic can be reduced to a logic...... that current model checkers for Timed Automata such as UPPAAL can handle and we present a translator that performs this reduction. We then use our translator and UPPAAL to enforce time-dependent policy-based access control on an example application from the aerospace industry....

  6. Access Agent Improving The Performance Of Access Control Lists

    Directory of Open Access Journals (Sweden)

    Thelis R. S.

    2015-08-01

    Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

  7. Cryptographically Enforced Distributed Data Access Control

    NARCIS (Netherlands)

    Ibraimi, L.

    2011-01-01

    Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote server, users lose control over their sensitive data. There are two approaches to control the access to outsourced data. The first approach assumes that the outsourcee is fully trusted. This approach is

  8. Performance estimates for personnel access control systems

    International Nuclear Information System (INIS)

    Bradley, R.G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  9. Access control mechanism of wireless gateway based on open flow

    Science.gov (United States)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  10. Remote Access of Computer Controlled Experiments

    Directory of Open Access Journals (Sweden)

    Kristian Nilsson

    2008-11-01

    Full Text Available Abstract—in this paper, we present a way for students to access and operate laboratory equipment, controlled by a laboratory computer via a remote access program. In this way, the solution is not dependent on the specific laboratory equipment, as long as the equipment can be remotely controlled. The system can easily be altered to be used in another laboratory setup. Students are able to make reservations of experiment sessions through a web interface, which is administrated by the system administrator. The solution proposed in this paper is one way to speed up the development of remote accessible laboratories. Most of the proposed solution is based on open source software and the hardware is built on ordinary consumer parts, which makes the proposed remote laboratory architecture cost effective.

  11. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  12. Predictive access control for distributed computation

    DEFF Research Database (Denmark)

    Yang, Fan; Hankin, Chris; Nielson, Flemming

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future...

  13. Making accessibility analyses accessible: A tool to facilitate the public review of the effects of regional transportation plans on accessibility

    OpenAIRE

    Golub, Aaron; Robinson, Glenn; Brendan Nee, Brendan Nee

    2013-01-01

    The regional transportation planning process in the United States has not been easily opened to public oversight even after strengthened requirements for public participation and civil rights considerations. In the effort to improve the public review of regional transportation plans, this paper describes the construction of a proof-of concept web-based tool designed to analyze the effects of regional transportation plans on accessibility to jobs and other essential destinations. The tool allo...

  14. Speed control system for an access gate

    Science.gov (United States)

    Bzorgi, Fariborz M [Knoxville, TN

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  15. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  16. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  17. An Attribute Based Access Control Framework for Healthcare System

    Science.gov (United States)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  18. Cardea: Dynamic Access Control in Distributed Systems

    Science.gov (United States)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  19. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  20. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  1. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  2. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    as an important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control...

  3. Integrating Attributes into Role-Based Access Control

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    of research recently. We propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that takes into account the current contextual information while making the access control decisions....

  4. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  5. On the Impact of information access delays on remote control of a wind turbine

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Barradas Berglind, Jose de Jesus; Madsen, Tatiana Kozlova

    2015-01-01

    It is important to reduce the impact of renewable production in the power grid by means of control, due to increased frequency deviations and imbalances caused by these assets. Cost efficient deployment of asset control frequently results in a distributed control architecture where the controller...... by the controller to gather sensor information and and quantitatively characterize the impact of these access strategies on the controller performance...... farm controller. The controller attempts to reduce fatigue on the wind turbine, which is used as a measure of the controller performance. Via simulation analysis, we show the degradation of the controller performance when subject to network delays. We analyse different access strategies useable...

  6. Rural providers' access to online resources: a randomized controlled trial

    Science.gov (United States)

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  7. Rural providers’ access to online resources: a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Jonathan D. Eldredge

    2016-01-01

    Full Text Available Objective: The research determined the usage and satisfaction levels with one of two point-of-care (PoC resources among health care providers in a rural state. Methods: In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants’ attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA, paired t tests, and Cohen’s d statistic to compare pre- and post-study effects sizes. Results: Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to ‘‘about right amounts of information’’ at the completion of the study. DynaMed users reported a Cohen’s d increase of þ1.50 compared to AccessMedicine users’ reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen’s d. Conclusion: Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine.

  8. Towards Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC...... of complex access control decisions based on spatio-temporal relationships among subjects and objects. Furthermore, such relationships change frequently in dynamic environments, requiring efficient mechanisms to monitor and re-evaluate access control decisions. In this position paper, we present a healthcare...... emergency response scenario which highlights the novel challenges that arise when enforcing access control in an environment with moving subjects and objects. To address a realistic application scenario, we consider movement on road networks, and we identify complex access control decisions relevant...

  9. XACML to build access control policies for Internet of Things

    OpenAIRE

    Atlam, Hany F.; Alassafi, Madini, Obad; Alenezi, Ahmed; Walters, Robert; Wills, Gary

    2018-01-01

    Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an ef...

  10. Access Control based on Attribute Certificates for Medical Intranet Applications

    Science.gov (United States)

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  11. MATISSE: A novel tool to access, visualize and analyse data from planetary exploration missions

    Science.gov (United States)

    Zinzi, A.; Capria, M. T.; Palomba, E.; Giommi, P.; Antonelli, L. A.

    2016-04-01

    The increasing number and complexity of planetary exploration space missions require new tools to access, visualize and analyse data to improve their scientific return. ASI Science Data Center (ASDC) addresses this request with the web-tool MATISSE (Multi-purpose Advanced Tool for the Instruments of the Solar System Exploration), allowing the visualization of single observation or real-time computed high-order products, directly projected on the three-dimensional model of the selected target body. Using MATISSE it will be no longer needed to download huge quantity of data or to write down a specific code for every instrument analysed, greatly encouraging studies based on joint analysis of different datasets. In addition the extremely high-resolution output, to be used offline with a Python-based free software, together with the files to be read with specific GIS software, makes it a valuable tool to further process the data at the best spatial accuracy available. MATISSE modular structure permits addition of new missions or tasks and, thanks to dedicated future developments, it would be possible to make it compliant to the Planetary Virtual Observatory standards currently under definition. In this context the recent development of an interface to the NASA ODE REST API by which it is possible to access to public repositories is set.

  12. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  13. The development of the microcomputer controlling system for micro uranium on-line analyser

    CERN Document Server

    Ye Guo Qiang

    2002-01-01

    The author presents the microcomputer controlling system for micro uranium on-line analyser under Windows 3.2 system (Chinese). The user program is designed with Visual Basic 4.0, the program of controlling the hardware interface with Windows Dynamic Linking Library (DLL) which is programmed by Borland C sup + sup + 4.5, and the date processing is with Access 2.0 database

  14. Open versus Controlled-Access Data | Office of Cancer Genomics

    Science.gov (United States)

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  15. Analysing accessibility effects in a continuous treatment framework: the case of Copenhagen metro

    DEFF Research Database (Denmark)

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    This paper tests the the impact of a public transport infrastructure on commuting distances by analysing the behaviour of workers who were living in the neighbourhood of the new facility when the location of stations was decided. The infrastructure analyzed was the first phase of the Copenhagen...... Metro where 6 metro stations were selected for analysis: Lergravsparken, Amagerbro, Islands Brygge, DR Byen, Bella Center, Sundby. The analysis focused on residents living within 1000 meters of the coming metro stations in 1996 – when the plans where approved, and 8 years before the opening. The paper...... apply adose-response approach under the assumption of weak unconfoundedness to first assessing the possible presence of residential selectivity and to estimate job accessibility effects of the metro. The paper analyzes residential immobility and wage employment, finding that proximity to a metro station...

  16. 49 CFR 1542.207 - Access control systems.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures for...

  17. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  18. An accessible, scalable ecosystem for enabling and sharing diverse mass spectrometry imaging analyses.

    Energy Technology Data Exchange (ETDEWEB)

    Fischer, CR; Ruebel, O; Bowen, BP

    2016-01-01

    Mass spectrometry imaging (MSI) is used in an increasing number of biological applications. Typical MSI datasets contain unique, high-resolution mass spectra from tens of thousands of spatial locations, resulting in raw data sizes of tens of gigabytes per sample. In this paper, we review technical progress that is enabling new biological applications and that is driving an increase in the complexity and size of MSI data. Handling such data often requires specialized computational infrastructure, software, and expertise. OpenMSI, our recently described platform, makes it easy to explore and share MSI datasets via the web - even when larger than 50 GB. Here we describe the integration of OpenMSI with IPython notebooks for transparent, sharable, and replicable MSI research. An advantage of this approach is that users do not have to share raw data along with analyses; instead, data is retrieved via OpenMSI's web API. The IPython notebook interface provides a low-barrier entry point for data manipulation that is accessible for scientists without extensive computational training. Via these notebooks, analyses can be easily shared without requiring any data movement. We provide example notebooks for several common MSI analysis types including data normalization, plotting, clustering, and classification, and image registration.

  19. Metabolomic analyses to evaluate the effect of drought stress on selected African Eggplant accessions.

    Science.gov (United States)

    Mibei, Elias K; Owino, Willis O; Ambuko, Jane; Giovannoni, James J; Onyango, Arnold N

    2018-01-01

    Drought stress is one of the main abiotic stresses that affect crops. It leads to biochemical changes that can have adverse effects on plant growth, development and productivity. African eggplants are important vegetable and fruit crops reported to adapt and thrive well under drought stress. The diversified metabolites arising due to stress have not been well defined. A gas chromatographic-mass spectrometric metabolomic approach was applied to characterize the effect of drought stress on metabolites at different stages of growth. Nineteen accessions were selected for analysis and drought was imposed by withholding water until soil moisture reached 60% field capacity. Fresh leaf tissues were sampled before stress, 2 and 4 weeks after stress and metabolite profiling done. Significant changes in metabolite content were observed, and potentially important metabolites with respect to stress responses were characterized. Proline, glutamate, sucrose, fructose and tricarboxylic acid cycle metabolites were shown to be positively correlated with stress. Principal component analysis showed a clear discrimination between the different accessions, growth stages and stress/control conditions. The results illustrate that drought stress has a significant impact on the concentrations of some metabolites, such as amino acids, sugars and organic acids, which may contribute to drought stress effects and tolerance. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  20. A new access control system by fingerprint for radioisotope facilities

    International Nuclear Information System (INIS)

    Kawamura, Hiroko; Hirata, Yasuki; Kondo, Takahiro; Takatsuki, Katsuhiro

    1998-01-01

    We applied a new fingerprint checker for complete access control to the radiation controlled area and to the radioisotope storage room, and prepared softwares for the best use of this checker. This system consists of a personal computer, access controllers, a fingerprint register, fingerprint checkers, a tenkey and mat sensors, permits ten thousand users to register their fingerprints and its hard disk to keep more than a million records of user's access. Only 1% of users could not register their fingerprints worn-out, registered four numbers for a fingerprint. The softwares automatically provide varieties of reports, caused a large reduction in manual works. (author)

  1. Content sensitivity based access control framework for Hadoop

    Directory of Open Access Journals (Sweden)

    T.K. Ashwin Kumar

    2017-11-01

    Full Text Available Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misuse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attributes in a dataset or the user’s role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and information sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead.

  2. Role Based Access Control system in the ATLAS experiment

    International Nuclear Information System (INIS)

    Valsan, M L; Dumitru, I; Darlea, G L; Bujor, F; Dobson, M; Miotto, G Lehmann; Schlenker, S; Avolio, G; Scannicchio, D A; Filimonov, V; Khomoutnikov, V; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Twomey, M

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  3. Urban Studies: A Study of Bibliographic Access and Control.

    Science.gov (United States)

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  4. Control engineering and electromyographic kinesiology analyses of normal human gait.

    Science.gov (United States)

    Hashimoto, F; Ogawa, R; Kameyama, O

    2000-01-01

    In this study, we analyzed the electrical activity patterns of the antagonistic bi-articular and mono-articular muscles of both legs during normal gait cycles, in terms of electromyographic (EMG) kinesiology and control engineering. For control engineering analyses, we utilized a mechanical two-joint link model equipped with antagonistic pairs of bi-articular and mono-articular muscles. It was confirmed that the coordinated activity pattern, in which the bi-articular muscles of the rectus femoris (Rf) and the medial hamstrings (Mh) showed criss-cross EMG patterns, and the mono-articular muscles of the gluteus maximus and the vastus medialis showed sustained activities during the early stance phase in the gait cycle, contributed to the output force control and the output force direction control. Reversal of Rf and Mh activities was responsible for changes in the output force direction during the heel contact period. The results obtained here strongly highlight the importance of and necessity for control engineering evaluation of coordinated muscle activities of bi-articular and mono-articular antagonistic muscles for analyses not only of gait but also of sports injuries.

  5. Access control within military C4ISR systems

    Science.gov (United States)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  6. Regulatory accessibility and social influences on state self-control.

    Science.gov (United States)

    vanDellen, Michelle R; Hoyle, Rick H

    2010-02-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals' state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-control leads to increases in state self-control and thinking of others with bad trait or state self-control leads to decreases in state self-control. Study 5 provides evidence that the salience of significant others influences both regulatory accessibility and state self-control. Combined, these studies suggest that the effects of social influences on state self-control occur through multiple mechanisms.

  7. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  8. Experience with ActiveX control for simple channel access

    International Nuclear Information System (INIS)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-01-01

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls

  9. Access Control to Information in Pervasive Computing Environments

    National Research Council Canada - National Science Library

    Hengartner, Urs

    2005-01-01

    ... feelings. Some of this information is confidential and should be released only to authorized entities. In this thesis, I show how existing solutions for controlling access to information are not sufficient for pervasive computing...

  10. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Science.gov (United States)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  11. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  12. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Directory of Open Access Journals (Sweden)

    Luis Cruz-Piris

    2018-03-01

    Full Text Available Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT. One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.. To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT. As an access control scheme, we have selected User-Managed Access (UMA, an existing Open Authorization (OAuth 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  13. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    Science.gov (United States)

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  14. Systematic realisation of control flow analyses for CML

    DEFF Research Database (Denmark)

    Gasser, K.L.S.; Nielson, Flemming; Nielson, Hanne Riis

    1997-01-01

    We present a methodology for the systematic realisation of control flow analyses and illustrate it for Concurrent ML. We start with an abstract specification of the analysis that is next proved semantically sound with respect to a traditional small-step operational semantics; this result holds......) to be defined in a syntax-directed manner, and (iii) to generate a set of constraints that subsequently can be solved by standard techniques. We prove equivalence results between the different versions of the analysis; in particular it follows that the least solution to the constraints generated...

  15. Subgroup analyses in randomised controlled trials: cohort study on trial protocols and journal publications.

    Science.gov (United States)

    Kasenda, Benjamin; Schandelmaier, Stefan; Sun, Xin; von Elm, Erik; You, John; Blümle, Anette; Tomonaga, Yuki; Saccilotto, Ramon; Amstutz, Alain; Bengough, Theresa; Meerpohl, Joerg J; Stegert, Mihaela; Olu, Kelechi K; Tikkinen, Kari A O; Neumann, Ignacio; Carrasco-Labra, Alonso; Faulhaber, Markus; Mulla, Sohail M; Mertz, Dominik; Akl, Elie A; Bassler, Dirk; Busse, Jason W; Ferreira-González, Ignacio; Lamontagne, Francois; Nordmann, Alain; Gloy, Viktoria; Raatz, Heike; Moja, Lorenzo; Rosenthal, Rachel; Ebrahim, Shanil; Vandvik, Per O; Johnston, Bradley C; Walter, Martin A; Burnand, Bernard; Schwenkglenks, Matthias; Hemkens, Lars G; Bucher, Heiner C; Guyatt, Gordon H; Briel, Matthias

    2014-07-16

    To investigate the planning of subgroup analyses in protocols of randomised controlled trials and the agreement with corresponding full journal publications. Cohort of protocols of randomised controlled trial and subsequent full journal publications. Six research ethics committees in Switzerland, Germany, and Canada. 894 protocols of randomised controlled trial involving patients approved by participating research ethics committees between 2000 and 2003 and 515 subsequent full journal publications. Of 894 protocols of randomised controlled trials, 252 (28.2%) included one or more planned subgroup analyses. Of those, 17 (6.7%) provided a clear hypothesis for at least one subgroup analysis, 10 (4.0%) anticipated the direction of a subgroup effect, and 87 (34.5%) planned a statistical test for interaction. Industry sponsored trials more often planned subgroup analyses compared with investigator sponsored trials (195/551 (35.4%) v 57/343 (16.6%), P<0.001). Of 515 identified journal publications, 246 (47.8%) reported at least one subgroup analysis. In 81 (32.9%) of the 246 publications reporting subgroup analyses, authors stated that subgroup analyses were prespecified, but this was not supported by 28 (34.6%) corresponding protocols. In 86 publications, authors claimed a subgroup effect, but only 36 (41.9%) corresponding protocols reported a planned subgroup analysis. Subgroup analyses are insufficiently described in the protocols of randomised controlled trials submitted to research ethics committees, and investigators rarely specify the anticipated direction of subgroup effects. More than one third of statements in publications of randomised controlled trials about subgroup prespecification had no documentation in the corresponding protocols. Definitive judgments regarding credibility of claimed subgroup effects are not possible without access to protocols and analysis plans of randomised controlled trials. © The DISCO study group 2014.

  16. Role Based Access Control system in the ATLAS experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  17. Role Based Access Control System in the ATLAS Experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  18. Project W-320 SAR and process control thermal analyses

    International Nuclear Information System (INIS)

    Sathyanarayana, K.

    1997-01-01

    This report summarizes the results of thermal hydraulic computer modeling supporting Project W-320 for process control and SAR documentation. Parametric analyses were performed for the maximum steady state waste temperature. The parameters included heat load distribution, tank heat load, fluffing factor and thermal conductivity. Uncertainties in the fluffing factor and heat load distribution had the largest effect on maximum waste temperature. Safety analyses were performed for off normal events including loss of ventilation, loss of evaporation and loss of secondary chiller. The loss of both the primary and secondary ventilation was found to be the most limiting event with saturation temperature in the bottom waste reaching in just over 30 days. An evaluation was performed for the potential lowering of the supernatant level in tank 241-AY-102. The evaluation included a loss of ventilation and steam bump analysis. The reduced supernatant level decreased the time to reach saturation temperature in the waste for the loss of ventilation by about one week. However, the consequence of a steam bump were dramatically reduced

  19. A Service Access Security Control Model in Cyberspace

    Science.gov (United States)

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  20. Access and control of information and intellectual property

    Science.gov (United States)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  1. Controlling user access to electronic resources without password

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  2. Database design for Physical Access Control System for nuclear facilities

    International Nuclear Information System (INIS)

    Sathishkumar, T.; Rao, G. Prabhakara; Arumugam, P.

    2016-01-01

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  3. Database design for Physical Access Control System for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in

    2016-08-15

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  4. Access Control of Web and Java Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  5. Controlling Access to Input/Output Peripheral Devices

    Directory of Open Access Journals (Sweden)

    E. Y. Rodionov

    2010-03-01

    Full Text Available In this paper the author proposes a system that manages information security policy on enterprise. Problems related to managing information security policy on enterprise and access to peripheral devices in computer systems functioning under control of Microsoft Windows NT operating systems are considered.

  6. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; Gadducci, F.

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e.before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  7. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  8. Assessment of Digital Access Control Methods Used by Selected ...

    African Journals Online (AJOL)

    Assessment of Digital Access Control Methods Used by Selected Academic Libraries in South-West Nigeria. ... information professionals with the knowledge that would enable them establish an effective strategy to protect e-resources from such abuses as plagiarism, piracy and infringement of intellectual property rights.

  9. Object oriented programming techniques applied to device access and control

    International Nuclear Information System (INIS)

    Goetz, A.; Klotz, W.D.; Meyer, J.

    1992-01-01

    In this paper a model, called the device server model, has been presented for solving the problem of device access and control faced by all control systems. Object Oriented Programming techniques were used to achieve a powerful yet flexible solution. The model provides a solution to the problem which hides device dependancies. It defines a software framework which has to be respected by implementors of device classes - this is very useful for developing groupware. The decision to implement remote access in the root class means that device servers can be easily integrated in a distributed control system. A lot of the advantages and features of the device server model are due to the adoption of OOP techniques. The main conclusion that can be drawn from this paper is that 1. the device access and control problem is adapted to being solved with OOP techniques, 2. OOP techniques offer a distinct advantage over traditional programming techniques for solving the device access problem. (J.P.N.)

  10. Access Control for Agent-based Computing: A Distributed Approach.

    Science.gov (United States)

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  11. Compulsory licensing, price controls, and access to patented foreign products

    OpenAIRE

    Eric Saggi; Saggi Saggi

    2012-01-01

    Motivated by existing multilateral rules regarding intellectual property, we develop a North-South model to highlight the dual roles price controls and compulsory licensing play in determining Southern access to a patented Northern product. The Northern patent-holder chooses whether and how to work its patent in the South (either via entry or voluntarily licensing) while the South determines the price control and whether to issue a compulsory license. The threat of compulsory licensing benefi...

  12. Access control issues and solutions for large sites

    International Nuclear Information System (INIS)

    Warren, F.E.

    1992-07-01

    The Lawrence Livermore National Laboratory (LLNL) operates an automated access control system consisting of more than 100 portals. We have gained considerable practical experience in the issues involved in operating this large system, and have identified the central issues to include system reliability, the large user population, the need for central control, constant change, high visibility and the budget. This paper outlines these issues and draws from our experience to discuss some fruitful ways of addressing them

  13. Ubiquitous access control and policy management in personal networks

    DEFF Research Database (Denmark)

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    distributed master devices acting as access points- and also pure peer-to-peer interactions inside the PN. Taking benefit from the modularity and scalability of the design, this solution can be extended into supporting coalitions of different security domains, deriving from the creation of PNs federations.......In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case...

  14. Controlling user access to electronic resources without password

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  15. Improving the Authentication Scheme and Access Control Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Wei-Chen Wu

    2014-11-01

    Full Text Available Privacy and security are very important in vehicular ad hoc networks (VANETs. VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs raise challenges, such as certificate distribution and reduction of the strong reliance on tamper-proof devices. In 2011, Yeh et al. proposed a PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s authorized credential (AC is not secure and private, even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that an improving authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.

  16. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  17. Safety of Mixed Model Access Control in a Multilevel System

    Science.gov (United States)

    2014-06-01

    Control Policies.” IEEE International Conference on System of Systems Engineering 2009, n.p. [16] C. R. McDaniel, and M. L . Tardy, Role-Based...read O (Object) if and only if lo ls ( l represents the security clearance) and S has discretionary read access to O [3]. The *-Property (Star...Fun 1546 uri=“dc:author”> 1547 <Ind>Randy Arvay</Ind> 1548 </Fun> 1549 </Expr> 1550

  18. An Access Control Model for the Uniframe Framework

    Science.gov (United States)

    2005-05-01

    is called active software capabilities framework ( ASCap ) that centers around the idea of a policy object, which instead of being embedded into the...access control component, is delivered by the client. The client firsts requests an ASCap (policy object) from the security server. Then the client...and the object server both must instantiate proxies. The client ASCap proxy may then request additional credentials from other servers which may

  19. Simplified Key Management for Digital Access Control of Information Objects

    Science.gov (United States)

    2016-07-02

    parties had an interest in controlling access and copying technologies. Examples include: player piano rolls early in the 20th century [1] and video tape...0001, Task BC-5-2283, “ Architecture , Design of Services for Air Force Wide Distributed Systems,” for USAF HQ USAF SAF/CIO A6. The views, opinions...an approach that relies on high-assurance architectures and the protection elements they provide through PKI. The distribution of private keys is a

  20. Integration of access control and ancillary information systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Ahrens, J.S.

    1995-07-01

    The DOE has identified the Lawrence Livermore National Laboratory ARGUS system as the standard entry control system for the DOE Complex. ARGUS integrates several key functions, specifically, badging, entry control, and verification of clearance status. Not all sites need or can afford an ARGUS system. Such sites are therefore limited to commercial equipment which provide ARGUS like features. In this project an alternative way to integrate commercial equipment into an integrated system to include badging, access control, property control, and automated verification of clearance status has been investigated. Such a system would provide smaller sites the same functionality as is provided by ARGUS. Further, it would allow sites to fully participate in the DOE`s concept of Complex wide access control. This multi-year task is comprised of three phases. Phase 1, system requirements and definitions, and phase 2, software and hardware development, were completed during fiscal year 1994. This report covers these two phases and the demonstration system which resulted. Phase three would employ the demonstration system to evaluate system performance, identify operational limits and to integrate additional features. The demonstration system includes a badging station, a database server, a managers workstation, an entry control system, and a property protection system. The functions have been integrated through the use of custom interfaces and operator screens which greatly increase ease of use.

  1. Consistency Checking of Safety and Availability in Access Control

    Science.gov (United States)

    Li, Ruixuan; Lu, Jianfeng; Lu, Zhengding; Ma, Xiaopu

    The safety and availability policies are very important in an access control system for ensuring security and success when performing a certain task. However, conflicts may arise between safety and availability policies due to their opposite focuses. In this paper, we address the problem of consistency checking for safety and availability policies, especially for the co-existence of static separation-of-duty (SSoD) policies with availability policies, which determines whether there exists an access control state that satisfies all of these policies. We present criteria for determining consistency with a number of special cases, and show that the general case and partial subcases of the problem are intractable (NP-hard) and in the Polynomial Hierarchy NPNP. We design an algorithm to efficiently solve the nontrivial size instances for the intractable cases of the problem. The running example shows the validity of the proposed algorithm. The investigation will help the security officer to specify reasonable access control policies when both safety and availability policies coexist.

  2. State control, access to capital and firm performance

    Directory of Open Access Journals (Sweden)

    Oliver Zhen Li

    2012-06-01

    Full Text Available We study the effect of state control on capital allocation and investment in China, where the government screens prospective stock issuers. We find that state firms are more likely to obtain government approval to conduct seasoned equity offerings than non-state firms. Further, non-state firms exhibit greater sensitivities of subsequent investment and stock performance to regulatory decisions on stock issuances than state firms. Our work suggests that state control of capital access distorts resource allocation and impedes the growth of non-state firms. We also provide robust evidence that financial constraints cause underinvestment.

  3. TEMPERATURE DISTRIBUTION MONITORING AND ANALYSES AT DIFFERENT HEATING CONTROL PRINCIPLES

    DEFF Research Database (Denmark)

    Simone, Angela; Rode, Carsten; Olesen, Bjarne W.

    2010-01-01

    under different control strategies of the heating system (Pseudo Random Binary Sequence signal controlling all the heaters (PRBS) or thermostatic control of the heaters (THERM)). A comparison of the measured temperatures within the room, for the five series of experiments, shows a better correlation...

  4. Smart Contract-Based Access Control for the Internet of Things

    OpenAIRE

    Zhang, Yuanyu; Kasahara, Shoji; Shen, Yulong; Jiang, Xiaohong; Wan, Jianxiong

    2018-01-01

    This paper investigates a critical access control issue in the Internet of Things (IoT). In particular, we propose a smart contract-based framework, which consists of multiple access control contracts (ACCs), one judge contract (JC) and one register contract (RC), to achieve distributed and trustworthy access control for IoT systems. Each ACC provides one access control method for a subject-object pair, and implements both static access right validation based on predefined policies and dynami...

  5. Birth Control Pills and Nonprofessional Voice: Acoustic Analyses

    Science.gov (United States)

    Amir, Ofer; Biron-Shental, Tal; Shabtai, Esther

    2006-01-01

    Purpose: Two studies are presented here. Study 1 was aimed at evaluating whether the voice characteristics of women who use birth control pills that contain different progestins differ from the voice characteristics of a control group. Study 2 presents a meta-analysis that combined the results of Study 1 with those from 3 recent studies that…

  6. Admission Control and Interference Management in Dynamic Spectrum Access Networks

    Directory of Open Access Journals (Sweden)

    Jorge Martinez-Bauset

    2010-01-01

    Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

  7. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever......-changing environmental energy sources. In this paper, we present an improved and extended version of ODMAC and we analyze it by means of an analytical model that can approximate several performance metrics in an arbitrary network topology. The simulations and the analytical experiments show ODMAC's ability to satisfy...

  8. Metrological aspects to quality control for natural gas analyses

    Energy Technology Data Exchange (ETDEWEB)

    Ribeiro, Claudia Cipriano; Borges, Cleber Nogueira; Cunha, Valnei S. [Instituto Nacional de Metrologia, Normalizacao e Qualidade Industrial (INMETRO), Rio de Janeiro, RJ (Brazil); Augusto, Cristiane R. [Universidade Federal do Rio de Janeiro (UFRJ), RJ (Brazil); Augusto, Marco Ignazio [Companhia Estadual de Gas do Rio de Janeiro (CEG), RJ (Brazil)

    2008-07-01

    The Product's Quality and Services are fundamental topics in the globalized commercial relationship inclusive concern the measurements in natural gas. Considerable investments were necessary for industry especially about the quality control in the commercialized gas with an inclusion of the natural gas in Brazilian energetic resources The Brazilian Regulatory Agency, ANP - Agencia Nacional de Petroleo, Gas Natural e Biocombustiveis - created the Resolution ANP no.16. This Resolution defines the natural gas specification, either national or international source, for commercialization in Brazil and list the tolerance concentration for some components. Between of this components are the inert compounds like the CO{sub 2} and N{sub 2}. The presence of this compounds reduce the calorific power, apart from increase the resistance concern the detonation in the case of vehicular application, and occasion the reduction in the methane concentration in the gas. Controls charts can be useful to verify if the process are or not under Statistical Control. The process can be considerate under statistical control if the measurements have it values between in lower and upper limits stated previously The controls charts can be approach several characteristics in each subgroup: means, standard deviations, amplitude or proportion of defects. The charts are draws for a specific characteristic and to detect some deviate in the process under specific environment conditions. The CEG - Companhia de Distribuicao de Gas do Rio de Janeiro and the DQUIM - Chemical Metrology Division has an agreement for technical cooperation in research and development of gas natural composition Concern the importance of the natural gas in the Nation development, as well as the question approaching the custody transference, the objective of this work is demonstrate the control quality of the natural gas composition between the CEG laboratory and the DQUIM laboratory aiming the quality increase of the

  9. A Knowledge-Constrained Access Control Model for Protecting Patient Privacy in Hospital Information Systems.

    Science.gov (United States)

    Zhang, Runtong; Chen, Donghua; Shang, Xiaopu; Zhu, Xiaomin; Liu, Kecheng

    2017-04-24

    Current access control mechanisms of the hospital information system can hardly identify the real access intention of system users. A relaxed access control increases the risk of compromise of patient privacy. To reduce unnecessary access of patient information by hospital staff, this paper proposes a Knowledge-Constrained Role-Based Access Control (KC-RBAC) model in which a variety of medical domain knowledge is considered in access control. Based on the proposed Purpose Tree and knowledge-involved algorithms, the model can dynamically define the boundary of access to the patient information according to the context, which helps protect patient privacy by controlling access. Compared with the Role-Based Access Control model, KC-RBAC can effectively protect patient information according to the results of the experiments.

  10. Access control violation prevention by low-cost infrared detection

    Science.gov (United States)

    Rimmer, Andrew N.

    2004-09-01

    A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this

  11. The Methods and Mechanisms for Access Control of Encrypted Data in Clouds

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2013-09-01

    Full Text Available The paper is about the problem of data access control in clouds. The main mechanisms for access control of encrypted data in untrusted cloud environments are analyzed and described. The comparative analysis of access control algorithms and implementation issues are offered. The main practical result of research is a web-based (Wikipedia-like reference and information system devoted to the access control methods and mechanisms.

  12. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-12-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...

  13. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-09-11

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the fifteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...

  14. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-07-01

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held July 15, 2011, from...

  15. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-11-30

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  16. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-03-15

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  17. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-08-16

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...: Airport Security Access Control Systems. DATES: The meeting will be held September 15, 2011, from 10 a.m...

  18. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-08-21

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-fourth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  19. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Science.gov (United States)

    2012-04-30

    ... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  20. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-09-26

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...: Airport Security Access Control Systems. DATES: The meeting will be held October 20, 2011, from 10 a.m. to...

  1. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-04-12

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  2. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-third meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  3. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-10-06

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...

  4. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-02-04

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  5. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-02-18

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...

  6. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-03-18

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twentieth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  7. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-03-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...

  8. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-10-23

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the sixteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  9. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-11-24

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...

  10. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-05-24

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  11. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-01-21

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...

  12. An Object-Oriented Approach to Security Policies and their Access Controls for Database Management

    Science.gov (United States)

    1991-09-01

    access control requiremnts is a messy task. It may result in a system less reliable and secure than building a new system from scratch. Further, we have...means to specify access control requirments for the need-to-know policy. B. Actions as Access Priviledges and Queries in an Object-Class Hierarchy The...database. Access priviledges include read. update. append, delete. etc. An access query is a logical expression of predicates defining the parn of a data

  13. First Experiences Using XACML for Access Control in Distributed Systems

    Science.gov (United States)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  14. Quality controlled water, sediment, tissue, and tar/oil chemistry analyses from the Deepwater Horizon (DWH) oil spill event in the Gulf of Mexico from 2010-04 to 2011-06, sourced from NOAA's Query Manager data management system (NODC Accession 0108924)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This collection includes 4 data files (one each for water, sediment, tissue, and tar/oil analyses) containing data from the Deepwater Horizon (DWH) Oil Spill Event...

  15. Accessibility

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2017-01-01

    This contribution is timely as it addresses accessibility in regards system hardware and software aligned with introduction of the Twenty-First Century Communications and Video Accessibility Act (CVAA) and adjoined game industry waiver that comes into force January 2017. This is an act created...... by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...... platforms; and games software. However, the CVAA has no legal status in the EU. This text succinctly introduces and questions implications, impact, and wider adoption. By presenting the full CVAA and game industry waiver the text targets to motivate discussions and further publications on the subject...

  16. Access Control in the ATLAS TDAQ Online Cluster

    CERN Document Server

    Leahu, Marius Constantin; Stoichescu, D A; Lehmann Miotto, G

    ATLAS (A Toroidal LHC Apparatus) is a general-purpose detector for studying high-energy particle interactions: it is the largest particle detector experiment at CERN and it is built around one of the interaction points of the proton beams accelerated by the Large Hadron Collider (LHC). The detector generates an impressive amount of raw data: 64 TB per second as a result of 40 MHz proton-proton collision rate with 1.6 MB data for each such event. The handling of such data rate is managed by a three levels Trigger and Data Acquisition (TDAQ) system, which filters out the events not relevant from physics research point of view and selects in the end in the order of 1000 events per second to be stored for offline analyses. This system comprises a significant number of hardware devices, software applications and human personnel to supervise the experiment operation. Their protection against damages as a result of misuse and their optimized exploitation by avoiding the conflicting accesses to resources are key requ...

  17. CADDIS Volume 4. Data Analysis: Advanced Analyses - Controlling for Natural Variability: SSD Plot Diagrams

    Science.gov (United States)

    Methods for controlling natural variability, predicting environmental conditions from biological observations method, biological trait data, species sensitivity distributions, propensity scores, Advanced Analyses of Data Analysis references.

  18. 36 CFR 1256.70 - What controls access to national security-classified information?

    Science.gov (United States)

    2010-07-01

    ... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access... Information Act (5 U.S.C. 552, as amended). (b) Public access to documents declassified in accordance with...

  19. METHOD AND ABSTRACT MODEL FOR CONTROL AND ACCESS RIGHTS BY REQUESTS REDIRECTION

    Directory of Open Access Journals (Sweden)

    K. A. Shcheglov

    2015-11-01

    Full Text Available We have researched implementation problems of control and access rights of subjects to objects in modern computer systems. We have suggested access control method based on objects access requests redirection. The method possesses a distinctive feature as compared to discretional access control. In case when a subject needs to deny writing (object modification, it is not denied but redirected (access rights are not changed, but operation is performed with another object. This gives the possibility to implement access policies to system objects without breaking the system and applications operability, and share correctly access objects between subjects. This important property of suggested access control method enables to solve fundamentally new system objects securing problems like system resources virtualization aimed to protect system objects from users’ and applications attacks. We have created an abstract model, and it shows that this method (access control from subjects to objects based on requests redirection can be used as self-sufficient access control method, implementing any access control policy (from subjects to objects, thus being an alternative to discretional access control method.

  20. Evaluation of secure capability-based access control in the M2M local cloud platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    delegation. Recently, the capability based access control has been considered as method to manage access in the Internet of Things (IoT) or M2M domain. In this paper, the implementation and evaluation of a proposed secure capability based access control in the M2M local cloud platform is presented......Managing access to and protecting resources is one of the important aspect in managing security, especially in a distributed computing system such as Machine-to-Machine (M2M). One such platform known as the M2M local cloud platform, referring to BETaaS architecture [1], which conceptually consists...... of multiple distributed M2M gateways, creating new challenges in the access control. Some existing access control systems lack in scalability and flexibility to manage access from users or entity that belong to different authorization domains, or fails to provide fine grained and flexible access right...

  1. Principles of Eliminating Access Control Lists within a Domain

    Directory of Open Access Journals (Sweden)

    Vic Grout

    2012-04-01

    Full Text Available The infrastructure of large networks is broken down into areas that have a common security policy called a domain. Security within a domain is commonly implemented at all nodes. However this can have a negative effect on performance since it introduces a delay associated with packet filtering. When Access Control Lists (ACLs are used within a router for this purpose then a significant overhead is introduced associated with this process. It is likely that identical checks are made at multiple points within a domain prior to a packet reaching its destination. Therefore by eliminating ACLs within a domain by modifying the ingress/egress points with equivalent functionality an improvement in the overall performance can be obtained. This paper considers the effect of the delays when using router operating systems offering different levels of functionality. It considers factors which contribute to the delay particularly due to ACLs and by using theoretical principles modified by practical calculation a model is created. Additionally this paper provides an example of an optimized solution which reduces the delay through network routers by distributing the security rules to the ingress/egress points of the domain without affecting the security policy.

  2. Concurrency control and recovery on lightweight directory access protocol

    Science.gov (United States)

    Potnis, Rohit R.; Sathaye, Archana S.

    2003-04-01

    In this paper we provide a concurrency control and recovery (CCR) mechanism over cached LDAP objects. An LDAP server can be directly queried using system calls to retrieve data. Existing LDAP implementations do not provide CCR mechanisms. In such cases, it is up to the application to verify that accesses remain serialized. Our mechanism provides an independent layer over an existing LDAP server (Sun One Directory Server), which handles all user requests, serializes them based on 2 Phase Locking and Timestamp Ordering mechanisms and provides XML-based logging for recovery management. Furthermore, while current LDAP servers only provide object-level locking, our scheme serializes transactions on individual attributes of LDAP objects (attribute-level locking). We have developed a Directory Enabled Network (DEN) Simulator that operates on a subset of directory objects on an existing LDAP server to test the proposed mechanism. We perform experiments to show that our mechanism can gracefully address concurrency and recovery related issues over and LDAP server.

  3. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  4. Toward an Open-Access Global Database for Mapping, Control, and Surveillance of Neglected Tropical Diseases

    Science.gov (United States)

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F.; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F. L.; Utzinger, Jürg; Kristensen, Thomas K.; Vounatsou, Penelope

    2011-01-01

    Background After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. Methodology With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and ‘grey literature’), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. Principal Findings At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. Conclusions An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a

  5. A TDMA based media access control protocol for wireless ad hoc networks

    Science.gov (United States)

    Yang, Qi; Tang, Biyu

    2013-03-01

    This paper presents a novel Time Division Multiplex Access (TDMA) based Media Access Control (MAC) protocol of wireless Ad Hoc network. To achieve collision free transmission, time slots in a MAC frame are cataloged into three types, that is access slot, control slot and traffic slot. Nodes in the network access to the network in the access slot, and an exclusive control is allocated subsequently. Data packets are transmission by dynamic schedule the traffic slots. Throughput and transmission delay are also analyzed by simulation experiment. The proposed protocol is capable of providing collision free transmission and achieves high throughput.

  6. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...... interfacing and signal routing. Equipment and infrastructure simplification was recognized as the path towards more efficient metropolitan and access networks providing a spectrum of high-bandwidth services to large number of users. Several approaches have been proposed and developed in order to enable...

  7. An intelligent trust-based access control model for affective ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 22, No 1 (2015) >. Log in or Register to get access to full text downloads.

  8. The assessment of exploitation process of power for access control system

    Science.gov (United States)

    Wiśnios, Michał; Paś, Jacek

    2017-10-01

    The safety of public utility facilities is a function not only of effectiveness of the electronic safety systems, used for protection of property and persons, but it also depends on the proper functioning of their power supply systems. The authors of the research paper analysed the power supply systems, which are used in buildings for the access control system that is integrated with the closed-circuit TV. The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at identification of people, vehicles allowed to cross the boundary of the reserved area, to prevent from crossing the reserved area and to generate the alarm signal informing about the attempt of crossing by an unauthorised entity. The industrial electricity with appropriate technical parameters is a basis of proper functioning of safety systems. Only the electricity supply to the systems is not equivalent to the operation continuity provision. In practice, redundant power supply systems are used. In the carried out reliability analysis of the power supply system, various power circuits of the system were taken into account. The reliability and operation requirements for this type of system were also included.

  9. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  10. Problems and Concerns Regarding Access Control System Construction in Radiation Facilities Based on the NIFS Experience

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Motojima, O.

