WorldWideScience

Sample records for conditional access system

  1. A JEE RESTful service to access Conditions Data in ATLAS

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00081940; Gallas, Elizabeth

    2015-01-01

    Usage of Conditions Data in ATLAS is extensive for offline reconstruction and analysis (e.g.: alignment, calibration, data quality). The system is based on the LCG Conditions Database infrastructure, with read and write access via an ad hoc C++ API (COOL), a system which was developed before Run 1 data taking began. The infrastructure dictates that the data is organized into separate schemata (assigned to subsystems/groups storing distinct and independent sets of conditions), making it difficult to access information from several schemata at the same time. We have thus created PL/SQL functions containing queries to provide content extraction at multi-schema level. The PL/SQL API has been exposed to external clients by means of a Java application providing DB access via RESTful services, deployed inside an application server (JBoss WildFly). The services allow navigation over multiple schemata via simple URLs. The data can be retrieved either in XML or JSON formats, via simple clients (like curl or Web browser...

  2. A JEE RESTful service to access Conditions Data in ATLAS

    CERN Document Server

    Formica, Andrea; The ATLAS collaboration

    2015-01-01

    Usage of Conditions Data in ATLAS is extensive for offline reconstruction and analysis (for example: alignment, calibration, data quality). The system is based on the LCG Conditions Database infrastructure, with read and write access via an ad hoc C++ API (COOL), a system which was developed before Run 1 data taking began. The infrastructure dictates that the data is organized into separate schemas (assigned to subsystems/groups storing distinct and independent sets of conditions), making it difficult to access information from several schemas at the same time. We have thus created PL/SQL functions containing queries to provide content extraction at multi-schema level. The PL/SQL API has been exposed to external clients by means of an intermediate java application server (JBoss), where an application delivering access to the DB via RESTful services has been deployed. The services allow navigation over multiple schema content, via simple URLs. The queried data can be retrieved either in XML or JSON formats, vi...

  3. A JEE RESTful service to access Conditions Data in ATLAS

    Science.gov (United States)

    Formica, Andrea; Gallas, E. J.

    2015-12-01

    Usage of condition data in ATLAS is extensive for offline reconstruction and analysis (e.g. alignment, calibration, data quality). The system is based on the LCG Conditions Database infrastructure, with read and write access via an ad hoc C++ API (COOL), a system which was developed before Run 1 data taking began. The infrastructure dictates that the data is organized into separate schemas (assigned to subsystems/groups storing distinct and independent sets of conditions), making it difficult to access information from several schemas at the same time. We have thus created PL/SQL functions containing queries to provide content extraction at multi-schema level. The PL/SQL API has been exposed to external clients by means of a Java application providing DB access via REST services, deployed inside an application server (JBoss WildFly). The services allow navigation over multiple schemas via simple URLs. The data can be retrieved either in XML or JSON formats, via simple clients (like curl or Web browsers).

  4. Large scale access tests and online interfaces to ATLAS conditions databases

    International Nuclear Information System (INIS)

    Amorim, A; Lopes, L; Pereira, P; Simoes, J; Soloviev, I; Burckhart, D; Schmitt, J V D; Caprini, M; Kolos, S

    2008-01-01

    The access of the ATLAS Trigger and Data Acquisition (TDAQ) system to the ATLAS Conditions Databases sets strong reliability and performance requirements on the database storage and access infrastructures. Several applications were developed to support the integration of Conditions database access with the online services in TDAQ, including the interface to the Information Services (IS) and to the TDAQ Configuration Databases. The information storage requirements were the motivation for the ONline A Synchronous Interface to COOL (ONASIC) from the Information Service (IS) to LCG/COOL databases. ONASIC avoids the possible backpressure from Online Database servers by managing a local cache. In parallel, OKS2COOL was developed to store Configuration Databases into an Offline Database with history record. The DBStressor application was developed to test and stress the access to the Conditions database using the LCG/COOL interface while operating in an integrated way as a TDAQ application. The performance scaling of simultaneous Conditions database read accesses was studied in the context of the ATLAS High Level Trigger large computing farms. A large set of tests were performed involving up to 1000 computing nodes that simultaneously accessed the LCG central database server infrastructure at CERN

  5. Access to care for patients with time-sensitive conditions in Pennsylvania.

    Science.gov (United States)

    Salhi, Rama A; Edwards, J Matthew; Gaieski, David F; Band, Roger A; Abella, Benjamin S; Carr, Brendan G

    2014-05-01

    Collective knowledge and coordination of vital interventions for time-sensitive conditions (ST-segment elevation myocardial infarction [STEMI], stroke, cardiac arrest, and septic shock) could contribute to a comprehensive statewide emergency care system, but little is known about population access to the resources required. We seek to describe existing clinical management strategies for time-sensitive conditions in Pennsylvania hospitals. All Pennsylvania emergency departments (EDs) open in 2009 were surveyed about resource availability and practice patterns for time-sensitive conditions. The frequency with which EDs provided essential clinical bundles for each condition was assessed. Penalized maximum likelihood regressions were used to evaluate associations between ED characteristics and the presence of the 4 clinical bundles of care. We used geographic information science to calculate 60-minute ambulance access to the nearest facility with these clinical bundles. The percentage of EDs providing each of the 4 clinical bundles in 2009 ranged from 20% to 57% (stroke 20%, STEMI 32%, cardiac arrest 34%, sepsis 57%). For STEMI and stroke, presence of a board-certified/board-eligible emergency physician was significantly associated with presence of a clinical bundle. Only 8% of hospitals provided all 4 care bundles. However, 53% of the population was able to reach this minority of hospitals within 60 minutes. Reliably matching patient needs to ED resources in time-dependent illness is a critical component of a coordinated emergency care system. Population access to critical interventions for the time-dependent diseases discussed here is limited. A population-based planning approach and improved coordination of care could improve access to interventions for patients with time-sensitive conditions. Copyright © 2013 American College of Emergency Physicians. Published by Mosby, Inc. All rights reserved.

  6. CMS conditions data access using FroNTier

    International Nuclear Information System (INIS)

    Blumenfeld, Barry; Johns Hopkins U.; Dykstra, David; Lueking, Lee; Wicklund, Eric; Fermilab

    2007-01-01

    The CMS experiment at the LHC has established an infrastructure using the FroNTier framework to deliver conditions (i.e. calibration, alignment, etc.) data to processing clients worldwide. FroNTier is a simple web service approach providing client HTTP access to a central database service. The system for CMS has been developed to work with POOL which provides object relational mapping between the C++ clients and various database technologies. Because of the read only nature of the data, Squid proxy caching servers are maintained near clients and these caches provide high performance data access. Several features have been developed to make the system meet the needs of CMS including careful attention to cache coherency with the central database, and low latency loading required for the operation of the online High Level Trigger. The ease of deployment, stability of operation, and high performance make the FroNTier approach well suited to the GRID environment being used for CMS offline, as well as for the online environment used by the CMS High Level Trigger (HLT). The use of standard software, such as Squid and various monitoring tools, make the system reliable, highly configurable and easily maintained. We describe the architecture, software, deployment, performance, monitoring and overall operational experience for the system

  7. CMS conditions data access using FroNTier

    International Nuclear Information System (INIS)

    Blumenfeld, B; Dykstra, D; Lueking, L; Wicklund, E

    2008-01-01

    The CMS experiment at the LHC has established an infrastructure using the FroNTier framework to deliver conditions (i.e. calibration, alignment, etc.) data to processing clients worldwide. FroNTier is a simple web service approach providing client HTTP access to a central database service. The system for CMS has been developed to work with POOL which provides object relational mapping between the C++ clients and various database technologies. Because of the read only nature of the data, Squid proxy caching servers are maintained near clients and these caches provide high performance data access. Several features have been developed to make the system meet the needs of CMS including careful attention to cache coherency with the central database, and low latency loading required for the operation of the online High Level Trigger. The ease of deployment, stability of operation, and high performance make the FroNTier approach well suited to the GRID environment being used for CMS offline, as well as for the online environment used by the CMS High Level Trigger. The use of standard software, such as Squid and various monitoring tools, makes the system reliable, highly configurable and easily maintained. We describe the architecture, software, deployment, performance, monitoring and overall operational experience for the system

  8. External access to ALICE controls conditions data

    International Nuclear Information System (INIS)

    Jadlovský, J; Jadlovská, A; Sarnovský, J; Jajčišin, Š; Čopík, M; Jadlovská, S; Papcun, P; Bielek, R; Čerkala, J; Kopčík, M; Chochula, P; Augustinus, A

    2014-01-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead – users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data – an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  9. 10 CFR 725.23 - Terms and conditions of access.

    Science.gov (United States)

    2010-01-01

    ... warranty or other representation, expressed or implied, (1) with respect to the accuracy, completeness or... 10 Energy 4 2010-01-01 2010-01-01 false Terms and conditions of access. 725.23 Section 725.23 Energy DEPARTMENT OF ENERGY PERMITS FOR ACCESS TO RESTRICTED DATA Permits § 725.23 Terms and conditions...

  10. Optimizing access to conditions data in ATLAS event data processing

    CERN Document Server

    Rinaldi, Lorenzo; The ATLAS collaboration

    2018-01-01

    The processing of ATLAS event data requires access to conditions data which is stored in database systems. This data includes, for example alignment, calibration, and configuration information that may be characterized by large volumes, diverse content, and/or information which evolves over time as refinements are made in those conditions. Additional layers of complexity are added by the need to provide this information across the world-wide ATLAS computing grid and the sheer number of simultaneously executing processes on the grid, each demanding a unique set of conditions to proceed. Distributing this data to all the processes that require it in an efficient manner has proven to be an increasing challenge with the growing needs and number of event-wise tasks. In this presentation, we briefly describe the systems in which we have collected information about the use of conditions in event data processing. We then proceed to explain how this information has been used to refine not only reconstruction software ...

  11. Consumer health organisations for chronic conditions: why do some people access them and others don’t?

    Science.gov (United States)

    Sav, Adem; McMillan, Sara S; Kelly, Fiona; Whitty, Jennifer A; Kendall, Elizabeth; King, Michelle A; Wheeler, Amanda J

    2014-10-01

    Consumer health organisations (CHOs), which operate outside the mainstream healthcare system with a specific focus on supporting people to self-manage their health conditions, have become widespread. Yet, there has been little systematic research into CHOs, including their perceived benefits and barriers, which encourage or deter their access by people with a variety of chronic health conditions. This study explored the benefits of CHOs in self-management and also the barriers that inhibit their access, from the perspective of people with chronic conditions and their unpaid carers. In-depth, semi-structured interviews were completed with 97 participants across four regions of Australia. The sample included a high representation of people from culturally and linguistically diverse backgrounds and Aboriginal and Torres Strait Islander people as well as non-indigenous Australians. Three inter-related themes were identified that represented the benefits of involvement and participation in CHOs: knowledge and information, connection and support and experiential learning. However, limited access pathways emerged as a barrier that inhibited a person’s entry into CHOs. Furthermore, the person’s beliefs and experiences about their own health condition(s) also inhibited their continued participation in CHO programmes. Although our findings confirm that CHOs are a valuable resource in alleviating the ‘work of being a patient’ for some people, there seems to be some barriers that prevent their full access and utilisation.Structured integration systems to increase the reliable delivery and accessibility of CHOs are needed to ensure that people who would benefit from accessing them can do so.

  12. Release of Waste Tire Comprehensive Utilization Industry Access Conditions

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    On July 31, 2012, the Ministry of Industry and Information Technology released the Tire Retread- ing lndustry Access Conditions and Waste Tire Comprehensive Utilization Industry Access Condi- tions with the No. 32 announcement of 2012. The state will lay a foundation for realizing the green, safe, efficient, eco-friendly and energy saving tar- gets in the "12th Five-year Plan" of the industry by raising access conditions, regulating industrial development order, strengthening environmental protection, promoting corporate optimizing and up- grading, improving resources comprehensive utiliza- tion technology and management level and guiding the "harmless recycling and eco-friendly utiliza- tion" of the industry.

  13. Urban search mobile platform modeling in hindered access conditions

    Science.gov (United States)

    Barankova, I. I.; Mikhailova, U. V.; Kalugina, O. B.; Barankov, V. V.

    2018-05-01

    The article explores the control system simulation and the design of the experimental model of the rescue robot mobile platform. The functional interface, a structural functional diagram of the mobile platform control unit, and a functional control scheme for the mobile platform of secure robot were modeled. The task of design a mobile platform for urban searching in hindered access conditions is realized through the use of a mechanical basis with a chassis and crawler drive, a warning device, human heat sensors and a microcontroller based on Arduino platforms.

  14. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  15. Entrance C - Meyrin site: new access conditions

    CERN Multimedia

    2013-01-01

    Entrance C on the Meyrin site, which drivers of motorised vehicles can use Mondays to Fridays from 7 a.m. to 9 a.m. and from 5 p.m. to 7 p.m., has been altered to include a turnstile to allow cyclists and pedestrians to use their access card to get in and out of the site from 6 a.m. until 10 p.m.   The following video illustrates how to use the new turnstile: A new type of entrance gate fitted with a number plate reader similar to that installed at the entrance to the Prévessin site should, once fully tested, allow drivers of motorised vehicles to access the site. For the time being, the conditions of use of Entrance C remain unchanged. Further information on the entry into force of new arrangements will be issued in due course. For further information about CERN entrances: CERN opening hours CERN control access GS Department

  16. A utility perspective on radiation worker access control systems

    International Nuclear Information System (INIS)

    Watson, B.A.; Goff, T.E.

    1984-01-01

    Based on an evaluation of the current commercial Radiation Worker Access Control Software Systems, Baltimore Gas and Electric Company has elected to design and develop a site specific access control and accountability system for the Calvert Cliffs Nuclear Power Plant. The vendor provided systems allow for radiation worker access control based on training and external exposure records and authorizations. These systems do not afford internal exposure control until after bioassay measurements or maximum permissible concentration-hours are tabulated. The vendor provided systems allow for data trending for ALARA purposes, but each software package must be modified to meet site specific requirements. Unlike the commercial systems, the Calvert Cliffs Radiological Controls and Accountability System (RCAS) will provide radiation worker exposure control, both internal and external. The RCAS is designed to fulfill the requirements by integrating the existing Radiation Safety, Dosemetry, and Training data bases with a comprehensive radiological surveillance program. Prior to each worker's entry into the Radiological Control Area; his training and qualifications, radiation exposure history and authorization, will be compared with administrative controls, such as radiation work permits, and respiratory protection requirements and the radiological conditions in the work area. The RCAS, a computer based applied health physics access control system is described as it is presently configured for development. The mechanisms for enhancing worker internal and external exposure controls are discussed. Proposed data application to both the Calvert Cliffs ALARA and outage planning programs is included

  17. ARCAS (ACACIA Regional Climate-data Access System) -- a Web Access System for Climate Model Data Access, Visualization and Comparison

    Science.gov (United States)

    Hakkarinen, C.; Brown, D.; Callahan, J.; hankin, S.; de Koningh, M.; Middleton-Link, D.; Wigley, T.

    2001-05-01

    A Web-based access system to climate model output data sets for intercomparison and analysis has been produced, using the NOAA-PMEL developed Live Access Server software as host server and Ferret as the data serving and visualization engine. Called ARCAS ("ACACIA Regional Climate-data Access System"), and publicly accessible at http://dataserver.ucar.edu/arcas, the site currently serves climate model outputs from runs of the NCAR Climate System Model for the 21st century, for Business as Usual and Stabilization of Greenhouse Gas Emission scenarios. Users can select, download, and graphically display single variables or comparisons of two variables from either or both of the CSM model runs, averaged for monthly, seasonal, or annual time resolutions. The time length of the averaging period, and the geographical domain for download and display, are fully selectable by the user. A variety of arithmetic operations on the data variables can be computed "on-the-fly", as defined by the user. Expansions of the user-selectable options for defining analysis options, and for accessing other DOD-compatible ("Distributed Ocean Data System-compatible") data sets, residing at locations other than the NCAR hardware server on which ARCAS operates, are planned for this year. These expansions are designed to allow users quick and easy-to-operate web-based access to the largest possible selection of climate model output data sets available throughout the world.

  18. The LHC access system LACS and LASS

    CERN Document Server

    Ninin, P

    2005-01-01

    The LHC complex is divided into a number of zones with different levels of access controls.Inside the interlocked areas, the personnel protection is ensured by the LHC Access System.The system is made of two parts:the LHC Access Safety System and the LHC Access Control System. During machine operation,the LHC Access Safety System ensures the collective protection of the personnel against the radiation hazards arising from the operation of the accelerator by interlocking the LHC key safety elements. When the beams are off, the LHC Access Control System regulates the access to the accelerator and its many subsystems.It allows a remote, local or automatic operation of the access control equipment which verifies and identifies all users entering the controlled areas.The global architecture of the LHC Access System is now designed and is being validated to ensure that it meets the safety requirements for operation of the LHC.A pilot installation will be tested in the summer 2005 to validate the concept with the us...

  19. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  20. Systemic barriers accessing HIV treatment among people who inject drugs in Russia: a qualitative study.

    Science.gov (United States)

    Sarang, Anya; Rhodes, Tim; Sheon, Nicolas

    2013-10-01

    Achieving 'universal access' to antiretroviral HIV treatment (ART) in lower income and transitional settings is a global target. Yet, access to ART is shaped by local social condition and is by no means universal. Qualitative studies are ideally suited to describing how access to ART is socially situated. We explored systemic barriers to accessing ART among people who inject drugs (PWID) in a Russian city (Ekaterinburg) with a large burden of HIV treatment demand. We undertook 42 in-depth qualitative interviews with people living with HIV with current or recent experience of injecting drug use. Accounts were analysed thematically, and supplemented here with an illustrative case study. Three core themes were identified: 'labyrinthine bureaucracy' governing access to ART; a 'system Catch 22' created by an expectation that access to ART was conditional upon treated drug use in a setting of limited drug treatment opportunity; and 'system verticalization', where a lack of integration across HIV, tuberculosis (TB) and drug treatment compromised access to ART. Taken together, we find that systemic factors play a key role in shaping access to ART with the potential adverse effects of reproducing treatment initiation delay and disengagement from treatment. We argue that meso-level systemic factors affecting access to ART for PWID interact with wider macro-level structural forces, including those related to drug treatment policy and the social marginalization of PWID. We note the urgent need for systemic and structural changes to improve access to ART for PWID in this setting, including to simplify bureaucratic procedures, foster integrated HIV, TB and drug treatment services, and advocate for drug treatment policy reform.

  1. OGIS Access System

    Data.gov (United States)

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  2. Automated Computer Access Request System

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  3. TECHNOLOGY FOR ADMINISTERING OF THE ACCESS TO INFORMATION RESOURCES IN MANAGEMENT SYSTEM ON THE AVIATION ENTERPRISE

    Directory of Open Access Journals (Sweden)

    Andrey V. Degtyarev

    2015-01-01

    Full Text Available The task of administering software-information complex occurs duringthe development of application systems for managing business-processes and is connected with the organization of access forusers to information resources in conditions of multi-user information systems for management. For solution of this problem proposed theapproach, which is based on a hierarchical system of access rightsto information resources on the levels: tool, object and procedural.Keywords: software-information complex, information resources,administering, permissions, separation of powers, access model.

  4. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    Potter, K.; Littenberg, L.