    2001-01-01

    Full text: In 1998, access control system for the large helical device (LHD) experimental hall was constructed and put into operation at the National Institute for Fusion Science (NIFS) in Toki, Japan. Since then, the system has been continuously improved. It now controls access into the LHD controlled area through four entrances. The system has five turnstile gates and enables control of access at the four entrances. The system is always checking whether the shielding doors are open or closed at eight positions. The details pertaining to the construction of the system were reported at IRPA-10 held in Hiroshima, Japan, in 2000. Based on our construction experience of the NIFS access control system, we will discuss problems related to software and operational design of the system. We will also discuss some concerns regarding the use of the system in radiation facilities. The problems we will present concern, among other thing, individual registration, time control, turnstile control, interlock signal control, data aggregation and transactions, automatic and manual control, and emergency procedures. For example, in relation to the time control and turnstile control functions, we will discuss the gate-opening time interval for an access event, the timing of access data recording, date changing, turn bar control, double access, and access error handling. (author)

  11. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-01-17

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  12. Designing a Secure E-commerce with Credential Purpose-based Access Control

    OpenAIRE

    Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek

    2014-01-01

    The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-commerce must establish a secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features. The e-commerce application must authorize access to only tho...

  13. Security analysis and improvements of authentication and access control in the Internet of Things.

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  14. Application Layer Definition and Analyses of Controller Area Network Bus for Wire Harness Assembly Machine

    OpenAIRE

    Guo, Hui; Jiang, Ying

    2006-01-01

    With the feature of multi-master bus access, nondestructive contention-based arbitration and flexible configuration, Controller Area Network (CAN) bus is applied into the control system of Wire Harness Assembly Machine (WHAM). To accomplish desired goal, the specific features of the CAN bus is analyzed by compared with other field buses and the functional performances in the CAN bus system of WHAM is discussed. Then the application layer planning of CAN bus for dynamic priority is presented. ...

  15. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  16. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class B...

  17. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    This paper introduces an off-tag RFID access control mechanism called "Selective RFID Jamming". Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  18. Owner-Based Role-Based Access Control OB-RBAC

    NARCIS (Netherlands)

    Saffarian, M.; Sadighi, Babak

    Administration of an access control model deals with the question of who is authorized to update policies defined on the basis of that model. One of the models whose administration has absorbed relatively large research is the Role-Based Access Control (RBAC) model. All the existing role-based

  19. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  20. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  1. Using geographical information systems to analyse accessibility to health services in the West Bank, occupied Palestinian territory.

    Science.gov (United States)

    Eklund, L; Mårtensson, U

    2012-08-01

    Accessibility to adequate health services is a basic human right. Israeli road blocks and checkpoints inhibit access to health care for the Palestinian population. While other studies have dealt with the impact of the barriers, few are based on actual measurements of transport times between locations. Geographical information systems (GIS) and network analysis were used to generate different estimations of accessibility based on the existing road network and transport barriers. The population negatively affected were mainly people living outside urban centres and in governorates with no general hospital. Quantitative measurements using GIS can be used to confirm qualitative studies based on interviews and questionnaires and improve the understanding of the results. Working with a spatial analysis tool also helps to pinpoint weaknesses in the current infrastructure, thus improving the efficiency of future investments to improve health care in the West Bank.

  2. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  3. Proximity-based access control for context-sensitive information provision in SOA-based systems

    Science.gov (United States)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  4. Methodology for Analysing Controllability and Observability of Bladed Disc Coupled Vibrations

    DEFF Research Database (Denmark)

    Christensen, Rene Hardam; Santos, Ilmar

    2004-01-01

    to place sensors and actuators so that all vibration levels can be monitored and controlled. Due to the special dynamic characteristics of rotating coupled bladed discs, where disc lateral motion is coupled to blade flexible motion, such analyses become quite complicated. The dynamics is described...... by a time-variant mathematical model, which presents parametric vibration modes and centrifugal stiffening effects resulting in increasing blade natural frequencies. In this framework the objective and contribution of this paper is to present a methodology for analysing the modal controllability...

  5. Information access for event-driven smart grid controllers

    DEFF Research Database (Denmark)

    Kristensen, Thomas Le Fevre; Olsen, Rasmus Løvenstein; Rasmussen, Jakob Gulddahl

    2018-01-01

    Control of assets in electricity distribution grids is becoming an increasingly interesting solution to address challenges arising in the grid with an increasing penetration of distributed renewable energy generation. This paper looks at a voltage control scenario in low voltage (LV) distribution...

  6. Development of an access control system for the LHD experimental hall

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Uda, T.; Yamanishi, H.; Miyake, H.; Tanahashi, S.; Motozima, O.

    2000-01-01

    An access control system for the LHD (Large Helical Device) experimental hall had been constructed and its practical operation started in March 1998. Continuously, the system has been improved. The present system keeps watch on involved entrance and exit for the use of persons at four entrances by using five turnstile gates while watching on eight shielding doors at eight positions (four entrances, three carriage entrances and a hall overview) and a stairway connecting the LHD main hall with the LHD basement. Besides, for the security of safety operation of the LHD, fifteen kinds of interlock signals are exchanged between the access control system and the LHD control system. Seven of the interlock signals are properly sent as the occasional demands from the access control system to the LHD control system, in which three staple signals are B Personnel Access to Controlled Area, D Shielding Door Closed, and E No Entrance. It is important that any plasma experiments of the LHD are not permitted while the signal B being sent or D being not sent. The signal E is sent to inform the LHD control system that the turnstile gates are locked. All the plasma experiments should not be done unless the lock procedure of the turnstile is confirmed. When the turnstile gates are locked, any persons cannot enter into the LHD controlled area, but are permissible to exit only. Six of the interlock signals are used to send the information of the working at that time in the LHD controlled area to the access control system. When one signal of the operation mode is sent to the access control system from the LHD, the access control system sets the turnstile gate in situation corresponding to the operation mode, A Equipment Operation, B Vacuum Pumping, C Coil Cooling, D Coil Excitation, and E Plasma Experiment. If the access control system receives, for example, the signal B, this system sets the turnstile gate in the condition of control such that only persons assigned to the work of vacuum

  7. Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon

    Focusing on Wireless Sensor Networks (WSN) that are powered by energy harvesting, this dissertation focuses on energy-efficient communication links between senders and receivers that are alternating between active and sleeping states of operation. In particular, the focus lies on Medium Access......, collision avoidance, provision of Quality of Service (QoS) and security. Focusing on the particular requirements of an energy harvesting application, the dissertation continues with the presentation of a MAC protocol, named ODMAC, which extends the receiver-initiated paradigm with several energy......-efficient features that aim to adapt the consumed energy to match the harvested energy, distribute the load with respect to the harvested energy, decrease the overhead of the communication, address the requirements for collision avoidance, prioritize urgent traffic and secure the system against beacon replay attacks...

  8. The Smart Card concept applied to access control

    International Nuclear Information System (INIS)

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described

  9. Assessment of current practices in creating and using passwords as a control mechanism for information access

    Directory of Open Access Journals (Sweden)

    P. L. Wessels

    2007-11-01

    Full Text Available One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information.

  10. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  11. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres

    2014-01-01

    new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....

  12. Formalization of the Access Control on ARM-Android Platform with the B Method

    Science.gov (United States)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  13. Increasing software testability with standard access and control interfaces

    Science.gov (United States)

    Nikora, Allen P; Some, Raphael R.; Tamir, Yuval

    2003-01-01

    We describe an approach to improving the testability of complex software systems with software constructs modeled after the hardware JTAG bus, used to provide visibility and controlability in testing digital circuits.

  14. 75 FR 43825 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-07-27

    ... types of access controls applied to video games: Macrovision's SafeDisc software and Sony's SecuRom... works such as video games and slide presentations). B. Computer programs that enable wireless telephone... claim of breach of contract, and not a claim under Section 1201(a)(1). D. Video games accessible on...

  15. WWW--Wealth, Weariness or Waste. Controlled Vocabulary and Thesauri in Support of Online Information Access.

    Science.gov (United States)

    Batty, David

    1998-01-01

    Discusses the problems of access to information in a machine-sensible environment, and the potential of modern library techniques to help in solving them. Explains how authors and publishers can make information more accessible by providing indexing information that uses controlled vocabulary, terms from a thesaurus, or other linguistic assistance…

  16. Quality control and conduct of genome-wide association meta-analyses

    DEFF Research Database (Denmark)

    Winkler, Thomas W; Day, Felix R; Croteau-Chonka, Damien C

    2014-01-01

    Rigorous organization and quality control (QC) are necessary to facilitate successful genome-wide association meta-analyses (GWAMAs) of statistics aggregated across multiple genome-wide association studies. This protocol provides guidelines for (i) organizational aspects of GWAMAs, and for (ii) QC...

  17. Sex based subgroup differences in randomized controlled trials: Empirical evidence from Cochrane meta-analyses

    NARCIS (Netherlands)

    Wallach, J.D. (Joshua D.); Sullivan, P.G. (Patrick G.); Trepanowski, J.F. (John F.); E.W. Steyerberg (Ewout); J.P.A. Ioannidis (John)

    2016-01-01

    textabstractObjective To evaluate the frequency, validity, and relevance of statistically significant (P<0.05) sex-treatment interactions in randomized controlled trials in Cochrane meta-analyses. Design Meta-epidemiological study. Data sources Cochrane Database of Systematic Reviews (CDSR) and

  18. Distributed Medium Access Control with SDMA Support for WLANs

    Science.gov (United States)

    Zhou, Sheng; Niu, Zhisheng

    With simultaneous multi-user transmissions, spatial division multiple access (SDMA) provides substantial throughput gain over the single user transmission. However, its implementation in WLANs with contention-based IEEE 802.11 MAC remains challenging. Problems such as coordinating and synchronizing the multiple users need to be solved in a distributed way. In this paper, we propose a distributed MAC protocol for WLANs with SDMA support. A dual-mode CTS responding mechanism is designed to accomplish the channel estimation and user synchronization required for SDMA. We analytically study the throughput performance of the proposed MAC, and dynamic parameter adjustment is designed to enhance the protocol efficiency. In addition, the proposed MAC protocol does not rely on specific physical layer realizations, and can work on legacy IEEE 802.11 equipment with slight software updates. Simulation results show that the proposed MAC outperforms IEEE 802.11 significantly, and that the dynamic parameter adjustment can effectively track the load variation in the network.

  19. 77 FR 26789 - Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and...

    Science.gov (United States)

    2012-05-07

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-661] Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and Products Containing Same; Determination Rescinding the Exclusion Order and Cease and Desist Orders AGENCY: U.S. International Trade Commission. ACTION...

  20. A Linux-Based Approach to Low-Cost Support of Access Control Policies

    National Research Council Canada - National Science Library

    Clark, Paul

    1999-01-01

    .... Systems that enforce Mandatory Access Control (MAC) policies are known to reduce some known security weaknesses, but such systems have seen limited use within the United States Government, and they are rarely applied in the private sector...

  1. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-08-06

    ... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright... nonsubstantial correction to its regulation announcing the prohibition against circumvention of technological... the final rule governing exemption to prohibition on circumvention of copyright protection systems for...

  2. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  3. Role-Based Access Control for Coalition Partners in Maritime Domain Awareness

    National Research Council Canada - National Science Library

    McDaniel, Christopher R; Tardy, Matthew L

    2005-01-01

    The need for Shared Situational Awareness (SSA) in accomplishing joint missions by coalition militaries, law enforcement, the intelligence community, and the private sector creates a unique challenge to providing access control...

  4. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2011-06-30

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... of risk management controls and supervisory procedures that, among other things, is reasonably... relevant risk management controls and supervisory procedures required under the Rule. DATES: The effective...

  5. Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC......), are not sufficient to address the new challenges introduced by these location-based applications. Several recent research efforts have enhanced RBAC with spatio-temporal features. Nevertheless, the state-of-the-art does not deal with mobility of both subjects and objects and does not support the utilization...

  6. Database application research in real-time data access of accelerator control system

    International Nuclear Information System (INIS)

    Chen Guanghua; Chen Jianfeng; Wan Tianmin

    2012-01-01

    The control system of Shanghai Synchrotron Radiation Facility (SSRF) is a large-scale distributed real-time control system, It involves many types and large amounts of real-time data access during the operating. Database system has wide application prospects in the large-scale accelerator control system. It is the future development direction of the accelerator control system, to replace the differently dedicated data structures with the mature standardized database system. This article discusses the application feasibility of database system in accelerators based on the database interface technology, real-time data access testing, and system optimization research and to establish the foundation of the wide scale application of database system in the SSRF accelerator control system. Based on the database interface technology, real-time data access testing and system optimization research, this article will introduce the application feasibility of database system in accelerators, and lay the foundation of database system application in the SSRF accelerator control system. (authors)

  7. Worktime control access, need and use in relation to work-home interference, fatigue, and job motivation.

    Science.gov (United States)

    Nijp, Hylco H; Beckers, Debby G J; Kompier, Michiel A J; van den Bossche, Seth N J; Geurts, Sabine A E

    2015-07-01

    Worktime control (WTC) has been suggested as a tool to reduce employees' work-home interference and fatigue and improve job motivation. The purpose of this study was twofold: (i) to examine the prevalence of employees' need for, access to, and use of WTC, as well as the incongruence between need for and access to WTC (ie, mismatch); and (ii) to examine the associations of this mismatch and the use of WTC with employees' work-home interference (WHI), fatigue and job motivation. Questionnaire data were collected among a large (N=2420) quasi-representative sample of Dutch employees. The prevalence of WTC need, access, use, and mismatch was assessed by means of descriptive statistics. Associations with employees' outcomes were assessed by analyses of covariance. The need for WTC was highly prevalent. For many employees, we observed a negative mismatch between access to and need for WTC (ie, accessmotivation. The use of WTC was also highly prevalent, but no meaningful associations were found with the outcome variables. It is relevant to examine WTC comprehensively, that is, to include measurements of employees' need for and access to WTC and assess employees' (mis)match between components of WTC. For practice, we recommend to introduce WTC on an organizational level and assess employees' need for WTC on an individual basis.

  8. Access control system in Hamaoka Nuclear Power Station

    International Nuclear Information System (INIS)

    Kaneda, Hisashi; Shimura, Shigetaka; Suzuki, Katsuhiko; Kitazawa, Toshiichi

    1983-01-01

    The new computerized system has introduced to improve function of radiation protection for those who enter the radiation control area, by dealing with measurement of radiation dose, check of personal qualification, resistration of working condition and statistical treatment of these data. This system uses combined TLD, ''TL BADGE'', as a radiation detection sensor, instead of conventional pocket dosimeter and film badge. TL BADGE reading instrument are installed at the entrance to the control area and at working areas. The data of radiation dose, personal qualification etc. read by the reading instrument are transmitted directly to the computer system, which compiles and transacts these data. This system is consisted of three minicomputers, double memory files, CRTs for effective data search and display and floppy disks as a medium for registration, etc. Thus the computer system improves its reliability and the maintenanceability of data, being capable of automatical transaction of a great amount of data quickly. This report describes: Concept of using computer system, System outline, Measurement of radiation dose and Operational functions. (author)

  9. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  10. Measurement of electromagnetic fields generated by air traffic control radar systems with spectrum analysers.

    Science.gov (United States)

    Barellini, A; Bogi, L; Licitra, G; Silvi, A M; Zari, A

    2009-12-01

    Air traffic control (ATC) primary radars are 'classical' radars that use echoes of radiofrequency (RF) pulses from aircraft to determine their position. High-power RF pulses radiated from radar antennas may produce high electromagnetic field levels in the surrounding area. Measurement of electromagnetic fields produced by RF-pulsed radar by means of a swept-tuned spectrum analyser are investigated here. Measurements have been carried out both in the laboratory and in situ on signals generated by an ATC primary radar.

  11. Results of neutron physics analyses of WWER-440 cores with modified reactor protection and control systems

    International Nuclear Information System (INIS)

    Lehmann, M.; Pecka, M.; Rocek, J.; Zalesky, K.

    1993-12-01

    Detailed results are given of neutron physics analyses performed to assess the efficiency and acceptability of modifications of the WWER-440 core protection and control system; the modifications have been proposed with a view to increasing the proportion of mechanical control in the compensation of reactivity effects during reactor unit operation in the variable load mode. The calculations were carried out using the modular MOBY-DICK macrocode system together with the SMV42G36 library of two-group parametrized diffusion constants, containing corrections which allow new-design WWER-440 fuel assemblies to be discriminated. (J.B). 37 tabs., 18 figs., 5 refs

  12. Parametric analyses on dynamic stall control of rotor airfoil via synthetic jet

    Directory of Open Access Journals (Sweden)

    Qijun ZHAO

    2017-12-01

    Full Text Available The effects of synthetic jet control on unsteady dynamic stall over rotor airfoil are investigated numerically. A moving-embedded grid method and an Unsteady Reynolds Averaged Navier-Stokes (URANS solver coupled with k-ω Shear Stress Transport (SST turbulence model are established for predicting the complex flowfields of oscillatory airfoil under jet control. Additionally, a velocity boundary condition modeled by sinusoidal function has been developed to fulfill the perturbation effect of periodic jet. The validity of present CFD method is evaluated by comparisons of the calculated results of baseline dynamic stall case for rotor airfoil and jet control case for VR-7B airfoil with experimental data. Then, parametric analyses are conducted emphatically for an OA212 rotor airfoil to investigate the effects of jet control parameters (jet location, dimensionless frequency, momentum coefficient, jet angle, jet type and dual-jet on dynamic stall characteristics of rotor airfoil. It is demonstrated by the calculated results that efficiency of jet control could be improved with specific momentum coefficient and jet angle when the jet is located near separation point of rotor airfoil. Furthermore, the dual-jet could improve control efficiency more obviously on dynamic stall of rotor airfoil with respect to the unique jet, and the influence laws of dual-jet’s angles and momentum coefficients on control effects are similar to those of the unique jet. Finally, unsteady aerodynamic characteristics of rotor via synthetic jet which is located on the upper surface of rotor blade in forward flight are calculated, and as a result, the aerodynamic characteristics of rotor are improved compared with the baseline. The results indicate that synthetic jet has the capability in improving aerodynamic characteristics of rotor. Keywords: Airfoil, Dynamic stall characteristics, Flow control, Moving-embedded grid methodology, Navier-Stokes equations, Parametric

  13. [Public control and equity of access to hospitals under non-State public administration].

    Science.gov (United States)

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  14. High-Alpha Research Vehicle Lateral-Directional Control Law Description, Analyses, and Simulation Results

    Science.gov (United States)

    Davidson, John B.; Murphy, Patrick C.; Lallman, Frederick J.; Hoffler, Keith D.; Bacon, Barton J.

    1998-01-01

    This report contains a description of a lateral-directional control law designed for the NASA High-Alpha Research Vehicle (HARV). The HARV is a F/A-18 aircraft modified to include a research flight computer, spin chute, and thrust-vectoring in the pitch and yaw axes. Two separate design tools, CRAFT and Pseudo Controls, were integrated to synthesize the lateral-directional control law. This report contains a description of the lateral-directional control law, analyses, and nonlinear simulation (batch and piloted) results. Linear analysis results include closed-loop eigenvalues, stability margins, robustness to changes in various plant parameters, and servo-elastic frequency responses. Step time responses from nonlinear batch simulation are presented and compared to design guidelines. Piloted simulation task scenarios, task guidelines, and pilot subjective ratings for the various maneuvers are discussed. Linear analysis shows that the control law meets the stability margin guidelines and is robust to stability and control parameter changes. Nonlinear batch simulation analysis shows the control law exhibits good performance and meets most of the design guidelines over the entire range of angle-of-attack. This control law (designated NASA-1A) was flight tested during the Summer of 1994 at NASA Dryden Flight Research Center.

  15. Steganography-based access control to medical data hidden in electrocardiogram.

    Science.gov (United States)

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data.

  16. Access to the Birth Control Pill and the Career Plans of Young Men and Women

    DEFF Research Database (Denmark)

    Steingrimsdottir, Herdis

    The paper explores the effect of unrestricted access to the birth control pill on young people’s career plans, using annual surveys of college freshmen from 1968 to 1980. In particular it addresses the question of who was affected by the introduction of the birth control pill by looking at career...... access to the pill is found to be on non-white students, both among men and women. The paper uses Census Data to compare the changes in career plans to actual changes in labor market outcomes. When looking at the actual career outcomes, early access to the pill affects both men and women - shifting...... their careers towards traditionally male dominated occupations associated with higher wages. Early access to the pill is also associated with significantly higher actual income for men....

  17. Access to the Birth Control Pill and the Career Plans of Young Men and Women

    DEFF Research Database (Denmark)

    Steingrimsdottir, Herdis

    plans of both men and women, and by separating the effect by level of academic ability, race and family income. The results show that unrestricted access to the pill caused high ability women to move towards occupations with higher wages, higher occupational prestige scores and higher male ratios......The paper explores the effect of unrestricted access to the birth control pill on young people’s career plans, using annual surveys of college freshmen from 1968 to 1980. In particular it addresses the question of who was affected by the introduction of the birth control pill by looking at career...... access to the pill is found to be on non-white students, both among men and women. The paper uses Census Data to compare the changes in career plans to actual changes in labor market outcomes. When looking at the actual career outcomes, early access to the pill affects both men and women - shifting...

  18. Optimizing data access for wind farm control over hierarchical communication networks

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Findrik, Mislav; Madsen, Tatiana Kozlova

    2016-01-01

    In this paper we investigate a centralized wind farm controller which runs periodically. The controller attempts to reduce the damage a wind turbine sustains during operation by estimating fatigue based on the wind turbine state. The investigation focuses on the impact of information access...

  19. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  20. C-DAM: CONTENTION BASED DISTRIBUTED RESERVATION PROTOCOL ALLOCATION ALGORITHM FOR WIMEDIA MEDIUM ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    UMADEVI K. S.

    2017-07-01

    Full Text Available WiMedia Medium Access Control (MAC provides high rate data transfer for wireless networking thereby enables construction of high speed home networks. It facilitates data communication between the nodes through two modes namely: i Distributed Reservation Protocol (DRP for isochronous traffic and ii Prioritized Contention Access (PCA for asynchronous traffic. PCA mode enables medium access using CSMA/CA similar to IEEE 802.11e. In the presence of DRP, the throughput of PCA saturates when there is an increase in the number of devices accessing PCA channel. Researchers suggest that the better utilization of medium resolves many issues in an effective way. To demonstrate the effective utilization of the medium, Contention Based Distributed Reservation Protocol Allocation Algorithm for WiMedia Medium Access Control is proposed for reserving Medium Access Slots under DRP in the presence of PCA. The proposed algorithm provides a better medium access, reduces energy consumption and enhances the throughput when compared to the existing methodologies.

  1. f-MAC: A Deterministic Media Access Control Protocol Without Time Synchronization

    OpenAIRE

    Roedig, Utz; Barroso, Andre; Sreenan, Cormac J.

    2006-01-01

    Nodes in a wireless network transmit messages through a shared medium. Thus, a Media Access Control (MAC) protocol is necessary to regulate and coordinate medium access. For some application areas it is necessary to have a deterministic MAC protocol which can give guarantees on message delay and channel throughput. Schedule based MAC protocols, based on time synchronization among nodes, are currently used to implement deterministic MAC protocols. Time synchronization is difficult and costly, ...

  2. A novel technique to extract events from access control system and locate persons

    International Nuclear Information System (INIS)

    Vincent, M.; Vaidyanathan, Mythili; Patidar, Suresh Chandra; Prabhakara Rao, G.

    2011-01-01

    Indira Gandhi Centre for Atomic Research houses many laboratories which handle radioactive materials and classified materials. Protection and accounting of men and material and critical facilities are important aspect of nuclear security. Access Control System (ACS) is used to enhance the protective measures against elevated threat environment. Access control system hardware consists of hand geometry readers, RFID readers, Controllers, Electromagnetic door locks, Turnstiles, fiber cable laying and termination etc. Access Control System controls and monitors the people accessing the secured facilities. Access Control System generates events on: 1. Showing of RFID card, 2. Rotation of turnstile, 3. Download of valid card numbers, 4. Generation of alarms etc. Access control system turnstiles are located in main entrance of a facility, entrance of inside laboratory and door locks are fixed on secured facilities. Events are stored in SQL server database. From the events stored in database a novel technique is developed to extract events and list the persons in a particular facility, list all entry/exit events on one day, list the first in and last out entries. This paper discusses the complex multi level group by queries and software developed to extract events from database, locate persons and generate reports. Software is developed as a web application in ASP.Net and query is written in SQL. User can select the doors, type of events and generate reports. Reports are generated using the master data stored about employees RFID cards and events data stored in tables. Four types of reports are generated 1. Plant Emergency Report, 2. Locate User Report, 3. Entry - Exit Report, 4. First in Last out Report. To generate plant emergency report for whole plant only events generated in outer gates have to be considered. To generate plant emergency report for inside laboratory, events generated in entrance gates have to be ignored. (author)

  3. Parametric analyses for synthetic jet control on separation and stall over rotor airfoil

    Directory of Open Access Journals (Sweden)

    Zhao Guoqing

    2014-10-01

    Full Text Available Numerical simulations are performed to investigate the effects of synthetic jet control on separation and stall over rotor airfoils. The preconditioned and unsteady Reynolds-averaged Navier–Stokes equations coupled with a k − ω shear stream transport turbulence model are employed to accomplish the flowfield simulation of rotor airfoils under jet control. Additionally, a velocity boundary condition modeled by a sinusoidal function is developed to fulfill the perturbation effect of periodic jets. The validity of the present CFD procedure is evaluated by the simulated results of an isolated synthetic jet and the jet control case for airfoil NACA0015. Then, parametric analyses are conducted specifically for an OA213 rotor airfoil to investigate the effects of jet parameters (forcing frequency, jet location and momentum coefficient, jet direction, and distribution of jet arrays on the control effect of the aerodynamic characteristics of a rotor airfoil. Preliminary results indicate that the efficiency of jet control can be improved with specific frequencies (the best lift-drag ratio at F+ = 2.0 and jet angles (40° or 75° when the jets are located near the separation point of the rotor airfoil. Furthermore, as a result of a suitable combination of jet arrays, the lift coefficient of the airfoil can be improved by nearly 100%, and the corresponding drag coefficient decreased by 26.5% in comparison with the single point control case.

  4. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  5. Access control system for two person rule at Rokkasho Reprocessing Plant

    International Nuclear Information System (INIS)

    Yanagisawa, Sawako; Ino, Munekazu; Yamada, Noriyuki; Oota, Hiroto; Iwasaki, Mitsuaki; Kodani, Yoshiki; Iwamoto, Tomonori

    2014-01-01

    Following the amendment and enforcement of Regulation of Reprocessing Activity on March 29th 2012, two person rule has become compulsory for the specific rooms to counter and prevent the sabotage or theft of nuclear materials by the insiders at reprocessing plant in Japan. The rooms will include those which contains cooling systems for decay heat removal from spent fuels and so on, scavenging systems to prevent the hydrogen accumulation, and those which contains nuclear material. To ensure the two person rule at Rokkasho Reprocessing Plant, JNFL has recently, after comprehensive study, introduced efficient and effective access control system for the rooms mentioned above. The system is composed of bio-attestation devices, surveillance cameras and electronic locks to establish access control system. This report outlines the access control system for two person rule and introduces the operation. (author)

  6. A Generic Role Based Access Control Model for Wind Power Systems

    DEFF Research Database (Denmark)

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    The electrical power infrastructure is facing a transition from a largely centralised distribution infrastructure with a few large power plants to an increasingly distributed infrastructure that must incorporate privately owned and operated power generation units based on fuel cells or sustainable...... infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...... power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused...

  7. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

    Directory of Open Access Journals (Sweden)

    Mikel Uriarte Itzazelaia

    2018-02-01

    Full Text Available Upcoming smart scenarios enabled by the Internet of Things (IoT envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  8. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  9. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.

    Science.gov (United States)

    Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro

    2018-02-13

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  10. Chroni - an Android Application for Geochronologists to Access Archived Sample Analyses from the NSF-Funded Geochron.Org Data Repository.

    Science.gov (United States)

    Nettles, J. J.; Bowring, J. F.

    2014-12-01

    NSF requires data management plans as part of funding proposals and geochronologists, among other scientists, are archiving their data and results to the public cloud archives managed by the NSF-funded Integrated Earth Data Applications, or IEDA. GeoChron is a database for geochronology housed within IEDA. The software application U-Pb_Redux developed at the Cyber Infrastructure Research and Development Lab for the Earth Sciences (CIRDLES.org) at the College of Charleston provides seamless connectivity to GeoChron for uranium-lead (U-Pb) geochronologists to automatically upload and retrieve their data and results. U-Pb_Redux also manages publication-quality documents including report tables and graphs. CHRONI is a lightweight mobile application for Android devices that provides easy access to these archived data and results. With CHRONI, U-Pb geochronologists can view archived data and analyses downloaded from the Geochron database, or any other location, in a customizable format. CHRONI uses the same extensible markup language (XML) schema and documents used by U-Pb_Redux and GeoChron. Report Settings are special XML files that can be customized in U-Pb_Redux, stored in the cloud, and then accessed and used in CHRONI to create the same customized data display on the mobile device. In addition to providing geologists effortless and mobile access to archived data and analyses, CHRONI allows users to manage their GeoChron credentials, quickly download private and public files via a specified IEDA International Geo Sample Number (IGSN) or URL, and view specialized graphics associated with particular IGSNs. Future versions of CHRONI will be developed to support iOS compatible devices. CHRONI is an open source project under the Apache 2 license and is hosted at https://github.com/CIRDLES/CHRONI. We encourage community participation in its continued development.

  11. Measurement of electromagnetic fields generated by air traffic control radar systems with spectrum analysers

    International Nuclear Information System (INIS)

    Barellini, A.; Bogi, L.; Licitra, G.; Silvi, A. M.; Zari, A.

    2009-01-01

    Air traffic control (ATC) primary radars are 'classical' radars that use echoes of radiofrequency (RF) pulses from aircraft to determine their position. High-power RF pulses radiated from radar antennas may produce high electromagnetic field levels in the surrounding area. Measurement of electromagnetic fields produced by RF-pulsed radar by means of a swept-tuned spectrum analyser are investigated here. Measurements have been carried out both in the laboratory and in situ on signals generated by an ATC primary radar. (authors)

  12. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  13. JSON Schema for Attribute-based Access Control for Network Resource Security

    CSIR Research Space (South Africa)

    Linklater, G

    2017-09-01

    Full Text Available the features provided to XACML by XML Schema. Index Terms—JSON Schema; Access Control; Authorization; Security; Attribute-based Access Control; ABAC; Internet of Things; IoT; Server-to-Server; Machine-to-Machine; S2S; M2M; Network Security I. INTRODUCTION... with the requirements of ABAC. • Section V discusses the viability of JSON Schema as a replacement for XML Schema in the creation of a new JSON-based ABAC standard. This section also discusses possible future work that arose out of the conclusions drawn in this document...

  14. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    OpenAIRE

    Luis Cruz-Piris; Diego Rivera; Ivan Marsa-Maestre; Enrique de la Hoz; Juan R. Velasco

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to o...

  15. Numerical simulations and analyses of temperature control loop heat pipe for space CCD camera

    Science.gov (United States)

    Meng, Qingliang; Yang, Tao; Li, Chunlin

    2016-10-01

    As one of the key units of space CCD camera, the temperature range and stability of CCD components affect the image's indexes. Reasonable thermal design and robust thermal control devices are needed. One kind of temperature control loop heat pipe (TCLHP) is designed, which highly meets the thermal control requirements of CCD components. In order to study the dynamic behaviors of heat and mass transfer of TCLHP, particularly in the orbital flight case, a transient numerical model is developed by using the well-established empirical correlations for flow models within three dimensional thermal modeling. The temperature control principle and details of mathematical model are presented. The model is used to study operating state, flow and heat characteristics based upon the analyses of variations of temperature, pressure and quality under different operating modes and external heat flux variations. The results indicate that TCLHP can satisfy the thermal control requirements of CCD components well, and always ensure good temperature stability and uniformity. By comparison between flight data and simulated results, it is found that the model is to be accurate to within 1°C. The model can be better used for predicting and understanding the transient performance of TCLHP.

  16. Automated biometric access control system for two-man-rule enforcement

    International Nuclear Information System (INIS)

    Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule

  17. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    Science.gov (United States)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  18. A test bed for the future access control system the AD Project

    CERN Document Server

    Scibile, L

    1999-01-01

    This paper describes the design, management and development of the new access control system for the Antiproton Deceleration experimental area, called the AD Project. As this project includes all the elements for the industrial evolution of the present access control system it is an ideal test bed for future access systems. The adoption of new technologies and techniques are described, and the benefits and the shortfalls are highlighted. The open redundant architecture solution, based on a PROFIBUS network and standard industrial components (HP-UNIX, Siemens S7 PLC, Siemens Industrial PC, door locks), guarantees reliability, safety and optimal integration. The project team took advantage of the Goal Directed Project Management technique and managed to define a clear and effective strategy.

  19. Multidimensional morphometric 3D MRI analyses for detecting brain abnormalities in children: impact of control population.

    Science.gov (United States)

    Wilke, Marko; Rose, Douglas F; Holland, Scott K; Leach, James L

    2014-07-01

    Automated morphometric approaches are used to detect epileptogenic structural abnormalities in 3D MR images in adults, using the variance of a control population to obtain z-score maps in an individual patient. Due to the substantial changes the developing human brain undergoes, performing such analyses in children is challenging. This study investigated six features derived from high-resolution T1 datasets in four groups: normal children (1.5T or 3T data), normal clinical scans (3T data), and patients with structural brain lesions (3T data), with each n = 10. Normative control data were obtained from the NIH study on normal brain development (n = 401). We show that control group size substantially influences the captured variance, directly impacting the patient's z-scores. Interestingly, matching on gender does not seem to be beneficial, which was unexpected. Using data obtained at higher field scanners produces slightly different base rates of suprathreshold voxels, as does using clinically derived normal studies, suggesting a subtle but systematic effect of both factors. Two approaches for controlling suprathreshold voxels in a multidimensional approach (combining features and requiring a minimum cluster size) were shown to be substantial and effective in reducing this number. Finally, specific strengths and limitations of such an approach could be demonstrated in individual cases.

  20. Benefits of Location-Based Access Control:A Literature Study

    NARCIS (Netherlands)

    van Cleeff, A.; Pieters, Wolter; Wieringa, Roelf J.

    2010-01-01

    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been

  1. Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?

    Science.gov (United States)

    De Jesus, Maria; Xiao, Chenyang

    2014-01-01

    There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…

  2. Prevention and Control of Dental Disease through Improved Access to Comprehensive Care.

    Science.gov (United States)

    American Dental Association, Chicago, IL.

    Prevention of dental disease is the key to improving the nation's oral health. The American Dental Association (ADA) program of prevention and control of dental disease through improved access to comprehensive care concentrates on those who have special difficulties in receiving care: the poor, the elderly, the handicapped, the institutionalized…

  3. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    Science.gov (United States)

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  4. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    Energy Technology Data Exchange (ETDEWEB)

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  5. Gender Relations in Access to and Control over Resources in Awra ...

    African Journals Online (AJOL)

    This paper explores gender relations in access to and control over resources in Awra Amba Community of Amhara Region, Ethiopia. The study employed primary and secondary data sources. The primary data were gathered through semistructured interviews with selected community members and key informants, focus ...

  6. Toward an open-access global database for mapping, control, and surveillance of neglected tropical diseases

    DEFF Research Database (Denmark)

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina

    2011-01-01

    for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken...

  7. Access To and Control of Resources Among The Maasai Women of ...

    African Journals Online (AJOL)

    The study to assess access to and control of resources among the Maasai women was conducted at Monduli and Makuyuni towns in Monduli District in Arusha Region. Data were collected from a sample of 75 respondents using questionnaire, in-depth interviews and focus group discussions. The majority of the ...

  8. Policy Based Access Control in Dynamic Grid-based Collaborative Environment

    NARCIS (Netherlands)

    Demchenko, Y.; Gommans, L.; Tokmakoff, A.; van Buuren, R.

    2006-01-01

    This paper describes the design and development of a flexible, customer-driven, security infrastructure for Gridbased Collaborative Environments. The paper proposes further development of the access control model built around a service or resource provisioning agreement (e.g., an experiment or

  9. Access and control of agro-biotechnology : Bt cotton, ecological change and risk in China

    NARCIS (Netherlands)

    Ho, Peter; Zhao, Jennifer H.; Xue, Dayuan

    2009-01-01

    This article argues that if the introduction of genetically modified crops (GM crops) in developing countries is to be successful, we can and should not evade questions of access and control of technology. It implies probing into the experiences, perceptions and understanding of GM crops by the

  10. Multi-level access control in the data pipeline of the international supply chain system

    NARCIS (Netherlands)

    Pruksasri, P.; Berg, J. van den; Hofman, W.; Daskapan, S.

    2013-01-01

    The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to

  11. Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Lee, C.

    2014-01-01

    This paper presents on-going research to define the basic models and architecture patterns for federated access control in heterogeneous (multi-provider) multi-cloud and inter-cloud environment. The proposed research contributes to the further definition of Intercloud Federation Framework (ICFF)

  12. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    Science.gov (United States)

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  13. Using Face Recognition in the Automatic Door Access Control in a Secured Room

    Directory of Open Access Journals (Sweden)

    Gheorghe Gilca

    2017-06-01

    Full Text Available The aim of this paper is to help users improve the door security of sensitive locations by using face detection and recognition. This paper is comprised mainly of three subsystems: face detection, face recognition and automatic door access control. The door will open automatically for the known person due to the command of the microcontroller.

  14. The ribosome quality control pathway can access nascent polypeptides stalled at the Sec61 translocon.

    Science.gov (United States)

    von der Malsburg, Karina; Shao, Sichen; Hegde, Ramanujan S

    2015-06-15

    Cytosolic ribosomes that stall during translation are split into subunits, and nascent polypeptides trapped in the 60S subunit are ubiquitinated by the ribosome quality control (RQC) pathway. Whether the RQC pathway can also target stalls during cotranslational translocation into the ER is not known. Here we report that listerin and NEMF, core RQC components, are bound to translocon-engaged 60S subunits on native ER membranes. RQC recruitment to the ER in cultured cells is stimulated by translation stalling. Biochemical analyses demonstrated that translocon-targeted nascent polypeptides that subsequently stall are polyubiquitinated in 60S complexes. Ubiquitination at the translocon requires cytosolic exposure of the polypeptide at the ribosome-Sec61 junction. This exposure can result from either failed insertion into the Sec61 channel or partial backsliding of translocating nascent chains. Only Sec61-engaged nascent chains early in their biogenesis were relatively refractory to ubiquitination. Modeling based on recent 60S-RQC and 80S-Sec61 structures suggests that the E3 ligase listerin accesses nascent polypeptides via a gap in the ribosome-translocon junction near the Sec61 lateral gate. Thus the RQC pathway can target stalled translocation intermediates for degradation from the Sec61 channel. © 2015 von der Malsburg et al. This article is distributed by The American Society for Cell Biology under license from the author(s). Two months after publication it is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  15. RCT: Module 2.10, Access Control and Work Area Setup, Course 8776

    Energy Technology Data Exchange (ETDEWEB)

    Hillmer, Kurt T. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-08-11

    This course presents information on radiological work permits (RWPs), various types of postings used in radiological areas, radiological area setups, access controls, and releases of material from radiological areas. All of these are fundamental duties of RCTs. This course will prepare the student with the skills necessary for radiological control technician (RCT) qualification by passing quizzes, tests, and the RCT Comprehensive Phase 1, Unit 2 Examination (TEST 27566) and providing in-thefield skills.

  16. Towards a Uniform Framework for Dynamic Analysis of Access Control Models

    OpenAIRE

    Amthor, Peter

    2017-01-01

    Security-critical system requirements are increasingly enforced through mandatory access control systems. These systems are controlled by security policies, highly sensitive system components, which emphasizes the paramount importance of formally verified security properties regarding policy correctness. For the class of safety-properties, addressing potential dynamic right proliferation, a number of known and tested formal analysis methods and tools already exist. Unfortunately, these method...

  17. ACCIDENT ANALYSES & CONTROL OPTIONS IN SUPPORT OF THE SLUDGE WATER SYSTEM SAFETY ANALYSIS

    Energy Technology Data Exchange (ETDEWEB)

    WILLIAMS, J.C.

    2003-11-15

    This report documents the accident analyses and nuclear safety control options for use in Revision 7 of HNF-SD-WM-SAR-062, ''K Basins Safety Analysis Report'' and Revision 4 of HNF-SD-SNF-TSR-001, ''Technical Safety Requirements - 100 KE and 100 KW Fuel Storage Basins''. These documents will define the authorization basis for Sludge Water System (SWS) operations. This report follows the guidance of DOE-STD-3009-94, ''Preparation Guide for US. Department of Energy Nonreactor Nuclear Facility Safety Analysis Reports'', for calculating onsite and offsite consequences. The accident analysis summary is shown in Table ES-1 below. While this document describes and discusses potential control options to either mitigate or prevent the accidents discussed herein, it should be made clear that the final control selection for any accident is determined and presented in HNF-SD-WM-SAR-062.

  18. Analysing and controlling the tax evasion dynamics via majority-vote model

    International Nuclear Information System (INIS)

    Lima, F W S

    2010-01-01

    Within the context of agent-based Monte-Carlo simulations, we study the well-known majority-vote model (MVM) with noise applied to tax evasion on simple square lattices, Voronoi-Delaunay random lattices, Barabasi-Albert networks, and Erdoes-Renyi random graphs. In the order to analyse and to control the fluctuations for tax evasion in the economics model proposed by Zaklan, MVM is applied in the neighborhood of the noise critical q c to evolve the Zaklan model. The Zaklan model had been studied recently using the equilibrium Ising model. Here we show that the Zaklan model is robust because this can be studied using equilibrium dynamics of Ising model also through the nonequilibrium MVM and on various topologies cited above giving the same behavior regardless of dynamic or topology used here.