    1977-01-01

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  5. Evaluating accessibility to Bangkok Metro Systems using multi-dimensional criteria across user groups

    Directory of Open Access Journals (Sweden)

    Duangporn Prasertsubpakij

    2012-07-01

    Full Text Available Metro systems act as fast and efficient transport systems for many modern metropolises; however, enhancing higher usage of such systems often conflicts with providing suitable accessibility options. The traditional approach of metro accessibility studies seems to be an ineffective measure to gage sustainable access in which the equal rights of all users are taken into account. Bangkok Metropolitan Region (BMR transportation has increasingly relied on the role of two mass rapid transport systems publicly called “BTS Skytrain” and “MRT Subway”, due to limited availability of land and massive road congestion; however, access to such transit arguably treats some vulnerable groups, especially women, the elderly and disabled people unfairly. This study constructs a multi-dimensional assessment of accessibility considerations to scrutinize how user groups access metro services based on BMR empirical case. 600 individual passengers at various stations were asked to rate the questionnaire that simultaneously considers accessibility aspects of spatial, feeder connectivity, temporal, comfort/safety, psychosocial and other dimensions. It was interestingly found by user disaggregated accessibility model that the lower the accessibility perceptions—related uncomfortable and unsafe environment conditions, the greater the equitable access to services, as illustrated by MRT — Hua Lumphong and MRT — Petchaburi stations. The study suggests that, to balance the access priorities of groups on services, policy actions should emphasize acceptably safe access for individuals, cost efficient feeder services connecting the metro lines, socioeconomic influences and time allocation. Insightful discussions on integrated approach balancing different dimensions of accessibility and recommendations would contribute to accessibility-based knowledge and potential propensity to use the public transits towards transport sustainability.

  6. Easy Access: Auditing the System Network

    Science.gov (United States)

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  7. Development of an access control system for the LHD experimental hall

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Uda, T.; Yamanishi, H.; Miyake, H.; Tanahashi, S.; Motozima, O.

    2000-01-01

    An access control system for the LHD (Large Helical Device) experimental hall had been constructed and its practical operation started in March 1998. Continuously, the system has been improved. The present system keeps watch on involved entrance and exit for the use of persons at four entrances by using five turnstile gates while watching on eight shielding doors at eight positions (four entrances, three carriage entrances and a hall overview) and a stairway connecting the LHD main hall with the LHD basement. Besides, for the security of safety operation of the LHD, fifteen kinds of interlock signals are exchanged between the access control system and the LHD control system. Seven of the interlock signals are properly sent as the occasional demands from the access control system to the LHD control system, in which three staple signals are B Personnel Access to Controlled Area, D Shielding Door Closed, and E No Entrance. It is important that any plasma experiments of the LHD are not permitted while the signal B being sent or D being not sent. The signal E is sent to inform the LHD control system that the turnstile gates are locked. All the plasma experiments should not be done unless the lock procedure of the turnstile is confirmed. When the turnstile gates are locked, any persons cannot enter into the LHD controlled area, but are permissible to exit only. Six of the interlock signals are used to send the information of the working at that time in the LHD controlled area to the access control system. When one signal of the operation mode is sent to the access control system from the LHD, the access control system sets the turnstile gate in situation corresponding to the operation mode, A Equipment Operation, B Vacuum Pumping, C Coil Cooling, D Coil Excitation, and E Plasma Experiment. If the access control system receives, for example, the signal B, this system sets the turnstile gate in the condition of control such that only persons assigned to the work of vacuum

  8. Is additional conditionality preventing EU accession? Serbian democratic 'step back'

    Directory of Open Access Journals (Sweden)

    Milenković Miloš

    2013-01-01

    Full Text Available European Union integration of Western Balkan countries in conditioned on the fulfilment on the set of criteria aimed at profound societal change. However, there is a number of additional criteria within the EU enlargement policy for the Western Balkans and Serbia in particular. We have already designated this process as 'culturalization' of accession criteria. It comprises of alterations of criteria from initial, identity-neutral and technical issues to coming to terms with the legacy of identity conflicts in the Balkan region. These conditions pose a significant challenge to political institutions in a not yet consolidated democracy. In this article we analyze how, as a result of additional conditioning, the EU accession, instead of enjoying social consensus, has reopened identity issues, divided the society and boosted discourses on 'sovereignty', 'double standards of international community' and 'injustice' perpetrated to Serbia at the time of disintegration of Yugoslavia. Serbia is in a paradoxical situation we refer to as democratic deadlock - it is in need of consolidated democracy in order to achieve political stability and stable government capable to implement EU reforms, while the instability itself is a result of additional criteria for EU accession (and reactions to it. It is a theoretically intriguing case of additional criteria preventing fulfilment of the basic accession requirements. It is further analyzed how this observed tendency can be redirected through slight alteration of beneficiaries of EU incentives aimed at facilitating cultural change. In order to viably change the political community, external assistance process needs to be as inclusive as possible. It is argued that external assistance should not only cover main political, economic and legal actors, but also include cultural actors, especially culturally legitimate elites.

  9. Access systems strategy in the accelerator complex and experimental areas

    International Nuclear Information System (INIS)

    Nunes, R.; Ninin, P.; Sanchez-Corral, E.; Ladzinski, T.

    2012-01-01

    This paper reviews the main features of the new PS Personnel Protection System (PSPSS) as well as the main milestones for its deployment during the Long Shutdown of 2013-2014. Access conditions in the PS, SPS and LHC complexes during this period shall be described as well as the upgrades and improvements that are under preparation. (authors)

  10. Advanced technologies for scalable ATLAS conditions database access on the grid

    International Nuclear Information System (INIS)

    Basset, R; Canali, L; Girone, M; Hawkings, R; Valassi, A; Viegas, F; Dimitrov, G; Nevski, P; Vaniachine, A; Walker, R; Wong, A

    2010-01-01

    During massive data reprocessing operations an ATLAS Conditions Database application must support concurrent access from numerous ATLAS data processing jobs running on the Grid. By simulating realistic work-flow, ATLAS database scalability tests provided feedback for Conditions Db software optimization and allowed precise determination of required distributed database resources. In distributed data processing one must take into account the chaotic nature of Grid computing characterized by peak loads, which can be much higher than average access rates. To validate database performance at peak loads, we tested database scalability at very high concurrent jobs rates. This has been achieved through coordinated database stress tests performed in series of ATLAS reprocessing exercises at the Tier-1 sites. The goal of database stress tests is to detect scalability limits of the hardware deployed at the Tier-1 sites, so that the server overload conditions can be safely avoided in a production environment. Our analysis of server performance under stress tests indicates that Conditions Db data access is limited by the disk I/O throughput. An unacceptable side-effect of the disk I/O saturation is a degradation of the WLCG 3D Services that update Conditions Db data at all ten ATLAS Tier-1 sites using the technology of Oracle Streams. To avoid such bottlenecks we prototyped and tested a novel approach for database peak load avoidance in Grid computing. Our approach is based upon the proven idea of pilot job submission on the Grid: instead of the actual query, an ATLAS utility library sends to the database server a pilot query first.

  11. Living conditions and access to health services by Bolivian immigrants in the city of São Paulo, Brazil.

    Science.gov (United States)

    Silveira, Cássio; Carneiro Junior, Nivaldo; Ribeiro, Manoel Carlos Sampaio de Almeida; Barata, Rita de Cássia Barradas

    2013-10-01

    Bolivian immigrants in Brazil experience serious social problems: precarious work conditions, lack of documents and insufficient access to health services. The study aimed to investigate inequalities in living conditions and access to health services among Bolivian immigrants living in the central area of São Paulo, Brazil, using a cross-sectional design and semi-structured interviews with 183 adults. According to the data, the immigrants tend to remain in Brazil, thus resulting in an aging process in the group. Per capita income increases the longer the immigrants stay in the country. The majority have secondary schooling. Work status does not vary according to time since arrival in Brazil. The immigrants work and live in garment sweatshops and speak their original languages. Social networks are based on ties with family and friends. Access to health services shows increasing inclusion in primary care. The authors conclude that the immigrants' social exclusion is decreasing due to greater access to documentation, work (although precarious), and the supply of health services from the public primary care system.

  12. Living conditions and access to health services by Bolivian immigrants in the city of São Paulo, Brazil

    Directory of Open Access Journals (Sweden)

    Cássio Silveira

    2013-10-01

    Full Text Available Bolivian immigrants in Brazil experience serious social problems: precarious work conditions, lack of documents and insufficient access to health services. The study aimed to investigate inequalities in living conditions and access to health services among Bolivian immigrants living in the central area of São Paulo, Brazil, using a cross-sectional design and semi-structured interviews with 183 adults. According to the data, the immigrants tend to remain in Brazil, thus resulting in an aging process in the group. Per capita income increases the longer the immigrants stay in the country. The majority have secondary schooling. Work status does not vary according to time since arrival in Brazil. The immigrants work and live in garment sweatshops and speak their original languages. Social networks are based on ties with family and friends. Access to health services shows increasing inclusion in primary care. The authors conclude that the immigrants' social exclusion is decreasing due to greater access to documentation, work (although precarious, and the supply of health services from the public primary care system.

  13. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  14. Advanced technologies for scalable ATLAS conditions database access on the grid

    CERN Document Server

    Basset, R; Dimitrov, G; Girone, M; Hawkings, R; Nevski, P; Valassi, A; Vaniachine, A; Viegas, F; Walker, R; Wong, A

    2010-01-01

    During massive data reprocessing operations an ATLAS Conditions Database application must support concurrent access from numerous ATLAS data processing jobs running on the Grid. By simulating realistic work-flow, ATLAS database scalability tests provided feedback for Conditions Db software optimization and allowed precise determination of required distributed database resources. In distributed data processing one must take into account the chaotic nature of Grid computing characterized by peak loads, which can be much higher than average access rates. To validate database performance at peak loads, we tested database scalability at very high concurrent jobs rates. This has been achieved through coordinated database stress tests performed in series of ATLAS reprocessing exercises at the Tier-1 sites. The goal of database stress tests is to detect scalability limits of the hardware deployed at the Tier-1 sites, so that the server overload conditions can be safely avoided in a production environment. Our analysi...

  15. Internet-accessible real-time weather information system

    Digital Repository Service at National Institute of Oceanography (India)

    Desai, R.G.P.; Joseph, A.; Desa, E.; Mehra, P.; Desa, E.; Gouveia, A.D.

    An internet-accessible real-time weather information system has been developed. This system provides real-time accessibility to weather information from a multitude of spatially distributed weather stations. The Internet connectivity also offers...

  16. Access Control Management for SCADA Systems

    Science.gov (United States)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  17. Computer access security code system

    Science.gov (United States)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  18. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  19. A Real-time License Plate Detection System for Parking Access

    Directory of Open Access Journals (Sweden)

    Roenadi Koesdijarto

    2010-08-01

    Full Text Available The automatic and real-time license plate detection system can be used as an access control entry of vehicles into the parking area. The problem is how to recognize the vehicles that will go into the parking lot and how to recognize various types of license plates in various light conditions quickly and accurately. In this research, the prototype was developed with a detection system to recognize the vehicles that will enter the parking area, and a license plate recognition system. In the license plate recognition system, the Fourier transform and Hidden Markov model method have proposed to detect location of license plate and as characters segmentation to recognize Indonesia license plates. The research results have shown that the developed prototype system has successfully recognized all Indonesia license plates in several of light condition and camera position. The percentage of plate recognition in the real-time experiment is 84.38%, and the average execution time for all recognition process is 5.834 second.

  20. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  1. An Attribute Based Access Control Framework for Healthcare System

    Science.gov (United States)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  2. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  3. The ethics of attaching research conditions to access to new health technologies.

    Science.gov (United States)

    Holland, Stephen; Hope, Tony

    2012-06-01

    Decisions on which new health technologies to provide are controversial because of the scarcity of healthcare resources, the competing demands of payers, providers and patients and the uncertainty of the evidence base. Given this, additional information about new health technologies is often considered valuable. One response is to make access to a new health technology conditional on further research. Access can be restricted to patients who participate in a research study, such as a randomised controlled trial; alternatively, a new treatment can be made generally available, but only on condition that further evidence is collected (eg, on long-term outcomes and adverse events, in patient registries). The National Institute for Health and Clinical Excellence (NICE), which provides guidance on which new health technologies to make available under the UK's NHS, for example, has made some research conditional recommendations, and the current interest in such options suggests that they are likely to become more prevalent in the future. This paper identifies and discusses the main ethical issues created by this distinctive range of recommendations. We argue that decisions to put research conditions on access to new technologies are compatible with widely accepted values, principles and practices relevant to resource allocation. However, there are important features of these distinctive judgements that must be taken into account by resource allocation decision-making bodies and research ethics committees, and that require new sorts of empirical data.

  4. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  5. A Conditions Data Management System for HEP Experiments

    Energy Technology Data Exchange (ETDEWEB)

    Laycock, P. J. [CERN; Dykstra, D. [Fermilab; Formica, A. [Saclay; Govi, G. [Fermilab; Pfeiffer, A. [CERN; Roe, S. [CERN; Sipos, R. [Eotvos U.

    2017-01-01

    Conditions data infrastructure for both ATLAS and CMS have to deal with the management of several Terabytes of data. Distributed computing access to this data requires particular care and attention to manage request-rates of up to several tens of kHz. Thanks to the large overlap in use cases and requirements, ATLAS and CMS have worked towards a common solution for conditions data management with the aim of using this design for data-taking in Run 3. In the meantime other experiments, including NA62, have expressed an interest in this cross- experiment initiative. For experiments with a smaller payload volume and complexity, there is particular interest in simplifying the payload storage. The conditions data management model is implemented in a small set of relational database tables. A prototype access toolkit consisting of an intermediate web server has been implemented, using standard technologies available in the Java community. Access is provided through a set of REST services for which the API has been described in a generic way using standard Open API specications, implemented in Swagger. Such a solution allows the automatic generation of client code and server stubs and further allows changes in the backend technology transparently. An important advantage of using a REST API for conditions access is the possibility of caching identical URLs, addressing one of the biggest challenges that large distributed computing solutions impose on conditions data access, avoiding direct DB access by means of standard web proxy solutions.

  6. Preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt

    International Nuclear Information System (INIS)

    Taylor, C.L.; O'Rourke, J.E.; Allirot, D.; O'Connor, K.

    1980-09-01

    This report presents results of a study leading to preconceptual designs for plugging boreholes, shafts, and tunnels to a nuclear waste repository in basalt. Beginning design criteria include a list of preferred plug materials and plugging machines that were selected to suit the environmental conditions, and depths, diameters, and orientations of the accesses to a nuclear waste repository in the Columbia River basalts located in eastern Washington State. The environmental conditions are described. The fiscal year 1979-1980 Task II work is presented in two parts: preliminary testing of materials for plugging of man-made accesses to a repository in basalt (described in a separate report); and preconceptual systems and equipment for plugging of man-made accesses to a repository in basalt (described in this report). To fulfill the scope of the Task II work, Woodward-Clyde Consultants (WCC) was requested to: provide preconceptual systems for plugging boreholes, tunnels, and shafts in basalt; describe preconceptual borehole plugging equipment for placing the selected materials in man-made accesses; utilize the quality assurance program, program plan and schedule, and work plans previously developed for Task II; and prepare a preliminary report

  7. 75 FR 2433 - Special Conditions: Boeing Model 747-8/-8F Airplanes, Systems and Data Networks Security...

    Science.gov (United States)

    2010-01-15

    ... Conditions No. 25-401-SC] Special Conditions: Boeing Model 747-8/-8F Airplanes, Systems and Data Networks Security--Protection of Airplane Systems and Data Networks From Unauthorized External Access AGENCY... that effective electronic system security protection strategies are implemented to protect the airplane...

  8. Nuclear information access system

    International Nuclear Information System (INIS)

    Ham, C. H.; Yang, M. H.; Yoon, S. W.

    1998-01-01

    The energy supply in the countries, which have abundant energy resources, may not be affected by accepting the assertion of anti-nuclear and environment groups. Anti-nuclear movements in the countries which have little energy resources may cause serious problem in securing energy supply. Especially, it is distinct in Korea because she heavily depends on nuclear energy in electricity supply(nuclear share in total electricity supply is about 40%).The cause of social trouble surrounding nuclear energy is being involved with various circumstances. However, it is very important that we are not aware of the importance of information access and prepared for such a situation from the early stage of nuclear energy's development. In those matter, this paper analyzes the contents of nuclear information access system in France and Japan which have dynamic nuclear development program and presents the direction of the nuclear access regime through comparing Korean status and referring to progresses of the regime

  9. Role Based Access Control system in the ATLAS experiment

    International Nuclear Information System (INIS)

    Valsan, M L; Dumitru, I; Darlea, G L; Bujor, F; Dobson, M; Miotto, G Lehmann; Schlenker, S; Avolio, G; Scannicchio, D A; Filimonov, V; Khomoutnikov, V; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Twomey, M

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  10. Role Based Access Control system in the ATLAS experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  11. Role Based Access Control System in the ATLAS Experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  12. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  13. Performance estimates for personnel access control systems

    International Nuclear Information System (INIS)

    Bradley, R.G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  14. Access control within military C4ISR systems

    Science.gov (United States)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  15. Safety testing for LHC access system

    CERN Document Server

    Valentini, F; Ninin, P; Scibile, S

    2008-01-01

    In the domain of Safety Real-Time Systems the problem of testing represents always a big effort in terms of time, costs and efficiency to guarantee an adequate coverage degree. Exhaustive tests may, in fact, not be practicable for large and distributed systems. This paper describes the testing process followed during the validation of the CERN's LHC Access System [1], responsible for monitoring and preventing physical risks for the personnel accessing the underground areas. In the paper we also present a novel strategy for the testing problem, intended to drastically reduce the time for the test patterns generation and execution. In particular, we propose a methodology for blackbox testing that relies on the application of Model Checking techniques. Model Checking is a formal method from computer science, commonly adopted to prove correctness of system’s models through an automatic system’s state space exploration against some property formulas.

  16. Compliance with Operational Circular No. 2 on conditions of access to the fenced CERN sites

    CERN Multimedia

    Relations with the Host States Service

    2004-01-01

    The purpose of Operational Circular No. 2 is to contribute to the protection of people and property by defining the conditions of access to the Organization's fenced sites. However, recently, the services concerned have noted a significant increase in the instances of non-compliance with those conditions that cannot be tolerated, for example: use of CERN access cards by people, other than the cardholders themselves, in order to gain access to facilities without having attended the required safety course; speeding, particularly on Route Gregory and Route Weisskopf; driving in and out of the site on the wrong side of the road; parking on spaces set aside for the disabled; nuisance parking, especially in the proximity of the Restaurants; the dumping of wrecked vehicles. As the aforementioned instances of non-compliance can lead to dangerous situations, the Organization reserves the right to apply the penalties provided for under paragraph 26 of Operational Circular No. 2, namely to refuse access to the site...

  17. Stochastic simulations of conditional states of partially observed systems, quantum and classical

    International Nuclear Information System (INIS)

    Gambetta, Jay; Wiseman, H M

    2005-01-01

    In a partially observed quantum or classical system the information that we cannot access results in our description of the system becoming mixed, even if we have perfect initial knowledge. That is, if the system is quantum the conditional state will be given by a state matrix ρ r (t), and if classical, the conditional state will be given by a probability distribution P r (x,t), where r is the result of the measurement. Thus to determine the evolution of this conditional state, under continuous-in-time monitoring, requires a numerically expensive calculation. In this paper we demonstrate a numerical technique based on linear measurement theory that allows us to determine the conditional state using only pure states. That is, our technique reduces the problem size by a factor of N, the number of basis states for the system. Furthermore we show that our method can be applied to joint classical and quantum systems such as arise in modelling realistic (finite bandwidth, noisy) measurement

  18. Effect Through Broadcasting System Access Point For Video Transmission

    Directory of Open Access Journals (Sweden)

    Leni Marlina

    2015-08-01

    Full Text Available Most universities are already implementing wired and wireless network that is used to access integrated information systems and the Internet. At present it is important to do research on the influence of the broadcasting system through the access point for video transmitter learning in the university area. At every university computer network through the access point must also use the cable in its implementation. These networks require cables that will connect and transmit data from one computer to another computer. While wireless networks of computers connected through radio waves. This research will be a test or assessment of how the influence of the network using the WLAN access point for video broadcasting means learning from the server to the client. Instructional video broadcasting from the server to the client via the access point will be used for video broadcasting means of learning. This study aims to understand how to build a wireless network by using an access point. It also builds a computer server as instructional videos supporting software that can be used for video server that will be emitted by broadcasting via the access point and establish a system of transmitting video from the server to the client via the access point.