  19. Analysing and controlling the tax evasion dynamics via majority-vote model

    Energy Technology Data Exchange (ETDEWEB)

    Lima, F W S, E-mail: fwslima@gmail.co, E-mail: wel@ufpi.edu.b [Departamento de Fisica, Universidade Federal do PiauI, 64049-550, Teresina - PI (Brazil)

    2010-09-01

    Within the context of agent-based Monte-Carlo simulations, we study the well-known majority-vote model (MVM) with noise applied to tax evasion on simple square lattices, Voronoi-Delaunay random lattices, Barabasi-Albert networks, and Erdoes-Renyi random graphs. In the order to analyse and to control the fluctuations for tax evasion in the economics model proposed by Zaklan, MVM is applied in the neighborhood of the noise critical q{sub c} to evolve the Zaklan model. The Zaklan model had been studied recently using the equilibrium Ising model. Here we show that the Zaklan model is robust because this can be studied using equilibrium dynamics of Ising model also through the nonequilibrium MVM and on various topologies cited above giving the same behavior regardless of dynamic or topology used here.

  20. Joint power and multiple access control for wireless mesh network with Rose projection method.

    Science.gov (United States)

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches.

  1. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    Science.gov (United States)

    Bögel, K; Joshi, D D

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessibility rate of 90-95% was determined using the first of these approaches, whereas 75-80% of the total dog population was reached in the vaccination campaign.

  2. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  3. DOE's nation-wide system for access control can solve problems for the federal government

    International Nuclear Information System (INIS)

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy's (DOE's) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location's level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals

  4. Design and implementation of fingerprint access control system based on ZigBee wireless network

    Directory of Open Access Journals (Sweden)

    Zhang Jin

    2017-01-01

    Full Text Available this paper mainly introduces a kind of fingerprint access control system based on ZigBee wireless network design and implementation method, specify when passengers should fingerprints collected and stored in the system at the information desk PC, and then assign rooms;Guests entered the room according to the fingerprint module, the system will be fingerprint information through ZigBee coordinator node module and network to transmit the fingerprint characteristic value to management system and the fingerprint information stored, if consistent with the electromagnetic lock open, allowed to enter the room, does not conform to the issued a warning sound.Additional access control system can control the corresponding fingerprint information storage room and remove, such as is required for a security incident broke in situation is special open mode can be set up.System software design consists of two aspects of the bottom and upper machine.

  5. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2013-01-01

    to the incoming and outgoing packet ratio. We describe the new protocol as an extension to the CSMA/CA protocol and implement the protocol on our own hardware platform. By means of our own testbed, we investigate two basic network structures, namely, the two-way relay and the cross topology. It is well known...... that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over......This paper advocates for a new Medium Access Control (MAC) strategy for wireless meshed networks by identifying overload scenarios in order to provide additional channel access priority to the relay. The key behind our MAC protocol is that the relay will adjust its back off window size according...

  6. Access Control in IoT/M2M - Cloud Platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu

    Billions of devices are connected to the Internet nowadays, and the number will continue to grow in the future thanks to the advances in the electronics and telecommunication technology developments. Its application in broad aspects of human’s life brings a lot of benefits by improving productivity...... and quality of life. This paradigm, which is often called Internet of Things (IoT) or Machine-to-Machine (M2M), will provide an unprecedented opportunity to create applications and services that go far beyond the mere purpose of each participant. Many studies on the both technical and social aspects of Io...... of a system can be accessed by other parties by means of a set of access policies. For an IoT system such as Radio Frequency Identification (RFID) that collects huge amounts of RFID events data and may store it in the cloud storage for tracking purpose, access control to such data becomes a critical point...

  7. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    Science.gov (United States)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  8. State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

    Directory of Open Access Journals (Sweden)

    Neetesh Saxena

    2015-10-01

    Full Text Available The smart grid (SG is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications in the smart grid network. Therefore, this paper addresses the required objectives of an authentication protocol in the smart grid network along with the focus on mutual authentication, access control, and secure integration among different SG components. We review the existing authentication protocols, and analyze mutual authentication, privacy, trust, integrity, and confidentiality of communicating information in the smart grid network. We review authentications between the communicated entities in the smart grid, such as smart appliance, smart meter, energy provider, control center (CC, and home/building/neighborhood area network gateways (GW. We also review the existing authentication schemes for the vehicle-to-grid (V2G communication network along with various available secure integration and access control schemes. We also discuss the importance of the mutual authentication among SG entities while providing confidentiality and privacy preservation, seamless integration, and required access control with lower overhead, cost, and delay. This paper will help to provide a better understanding of current authentication, authorization, and secure integration issues in the smart grid network and directions to create interest among researchers to further explore these promising areas.

  9. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

    Science.gov (United States)

    Huang, Qinlong; Yang, Yixian; Shi, Yuxiang

    2018-02-24

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

  10. Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network

    Directory of Open Access Journals (Sweden)

    Wang Feng

    2017-01-01

    Full Text Available With the continuous development of wireless networks, the amount of privacy services in heterogeneous mobile networks is increasing, such as information storage, user access, and so on. Access control security issues for heterogeneous mobile radio network, this paper proposes a dynamic migration access control technology based on heterogeneous network. Through the system architecture of the mutual trust system, we can understand the real-time mobile node failure or abnormal state. To make the service can be terminated for the node. And adopt the 802.1X authentication way to improve the security of the system. Finally, it by combining the actual running test data, the trust update algorithm of the system is optimized to reduce the actual security threats in the environment. Experiments show that the system’s anti-attack, the success rate of access, bit error rate is in line with the expected results. This system can effectively reduce the system authentication information is illegally obtained after the network security protection mechanism failure and reduce the risk of user data leakage.

  11. A Generic Role Based Access Control Model for Wind Power Systems

    DEFF Research Database (Denmark)

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    energy sources, such as wind turbines, solar energy or wave energy. This introduces important new security challenges that are not adequately addressed by existing approaches to security in the electrical power distribution infrastructure. In this paper we examine some of the security challenges that may...... arise in the emerging energy distribution infrastructure. In particular, we examine the security problems that arise in the area of wind power communication infrastructures based on the IEC 61400-25 and IEC 62351 standards. These standards define ways of representing elements of the wind power...... infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...

  12. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  13. An internet of things example: classrooms access control over near field communication.

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  14. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  15. A threat intelligence framework for access control security in the oil industry

    Science.gov (United States)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  16. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Directory of Open Access Journals (Sweden)

    Daniel Palma

    2014-04-01

    Full Text Available The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  17. Different Methods to Analyse the Results of a Randomized Controlled Trial with More Than One Follow-Up Measurement

    NARCIS (Netherlands)

    Twisk, J.; van Montfoort, K.; Oud, J.; Ghidey, W.

    2014-01-01

    In this chapter, an overview is given of different methods to analyse data from a randomised controlled trial (RCT) with more than one follow-up measurement. For a continuous outcome variable, a classical GLM for repeated measurements can be used to analyse the difference in development over time

  18. 78 FR 63479 - Meta-Analyses of Randomized Controlled Clinical Trials (RCTs) for the Evaluation of Risk To...

    Science.gov (United States)

    2013-10-24

    ... and assessment of meta-analyses of randomized controlled clinical trials (RCTs) to evaluate safety risks associated with the use of human drugs or biological products within the framework of regulatory...-analyses of randomized trials as a tool for safety assessment in the regulation of pharmaceutical products...

  19. Analyses of aerodynamic characteristics of the oropharynx applying CBCT: obstructive sleep apnea patients versus control subjects.

    Science.gov (United States)

    Chen, Hui; Li, Yingguang; Reiber, Johan Hc; de Lange, Jan; Tu, Shengxian; van der Stelt, Paul; Lobbezoo, Frank; Aarab, Ghizlane

    2018-02-01

    To determine the most relevant aerodynamic characteristic of the oropharynx related to the collapse of the upper airway in obstructive sleep apnea (OSA) patients; and to determine the correlation between the most relevant aerodynamic characteristic(s) of the oropharynx and anatomical characteristics of the oropharynx in OSA patients. 31 mild to moderate OSA patients (mean ± SD age = 43.5 ± 9.7 years) and 13 control subjects (mean ± SD age = 48.5 ± 16.2 years) were included in this prospective study. The diagnosis of OSA patients was based on an overnight polysomnographic recording. To exclude the presence of OSA in the control subjects, they were asked to fill out a validated questionnaire to determine the risk of OSA. NewTom5G cone beam CT (CBCT) scans were obtained from both OSA patients and control subjects. Computational models of the oropharynx were reconstructed based on CBCT images. The aerodynamic characteristics of the oropharynx were calculated based on these computational models. Pearson correlation analysis was used to analyse the correlation between the most relevant aerodynamic characteristic(s) and anatomical characteristics of the oropharynx in OSA patients. Compared with controls, the airway resistance during expiration (R ex ) of the OSA patients was significantly higher (p = 0.04). There was a significant negative correlation between R ex and the minimum cross-sectional area (CSA min ) of the oropharynx (r = -0.41, p = 0.02), and between R ex and the volume of the oropharynx (r = -0.48, p = 0.01) in OSA patients. After excluding an outlier, there is only significant correlation between R ex and the CSA min of the oropharynx (r = -0.45, p = 0.01). Within the limitations of this study, we concluded that the most relevant aerodynamic characteristic of the oropharynx in the collapse of the upper airway in OSA patients is R ex . Therefore, the repetitive collapse of the upper airway in OSA patients may be explained by a high R ex , which is

  20. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

    OpenAIRE

    Mikel Uriarte Itzazelaia; Jasone Astorga; Eduardo Jacob; Maider Huarte; Pedro Romaña

    2018-01-01

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control model...

  1. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    OpenAIRE

    Bögel, K.; Joshi, D. D.

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessib...

  2. IAACaaS: IoT Application-Scoped Access Control as a Service

    Directory of Open Access Journals (Sweden)

    Álvaro Alonso

    2017-10-01

    Full Text Available access control is a key element when guaranteeing the security of online services. However, devices that make the Internet of Things have some special requirements that foster new approaches to access control mechanisms. Their low computing capabilities impose limitations that make traditional paradigms not directly applicable to sensors and actuators. In this paper, we propose a dynamic, scalable, IoT-ready model that is based on the OAuth 2.0 protocol and that allows the complete delegation of authorization, so that an as a service access control mechanism is provided. Multiple tenants are also supported by means of application-scoped authorization policies, whose roles and permissions are fine-grained enough to provide the desired flexibility of configuration. Besides, OAuth 2.0 ensures interoperability with the rest of the Internet, yet preserving the computing constraints of IoT devices, because its tokens provide all the necessary information to perform authorization. The proposed model has been fully implemented in an open-source solution and also deeply validated in the scope of FIWARE, a European project with thousands of users, the goal of which is to provide a framework for developing smart applications and services for the future Internet. We provide the details of the deployed infrastructure and offer the analysis of a sample smart city setup that takes advantage of the model. We conclude that the proposed solution enables a new access control as a service paradigm that satisfies the special requirements of IoT devices in terms of performance, scalability and interoperability.

  3. Embedded LLRF controller with channel access on MicroTCA back-plane interconnect

    International Nuclear Information System (INIS)

    Furukawa, K.; Akai, K.; Akiyama, A.; Kobayashi, T.; Michizono, S.; Miura, T.; Nakanishi, K.; Odagiri, J.; Deguchi, H.; Hayashi, K.; Ryoshi, M.

    2012-01-01

    A low-level RF controller has been developed for the accelerator controls for SuperKEKB, Super-conducting RF Test facility (STF) and Compact-ERL (cERL) at KEK. The feedback mechanism will be performed on Virtex-5 FPGA with 16-bit ADCs and DACs. The card was designed in the form-factor of an advanced mezzanine card (AMC) for a MicroTCA shelf. An embedded EPICS IOC on the Power-PC core in FPGA will provide the global controls through channel access (CA) protocol on the back-plane interconnect of the shelf. No other mechanisms are required for the external linkages. CA is exclusively employed in order not only to make the AMC cards to communicate with each other, but also to communicate with central controls and with an embedded IOC on a Linux-based PLC for slow controls. (authors)

  4. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ...: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Access to Toxic Substances Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal...

  5. Design of Novel Online Access and Control Interface for Remote Experiment on DC Drives

    Directory of Open Access Journals (Sweden)

    Jagadeesh Chandra A.P

    2009-05-01

    Full Text Available Internet has revolutionized the way in which the information is delivered. Laboratory based courses play an important role in technical education. Automation is changing the nature of these laboratories and the system designer’s focus on Internet accessed experiments owing to the availability of several tools to integrate electronic and mechanical hardware with the World Wide Web. Stand-alone approaches in remote learning have grown tremendously in the recent years. One of the important components in remote experimentation is the integration of Virtual Instruments to perform real hardware tasks in near real-time. The paper describes a web interface to the electrical hardware and integration of LabVIEW Virtual Instruments to the remote access and control of DC Drives. Customized electrical hardware serves as the web interface, supporting various features to remotely control and measure the parameters of the electrical machine. Novel techniques have been used to interface a low power data acquisition system with the DC machine driven by the AC power supply. The system uses the client-server architecture to access the web page of the Virtual Instruments through web browser. The developed system imitates the real control of experiment hardware, but being operated remotely through Internet.

  6. Analyse des sous-performances energetiques d'eoliennes en utilisant des cartes de controle EWMA =

    Science.gov (United States)

    Lepvrier, Romain

    L'exploitation de l'energie eolienne est en forte croissance depuis plus de deux decennies. Beaucoup de centrales eoliennes ont ete construites durant cette periode. La tendance aujourd'hui est de surveiller les centrales eoliennes existantes pour obtenir la meilleure performance possible en assurant des conditions d'exploitation optimales et une grande disponibilite de l'equipement. Les recentes avancees technologiques n'ayant pas pu etre implantees a l'epoque ou ces centrales ont ete construites, par consequent, il faut trouver des outils d'analyses pour detecter, le plus precocement possible, les sous-performances des eoliennes et d'anticiper la correction les problemes d'une maniere preventive. En premiere partie, ce memoire presente la construction des courbes de puissance de reference pour un fonctionnement normal des machines. De l'obtention des donnees, provenant directement des eoliennes in-situ, a la courbe de puissance finale permettant l'eventuelle detection de sous-performances d'une maniere robuste et commode, tout le processus est decrit etape par etape. Dans une deuxieme partie, une carte de controle EWMA a ete developpee. A l'aide d'une methode graphique suivie d'un algorithme, elle permet de detecter les faibles sousperformances graduelles qui surviennent au cours du temps sur une eolienne. Il a ete montre que la carte developpee est capable de detecter un niveau de baisse de performance de 1 % par rapport a la performance normale de l'eolienne.

  7. Operational, control and protective system transient analyses of the closed-cycle GT-HTGR power plant

    International Nuclear Information System (INIS)

    Openshaw, F.L.; Chan, T.W.

    1980-07-01

    This paper presents a description of the analyses of the control/protective system preliminary designs for the gas turbine high-temperature gas-cooled reactor (GT-HTGR) power plant. The control system is designed to regulate reactor power, control electric load and turbine speed, control the temperature of the helium delivered to the turbines, and control thermal transients experienced by the system components. In addition, it provides the required control programming for startup, shutdown, load ramp, and other expected operations. The control system also handles conditions imposed on the system during upset and emergency conditions such as loop trip, reactor trip, or electrical load rejection

  8. Ore controls in the Charters Towers goldfield, NE Australia: Constraints from geological, geophysical and numerical analyses

    Science.gov (United States)

    Kreuzer, O.P.; Blenkinsop, T.G.; Morrison, R.J.; Peters, S.G.

    2007-01-01

    The approach taken in this paper, namely synthesising a wealth of previous information with new data and a genetic model, in combination with integrated numerical analyses, led to new insights into the geological controls on the localisation of auriferous veins and residual prospectivity of the Charters Towers goldfield, NE Australia. The method also has implications for the assessment of other "mature" goldfields worldwide. Despite a number of different ore controls having operated within the Charters Towers goldfield, the controlling factors can be linked to a single genetic model for orogenic, granitoid-hosted lode-gold mineralisation in a brittle deformation regime (D4) of NE-SW to NNE-SSW shortening, under conditions of supralithostatic fluid pressure and low stress difference. Spatial autocorrelation results suggest district-scale alignment of the auriferous veins parallel to and overlapping with the ESE-WNW- to E-W-striking Charters Towers-Ravenswood lineament, a major crustal boundary in the basement to the Ravenswood batholith. At the camp-scale, auriferous veins have abundance and proximity relationships with NW-SE-, NNW-SSE-, NE-SW- and ENE-WSW-oriented lineaments, suggesting that structures that controlled gold deposition in one camp did not necessarily control mineralisation in other camps. Fractal dimensions obtained with the box-counting method range from 1.02 to 1.10, whereas veins in the Charters Towers City camp are characterised by a significantly higher fractal dimension of 1.28. This discrepancy may be taken to imply that most or all outcropping and near-surface deposits within the Charters Towers City camp have been found and that new discoveries are more likely to occur at greater levels of depth, or outside the boundaries of this camp. The new understanding has implications for the assessment of the residual prospectivity of the Charters Towers goldfield, where large areas of prospective rock types and structures (e.g., approximately 40% of

  9. Development of the exposure and access control dosimeter system for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Si Young; Lee, B. J.; Kim, B. H.; Kim, J. S.; Lee, K. C.; Kang, B. H.; Kim, C. K.; Ham, C. S.; Kwon, K. C.; Park, W. M.; Kim, C. H.; Kim, J. T.; Koo, C. H.; Park, S. J.; Kim, T. W

    1999-12-01

    In this paper an electronic personal dosimeter(EPD) adopt in a PIN type silicon semiconductor as a radiation detector has been developed, designed and a prototype dosimeter has been manufactured. A series of performance test of this EPD on reference radiation field has been carried out. A dosimeter reader which reads the radiation dose from EPD and make a real time access control in connection with the entrance door to radiation controlled area has been developed, designed and manufactured. S/W program supporting hangul (Korean language) has been developed to operate the EPD and reader system with a personal computer. (author)

  10. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    Science.gov (United States)

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  11. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    Science.gov (United States)

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  12. Biomedical Big Data: New Models of Control Over Access, Use and Governance.

    Science.gov (United States)

    Vayena, Effy; Blasimme, Alessandro

    2017-12-01

    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can be openly stated in informed consent documents or be implicit in the norms of confidentiality that govern the relationships of patients and healthcare professionals. However, with medicine becoming a data-intense enterprise, informed consent and medical confidentiality, as mechanisms of control, are put under pressure. In this paper we explore emerging models of informational control in data-intense healthcare and clinical research, which can compensate for the limitations of currently available instruments. More specifically, we discuss three approaches that hold promise in increasing individual control: the emergence of data portability rights as means to control data access, new mechanisms of informed consent as tools to control data use, and finally, new participatory governance schemes that allow individuals to control their data through direct involvement in data governance. We conclude by suggesting that, despite the impression that biomedical big data diminish individual control, the synergistic effect of new data management models can in fact improve it.

  13. Adolescent suicide and household access to firearms in Colorado: results of a case-control study.

    Science.gov (United States)

    Shah, S; Hoffman, R E; Wake, L; Marine, W M

    2000-03-01

    To determine whether, compared with age- and sex-matched controls who did not commit suicide, adolescents who committed suicide by firearms were more likely to have had household access to firearms (after adjusting for significant risk factors for adolescent suicide). A case-control study design was used; case subjects were Colorado adolescents who committed suicide between 1991 and 1993; controls were sex- and age-matched adolescents who were randomly selected from the same school the subjects had attended. Interviews were conducted with the parent or guardian of cases and controls. Of the 36 case subjects in this study, 67% committed suicide using a gun obtained from their home. Adolescent suicide victims who committed suicide by firearms were significantly more likely to have a firearm in their home (72%) than age- and sex-matched community controls (50%), after adjusting for significant risk factors. Conduct disorder and previous mental health treatment were also found to be independent risk factors for adolescent firearm suicide. Two types of public health interventions to prevent adolescent firearm suicides are likely to be successful: (a) limiting household access to firearms, and (b) identifying adolescents at high risk of firearm suicide.

  14. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow.

    Science.gov (United States)

    Le, Xuan Hung; Doll, Terry; Barbosu, Monica; Luque, Amneris; Wang, Dongwen

    2012-12-01

    Although information access control models have been developed and applied to various applications, few of the previous works have addressed the issue of managing information access in the combined context of team collaboration and workflow. To facilitate this requirement, we have enhanced the Role-Based Access Control (RBAC) model through formulating universal constraints, defining bridging entities and contributing attributes, extending access permissions to include workflow contexts, synthesizing a role-based access delegation model to target on specific objects, and developing domain ontologies as instantiations of the general model to particular applications. We have successfully applied this model to the New York State HIV Clinical Education Initiative (CEI) project to address the specific needs of information management in collaborative processes. An initial evaluation has shown this model achieved a high level of agreement with an existing system when applied to 4576 cases (kappa=0.801). Comparing to a reference standard, the sensitivity and specificity of the enhanced RBAC model were at the level of 97-100%. These results indicate that the enhanced RBAC model can be effectively used for information access management in context of team collaboration and workflow to coordinate clinical education programs. Future research is required to incrementally develop additional types of universal constraints, to further investigate how the workflow context and access delegation can be enriched to support the various needs on information access management in collaborative processes, and to examine the generalizability of the enhanced RBAC model for other applications in clinical education, biomedical research, and patient care. Copyright © 2012 Elsevier Inc. All rights reserved.

  15. IMPROVING CONTROL ROOM DESIGN AND OPERATIONS BASED ON HUMAN FACTORS ANALYSES OR HOW MUCH HUMAN FACTORS UPGRADE IS ENOUGH ?

    Energy Technology Data Exchange (ETDEWEB)

    HIGGINS,J.C.; OHARA,J.M.; ALMEIDA,P.

    2002-09-19

    THE JOSE CABRERA NUCLEAR POWER PLANT IS A ONE LOOP WESTINGHOUSE PRESSURIZED WATER REACTOR. IN THE CONTROL ROOM, THE DISPLAYS AND CONTROLS USED BY OPERATORS FOR THE EMERGENCY OPERATING PROCEDURES ARE DISTRIBUTED ON FRONT AND BACK PANELS. THIS CONFIGURATION CONTRIBUTED TO RISK IN THE PROBABILISTIC SAFETY ASSESSMENT WHERE IMPORTANT OPERATOR ACTIONS ARE REQUIRED. THIS STUDY WAS UNDERTAKEN TO EVALUATE THE IMPACT OF THE DESIGN ON CREW PERFORMANCE AND PLANT SAFETY AND TO DEVELOP DESIGN IMPROVEMENTS.FIVE POTENTIAL EFFECTS WERE IDENTIFIED. THEN NUREG-0711 [1], PROGRAMMATIC, HUMAN FACTORS, ANALYSES WERE CONDUCTED TO SYSTEMATICALLY EVALUATE THE CR-LA YOUT TO DETERMINE IF THERE WAS EVIDENCE OF THE POTENTIAL EFFECTS. THESE ANALYSES INCLUDED OPERATING EXPERIENCE REVIEW, PSA REVIEW, TASK ANALYSES, AND WALKTHROUGH SIMULATIONS. BASED ON THE RESULTS OF THESE ANALYSES, A VARIETY OF CONTROL ROOM MODIFICATIONS WERE IDENTIFIED. FROM THE ALTERNATIVES, A SELECTION WAS MADE THAT PROVIDED A REASONABLEBALANCE BE TWEEN PERFORMANCE, RISK AND ECONOMICS, AND MODIFICATIONS WERE MADE TO THE PLANT.

  16. An interaction-based access control model (IBAC) for collaborative services

    Energy Technology Data Exchange (ETDEWEB)

    Altunay, Mine; /Fermilab; Byrd, Gregory T.; Brown, Doug E.; Dean, Ralph A.; /North Carolina State U.

    2008-04-01

    A collaboration is a collection of services that work together to achieve a common goal. Although collaborations help when tackling difficult problems, they lead to security issues. First, a collaboration is often performed by services that are drawn from different security domains. Second, a service interacts with multiple peer services during the collaboration. These interactions are not isolated from one another--e.g., data may flow through a sequence of different services. As a result, a service is exposed to multiple peer services in varying degrees, leading to different security threats. We identify the types of interactions that can be present in collaborations, and discuss the security threats due to each type. We propose a model for representing the collaboration context so that a service can be made aware of the existing interactions. We provide an access control model for a service participating in a collaboration. We couple our access control model with a policy model, so that the access requirements from collaborations can be expressed and evaluated.

  17. The equipment access software for a distributed UNIX-based accelerator control system

    International Nuclear Information System (INIS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Herve

    1994-01-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain. ((orig.))

  18. Frequency-selective design of wireless power transfer systems for controlled access applications

    Science.gov (United States)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  19. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

  20. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments

    Directory of Open Access Journals (Sweden)

    Olusegun Folorunso

    2015-07-01

    Full Text Available Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the quality of its computation. In this paper, a combination of Trust-Based Access Control (TBAC strategy and fuzzy-expert systems was used to enhance the quality of human computation in crowdsourcing environment. A TBAC-fuzzy algorithm was developed and implemented using MATLAB 7.6.0 to compute trust value (Tvalue, priority value as evaluated by fuzzy inference system (FIS and finally generate access decision to each crowd-worker. In conclusion, the use of TBAC is feasible in improving quality of human computation in crowdsourcing environments.

  1. On the designing of a tamper resistant prescription RFID access control system.

    Science.gov (United States)

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2012-12-01

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

  2. Design of a control system for self-shielded irradiators with remote access capability

    International Nuclear Information System (INIS)

    Iyengar, R.D.; Verma, P.B.; Prasad, V.V.S.S.; George, Jain R.; Das, Tripti; Deshmukh, D.K.

    2001-01-01

    With self-shielded irradiators like Gamma chambers, and Blood irradiators are being sold by BRIT to customers both within and outside the country, it has become necessary to improve the quality of service without increasing the overheads. The recent advances in the field of communications and information technology can be exploited for improving the quality of service to the customers. A state of the art control system with remote accessibility has been designed for these irradiators enhancing their performance. This will provide an easy access to these units wherever they might be located, through the Internet. With this technology it will now be possible to attend to the needs of the customers, as regards fault rectification, error debugging, system software update, performance testing, data acquisition etc. This will not only reduce the downtime of these irradiators but also reduce the overheads. (author)

  3. Human Rights and Drug Control : Access to Controlled Essential Medicines in Resource-Constrained Countries

    NARCIS (Netherlands)

    Gispen, M.E.C.

    2017-01-01

    Millions of people worldwide suffer a range of health and socio-economic related problems because of inadequate availability and use of controlled essential medicines like morphine and codeine for pain treatment. As a result, millions of people, often living in lesser-advanced conditions, suffer in

  4. Minor access control of Hong Kong under the Framework Convention on Tobacco Control.

    Science.gov (United States)

    Kan, Ming-yue; Lau, Maggie

    2010-05-01

    Asia's tobacco control movement was strengthened owing to the need to fulfill the Framework Convention on Tobacco Control (FCTC). The present study aims to assess the compliance rates of tobacco retailers to the law forbidding the sales of tobacco to minors in Hong Kong before and after the growth of the tobacco control movement brought by the enactment of the newly amended tobacco control law with effect from 2007. The legislation was enacted to fulfill the FCTC. Two waves of territory-wide compliance checks conducted in 2006 and 2008 were compared. The compliance check was conducted using Standard Protocol. The overall compliance rate was still low though it increased from 18.9% in 2006 to 27.0% in 2008. The compliance rate of convenience stores and newspaper stands improved whereas the rate for restaurants, grocery stores and petrol stations worsened. Less tobacco retailing outlets displayed a specified warning sign required in 2008 (33.7%) comparing to 2006 (41.4%). The indoor smoking ban of the FCTC unintentionally changed the cigarette retailing landscape and finally improved the compliance rate. The case study also demonstrated that the Asia region still has much room for improvement in fulfilling the FCTC in term of effective implementation and enforcement. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  5. Integrating end-user feedback in the concept stage of development of a novel sensor access system for environmental control.

    Science.gov (United States)

    Fager, Susan Koch; Sorenson, Tabatha; Butte, Susanne; Nelson, Alexander; Banerjee, Nilanjan; Robucci, Ryan

    2018-05-01

    This article illustrates user-centred design of a novel sensor access system for environmental control in the concept stage of development. Focus groups of individuals with disabilities and rehabilitation healthcare professionals were provided with video illustration of the technology and asked to provide quantitative and qualitative feedback through a semistructured interview process. Qualitative methods were employed to analyse transcribed comments to develop themes supporting ongoing development of the technology. Both end-user streams rated the original design features of the sensor access system (alternative interface to assistive technologies, having wireless capabilities and not requiring batteries) as having high potential value. Both groups identified a need for the future design of the sensor technology to be able to capture minimal/reduced movements for those with severe physical impairments. Themes included (1) the sensor technology could be individualized/customized to accommodate the user, (2) minimal positioning and set-up requirement and (3) technology that alleviated problems encountered with touch-based solutions. Inclusion of end-user feedback provided the research team with valuable information that supported the initial conceptualization of the design features of the technology and provided valuable data to support development of a new prototype that can capture more reduced/minimal movements. Implication for Rehabilitation User-centered design of assistive technology is essential to the development of technology that can meet the unique needs of those with the most severe physical impairments. New sensor technology may alleviate some of the access challenges faced by individuals with severe physical impairments. Collaboration between all key stakeholders (individuals with disabilities, rehabilitation professionals, researchers, and developers) is an essential component in the iterative assistive technology design process.

  6. DoD Needs to Improve Screening and Access Controls for General Public Tenants Leasing Housing on Military Installations (REDACTED)

    Science.gov (United States)

    2016-04-01

    DEPARTMENT OF THE ARMY SUBJECT: DoD Needs to Improve Screening and Access Controls for General Public Tenants Leasing Housing on Military...public tenants who leased DoD privatized housing before granting those tenants unescorted access to military installations. In addition, DoD officials...issued access badges to general public tenants with expiration dates that exceeded the tenants’ lease terms. As a result, DoD assumed a higher and

  7. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  8. Hybrid Solution for Privacy-Preserving Access Control for Healthcare Data

    Directory of Open Access Journals (Sweden)

    SMITHAMOL, M. B.

    2017-05-01

    Full Text Available The booming in cloud and IoT technologies has accelerated the growth of healthcare system. The IoT devices monitor the patient's health, and upload collected data as Electronic Medical Records (EMRs to the cloud for storage and sharing. Outsourcing EMRs to the cloud introduce new security and privacy challenges. In this paper, we proposed a novel architecture ensuring security and privacy for the outsourced health records. The proposed model uses partially ordered set (POSET for constructing the group based access structure and Ciphertext-Policy Attribute-Based Encryption (CP-ABE to provide fine-grained EMR access control. The modified group based CP-ABE (G-CP-ABE minimizes the computational overhead by reducing the number of leaf nodes in the access tree. Also, the proposed G-CP-ABE framework merges symmetric encryption and CP-ABE scheme to minimize the overall encryption time. As a result, G-CP-ABE can be used to monitor health conditions even from a resource constrained IoT device. The performance analysis shows the efficiency of the proposed model, making it suitable for practical use.

  9. A Model-driven Role-based Access Control for SQL Databases

    Directory of Open Access Journals (Sweden)

    Raimundas Matulevičius

    2015-07-01

    Full Text Available Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC, which restricts system access to authorised users. While the benefits of RBAC are widely acknowledged, the implementation and administration of RBAC policies remains a human intensive activity, typically postponed until the implementation and maintenance phases of system development. This deferred security engineering approach makes it difficult for security requirements to be accurately captured and for the system’s implementation to be kept aligned with these requirements as the system evolves. In this paper we propose a model-driven approach to manage SQL database access under the RBAC paradigm. The starting point of the approach is an RBAC model captured in SecureUML. This model is automatically translated to Oracle Database views and instead-of triggers code, which implements the security constraints. The approach has been fully instrumented as a prototype and its effectiveness has been validated by means of a case study.

  10. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey.

    Science.gov (United States)

    Zareei, Mahdi; Islam, A K M Muzahidul; Baharun, Sabariah; Vargas-Rosales, Cesar; Azpilicueta, Leyre; Mansoor, Nafees

    2017-09-16

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  11. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  12. A High Throughput Medium Access Control Implementation Based on IEEE 802.11e Standard

    Science.gov (United States)

    Huang, Min Li; Lee, Jin; Setiawan, Hendra; Ochi, Hiroshi; Park, Sin-Chong

    With the growing demand for high-performance multimedia applications over wireless channels, we need to develop a Medium Access Control (MAC) system that supports high throughput and quality of service enhancements. This paper presents the standard analysis, design architecture and design issues leading to the implementation of an IEEE 802.11e based MAC system that supports MAC throughput of over 100Mbps. In order to meet the MAC layer timing constraints, a hardware/software co-design approach is adopted. The proposed MAC architecture is implemented on the Xilinx Virtex-II Pro Field-Programmable Gate Array (FPGA) (XC2VP70-5FF1704C) prototype, and connected to a host computer through an external Universal Serial Bus (USB) interface. The total FPGA resource utilization is 11, 508 out of 33, 088 (34%) available slices. The measured MAC throughput is 100.7Mbps and 109.2Mbps for voice and video access categories, transmitted at a data rate of 260Mbps based on IEEE 802.11n Physical Layer (PHY), using the contention-based hybrid coordination function channel access mechanism.

  13. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...... such paradigm, the receiver is the one in charge of starting a direct communication with an eligible sender. This allows for new useful properties to be satisfied, novel schemes to be introduced and new challenges to be tackled. In this paper, we present a survey comprising of all the MAC protocols released...

  14. Automatic Access Control Based on Face and Hand Biometrics in A Non-Cooperative Context

    DEFF Research Database (Denmark)

    Jahromi, Mohammad Naser Sabet; Bonderup, Morten Bojesen; Nasrollahi, Kamal

    2018-01-01

    Automatic access control systems (ACS) based on the human biometrics or physical tokens are widely employed in public and private areas. Yet these systems, in their conventional forms, are restricted to active interaction from the users. In scenarios where users are not cooperating with the system......, these systems are challenged. Failure in cooperation with the biometric systems might be intentional or because the users are incapable of handling the interaction procedure with the biometric system or simply forget to cooperate with it, due to for example, illness like dementia. This work introduces...

  15. Sub-Network Access Control Technology Demonstrator: Software Design of the Network Management System

    Science.gov (United States)

    2002-08-01

    dabut du projet pour le contr6le et la supervision de la performance de ces cartes ne permettaient pas d’en obtenir ais~ment une vue d’ensemble. Ceux...besoins sp~cifiques, la conception d’un outil de gestion de r~seaux informatiques est propos6e et sa mise en oeuvre entreprise dans un prototype. Les...Defence Research and Recherche et ddveloppement Development Canada pour la defense Canada DEFENCE • I7 DEFENSE Sub-Network Access Control

  16. Gain transient control for wavelength division multiplexed access networks using semiconductor optical amplifiers

    DEFF Research Database (Denmark)

    Gibbon, Timothy Braidwood; Osadchiy, Alexey Vladimirovich; Kjær, Rasmus

    2009-01-01

    measurements how a near-saturated semiconductor optical amplifier (SOA) can be used to control these gain transients. An SOA is shown to reduce the penalty of transients originating in an EDFA from 2.3 dB to 0.2 dB for 10 Gb/s transmission over standard single mode fiber using a 231-1 PRBS pattern. The results...... suggest that a single SOA integrated within a WDM receiver at the metro node could offer a convenient all-optical solution for upstream transient controlin WDM access networks....

  17. Socio-economic status influences blood pressure control despite equal access to care

    DEFF Research Database (Denmark)

    Paulsen, M S; Andersen, M; Munck, A P

    2012-01-01

    OBJECTIVE: Denmark has a health care system with free and equal access to care irrespective of age and socio-economic status (SES). We conducted a cross-sectional study to investigate a possible association between SES and blood pressure (BP) control of hypertensive patients treated in general...... practice. METHODS: We enrolled 184 general practices and 5260 hypertensive patients. The general practitioners reported information about BP and diagnosis of diabetes. Information about education, income, antihypertensive drug treatment and other co-morbidity was retrieved from relevant registers from...

  18. A Flexible Component based Access Control Architecture for OPeNDAP Services

    Science.gov (United States)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC

  19. Increasing access to care for sick newborns: evidence from the Ghana Newhints cluster-randomised controlled trial

    NARCIS (Netherlands)

    Manu, Alexander; Hill, Zelee; ten Asbroek, Augustinus Ha; Soremekun, Seyi; Weobong, Benedict; Gyan, Thomas; Tawiah-Agyemang, Charlotte; Danso, Samuel; Amenga-Etego, Seeba; Owusu-Agyei, Seth; Kirkwood, Betty R.

    2016-01-01

    To evaluate the impact of Newhints community-based surveillance volunteer (CBSV) assessments and referrals on access to care for sick newborns and on existing inequities in access. We evaluated a prospective cohort nested within the Newhints cluster-randomised controlled trial. Community-based

  20. Cerberus, an Access Control Scheme for Enforcing Least Privilege in Patient Cohort Study Platforms : A Comprehensive Access Control Scheme Applied to the GENIDA Project - Study of Genetic Forms of Intellectual Disabilities and Autism Spectrum Disorders.

    Science.gov (United States)

    Parrend, Pierre; Mazzucotelli, Timothée; Colin, Florent; Collet, Pierre; Mandel, Jean-Louis

    2017-11-16

    Cohort Study Platforms (CSP) are emerging as a key tool for collecting patient information, providing new research data, and supporting family and patient associations. However they pose new ethics and regulatory challenges since they cross the gap between patients and medical practitioners. One of the critical issues for CSP is to enforce a strict control on access privileges whilst allowing the users to take advantage of the breadth of the available data. We propose Cerberus, a new access control scheme spanning the whole life-cycle of access right management: design, implementation, deployment and maintenance, operations. Cerberus enables switching from a dual world, where CSP data can be accessed either from the users who entered it or fully de-identified, to an access-when-required world, where patients, practitioners and researchers can access focused medical data through explicit authorisation by the data owner. Efficient access control requires application-specific access rights, as well as the ability to restrict these rights when they are not used. Cerberus is implemented and evaluated in the context of the GENIDA project, an international CSP for Genetically determined Intellectual Disabilities and Autism Spectrum Disorders. As a result of this study, the software is made available for the community, and validated specifications for CSPs are given.

  1. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  2. Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-06-01

    Full Text Available At the center of core technologies for a future cyber world, such as Internet of Things (IoT or big data, is a context-rich system that offers services by using situational information. The field where context-rich systems were first introduced is near-field communication (NFC-based electronic payments. Near-field Communication (NFC integrated payment services collect the payment information of the credit card and the location information to generate patterns in the user’s consumption or movement through big data technology. Based on such pattern information, tailored services, such as advertisement, are offered to users. However, there is difficulty in controlling access to personal information, as there is a collaborative relationship focused on the trusted service manager (TSM that is close knit to shared personal information. Moreover, in the case of Hadoop, among the many big data analytical technologies, it offers access control functions, but not a way to authorize the processing of personal information, making it impossible to grant authority between service providers to process information. As such, this paper proposes a key generation and distribution method, as well as a secure communication protocol. The analysis has shown that the efficiency was greater for security and performance compared to relation works.

  3. Distributed Fair Auto Rate Medium Access Control for IEEE 802.11 Based WLANs

    Science.gov (United States)

    Zhu, Yanfeng; Niu, Zhisheng

    Much research has shown that a carefully designed auto rate medium access control can utilize the underlying physical multi-rate capability to exploit the time-variation of the channel. In this paper, we develop a simple analytical model to elucidate the rule that maximizes the throughput of RTS/CTS based multi-rate wireless local area networks. Based on the discovered rule, we propose two distributed fair auto rate medium access control schemes called FARM and FARM+ from the view-point of throughput fairness and time-share fairness, respectively. With the proposed schemes, after receiving a RTS frame, the receiver selectively returns the CTS frame to inform the transmitter the maximum feasible rate probed by the signal-to-noise ratio of the received RTS frame. The key feature of the proposed schemes is that they are capable of maintaining throughput/time-share fairness in asymmetric situation where the distribution of SNR varies with stations. Extensive simulation results show that the proposed schemes outperform the existing throughput/time-share fair auto rate schemes in time-varying channel conditions.

  4. Improved efficiency access control equipment and explosive, weapons and drug abuse detection

    Energy Technology Data Exchange (ETDEWEB)

    Jenkins, A.; Milford, A.; Woollven, J.

    1985-01-01

    The second generation portal explosives detector has been designed with increased detection capability and convenience in service. The method of detection and performance relative to the first generation is described. A novel method of auto-calibration and self diagnosis is described and results are discussed. Improvements in convenience of operation have been achieved and operating space and costs reduced by combining metal detection capability, together with explosives detection. This allows both alarm signal and diagnostic outputs to be combined on a single remote panel in the guard room, and reduces the number of guards needed to man the access control. This type of access control is entirely a defensive measure against attack but a further additional feature is proposed which will also check the state of mind of all personnel passing through the check point. Any person suffering from the effect of narcotic or alcohol will be detected by their inability to reproduce their normal signature. A new method of signature analysis in five dimensions is described together with proposals for integrating the check without increasing the time in the test area. Some recent results on the effects of alcohol on signature reproduction is given.