  19. Access safety systems - New concepts from the LHC experience

    International Nuclear Information System (INIS)

    Ladzinski, T.; Delamare, C.; Luca, S. di; Hakulinen, T.; Hammouti, L.; Havart, F.; Juget, J.F.; Ninin, P.; Nunes, R.; Riesco, T.; Sanchez-Corral Mena, E.; Valentini, F.

    2012-01-01

    The LHC Access Safety System has introduced a number of new concepts into the domain of personnel protection at CERN. These can be grouped into several categories: organisational, architectural and concerning the end-user experience. By anchoring the project on the solid foundations of the IEC 61508/61511 methodology, the CERN team and its contractors managed to design, develop, test and commission on time a SIL3 safety system. The system uses a successful combination of the latest Siemens redundant safety programmable logic controllers with a traditional relay logic hard wired loop. The external envelope barriers used in the LHC include personnel and material access devices, which are interlocked door-booths introducing increased automation of individual access control, thus removing the strain from the operators. These devices ensure the inviolability of the controlled zones by users not holding the required credentials. To this end they are equipped with personnel presence detectors and the access control includes a state of the art bio-metry check. Building on the LHC experience, new projects targeting the refurbishment of the existing access safety infrastructure in the injector chain have started. This paper summarises the new concepts introduced in the LHC access control and safety systems, discusses the return of experience and outlines the main guiding principles for the renewal stage of the personnel protection systems in the LHC injector chain in a homogeneous manner. (authors)

  20. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  1. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  2. Integrated Identity and Access Management System for Tertiary ...

    African Journals Online (AJOL)

    Nigerian Journal of Technology ... identity management and access control and the unavailability of actionable information on pattern of ... This Tertiary Identity and Access Management System (T-IAMS) is a fingerprint biometric database that ...

  3. Task-role-based Access Control Model in Smart Health-care System

    OpenAIRE

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  4. Racial Disparities in Access to Care Under Conditions of Universal Coverage.

    Science.gov (United States)

    Siddiqi, Arjumand A; Wang, Susan; Quinn, Kelly; Nguyen, Quynh C; Christy, Antony Dennis

    2016-02-01

    Racial disparities in access to regular health care have been reported in the U.S., but little is known about the extent of disparities in societies with universal coverage. To investigate the extent of racial disparities in access to care under conditions of universal coverage by observing the association between race and regular access to a doctor in Canada. Racial disparities in access to a regular doctor were calculated using the largest available source of nationally representative data in Canada--the Canadian Community Health Survey. Surveys from 2000-2010 were analyzed in 2014. Multinomial regression analyses predicted odds of having a regular doctor for each racial group compared to whites. Analyses were stratified by immigrant status--Canadian-born versus shorter-term immigrant versus longer-term immigrants--and controlled for sociodemographics and self-rated health. Racial disparities in Canada, a country with universal coverage, were far more muted than those previously reported in the U.S. Only among longer-term Latin American immigrants (OR=1.90, 95% CI=1.45, 2.08) and Canadian-born Aboriginals (OR=1.34, 95% CI=1.22, 1.47) were significant disparities noted. Among shorter-term immigrants, all Asians were more likely than whites, and among longer-term immigrants, South Asians were more like than whites, to have a regular doctor. Universal coverage may have a major impact on reducing racial disparities in access to health care, although among some subgroups, other factors may also play a role above and beyond health insurance. Copyright © 2016 American Journal of Preventive Medicine. Published by Elsevier Inc. All rights reserved.

  5. REMINDER - Compliance with Operational Circular No. 2 on conditions of access to the fenced CERN sites

    CERN Multimedia

    Relations with the Host States Service

    2004-01-01

    The purpose of Operational Circular No. 2 is to contribute to the protection of people and property by defining the conditions of access to the Organization's fenced sites. However, recently, the services concerned have noted a significant increase in the instances of non-compliance with those conditions that cannot be tolerated, for example: use of CERN access cards by people, other than the cardholders themselves, in order to gain access to facilities without having attended the required safety course; speeding, particularly on Route Gregory and Route Weisskopf; driving in and out of the site on the wrong side of the road; parking on spaces set aside for the disabled; nuisance parking, especially in the proximity of the Restaurants; the dumping of wrecked vehicles. As the aforementioned instances of non-compliance can lead to dangerous situations, the Organization reserves the right to apply the penalties provided for under paragraph 26 of Operational Circular No. 2, namely to refuse access to the site ...

  6. A Conditions Data Management System for HEP Experiments

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00037318; The ATLAS collaboration

    2017-01-01

    Conditions data infrastructure for both ATLAS and CMS have to deal with the management of several Terabytes of data. Distributed computing access to this data requires particular care and attention to manage request-rates of up to several tens of kHz. Thanks to the large overlap in use cases and requirements, ATLAS and CMS have worked towards a common solution for conditions data management with the aim of using this design for data-taking in Run 3. In the meantime other experiments, including NA62, have expressed an interest in this cross-experiment initiative. For experiments with a smaller payload volume and complexity, there is particular interest in simplifying the payload storage. The conditions data management model is implemented in a small set of relational database tables. A prototype access toolkit consisting of an intermediate web server has been implemented, using standard technologies available in the Java community. Access is provided through a set of REST services for which the API has been de...

  7. H1DS: A new web-based data access system

    Energy Technology Data Exchange (ETDEWEB)

    Pretty, D.G., E-mail: david.pretty@anu.edu.au; Blackwell, B.D.

    2014-05-15

    Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems.

  8. H1DS: A new web-based data access system

    International Nuclear Information System (INIS)

    Pretty, D.G.; Blackwell, B.D.

    2014-01-01

    Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems

  9. System for monitoring microclimate conditions in greenhouse

    Directory of Open Access Journals (Sweden)

    Marković Dušan B.

    2014-01-01

    Full Text Available Monitoring microclimate parameters in different kind of environments has significant contribution to many areas of human activity and production processes. One of them is vegetable production in greenhouses where measurement of its microclimate parameters may influence the decision on taking appropriate action and protect crops. It is also important to preserve optimal condition in greenhouses to facilitate the process of transpiration, plant mineral nutrition and prevent of a variety physiological damage caused by a deficit of some specific nutrients. Systems for monitoring have wide application in the last years thanks to development of modern computer technology. In this paper model of the monitoring system based on smart transducer concept was introduced. Within the system components are based on MSP430 ultra low power micro controllers. They are using wireless communication to exchange data within the system that was structured according to smart transducer concept. User applications from the network could access to system interface using HTTP protocol where web server could be running on the computer or it could be an embedded web server running on micro controller based device.

  10. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    Moore, J.W.; Banks, W.W.

    1988-01-01

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  11. The ARAC client system: network-based access to ARAC

    International Nuclear Information System (INIS)

    Leach, M J; Sumikawa, D; Webster, C

    1999-01-01

    The ARAC Client System allows users (such as emergency managers and first responders) with commonly available desktop and laptop computers to utilize the central ARAC system over the Internet or any other communications link using Internet protocols. Providing cost-effective fast access to the central ARAC system greatly expands the availability of the ARAC capability. The ARAC Client system consists of (1) local client applications running on the remote user's computer, and (2) ''site servers'' that provide secure access to selected central ARAC system capabilities and run on a scalable number of dedicated workstations residing at the central facility. The remote client applications allow users to describe a real or potential them-bio event, electronically sends this information to the central ARAC system which performs model calculations, and quickly receive and visualize the resulting graphical products. The site servers will support simultaneous access to ARAC capabilities by multiple users. The ARAC Client system is based on object-oriented client/server and distributed computing technologies using CORBA and Java, and consists of a large number of interacting components

  12. Condition Indicators for Gearbox Condition Monitoring Systems

    Directory of Open Access Journals (Sweden)

    P. Večeř

    2005-01-01

    Full Text Available Condition monitoring systems for manual transmissions based on vibration diagnostics are widely applied in industry. The systems deal with various condition indicators, most of which are focused on a specific type of gearbox fault. Frequently used condition indicators (CIs are described in this paper. The ability of a selected condition indicator to describe the degree of gearing wear was tested using vibration signals acquired during durability testing of manual transmission with helical gears. 

  13. Channel Access Algorithm Design for Automatic Identification System

    Institute of Scientific and Technical Information of China (English)

    Oh Sang-heon; Kim Seung-pum; Hwang Dong-hwan; Park Chan-sik; Lee Sang-jeong

    2003-01-01

    The Automatic Identification System (AIS) is a maritime equipment to allow an efficient exchange of the navigational data between ships and between ships and shore stations. It utilizes a channel access algorithm which can quickly resolve conflicts without any intervention from control stations. In this paper, a design of channel access algorithm for the AIS is presented. The input/output relationship of each access algorithm module is defined by drawing the state transition diagram, dataflow diagram and flowchart based on the technical standard, ITU-R M.1371. In order to verify the designed channel access algorithm, the simulator was developed using the C/C++ programming language. The results show that the proposed channel access algorithm can properly allocate transmission slots and meet the operational performance requirements specified by the technical standard.