  5. CONTEXT BASED ANDROID APPLICATIONADMINISTRATIVE ACCESS CONTROL (CBAA–AAC FOR SMART PHONES

    Directory of Open Access Journals (Sweden)

    S. Sharavanan

    2016-07-01

    Full Text Available Android applications in smart phones are generally towards provide greater flexibility and convince for users. Considering the fact that the Android applications are having privilege to access data and resources in mobile after it gets installed (one time permission provided by end user on the time installation, these application may also lead to issues in security for the user data as well as issues relate smart phone with peripheral environment. A practical example for an issue which relates smart phone with peripheral environment can be even an Android smart phone application of a college student use camera resource to capture photos of R&D cell and transfer without user or organization permission. The security of the organization and user should be prevented by providing an adoptable solution. The proposed concept of CBAA-AAC (Context Based Android Application Administrative Access Control is used to control the privileges of any Android application over a corresponding longitude and latitude by the organization administrator. In this way, administrator is able to block malicious application of every individual smart phone which can have activity towards utilizing services and resources that may affect the security of the organization, such an move is must for assuring security of any organization and educational institutions while they allow users to “bring their own smart phones/mobile devices” into the campus.

  6. The Arabidopsis SWI/SNF protein BAF60 mediates seedling growth control by modulating DNA accessibility

    KAUST Repository

    Jégu, Teddy

    2017-06-15

    Plant adaptive responses to changing environments involve complex molecular interplays between intrinsic and external signals. Whilst much is known on the signaling components mediating diurnal, light, and temperature controls on plant development, their influence on chromatin-based transcriptional controls remains poorly explored.In this study we show that a SWI/SNF chromatin remodeler subunit, BAF60, represses seedling growth by modulating DNA accessibility of hypocotyl cell size regulatory genes. BAF60 binds nucleosome-free regions of multiple G box-containing genes, opposing in cis the promoting effect of the photomorphogenic and thermomorphogenic regulator Phytochrome Interacting Factor 4 (PIF4) on hypocotyl elongation. Furthermore, BAF60 expression level is regulated in response to light and daily rhythms.These results unveil a short path between a chromatin remodeler and a signaling component to fine-tune plant morphogenesis in response to environmental conditions.

  7. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N.

    2016-01-01

    This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878

  8. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Meng Yi

    2016-11-01

    Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  9. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  10. Higher pharmaceutical public expenditure after direct price control: improved access or induced demand? The Colombian case.

    Science.gov (United States)

    Prada, Sergio I; Soto, Victoria E; Andia, Tatiana S; Vaca, Claudia P; Morales, Álvaro A; Márquez, Sergio R; Gaviria, Alejandro

    2018-01-01

    High pharmaceutical expenditure is one of the main concerns for policymakers worldwide. In Colombia, a middle-income country, outpatient prescription represents over 10% of total health expenditure in the mandatory benefits package (POS), and close to 90% in the complementary government fund (No POS). In order to control expenditure, since 2011, the Ministry of Health introduced price caps on inpatient drugs reimbursements by active ingredient. By 2013, more than 400 different products, covering 80% of public pharmaceutical expenditure were controlled. This paper investigates the effects of the Colombian policy efforts to control expenditure by controlling prices. Using SISMED data, the official database for prices and quantities sold in the domestic market, we estimate a Laspeyres price index for 90 relevant markets in the period 2011-2015, and, then, we estimate real pharmaceutical expenditure. Results show that, after direct price controls were enacted, price inflation decreased almost - 43%, but real pharmaceutical expenditure almost doubled due mainly to an increase in units sold. Such disproportionate increase in units sold maybe attributable to better access to drugs due to lower prices, and/or to an increase in marketing efforts by the pharmaceutical industry to maintain profits. We conclude that pricing interventions should be implemented along with a strong market monitoring to prevent market distortions such as inappropriate and unnecessary drug use.

  11. Infection control in hemodialysis units: A quick access to essential elements

    Directory of Open Access Journals (Sweden)

    Ayman Karkar

    2014-01-01

    Full Text Available Infection is the most common cause of hospitalization and the second most common cause of mortality among hemodialysis (HD patients, after cardiovascular disease. HD patients as well as the dialysis staff are vulnerable to contracting health-care-associated infections (HAIs due to frequent and prolonged exposure to many possible contaminants in the dialysis environment. The extracorporeal nature of the therapy, the associated common environmental conditions and the immune compromised status of HD patients are major predisposing factors. The evident increased potential for transmission of infections in the HD settings led to the creation and implementation of specific and stricter infection prevention and control measures in addition to the usual standard precautions. Different international organizations have generated guidelines and recommendations on infection prevention and control for implementation in the HD settings. These include the Centers for Disease Control and Prevention (CDC, the Association of Professionals in Infection Control (APIC, the Kidney Disease Outcomes Quality Initiative (K/DOQI, the European Best Practice Guidelines/European Renal Best Practice (EBPG/ERBP and the Kidney Disease: Improving Global Outcomes (KDIGO. However, these guidelines are extensive and sometimes vary among different guideline-producing bodies. Our aim in this review is to facilitate the access, increase the awareness and encourage implementation among dialysis providers by reviewing, extracting and comparing the essential elements of guidelines and recommendations on infection prevention and control in HD units.

  12. A functional approach for research on cognitive control: Analysing cognitive control tasks and their effects in terms of operant conditioning.

    Science.gov (United States)

    Liefooghe, Baptist; De Houwer, Jan

    2016-02-01

    Cognitive control is an important mental ability that is examined using a multitude of cognitive control tasks and effects. The present paper presents the first steps in the elaboration of a functional approach, which aims to uncover the communalities and differences between different cognitive control tasks and their effects. Based on the idea that responses in cognitive control tasks qualify as operant behaviour, we propose to reinterpret cognitive control tasks in terms of operant contingencies and cognitive control effects as instances of moderated stimulus control. We illustrate how our approach can be used to uncover communalities between topographically different cognitive control tasks and can lead to novel questions about the processes underlying cognitive control. © 2015 International Union of Psychological Science.

  13. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...

  14. Internet-accessed sexually transmitted infection (e-STI testing and results service: A randomised, single-blind, controlled trial.

    Directory of Open Access Journals (Sweden)

    Emma Wilson

    2017-12-01

    Full Text Available Internet-accessed sexually transmitted infection testing (e-STI testing is increasingly available as an alternative to testing in clinics. Typically this testing modality enables users to order a test kit from a virtual service (via a website or app, collect their own samples, return test samples to a laboratory, and be notified of their results by short message service (SMS or telephone. e-STI testing is assumed to increase access to testing in comparison with face-to-face services, but the evidence is unclear. We conducted a randomised controlled trial to assess the effectiveness of an e-STI testing and results service (chlamydia, gonorrhoea, HIV, and syphilis on STI testing uptake and STI cases diagnosed.The study took place in the London boroughs of Lambeth and Southwark. Between 24 November 2014 and 31 August 2015, we recruited 2,072 participants, aged 16-30 years, who were resident in these boroughs, had at least 1 sexual partner in the last 12 months, stated willingness to take an STI test, and had access to the internet. Those unable to provide consent and unable to read English were excluded. Participants were randomly allocated to receive 1 text message with the web link of an e-STI testing and results service (intervention group or to receive 1 text message with the web link of a bespoke website listing the locations, contact details, and websites of 7 local sexual health clinics (control group. Participants were free to use any other services or interventions during the study period. The primary outcomes were self-reported STI testing at 6 weeks, verified by patient record checks, and self-reported STI diagnosis at 6 weeks, verified by patient record checks. Secondary outcomes were the proportion of participants prescribed treatment for an STI, time from randomisation to completion of an STI test, and time from randomisation to treatment of an STI. Participants were sent a £10 cash incentive on submission of self-reported data. We

  15. Utilization of Ceramic Inlays for Sealing Implant Prostheses Screw Access Holes: A Case-Control Study.

    Science.gov (United States)

    Mihali, Sorin; Canjau, Silvana; Bratu, Emanuel; Wang, Hom-Lay

    2016-01-01

    The aim of this study was to evaluate, in a case control study, the esthetic and functional clinical performance of ceramic inlays used for covering the screw access hole in single monolithic lithium disilicate full-contour crowns bonded on computer-aided design/computer-aided manufacturing (CAD/CAM) prefabricated titanium abutments in order to eliminate the drawbacks of alternative restorative methods. Twenty-eight patients with missing teeth in the lateral areas (premolars and molars) received screw-retained implant restorations. In half of the restorations (n = 14), composite fillings were used to seal the access hole (control group), while the other half was sealed with ceramic inlays (test group). To determine the restoration occlusal wear, impressions were obtained after the restorations were finalized, at 1 year, and at 2 years follow-up. The casts were scanned with a 3D Scanner Design System recording the anatomical surfaces of the white model replicates. Wear amounts (μm) were calculated as the maximum loss in height of the occlusal surface. The clinical evaluation was carried out using a kit specifically designed for assessing the FDI criteria. Statistics were performed using analysis of variance (ANOVA). A total of 58 restorations were delivered, and after 2 years of follow-up, the wear values were 228.20 ± 54.68 μm for the control group and 65.20 ± 7.24 μm for the ceramic inlay group. One-way ANOVA showed significant differences among the vertical loss between these two groups (P inlays appears to be a predictable, esthetic, and successful method of sealing the screw holes of the screw-retained implant restorations.

  16. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  17. Evaluation of an Enhanced Role-Based Access Control model to manage information access in collaborative processes for a statewide clinical education program.

    Science.gov (United States)

    Le, Xuan Hung; Doll, Terry; Barbosu, Monica; Luque, Amneris; Wang, Dongwen

    2014-08-01

    Managing information access in collaborative processes is a critical requirement to team-based biomedical research, clinical education, and patient care. We have previously developed a computation model, Enhanced Role-Based Access Control (EnhancedRBAC), and applied it to coordinate information access in the combined context of team collaboration and workflow for the New York State HIV Clinical Education Initiative (CEI) program. We report in this paper an evaluation study to assess the effectiveness of the EnhancedRBAC model for information access management in collaborative processes when applied to CEI. We designed a cross-sectional study and performed two sets of measurement: (1) degree of agreement between EnhancedRBAC and a control system CEIAdmin based on 9152 study cases, and (2) effectiveness of EnhancedRBAC in terms of sensitivity, specificity, and accuracy based on a gold-standard with 512 sample cases developed by a human expert panel. We applied stratified random sampling, partial factorial design, and blocked randomization to ensure a representative case sample and a high-quality gold-standard. With the kappa statistics of four comparisons in the range of 0.80-0.89, EnhancedRBAC has demonstrated a high level of agreement with CEIAdmin. When evaluated against the gold-standard, EnhancedRBAC has achieved sensitivities in the range of 97-100%, specificities at the level of 100%, and accuracies in the range of 98-100%. The initial results have shown that the EnhancedRBAC model can be effectively used to manage information access in the combined context of team collaboration and workflow for coordination of clinical education programs. Future research is required to perform longitudinal evaluation studies and to assess the effectiveness of EnhancedRBAC in other applications. Copyright © 2013 Elsevier Inc. All rights reserved.

  18. A highly efficient SDRAM controller supporting variable-length burst access and batch process for discrete reads

    Science.gov (United States)

    Li, Nan; Wang, Junzheng

    2016-03-01

    A highly efficient Synchronous Dynamic Random Access Memory (SDRAM) controller supporting variable-length burst access and batch process for discrete reads is proposed in this paper. Based on the Principle of Locality, command First In First Out (FIFO) and address range detector are designed within this controller to accelerate its responses to discrete read requests, which dramatically improves the average Effective Bus Utilization Ratio (EBUR) of SDRAM. Our controller is finally verified by driving the Micron 256-Mb SDRAM MT48LC16M16A2. Successful simulation and verification results show that our controller exhibits much higher EBUR than do most existing designs in case of discrete reads.

  19. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdul Razaque

    2014-03-01

    Full Text Available This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC for wireless sensor networks (WSNs, which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN, which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS, which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS, which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  20. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  1. High-Alpha Research Vehicle (HARV) longitudinal controller: Design, analyses, and simulation resultss

    Science.gov (United States)

    Ostroff, Aaron J.; Hoffler, Keith D.; Proffitt, Melissa S.; Brown, Philip W.; Phillips, Michael R.; Rivers, Robert A.; Messina, Michael D.; Carzoo, Susan W.; Bacon, Barton J.; Foster, John F.

    1994-01-01

    This paper describes the design, analysis, and nonlinear simulation results (batch and piloted) for a longitudinal controller which is scheduled to be flight-tested on the High-Alpha Research Vehicle (HARV). The HARV is an F-18 airplane modified for and equipped with multi-axis thrust vectoring. The paper includes a description of the facilities, a detailed review of the feedback controller design, linear analysis results of the feedback controller, a description of the feed-forward controller design, nonlinear batch simulation results, and piloted simulation results. Batch simulation results include maximum pitch stick agility responses, angle of attack alpha captures, and alpha regulation for full lateral stick rolls at several alpha's. Piloted simulation results include task descriptions for several types of maneuvers, task guidelines, the corresponding Cooper-Harper ratings from three test pilots, and some pilot comments. The ratings show that desirable criteria are achieved for almost all of the piloted simulation tasks.

  2. Single-port Access Subtotal Laparoscopic Hysterectomy: A Prospective Case-Control Study.

    Science.gov (United States)

    Angioni, Stefano; Pontis, Alessandro; Pisanu, Adolfo; Mereu, Liliana; Roman, Horace

    2015-01-01

    The objective was to evaluate the perioperative outcomes, safety, and patient acceptance of single-port access laparoscopic subtotal hysterectomy (SPAL-SH) in comparison with conventional multiport access laparoscopic subtotal hysterectomy (MPAL-SH). Case-control study. Canadian Task Force Classification II-2. The study was conducted at university hospitals in Cagliari, Italy, and Rouen, France. Sixty-one women with metrorrhagia, abnormal uterine bleeding with uterine myomas, or symptomatic adenomyosis were included in the study. Thirty-one patients underwent SPAL-SH, and 30 patients underwent conventional MPAL-SH. We analyzed the data to compare the outcomes of SPAL-SH versus MPAL-SH. Patients in the SPAL-SH group had longer operative times than those in the MPAL-SH group (p < .001) but shorter hospital stays (p < .001). Postoperative pain immediately after surgery, after 6 hours, and after 24 hours were lower in the SPAL-SH group (p < .001). The SPAL-SH group reported significantly higher cosmetic satisfaction at 1, 4, and 24 weeks after surgery (p < .01). We conclude that SPAL-SH is a feasible and safe alternative to standard MPAL-SH in selected patients. Ongoing refinement of the surgical technique and instrumentation is likely to expand its role in gynecologic surgery in the future. In addition, SPAL-SH has a definite benefit in relation to body image and cosmesis. Copyright © 2015 AAGL. Published by Elsevier Inc. All rights reserved.

  3. Near infrared spectroscopy for controlling the quality of distal leg perfusion in remote access cardiopulmonary bypass.

    Science.gov (United States)

    Schachner, Thomas; Bonaros, Nikolaos; Bonatti, Johannes; Kolbitsch, Christian

    2008-12-01

    The prevention of leg ischemia is necessary in all patients undergoing femoral artery cannulation for extracorporeal circulation. Near infrared spectroscopy (NIRS) is an established non-invasive method for measuring tissue oxygen saturation. Ten patients underwent robotically assisted endoscopic coronary surgery or ASD repair on the arrested heart using aortic endo-occlusion catheters. They were monitored by transcutaneous NIRS (placed on both lower legs) for quality control of distal leg perfusion during femoral access cardiopulmonary bypass. The baseline NIRS values were 61 (52-80) on the cannulated side versus 70 (53-80) on the contralateral leg (p=n.s.). During clamping of the femoral artery for installation of the remote access perfusion system the tissue oxygen saturation dropped to 38 (18-58) (p=0.001 vs baseline) while it remained stable on the contralateral leg. After successful implantation of the distal leg perfusion the NIRS values normalized to similar amounts on both legs. We conclude that transcutaneous NIRS of the lower legs might be a useful non-invasive tool for monitoring leg perfusion in patients undergoing extracorporeal circulation via the femoral vessels.

  4. A wavenumber approach to analysing the active control of plane waves with arrays of secondary sources

    Science.gov (United States)

    Elliott, Stephen J.; Cheer, Jordan; Bhan, Lam; Shi, Chuang; Gan, Woon-Seng

    2018-04-01

    The active control of an incident sound field with an array of secondary sources is a fundamental problem in active control. In this paper the optimal performance of an infinite array of secondary sources in controlling a plane incident sound wave is first considered in free space. An analytic solution for normal incidence plane waves is presented, indicating a clear cut-off frequency for good performance, when the separation distance between the uniformly-spaced sources is equal to a wavelength. The extent of the near field pressure close to the source array is also quantified, since this determines the positions of the error microphones in a practical arrangement. The theory is also extended to oblique incident waves. This result is then compared with numerical simulations of controlling the sound power radiated through an open aperture in a rigid wall, subject to an incident plane wave, using an array of secondary sources in the aperture. In this case the diffraction through the aperture becomes important when its size is compatible with the acoustic wavelength, in which case only a few sources are necessary for good control. When the size of the aperture is large compared to the wavelength, and diffraction is less important but more secondary sources need to be used for good control, the results then become similar to those for the free field problem with an infinite source array.

  5. Medium Access Control for Thermal Energy Harvesting in Advanced Metering Infrastructures

    DEFF Research Database (Denmark)

    Vithanage, Madava D.; Fafoutis, Xenofon; Andersen, Claus Bo

    2013-01-01

    In this paper we investigate the feasibility of powering wireless metering devices, namely heat cost allocators, by thermal energy harvested from radiators. The goal is to take a first step toward the realization of Energy-Harvesting Advanced Metering Infrastructures (EH-AMIs). While traditional...... battery-powered devices have a limited amount of energy, energy harvesting can potentially provide an infinite amount of energy for continuous operating lifetimes, thus reducing the cost involved in installation and maintenance. The contribution of this work is twofold. First, we experimentally identify...... the potential energy that can be harvested from Low Surface Temperature (LST) radiators. The experiments are based on a developed Energy-Harvesting Heat Cost Allocator (EH-HCA) prototype. On the basis of this measured power budget, we model and analytically compare the currently used Medium Access Control (MAC...

  6. RFID card based access control system with counter for Indus Complex

    International Nuclear Information System (INIS)

    Jathar, M.R.; Vikas, Meshram; Patidar, S.C.

    2015-01-01

    As per norms of the Atomic energy regulatory board (AERB) to operate a facility in round the clock which has a potential of radiation exposure, radiation safety rules are to be followed. Indus -1 and Indus-2 are synchrotron radiation sources which are open for various users round the clock. To monitor the persons inside the defined zone at any given time, a system is setup consisting of RF ID cards and their readers along with dedicated software. Software is developed in Visual Basic and uses UDP network protocol for receiving data from readers installed at various locations and connected to local area network. The paper describes the access control scheme followed in Indus Accelerator Complex. (author)

  7. Spectrum sharing in cognitive radio networks medium access control protocol based approach

    CERN Document Server

    Pandit, Shweta

    2017-01-01

    This book discusses the use of the spectrum sharing techniques in cognitive radio technology, in order to address the problem of spectrum scarcity for future wireless communications. The authors describe a cognitive radio medium access control (MAC) protocol, with which throughput maximization has been achieved. The discussion also includes use of this MAC protocol for imperfect sensing scenarios and its effect on the performance of cognitive radio systems. The authors also discuss how energy efficiency has been maximized in this system, by applying a simple algorithm for optimizing the transmit power of the cognitive user. The study about the channel fading in the cognitive user and licensed user and power adaption policy in this scenario under peak transmit power and interference power constraint is also present in this book.

  8. An Efficient Solution for Hierarchical Access Control Problem in Cloud Environment

    Directory of Open Access Journals (Sweden)

    Bing-Zhe He

    2014-01-01

    Full Text Available The time-bound hierarchical key assignment scheme provides a cryptographic solution for the access control problem in distributed systems (e.g., Pay-TV and cloud computing applications. Most time-bound hierarchical key assignment schemes can be divided into two types: adopting tamper-resistant devices and utilizing public values. Despite the fact that adopting tamper-resistant devices can easily resist to collusion attacks, utilizing public values is much cheaper and more suitable for cloud environment. In this paper, we proposed a new time-bound hierarchical key assignment scheme, which can effectively defeat the collusion attack. Besides, the proposed scheme utilizes public values instead of tamper-resistant devices, which will restrict user’s convenience. Compared with the previous works, our scheme requires fewer public values and has better performance.

  9. Multiple regression analyses in artificial-grammar learning: the importance of control groups.

    Science.gov (United States)

    Lotz, Anja; Kinder, Annette; Lachnit, Harald

    2009-03-01

    In artificial-grammar learning, it is crucial to ensure that above-chance performance in the test stage is due to learning in the training stage but not due to judgemental biases. Here we argue that multiple regression analysis can be successfully combined with the use of control groups to assess whether participants were able to transfer knowledge acquired during training when making judgements about test stimuli. We compared the regression weights of judgements in a transfer condition (training and test strings were constructed by the same grammar but with different letters) with those in a control condition. Predictors were identical in both conditions-judgements of control participants were treated as if they were based on knowledge gained in a standard training stage. The results of this experiment as well as reanalyses of a former study support the usefulness of our approach.

  10. Coordinated Scheduling and Power Control in Cloud-Radio Access Networks

    KAUST Repository

    Douik, Ahmed

    2015-12-01

    This paper addresses the joint coordinated scheduling and power control problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy, power control, and synchronization of the transmit frames across the single-antenna base-stations (BS). The transmit frame consists of several time/frequency blocks, called power-zones (PZ). The paper considers the problem of scheduling users to PZs and determining their power levels (PL), by maximizing the weighted sum-rate under the practical constraints that each user cannot be served by more than one base-station, but can be served by one or more power-zones within each base-station frame. The paper solves the problem using a graph theoretical approach by introducing the joint scheduling and power control graph formed by several clusters, where each is formed by a set of vertices, representing the possible association of users, BSs, and PLs for one specific PZ. The problem is, then, formulated as a maximumweight clique problem, in which the weight of each vertex is the sum of the benefits of the individual associations belonging to that vertex. Simulation results suggest that the proposed crosslayer scheme provides appreciable performance improvement as compared to schemes from recent literature.

  11. Economic analyses of breast cancer control in low- and middle-income countries: a systematic review

    NARCIS (Netherlands)

    Zelle, S.G.; Baltussen, R.M.P.M.

    2013-01-01

    BACKGROUND: To support the development of global strategies against breast cancer, this study reviews available economic evidence on breast cancer control in low- and middle-income countries (LMICs). METHODS: A systematic article search was conducted through electronic scientific databases, and

  12. Analysing potato late blight control as a social-ecological system using fuzzy cognitive mapping

    NARCIS (Netherlands)

    Pacilly, Francine C.A.; Groot, Jeroen C.J.; Hofstede, Gert Jan; Schaap, Ben F.; Lammerts van Bueren, Edith

    2016-01-01

    Potato late blight, caused by Phytophthora infestans, is one of the main diseases in potato production, causing major losses in yield. Applying environmentally harmful fungicides is the prevailing and classical method for controlling late blight, thus contaminating food and water. There is

  13. What Controls the Teaching of "Friluftsliv"? Analysing a Pedagogic Discourse within Swedish Physical Education

    Science.gov (United States)

    Backman, Erik

    2011-01-01

    Research indicates that outdoor teaching practices within a physical education (PE) context are controlled by several factors with the potential to weaken or strengthen PE teachers' communication of pedagogic messages. Drawing on 12 qualitative interviews with PE teachers in compulsory schools in Sweden, the findings in this study suggest that…

  14. Evaluation of strength-controlling defects in paper by stress concentration analyses

    Science.gov (United States)

    John M. Considine; David W. Vahey; James W. Evans; Kevin T. Turner; Robert E. Rowlands

    2011-01-01

    Cellulosic webs, such as paper materials, are composed of an interwoven, bonded network of cellulose fibers. Strength-controlling parameters in these webs are influenced by constituent fibers and method of processing and manufacture. Instead of estimating the effect on tensile strength of each processing/manufacturing variable, this study modifies and compares the...

  15. Social relations model analyses of perceived self-control and trust in families

    NARCIS (Netherlands)

    Büyükcan Tetik, A.; Finkenauer, C.; Siersema, M.; Vander Heyden, K.; Krabbendam, L.

    2015-01-01

    How do people know which family member is trustworthy? In this study, the authors tested the hypothesis that people use their perception of a family member's self-control as an indicator of his or her trustworthiness. Eighty-four Dutch families consisting of 2 parents and 2 children completed

  16. Neurodynamics of executive control processes in bilinguals: evidence from ERP and source reconstruction analyses

    Science.gov (United States)

    Heidlmayr, Karin; Hemforth, Barbara; Moutier, Sylvain; Isel, Frédéric

    2015-01-01

    The present study was designed to examine the impact of bilingualism on the neuronal activity in different executive control processes namely conflict monitoring, control implementation (i.e., interference suppression and conflict resolution) and overcoming of inhibition. Twenty-two highly proficient but non-balanced successive French–German bilingual adults and 22 monolingual adults performed a combined Stroop/Negative priming task while event-related potential (ERP) were recorded online. The data revealed that the ERP effects were reduced in bilinguals in comparison to monolinguals but only in the Stroop task and limited to the N400 and the sustained fronto-central negative-going potential time windows. This result suggests that bilingualism may impact the process of control implementation rather than the process of conflict monitoring (N200). Critically, our study revealed a differential time course of the involvement of the anterior cingulate cortex (ACC) and the prefrontal cortex (PFC) in conflict processing. While the ACC showed major activation in the early time windows (N200 and N400) but not in the latest time window (late sustained negative-going potential), the PFC became unilaterally active in the left hemisphere in the N400 and the late sustained negative-going potential time windows. Taken together, the present electroencephalography data lend support to a cascading neurophysiological model of executive control processes, in which ACC and PFC may play a determining role. PMID:26124740

  17. Value of information analyses of economic randomized controlled trials: the treatment of intermittent claudication

    NARCIS (Netherlands)

    Koerkamp, Bas Groot; Spronk, Sandra; Stijnen, Theo; Hunink, M. G. Myriam

    2010-01-01

    The aim of this study is to design the optimal study comparing endovascular revascularization and supervised exercise training for patients with intermittent claudication and to demonstrate value of information (VOI) analysis of patient-level data from an economic randomized controlled trial to

  18. Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things

    Directory of Open Access Journals (Sweden)

    Zhen Qin

    2017-01-01

    Full Text Available Online healthcare social networks (OHSNs play an essential role in sharing information among medical experts and patients who are equipped with similar experiences. To access other patients’ data or experts’ diagnosis anywhere and anytime, it is necessary to integrate the OHSN into the Internet as part of the Internet of Things (IoT. Therefore, it is crucial to design an efficient and versatile access control scheme that can grant and revoke a user to access the OHSN. In this paper, we propose novel attribute-based encryption (ABE features with user revocation and verifiable decryption outsourcing to control the access privilege of the users. The security of the proposed ABE scheme is given in the well-studied random oracle model. With the proposed ABE scheme, the malicious users can be excluded from the system and the user can offload most of the overhead in the decryption to an untrusted cloud server in a verifiable manner. An access control scheme for the OHSN has been given in the context of the IoT based on the proposed ABE scheme. The simulation demonstrates that our access control mechanism is practical.

  19. Choice of Appropriate Control Values for Effective Analyses of Damage Detection

    Directory of Open Access Journals (Sweden)

    Venglár Michal

    2017-03-01

    Full Text Available The article is devoted to a suitable choice of input parameters for the efficient running of a self-developed code used for damage detection. The code was prepared in Office Excel VBA, which used a non-destructive vibration-based method. The primary aim of the code is to determine the change in bending stiffness by using the FE model updating method, and the aim of the paper is to determine the effect of the input data on the bending stiffness calculations. The code was applied for a numerical model of a steel bar. The steel bar was a simply supported beam with a span of 3.5 m. The time of the calculations and precision of the identification were investigated. The values of the time consumption depend on the input values, the desired limit of the accepted error, and the length of the step in every iteration. Data from an experimental model was analysed. The model was made of wooden and plaster boards. The calculations were done in accordance with suitable input data from a parametric study.

  20. Development of Decision-Making Automated System for Optimal Placement of Physical Access Control System’s Elements

    Science.gov (United States)

    Danilova, Olga; Semenova, Zinaida

    2018-04-01

    The objective of this study is a detailed analysis of physical protection systems development for information resources. The optimization theory and decision-making mathematical apparatus is used to formulate correctly and create an algorithm of selection procedure for security systems optimal configuration considering the location of the secured object’s access point and zones. The result of this study is a software implementation scheme of decision-making system for optimal placement of the physical access control system’s elements.

  1. DALYs, dollars and dogs: how best to analyse the economics of controlling zoonoses.

    Science.gov (United States)

    Shaw, A P M; Rushton, J; Roth, F; Torgerson, P R

    2017-04-01

    Decision-makers increasingly require comprehensive economic metrics summarising and comparing the benefits and costs of controlling zoonotic diseases. The impact of disease in people is conventionally quantified in non-monetary terms, usually a disability-adjusted life year (DALY), whereas the losses due to disease in animals, particularly livestock, are quantified in monetary terms. The potential for the development of a non-monetary metric for ill health in animals, based on life years lost and disability, is discussed and rejected. Within and across animal species and livestock production systems, maximising life spans is not a consistent goal and morbidity/disabilities have very different weights and often lead to culling. By relating livestock losses to a measure of national income forgone, the recently developed alternative of converting monetary losses due to livestock illness into an animal loss equivalent (ALE) provides a viable solution. Based on this, the literature on the economics of controlling zoonoses is revisited and four options for quantifying and comparing benefits and costs are examined and illustrated using numerical examples. These are i) the simplistic grouping of all monetary elements and their comparison to DALYs averted (described as the aggregate net cost method), ii) the separable costs method, iii) the use of ALEs to convert all benefits to a non-monetary equivalent, termed the zoonotic DALY (zDALY), or iv) the use of a full monetary cost-benefit analysis, based on converting DALYs to a monetary equivalent. The strengths and weaknesses of each are discussed. For effective prioritisation and decision-making, it is vital that an analytical approach is widely adopted which yields consistent results and which supports the control of zoonoses.

  2. Grape juice quality control by means of ¹H nmr spectroscopy and chemometric analyses

    Directory of Open Access Journals (Sweden)

    Caroline Werner Pereira da Silva Grandizoli

    2014-01-01

    Full Text Available This work shows the application of ¹H NMR spectroscopy and chemometrics for quality control of grape juice. A wide range of quality assurance parameters were assessed by single ¹H NMR experiments acquired directly from juice. The investigation revealed that conditions and time of storage should be revised and indicated on all labels. The sterilization process of homemade grape juices was efficient, making it possible to store them for long periods without additives. Furthermore, chemometric analysis classified the best commercial grape juices to be similar to homemade grape juices, indicating that this approach can be used to determine the authenticity after adulteration.

  3. Grape juice quality control by means of {sup 1}H NMR spectroscopy and chemometric analyses

    Energy Technology Data Exchange (ETDEWEB)

    Grandizoli, Caroline Werner Pereira da Silva; Campos, Francinete Ramos; Simonelli, Fabio; Barison, Andersson, E-mail: andernmr@ufpr.br [Universidade Federal do Paraná (UFPR), Curitiba (Brazil). Departamento de Química

    2014-07-01

    This work shows the application of {sup 1}H NMR spectroscopy and chemometrics for quality control of grape juice. A wide range of quality assurance parameters were assessed by single {sup 1}H NMR experiments acquired directly from juice. The investigation revealed that conditions and time of storage should be revised and indicated on all labels. The sterilization process of homemade grape juices was efficient, making it possible to store them for long periods without additives. Furthermore, chemometric analysis classified the best commercial grape juices to be similar to homemade grape juices, indicating that this approach can be used to determine the authenticity after adulteration. (author)

  4. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  5. Development and characterization of 96 microsatellite markers suitable for QTL mapping and accession control in an Arabidopsis core collection.

    Science.gov (United States)

    Cosson, Patrick; Decroocq, Véronique; Revers, Frédéric

    2014-01-22

    To identify plant genes involved in various key traits, QTL mapping is a powerful approach. This approach is based on the use of mapped molecular markers to identify genomic regions controlling quantitative traits followed by a fine mapping and eventually positional cloning of candidate genes. Mapping technologies using SNP markers are still rather expensive and not feasible in every laboratory. In contrast, microsatellite (also called SSR for Simple Sequence Repeat) markers are technologically less demanding and less costly for any laboratory interested in genetic mapping. In this study, we present the development and the characterization of a panel of 96 highly polymorphic SSR markers along the Arabidopsis thaliana genome allowing QTL mapping among accessions of the Versailles 24 core collection that covers a high percentage of the A. thaliana genetic diversity. These markers can be used for any QTL mapping analysis involving any of these accessions. We optimized the use of these markers in order to reveal polymorphism using standard PCR conditions and agarose gel electrophoresis. In addition, we showed that the use of only three of these markers allows differentiating all 24 accessions which makes this set of markers a powerful tool to control accession identity or any cross between any of these accessions. The set of SSR markers developed in this study provides a simple and efficient tool for any laboratory focusing on QTL mapping in A. thaliana and a simple means to control seed stock or crosses between accessions.

  6. Comprehensive comparative genomic and transcriptomic analyses of the legume genes controlling the nodulation process

    Directory of Open Access Journals (Sweden)

    Zhenzhen eQiao

    2016-01-01

    Full Text Available Nitrogen is one of the most essential plant nutrients and one of the major factors limiting crop productivity. Having the goal to perform a more sustainable agriculture, there is a need to maximize biological nitrogen fixation, a feature of legumes. To enhance our understanding of the molecular mechanisms controlling the interaction between legumes and rhizobia, the symbiotic partner fixing and assimilating the atmospheric nitrogen for the plant, researchers took advantage of genetic and genomic resources developed across different legume models (e.g. Medicago truncatula, Lotus japonicus, Glycine max and Phaseolous vulgaris to identify key regulatory genes of the nodulation process. In this study, we are presenting the results of a comprehensive comparative genomic analysis to highlight orthologous and paralogous relationships between the legume genes controlling nodulation. Mining large transcriptomic datasets, we also identified several orthologous and paralogous genes characterized by the induction of their expression during nodulation across legume plant species. This comprehensive study prompts new insights into the evolution of the nodulation process in legume plant and will benefit the scientific community interested in the transfer of functional genomic information between species.

  7. Comprehensive Comparative Genomic and Transcriptomic Analyses of the Legume Genes Controlling the Nodulation Process.

    Science.gov (United States)

    Qiao, Zhenzhen; Pingault, Lise; Nourbakhsh-Rey, Mehrnoush; Libault, Marc

    2016-01-01

    Nitrogen is one of the most essential plant nutrients and one of the major factors limiting crop productivity. Having the goal to perform a more sustainable agriculture, there is a need to maximize biological nitrogen fixation, a feature of legumes. To enhance our understanding of the molecular mechanisms controlling the interaction between legumes and rhizobia, the symbiotic partner fixing and assimilating the atmospheric nitrogen for the plant, researchers took advantage of genetic and genomic resources developed across different legume models (e.g., Medicago truncatula, Lotus japonicus, Glycine max, and Phaseolus vulgaris) to identify key regulatory protein coding genes of the nodulation process. In this study, we are presenting the results of a comprehensive comparative genomic analysis to highlight orthologous and paralogous relationships between the legume genes controlling nodulation. Mining large transcriptomic datasets, we also identified several orthologous and paralogous genes characterized by the induction of their expression during nodulation across legume plant species. This comprehensive study prompts new insights into the evolution of the nodulation process in legume plant and will benefit the scientific community interested in the transfer of functional genomic information between species.

  8. Spatial accessibility of drug treatment facilities and the effects on locus of control, drug use, and service use among heroin-injecting Mexican American men.

    Science.gov (United States)

    Kao, Dennis; Torres, Luis R; Guerrero, Erick G; Mauldin, Rebecca L; Bordnick, Patrick S

    2014-05-01

    This study explores the spatial accessibility of outpatient drug treatment facilities and the potential relationship with drug use-related outcomes among Mexican American heroin users. Secondary data on 219 current and former heroin-injecting Mexican American men aged 45 and older were drawn from a research study in Houston, Texas. We used geographic information systems (GIS) to derive two spatial accessibility measures: distance from one's place of residence to the closest drug treatment facility (in minutes); and the number of facilities within a 10-minute driving distance from one's place of residence. Exploratory logistic regression analyses examined the association between the spatial accessibility of drug treatment facilities and several drug use-related outcomes: internal locus of control (LOC); perceived chances and worries of injecting in the next six months; treatment utilization; and location of last heroin purchase. Participants with greater spatial access to treatment programs were more likely to report a higher chance of injecting in the near future. However, while current heroin users were more worried about injecting in the next six months, greater spatial access to treatment programs seemed to have a buffering effect. Finally, those who lived closer to a treatment programs were more likely to have last purchased heroin inside the neighborhood versus outside the neighborhood. Spatial accessibility was not associated with internal LOC or treatment utilization. The findings showed that the presence of outpatient treatment facilities-particularly services in Spanish-may influence perceived risk of future heroin use and purchasing behaviors among Mexican American men. Implications for future spatially-informed drug use research and the planning of culturally and linguistically responsive drug treatment programs are discussed. Copyright © 2014 Elsevier B.V. All rights reserved.

  9. Isotopic footprint: ¿does the forensic analyses improve forest control?

    Directory of Open Access Journals (Sweden)

    Ulrich Melessa

    2013-10-01

    Full Text Available In the Ecuadorian market a high percentage of timber from tropical forests is of illegal origin. Illegal acts and infringments along the production chain are more frequent if the concern species is valuable such as mahogany (Swietenia macrophylla and cedar (Cedrela odorata. In this regard, one of the most frequently falsified data is the geographical origin of wood. At date there is no forensic scientific method for determining objectively and independently the geographic source stated in the documentation of traded timber. The analysis of the isotope composition, known as a isotope fingerprint, has a clear special pattern and is feasible for this purpose.From Ecuador samples of mahogany and cedar were contributed to build a geo-referenced database and improve the method to make it more operational to serve in control and surveillance programs. This article explains the problems related to the subject, the method and its potential use. 

  10. Control Rod Withdrawal Events Analyses for the Prototype Gen-IV SFR

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Chiwoong; Ha, Kwiseo; Jeong, Taekyeong; Jeong, Jaeho; Chang, Wonpyo; Lee, Seungwon; An, Sangjun; Lee, Kwilim [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2016-10-15

    To confirm the limiting condition, based on the maximum allowable reactivity insertion of 0.3 $, three cases from the end of cycle (EOC) are selected. In addition, assuming the failure of CRSS by earthquake, additional cases is defined at beginning of cycle (BOC). When the CRW occurs, the reactor can be protected by plant protection system (PPS). In this study, PPS mechanism is sequentially studied for all initiating events. For design basis accidents (DBA), the reactor can be scrammed by reactor protection system (RPS). The first and seconds RPS signals are checked during transients. When RPS is failed, so called as anticipated transient without scram (ATWS), the reactor will be protected by diverse protection system (DPS). In this study, in order to analyze various initiating events related control rod withdrawal, four kinds of operating condition is defined. TOP events are analyzed using MARS-LMR. The influence of various plant protection system such as RPS and DPS are investigated.

  11. Omega-3 Supplementation and Loneliness-Related Memory Problems: Secondary Analyses Of A Randomized Controlled Trial

    Science.gov (United States)

    Jaremka, Lisa M.; Derry, Heather M.; Bornstein, Robert; Prakash, Ruchika Shaurya; Peng, Juan; Belury, Martha A.; Andridge, Rebecca R.; Malarkey, William B.; Kiecolt-Glaser, Janice K.

    2014-01-01

    Objective Loneliness enhances risk for episodic memory declines over time. Omega-3 supplementation can improve cognitive function for people experiencing mild cognitive difficulties. Accordingly, we explored whether omega-3 supplementation would attenuate loneliness-related episodic memory problems. Methods Participants (N=138) from a parent randomized controlled trial (RCT) were randomized to the placebo, 1.25 grams/day of omega-3, or 2.50 grams/day of omega-3 conditions for a 4-month period. They completed a baseline loneliness questionnaire and a battery of cognitive tests both at baseline and at the end of the RCT. Results Controlling for baseline verbal episodic memory scores, lonelier people within the placebo condition had poorer verbal episodic memory post-supplementation, as measured by immediate (b = −0.28, t(117) = −2.62, p = .010) and long-delay (b = −.06, t(116) = −2.07, p = .040) free recall, than their less lonely counterparts. This effect was not observed in the 1.25 grams/day and 2.50 grams/day supplementation groups, all p values > .10. The plasma omega-6:omega-3 ratio data mirrored these results. There were no loneliness-related effects of omega-3 supplementation on short-delay recall or the other cognitive tests, all p values > .32. Conclusion These results suggest that omega-3 supplementation attenuates loneliness-related verbal episodic memory declines over time and support the utility of exploring novel interventions for treating episodic memory problems among lonely people. ClinicalTrials.gov identifier: NCT00385723 PMID:25264972

  12. Consensus building on access to controlled medicines: a four-stage Delphi consensus procedure.

    Science.gov (United States)

    Jünger, Saskia; Brearley, Sarah; Payne, Sheila; Mantel-Teeuwisse, Aukje K; Lynch, Thomas; Scholten, Willem; Radbruch, Lukas

    2013-12-01

    In 2011, the World Health Organization (WHO) published the policy guidelines Ensuring Balance in National Controlled Substances Policies-Guidance for Availability and Accessibility of Controlled Medicines, presenting a revised version of the previous guidelines from 2000. To describe the consensus process that guided the revision of the guidelines. A four-stage revision process was undertaken with a panel of 29 international experts from palliative care, public health, and harm reduction: 1) a qualitative inventory of required changes by means of a structured checklist, 2) & 3) a two-round online consensus Delphi process about the draft revision of the guidelines, and 4) a WHO advisory meeting for the discussion of remaining controversies and final issues. The qualitative inventory resulted in a draft revision of the guidelines meeting requirements on different levels, such as a broader focus and more accurate evidence. Operationalization of the guidelines was improved by specifying measures, procedures, and responsibilities. The Delphi procedure provided concrete indications for the rewording of both the guidelines and the associated text. During the advisory meeting, any persistent disagreements were systematically discussed to achieve consensus on the new version of the guidelines. The four-stage multimethod consensus process resulted in a substantial revision to the WHO guidelines. This takes into account the increase in knowledge about opioid medication since the first edition of the guidelines. Disagreement emerging from the process underlines the complexity of preparing guidance because of the delicate balance between need and control. Copyright © 2013 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights reserved.

  13. Nutrient analyses and quality assurance/quality control: training course in the Philippines

    International Nuclear Information System (INIS)

    Kannan, N.; Oh, J.

    2007-01-01

    Full text: AMETEC (APEC Marine Environmental Training and Education Center) situated at the scenic Geoje island of the Republic of Korea has recently (Oct.14-28, 2006) completed a training course on 'Nutrient Analysis and Quality Assurance/Quality Control: Enhancing reliability and comparability of data for the Integrated Environmental Monitoring program' in University of Philippines at Diliman, Quezon, Philippines. This = programme was co-sponsored by GEF/UNDP/IMO Regional Programme on Partnership in Environmental Management for Seas of East Asia (PEMSEA); National Science Research Institute (NSRI) and Marine Science Institute (MSI), University of the Philippines in Diliman, Philippines. For the first time in AMETEC's history such a programme was conducted outside their campus in the Republic of Korea. Twenty participants, mostly from the developing nations of the Asia Pacific Economic Cooperation (APEC) region joined the course. QA/QC tools were effectively implemented in solving problems/issues that were encountered: program design - location, time of collection (tidal variation), and number of samples that represent the water body, etc.; sampling contamination issues, appropriate sampling techniques, containers, sample handling, sample identification and subsequent processing, sample storage; analysis - values of quality control samples, spike, IHRMs (in house reference materials)), control charts, acceptance criteria; method validation, repeatability, reproducibility, method detection limits, report limits, accuracy and uncertainty. These were especially useful in establishing a new laboratory environment in a developing nation. While utilizing the basic laboratory facilities available at NSRI and MSI in the Philippines, additional laboratory supplies and some equipment were shipped from the Republic of Korea and Australia. To minimize issues relating to language, the trainers had to prepare well ahead and develop templates for each day's activities. Trainers

  14. Transcriptomic and proteomic analyses of the Aspergillus fumigatus hypoxia response using an oxygen-controlled fermenter

    Directory of Open Access Journals (Sweden)

    Barker Bridget M

    2012-02-01

    Full Text Available Abstract Background Aspergillus fumigatus is a mold responsible for the majority of cases of aspergillosis in humans. To survive in the human body, A. fumigatus must adapt to microenvironments that are often characterized by low nutrient and oxygen availability. Recent research suggests that the ability of A. fumigatus and other pathogenic fungi to adapt to hypoxia contributes to their virulence. However, molecular mechanisms of A. fumigatus hypoxia adaptation are poorly understood. Thus, to better understand how A. fumigatus adapts to hypoxic microenvironments found in vivo during human fungal pathogenesis, the dynamic changes of the fungal transcriptome and proteome in hypoxia were investigated over a period of 24 hours utilizing an oxygen-controlled fermenter system. Results Significant increases in transcripts associated with iron and sterol metabolism, the cell wall, the GABA shunt, and transcriptional regulators were observed in response to hypoxia. A concomitant reduction in transcripts was observed with ribosome and terpenoid backbone biosynthesis, TCA cycle, amino acid metabolism and RNA degradation. Analysis of changes in transcription factor mRNA abundance shows that hypoxia induces significant positive and negative changes that may be important for regulating the hypoxia response in this pathogenic mold. Growth in hypoxia resulted in changes in the protein levels of several glycolytic enzymes, but these changes were not always reflected by the corresponding transcriptional profiling data. However, a good correlation overall (R2 = 0.2, p A. fumigatus. Conclusions Taken together, our data suggest a robust cellular response that is likely regulated both at the transcriptional and post-transcriptional level in response to hypoxia by the human pathogenic mold A. fumigatus. As with other pathogenic fungi, the induction of glycolysis and transcriptional down-regulation of the TCA cycle and oxidative phosphorylation appear to major

  15. Linear and Nonlinear Analyses of the Cardiac Autonomic Control in Children With Developmental Coordination Disorder: A Case-Control Study

    Directory of Open Access Journals (Sweden)

    Jorge L. Cavalcante Neto

    2018-03-01

    Full Text Available Children with Developmental Coordination Disorder (DCD and children at risk for DCD (r-DCD present motor impairments interfering in their school, leisure and daily activities. In addition, these children may have abnormalities in their cardiac autonomic control, which together with their motor impairments, restrict their health and functionality. Therefore, this study aimed to assess the cardiac autonomic control, by linear and nonlinear analysis, at supine and during an orthostatic stimulus in DCD, r-DCD and typically developed children. Thirteen DCD children (11 boys and 2 girls, aged 8.08 ± 0.79 years, 19 children at risk for DCD (13 boys and 6 girls, aged 8.10 ± 0.96 years and 18 typically developed children, who constituted the control group (CG (10 boys and 8 girls, aged 8.50 ± 0.96 years underwent a heart rate variability (HRV examination. R-R intervals were recorded in order to assess the cardiac autonomic control using a validated HR monitor. HRV was analyzed by linear and nonlinear methods and compared between r-DCD, DCD, and CG. The DCD group presented blunted cardiac autonomic adjustment to the orthostatic stimulus, which was not observed in r-DCD and CG. Regarding nonlinear analysis of HRV, the DCD group presented lower parasympathetic modulation in the supine position compared to the r-DCD and CG groups. In the within group analysis, only the DCD group did not increase HR from supine to standing posture. Symbolic analysis revealed a significant decrease in 2LV (p < 0.0001 and 2UV (p < 0.0001 indices from supine to orthostatic posture only in the CG. In conclusion, r-DCD and DCD children present cardiac autonomic dysfunction characterized by higher sympathetic, lower parasympathetic and lower complexity of cardiac autonomic control in the supine position, as well as a blunted autonomic adjustment to the orthostatic stimulus. Therefore, cardiovascular health improvement should be part of DCD children's management, even in cases of

  16. Protein freeze concentration and micro-segregation analysed in a temperature-controlled freeze container

    Directory of Open Access Journals (Sweden)

    Ulrich Roessl

    2015-06-01

    Full Text Available To examine effects of varied freezing conditions on the development of spatial heterogeneity in the frozen protein solution, macroscopic freeze concentration and micro-segregation of bovine serum albumin (BSA were investigated in a temperature-controlled 200-ml freeze container. Freezing to −40 °C promoted formation of protein concentration gradients (69–114 μg ml−1 in frozen samples taken from 12 different freezer positions, whereby slow freezing in 4 h or longer facilitated the evolution of strong spatial heterogeneities and caused local concentration increases by 1.15-fold relative to the initial protein concentration (100 μg ml−1. To visualize protein micro-segregation during phase separation, BSA was conjugated with fluorescein isothiocyanate and confocal laser scanning fluorescence microscopy was used to localize and size the freeze-concentrated protein regions. Slow freezing resulted in distinctly fewer and larger protein domains in the frozen bulk than fast freezing. Surface stress on the protein during freezing would therefore be minimized at low cooling rates; microscopic freeze concentration would however be highest under these conditions, potentially favoring protein aggregation.

  17. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    Directory of Open Access Journals (Sweden)

    Wen-Jye Shyr

    2013-02-01

    Full Text Available This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC and WebAccess. A mechatronics module, a Web-CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equipment from a remote location. Mechatronics control and long-distance monitoring were realized by establishing communication between the PLC and WebAccess. Analytical results indicate that the proposed system is feasible. The suitability of this system is demonstrated in the department of industrial education and technology at National Changhua University of Education, Taiwan. Preliminary evaluation of the system was encouraging and has shown that it has achieved success in helping students understand concepts and master remote monitoring and control techniques.

  18. A stringently controlled expression system for analysing lateral gene transfer between bacteria.

    Science.gov (United States)

    Jaenecke, S; de Lorenzo, V; Timmis, K N; Díaz, E

    1996-07-01

    The lateral transfer of genetic information among microorganisms is a major force driving the outstanding adaptability of microbial communities to environmental changes. Until now little information has been obtained on gene transfer in natural ecosystems. We present here a genetic circuit for detecting and quantifying horizontal gene transfer from a defined donor microorganism to recipient organisms in the absence of selection for a recipient-specific phenotype. The system consists of an engineered lacZ (encoding beta-galactosidase) reporter gene whose expression is controlled by a synthetic regulatory element based on a fusion between the Pr promoter-operator from lambda bacteriophage and the 5' non-coding leader region of the inp gene encoding the IS 10 transposase function. Expression of this reporter cassette in the recombinant microorganism is completely shut down by two chromosomally encoded trans-acting repressors working at the level of transcription (the Cl-EK117 protein from the lambda phage), and at the level of translation (the antisense RNA-OUT of the IS 10 element). When the reporter element is transferred to a different host by any mechanism, it escapes repression and becomes expressed. The system was validated with Pseudo-monas putida, and conjugational transfer frequencies of the reporter element as low as 10(-6) were detected. The modular design and broad host range of the genetic circuit, in combination with biomarkers which permit real-time in situ detection, will facilitate the monitor-ing of gene flow in a non-disruptive manner within the environment.

  19. Presidential Management Fellows (PMF) Talent Acquisition System, PMF-TAS (ACCESS CONTROLLED)

    Data.gov (United States)

    Office of Personnel Management — Application and Assessment system for Presidential Management Fellows (PMF) and PMF Science, Technology, Engineering, and Math (STEM) programs. This sytem is access...

  20. Autonomous and controlled motivational regulations for multiple health-related behaviors: between- and within-participants analyses.

    Science.gov (United States)

    Hagger, M S; Hardcastle, S J; Chater, A; Mallett, C; Pal, S; Chatzisarantis, N L D

    2014-01-01

    Self-determination theory has been applied to the prediction of a number of health-related behaviors with self-determined or autonomous forms of motivation generally more effective in predicting health behavior than non-self-determined or controlled forms. Research has been confined to examining the motivational predictors in single health behaviors rather than comparing effects across multiple behaviors. The present study addressed this gap in the literature by testing the relative contribution of autonomous and controlling motivation to the prediction of a large number of health-related behaviors, and examining individual differences in self-determined motivation as a moderator of the effects of autonomous and controlling motivation on health behavior. Participants were undergraduate students ( N  = 140) who completed measures of autonomous and controlled motivational regulations and behavioral intention for 20 health-related behaviors at an initial occasion with follow-up behavioral measures taken four weeks later. Path analysis was used to test a process model for each behavior in which motivational regulations predicted behavior mediated by intentions. Some minor idiosyncratic findings aside, between-participants analyses revealed significant effects for autonomous motivational regulations on intentions and behavior across the 20 behaviors. Effects for controlled motivation on intentions and behavior were relatively modest by comparison. Intentions mediated the effect of autonomous motivation on behavior. Within-participants analyses were used to segregate the sample into individuals who based their intentions on autonomous motivation (autonomy-oriented) and controlled motivation (control-oriented). Replicating the between-participants path analyses for the process model in the autonomy- and control-oriented samples did not alter the relative effects of the motivational orientations on intention and behavior. Results provide evidence for consistent effects

  1. Underwater acoustic sensor networks: Medium access control, routing and reliable transfer

    Science.gov (United States)

    Xie, Peng

    Recently there have been growing interests in monitoring aquatic environments for scientific exploration, commercial exploitation and coastline protection. The ideal vehicle for this type of extensive monitoring is a mobile underwater sensor network (M-UWSN), consisting of a large number of low cost underwater sensors that can move with water currents and dispersion. M-UWSNs are significantly different from terrestrial sensor networks: (1) Radio channels do not work well under water. They must be replaced by acoustic channels, which feature long propagation delays, low communication bandwidth and high channel error rates; (2) While most ground sensors are static, underwater sensor nodes may move with water currents (and other underwater activities), as introduces passive sensor mobility. Due to the very different environment properties and the unique characteristics of acoustic channels, the protocols developed for terrestrial sensor networks are not applicable to M-UWSNs, and new research at every level of the protocol suite is demanded. In this dissertation work, we investigate three fundamental networking problems in M-UWSN design: medium access control, multi-hop routing and reliable data transfer. (1) Medium access control (MAC): the long propagation delays and narrow communication bandwidth of acoustic channels pose the major challenges to the energy-efficient MAC design in M-UWSNs. For the first time, we formally investigate the random access and RTS/CTS techniques in networks with long propagation delays and low communication bandwidth (as in M-UWSNs). Based on this study, we propose a novel reservation-based MAC approach, called R-MAC, for dense underwater sensor networks with unevenly distributed (spatially and temporally) traffic. Simulation results show that R-MAC is not only energy efficient but also supports fairness. (2) Multi-hop routing: In M-UWSNs, energy efficiency and mobility handling are the two major concerns for multi-hop routing, which have

  2. Ongoing spontaneous activity controls access to consciousness: a neuronal model for inattentional blindness.

    Directory of Open Access Journals (Sweden)

    Stanislas Dehaene

    2005-05-01

    Full Text Available Even in the absence of sensory inputs, cortical and thalamic neurons can show structured patterns of ongoing spontaneous activity, whose origins and functional significance are not well understood. We use computer simulations to explore the conditions under which spontaneous activity emerges from a simplified model of multiple interconnected thalamocortical columns linked by long-range, top-down excitatory axons, and to examine its interactions with stimulus-induced activation. Simulations help characterize two main states of activity. First, spontaneous gamma-band oscillations emerge at a precise threshold controlled by ascending neuromodulator systems. Second, within a spontaneously active network, we observe the sudden "ignition" of one out of many possible coherent states of high-level activity amidst cortical neurons with long-distance projections. During such an ignited state, spontaneous activity can block external sensory processing. We relate those properties to experimental observations on the neural bases of endogenous states of consciousness, and particularly the blocking of access to consciousness that occurs in the psychophysical phenomenon of "inattentional blindness," in which normal subjects intensely engaged in mental activity fail to notice salient but irrelevant sensory stimuli. Although highly simplified, the generic properties of a minimal network may help clarify some of the basic cerebral phenomena underlying the autonomy of consciousness.

  3. Ongoing spontaneous activity controls access to consciousness: a neuronal model for inattentional blindness.

    Science.gov (United States)

    Dehaene, Stanislas; Changeux, Jean-Pierre

    2005-05-01

    Even in the absence of sensory inputs, cortical and thalamic neurons can show structured patterns of ongoing spontaneous activity, whose origins and functional significance are not well understood. We use computer simulations to explore the conditions under which spontaneous activity emerges from a simplified model of multiple interconnected thalamocortical columns linked by long-range, top-down excitatory axons, and to examine its interactions with stimulus-induced activation. Simulations help characterize two main states of activity. First, spontaneous gamma-band oscillations emerge at a precise threshold controlled by ascending neuromodulator systems. Second, within a spontaneously active network, we observe the sudden "ignition" of one out of many possible coherent states of high-level activity amidst cortical neurons with long-distance projections. During such an ignited state, spontaneous activity can block external sensory processing. We relate those properties to experimental observations on the neural bases of endogenous states of consciousness, and particularly the blocking of access to consciousness that occurs in the psychophysical phenomenon of "inattentional blindness," in which normal subjects intensely engaged in mental activity fail to notice salient but irrelevant sensory stimuli. Although highly simplified, the generic properties of a minimal network may help clarify some of the basic cerebral phenomena underlying the autonomy of consciousness.

  4. Design of Active Queue Management for Robust Control on Access Router for Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Åhlund Christer

    2011-01-01

    Full Text Available The Internet architecture is a packet switching technology that allows dynamic sharing of bandwidth among different flows with in an IP network. Packets are stored and forwarded from one node to the next until reaching their destination. Major issues in this integration are congestion control and how to meet different quality of service requirements associated with various services. In other words streaming media quality degrades with increased packet delay and jitter caused by network congestion. To mitigate the impact of network congestion, various techniques have been used to improve multimedia quality and one of those techniques is Active Queue Management (AQM. Access routers require a buffer to hold packets during times of congestion. A large buffer can absorb the bursty arrivals, and this tends to increase the link utilizations but results in higher queuing delays. Traffic burstiness has a considerable negative impact on network performance. AQM is now considered an effective congestion control mechanism for enhancing transport protocol performance over wireless links. In order to have good link utilization, it is necessary for queues to adapt to varying traffic loads. This paper considers a particular scheme which is called Adaptive AQM (AAQM and studies its performance in the presence of feedback delays and its ability to maintain a small queue length as well as its robustness in the presence of traffic burstiness. The paper also presents a method based on the well-known Markov Modulated Poisson Process (MPP to capture traffic burstiness and buffer occupancy. To demonstrate the generality of the presented method, an analytic model is described and verified by extensive simulations of different adaptive AQM algorithms. The analysis and simulations show that AAQM outperforms the other AQMs with respect to responsiveness and robustness.

  5. Unified Information Access in Product Creation with an Integrated Control Desk

    Science.gov (United States)

    Wrasse, Kevin; Diener, Holger; Hayka, Haygazun; Stark, Rainer

    2017-06-01

    Customers demand for individualized products leads to a large variety of different products in small series and single-unit production. A high flexibility pressure in product creation is one result of this trend. In order to counteract the pressure, the information steadily increasing by Industry 4.0 must be made available at the workplace. Additionally, a better exchange of information between product development, production planning and production is necessary. The improvement of individual systems, like CAD, PDM, ERP and MES, can only achieve this to a limited extent. Since they mostly use systems from different manufacturers, the necessary deeper integration of information is only feasible for SMEs to a limited extend. The presented control desk helps to ensure a more flexible product creation as well as information exchange. It captures information from different IT systems in the production process and presents them integrated, task-oriented and oriented to the user’s mental model, e.g. information of the production combined with the 3D model of product parts, or information about product development on the 3D model of the production. The solution is a digital 3D model of the manufacturing environment, which is enriched by billboards for a quick information overview and web service windows to access detailed MES and PDM information. By this, the level of abstraction can be reduced and reacts to changed requirements in the short term, making informed decisions. The interaction with the control stands utilizes the touch skills of mobile and fixed systems such as smartphones, tablets and multitouch tables.

  6. Simple models of network access, with applications to the design of joint rate and admission control

    NARCIS (Netherlands)

    Mandjes, M.R.H.; Mitra, Debasis; Scheinhardt, Willem R.W.

    2002-01-01

    At the access to networks, in contrast to the core, distances and feedback delays, as well as link capacities are small, which has network engineering implications that are investigated in this paper. We consider a single point in the access network which multiplexes several bursty users. The users

  7. 75 FR 69791 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2010-11-15

    ... or Dealers With Market Access; Final Rule #0;#0;Federal Register / Vol. 75 , No. 219 / Monday... or Dealers With Market Access AGENCY: Securities and Exchange Commission. ACTION: Final rule. SUMMARY... the Securities Exchange Act of 1934 (``Exchange Act''). Rule 15c3-5 will require brokers or dealers...

  8. An Ounce of Prevention: Technologists Use Network-Access Control to Protect System Resources, Students

    Science.gov (United States)

    Bolch, Matt

    2009-01-01

    Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…

  9. Study protocol for a cluster-randomised controlled trial of an NCD access to medicines initiative: evaluation of Novartis Access in Kenya.

    Science.gov (United States)

    Rockers, Peter C; Wirtz, Veronika J; Vian, Taryn; Onyango, Monica A; Ashigbie, Paul G; Laing, Richard

    2016-11-25

    Novartis recently launched Novartis Access, an initiative to provide a basket of reduced price medicines for non-communicable diseases (NCDs) to be sold through the public and private non-profit sectors in programme countries. This study will evaluate the impact of Novartis Access on the availability and price of NCD medicines at health facilities and households in Kenya, the first country to receive the programme. This study will be a cluster-randomised controlled trial. 8 counties in Kenya will be randomly assigned to the intervention or control group using a covariate constrained randomisation method to maximise balance on demographic and health characteristics. In intervention counties, public and private non-profit health facilities will be able to order Novartis Access NCD medicines from the Mission for Essential Drugs and Supplies (MEDS). Data will be collected from a random sample of 384 health facilities and 800 households at baseline, midline after 1-year of intervention, and end-line after 2 years. Quarterly surveillance data will also be collected from health facilities and a subsample of households through phone-based interviews. Households will be eligible if at least one resident has been previously diagnosed and prescribed a medicine for an NCD addressed by Novartis Access, including hypertension and diabetes. The primary outcomes will be availability and price of NCD medicines at health facilities, and availability, price, and expenditures on NCD medicines at households. Impacts will be estimated using intention-to-treat analysis. This protocol was approved by the Institutional Review Boards at Strathmore University and at Boston University. Informed consent will be obtained from all participants at the start of the trial. The findings of the trial will be disseminated through peer-reviewed journals, international conferences, and meetings and events organised with local stakeholders. NCT02773095. Published by the BMJ Publishing Group Limited

  10. Worktime control access, need and use in relation to work-home interference, fatigue, and job motivation

    NARCIS (Netherlands)

    Nijp, H.H.; Beckers, D.G.J.; Kompier, M.A.J.; Bossche, S.N.J. van den; Geurts, S.A.E.

    2015-01-01

    OBJECTIVE: Worktime control (WTC) has been suggested as a tool to reduce employees' work-home interference and fatigue and improve job motivation. The purpose of this study was twofold: (i) to examine the prevalence of employees' need for, access to, and use of WTC, as well as the incongruence

  11. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  12. The Acute Effects of Grape Polyphenols Supplementation on Endothelial Function in Adults: Meta-Analyses of Controlled Trials

    Science.gov (United States)

    Li, Shao-Hua; Tian, Hong-Bo; Zhao, Hong-Jin; Chen, Liang-Hua; Cui, Lian-Qun

    2013-01-01

    Background The acute effects of grape polyphenols on endothelial function in adults are inconsistent. Here, we performed meta-analyses to determine these acute effects as measured by flow-mediated dilation (FMD). Methods Trials were searched in PubMed, Embase and the Cochrane Library database. Summary estimates of weighted mean differences (WMDs) and 95% CIs were obtained by using random-effects models. Meta-regression and subgroup analyses were performed to identify the source of heterogeneity. The protocol details of our meta-analysis have been submitted to the PROSPERO register and our registration number is CRD42013004157. Results Nine studies were included in the present meta-analyses. The results showed that the FMD level was significantly increased in the initial 120 min after intake of grape polyphenols as compared with controls. Meta-regression and subgroup analyses were performed and showed that a health status was the main effect modifier of the significant heterogeneity. Subgroups indicated that intake of grape polyphenols could significantly increase FMD in healthy subjects, and the increased FMD appeared to be more obviously in subjects with high cardiovascular risk factors. Moreover, the peak effect of grape polyphenols on FMD in healthy subjects was found 30 min after ingestion, which was different from the effect in subjects with high cardiovascular risk factors, in whom the peak effect was found 60 min after ingestion. Conclusions Endothelial function can be significantly improved in healthy adults in the initial 2 h after intake of grape polyphenols. The acute effect of grape polyphenols on endothelial function may be more significant but the peak effect is delayed in subjects with a smoking history or coronary heart disease as compared with the healthy subjects. PMID:23894543

  13. The acute effects of grape polyphenols supplementation on endothelial function in adults: meta-analyses of controlled trials.

    Directory of Open Access Journals (Sweden)

    Shao-Hua Li

    Full Text Available BACKGROUND: The acute effects of grape polyphenols on endothelial function in adults are inconsistent. Here, we performed meta-analyses to determine these acute effects as measured by flow-mediated dilation (FMD. METHODS: Trials were searched in PubMed, Embase and the Cochrane Library database. Summary estimates of weighted mean differences (WMDs and 95% CIs were obtained by using random-effects models. Meta-regression and subgroup analyses were performed to identify the source of heterogeneity. The protocol details of our meta-analysis have been submitted to the PROSPERO register and our registration number is CRD42013004157. RESULTS: Nine studies were included in the present meta-analyses. The results showed that the FMD level was significantly increased in the initial 120 min after intake of grape polyphenols as compared with controls. Meta-regression and subgroup analyses were performed and showed that a health status was the main effect modifier of the significant heterogeneity. Subgroups indicated that intake of grape polyphenols could significantly increase FMD in healthy subjects, and the increased FMD appeared to be more obviously in subjects with high cardiovascular risk factors. Moreover, the peak effect of grape polyphenols on FMD in healthy subjects was found 30 min after ingestion, which was different from the effect in subjects with high cardiovascular risk factors, in whom the peak effect was found 60 min after ingestion. CONCLUSIONS: Endothelial function can be significantly improved in healthy adults in the initial 2 h after intake of grape polyphenols. The acute effect of grape polyphenols on endothelial function may be more significant but the peak effect is delayed in subjects with a smoking history or coronary heart disease as compared with the healthy subjects.

  14. The acute effects of grape polyphenols supplementation on endothelial function in adults: meta-analyses of controlled trials.

    Science.gov (United States)

    Li, Shao-Hua; Tian, Hong-Bo; Zhao, Hong-Jin; Chen, Liang-Hua; Cui, Lian-Qun

    2013-01-01

    The acute effects of grape polyphenols on endothelial function in adults are inconsistent. Here, we performed meta-analyses to determine these acute effects as measured by flow-mediated dilation (FMD). Trials were searched in PubMed, Embase and the Cochrane Library database. Summary estimates of weighted mean differences (WMDs) and 95% CIs were obtained by using random-effects models. Meta-regression and subgroup analyses were performed to identify the source of heterogeneity. The protocol details of our meta-analysis have been submitted to the PROSPERO register and our registration number is CRD42013004157. Nine studies were included in the present meta-analyses. The results showed that the FMD level was significantly increased in the initial 120 min after intake of grape polyphenols as compared with controls. Meta-regression and subgroup analyses were performed and showed that a health status was the main effect modifier of the significant heterogeneity. Subgroups indicated that intake of grape polyphenols could significantly increase FMD in healthy subjects, and the increased FMD appeared to be more obviously in subjects with high cardiovascular risk factors. Moreover, the peak effect of grape polyphenols on FMD in healthy subjects was found 30 min after ingestion, which was different from the effect in subjects with high cardiovascular risk factors, in whom the peak effect was found 60 min after ingestion. Endothelial function can be significantly improved in healthy adults in the initial 2 h after intake of grape polyphenols. The acute effect of grape polyphenols on endothelial function may be more significant but the peak effect is delayed in subjects with a smoking history or coronary heart disease as compared with the healthy subjects.

  15. Evaluation of a flexible column-based access control security model ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 22, No 1 (2015) >. Log in or Register to get access to full text downloads.

  16. Report: EPA Could Improve Physical Access and Service Continuity/Contingency Controls for Financial and Mixed-Financial Systems Located at its Research Triangle Park Campus

    Science.gov (United States)

    Report #2006-P-00005, December 14, 2005. Controls needed to be improved in areas such as visitor access to facilities, use of contractor access badges, and general physical access to the NCC, computer rooms outside the NCC, and media storage rooms.

  17. Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications

    CERN Document Server

    International Organization for Standardization. Geneva

    1997-01-01

    Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications

  18. Classification of 'Chemlali' accessions according to the geographical area using chemometric methods of phenolic profiles analysed by HPLC-ESI-TOF-MS.

    Science.gov (United States)

    Taamalli, Amani; Arráez Román, David; Zarrouk, Mokhtar; Segura-Carretero, Antonio; Fernández-Gutiérrez, Alberto

    2012-05-01

    The present work describes a classification method of Tunisian 'Chemlali' olive oils based on their phenolic composition and geographical area. For this purpose, the data obtained by HPLC-ESI-TOF-MS from 13 samples of extra virgin olive oils, obtained from different production area throughout the country, were used for this study focusing in 23 phenolics compounds detected. The quantitative results showed a significant variability among the analysed oil samples. Factor analysis method using principal component was applied to the data in order to reduce the number of factors which explain the variability of the selected compounds. The data matrix constructed was subjected to a canonical discriminant analysis (CDA) in order to classify the oil samples. These results showed that 100% of cross-validated original group cases were correctly classified, which proves the usefulness of the selected variables. Copyright © 2011 Elsevier Ltd. All rights reserved.

  19. Choices Outlined 2013-2017. An analysis of ten election programmes for accessibility effects. PBL-CPB background document; Keuzes in kaart 2013-2017. Een analyse van tien verkiezingsprogramma's op bereikbaarheidseffecten. PBL-CPB Achtergronddocument

    Energy Technology Data Exchange (ETDEWEB)

    Zwaneveld, P.; Verrips, A. [CPB Netherlands Bureau for Economic Policy Analysis, The Hague (Netherlands); Hilbers, H.; Zondag, B.; Van Meerkerk, J. [Planbureau voor de Leefomgeving PBL, Den Haag (Netherlands); Weijschede-van der Straaten, W. [CBS Statistics Netherlands, The Hague (Netherlands)

    2012-11-15

    In their report 'Keuzes in Kaart 2013-2017' (Choices outlined 2013-2017) the Netherlands Bureau for Economic Policy Analysis (CPB) and the Environmental Assessment Agency (PBL) made calculations for thirteen themes of the election programs of ten Dutch political parties. Accessibility is one of these thirteen themes. Analyses on this theme were conducted jointly by PBL and CPB. This paper addresses which different political choices the Dutch parties have made for the theme of accessibility, how PBL and CPB conducted analyses and which results were yielded. The effect of the party program is compared to a basic path, the expected image for 2020 based on implementation of the Budget Agreement 2013 ('Spring Agreement'). [Dutch] Het Centraal Planbureau (CPB) en het Planbureau voor de Leefomgeving (PBL) hebben in het rapport 'Keuzes in Kaart 2013-2017' de verkiezingsprogramma's van tien politieke partijen doorgerekend op dertien thema's. Bereikbaarheid is één van de dertien thema's. De analyses rond dit thema zijn gezamenlijk uitgevoerd door PBL en CPB. Dit paper gaat in op welke verschillende politieke keuzes de partijen ten aanzien van bereikbaarheid hebben gemaakt, op welke wijze de planbureaus dit hebben geanalyseerd en tot welke resultaten dit heeft geleid. Het effect van het partijprogramma wordt vergeleken met het 'basispad', het verwachte beeld voor 2020 uitgaande van uitvoering van het Begrotingsakkoord 2013 (het 'Lenteakkoord')

  20. Dynamic Information Management and Exchange for Command and Control Applications, Modelling and Enforcing Category-Based Access Control via Term Rewriting

    Science.gov (United States)

    2015-03-01

    Workshop on Logical and Se- mantic Frameworks, with Applications, Brasilia , Brazil, September 2014. Electronic Notes in Theoretical Computer Science (to... Brasilia , Brazil, September 2014, 2015. [3] S. Barker. The next 700 access control models or a unifying meta-model? In SACMAT 2009, 14th ACM Symposium on

  1. The acceptability and impact of a randomised controlled trial of welfare rights advice accessed via primary health care: qualitative study

    Directory of Open Access Journals (Sweden)

    Howel Denise

    2006-06-01

    Full Text Available Abstract Background Qualitative research is increasingly used alongside randomised controlled trials (RCTs to study a range of factors including participants' experiences of a trial. The need for a sound evidence base within public health will increase the need for RCTs of non-clinical interventions. Welfare rights advice has been proposed as an intervention with potential to reduce health inequalities. This qualitative study, nested within an RCT of the impact of welfare rights advice, examined the acceptability of the intervention, the acceptability of the research process and the perceived impact of the intervention. Methods 25 men and women aged 60 years or over were recruited from four general practices in Newcastle upon Tyne (UK, a sub-sample of those who consented to be contacted (n = 96 during the RCT baseline interview. Semi-structured interviews were undertaken and analysed using the Framework Method. Results Participants viewed the trial positively although, despite agreeing that the information leaflet was clear, some had agreed to participate without being fully aware of what was involved. Some participants were unaware of the implications of randomisation. Most thought it fair, but a few concerns were raised about the control condition. The intervention was acceptable and made participants feel confident about applying for benefit entitlements. 14 out of 25 participants received some financial award; median weekly income gain was £57 (€84, $101. The perceived impact of additional finances was considerable and included: increased affordability of necessities and occasional expenses; increased capacity to deal with emergencies; and a reduction in stress related to financial worries. Overall, perceived independence and ability to participate in society increased. Most participants perceived benefits to their mental well-being, but no-one reported an improvement in physical health. The RCT showed little or no effect on a wide range

  2. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...... and enable wider areas' energy efficiency networking. The energy related information of the networks and the types of the traffic flows are collected and utilized for the end-to-end QoS provision. Dynamic network simulation results show that by applying different routing algorithms according to the type...

  3. SCALE: A modular code system for performing standardized computer analyses for licensing evaluation: Control modules C4, C6

    International Nuclear Information System (INIS)

    1997-03-01

    This Manual represents Revision 5 of the user documentation for the modular code system referred to as SCALE. The history of the SCALE code system dates back to 1969 when the current Computational Physics and Engineering Division at Oak Ridge National Laboratory (ORNL) began providing the transportation package certification staff at the U. S. Atomic Energy Commission with computational support in the use of the new KENO code for performing criticality safety assessments with the statistical Monte Carlo method. From 1969 to 1976 the certification staff relied on the ORNL staff to assist them in the correct use of codes and data for criticality, shielding, and heat transfer analyses of transportation packages. However, the certification staff learned that, with only occasional use of the codes, it was difficult to become proficient in performing the calculations often needed for an independent safety review. Thus, shortly after the move of the certification staff to the U.S. Nuclear Regulatory Commission (NRC), the NRC staff proposed the development of an easy-to-use analysis system that provided the technical capabilities of the individual modules with which they were familiar. With this proposal, the concept of the Standardized Computer Analyses for Licensing Evaluation (SCALE) code system was born. This volume is part of the manual related to the control modules for the newest updated version of this computational package

  4. Effect of relative humidity and temperature control on in-cabin thermal comfort state: Thermodynamic and psychometric analyses

    International Nuclear Information System (INIS)

    Alahmer, A.; Omar, M.A.; Mayyas, A.; Dongri, Shan

    2011-01-01

    This manuscript discusses the effect of manipulating the Relative Humidity RH of in-cabin environment on the thermal comfort and human occupants' thermal sensation. The study uses thermodynamic and psychometric analyses, to incorporate the effect of changing RH along with the dry bulb temperature on human comfort. Specifically, the study computes the effect of changing the relative humidity on the amount of heat rejected from the passenger compartment and the effect of relative humidity on occupants comfort zone. A practical system implementation is also discussed in terms of an evaporative cooler design. The results show that changing the RH along with dry bulb temperature inside vehicular cabins can improve the air conditioning efficiency by reducing the heat removed while improving the Human comfort sensations as measured by the Predicted Mean Value PMV and the Predicted Percentage Dissatisfied PPD indices. - Highlights: → Investigates the effect of controlling the RH and dry bulb temperature on in-cabin thermal comfort and sensation. → Conducts the thermodynamic and psychometric analyses for changing the RH and temperature for in-cabin air conditioning. → Discusses a possible system implementation through an evaporative cooler design.

  5. SCALE: A modular code system for performing standardized computer analyses for licensing evaluation: Control modules C4, C6

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This Manual represents Revision 5 of the user documentation for the modular code system referred to as SCALE. The history of the SCALE code system dates back to 1969 when the current Computational Physics and Engineering Division at Oak Ridge National Laboratory (ORNL) began providing the transportation package certification staff at the U. S. Atomic Energy Commission with computational support in the use of the new KENO code for performing criticality safety assessments with the statistical Monte Carlo method. From 1969 to 1976 the certification staff relied on the ORNL staff to assist them in the correct use of codes and data for criticality, shielding, and heat transfer analyses of transportation packages. However, the certification staff learned that, with only occasional use of the codes, it was difficult to become proficient in performing the calculations often needed for an independent safety review. Thus, shortly after the move of the certification staff to the U.S. Nuclear Regulatory Commission (NRC), the NRC staff proposed the development of an easy-to-use analysis system that provided the technical capabilities of the individual modules with which they were familiar. With this proposal, the concept of the Standardized Computer Analyses for Licensing Evaluation (SCALE) code system was born. This volume is part of the manual related to the control modules for the newest updated version of this computational package.

  6. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    Science.gov (United States)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  7. VT Limited Access Highways

    Data.gov (United States)

    Vermont Center for Geographic Information — A limited-access road, known by various terms worldwide, including limited-access highway, dual carriageway, expressway, and partial controlled access highway, is a...

  8. RESEARCH Improving access and quality of care in a TB control ...

    African Journals Online (AJOL)

    use a quality improvement approach to improve access to and quality of TB diagnosis and care. Integrated HIV/TB/STI audit tools were developed between 2003 and 20066 and routinely implemented in all. 146 public primary care facilities in Cape Town in 2007. The clinical audit emphasised reflective practice and using ...

  9. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered...

  10. Transcriptomic variation among six Arabidopsis thaliana accessions identified several novel genes controlling aluminium tolerance.

    Science.gov (United States)

    Kusunoki, Kazutaka; Nakano, Yuki; Tanaka, Keisuke; Sakata, Yoichi; Koyama, Hiroyuki; Kobayashi, Yuriko

    2017-02-01

    Differences in the expression levels of aluminium (Al) tolerance genes are a known determinant of Al tolerance among plant varieties. We combined transcriptomic analysis of six Arabidopsis thaliana accessions with contrasting Al tolerance and a reverse genetic approach to identify Al-tolerance genes responsible for differences in Al tolerance between accession groups. Gene expression variation increased in the signal transduction process under Al stress and in growth-related processes in the absence of stress. Co-expression analysis and promoter single nucleotide polymorphism searching suggested that both trans-acting polymorphisms of Al signal transduction pathway and cis-acting polymorphisms in the promoter sequences caused the variations in gene expression associated with Al tolerance. Compared with the wild type, Al sensitivity increased in T-DNA knockout (KO) lines for five genes, including TARGET OF AVRB OPERATION1 (TAO1) and an unannotated gene (At5g22530). These were identified from 53 Al-inducible genes showing significantly higher expression in tolerant accessions than in sensitive accessions. These results indicate that the difference in transcriptional signalling is partly associated with the natural variation in Al tolerance in Arabidopsis. Our study also demonstrates the feasibility of comparative transcriptome analysis by using natural genetic variation for the identification of genes responsible for Al stress tolerance. © 2016 John Wiley & Sons Ltd.

  11. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    Science.gov (United States)

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  12. A Novel Architecture for Adaptive Traffic Control in Network on Chip using Code Division Multiple Access Technique

    OpenAIRE

    Fatemeh. Dehghani; Shahram. Darooei

    2016-01-01

    Network on chip has emerged as a long-term and effective method in Multiprocessor System-on-Chip communications in order to overcome the bottleneck in bus based communication architectures. Efficiency and performance of network on chip is so dependent on the architecture and structure of the network. In this paper a new structure and architecture for adaptive traffic control in network on chip using Code Division Multiple Access technique is presented. To solve the problem of synchronous acce...

  13. The dynamic mechanism of presenilin-function: Sensitive gate dynamics and loop unplugging control protein access

    DEFF Research Database (Denmark)

    Somavarapu, Arun Kumar; Kepp, Kasper Planeta

    2016-01-01

    . Dynamically, these features seem linked. The long-range sensitivity of this gate-plug system to subtle conformational changes can explain why so many PSEN1 mutants cause disease. Reduced access and imprecise substrate cleavage associated with impaired gate-plug dynamics is directly illustrated by the effect......-plug mechanism is relevant for designing PSEN1 modulating therapies for treatment of Alzheimer's disease within both the amyloid/γ-secretase hypothesis and within the PSEN1 loss of function paradigm....

  14. Self-optimized admission control for multi-tenant radio access networks

    OpenAIRE

    Pérez Romero, Jordi; Sallent Roig, José Oriol; Ferrús Ferré, Ramón Antonio; Agustí Comes, Ramon

    2018-01-01

    © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes,creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Multi-tenant Radio Access Networks (RANs) are envisaged to play a key role in highly dense scenarios for fulfil...

  15. Physical exercise for patients undergoing hematopoietic stem cell transplantation: systematic review and meta-analyses of randomized controlled trials.

    Science.gov (United States)

    van Haren, Inge E P M; Timmerman, Hans; Potting, Carin M; Blijlevens, Nicole M A; Staal, J Bart; Nijhuis-van der Sanden, Maria W G

    2013-04-01

    The treatment-related burden for patients undergoing hematopoietic stem cell transplantation (HSCT) may be relieved by physical exercises. The purpose of this study was to summarize and analyze the evidence provided by randomized controlled trials (RCTs) on physical exercise interventions among patients with cancer undergoing HSCT. PubMed, CINAHL, EMBASE, the Cochrane Library, and PEDro were searched for relevant RCTs up to October 1, 2011. Two reviewers screened articles on inclusion criteria and indentified relevant RCTs. Two authors assessed the selected articles for risk of bias. Data extraction was performed by 1 reviewer. Meta-analyses were undertaken to estimate the outcomes quality of life (QOL), psychological well-being and distress, and fatigue. Eleven studies were included, with study populations consisting of recipients undergoing either an allogeneic or autologous HSCT (n=734). Four studies had low risk of bias. The exercise interventions were performed before, during, and after hospitalization for the HSCT. Different exercise programs on endurance, resistance and/or activities of daily living training, progressive relaxation, and stretching were used. Meta-analyses showed that exercise during hospitalization led to a higher QOL (weighted mean difference=8.72, 95% confidence interval=3.13, 14.31) and less fatigue (standardized mean difference=0.53, 95% confidence interval=0.16, 0.91) in patients with an allogeneic HSCT at the moment of discharge from the hospital. No marked effects were found for psychological well-being and distress. Individual study results suggested significant positive effects on QOL, fatigue, psychological well-being and distress, and physical functioning. Prevalent shortcomings in the included studies were the heterogeneity among studies and the lack of blinding of participants, personnel, and outcome assessment. The results suggest that recipients of HSCT may benefit from physical exercise.