  14. Exploring the drivers of health and healthcare access in Zambian prisons: a health systems approach.

    Science.gov (United States)

    Topp, Stephanie M; Moonga, Clement N; Luo, Nkandu; Kaingu, Michael; Chileshe, Chisela; Magwende, George; Heymann, S Jody; Henostroza, German

    2016-11-01

    Prison populations in sub-Saharan Africa (SSA) experience a high burden of disease and poor access to health care. Although it is generally understood that environmental conditions are dire and contribute to disease spread, evidence of how environmental conditions interact with facility-level social and institutional factors is lacking. This study aimed to unpack the nature of interactions and their influence on health and healthcare access in the Zambian prison setting. We conducted in-depth interviews of a clustered random sample of 79 male prisoners across four prisons, as well as 32 prison officers, policy makers and health care workers. Largely inductive thematic analysis was guided by the concepts of dynamic interaction and emergent behaviour, drawn from the theory of complex adaptive systems. A majority of inmates, as well as facility-based officers reported anxiety linked to overcrowding, sanitation, infectious disease transmission, nutrition and coercion. Due in part to differential wealth of inmates and their support networks on entering prison, and in part to the accumulation of authority and material wealth within prison, we found enormous inequity in the standard of living among prisoners at each site. In the context of such inequities, failure of the Zambian prison system to provide basic necessities (including adequate and appropriate forms of nutrition, or access to quality health care) contributed to high rates of inmate-led and officer-led coercion with direct implications for health and access to healthcare. This systems-oriented analysis provides a more comprehensive picture of the way resource shortages and human interactions within Zambian prisons interact and affect inmate and officer health. While not a panacea, our findings highlight some strategic entry-points for important upstream and downstream reforms including urgent improvement in the availability of human resources for health; strengthening of facility-based health services systems

  15. Database design for Physical Access Control System for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in

    2016-08-15

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  16. Database design for Physical Access Control System for nuclear facilities

    International Nuclear Information System (INIS)

    Sathishkumar, T.; Rao, G. Prabhakara; Arumugam, P.

    2016-01-01

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  17. 40 CFR 264.34 - Access to communications or alarm system.

    Science.gov (United States)

    2010-07-01

    ... FACILITIES Preparedness and Prevention § 264.34 Access to communications or alarm system. (a) Whenever... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 264.34 Section 264.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID...

  18. New capabilities in the HENP grand challenge storage access system and its application at RHIC

    International Nuclear Information System (INIS)

    Bernardo, L.; Gibbard, B.; Malon, D.; Nordberg, H.; Olson, D.; Porter, R.; Shoshani, A.; Sim, A.; Vaniachine, A.; Wenaus, T.; Wu, K.; Zimmerman, D.

    2000-01-01

    The High Energy and Nuclear Physics Data Access Grand Challenge project has developed an optimizing storage access software system that was prototyped at RHIC. It is currently undergoing integration with the STAR experiment in preparation for data taking that starts in mid-2000. The behavior and lessons learned in the RHIC Mock Data Challenge exercises are described as well as the observed performance under conditions designed to characterize scalability. Up to 250 simultaneous queries were tested and up to 10 million events across 7 event components were involved in these queries. The system coordinates the staging of ''bundles'' of files from the HPSS tape system, so that all the needed components of each event are in disk cache when accessed by the application software. The caching policy algorithm for the coordinated bundle staging is described in the paper. The initial prototype implementation interfaced to the Objectivity/DB. In this latest version, it evolved to work with arbitrary files and use CORBA interfaces to the tag database and file catalog services. The interface to the tag database and the MySQL-based file catalog services used by STAR are described along with the planned usage scenarios

  19. Need an Information Security in Access Control System?

    Directory of Open Access Journals (Sweden)

    V. R. Petrov

    2011-12-01

    Full Text Available The purpose of this paper is the general problems of information security in access control system. The field of using is the in project of reconstruction Physical protection system.

  20. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  1. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  2. Contrary to Common Observations in the West, Urban Park Access Is Only Weakly Related to Neighborhood Socioeconomic Conditions in Beijing, China

    Directory of Open Access Journals (Sweden)

    Xingyue Tu

    2018-04-01

    Full Text Available Parks provide critical ecosystem services to urban residents. Park access critically determines how parks are used by residents. Many existing studies, which mostly have been conducted in developed countries, reported that park access disproportionately benefits the socioeconomically advantaged groups. To test if this observation also holds true in developing countries, we examined the park access and its relationship with socioeconomic conditions in Beijing, China. We used a buffering method and a road network-based analysis to calculate the park access of 130 neighborhoods, and applied the Pearson correlation to examine how neighborhood park access is related to socioeconomic conditions. Our results showed that (1 the park access decreased from 76% in the downtown areas to 24% in the suburbs; (2 the correlation coefficients (r between socioeconomic conditions and park access were all smaller than 0.3 (p < 0.05—that is, explaining less than 8% of the variability. Our study indicated that neighborhood socioeconomic conditions were only weakly associated with park access in Beijing and did not support the common phenomenon in western countries. Such a contradiction might be explained by the fact that park planning in Beijing is funded and administered by the city government and influenced by the central government’s policy, whereas in most developed countries market sectors play a critical role in park planning. Our research suggested that urban planning funded by governments, when aimed at improving the wellbeing of all urban residents, may effectively reduce potential environmental inequalities.

  3. CDC STATE System Tobacco Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2018. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  4. Towards ubiquitous access of computer-assisted surgery systems.

    Science.gov (United States)

    Liu, Hui; Lufei, Hanping; Shi, Weishong; Chaudhary, Vipin

    2006-01-01

    Traditional stand-alone computer-assisted surgery (CAS) systems impede the ubiquitous and simultaneous access by multiple users. With advances in computing and networking technologies, ubiquitous access to CAS systems becomes possible and promising. Based on our preliminary work, CASMIL, a stand-alone CAS server developed at Wayne State University, we propose a novel mobile CAS system, UbiCAS, which allows surgeons to retrieve, review and interpret multimodal medical images, and to perform some critical neurosurgical procedures on heterogeneous devices from anywhere at anytime. Furthermore, various optimization techniques, including caching, prefetching, pseudo-streaming-model, and compression, are used to guarantee the QoS of the UbiCAS system. UbiCAS enables doctors at remote locations to actively participate remote surgeries, share patient information in real time before, during, and after the surgery.

  5. Free-space optical code-division multiple-access system design

    Science.gov (United States)

    Jeromin, Lori L.; Kaufmann, John E.; Bucher, Edward A.

    1993-08-01

    This paper describes an optical direct-detection multiple access communications system for free-space satellite networks utilizing code-division multiple-access (CDMA) and forward error correction (FEC) coding. System performance is characterized by how many simultaneous users operating at data rate R can be accommodated in a signaling bandwidth W. The performance of two CDMA schemes, optical orthogonal codes (OOC) with FEC and orthogonal convolutional codes (OCC), is calculated and compared to information-theoretic capacity bounds. The calculations include the effects of background and detector noise as well as nonzero transmitter extinction ratio and power imbalance among users. A system design for 10 kbps multiple-access communications between low-earth orbit satellites is given. With near- term receiver technology and representative system losses, a 15 W peak-power transmitter provides 10-6 BER performance with seven interfering users and full moon background in the receiver FOV. The receiver employs an array of discrete wide-area avalanche photodiodes (APD) for wide field of view coverage. Issues of user acquisition and synchronization, implementation technology, and system scalability are also discussed.

  6. ACCESS TO A COMPUTER SYSTEM. BETWEEN LEGAL PROVISIONS AND TECHNICAL REALITY

    Directory of Open Access Journals (Sweden)

    Maxim DOBRINOIU

    2016-05-01

    Full Text Available Nowadays, on a rise of cybersecurity incidents and a very complex IT&C environment, the national legal systems must adapt in order to properly address the new and modern forms of criminality in cyberspace. The illegal access to a computer system remains one of the most important cyber-related crimes due to its popularity but also from the perspective as being a door opened to computer data and sometimes a vehicle for other tech crimes. In the same time, the information society services slightly changed the IT paradigm and represent the new interface between users and systems. Is true that services rely on computer systems, but accessing services goes now beyond the simple accessing computer systems as commonly understood by most of the legislations. The article intends to explain other sides of the access related to computer systems and services, with the purpose to advance possible legal solutions to certain case scenarios.

  7. The entire network topology display system of terminal communication access network

    OpenAIRE

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  8. The COROT ground-based archive and access system

    Science.gov (United States)

    Solano, E.; González-Riestra, R.; Catala, C.; Baglin, A.

    2002-01-01

    A prototype of the COROT ground-based archive and access system is presented here. The system has been developed at LAEFF and it is based on the experience gained at Laboratorio de Astrofisica Espacial y Fisica Fundamental (LAEFF) with the INES (IUE Newly Extracted System) Archive.

  9. A Theorem on Grid Access Control

    Institute of Scientific and Technical Information of China (English)

    XU ZhiWei(徐志伟); BU GuanYing(卜冠英)

    2003-01-01

    The current grid security research is mainly focused on the authentication of grid systems. A problem to be solved by grid systems is to ensure consistent access control. This problem is complicated because the hosts in a grid computing environment usually span multiple autonomous administrative domains. This paper presents a grid access control model, based on asynchronous automata theory and the classic Bell-LaPadula model. This model is useful to formally study the confidentiality and integrity problems in a grid computing environment. A theorem is proved, which gives the necessary and sufficient conditions to a grid to maintain confidentiality.These conditions are the formalized descriptions of local (node) relations or relationship between grid subjects and node subjects.

  10. CDC STATE System Tobacco Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  11. MAST's Integrated Data Access Management system: IDAM

    International Nuclear Information System (INIS)

    Muir, D.G.; Appel, L.; Conway, N.J.; Kirk, A.; Martin, R.; Meyer, H.; Storrs, J.; Taylor, D.; Thomas-Davies, N.; Waterhouse, J.

    2008-01-01

    A new Integrated Data Access Management system, IDAM, has been created to address specific data management issues of the MAST spherical Tokamak. For example, this system enables access to numerous file formats, both legacy and modern (IDA, Ufile, netCDF, HDF5, MDSPlus, PPF, JPF). It adds data quality values at the signal level, and automatically corrects for problems in data: in timings, calibrations, and labelling. It also builds new signals from signal components. The IDAM data server uses a hybrid XML-relational database to record how data are accessed, whether locally or remotely, and how alias and generic signal names are mapped to true names. Also, XML documents are used to encode the details of data corrections, as well as definitions of composite signals and error models. The simple, user friendly, API and accessor function library, written in C on Linux, is available for applications in C, C++, IDL and Fortran-90/95/2003 with good performance: a MAST plasma current trace (28 kbytes of data), requested using a generic name and with data corrections applied, is delivered over a 100 Mbit/s network in ∼13 ms

  12. Access to the city

    DEFF Research Database (Denmark)

    Andreasen, Manja Hoppe; Møller-Jensen, Lasse

    2017-01-01

    This paper is concerned with access to the city for urban residents living in the periphery of Dar es Salaam, Tanzania. The paper presents an analysis of the mobility practices of residents and investigates the mobility constraints they experience in relation to the limited accessibility provided...... mobility and access to the city for residents in the periphery. Regular mobility is an ingrained part of residents' livelihood strategies. The majority of households rely on one or more members regularly travelling to central parts of the city in relation to their livelihood activities. The analysis...... by road and traffic conditions and highlights how accessibility problems of peripheral settlements are not easily understood separately from the general dysfunctions of the overall mobility system of city....