  16. Controlled cobalt doping in the spinel structure of magnetosome magnetite: New evidences from element- and site-specific XMCD analyses

    Science.gov (United States)

    Pan, Y.; LI, J.; Menguy, N.; Arrio, M. A.; Sainctavit, P.; Juhin, A.; Wang, Y.; Chen, H.; Bunau, O.; Otero, E.; Ohresser, P.

    2016-12-01

    Controlled cobalt doping in the spinel structure of magnetosome magnetite: New evidences from element- and site-specific XMCD analyses Jinhua Li1,2*, Nicolas Menguy2,3, Marie-Anne Arrio3, Philippe Sainctavit3,4, Amélie Juhin3, Yinzhao Wang1,2, Haitao Chen5, Oana Bunau3, Edwige Otero4, Philippe Ohresser4, Yongxin Pan1,21Key Laboratory of Earth and Planetary Physics, Institute of Geology and Geophysics, Chinese Academy of Sciences, Beijing 100029, China. 2France-China Biomineralization and Nano-structures Laboratory, Chinese Academy of Sciences, Beijing 100029, China. 3IMPMC, CNRS UMR 7590, Sorbonne Universités, MNHN, UPMC, IRD UMR 206, 75005 Paris, France. 4Synchrotron SOLEIL, L'Orme des Merisiers Saint-Aubin, 91192 Gif-sur-Yvette Cedex, France. 5Institute of Deep-Sea Science and Engineering, Chinese Academy of Sciences, Sanya 572000, China *To whom correspondence may be addressed. Email: lijinhua@mail.iggcas.ac.cnThe biomineralization of magnetite nanocrystals (called magnetosomes) by magnetotactic bacteria (MTB) has attracted intense interest in biology, geology and materials science. Great efforts have been recently made in producing transition metal-doped magnetosomes with modified magnetic properties for a range of applications. However, the coordination chemistry and magnetism of such metal-doped magnetosomes still remains largely unknown. Here, we present new evidences from X-ray magnetic circular dichroism (XMCD) for element- and site-specific magnetic analyses that cobalt is incorporated in the spinel structure of the magnetosomes within Magnetospirillum magneticum AMB-1 through the replacement of Fe2+ ions by Co2+ ions in octahedral (Oh) sites of magnetite. Compared with non-doped one, cobalt-doped magnetosome sample has lower Verwey transition temperature and larger magnetic coercivity, related to the amount of doped cobalt. This study this study indicates a biologically controlled process on cobalt doping and magnetic alteration by MTB system

  17. Interventions to control myopia progression in children: protocol for an overview of systematic reviews and meta-analyses.

    Science.gov (United States)

    Prousali, Efthymia; Mataftsi, Asimina; Ziakas, Nikolaos; Fontalis, Andreas; Brazitikos, Periklis; Haidich, Anna-Bettina

    2017-09-11

    Myopia is a common visual disorder with increasing prevalence among developed countries of the world. Myopia constitutes a substantial risk factor for several ocular conditions that can lead to blindness. The purpose of this study is to conduct an overview of systematic reviews and meta-analyses in order to identify and appraise robust research evidence regarding the management of myopia progression in children and adolescents. A literature search will be conducted in MEDLINE, EMBASE, The Cochrane Database of Systematic Reviews (CDSR), Database of Abstracts of Reviews of Effects (DARE), and Health Technology Assessment (HTA) Database via Centre for Reviews and Dissemination (CRD). We will search for systematic reviews or meta-analyses that examine optical or pharmaceutical modalities for myopia control. Two independent overview authors will screen the titles and abstracts against the eligibility criteria. Individual study's methodological quality and quality of evidence for each outcome of interest will be assessed by two independent authors using the ROBIS tool and GRADE rating, respectively. In cases of disagreement, consensus will be reached with the help of a third author. Our primary outcomes will be the mean change in refractive error, mean axial length change, and adverse events. A citation matrix will be generated, and the corrected covered area (CCA) will be estimated, in order to identify overlapping primary studies. Possible meta-biases and measures of heterogeneity will be described, and cases of dual co-authorship will be identified and discussed. If any recently published randomized controlled trials (RCTs) are detected, these will be appraised and their findings will be presented. An overall summary of outcomes will be provided using descriptive statistics and will be supplemented by narrative synthesis. This overview will examine the high level of existing evidence for treatment of myopia progression. Efficient interventions will be identified, and

  18. Proposing hierarchy-similarity based access control framework: A multilevel Electronic Health Record data sharing approach for interoperable environment

    Directory of Open Access Journals (Sweden)

    Shalini Bhartiya

    2017-10-01

    Full Text Available Interoperability in healthcare environment deals with sharing of patient’s Electronic Health Records (EHR with fellow professionals in inter as well as intra departments or organizations. Healthcare environment experiences frequent shifting of doctors, paramedical staff in inter as well as intra departments or hospitals. The system exhibits dynamic attributes of users and resources managed through access control policies defined for that environment. Rules obtained on merging of such policies often generate policy-conflicts thereby resulting in undue data leakages to unintended users. This paper proposes an access control framework that applies a Hierarchy Similarity Analyzer (HSA on the policies need to be merged. It calculates a Security_Level (SL and assigns it to the users sharing data. The SL determines the authorized amount of data that can be shared on successful collaboration of two policies. The proposed framework allows integration of independent policies and identifies the possible policy-conflicts arising due to attribute disparities in defined rules. The framework is implemented on XACML policies and compared with other access models designed using centralized and decentralized approaches. Conditional constraints and properties are defined that generate policy-conflicts as prevalent in the policies.

  19. Acupuncture-Related Techniques for Psoriasis: A Systematic Review with Pairwise and Network Meta-Analyses of Randomized Controlled Trials.

    Science.gov (United States)

    Yeh, Mei-Ling; Ko, Shu-Hua; Wang, Mei-Hua; Chi, Ching-Chi; Chung, Yu-Chu

    2017-12-01

    There has be a large body of evidence on the pharmacological treatments for psoriasis, but whether nonpharmacological interventions are effective in managing psoriasis remains largely unclear. This systematic review conducted pairwise and network meta-analyses to determine the effects of acupuncture-related techniques on acupoint stimulation for the treatment of psoriasis and to determine the order of effectiveness of these remedies. This study searched the following databases from inception to March 15, 2016: Medline, PubMed, Cochrane Central Register of Controlled Trials, EBSCO (including Academic Search Premier, American Doctoral Dissertations, and CINAHL), Airiti Library, and China National Knowledge Infrastructure. Randomized controlled trials (RCTs) on the effects of acupuncture-related techniques on acupoint stimulation as intervention for psoriasis were independently reviewed by two researchers. A total of 13 RCTs with 1,060 participants were included. The methodological quality of included studies was not rigorous. Acupoint stimulation, compared with nonacupoint stimulation, had a significant treatment for psoriasis. However, the most common adverse events were thirst and dry mouth. Subgroup analysis was further done to confirm that the short-term treatment effect was superior to that of the long-term effect in treating psoriasis. Network meta-analysis identified acupressure or acupoint catgut embedding, compared with medication, and had a significant effect for improving psoriasis. It was noted that acupressure was the most effective treatment. Acupuncture-related techniques could be considered as an alternative or adjuvant therapy for psoriasis in short term, especially of acupressure and acupoint catgut embedding. This study recommends further well-designed, methodologically rigorous, and more head-to-head randomized trials to explore the effects of acupuncture-related techniques for treating psoriasis.

  20. SCALE: A modular code system for performing standardized computer analyses for licensing evaluation. Control modules -- Volume 1, Revision 4

    Energy Technology Data Exchange (ETDEWEB)

    Landers, N.F.; Petrie, L.M.; Knight, J.R. [Oak Ridge National Lab., TN (United States)] [and others

    1995-04-01

    SCALE--a modular code system for Standardized Computer Analyses Licensing Evaluation--has been developed by Oak Ridge National Laboratory at the request of the US Nuclear Regulatory Commission. The SCALE system utilizes well-established computer codes and methods within standard analysis sequences that (1) allow an input format designed for the occasional user and/or novice, (2) automate the data processing and coupling between modules, and (3) provide accurate and reliable results. System development has been directed at problem-dependent cross-section processing and analysis of criticality safety, shielding, heat transfer, and depletion/decay problems. Since the initial release of SCALE in 1980, the code system has been heavily used for evaluation of nuclear fuel facility and package designs. This revision documents Version 4.2 of the system. This manual is divided into three volumes: Volume 1--for the control module documentation, Volume 2--for the functional module documentation, and Volume 3 for the documentation of the data libraries and subroutine libraries.

  1. Control volume analyses of glottal flow using a fully-coupled numerical fluid-structure interaction model

    Science.gov (United States)

    Yang, Jubiao; Krane, Michael; Zhang, Lucy

    2013-11-01

    Vocal fold vibrations and the glottal jet are successfully simulated using the modified Immersed Finite Element method (mIFEM), a fully coupled dynamics approach to model fluid-structure interactions. A self-sustained and steady vocal fold vibration is captured given a constant pressure input at the glottal entrance. The flow rates at different axial locations in the glottis are calculated, showing small variations among them due to the vocal fold motion and deformation. To further facilitate the understanding of the phonation process, two control volume analyses, specifically with Bernoulli's equation and Newton's 2nd law, are carried out for the glottal flow based on the simulation results. A generalized Bernoulli's equation is derived to interpret the correlations between the velocity and pressure temporally and spatially along the center line which is a streamline using a half-space model with symmetry boundary condition. A specialized Newton's 2nd law equation is developed and divided into terms to help understand the driving mechanism of the glottal flow.

  2. Profiling of Accessible Chromatin Regions across Multiple Plant Species and Cell Types Reveals Common Gene Regulatory Principles and New Control Modules.

    Science.gov (United States)

    Maher, Kelsey A; Bajic, Marko; Kajala, Kaisa; Reynoso, Mauricio; Pauluzzi, Germain; West, Donnelly A; Zumstein, Kristina; Woodhouse, Margaret; Bubb, Kerry; Dorrity, Michael W; Queitsch, Christine; Bailey-Serres, Julia; Sinha, Neelima; Brady, Siobhan M; Deal, Roger B

    2018-01-01

    The transcriptional regulatory structure of plant genomes remains poorly defined relative to animals. It is unclear how many cis -regulatory elements exist, where these elements lie relative to promoters, and how these features are conserved across plant species. We employed the assay for transposase-accessible chromatin (ATAC-seq) in four plant species ( Arabidopsis thaliana , Medicago truncatula , Solanum lycopersicum , and Oryza sativa ) to delineate open chromatin regions and transcription factor (TF) binding sites across each genome. Despite 10-fold variation in intergenic space among species, the majority of open chromatin regions lie within 3 kb upstream of a transcription start site in all species. We find a common set of four TFs that appear to regulate conserved gene sets in the root tips of all four species, suggesting that TF-gene networks are generally conserved. Comparative ATAC-seq profiling of Arabidopsis root hair and non-hair cell types revealed extensive similarity as well as many cell-type-specific differences. Analyzing TF binding sites in differentially accessible regions identified a MYB-driven regulatory module unique to the hair cell, which appears to control both cell fate regulators and abiotic stress responses. Our analyses revealed common regulatory principles among species and shed light on the mechanisms producing cell-type-specific transcriptomes during development. © 2018 American Society of Plant Biologists. All rights reserved.

  3. Advance reservation access control using software-defined networking and tokens

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar; Rao, Nageswara S. V.; Foster, Ian T.; Clark, Russ; Owen, Henry

    2018-02-01

    Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present here a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization. We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. We conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network. (C) 2017 Elsevier B.V. All rights reserved.

  4. Accessing memory

    Science.gov (United States)

    Yoon, Doe Hyun; Muralimanohar, Naveen; Chang, Jichuan; Ranganthan, Parthasarathy

    2017-09-26

    A disclosed example method involves performing simultaneous data accesses on at least first and second independently selectable logical sub-ranks to access first data via a wide internal data bus in a memory device. The memory device includes a translation buffer chip, memory chips in independently selectable logical sub-ranks, a narrow external data bus to connect the translation buffer chip to a memory controller, and the wide internal data bus between the translation buffer chip and the memory chips. A data access is performed on only the first independently selectable logical sub-rank to access second data via the wide internal data bus. The example method also involves locating a first portion of the first data, a second portion of the first data, and the second data on the narrow external data bus during separate data transfers.

  5. Questa baseline and pre-mining ground-water-quality investigation. 16. Quality assurance and quality control for water analyses

    Science.gov (United States)

    McCleskey, R. Blaine; Nordstrom, D. Kirk; Naus, Cheryl A.

    2004-01-01

    The Questa baseline and pre-mining ground-water quality investigation has the main objective of inferring the ground-water chemistry at an active mine site. Hence, existing ground-water chemistry and its quality assurance and quality control is of crucial importance to this study and a substantial effort was spent on this activity. Analyses of seventy-two blanks demonstrated that contamination from processing, handling, and analyses were minimal. Blanks collected using water deionized with anion and cation exchange resins contained elevated concentrations of boron (0.17 milligrams per liter (mg/L)) and silica (3.90 mg/L), whereas double-distilled water did not. Boron and silica were not completely retained by the resins because they can exist as uncharged species in water. Chloride was detected in ten blanks, the highest being 3.9 mg/L, probably as the result of washing bottles, filter apparatuses, and tubing with hydrochloric acid. Sulfate was detected in seven blanks; the highest value was 3.0 mg/L, most likely because of carryover from the high sulfate waters sampled. With only a few exceptions, the remaining blank analyses were near or below method detection limits. Analyses of standard reference water samples by cold-vapor atomic fluorescence spectrometry, ion chromatography, inductively coupled plasma-optical emission spectrometry, inductively coupled plasma-mass spectrometry, FerroZine, graphite furnace atomic absorption spectrometry, hydride generation atomic spectrometry, and titration provided an accuracy check. For constituents greater than 10 times the detection limit, 95 percent of the samples had a percent error of less than 8.5. For constituents within 10 percent of the detection limit, the percent error often increased as a result of measurement imprecision. Charge imbalance was calculated using WATEQ4F and 251 out of 257 samples had a charge imbalance less than 11.8 percent. The charge imbalance for all samples ranged from -16 to 16 percent. Spike

  6. An Open-Access Educational Tool for Teaching Motion Dynamics in Multi-Axis Servomotor Control

    Science.gov (United States)

    Rivera-Guillen, J. R.; de Jesus Rangel-Magdaleno, J.; de Jesus Romero-Troncoso, R.; Osornio-Rios, R. A.; Guevara-Gonzalez, R. G.

    2012-01-01

    Servomotors are widely used in computerized numerically controlled (CNC) machines, hence motion control is a major topic covered in undergraduate/graduate engineering courses. Despite the fact that several syllabi include the motion dynamics topic in their courses, there are neither suitable tools available for designing and simulating multi-axis…

  7. Enhancing Security and Privacy in Video Surveillance through Role-Oriented Access Control Mechanism

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim

    sensitive regions, e.g. faces, from the videos. However, very few research efforts have focused on addressing the security aspects of video surveillance data and on authorizing access to this data. Interestingly, while PETs help protect the privacy of individuals, they may also hinder the usefulness...... of video surveillance systems resulting in compromising the very purpose of such systems, i.e. public safety. Thus the challenge is to provide sufficient need-specific data to those monitoring the surveillance systems yet preserving the privacy of people as much as possible. This can be achieved through...... security and privacy requirements in a video surveillance system. We study existing solutions against these requirements and point out practical challenges in ensuring the security of video surveillance data in all stages (in transit and at storage). Our study shows a gap, between the security requirements...

  8. Utilizing SELinux to mandate ultra-secure access control of medical records.

    Science.gov (United States)

    Croll, Peter R; Henricksen, Matt; Caelli, Bill; Liu, Vicky

    2007-01-01

    Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure that sensitive health information can be adequately protected yet still be accessible only to those that "need-to-know". To achieve this and ensure sustainability over the longer term, it is advocated that an alternative, stable and secure system architecture is required. This paper considers the adoption of a model targeted at health information that provides much higher degrees of protection. A purpose built demonstrator that was developed based on enterprise-level systems software products is detailed. The long term aim is to provide a viable solution by utilizing contemporary, commercially supported operating system and allied software. The advantages and limitations in its application with a medical database are discussed. The future needs in terms of research, software development and changes in organizational policy for healthcare providers, are outlined.

  9. Sami-speaking municipalities and a control group's access to somatic specialist health care (SHC): a retrospective study on general practitioners’ referrals

    Science.gov (United States)

    Norum, Jan; Nieder, Carsten

    2012-01-01

    Objectives The Sami people constitute the indigenous people in northern Norway. The objective of this study was to clarify whether they have a similar supply of somatic specialist health care (SHC) as others. Methods The referrals from general practitioners (GPs) in the primary health care (PHC) in the administration area of the Sami language law (8 municipalities) were matched with a control group of 11 municipalities. Population data was accessed from Statistics Norway and the time period 2007–2010 was analysed. The main outcome was the number of referrals per 1,000 inhabitants according to age group, gender and place of living. Results 504,292 referrals in northern Norway were indentified and the Sami and control group constituted 23,093 and 22,541 referrals, respectively. The major findings were a similar referral ratio (RR) (1.14 and 1.17) (p =0.624) and women more commonly referred (female/male ratio 1.45 and 1.41) in both groups. GPs in both groups were loyal to their local hospital trust. Conclusion Inhabitants in Sami-speaking municipalities in northern Norway have a similar supply of SHC services as controls. Inter-municipal variation was significant in both groups. PMID:22456052

  10. Sami-speaking municipalities and a control group's access to somatic specialist health care (SHC: a retrospective study on general practitioners’ referrals

    Directory of Open Access Journals (Sweden)

    Jan Norum

    2012-03-01

    Full Text Available Objectives: The Sami people constitute the indigenous people in northern Norway. The objective of this study was to clarify whether they have a similar supply of somatic specialist health care (SHC as others. Methods: The referrals from general practitioners (GPs in the primary health care (PHC in the administration area of the Sami language law (8 municipalities were matched with a control group of 11 municipalities. Population data was accessed from Statistics Norway and the time period 2007–2010 was analysed. The main outcome was the number of referrals per 1,000 inhabitants according to age group, gender and place of living. Results: 504,292 referrals in northern Norway were indentified and the Sami and control group constituted 23,093 and 22,541 referrals, respectively. The major findings were a similar referral ratio (RR (1.14 and 1.17 (p = 0.624 and women more commonly referred (female/male ratio 1.45 and 1.41 in both groups. GPs in both groups were loyal to their local hospital trust. Conclusion: Inhabitants in Sami-speaking municipalities in northern Norway have a similar supply of SHC services as controls. Inter-municipal variation was significant in both groups.

  11. Sami-speaking municipalities and a control group's access to somatic specialist health care (SHC): a retrospective study on general practitioners' referrals.

    Science.gov (United States)

    Norum, Jan; Nieder, Carsten

    2012-03-19

    The Sami people constitute the indigenous people in northern Norway. The objective of this study was to clarify whether they have a similar supply of somatic specialist health care (SHC) as others. The referrals from general practitioners (GPs) in the primary health care (PHC) in the administration area of the Sami language law (8 municipalities) were matched with a control group of 11 municipalities. Population data was accessed from Statistics Norway and the time period 2007-2010 was analysed. The main outcome was the number of referrals per 1,000 inhabitants according to age group, gender and place of living. 504,292 referrals in northern Norway were indentified and the Sami and control group constituted 23,093 and 22,541 referrals, respectively. The major findings were a similar referral ratio (RR) (1.14 and 1.17) (p = 0.624) and women more commonly referred (female/male ratio 1.45 and 1.41) in both groups. GPs in both groups were loyal to their local hospital trust. Inhabitants in Sami-speaking municipalities in northern Norway have a similar supply of SHC services as controls. Inter-municipal variation was significant in both groups.

  12. Targeting Patient Subgroups With Chronic Low Back Pain for Osteopathic Manipulative Treatment: Responder Analyses From a Randomized Controlled Trial.

    Science.gov (United States)

    Licciardone, John C; Gatchel, Robert J; Aryal, Subhash

    2016-03-01

    Osteopathic manipulative treatment (OMT) is often used to treat patients with low back pain (LBP). To identify subgroups of patients with chronic LBP who achieve medium to large treatment effects with OMT based on responder analyses involving pain and functioning outcomes from the OSTEOPAThic Health outcomes In Chronic low back pain (OSTEOPATHIC) Trial. This randomized, double-blind, sham-controlled trial involving 455 patients in Dallas-Fort Worth was conducted from 2006 to 2011. A 100-mm visual analog scale (VAS) for LBP intensity and the Roland-Morris Disability Questionnaire (RMDQ) for back-specific functioning were used to assess primary and secondary outcomes, respectively. Substantial improvement was defined as 50% or greater reduction at week 12 compared with baseline. Cumulative distribution functions for the RR and number-needed-to-treat (NNT) were used to assess response. Medium treatment effects for LBP intensity were observed overall (RR, 1.41; 95% CI, 1.13-1.76; P=.002; NNT, 6.9; 95% CI, 4.3-18.6). However, large treatment effects were observed in patients with baseline VAS scores of 35 mm or greater. Although OMT was not associated with overall substantial improvement in back-specific functioning, patients with baseline RMDQ scores of 7 or greater experienced medium effects, and patients with baseline scores 16 or greater experienced large effects that were significant. The OMT effects for LBP intensity and back-specific functioning were independent of baseline patient demographic characteristics, comorbid medical conditions, and medication use for LBP during the trial. Subgrouping according to baseline levels of chronic LBP intensity and back-specific functioning appears to be a simple strategy for identifying sizeable numbers of patients who achieve substantial improvement with OMT and may thereby be less likely to use more costly and invasive interventions. (ClinicalTrials.gov number NCT00315120).

  13. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    Science.gov (United States)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are

  14. Oversight Review: Quality Control Review of Army Audit Agency's Special Access Program Audits

    National Research Council Canada - National Science Library

    2005-01-01

    .... The Government Auditing Standards (GAS) require that an audit organization performing audits and/or attestation engagements in accordance with GAS should have an appropriate internal quality control system in place and undergo an external...

  15. Oversight Review: Quality Control Review of Air Force Audit Agency's Special Access Program Audits

    National Research Council Canada - National Science Library

    2005-01-01

    .... The Government Auditing Standards (GAS) require that an audit organization performing audits and/or attestation engagements in accordance with GAS should have an appropriate internal quality control system in place and undergo an external...

  16. Oversight Review: Quality Control Review of Naval Audit Service's Special Access Program Audits

    National Research Council Canada - National Science Library

    2005-01-01

    .... The Government Auditing Standards (GAS) require that an audit organization performing audits and/or attestation engagements in accordance with GAS should have an appropriate internal quality control system in place and undergo an external...

  17. Bathymetric control of warm ocean water access along the East Antarctic Margin

    Science.gov (United States)

    Nitsche, F. O.; Porter, D.; Williams, G.; Cougnon, E. A.; Fraser, A. D.; Correia, R.; Guerrero, R.

    2017-09-01

    Observed thinning of the Totten Glacier in East Antarctica has cast doubt upon the stability of the East Antarctic Ice Sheet. Recent oceanographic observations at the front of the Totten Ice Shelf have confirmed the presence of modified Circumpolar Deep Water (mCDW), which likely promotes enhanced melting. Details of how this water accesses the shelf remain uncertain. Here we present new bathymetry and autumnal oceanographic data from the outer continental shelf, north of the Totten Glacier, that show up to 0.7°C mCDW in a >100 km wide and >500 m deep depression within the shelf break. In other parts of East Antarctica, a shelf break bathymetry shallower than 400 m prevents these warmer waters from entering the shelf environment. Our observations demonstrate that detailed knowledge of the bathymetry is critical to correctly model the across-shelf exchange of warm water to the various glaciers/ice shelves of Antarctica for future sea level prediction.

  18. Embedded System for Prosthetic Control Using Implanted Neuromuscular Interfaces Accessed Via an Osseointegrated Implant.

    Science.gov (United States)

    Mastinu, Enzo; Doguet, Pascal; Botquin, Yohan; Hakansson, Bo; Ortiz-Catalan, Max

    2017-08-01

    Despite the technological progress in robotics achieved in the last decades, prosthetic limbs still lack functionality, reliability, and comfort. Recently, an implanted neuromusculoskeletal interface built upon osseointegration was developed and tested in humans, namely the Osseointegrated Human-Machine Gateway. Here, we present an embedded system to exploit the advantages of this technology. Our artificial limb controller allows for bioelectric signals acquisition, processing, decoding of motor intent, prosthetic control, and sensory feedback. It includes a neurostimulator to provide direct neural feedback based on sensory information. The system was validated using real-time tasks characterization, power consumption evaluation, and myoelectric pattern recognition performance. Functionality was proven in a first pilot patient from whom results of daily usage were obtained. The system was designed to be reliably used in activities of daily living, as well as a research platform to monitor prosthesis usage and training, machine-learning-based control algorithms, and neural stimulation paradigms.

  19. Proposal for the award of a contract for the supply, installation and maintenance of access control systems

    CERN Document Server

    2000-01-01

    This document concerns the award of a contract for the supply, installation and maintenance of access control systems. Following a market survey carried out among 93 firms in fifteen Member States, a call for tenders (IT-2681/ST) was sent on 23 June 2000 to two firms, nine consortia each consisting of two firms and one consortium consisting of three firms, in nine Member States. By the closing date, CERN had received three tenders from three consortia in five Member States. The Finance Committee is invited to agree to the negotiation of a contract with the consortium GTD (ES) - ALSTOM (FR), the lowest bidder, for the supply, installation and maintenance of access control systems for a total amount of 4 305 892 euros (6 581 987 Swiss francs), not subject to revision. The above amount in Swiss francs has been calculated using the rate of exchange indicated in the tender. The firm has indicated the following distribution by country of the contract value covered by this adjudication proposal: ES-36%, FR-36%, GB-1...

  20. Proposal for a Change of Contractor for Facilities Management and to Negotiate a Contract for Access Control Activities at CERN

    CERN Document Server

    2003-01-01

    This document concerns the change of contractor for the facilities management and the negotiation, without competitive tendering, of a contract for the security and access control activities at CERN. In March 2002, the Finance Committee agreed to the negotiation of a contract with the consortium M+W ZANDER (DE) - AVIREAL (CH) for the execution of facilities management (CERN/FC/4550). For the reasons set out in this document, the Finance Committee is invited to agree to the negotiation of a contract with the firm INGEST FACILITY (IT), the second lowest bidder, for the execution of the contract for facilities management, not including the security and access control activities, for an initial period of three years and for an amount not exceeding 24 396 000 euros (35 772 000 Swiss francs), not subject to revision. The contract will include options for two further one-year extensions beyond the initial three-year period. The rate of exchange used is that stipulated in the tender. The firm has indicated the follow...

  1. Reputation-based ontology alignment for autonomy and interoperability in distributed access control

    NARCIS (Netherlands)

    Trivellato, Daniel; Spiessens, Fred; Zannone, Nicola; Etalle, Sandro

    2009-01-01

    Vocabulary alignment is a main challenge in distributedaccess control as peers should understand each other’spolicies unambiguously. Ontologies enable mutual understanding among peers by providing a precise semantics to concepts and relationships in a domain. However, due to the distributed nature

  2. Nectar accessibility determines fitness, flower choice and abundance of hoverflies that provide natural pest control

    NARCIS (Netherlands)

    van Rijn, P.C.J.; Wäckers, F.L.

    2016-01-01

    1. In modern agricultural landscapes, many organisms providing ecosystem services such as pollination and natural pest control are likely constrained by shortage of nectar and/or pollen required for adult nutrition. More and more flower-rich field margin strips and other habitats are created to

  3. Suicidal Behavior and Firearm Access: Results from the Second Injury Control and Risk Survey

    Science.gov (United States)

    Betz, Marian E.; Barber, Catherine; Miller, Matthew

    2011-01-01

    The association between home firearms and the likelihood and nature of suicidal thoughts and plans was examined using the Second Injury Control and Risk Survey, a 2001-2003 representative telephone survey of U.S. households. Of 9,483 respondents, 7.4% reported past-year suicidal thoughts, 21.3% with a plan. Similar proportions of those with and…

  4. Design and Implementation of a Multi-Modal Biometric System for Company Access Control

    Directory of Open Access Journals (Sweden)

    Elisabetta Stefani

    2017-05-01

    Full Text Available This paper is about the design, implementation, and deployment of a multi-modal biometric system to grant access to a company structure and to internal zones in the company itself. Face and iris have been chosen as biometric traits. Face is feasible for non-intrusive checking with a minimum cooperation from the subject, while iris supports very accurate recognition procedure at a higher grade of invasivity. The recognition of the face trait is based on the Local Binary Patterns histograms, and the Daughman’s method is implemented for the analysis of the iris data. The recognition process may require either the acquisition of the user’s face only or the serial acquisition of both the user’s face and iris, depending on the confidence level of the decision with respect to the set of security levels and requirements, stated in a formal way in the Service Level Agreement at a negotiation phase. The quality of the decision depends on the setting of proper different thresholds in the decision modules for the two biometric traits. Any time the quality of the decision is not good enough, the system activates proper rules, which ask for new acquisitions (and decisions, possibly with different threshold values, resulting in a system not with a fixed and predefined behaviour, but one which complies with the actual acquisition context. Rules are formalized as deduction rules and grouped together to represent “response behaviors” according to the previous analysis. Therefore, there are different possible working flows, since the actual response of the recognition process depends on the output of the decision making modules that compose the system. Finally, the deployment phase is described, together with the results from the testing, based on the AT&T Face Database and the UBIRIS database.

  5. Proactive behavior, but not inhibitory control, predicts repeated innovation by spotted hyenas tested with a multi-access box.

    Science.gov (United States)

    Johnson-Ulrich, Lily; Johnson-Ulrich, Zoe; Holekamp, Kay

    2018-03-06

    Innovation is widely linked to cognitive ability, brain size, and adaptation to novel conditions. However, successful innovation appears to be influenced by both cognitive factors, such as inhibitory control, and non-cognitive behavioral traits. We used a multi-access box (MAB) paradigm to measure repeated innovation, the number of unique innovations learned across trials, by 10 captive spotted hyenas (Crocuta crocuta). Spotted hyenas are highly innovative in captivity and also display striking variation in behavioral traits, making them good model organisms for examining the relationship between innovation and other behavioral traits. We measured persistence, motor diversity, motivation, activity, efficiency, inhibitory control, and neophobia demonstrated by hyenas while interacting with the MAB. We also independently assessed inhibitory control with a detour cylinder task. Most hyenas were able to solve the MAB at least once, but only four hyenas satisfied learning criteria for all four possible solutions. Interestingly, neither measure of inhibitory control predicted repeated innovation. Instead, repeated innovation was predicted by a proactive syndrome of behavioral traits that included high persistence, high motor diversity, high activity and low neophobia. Our results suggest that this proactive behavioral syndrome may be more important than inhibitory control for successful innovation with the MAB by members of this species.

  6. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

    OpenAIRE

    Luo, Ming; Luo, Yi; Wan, Yuwei; Wang, Ze

    2018-01-01

    Nowadays wireless sensor network (WSN) is increasingly being used in the Internet of Things (IoT) for data collection, and design of an access control scheme that allows an Internet user as part of IoT to access the WSN becomes a hot topic. A lot of access control schemes have been proposed for the WSNs in the context of the IoT. Nevertheless, almost all of these schemes assume that communication nodes in different network domains share common system parameters, which is not suitable for cros...

  7. Providing open access data online to advance malaria research and control.

    Science.gov (United States)

    Moyes, Catherine L; Temperley, William H; Henry, Andrew J; Burgert, Clara R; Hay, Simon I

    2013-05-16

    To advance research on malaria, the outputs from existing studies and the data that fed into them need to be made freely available. This will ensure new studies can build on the work that has gone before. These data and results also need to be made available to groups who are developing public health policies based on up-to-date evidence. The Malaria Atlas Project (MAP) has collated and geopositioned over 50,000 parasite prevalence and vector occurrence survey records contributed by over 3,000 sources including research groups, government agencies and non-governmental organizations worldwide. This paper describes the results of a project set up to release data gathered, used and generated by MAP. Requests for permission to release data online were sent to 236 groups who had contributed unpublished prevalence (parasite rate) surveys. An online explorer tool was developed so that users can visualize the spatial distribution of the vector and parasite survey data before downloading it. In addition, a consultation group was convened to provide advice on the mode and format of release for data generated by MAP's modelling work. New software was developed to produce a suite of publication-quality map images for download from the internet for use in external publications. More than 40,000 survey records can now be visualized on a set of dynamic maps and downloaded from the MAP website on a free and unrestricted basis. As new data are added and new permissions to release existing data come in, the volume of data available for download will increase. The modelled data output from MAP's own analyses are also available online in a range of formats, including image files and GIS surface data, for use in advocacy, education, further research and to help parameterize or validate other mathematical models.

  8. Towards a quality-controlled and accessible Pitzer model for seawater and related systems

    Directory of Open Access Journals (Sweden)

    David Turner

    2016-09-01

    Full Text Available We elaborate the need for a quality-controlled chemical speciation model for seawater and related natural waters, work which forms the major focus of SCOR Working Group 145. Model development is based on Pitzer equations for the seawater electrolyte and trace components. These equations can be used to calculate activities of dissolved ions and molecules and, in combination with thermodynamic equilibrium constants, chemical speciation. The major tasks to be addressed are ensuring internal consistency of the Pitzer model parameters (expressing the interactions between pairs and triplets of species, which ultimately determines the calculated activities, assessing uncertainties, and identifying important data gaps that should be addressed by new measurements. It is recognised that natural organic matter plays an important role in many aquatic ecosystems, and options for including this material in a Pitzer-based model are discussed. The process of model development begins with the core components which include the seawater electrolyte and the weak acids controlling pH. This core model can then be expanded by incorporating additional chemical components, changing the standard seawater composition and/or broadening the range of temperature and pressure, without compromising its validity. Seven important areas of application are identified: open ocean acidification; micro-nutrient biogeochemistry and geochemical tracers; micro-nutrient behaviour in laboratory studies; water quality in coastal and estuarine waters; cycling of nutrients and trace metals in pore waters; chemical equilibria in hydrothermal systems; brines and salt lakes.

  9. Family Access to a Dentist Study (FADS): A Multi-Center Randomized Controlled Trial

    Science.gov (United States)

    Nelson, Suchitra; Riedy, Christine; Albert, Jeffrey M; Lee, Wonik; Slusar, Mary Beth; Curtan, Shelley; Ferretti, Gerald; Cunha-Cruz, Joana; Milgrom, Peter

    2015-01-01

    Introduction Many low-income parent/caregivers do not understand the importance of cavity-free primary (baby) teeth and the chronic nature of dental caries (tooth decay). As a consequence, dental preventive and treatment utilization is low even when children are screened in schools and referred for care. This study aims to test a referral letter and Dental Information Guide (DIG) designed using the Common-Sense Model of Self-Regulation (CSM) framework to improve caregivers’ illness perception of dental caries and increase utilization of care by children with restorative dental needs. Methods A multi-site randomized controlled trial with caregivers of Kindergarten to 4th grade children in urban Ohio and rural Washington State will compare five arms: (1) CSM referral letter alone; (2) CSM referral letter + DIG; (3) reduced CSM referral letter alone; (4) reduced CSM referral letter + DIG; (5) standard (control) referral. At baseline, children will be screened at school to determine restorative dental needs. If in need of treatment, caregivers will be randomized to study arms and an intervention packet will be sent home. The primary outcome will be dental care based on a change in oral health status by clinical examination 7 months post-screening (ICDAS sealant codes 1 and 2; restoration codes 3–8; extraction). Enrollment commenced summer 2015 with results in summer 2016. Conclusion This study uses the CSM framework to develop and test behavioral interventions to increase dental utilization among low-income caregivers. If effective this simple intervention has broad applicability in clinical and community-based settings. PMID:26500170

  10. Clinical Effectiveness, Access to, and Satisfaction with Care Using a Telehomecare Substitution Intervention: A Randomized Controlled Trial

    Directory of Open Access Journals (Sweden)

    Kathryn H. Bowles

    2011-01-01

    Full Text Available Background. Hospitalization accounts for 70% of heart failure (HF costs; readmission rates at 30 days are 24% and rise to 50% by 90 days. Agencies anticipate that telehomecare will provide the close monitoring necessary to prevent HF readmissions. Methods and Results. Randomized controlled trial to compare a telehomecare intervention for patients 55 and older following hospital discharge for HF to usual skilled home care. Primary endpoints were 30- and 60-day all-cause and HF readmission, hospital days, and time to readmission or death. Secondary outcomes were access to care, emergency department (ED use, and satisfaction with care. All-cause readmissions at 30 days (16% versus 19% and over six months (46% versus 52% were lower in the telehomecare group but were not statistically significant. Access to care and satisfaction were significantly higher for the telehomecare patients, including the number of in-person visits and days in home care. Conclusions. Patient acceptance of the technology and current home care policies and processes of care were barriers to gaining clinical effectiveness and efficiency.

  11. Dynamic Cognitive Self-Organized TDMA for Medium Access Control in Real-Time Vehicle to Vehicle Communications

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2013-01-01

    Full Text Available The emergence of intelligent transport systems has brought out a new set of requirements on wireless communication. To cope with these requirements, several proposals are currently under discussion. In this highly mobile environment, the design of a prompt, efficient, flexible, and reliable medium access control, able to cover the specific constraints of the named real-time communications applications, is still unsolved. This paper presents the original proposal integrating Non-Cooperative Cognitive Time Division Multiple Access (NCC-TDMA based on Cognitive Radio (CR techniques to obtain a mechanism which complies with the requirements of real-time communications. Though the proposed MAC uses a slotted channel, it can be adapted to operate on the physical layer of different standards. The authors’ analysis considers the IEEE WAVE and 802.11p as the standards of reference. The mechanism also offers other advantages, such as avoiding signalling and the adaptation capacity to channel conditions and interferences. The solution is applied to the problem of units merging a convoy. Comparison results between NCC-TDMA and Slotted-Aloha are included.

  12. Rat Strain Ontology: structured controlled vocabulary designed to facilitate access to strain data at RGD.

    Science.gov (United States)

    Nigam, Rajni; Munzenmaier, Diane H; Worthey, Elizabeth A; Dwinell, Melinda R; Shimoyama, Mary; Jacob, Howard J

    2013-11-22

    The Rat Genome Database (RGD) ( http://rgd.mcw.edu/) is the premier site for comprehensive data on the different strains of the laboratory rat (Rattus norvegicus). The strain data are collected from various publications, direct submissions from individual researchers, and rat providers worldwide. Rat strain, substrain designation and nomenclature follow the Guidelines for Nomenclature of Mouse and Rat Strains, instituted by the International Committee on Standardized Genetic Nomenclature for Mice. While symbols and names aid in identifying strains correctly, the flat nature of this information prohibits easy search and retrieval, as well as other data mining functions. In order to improve these functionalities, particularly in ontology-based tools, the Rat Strain Ontology (RS) was developed. The Rat Strain Ontology (RS) reflects the breeding history, parental background, and genetic manipulation of rat strains. This controlled vocabulary organizes strains by type: inbred, outbred, chromosome altered, congenic, mutant and so on. In addition, under the chromosome altered category, strains are organized by chromosome, and further by type of manipulations, such as mutant or congenic. This allows users to easily retrieve strains of interest with modifications in specific genomic regions. The ontology was developed using the Open Biological and Biomedical Ontology (OBO) file format, and is organized on the Directed Acyclic Graph (DAG) structure. Rat Strain Ontology IDs are included as part of the strain report (RS: ######). As rat researchers are often unaware of the number of substrains or altered strains within a breeding line, this vocabulary now provides an easy way to retrieve all substrains and accompanying information. Its usefulness is particularly evident in tools such as the PhenoMiner at RGD, where users can now easily retrieve phenotype measurement data for related strains, strains with similar backgrounds or those with similar introgressed regions. This

  13. Whistler mode waves from lightning on Venus: Magnetic control of ionospheric access

    Science.gov (United States)

    Russell, C. T.; Zhang, T. L.; Wei, H. Y.

    2008-09-01

    The fluxgate magnetometer on Venus Express samples the magnetic field near periapsis at 128 Hz. Bursts of plane-polarized magnetic waves in the vicinity of 100 Hz are observed propagating at small angles to the magnetic field. The magnetic field is generally horizontal in the region around periapsis, located at high northern latitudes. When the magnetic field remains within 15° of horizontal during the 2-min periapsis pass, no such waves are observed; but when there are brief periods during which the local magnetic field dips into the atmosphere by more than 15°, the bursts begin to appear. Such radial excursions of the magnetic field occur 25% of the time in the region around periapsis. The bursts are seen only on passes with these excursions. We interpret this magnetic control in terms of the coupling between the electromagnetic wave from lightning discharges refracted vertically by the increasing electron density and the nearly horizontal ionospheric magnetic field along which the energy is guided to the spacecraft. The inferred rate of electric discharges in the Venus atmosphere is about 20% of that seen in the Earth's atmosphere.

  14. Women with learning disabilities and access to cervical screening: retrospective cohort study using case control methods

    Science.gov (United States)

    Reynolds, Fiona; Stanistreet, Debbi; Elton, Peter

    2008-01-01

    Background Several studies in the UK have suggested that women with learning disabilities may be less likely to receive cervical screening tests and a previous local study in had found that GPs considered screening unnecessary for women with learning disabilities. This study set out to ascertain whether women with learning disabilities are more likely to be ceased from a cervical screening programme than women without; and to examine the reasons given for ceasing women with learning disabilities. It was carried out in Bury, Heywood-and-Middleton and Rochdale. Methods Carried out using retrospective cohort study methods, women with learning disabilities were identified by Read code; and their cervical screening records were compared with the Call-and-Recall records of women without learning disabilities in order to examine their screening histories. Analysis was carried out using case-control methods – 1:2 (women with learning disabilities: women without learning disabilities), calculating odds ratios. Results 267 women's records were compared with the records of 534 women without learning disabilities. Women with learning disabilities had an odds ratio (OR) of 0.48 (Confidence Interval (CI) 0.38 – 0.58; X2: 72.227; p.value learning disabilities. Conclusion The reasons given for ceasing and/or not screening suggest that merely being coded as having a learning disability is not the sole reason for these actions. There are training needs among smear takers regarding appropriate reasons not to screen and providing screening for women with learning disabilities. PMID:18218106

  15. A Fairness-Based Access Control Scheme to Optimize IPTV Fast Channel Changing

    Directory of Open Access Journals (Sweden)

    Junyu Lai

    2014-01-01

    Full Text Available IPTV services are typically featured with a longer channel changing delay compared to the conventional TV systems. The major contributor to this lies in the time spent on intraframe (I-frame acquisition during channel changing. Currently, most widely adopted fast channel changing (FCC methods rely on promptly transmitting to the client (conducting the channel changing a retained I-frame of the targeted channel as a separate unicasting stream. However, this I-frame acceleration mechanism has an inherent scalability problem due to the explosions of channel changing requests during commercial breaks. In this paper, we propose a fairness-based admission control (FAC scheme for the original I-frame acceleration mechanism to enhance its scalability by decreasing the bandwidth demands. Based on the channel changing history of every client, the FAC scheme can intelligently decide whether or not to conduct the I-frame acceleration for each channel change request. Comprehensive simulation experiments demonstrate the potential of our proposed FAC scheme to effectively optimize the scalability of the I-frame acceleration mechanism, particularly in commercial breaks. Meanwhile, the FAC scheme only slightly increases the average channel changing delay by temporarily disabling FCC (i.e., I-frame acceleration for the clients who are addicted to frequent channel zapping.

  16. TRMM On-Orbit Performance Re-Accessed After Control Change

    Science.gov (United States)

    Bilanow, Steve

    2006-01-01

    The Tropical Rainfall Measuring Mission (TRMM) spacecraft, a joint mission between the U.S. and Japan, launched onboard an HI1 rocket on November 27,1997 and transitioned in August, 2001 from an average operating altitude of 350 kilometers to 402.5 kilometers. Due to problems using the Earth Sensor Assembly (ESA) at the higher altitude, TRMM switched to a backup attitude control mode. Prior to the orbit boost TRMM controlled pitch and roll to the local vertical using ESA measurements while using gyro data to propagate yaw attitude between yaw updates from the Sun sensors. After the orbit boost, a Kalman filter used 3-axis gyro data with Sun sensor and magnetometers to estimate onboard attitude. While originally intended to meet a degraded attitude accuracy of 0.7 degrees, the new control mode met the original 0.2 degree attitude accuracy requirement after improving onboard ephemeris prediction and adjusting the magnetometer calibration onboard. Independent roll attitude checks using a science instrument, the Precipitation Radar (PR) which was built in Japan, provided a novel insight into the pointing performance. The PR data helped identify the pointing errors after the orbit boost, track the performance improvements, and show subtle effects from ephemeris errors and gyro bias errors. It also helped identify average bias trends throughout the mission. Roll errors tracked by the PR from sample orbits pre-boost and post-boost are shown in Figure 1. Prior to the orbit boost the largest attitude errors were due to occasional interference in the ESA. These errors were sometime larger than 0.2 degrees in pitch and roll, but usually less, as estimated from a comprehensive review of the attitude excursions using gyro data. Sudden jumps in the onboard roll show up as spikes in the reported attitude since the control responds within tens of seconds to null the pointing error. The PR estimated roll tracks well with an estimate of the roll history propagated using gyro data

  17. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    Directory of Open Access Journals (Sweden)

    José L. Hernández-Ramos

    2015-07-01

    Full Text Available As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  18. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

    Science.gov (United States)

    Hernández-Ramos, José L; Bernabe, Jorge Bernal; Moreno, M Victoria; Skarmeta, Antonio F

    2015-07-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  19. Vascular access and infection prevention and control: a national survey of routine practices in Irish haemodialysis units.

    Science.gov (United States)

    McCann, Margaret; Clarke, Michael; Mellotte, George; Plant, Liam; Fitzpatrick, Fidelma

    2013-04-01

    National and international guidelines recommend the use of effective vascular access (VA) and infection prevention and control practices within the haemodialysis environment. Establishing an arterio-venous fistula (AVF) and preventing central venous catheter (CVC)-related infections are ongoing challenges for all dialysis settings. We surveyed VA and routine infection prevention and control practices in dialysis units, to provide national data on these practices in Ireland. A descriptive survey was emailed to nurse managers at all adult (n = 19) and children (n = 1) outpatient haemodialysis units in the Republic of Ireland. Data collected included AVF formation, CVC insertion and maintenance practices, VA use and surveillance of infection and screening protocols. Nineteen of the 20 units responded to the survey. The AVF prevalence was 49% for 1370 patients in 17 units who provided these data [mean prevalence per unit: 45.7% (SD 16.2)]; the CVC mean prevalence per unit was 52.5% (SD 16.0). Fourteen dialysis units experienced inadequate access to vascular surgical procedures either due to a lack of dedicated theatre time or hospital beds. Six units administered intravenous prophylactic antimicrobials prior to CVC insertion with only two units using a CVC insertion checklist at the time of catheter insertion. In general, dialysis units in Ireland show a strong adherence to national guidelines. Compared with the 12 countries participating in the Dialysis Outcomes Practice Patterns Study (DOPPS 4), in 2010, AVF prevalence in Irish dialysis units is the second lowest. Recommendations include establishing an AVF national prevalence target rate, discontinuing the administration of intravenous prophylactic antimicrobials prior to CVC insertion and promoting the use of CVC insertion checklists.

  20. Studies of CTNNBL1 and FDFT1 variants and measures of obesity: analyses of quantitative traits and case-control studies in 18,014 Danes

    DEFF Research Database (Denmark)

    Andreasen, Camilla Helene; Mogensen, Mette Sloth; Borch-Johnsen, Knut

    2009-01-01

    ). The most significantly associating variants within CTNNBL1 including rs6013029 and rs6020846 were additionally confirmed to associate with morbid obesity in a French Caucasian case-control sample. The aim of this study was to investigate the impact of these three variants on obesity, through analyses...

  1. Treatments for acute bipolar depression: meta-analyses of placebo-controlled, monotherapy trials of anticonvulsants, lithium and antipsychotics

    NARCIS (Netherlands)

    Selle, V.; Schalkwijk, S.J.; Vazquez, G.H.; Baldessarini, R.J.

    2014-01-01

    BACKGROUND: Optimal treatments for bipolar depression, and the relative value of specific drugs for that purpose, remain uncertain, including agents other than antidepressants. METHODS: We searched for reports of placebo-controlled, monotherapy trials of mood-stabilizing anticonvulsants,

  2. CTCF binding at the H19 imprinting control region mediates maternally inherited higher-order chromatin conformation to restrict enhancer access to Igf2

    Science.gov (United States)

    Kurukuti, Sreenivasulu; Tiwari, Vijay Kumar; Tavoosidana, Gholamreza; Pugacheva, Elena; Murrell, Adele; Zhao, Zhihu; Lobanenkov, Victor; Reik, Wolf; Ohlsson, Rolf

    2006-01-01

    It is thought that the H19 imprinting control region (ICR) directs the silencing of the maternally inherited Igf2 allele through a CTCF-dependent chromatin insulator. The ICR has been shown to interact physically with a silencer region in Igf2, differentially methylated region (DMR)1, but the role of CTCF in this chromatin loop and whether it restricts the physical access of distal enhancers to Igf2 is not known. We performed systematic chromosome conformation capture analyses in the Igf2/H19 region over >160 kb, identifying sequences that interact physically with the distal enhancers and the ICR. We found that, on the paternal chromosome, enhancers interact with the Igf2 promoters but that, on the maternal allele, this is prevented by CTCF binding within the H19 ICR. CTCF binding in the maternal ICR regulates its interaction with matrix attachment region (MAR)3 and DMR1 at Igf2, thus forming a tight loop around the maternal Igf2 locus, which may contribute to its silencing. Mutation of CTCF binding sites in the H19 ICR leads to loss of CTCF binding and de novo methylation of a CTCF target site within Igf2 DMR1, showing that CTCF can coordinate regional epigenetic marks. This systematic chromosome conformation capture analysis of an imprinting cluster reveals that CTCF has a critical role in the epigenetic regulation of higher-order chromatin structure and gene silencing over considerable distances in the genome. PMID:16815976

  3. Control System Analyses for the Driver Gas Fill System of the BRL 1/6th Scale LB/TS Test Facility

    Science.gov (United States)

    1993-04-01

    AD-A264 476 Control System Analyses for the Driver Gas Fill System of the BRL 1/6th Scale LB /i’S Test Facility Duane T. Hove Gregory P. Mason ARL-CR...Analyses for the Driver Gas Fill System of the BRL 1/6th Scale LB /TS Test Facility C: DAAA15-90-D-1002 Task 1 6. AUTHOR(S) Duane T. Hove and Gregory P...663 OK) is achieved with a secondary valve relative opening of 0.2 to 0.5 as the primary valve relative opening ranges from 0.25 to 1.0 (Figure 3). 7

  4. Fine Mapping and Characterization of Candidate Genes that Control Resistance to Cercospora sojina K. Hara in Two Soybean Germplasm Accessions.

    Directory of Open Access Journals (Sweden)

    Anh-Tung Pham

    Full Text Available Frogeye leaf spot (FLS, caused by the fungus Cercospora sojina K. Hara, may cause a significant yield loss to soybean growers in regions with a warm and humid climate. Two soybean accessions, PI 594891 and PI 594774, were identified to carry a high level of resistance similar to that conditioned by the Rcs3 gene in 'Davis'. Previously, we reported that the resistance to FLS in these two plant introductions (PIs was controlled by a novel gene (s on chromosome 13 that is different from Rcs3. To fine-map the novel FLS resistance gene(s in these two PIs, F2: 3 seeds from the crosses between PI 594891 and PI 594774, and the FLS susceptible genotype 'Blackhawk' were genotyped with SNP markers that were designed based on the SoySNP50k iSelect BeadChip data to identify recombinant events and locate candidate genes. Analysis of lines possessing key recombination events helped narrow down the FLS-resistance genomic region in PI 594891 from 3.3 Mb to a 72.6 kb region with five annotated genes. The resistance gene in PI 594774 was fine-mapped into a 540 kb region that encompasses the 72.6 kb region found in PI 594891. Sequencing five candidate genes in PI 594891 identified three genes that have several mutations in the promoter, intron, 5', and 3' UTR regions. qPCR analysis showed a difference in expression levels of these genes in both lines compared to Blackhawk in the presence of C. sojina. Based on phenotype, genotype and haplotype analysis results, these two soybean accessions might carry different resistance alleles of the same gene or two different gene(s. The identified SNPs were used to develop Kompetitive Allele Specific PCR (KASP assays to detect the resistance alleles on chromosome 13 from the two PIs for marker-assisted selection.

  5. Access to a polymerase chain reaction assay method targeting 13 respiratory viruses can reduce antibiotics: a randomised, controlled trial

    Directory of Open Access Journals (Sweden)

    Lindh Magnus

    2011-04-01

    Full Text Available Abstract Background Viral respiratory infections are common worldwide and range from completely benign disease to life-threatening illness. Symptoms can be unspecific, and an etiologic diagnosis is rarely established because of a lack of suitable diagnostic tools. Improper use of antibiotics is common in this setting, which is detrimental in light of the development of bacterial resistance. It has been suggested that the use of diagnostic tests could reduce antibiotic prescription rates. The objective of this study was to evaluate whether access to a multiplex polymerase chain reaction (PCR assay panel for etiologic diagnosis of acute respiratory tract infections (ARTIs would have an impact on antibiotic prescription rate in primary care clinical settings. Methods Adult patients with symptoms of ARTI were prospectively included. Nasopharyngeal and throat swabs were analysed by using a multiplex real-time PCR method targeting thirteen viruses and two bacteria. Patients were recruited at 12 outpatient units from October 2006 through April 2009, and samples were collected on the day of inclusion (initial visit and after 10 days (follow-up visit. Patients were randomised in an open-label treatment protocol to receive a rapid or delayed result (on the following day or after eight to twelve days. The primary outcome measure was the antibiotic prescription rate at the initial visit, and the secondary outcome was the total antibiotic prescription rate during the study period. Results A total sample of 447 patients was randomised. Forty-one were excluded, leaving 406 patients for analysis. In the group of patients randomised for a rapid result, 4.5% (9 of 202 of patients received antibiotics at the initial visit, compared to 12.3% (25 of 204 (P = 0.005 of patients in the delayed result group. At follow-up, there was no significant difference between the groups: 13.9% (28 of 202 in the rapid result group and 17.2% (35 of 204 in the delayed result group (P

  6. Physical exercise for patients undergoing hematopoietic stem cell transplantation: systematic review and meta-analyses of randomized controlled trials

    NARCIS (Netherlands)

    Haren, I.E.P.M. van; Timmerman, H.; Potting, C.M.J.; Blijlevens, N.M.A.; Staal, J.B.; Nijhuis-Van der Sanden, M.W.G.

    2013-01-01

    BACKGROUND: The treatment-related burden for patients undergoing hematopoietic stem cell transplantation (HSCT) may be relieved by physical exercises. PURPOSE: The purpose of this study was to summarize and analyze the evidence provided by randomized controlled trials (RCTs) on physical exercise

  7. Reciprocal associations between positive emotions and motivation in daily life: Network analyses in anhedonic individuals and healthy controls.

    Science.gov (United States)

    van Roekel, Eeske; Heininga, Vera E; Vrijen, Charlotte; Snippe, Evelien; Oldehinkel, Albertine J

    2018-04-19

    Anhedonia reflects a dysfunction in the reward system, which can be manifested in an inability to enjoy pleasurable situations (i.e., lack of positive emotions), but also by a lack of motivation to engage in pleasurable activities (i.e., lack of motivation). Little is known about the interrelations between positive emotions and motivation in daily life, and whether these associations are altered in anhedonic individuals. In the present study, we used a network approach to explore the reciprocal, lagged associations between positive emotions and motivation in anhedonic individuals (N = 66) and controls (N = 68). Participants (aged between 18 and 24 years) filled out momentary assessments of affect 3 times per day for 30 consecutive days. Our results showed that (a) anhedonic individuals and controls had similar moment-to-moment transfer of positive emotions; (b) in the anhedonic network feeling cheerful was the node with the highest outstrength, both within this group and compared with the control group; (c) feeling relaxed had the highest outstrength in the control network, and (d) anhedonic individuals had stronger pathways from positive emotions to motivation than controls. Taken together, our findings suggest that low levels of positive emotions lead to decreased motivation in the anhedonic group, which could instigate a negative spiral of low pleasure and low motivation. On a more positive note, we showed that cheerfulness had the highest outstrength in the network of anhedonic participants. Hence, interventions may focus on increasing cheerfulness in anhedonic individuals, as this will likely have the greatest impact on other positive emotions and motivations. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  8. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

    Directory of Open Access Journals (Sweden)

    Ming Luo

    2018-01-01

    Full Text Available Nowadays wireless sensor network (WSN is increasingly being used in the Internet of Things (IoT for data collection, and design of an access control scheme that allows an Internet user as part of IoT to access the WSN becomes a hot topic. A lot of access control schemes have been proposed for the WSNs in the context of the IoT. Nevertheless, almost all of these schemes assume that communication nodes in different network domains share common system parameters, which is not suitable for cross-domain IoT environment in practical situations. To solve this shortcoming, we propose a more secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the Internet of Things, which allows an Internet user in a certificateless cryptography (CLC environment to communicate with a sensor node in an identity-based cryptography (IBC environment with different system parameters. Moreover, our proposed scheme achieves known session-specific temporary information security (KSSTIS that most of access control schemes cannot satisfy. Performance analysis is given to show that our scheme is well suited for wireless sensor networks in the cross-domain context of the IoT.

  9. RAPID-L Highly Automated Fast Reactor Concept Without Any Control Rods (1) Reactor concept and plant dynamics analyses

    International Nuclear Information System (INIS)

    Kambe, Mitsuru; Tsunoda, Hirokazu; Mishima, Kaichiro; Iwamura, Takamichi

    2002-01-01

    The 200 kWe uranium-nitride fueled lithium cooled fast reactor concept 'RAPID-L' to achieve highly automated reactor operation has been demonstrated. RAPID-L is designed for Lunar base power system. It is one of the variants of RAPID (Refueling by All Pins Integrated Design), fast reactor concept, which enable quick and simplified refueling. The essential feature of RAPID concept is that the reactor core consists of an integrated fuel assembly instead of conventional fuel subassemblies. In this small size reactor core, 2700 fuel pins are integrated altogether and encased in a fuel cartridge. Refueling is conducted by replacing a fuel cartridge. The reactor can be operated without refueling for up to 10 years. Unique challenges in reactivity control systems design have been attempted in RAPID-L concept. The reactor has no control rod, but involves the following innovative reactivity control systems: Lithium Expansion Modules (LEM) for inherent reactivity feedback, Lithium Injection Modules (LIM) for inherent ultimate shutdown, and Lithium Release Modules (LRM) for automated reactor startup. All these systems adopt lithium-6 as a liquid poison instead of B 4 C rods. In combination with LEMs, LIMs and LRMs, RAPID-L can be operated without operator. This is the first reactor concept ever established in the world. This reactor concept is also applicable to the terrestrial fast reactors. In this paper, RAPID-L reactor concept and its transient characteristics are presented. (authors)

  10. Analyses in zebrafish embryos reveal that nanotoxicity profiles are dependent on surface-functionalization controlled penetrance of biological membranes.

    Science.gov (United States)

    Paatero, Ilkka; Casals, Eudald; Niemi, Rasmus; Özliseli, Ezgi; Rosenholm, Jessica M; Sahlgren, Cecilia

    2017-08-21

    Mesoporous silica nanoparticles (MSNs) are extensively explored as drug delivery systems, but in depth understanding of design-toxicity relationships is still scarce. We used zebrafish (Danio rerio) embryos to study toxicity profiles of differently surface functionalized MSNs. Embryos with the chorion membrane intact, or dechoroniated embryos, were incubated or microinjected with amino (NH 2 -MSNs), polyethyleneimine (PEI-MSNs), succinic acid (SUCC-MSNs) or polyethyleneglycol (PEG-MSNs) functionalized MSNs. Toxicity was assessed by viability and cardiovascular function. NH 2 -MSNs, SUCC-MSNs and PEG-MSNs were well tolerated, 50 µg/ml PEI-MSNs induced 100% lethality 48 hours post fertilization (hpf). Dechoroniated embryos were more sensitive and 10 µg/ml PEI-MSNs reduced viability to 5% at 96hpf. Sensitivity to PEG- and SUCC-, but not NH 2 -MSNs, was also enhanced. Typically cardiovascular toxicity was evident prior to lethality. Confocal microscopy revealed that PEI-MSNs penetrated into the embryos whereas PEG-, NH2- and SUCC-MSNs remained aggregated on the skin surface. Direct exposure of inner organs by microinjecting NH 2 -MSNs and PEI-MSNs demonstrated that the particles displayed similar toxicity indicating that functionalization affects the toxicity profile by influencing penetrance through biological barriers. The data emphasize the need for careful analyses of toxicity mechanisms in relevant models and constitute an important knowledge step towards the development of safer and sustainable nanotherapies.

  11. Automatización del manejo de los archivos LOG del NAC (Network Access Control) en el Banco Agrario de Colombia

    OpenAIRE

    2011-01-01

    NacLogAnalizer es un sistema diseñado para el manejo de los archivos LOG que arroja el agente NAC (Network Access Control) en el Banco Agrario de Colombia, permitiendo a diferentes áreas, diferentes a las de tecnología, realizar busquedas de vulnerabilidades existentes. El presente proyecto busca desarrollar un software para el manejo de los archivos LOG que arroja un agente NAC (Network Access Control) en el Banco Agrario de Colombia; esta idea surge de la necesidad de acceso a las redes ...

  12. Pedestrian road traffic injuries in urban Peruvian children and adolescents: case control analyses of personal and environmental risk factors.

    Directory of Open Access Journals (Sweden)

    Joseph Donroe

    2008-09-01

    Full Text Available Child pedestrian road traffic injuries (RTIs are an important cause of death and disability in poorer nations, however RTI prevention strategies in those countries largely draw upon studies conducted in wealthier countries. This research investigated personal and environmental risk factors for child pedestrian RTIs relevant to an urban, developing world setting.This is a case control study of personal and environmental risk factors for child pedestrian RTIs in San Juan de Miraflores, Lima, Perú. The analysis of personal risk factors included 100 cases of serious pedestrian RTIs and 200 age and gender matched controls. Demographic, socioeconomic, and injury data were collected. The environmental risk factor study evaluated vehicle and pedestrian movement and infrastructure at the sites in which 40 of the above case RTIs occurred and 80 control sites.After adjustment, factors associated with increased risk of child pedestrian RTIs included high vehicle volume (OR 7.88, 95%CI 1.97-31.52, absent lane demarcations (OR 6.59, 95% CI 1.65-26.26, high vehicle speed (OR 5.35, 95%CI 1.55-18.54, high street vendor density (OR 1.25, 95%CI 1.01-1.55, and more children living in the home (OR 1.25, 95%CI 1.00-1.56. Protective factors included more hours/day spent in school (OR 0.52, 95%CI 0.33-0.82 and years of family residence in the same home (OR 0.97, 95%CI 0.95-0.99.Reducing traffic volumes and speeds, limiting the number of street vendors on a given stretch of road, and improving lane demarcation should be evaluated as components of child pedestrian RTI interventions in poorer countries.

  13. Exploring the physical controls of regional patterns of flow duration curves – Part 1: Insights from statistical analyses

    Directory of Open Access Journals (Sweden)

    S. Ye

    2012-11-01

    Full Text Available The flow duration curve (FDC is a classical method used to graphically represent the relationship between the frequency and magnitude of streamflow. In this sense it represents a compact signature of temporal runoff variability that can also be used to diagnose catchment rainfall-runoff responses, including similarity and differences between catchments. This paper is aimed at extracting regional patterns of the FDCs from observed daily flow data and elucidating the physical controls underlying these patterns, as a way to aid towards their regionalization and predictions in ungauged basins. The FDCs of total runoff (TFDC using multi-decadal streamflow records for 197 catchments across the continental United States are separated into the FDCs of two runoff components, i.e., fast flow (FFDC and slow flow (SFDC. In order to compactly display these regional patterns, the 3-parameter mixed gamma distribution is employed to characterize the shapes of the normalized FDCs (i.e., TFDC, FFDC and SFDC over the entire data record. This is repeated to also characterize the between-year variability of "annual" FDCs for 8 representative catchments chosen across a climate gradient. Results show that the mixed gamma distribution can adequately capture the shapes of the FDCs and their variation between catchments and also between years. Comparison between the between-catchment and between-year variability of the FDCs revealed significant space-time symmetry. Possible relationships between the parameters of the fitted mixed gamma distribution and catchment climatic and physiographic characteristics are explored in order to decipher and point to the underlying physical controls. The baseflow index (a surrogate for the collective impact of geology, soils, topography and vegetation, as well as climate is found to be the dominant control on the shapes of the normalized TFDC and SFDC, whereas the product of maximum daily precipitation and the fraction of non-rainy days

  14. Internet-accessed sexually transmitted infection (e-STI) testing and results service: A randomised, single-blind, controlled trial.

    Science.gov (United States)

    Wilson, Emma; Free, Caroline; Morris, Tim P; Syred, Jonathan; Ahamed, Irrfan; Menon-Johansson, Anatole S; Palmer, Melissa J; Barnard, Sharmani; Rezel, Emma; Baraitser, Paula

    2017-12-01

    Internet-accessed sexually transmitted infection testing (e-STI testing) is increasingly available as an alternative to testing in clinics. Typically this testing modality enables users to order a test kit from a virtual service (via a website or app), collect their own samples, return test samples to a laboratory, and be notified of their results by short message service (SMS) or telephone. e-STI testing is assumed to increase access to testing in comparison with face-to-face services, but the evidence is unclear. We conducted a randomised controlled trial to assess the effectiveness of an e-STI testing and results service (chlamydia, gonorrhoea, HIV, and syphilis) on STI testing uptake and STI cases diagnosed. The study took place in the London boroughs of Lambeth and Southwark. Between 24 November 2014 and 31 August 2015, we recruited 2,072 participants, aged 16-30 years, who were resident in these boroughs, had at least 1 sexual partner in the last 12 months, stated willingness to take an STI test, and had access to the internet. Those unable to provide consent and unable to read English were excluded. Participants were randomly allocated to receive 1 text message with the web link of an e-STI testing and results service (intervention group) or to receive 1 text message with the web link of a bespoke website listing the locations, contact details, and websites of 7 local sexual health clinics (control group). Participants were free to use any other services or interventions during the study period. The primary outcomes were self-reported STI testing at 6 weeks, verified by patient record checks, and self-reported STI diagnosis at 6 weeks, verified by patient record checks. Secondary outcomes were the proportion of participants prescribed treatment for an STI, time from randomisation to completion of an STI test, and time from randomisation to treatment of an STI. Participants were sent a £10 cash incentive on submission of self-reported data. We completed all

  15. Pool exercise for patients with fibromyalgia or chronic widespread pain: a randomized controlled trial and subgroup analyses.

    Science.gov (United States)

    Mannerkorpi, Kaisa; Nordeman, Lena; Ericsson, Anna; Arndorw, Maudh

    2009-09-01

    To evaluate the effects of pool exercise in patients with fibromyalgia and chronic widespread pain and to determine characteristics influencing the effects of treatment. A total of 134 women with fibromyalgia and 32 with chronic widespread pain were randomized to a 20-session pool exercise and a 6-session education programme or to a control group undertaking the same education programme. The primary outcomes were the Fibromyalgia Impact Questionnaire (FIQ) total score and the 6-minute walk test (6MWT). FIQ Pain and other health variables were included. The FIQ total (p = 0.04) improved in the intervention group, with an effect size of 0.32. Patients who had participated in at least 60% of the exercise sessions improved in the FIQ total (effect size 0.44), the 6MWT (effect size 0.43) and FIQ Pain (effect size 0.69) compared with controls (p subgroups showed that patients with milder stress, pain or depression improved most by treatment on the FIQ total (effect size > 0.50, p fibromyalgia and chronic widespread pain, compared with education only. Patients with milder symptoms improved most with this treatment.

  16. Giving High School Students a Research Grade Radio Telescope to Control; Motivational Results from Access to Real Scientific Tools

    Science.gov (United States)

    Kohrs, Russell; Langston, G.; Heatherly, S.

    2013-01-01

    Have you ever wondered what it might be like to place control of a six-story building in the hands of eager high school students? This past summer, the USNO 20m telescope at the National Radio Astronomy Observatory, Green Bank, WV was brought back online for just such a purpose. This telescope is equipped with an X-band receiver, capable of observing center frequencies from 8-10 GHz and is the first radio telescope accessible by students and observers through the SKYNET telescope network. Operated remotely with a queue-based system, students can now collect real radio data for any range of projects. This past summer, five lessons were written that were tailor-made for student exploration of radio astronomy. Each lesson explores various radio objects in the context of an action-packed sci-fi adventure. Some of the work required to bring the 20m online for student use will be discussed here, but the main focus of this presentation will be how this work has been received by the author’s own students in its first classroom application. Topics that are normally difficult to discuss with students in an inquiry-based classroom setting, such as HII regions, synchrotron radiation, lunar temperature profiles, and galactic supermassive black holes were addressed in the classroom using the lessons developed by the author for the 20m as well as data collected by students using the telescope via SKYNET.

  17. Sustained attention in mice: expanding the translational utility of the SAT by incorporating the Michigan Controlled Access Response Port (MICARP).

    Science.gov (United States)

    St Peters, Megan; Cherian, Ajeesh Koshy; Bradshaw, Marc; Sarter, Martin

    2011-12-01

    Advances in mouse genetic technology have spurred increasing interest in the development of cognitive tasks for mice. Here, we describe and discuss the modifications necessary to adapt a task for the assessment of sustained attention performance for use in mice, including for taxing the top-down control of such performance. The validity of the Sustained Attention Task (SAT), including the distractor version (dSAT), has previously been demonstrated in rats and humans. This task requires moveable or retractable operanda; insertion of operanda into the operant chambers cues animals to respond to a prior signal or non-signal event, reporting either a hit or a miss, or a correct rejection or false alarm, respectively. Retractable levers did not support sufficiently high and stable levels of performance in mice. Given the widespread use of static nose-poke devices for testing operant performance in mice, we therefore designed and fabricated a retractable nose-poke device. As this device extends into chambers, a hole for nose-poking is slowly opened and closed again as the device retracts (termed the "Michigan Controlled Access Response Port", MICARP). Results describe the effects of variation of signal duration and event rate, trial outcome and trial type probability, effects of mice deprivation levels, and the reliability of SAT and dSAT performance. Mice perform the SAT and dSAT at levels comparable to those observed in rats. This task will be of assistance in expanding the translational usefulness of the SAT and dSAT. Copyright © 2011 Elsevier B.V. All rights reserved.

  18. Implementation of physical coordination training and cognitive behavioural training interventions at cleaning workplaces - secondary analyses of a randomised controlled trial

    DEFF Research Database (Denmark)

    Jørgensen, Marie B; Faber, Anne; Jespersen, Tobias

    2012-01-01

    This study evaluates the implementation of physical coordination training (PCT) and cognitive behavioural training (CBTr) interventions in a randomised controlled trial at nine cleaners' workplaces. Female cleaners (n = 294) were randomised into a PCT, a CBTr or a reference (REF) group. Both 12...... intervention effects, more research on implementation is needed. Trial registration: ISRCTN96241850. Practitioner summary: Both physical coordination training and cognitive behavioural training are potential effective workplace interventions among low educated job groups with high physical work demands....... However, thorough consideration should be given to feasibility in the design of interventions. The optimal intervention should be tailored to closely match the implementation context and be robust and flexible to minimise susceptibility to changes in work organisation....

  19. Broadband Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Broadband Access. Worldwide market for broadband access $30 Billion! Over 200 million broadband subscribers worldwide! Various Competing Broadband access. Digital Subscriber line; Wireless; Optical Fiber.

  20. Tectonic and lithological controls on fluvial landscape development in central-eastern Portugal: Insights from long profile tributary stream analyses

    Science.gov (United States)

    Martins, António A.; Cabral, João; Cunha, Pedro P.; Stokes, Martin; Borges, José; Caldeira, Bento; Martins, A. Cardoso

    2017-01-01

    This study examines the long profiles of tributaries of the Tagus and Zêzere rivers in Portugal (West Iberia) in order to provide new insights into patterns, timing, and controls on drainage development during the Quaternary incision stage. The studied streams are incised into a relict culminant fluvial surface, abandoned at the beginning of the incision stage. The streams flow through a landscape with bedrock variations in lithology (mainly granites and metasediments) and faulted blocks with distinct uplift rates. The long profiles of the analyzed streams record an older transitory knickpoint/knickzone separating (1) an upstream relict graded profile, with lower steepness and higher concavity, that reflects a long period of quasi-equilibrium conditions reached after the beginning of the incision stage, and (2) a downstream rejuvenated long profile, with steeper gradient and lower concavity, particularly for the final reach, which is often convex. The rejuvenated reaches testify to the upstream propagation of several incision waves, interpreted as the response of each stream to increasing crustal uplift and prolonged periods of base-level lowering by the trunk drainages, coeval with low sea level conditions. The morphological configurations of the long profiles enabled spatial and relative temporal patterns of incisions to be quantified. The incision values of streams flowing on the Portuguese Central Range (PCR; ca. 380-150 m) are variable but generally higher than the incision values of streams flowing on the adjacent South Portugal Planation Surface (SPPS; ca. 220-110 m), corroborating differential uplift of the PCR relative to the SPPS. Owing to the fact that the relict graded profiles can be correlated with the Tagus River T1 terrace (1.1-0.9 My) present in the study area, incision rates can be estimated (1) for the streams located in the PCR, 0.38-0.15 m/ky and (2) for the streams flowing on the SPPS, 0.22-0.12 m/ky. The differential uplift inferred in the

  1. DESIGN OF CAUCUS MEDIUM ACCESS CONTROL (C-MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS IN SMART GRIDS

    Directory of Open Access Journals (Sweden)

    JEETU SHARMA

    2017-10-01

    Full Text Available A Caucus-based medium access control protocol (C-MAC is proposed to reduce the end to end delay and battery consumption of the sensor nodes deployed in the monitoring of various smart grid regions, such as substation, pole and wires, perimeter security, real time and non-real-time monitoring using wireless sensor networks. The objective is to prolong the network lifetime and to reduce the end to end delay by mitigating the energy-hole problem and by eliminating bottlenecks significantly by using caucus based efficient synchronization techniques in multi-hop square grid topology of the wireless sensor networks (WSNs. The protocol self-reliantly and adaptively schedules node’s wake-up times, decreases idle listening and collisions, increases network throughput, and extends network lifetime. It induces a low duty cycle for adjusting wake-up times of sensor nodes. The appropriate selection of active and sleep time slots and next hop relay nodes are proposed to minimize the data transmission latency and to reduce battery consumption to increase the network lifetime. The uniform and synchronized transmission of the data packets is of prime importance to improve the network performance. Simulation results justify that the proposed C-MAC protocol increases the network lifetime, successful data transmission ratio along-with the reduction in end to end delay. The objective of this paper is to envisage benefits and utilization of C-MAC protocol for WSNs deployed in smart grids and to draw the attention of researchers in this area.

  2. Health Access Livelihood Framework Reveals Potential Barriers in the Control of Schistosomiasis in the Dongting Lake Area of Hunan Province, China

    Science.gov (United States)

    McManus, Donald P.; Raso, Giovanna; Utzinger, Jürg; Xiao, Shui-Yuan; Yu, Dong-Bao; Zhao, Zheng-Yuan; Li, Yue-Sheng

    2013-01-01

    Background Access to health care is a major requirement in improving health and fostering socioeconomic development. In the People's Republic of China (P.R. China), considerable changes have occurred in the social, economic, and health systems with a shift from a centrally planned to a socialist market economy. This brought about great benefits and new challenges, particularly for vertical disease control programs, including schistosomiasis. We explored systemic barriers in access to equitable and effective control of schistosomiasis. Methodology Between August 2002 and February 2003, 66 interviews with staff from anti-schistosomiasis control stations and six focus group discussions with health personnel were conducted in the Dongting Lake area, Hunan Province. Additionally, 79 patients with advanced schistosomiasis japonica were interviewed. The health access livelihood framework was utilized to examine availability, accessibility, affordability, adequacy, and acceptability of schistosomiasis-related health care. Principal Findings We found sufficient availability of infrastructure and human resources at most control stations. Many patients with advanced schistosomiasis resided in non-endemic or moderately endemic areas, however, with poor accessibility to disease-specific knowledge and specialized health services. Moreover, none of the patients interviewed had any form of health insurance, resulting in high out-of-pocket expenditure or unaffordable care. Reports on the adequacy and acceptability of care were mixed. Conclusions/Significance There is a need to strengthen health awareness and schistosomiasis surveillance in post-transmission control settings, as well as to reduce diagnostic and treatment costs. Further studies are needed to gain a multi-layered, in-depth understanding of remaining barriers, so that the ultimate goal of schistosomiasis elimination in P.R. China can be reached. PMID:23936580

  3. Health access livelihood framework reveals potential barriers in the control of schistosomiasis in the Dongting Lake area of Hunan Province, China.

    Directory of Open Access Journals (Sweden)

    Julie Balen

    Full Text Available Access to health care is a major requirement in improving health and fostering socioeconomic development. In the People's Republic of China (P.R. China, considerable changes have occurred in the social, economic, and health systems with a shift from a centrally planned to a socialist market economy. This brought about great benefits and new challenges, particularly for vertical disease control programs, including schistosomiasis. We explored systemic barriers in access to equitable and effective control of schistosomiasis.Between August 2002 and February 2003, 66 interviews with staff from anti-schistosomiasis control stations and six focus group discussions with health personnel were conducted in the Dongting Lake area, Hunan Province. Additionally, 79 patients with advanced schistosomiasis japonica were interviewed. The health access livelihood framework was utilized to examine availability, accessibility, affordability, adequacy, and acceptability of schistosomiasis-related health care.We found sufficient availability of infrastructure and human resources at most control stations. Many patients with advanced schistosomiasis resided in non-endemic or moderately endemic areas, however, with poor accessibility to disease-specific knowledge and specialized health services. Moreover, none of the patients interviewed had any form of health insurance, resulting in high out-of-pocket expenditure or unaffordable care. Reports on the adequacy and acceptability of care were mixed.There is a need to strengthen health awareness and schistosomiasis surveillance in post-transmission control settings, as well as to reduce diagnostic and treatment costs. Further studies are needed to gain a multi-layered, in-depth understanding of remaining barriers, so that the ultimate goal of schistosomiasis elimination in P.R. China can be reached.

  4. A systematic review of the quality of statistical methods employed for analysing quality of life data in cancer randomised controlled trials.

    Science.gov (United States)

    Hamel, Jean-Francois; Saulnier, Patrick; Pe, Madeline; Zikos, Efstathios; Musoro, Jammbe; Coens, Corneel; Bottomley, Andrew

    2017-09-01

    Over the last decades, Health-related Quality of Life (HRQoL) end-points have become an important outcome of the randomised controlled trials (RCTs). HRQoL methodology in RCTs has improved following international consensus recommendations. However, no international recommendations exist concerning the statistical analysis of such data. The aim of our study was to identify and characterise the quality of the statistical methods commonly used for analysing HRQoL data in cancer RCTs. Building on our recently published systematic review, we analysed a total of 33 published RCTs studying the HRQoL methods reported in RCTs since 1991. We focussed on the ability of the methods to deal with the three major problems commonly encountered when analysing HRQoL data: their multidimensional and longitudinal structure and the commonly high rate of missing data. All studies reported HRQoL being assessed repeatedly over time for a period ranging from 2 to 36 months. Missing data were common, with compliance rates ranging from 45% to 90%. From the 33 studies considered, 12 different statistical methods were identified. Twenty-nine studies analysed each of the questionnaire sub-dimensions without type I error adjustment. Thirteen studies repeated the HRQoL analysis at each assessment time again without type I error adjustment. Only 8 studies used methods suitable for repeated measurements. Our findings show a lack of consistency in statistical methods for analysing HRQoL data. Problems related to multiple comparisons were rarely considered leading to a high risk of false positive results. It is therefore critical that international recommendations for improving such statistical practices are developed. Copyright © 2017. Published by Elsevier Ltd.

  5. Network, cluster and risk factor analyses for porcine reproductive and respiratory syndrome using data from swine sites participating in a disease control program.

    Science.gov (United States)

    Arruda, A G; Friendship, R; Carpenter, J; Hand, K; Poljak, Z

    2016-06-01

    The objectives of this study were to describe networks of Ontario swine sites and their service providers (including trucking, feed, semen, gilt and boar companies); to categorize swine sites into clusters based on site-level centrality measures, and to investigate risk factors for porcine reproductive and respiratory syndrome (PRRS) using information gathered from the above-mentioned analyses. All 816 sites included in the current study were enrolled in the PRRS area regional control and elimination projects in Ontario. Demographics, biosecurity and network data were collected using a standardized questionnaire and PRRS status was determined on the basis of available diagnostic tests and assessment by site veterinarians. Two-mode networks were transformed into one-mode dichotomized networks. Cluster and risk factor analyses were conducted separately for breeding and growing pig sites. In addition to the clusters obtained from cluster analyses, other explanatory variables of interest included: production type, type of animal flow, use of a shower facility, and number of neighboring swine sites within 3km. Unadjusted univariable analyses were followed by two types of adjusted models (adjusted for production systems): a generalizing estimation equation model (GEE) and a generalized linear mixed model (GLMM). Results showed that the gilt network was the most fragmented network, followed by the boar and truck networks. Considering all networks simultaneously, approximately 94% of all swine sites were indirectly connected. Unadjusted risk factor analyses showed significant associations between almost all predictors of interest and PRRS positivity, but these disappeared once production system was taken into consideration. Finally, the vast majority of the variation on PRRS status was explained by production system according to GLMM, which shows the highly correlated nature of the data, and raises the point that interventions at this level could potentially have high

  6. The effect of cold priming on the fitness of Arabidopsis thaliana accessions under natural and controlled conditions

    DEFF Research Database (Denmark)

    Cvetkovic, Jelena; Müller, Klaus; Baier, Margarete

    2017-01-01

    Priming improves an organism's performance upon a future stress. To test whether cold priming supports protection in spring and how it is affected by cold acclimation, we compared seven Arabidopsis accessions with different cold acclimation potentials in the field and in the greenhouse for growth...... that cold priming stronger impacts on plant fitness than cold acclimation in spring in accessions with intermediate and low cold acclimation potential....

  7. Protocole of a controlled before-after evaluation of a national health information technology-based program to improve healthcare coordination and access to information.