  13. Metabolomic differentiation of maca (Lepidium meyenii) accessions cultivated under different conditions using NMR and chemometric analysis.

    Science.gov (United States)

    Zhao, Jianping; Avula, Bharathi; Chan, Michael; Clément, Céline; Kreuzer, Michael; Khan, Ikhlas A

    2012-01-01

    To gain insights on the effects of color type, cultivation history, and growing site on the composition alterations of maca (Lepidium meyenii Walpers) hypocotyls, NMR profiling combined with chemometric analysis was applied to investigate the metabolite variability in different maca accessions. Maca hypocotyls with different colors (yellow, pink, violet, and lead-colored) cultivated at different geographic sites and different areas were examined for differences in metabolite expression. Differentiations of the maca accessions grown under the different cultivation conditions were determined by principle component analyses (PCAs) which were performed on the datasets derived from their ¹H NMR spectra. A total of 16 metabolites were identified by NMR analysis, and the changes in metabolite levels in relation to the color types and growing conditions of maca hypocotyls were evaluated using univariate statistical analysis. In addition, the changes of the correlation pattern among the metabolites identified in the maca accessions planted at the two different sites were examined. The results from both multivariate and univariate analysis indicated that the planting site was the major determining factor with regards to metabolite variations in maca hypocotyls, while the color of maca accession seems to be of minor importance in this respect. © Georg Thieme Verlag KG Stuttgart · New York.

  14. Distributed Access View Integrated Database (DAVID) system

    Science.gov (United States)

    Jacobs, Barry E.

    1991-01-01

    The Distributed Access View Integrated Database (DAVID) System, which was adopted by the Astrophysics Division for their Astrophysics Data System, is a solution to the system heterogeneity problem. The heterogeneous components of the Astrophysics problem is outlined. The Library and Library Consortium levels of the DAVID approach are described. The 'books' and 'kits' level is discussed. The Universal Object Typer Management System level is described. The relation of the DAVID project with the Small Business Innovative Research (SBIR) program is explained.

  15. Optimizing data access in the LAMPF control system

    International Nuclear Information System (INIS)

    Schaller, S.C.; Corley, J.K.; Rose, P.A.

    1985-01-01

    The LAMPF control system data access software offers considerable power and flexibility to application programs through symbolic device naming and an emphasis on hardware independence. This paper discusses optimizations aimed at improving the performance of the data access software while retaining these capabilities. The only aspects of the optimizations visible to the application programs are ''vector devices'' and ''aggregate devices.'' A vector device accesses a set of hardware related data items through a single device name. Aggregate devices allow run-time optimization of references to groups of unrelated devices. Optimizations not visible on the application level include careful handling of: network message traffic; the sharing of global resources; and storage allocation

  16. Implications of access hole size on tank waste retrieval system design and cost

    International Nuclear Information System (INIS)

    Babcock, S.M.; Kwon, D.S.; Burks, B.L.; Stoughton, R.S.; Evans, M.S.

    1994-05-01

    The DOE Environmental Restoration and Waste Management Robotics Technology Development Program has been investigating the application of robotics technology to the retrieval of waste from single-shell storage tanks for several years. The use of a large, ''long-reach'' manipulator to position and orient a variety of tools and other equipment has been recommended. The objective of this study is to determine the appropriate access hole size for the tank waste retrieval system installation. Previous reports on the impact of access hole size on manipulator performance are summarized. In addition, the practical limitation for access hole size based on structural limitations of the waste storage tanks, the state-of-the-art size limitations for the installation of new risers, the radiation safety implications of various access hole sizes, and overall system cost implications are considered. Basic conclusions include: (1) overall cost of remediation will; be dominated by the costs of the balance of plant and time required to perform the task rather than the cost of manipulator hardware or the cost of installing a riser, (2) the most desirable solution from a manipulator controls point of view is to make the manipulator as stiff as possible and have as high as possible a natural frequency, which implies a large access hole diameter, (3) beyond some diameter; simple, uniform cross-section elements become less advantageous from a weight standpoint and alternative structures should be considered, and (4) additional shielding and contamination control measures would be required for larger holes. Parametric studies summarized in this report considered 3,790,000 1 (1,000,000 gal) tanks, while initial applications are likely to be for 2,840,000 1 (750,000 gal) tanks. Therefore, the calculations should be somewhat conservative, recognizing the limitations of the specific conditions considered

  17. Accessible Support for Family Caregivers of Seniors with Chronic Conditions: From Isolation to Inclusion

    Science.gov (United States)

    Stewart, Miriam; Barnfather, Alison; Neufeld, Anne; Warren, Sharon; Letourneau, Nicole; Liu, Lili

    2006-01-01

    Accessible support programs can improve health outcomes for family caregivers of older relatives with a chronic condition. Over the course of 6 months, 27 experienced family caregivers provided weekly support via the telephone to 66 individuals, either new family caregivers of seniors recently diagnosed with stroke or newly vulnerable family…

  18. Access control system for two person rule at Rokkasho Reprocessing Plant

    International Nuclear Information System (INIS)

    Yanagisawa, Sawako; Ino, Munekazu; Yamada, Noriyuki; Oota, Hiroto; Iwasaki, Mitsuaki; Kodani, Yoshiki; Iwamoto, Tomonori

    2014-01-01

    Following the amendment and enforcement of Regulation of Reprocessing Activity on March 29th 2012, two person rule has become compulsory for the specific rooms to counter and prevent the sabotage or theft of nuclear materials by the insiders at reprocessing plant in Japan. The rooms will include those which contains cooling systems for decay heat removal from spent fuels and so on, scavenging systems to prevent the hydrogen accumulation, and those which contains nuclear material. To ensure the two person rule at Rokkasho Reprocessing Plant, JNFL has recently, after comprehensive study, introduced efficient and effective access control system for the rooms mentioned above. The system is composed of bio-attestation devices, surveillance cameras and electronic locks to establish access control system. This report outlines the access control system for two person rule and introduces the operation. (author)

  19. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  20. A novel IPTV program multiplex access system to EPON

    Science.gov (United States)

    Xu, Xian; Liu, Deming; He, Wei; Lu, Xi

    2007-11-01

    With the rapid development of high speed networks, such as Ethernet Passive Optical Network (EPON), traffic patterns in access networks have evolved from traditional text-oriented service to the mixed text-, voice- and video- based services, leading to so called "Triple Play". For supporting IPTV service in EPON access network infrastructure, in this article we propose a novel IPTV program multiplex access system to EPON, which enables multiple IPTV program source servers to seamlessly access to IPTV service access port of optical line terminal (OLT) in EPON. There are two multiplex schemes, namely static multiplex scheme and dynamic multiplex scheme, in implementing the program multiplexing. Static multiplex scheme is to multiplex all the IPTV programs and forward them to the OLT, regardless of the need of end-users. While dynamic multiplex scheme can dynamically multiplex and forward IPTV programs according to what the end-users actually demand and those watched by no end-user would not be multiplexed. By comparing these two schemes, a reduced traffic of EPON can be achieved by using dynamic multiplex scheme, especially when most end-users are watching the same few IPTV programs. Both schemes are implemented in our system, with their hardware and software designs described.

  1. Operational Circular No. 2 (Rev. 3) - Conditions of access to the fenced parts of the CERN site

    CERN Multimedia

    HR Department

    2015-01-01

    Operational Circular No. 2 (Rev. 3) entitled "Conditions of access to the fenced parts of the CERN site", approved by the Director-General following discussion in the Standing Concertation Committee meeting on 24 September 2015, is now available via this link.   This revised circular cancels and replaces Operational Circular No. 2 (Rev. 2) also entitled "Conditions of access to the fenced parts of the CERN site", of September 2014. The circular was revised predominantly in order to specify that access to the CERN site is granted to CERN Pension Fund beneficiaries only provided that they are actually in receipt of payments from the Fund; and to allow the Director-General to permit special types of vehicles on site, such as trailers. It also includes a certain number of text improvements and an updated version of the implementation measures, in particular with regard to vehicle identification, road traffic and parking.  

  2. Face Recognition for Access Control Systems Combining Image-Difference Features Based on a Probabilistic Model

    Science.gov (United States)

    Miwa, Shotaro; Kage, Hiroshi; Hirai, Takashi; Sumi, Kazuhiko

    We propose a probabilistic face recognition algorithm for Access Control System(ACS)s. Comparing with existing ACSs using low cost IC-cards, face recognition has advantages in usability and security that it doesn't require people to hold cards over scanners and doesn't accept imposters with authorized cards. Therefore face recognition attracts more interests in security markets than IC-cards. But in security markets where low cost ACSs exist, price competition is important, and there is a limitation on the quality of available cameras and image control. Therefore ACSs using face recognition are required to handle much lower quality images, such as defocused and poor gain-controlled images than high security systems, such as immigration control. To tackle with such image quality problems we developed a face recognition algorithm based on a probabilistic model which combines a variety of image-difference features trained by Real AdaBoost with their prior probability distributions. It enables to evaluate and utilize only reliable features among trained ones during each authentication, and achieve high recognition performance rates. The field evaluation using a pseudo Access Control System installed in our office shows that the proposed system achieves a constant high recognition performance rate independent on face image qualities, that is about four times lower EER (Equal Error Rate) under a variety of image conditions than one without any prior probability distributions. On the other hand using image difference features without any prior probabilities are sensitive to image qualities. We also evaluated PCA, and it has worse, but constant performance rates because of its general optimization on overall data. Comparing with PCA, Real AdaBoost without any prior distribution performs twice better under good image conditions, but degrades to a performance as good as PCA under poor image conditions.