    Science.gov (United States)

    Saillour-Glénisson, Florence; Duhamel, Sylvie; Fourneyron, Emmanuelle; Huiart, Laetitia; Joseph, Jean Philippe; Langlois, Emmanuel; Pincemail, Stephane; Ramel, Viviane; Renaud, Thomas; Roberts, Tamara; Sibé, Matthieu; Thiessard, Frantz; Wittwer, Jerome; Salmi, Louis Rachid

    2017-04-21

    Improvement of coordination of all health and social care actors in the patient pathways is an important issue in many countries. Health Information (HI) technology has been considered as a potentially effective answer to this issue. The French Health Ministry first funded the development of five TSN ("Territoire de Soins Numérique"/Digital health territories) projects, aiming at improving healthcare coordination and access to information for healthcare providers, patients and the population, and at improving healthcare professionals work organization. The French Health Ministry then launched a call for grant to fund one research project consisting in evaluating the TSN projects implementation and impact and in developing a model for HI technology evaluation. EvaTSN is mainly based on a controlled before-after study design. Data collection covers three periods: before TSN program implementation, during early TSN program implementation and at late TSN program implementation, in the five TSN projects' territories and in five comparison territories. Three populations will be considered: "TSN-targeted people" (healthcare system users and people having characteristics targeted by the TSN projects), "TSN patient users" (people included in TSN experimentations or using particular services) and "TSN professional users" (healthcare professionals involved in TSN projects). Several samples will be made in each population depending on the objective, axis and stage of the study. Four types of data sources are considered: 1) extractions from the French National Heath Insurance Database (SNIIRAM) and the French Autonomy Personalized Allowance database, 2) Ad hoc surveys collecting information on knowledge of TSN projects, TSN program use, ease of use, satisfaction and understanding, TSN pathway experience and appropriateness of hospital admissions, 3) qualitative analyses using semi-directive interviews and focus groups and document analyses and 4) extractions of TSN

  8. Cost and quality effectiveness of objective-based and statistically-based quality control for volatile organic compounds analyses of gases

    International Nuclear Information System (INIS)

    Bennett, J.T.; Crowder, C.A.; Connolly, M.J.

    1994-01-01

    Gas samples from drums of radioactive waste at the Department of Energy (DOE) Idaho National Engineering Laboratory are being characterized for 29 volatile organic compounds to determine the feasibility of storing the waste in DOE's Waste Isolation Pilot Plant (WIPP) in Carlsbad, New Mexico. Quality requirements for the gas chromatography (GC) and GC/mass spectrometry chemical methods used to analyze the waste are specified in the Quality Assurance Program Plan for the WIPP Experimental Waste Characterization Program. Quality requirements consist of both objective criteria (data quality objectives, DQOs) and statistical criteria (process control). The DQOs apply to routine sample analyses, while the statistical criteria serve to determine and monitor precision and accuracy (P ampersand A) of the analysis methods and are also used to assign upper confidence limits to measurement results close to action levels. After over two years and more than 1000 sample analyses there are two general conclusions concerning the two approaches to quality control: (1) Objective criteria (e.g., ± 25% precision, ± 30% accuracy) based on customer needs and the usually prescribed criteria for similar EPA- approved methods are consistently attained during routine analyses. (2) Statistical criteria based on short term method performance are almost an order of magnitude more stringent than objective criteria and are difficult to satisfy following the same routine laboratory procedures which satisfy the objective criteria. A more cost effective and representative approach to establishing statistical method performances criteria would be either to utilize a moving average of P ampersand A from control samples over a several month time period or to determine within a sample variation by one-way analysis of variance of several months replicate sample analysis results or both. Confidence intervals for results near action levels could also be determined by replicate analysis of the sample in

  9. Controls on Mississippi Valley-Type Zn-Pb mineralization in Behabad district, Central Iran: Constraints from spatial and numerical analyses

    Science.gov (United States)

    Parsa, Mohammad; Maghsoudi, Abbas

    2018-04-01

    The Behabad district, located in the central Iranian microcontinent, contains numerous epigenetic stratabound carbonate-hosted Zn-Pb ore bodies. The mineralizations formed as fault, fracture and karst fillings in the Permian-Triassic formations, especially in Middle Triassic dolostones, and comprise mainly non-sulfides zinc ores. These are all interpreted as Mississippi Valley-type (MVT) base metal deposits. From an economic geological point of view, it is imperative to recognize the processes that have plausibly controlled the emplacement of MVT Zn-Pb mineralization in the Behabad district. To address the foregoing issue, analyses of the spatial distribution of mineral deposits comprising fry and fractal techniques and analysis of the spatial association of mineral deposits with geological features using distance distribution analysis were applied to assess the regional-scale processes that could have operated in the distribution of MVT Zn-Pb deposits in the district. The obtained results based on these analytical techniques show the main trends of the occurrences are NW-SE and NE-SW, which are parallel or subparallel to the major northwest and northeast trending faults, supporting the idea that these particular faults could have acted as the main conduits for transport of mineral-bearing fluids. The results of these analyses also suggest that Permian-Triassic brittle carbonate sedimentary rocks have served as the lithological controls on MVT mineralization in the Behabad district as they are spatially and temporally associated with mineralization.

  10. Peer support in type 2 diabetes: a randomised controlled trial in primary care with parallel economic and qualitative analyses: pilot study and protocol

    Directory of Open Access Journals (Sweden)

    O'Kelly Fergus

    2007-07-01

    Full Text Available Abstract Background Diabetes is a chronic illness, which requires the individual to assume responsibility for their own care with the aim of maintaining glucose and blood pressure levels as close to normal as possible. Traditionally self-management training for diabetes has been delivered in a didactic manner. In recent times alternatives to the traditional delivery of diabetes care have been investigated, for example, the concept of peer support which emphasises patient rather than professional domination. This paper describes the pilot study and protocol for a study that aims to evaluate the effectiveness of a peer support intervention for people with type 2 diabetes in a primary care setting. Methods/Design A pilot study was conducted to access the feasibility of a randomized controlled trial of a peer support intervention. We used the MRC Framework for the evaluation of complex interventions. Elements of the intervention were defined and the study protocol was finalized. In this cluster randomised controlled trial twenty general practices are assigned to control and intervention groups. Each practice compiles a diabetes register and randomly selects 21 patients. All practices implement a standardised diabetes care system. In the intervention group all practices recruit three peer supporters. The peer supporters are trained to conduct nine group meetings in their general practice over a period of two years. Each meeting has a structured component. The primary outcomes are blood pressure, total cholesterol, HBA1c and the Diabetes Well-being score. In addition to biophysical, psychosocial, economic and health service utilization data peer supporter activity and qualitative data are collected. Discussion Peer support is a complex intervention and evaluating such an intervention presents challenges to researchers. This study will evaluate whether a peer support programme for patients with type 2 diabetes improves biophysical and psychosocial

  11. Social Determinants of Equity in Access to Healthcare for Tuberculosis Patients in Republic of Macedonia – Results from a Case-Control Study

    Directory of Open Access Journals (Sweden)

    Dance Gudeva Nikovska

    2014-09-01

    Full Text Available Background Health is a complex phenomenon and equity as a basic human right an integral part of constitutions in almost all countries in the world. In Republic of Macedonia (RM, Tuberculosis (TB is clustered regionally and in certain ethnic groups. The main objective of this study was to analyze Social Determinants of Health (SDH and equity in access to healthcare services for TB patients in RM, aimed at complex analysis of factors that cause inequities. Methods Case-control study was conducted in the period March–December, 2013; “cases” are households of TB patients registered in the period July, 2012–June, 2013 and controls are households with no TB patients in their immediate vicinity. World Health Organization (WHO World Health Survey questionnaire was used to collect data. Results Analysis of SDH of TB patients shows that patients are mostly males, of lower socio-economic status, are less educated, unemployed and TB is clustered in certain ethnic groups. Analysis of access has identified these determinants as important barriers in access to health services. Conclusion The study has documented the basic SDH of TB patients in RM, as well as barriers in access to healthcare, providing useful baseline information to facilitate determination where to concentrate future efforts.

  12. A Randomized Controlled Trial of a Mobile Clinical Decision Aid to Improve Access to Kidney Transplantation: iChoose Kidney

    Directory of Open Access Journals (Sweden)

    Rachel E. Patzer

    2016-05-01

    Discussion: Engaging patients in health care choices can increase patient empowerment and improve knowledge and understanding of treatment choices. If the effectiveness of iChoose Kidney has a greater impact on patients with low health literacy, lower socioeconomic status, and minority race, this decision aid could help reduce disparities in access to kidney transplantation.

  13. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  14. Chemical, laboratory analyses, physical and profile oceanographic data collected aboard the JACK FITZ in the Gulf of Mexico from 2010-08-18 to 2010-08-23 in response to the Deepwater Horizon Oil Spill event (NODC Accession 0069119)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Chemical, laboratory analyses, physical and profile oceanographic data were collected aboard the JACK FITZ in the Gulf of Mexico from 2010-08-18 to 2010-08-23 in...

  15. Chemical, laboratory analyses, physical and profile oceanographic data collected aboard the BUNNY BORDELON in the Gulf of Mexico from 2010-08-18 to 2010-08-23 in response to the Deepwater Horizon Oil Spill event (NODC Accession 0069118)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Chemical, laboratory analyses, physical and profile oceanographic data were collected aboard the BUNNY BORDELON in the Gulf of Mexico from 2010-08-18 to 2010-08-23...

  16. Chemical, laboratory analyses, physical and profile oceanographic data collected aboard the JACK FITZ in the Gulf of Mexico from 2010-06-12 to 2010-06-20 in response to the Deepwater Horizon Oil Spill event (NODC Accession 0069074)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Chemical, laboratory analyses, physical and profile oceanographic data were collected aboard the JACK FITZ in the Gulf of Mexico from 2010-06-12 to 2010-06-20 in...

  17. Chemical and laboratory analyses oceanographic data collected aboard the Wes Bordelon in the Gulf of Mexico from 2010-08-18 to 2010-08-22 in response to the Deepwater Horizon Oil Spill event (NODC Accession 0074863)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Chemical and laboratory analyses oceanographic data were collected aboard the Wes Bordelon in the Gulf of Mexico from 2010-08-18 to 2010-08-22 in response to the...

  18. Do pregnant women prefer timing of elective cesarean section prior to versus after 39 weeks of gestation? Secondary analyses from a randomized controlled trial.

    Science.gov (United States)

    Glavind, J; Henriksen, T B; Kindberg, S F; Uldbjerg, N

    2014-11-01

    To evaluate women's preferences for timing of elective cesarean section (ECS) scheduled prior to versus after 39 completed weeks. Secondary analyses from a randomized controlled open-label trial were conducted at seven Danish tertiary hospitals from March 2009 to June 2011 with inclusion of singleton pregnant women with a healthy fetus. The women were allocated by a computerized telephone system to ECS scheduled at 38(+3) weeks or 39(+3) weeks of gestation. Dissatisfaction with timing of ECS and preferred timing of the procedure in a proposed future ECS delivery were evaluated. Data analyses were done by intention-to-treat, using logistic regression. A total of 1196 women (94%) completed an online questionnaire at follow-up eight weeks postpartum. In the 38 weeks group, 61 (10%) women 601 were dissatisfied with the timing of their ECS, whereas in the 39 weeks group 157 (26%) of 595 were dissatisfied (adjOR 3.18, 95% CI 2.30; 4.40). The proportion of women who preferred the same timing in a future ECS were 272 (45%) in the 38 weeks group compared to 232 (39%) in the 39(+3) weeks group (adjOR 0.75, 95% CI 0.60; 0.95). The women in this trial preferred ECS scheduled prior to 39 weeks of gestation.

  19. Controle público e eqüidade no acesso a hospitais sob gestão pública não estatal Public control and equity of access to hospitals under non-State public administration

    Directory of Open Access Journals (Sweden)

    Nivaldo Carneiro Junior

    2006-10-01

    Full Text Available OBJETIVO: Analisar as organizações sociais de saúde à luz do controle público e da garantia da eqüidade no acesso aos serviços de saúde. MÉTODOS: Utilizou-se a técnica de estudo de caso e foram selecionadas duas organizações sociais de saúde na região metropolitana de São Paulo. As categorias analíticas foram eqüidade no acesso e controle público, baseando-se em entrevistas com informantes-chave e relatórios técnico-administrativos. RESULTADOS: Observou-se que financiamento global e o controle administrativo das organizações sociais de saúde são atribuições do gestor estadual. A presença do gestor local é importante para a garantia da eqüidade no acesso, sendo que o controle público se expressa por ações fiscalizadoras mediante procedimentos contábil-financeiros. CONCLUSÕES: A eqüidade no acesso e o controle público não são contemplados na gestão dessas organizações. A questão central encontra-se na capacidade do poder público se fazer presente na implementação dessa modalidade no âmbito local, garantido a eqüidade no acesso e contemplando o controle público.OBJECTIVE: To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. METHODS: Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. RESULTS: It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. CONCLUSIONS: Equity of access and public control are not taken into consideration

  20. Access and benefit sharing (ABS) under the convention on biological diversity (CBD): implications for microbial biological control

    Science.gov (United States)

    Researchers and implementers of biological control are confronted with a variety of scientific, regulatory and administrative challenges to their biological control programs. One developing challenge will arise from the implementation of provisions of the Convention on Biological Diversity (CBD) co...

  1. Is grey literature essential for a better control of publication bias in psychiatry? An example from three meta-analyses of schizophrenia.

    Science.gov (United States)

    Martin, José Luis R; Pérez, Víctor; Sacristán, Montse; Alvarez, Enric

    2005-12-01

    Systematic reviews in mental health have become useful tools for health professionals in view of the massive amount and heterogeneous nature of biomedical information available today. In order to determine the risk of bias in the studies evaluated and to avoid bias in generalizing conclusions from the reviews it is therefore important to use a very strict methodology in systematic reviews. One bias which may affect the generalization of results is publication bias, which is determined by the nature and direction of the study results. To control or minimize this type of bias, the authors of systematic reviews undertake comprehensive searches of medical databases and expand on the findings, often undertaking searches of grey literature (material which is not formally published). This paper attempts to show the consequences (and risk) of generalizing the implications of grey literature in the control of publication bias, as was proposed in a recent systematic work. By repeating the analyses for the same outcome from three different systematic reviews that included both published and grey literature our results showed that confusion between grey literature and publication bias may affect the results of a concrete meta-analysis.

  2. Antihypertensive drugs, prevention of cognitive decline and dementia: a systematic review of observational studies, randomized controlled trials and meta-analyses, with discussion of potential mechanisms.

    Science.gov (United States)

    Rouch, Laure; Cestac, Philippe; Hanon, Olivier; Cool, Charlène; Helmer, Catherine; Bouhanick, Béatrice; Chamontin, Bernard; Dartigues, Jean-Franҫois; Vellas, Bruno; Andrieu, Sandrine

    2015-02-01

    Chronic hypertension, particularly midlife high blood pressure, has been associated with an increased risk for cognitive decline and dementia. In this context, antihypertensive drugs might have a preventive effect, but the association remains poorly understood. The aim of this systematic review was to examine all published findings that investigated this relationship and discuss the mechanisms underlying the potential benefits of antihypertensive medication use. A literature search was conducted using MEDLINE, Embase, and the Cochrane Library for publications from 1990 onwards mentioning hypertension, antihypertensive drugs, cognitive decline, and dementia. A total of 38 relevant publications, corresponding to 18 longitudinal studies, 11 randomized controlled trials, and nine meta-analyses were identified from the 10,251 articles retrieved in the literature search. In total, 1,346,176 subjects were included in these studies; the average age was 74 years. In the seven longitudinal studies assessing the effect of antihypertensive medication on cognitive impairment or cognitive decline, antihypertensive drugs appeared to be beneficial. Of the 11 longitudinal studies that assessed the effect of antihypertensive medication on incidence of dementia, only three did not find a significant protective effect. Antihypertensive medication could decrease the risk of not only vascular dementia but also Alzheimer's disease. Four randomized controlled trials showed a potentially preventive effect of antihypertensive drugs on the incidence of dementia or cognitive decline: SYST-EUR (Systolic Hypertension in Europe Study) I and II, with a 55% reduction in dementia risk (3.3 vs. 7.4 cases per 1,000 patient years; pPrevention Evaluation), with a 41% reduction in cognitive decline associated with stroke (95% confidence interval [CI] 6-63); and PROGRESS (Perindopril Protection against Recurrent Stroke Study), with a 19% reduction in cognitive decline (95% CI 4-32; p=0.01). Meta-analyses

  3. Effects of Home Access to Active Videogames on Child Self-Esteem, Enjoyment of Physical Activity, and Anxiety Related to Electronic Games: Results from a Randomized Controlled Trial.

    Science.gov (United States)

    Abbott, Rebecca A; Smith, Anne J; Howie, Erin K; Pollock, Clare; Straker, Leon

    2014-08-01

    Active-input videogames could provide a useful conduit for increasing physical activity by improving a child's self-confidence, physical activity enjoyment, and reducing anxiety. Therefore this study evaluated the impact of (a) the removal of home access to traditional electronic games or (b) their replacement with active-input videogames, on child self-perception, enjoyment of physical activity, and electronic game use anxiety. This was a crossover, randomized controlled trial, conducted over a 6-month period in participants' family homes in metropolitan Perth, Australia, from 2007 to 2010. Children 10-12 years old were recruited through school and community media. Of 210 children who were eligible, 74 met inclusion criteria, and 8 withdrew, leaving 66 children (33 girls) for analysis. A counterbalanced randomized order of three conditions sustained for 8 weeks each: No home access to electronic games, home access to traditional electronic games, and home access to active-input electronic games. Perception of self-esteem (Harter's Self Perception Profile for Children), enjoyment of physical activity (Physical Activity Enjoyment Scale questionnaire), and anxiety toward electronic game use (modified Loyd and Gressard Computer Anxiety Subscale) were assessed. Compared with home access to traditional electronic games, neither removal of all electronic games nor replacement with active-input games resulted in any significant change to child self-esteem, enjoyment of physical activity, or anxiety related to electronic games. Although active-input videogames have been shown to be enjoyable in the short term, their ability to impact on psychological outcomes is yet to be established.

  4. Tuning resistance states by thickness control in an electroforming-free nanometallic complementary resistance random access memory

    Science.gov (United States)

    Yang, Xiang; Lu, Yang; Lee, Jongho; Chen, I.-Wei

    2016-01-01

    Tuning low resistance state is crucial for resistance random access memory (RRAM) that aims to achieve optimal read margin and design flexibility. By back-to-back stacking two nanometallic bipolar RRAMs with different thickness into a complementary structure, we have found that its low resistance can be reliably tuned over several orders of magnitude. Such high tunability originates from the exponential thickness dependence of the high resistance state of nanometallic RRAM, in which electron wave localization in a random network gives rise to the unique scaling behavior. The complementary nanometallic RRAM provides electroforming-free, multi-resistance-state, sub-100 ns switching capability with advantageous characteristics for memory arrays.

  5. Tuning resistance states by thickness control in an electroforming-free nanometallic complementary resistance random access memory

    International Nuclear Information System (INIS)

    Yang, Xiang; Lu, Yang; Lee, Jongho; Chen, I-Wei

    2016-01-01

    Tuning low resistance state is crucial for resistance random access memory (RRAM) that aims to achieve optimal read margin and design flexibility. By back-to-back stacking two nanometallic bipolar RRAMs with different thickness into a complementary structure, we have found that its low resistance can be reliably tuned over several orders of magnitude. Such high tunability originates from the exponential thickness dependence of the high resistance state of nanometallic RRAM, in which electron wave localization in a random network gives rise to the unique scaling behavior. The complementary nanometallic RRAM provides electroforming-free, multi-resistance-state, sub-100 ns switching capability with advantageous characteristics for memory arrays

  6. Dose–response effects of exercise training on the subjective sleep quality of postmenopausal women: exploratory analyses of a randomised controlled trial

    Science.gov (United States)

    Sui, Xuemei; Hall, Martica H; Youngstedt, Shawn D; Blair, Steven N; Earnest, Conrad P; Church, Timothy S

    2012-01-01

    Objective To investigate whether a dose–response relationship existed between exercise and subjective sleep quality in postmenopausal women. This objective represents a post hoc assessment that was not previously considered. Design Parallel-group randomised controlled trial. Setting Clinical exercise physiology laboratory in Dallas, Texas. Participants 437 sedentary overweight/obese postmenopausal women. Intervention Participants were randomised to one of four treatments, each of 6 months of duration: a non-exercise control treatment (n=92) or one of three dosages of moderate-intensity exercise (50% of VO2peak), designed to meet 50% (n=151), 100% (n=99) or 150% (n=95) of the National Institutes of Health Consensus Development Panel physical activity recommendations. Exercise dosages were structured to elicit energy expenditures of 4, 8 or 12 kilocalories per kilogram of body weight per week (KKW), respectively. Analyses were intent to treat. Primary outcome measures Continuous scores and odds of having significant sleep disturbance, as assessed by the Sleep Problems Index from the 6-item Medical Outcomes Study Sleep Scale. Outcome assessors were blinded to participant randomisation assignment. Results Change in the Medical Outcomes Study Sleep Problems Index score at 6 months significantly differed by treatment group (control: −2.09 (95% CI −4.58 to 0.40), 4 KKW: −3.93 (−5.87 to −1.99), 8 KKW: −4.06 (−6.45 to −1.67), 12 KKW: −6.22 (−8.68 to −3.77); p=0.04), with a significant dose–response trend observed (p=0.02). Exercise training participants had lower odds of having significant sleep disturbance at postintervention compared with control (4 KKW: OR 0.37 (95% CI 0.19 to 0.73), 8 KKW: 0.36 (0.17 to 0.77), 12 KKW: 0.34 (0.16 to 0.72)). The magnitude of weight loss did not differ between treatment conditions. Improvements in sleep quality were not related to changes in body weight, resting parasympathetic control or cardiorespiratory

  7. Beyond intention-to-treat: The effect of brief counseling for tobacco cessation in secondary analyses of a cluster randomized controlled trial in Swedish dental clinics

    Directory of Open Access Journals (Sweden)

    Sinziana I. Oncioiu

    2017-03-01

    Full Text Available In experimental studies the assigned intervention measures the received intervention if full protocol adherence is achieved, but this is rarely the case in public health. The objective of this study was to estimate the effect of a brief counseling intervention delivered in Swedish dental clinics on tobacco use cessation, taking non-adherence into account. We conducted three secondary analyses. In a per-protocol analysis the experimental counseling delivered as intended was contrasted to usual care (control. In an as-treated analysis individuals were compared according to the counseling components actually received, disregarding randomization. In an instrumental variable analysis the effect of the intervention among those who would always be treated as assigned was estimated. Logistic regression was used to examine the association between tobacco cessation outcomes (seven-day abstinence, three-month abstinence, half-reduction, quit attempts and the defined exposure to the intervention. Protocol adherence in the intervention group was 73.4%. The per-protocol analysis closely replicated the results of the intention-to-treat analysis, showing a statistically significant effect of the brief counseling on the reduction in tobacco consumption OR = 1.81, 95% CI [1.06, 3.07], but no significant effect for other outcomes. In the as-treated analysis, receiving more counseling components compared with no tobacco counseling increased the likelihood of half-reduction. The instrumental variable yielded biased results. We conclude that despite application problems, conducting per-protocol, as-treated and instrumental variable analyses in randomized trials where experimental conditions are not strictly standardized strengthens and puts in context the inference based on intention-to-treat analysis.

  8. Molecular- and cultivation-based analyses of microbial communities in oil field water and in microcosms amended with nitrate to control H{sub 2}S production

    Energy Technology Data Exchange (ETDEWEB)

    Kumaraswamy, Raji; Ebert, Sara; Fedorak, Phillip M.; Foght, Julia M. [Alberta Univ., Edmonton, AB (Canada). Biological Sciences; Gray, Murray R. [Alberta Univ., Edmonton, AB (Canada). Chemical and Materials Engineering

    2011-03-15

    Nitrate injection into oil fields is an alternative to biocide addition for controlling sulfide production ('souring') caused by sulfate-reducing bacteria (SRB). This study examined the suitability of several cultivation-dependent and cultivation-independent methods to assess potential microbial activities (sulfidogenesis and nitrate reduction) and the impact of nitrate amendment on oil field microbiota. Microcosms containing produced waters from two Western Canadian oil fields exhibited sulfidogenesis that was inhibited by nitrate amendment. Most probable number (MPN) and fluorescent in situ hybridization (FISH) analyses of uncultivated produced waters showed low cell numbers ({<=}10{sup 3} MPN/ml) dominated by SRB (>95% relative abundance). MPN analysis also detected nitrate-reducing sulfide-oxidizing bacteria (NRSOB) and heterotrophic nitrate-reducing bacteria (HNRB) at numbers too low to be detected by FISH or denaturing gradient gel electrophoresis (DGGE). In microcosms containing produced water fortified with sulfate, near-stoichiometric concentrations of sulfide were produced. FISH analyses of the microcosms after 55 days of incubation revealed that Gammaproteobacteria increased from undetectable levels to 5-20% abundance, resulting in a decreased proportion of Deltaproteobacteria (50-60% abundance). DGGE analysis confirmed the presence of Delta- and Gammaproteobacteria and also detected Bacteroidetes. When sulfate-fortified produced waters were amended with nitrate, sulfidogenesis was inhibited and Deltaproteobacteria decreased to levels undetectable by FISH, with a concomitant increase in Gammaproteobacteria from below detection to 50-60% abundance. DGGE analysis of these microcosms yielded sequences of Gamma- and Epsilonproteobacteria related to presumptive HNRB and NRSOB (Halomonas, Marinobacterium, Marinobacter, Pseudomonas and Arcobacter), thus supporting chemical data indicating that nitrate-reducing bacteria out-compete SRB when nitrate is

  9. Laser Beam Focus Analyser

    DEFF Research Database (Denmark)

    Nielsen, Peter Carøe; Hansen, Hans Nørgaard; Olsen, Flemming Ove

    2007-01-01

    the obtainable features in direct laser machining as well as heat affected zones in welding processes. This paper describes the development of a measuring unit capable of analysing beam shape and diameter of lasers to be used in manufacturing processes. The analyser is based on the principle of a rotating...... mechanical wire being swept through the laser beam at varying Z-heights. The reflected signal is analysed and the resulting beam profile determined. The development comprised the design of a flexible fixture capable of providing both rotation and Z-axis movement, control software including data capture...... and finally data analysis based on the ISO approach. The device was calibrated and tested on commercially available laser systems. It showed good reproducibility. It was the target to be able to measure CW lasers with a power up to 200 W, focused down to spot diameters in the range of 10µm. In order...

  10. Open Access

    Science.gov (United States)

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  11. Local anaesthetic infiltration for peri-operative pain control in total hip and knee replacement: systematic review and meta-analyses of short- and long-term effectiveness.

    Science.gov (United States)

    Marques, Elsa M R; Jones, Hayley E; Elvers, Karen T; Pyke, Mark; Blom, Ashley W; Beswick, Andrew D

    2014-07-05

    Surgical pain is managed with multi-modal anaesthesia in total hip replacement (THR) and total knee replacement (TKR). It is unclear whether including local anaesthetic infiltration before wound closure provides additional pain control. We performed a systematic review of randomised controlled trials of local anaesthetic infiltration in patients receiving THR or TKR. We searched MEDLINE, Embase and Cochrane CENTRAL to December 2012. Two reviewers screened abstracts, extracted data, and contacted authors for unpublished outcomes and data. Outcomes collected were post-operative pain at rest and during activity after 24 and 48 hours, opioid requirement, mobilisation, hospital stay and complications. When feasible, we estimated pooled treatment effects using random effects meta-analyses. In 13 studies including 909 patients undergoing THR, patients receiving local anaesthetic infiltration experienced a greater reduction in pain at 24 hours at rest by standardised mean difference (SMD) -0.61 (95% CI -1.05, -0.16; p = 0.008) and by SMD -0.43 (95% CI -0.78 -0.09; p = 0.014) at 48 hours during activity.In TKR, diverse multi-modal regimens were reported. In 23 studies including 1439 patients undergoing TKR, local anaesthetic infiltration reduced pain on average by SMD -0.40 (95% CI -0.58, -0.22; p SMD -0.27 (95% CI -0.50, -0.05; p = 0.018) at 48 hours during activity, compared with patients receiving no infiltration or placebo. There was evidence of a larger reduction in studies delivering additional local anaesthetic after wound closure. There was no evidence of pain control additional to that provided by femoral nerve block.Patients receiving local anaesthetic infiltration spent on average an estimated 0.83 (95% CI 1.54, 0.12; p = 0.022) and 0.87 (95% CI 1.62, 0.11; p = 0.025) fewer days in hospital after THR and TKR respectively, had reduced opioid consumption, earlier mobilisation, and lower incidence of vomiting.Few studies reported long-term outcomes. Local

  12. Characterization of three loci controlling resistance of Arabidopsis thaliana accession Ms-0 to two powdery mildew diseases.

    Science.gov (United States)

    Xiao, S; Ellwood, S; Findlay, K; Oliver, R P; Turner, J G

    1997-10-01

    Arabidopsis thaliana accession La-er was susceptible, and accession Ms-0 was resistant, to powdery mildew diseases caused by Erysiphe cruciferarum UEA1 and E. cichoracearum UCSC1. The resistance reaction phenotype of A. thaliana Ms-0 to both pathogens was characterized, and the resistance loci were genetically mapped. Growth of E. cruciferarum UEA1 on Ms-0 leaves was arrested after formation of the first appressorium: the underlying host epidermal cell collapsed, and occasionally there was necrosis of one or two host mesophyll cells. Growth of E. cichoracearum UCSC1 on Ms-0 leaves was arrested after emergence of several germ tubes from the conidium, and there was necrosis of host mesophyll cells at the sites of infection. Examination of F2 progeny of a cross La-er x Ms-0 indicated that two independently-segregating dominant loci were required for resistance to E. cruciferarum UEA1. One locus, named RPW6, was genetically mapped to chromosome 5, in a 5.6 cM interval flanked by pCITf16 and PI. The other locus, named RPW7, mapped to chromosome 3 in a 8.5 cM interval flanked by CDC2A and AFC1. Independent effects of RPW6 and RPW7 on E. cruciferarum UEA1 could be detected by quantitative measurements of growth of mycelium and production of conidia. Resistance to E. cichoracearum UCSC1 mapped to a single locus, named RPW8, at a location on chromosome 3 which we could not distinguish from RPW7. Evidently, RPW7 and RPW8 define either a complex resistance locus, or a common resistance gene with dual specificity.

  13. Demystifying Open Access

    International Nuclear Information System (INIS)

    Mele, Salvatore

    2007-01-01

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  14. Experiences and Lessons Learnt with Collaborative e-Research Infrastructure and the application of Identity Management and Access Control for the Centre for Environmental Data Analysis

    Science.gov (United States)

    Kershaw, P.

    2016-12-01

    CEDA, the Centre for Environmental Data Analysis, hosts a range of services on behalf of NERC (Natural Environment Research Council) for the UK environmental sciences community and its work with international partners. It is host to four data centres covering atmospheric science, earth observation, climate and space data domain areas. It holds this data on behalf of a number of different providers each with their own data policies which has thus required the development of a comprehensive system to manage access. With the advent of CMIP5, CEDA committed to be one of a number of centres to host the climate model outputs and make them available through the Earth System Grid Federation, a globally distributed software infrastructure developed for this purpose. From the outset, a means for restricting access to datasets was required, necessitating the development a federated system for authentication and authorisation so that access to data could be managed across multiple providers around the world. From 2012, CEDA has seen a further evolution with the development of JASMIN, a multi-petabyte data analysis facility. Hosted alongside the CEDA archive, it provides a range of services for users including a batch compute cluster, group workspaces and a community cloud. This has required significant changes and enhancements to the access control system. In common with many other examples in the research community, the experiences of the above underline the difficulties of developing collaborative e-Research infrastructures. Drawing from these there are some recurring themes: Clear requirements need to be established at the outset recognising that implementing strict access policies can incur additional development and administrative overhead. An appropriate balance is needed between ease of access desired by end users and metrics and monitoring required by resource providers. The major technical challenge is not with security technologies themselves but their effective

  15. Body weight affects ω-3 polyunsaturated fatty acid (PUFA) accumulation in youth following supplementation in post-hoc analyses of a randomized controlled trial.

    Science.gov (United States)

    Christian, Lisa M; Young, Andrea S; Mitchell, Amanda M; Belury, Martha A; Gracious, Barbara L; Arnold, L Eugene; Fristad, Mary A

    2017-01-01

    Guidelines for suggested intake of ω-3 polyunsaturated fatty acids (PUFAs) are limited in youth and rely primarily on age. However, body weight varies considerably within age classifications. The current analyses examined effects of body weight and body mass index (BMI) on fatty acid accumulation in 64 youth (7-14 years) with a diagnosed mood disorder in a double-blind randomized-controlled trial (2000mg ω-3 supplements or a control capsule) across 12 weeks. Weight and height were measured at the first study visit and EPA and DHA levels were determined using fasting blood samples obtained at both the first and end-of-study visits. In the ω-3 supplementation group, higher baseline body weight predicted less plasma accumulation of both EPA [B = -0.047, (95% CI = -0.077; -0.017), β = -0.54, p = 0.003] and DHA [B = -0.02, (95% CI = -0.034; -0.007), β = -0.52, p = 0.004]. Similarly, higher BMI percentile as well as BMI category (underweight, normal weight, overweight/obese) predicted less accumulation of EPA and DHA (ps≤0.01). Adherence to supplementation was negatively correlated with BMI percentile [B = -0.002 (95% CI = -0.004; 0.00), β = -0.44, p = 0.019], but did not meaningfully affect observed associations. As intended, the control supplement exerted no significant effect on plasma levels of relevant fatty acids regardless of youth body parameters. These data show strong linear relationships of both absolute body weight and BMI percentile with ω-3 PUFA accumulation in youth. A dose-response effect was observed across the BMI spectrum. Given increasing variability in weight within BMI percentile ranges as youth age, dosing based on absolute weight should be considered. Moreover, effects of weight should be incorporated into statistical models in studies examining clinical effects of ω-3 PUFAs in youth as well as adults, as weight-related differences in effects may contribute meaningfully to inconsistencies in the current literature. WHO International

  16. Influence of Biomechanical Characteristics on Pain and Function Outcomes From Exercise in Medial Knee Osteoarthritis and Varus Malalignment: Exploratory Analyses From a Randomized Controlled Trial.

    Science.gov (United States)

    Bennell, Kim L; Dobson, Fiona; Roos, Ewa M; Skou, Søren T; Hodges, Paul; Wrigley, Tim V; Kyriakides, Mary; Metcalf, Ben; Hunt, Michael A; Hinman, Rana S

    2015-09-01

    To investigate whether selected biomechanical characteristics influence changes in pain and physical function with exercise in people with medial knee osteoarthritis (OA) and varus malalignment. We conducted post hoc exploratory analyses from a randomized controlled trial involving 100 people with medial knee OA and varus malalignment who were randomly allocated to one of two 12-week exercise programs (quadriceps strengthening [QS] or neuromuscular exercise [NEXA]). The outcome measures were change in overall average knee pain (visual analog scale) and self-reported physical function (Western Ontario and McMaster Universities Osteoarthritis Index). Candidate biomechanical characteristics measured at baseline were visually observed varus thrust during walking, obesity (determined by body mass index), static varus alignment, and isometric quadriceps strength. Data were analyzed with separate two-way analyses of covariance using the interaction term of exercise group by biomechanical characteristic. Ninety-two participants were analyzed for each characteristic except varus thrust, for which 85 participants were included. For change in pain, there was a significant interaction effect between type of exercise and both varus thrust (P = 0.001) and obesity (P = 0.023). NEXA was more effective for nonobese participants (mean change 29.5 mm [95% confidence interval (95% CI) 20.5, 38.5]) and for those with varus thrust (mean change 28.7 mm [95% CI 19.4, 38.1]), whereas QS was more effective for obese people (mean change 24.7 mm [95% CI 14.9, 34.4]) and for those without varus thrust (mean change 29.4 mm [95% CI 21.2, 37.7]). Biomechanical characteristics did not influence the effect of exercise on physical function (P > 0.05). These preliminary findings suggest that varus thrust and obesity influence the pain-relieving effects of 2 different types of exercise. Further research is needed to confirm whether or not exercise that is prescribed according to specific

  17. Development of a generic system for real-time data access and remote control of multiple in-situ water quality monitoring instruments

    Science.gov (United States)

    Wright, S. A.; Bennett, G. E.; Andrews, T.; Melis, T. S.; Topping, D. J.

    2005-05-01

    Currently, in-situ monitoring of water quality parameters (e.g. water temperature, conductivity, turbidity) in the Colorado River ecosystem typically consists of deploying instruments in the river, retrieving them at a later date, downloading the datalogger, then examining the data; an arduous process in the remote settings of Grand Canyon. Under this protocol, data is not available real-time and there is no way to detect problems with the instrumentation until after retrieval. The next obvious stage in the development of in-situ monitoring in Grand Canyon was the advent of one-way telemetry, i.e. streaming data in real-time from the instrument to the office and/or the world-wide-web. This protocol allows for real-time access to data and the identification of instrumentation problems, but still requires a site visit to address instrument malfunctions, i.e. the user does not have the ability to remotely control the instrument. At some field sites, such as the Colorado River in Grand Canyon, site visitation is restricted by remoteness and lack of traditional access routes (i.e. roads). Even at less remote sites, it may still be desirable to have two-way communication with instruments in order to, for example, diagnose and potentially fix instrumentation problems, change sampling parameters to save battery power, etc., without having to visit the site. To this end, the U.S. Geological Survey, Grand Canyon Monitoring and Research Center, is currently developing and testing a high-speed, two-way communication system that allows for real-time data access and remote control of instrumentation. The approach tested relies on internet access and may be especially useful in areas where land-line or cellular connections are unavailable. The system is composed of off-the-shelf products, uses a commercial broadband satellite service, and is designed in a generic way such that any instrument that communicates through RS-232 communication (i.e. a serial port) is compatible with

  18. A review of existing studies reporting the negative effects of alcohol access and positive effects of alcohol control policies on interpersonal violence

    Directory of Open Access Journals (Sweden)

    Jessica Laura Fitterer

    2015-11-01

    Full Text Available Alcohol consumption often leads to elevated rates of violence yet alcohol access policies continue to relax across the globe. Our review establishes the extent alcohol policy can moderate violent crime through alcohol availability restrictions. Results were informed from comprehensive selection of peer-reviewed journals from 1950 to October 2015. Our search identified 88 relevant studies on alcohol access and violence conducted across 12 countries. Seventeen studies included quasi-control design, and 23 conducted intervention analysis. Seventy-two (82% reported a significant relationship between alcohol access and violent offences. Alcohol outlet studies reported the greatest percentage of significant results (93%, with trading hours (63%, and alcohol price following (58%. Results from baseline studies indicated the effectiveness of increasing the price of commonly consumed alcohol, restricting the hours of alcohol trading, and limiting the number of alcohol outlets per region to prevent violent offences. Unclear are the effects of tax reductions, restriction of on-premises re-entry, and different outlet types on violent crime. Further, the generalization of statistics over broad areas and the low number of control/intervention studies poses some concern for confounding or correlated effects on study results, and amount of information for local level prevention of interpersonal violence. Future studies should focus on gathering longitudinal data, validating models, limiting crime data to peak drinking days and times, and wherever possible collecting the joint distribution between violent crime, intoxication, and place. A greater up take of local level analysis will benefit studies comparing the influence of multiple alcohol establishment types by relating the location of a crime to establishment proximity. Despite, some uncertainties particular studies showed that even modest policy changes such as 1% increases in alcohol price, one hour changes

  19. A Review of Existing Studies Reporting the Negative Effects of Alcohol Access and Positive Effects of Alcohol Control Policies on Interpersonal Violence

    Science.gov (United States)

    Fitterer, Jessica L.; Nelson, Trisalyn A.; Stockwell, Timothy

    2015-01-01

    Alcohol consumption often leads to elevated rates of violence yet alcohol access policies continue to relax across the globe. Our review establishes the extent alcohol policy can moderate violent crime through alcohol availability restrictions. Results were informed from comprehensive selection of peer-reviewed journals from 1950 to October 2015. Our search identified 87 relevant studies on alcohol access and violence conducted across 12 countries. Seventeen studies included quasi-control design, and 23 conducted intervention analysis. Seventy-one (82%) reported a significant relationship between alcohol access and violent offenses. Alcohol outlet studies reported the greatest percentage of significant results (93%), with trading hours (63%), and alcohol price following (58%). Results from baseline studies indicated the effectiveness of increasing the price of commonly consumed alcohol, restricting the hours of alcohol trading, and limiting the number of alcohol outlets per region to prevent violent offenses. Unclear are the effects of tax reductions, restriction of on-premises re-entry, and different outlet types on violent crime. Further, the generalization of statistics over broad areas and the low number of control/intervention studies poses some concern for confounding or correlated effects on study results, and amount of information for local-level prevention of interpersonal violence. Future studies should focus on gathering longitudinal data, validating models, limiting crime data to peak drinking days and times, and wherever possible collecting the joint distribution between violent crime, intoxication, and place. A greater uptake of local-level analysis will benefit studies comparing the influence of multiple alcohol establishment types by relating the location of a crime to establishment proximity. Despite, some uncertainties particular studies showed that even modest policy changes, such as 1% increases in alcohol price, 1 h changes to closing times

  20. On the interplay between working memory consolidation and attentional selection in controlling conscious access : Parallel processing at a cost-a comment on 'The interplay of attention and consciousness in visual search, attentional blink and working memory consolidation'

    NARCIS (Netherlands)

    Wyble, Brad; Bowman, Howard; Nieuwenstein, Mark

    On the interplay between working memory consolidation and attentional selection in controlling conscious access: parallel processing at a cost-a comment on 'The interplay of attention and consciousness in visual search, attentional blink and working memory consolidation'