  3. A plan for transmission access and pricing

    International Nuclear Information System (INIS)

    Oldak, M.

    1990-01-01

    The National Rural Electric Cooperative Association (NRECA) believes that while access to the interconnected transmission system (grid) is necessary to provide the most efficient and economical development and use of the bulk power supply system, the grid cannot be unconditionally opened. Additionally, access should be provided only under reasonable terms, conditions, and cost-based compensation, within a framework of joint planning and coordinated operations. NRECA describes here its transmission policy, a coordinated planning and utilization model (CPU)

  4. Development of Patient Status-Based Dynamic Access System for Medical Information Systems

    Directory of Open Access Journals (Sweden)

    Chang Won Jeong

    2015-06-01

    Full Text Available Recently, the hospital information system environment using IT communication technology and utilization of medical information has been increasing. In the medical field, the medical information system only supports the transfer of patient information to medical staff through an electronic health record, without information about patient status. Hence, it needs a method of real-time monitoring for the patient. Also, in this environment, a secure method in approaching healthcare through various smart devices is required. Therefore, in this paper, in order to classify the status of the patients, we propose a dynamic approach of the medical information system in a hospital information environment using the dynamic access control method. Also, we applied the symmetric method of AES (Advanced Encryption Standard. This was the best encryption algorithm for sending and receiving biological information. We can define usefulness as the dynamic access application service based on the final result of the proposed system. The proposed system is expected to provide a new solution for a convenient medical information system.

  5. Accessing files in an Internet: The Jade file system

    Science.gov (United States)

    Peterson, Larry L.; Rao, Herman C.

    1991-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  6. Accessing files in an internet - The Jade file system

    Science.gov (United States)

    Rao, Herman C.; Peterson, Larry L.

    1993-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  7. Optimizing man-machine performance of a personnel access restriction security system

    International Nuclear Information System (INIS)

    Banks, W.W.; Moore, J.W.

    1988-01-01

    This paper describes a human engineering design and analysis effort for a major security system upgrade at a DOE facility. This upgrade was accomplished by replacing an obsolete and poorly human engineered security screening both the with a new, user oriented, semiautomated, computer-based access control system. Human factors engineers assisted the designer staff in specifying a security access interface to physically and cognitively accommodate all employees which included handicapped individuals in wheel chairs, and several employees who were severely disabled, both visually and aurally. The new access system was intended to control entry into sensitive exclusion areas by requiring personnel to enter a security screening booth and interact with card reader devices and a-simple-to-operate access control panel system. Extensive man-machine testing with prototype mock-ups was conducted to assess human engineered design features and to illuminate potentially confusing or difficult-to-operated hardware placement, layout, and operation sequencing. These evaluations, along with the prototype mock-ups, provided input which resulted in a prototype which was easy to enter, operate, and understand by end users. This prototype later served as the design basis for the final systems design

  8. 28 CFR 25.6 - Accessing records in the system.

    Science.gov (United States)

    2010-07-01

    ... National Instant Criminal Background Check System § 25.6 Accessing records in the system. (a) FFLs may... through the NCIC communication network. Upon receiving a request for a background check from an FFL, a POC...

  9. Key issues of multiple access technique for LEO satellite communication systems

    Institute of Scientific and Technical Information of China (English)

    温萍萍; 顾学迈

    2004-01-01

    The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.

  10. CDC STATE System E-Cigarette Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2018. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette Legislation—Youth Access....

  11. A system for success: BMC Systems Biology, a new open access journal.

    Science.gov (United States)

    Hodgkinson, Matt J; Webb, Penelope A

    2007-09-04

    BMC Systems Biology is the first open access journal spanning the growing field of systems biology from molecules up to ecosystems. The journal has launched as more and more institutes are founded that are similarly dedicated to this new approach. BMC Systems Biology builds on the ongoing success of the BMC series, providing a venue for all sound research in the systems-level analysis of biology.

  12. A Protective Mechanism for the Access Control System in the Virtual Domain

    Institute of Scientific and Technical Information of China (English)

    Jinan Shen; Deqing Zou; Hai Jin; Kai Yang; Bin Yuan; Weiming Li

    2016-01-01

    In traditional framework,mandatory access control (MAC) system and malicious software are run in kernel mode.Malicious software can stop MAC systems to be started and make it do invalid.This problem cannot be solved under the traditional framework if the operating system (OS) is comprised since malwares are running in ring0 level.In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems.We separate the access control system into three parts:policy management (PM),security server (SS) and policy enforcement (PE).Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks.We add an access vector cache (AVC) between SS and PE in the guest OS,in order to speed up communication between the guest OS and the security domain.The policy enforcement module is retained in the guest OS for performance.The security of AVC and PE can be ensured by using a memory protection mechanism.The goal of protecting the OS kemel is to ensure the security of the execution path.We implement the system by a modified Xen hypervisor.The result shows that we can secure the security of the access control system in the guest OS with no overhead compared with modules in the latter.Our system offers a centralized security policy for virtual domains in virtual machine environments.

  13. Database application research in real-time data access of accelerator control system

    International Nuclear Information System (INIS)

    Chen Guanghua; Chen Jianfeng; Wan Tianmin

    2012-01-01

    The control system of Shanghai Synchrotron Radiation Facility (SSRF) is a large-scale distributed real-time control system, It involves many types and large amounts of real-time data access during the operating. Database system has wide application prospects in the large-scale accelerator control system. It is the future development direction of the accelerator control system, to replace the differently dedicated data structures with the mature standardized database system. This article discusses the application feasibility of database system in accelerators based on the database interface technology, real-time data access testing, and system optimization research and to establish the foundation of the wide scale application of database system in the SSRF accelerator control system. Based on the database interface technology, real-time data access testing and system optimization research, this article will introduce the application feasibility of database system in accelerators, and lay the foundation of database system application in the SSRF accelerator control system. (authors)

  14. Considering User's Access Pattern in Multimedia File Systems

    Science.gov (United States)

    Cho, KyoungWoon; Ryu, YeonSeung; Won, Youjip; Koh, Kern

    2002-12-01

    Legacy buffer cache management schemes for multimedia server are grounded at the assumption that the application sequentially accesses the multimedia file. However, user access pattern may not be sequential in some circumstances, for example, in distance learning application, where the user may exploit the VCR-like function(rewind and play) of the system and accesses the particular segments of video repeatedly in the middle of sequential playback. Such a looping reference can cause a significant performance degradation of interval-based caching algorithms. And thus an appropriate buffer cache management scheme is required in order to deliver desirable performance even under the workload that exhibits looping reference behavior. We propose Adaptive Buffer cache Management(ABM) scheme which intelligently adapts to the file access characteristics. For each opened file, ABM applies either the LRU replacement or the interval-based caching depending on the Looping Reference Indicator, which indicates that how strong temporally localized access pattern is. According to our experiment, ABM exhibits better buffer cache miss ratio than interval-based caching or LRU, especially when the workload exhibits not only sequential but also looping reference property.

  15. Transparency of Biobank Access in Canada: An Assessment of Industry Access and the Availability of Information on Access Policies and Resulting Research.

    Science.gov (United States)

    Gibson, Shannon G; Axler, Renata E; Lemmens, Trudo

    2017-12-01

    A key issue impacting public trust in biobanks is how these resources are utilized, including who is given access to biobank data and samples. To assess the conditions under which researchers are given access to Canadian biobanks, we reviewed websites and contacted Canadian biobanks to determine the availability of information on access policies and procedures; research resulting from access biobank data and samples; and conditions on private industry access to biobanks. We also conducted expert interviews with key Canadian stakeholders ( n = 11) to obtain their perspectives on biobank transparency and access policies. Among 21 Canadian biobanks, there was wide variation in the access information made publicly available, and the majority of these allowed access by industry applicants. Biobanks should be governed by the principles of transparency, accountability, and accessibility, and attention must be given to the conditions around the commercialization of biobank-based research.

  16. 40 CFR 265.34 - Access to communications or alarm system.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 265.34 Section 265.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID..., STORAGE, AND DISPOSAL FACILITIES Preparedness and Prevention § 265.34 Access to communications or alarm...

  17. System Hardening Architecture for Safer Access to Critical Business ...

    African Journals Online (AJOL)

    System Hardening Architecture for Safer Access to Critical Business Data. ... and the threat is growing faster than the potential victims can deal with. ... in this architecture are applied to the host, application, operating system, user, and the ...

  18. CDC STATE System E-Cigarette Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2017. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. E-Cigarette Legislation—Youth Access....

  19. General Controls Over the Electronic Document Access System

    National Research Council Canada - National Science Library

    2000-01-01

    ...) system as part of the DoD Paper-Free Contracting Initiative. EDA contributes to the initiative by digitizing paper documents and offering web-based read-only access to official contracting, finance and accounting documents...

  20. Automated biometric access control system for two-man-rule enforcement

    International Nuclear Information System (INIS)

    Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule

  1. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  2. Fast Access Data Acquisition System (FADAS)

    International Nuclear Information System (INIS)

    Katsman, Vladimir

    1998-01-01

    Our goal in this program is to develop Fast Access Data Acquisition System (FADAS) by combining the flexibility of Multilink's GaAs and InP electronics and electro-optics with an extremely high data rate for the efficient handling and transfer of collider experimental data. This novel solution is based on Multilink's and Los Alamos National Laboratory's (LANL) unique components and technologies for extremely fast data transfer, storage, and processing

  3. Access Safety Systems – New Concepts from the LHC Experience

    CERN Document Server

    Ladzinski, T; di Luca, S; Hakulinen, T; Hammouti, L; Riesco, T; Nunes, R; Ninin, P; Juget, J-F; Havart, F; Valentini, F; Sanchez-Corral Mena, E

    2011-01-01

    The LHC Access Safety System has introduced a number of new concepts into the domain of personnel protection at CERN. These can be grouped into several categories: organisational, architectural and concerning the end-user experience. By anchoring the project on the solid foundations of the IEC 61508/61511 methodology, the CERN team and its contractors managed to design, develop, test and commission on time a SIL3 safety system. The system uses a successful combination of the latest Siemens redundant safety programmable logic controllers with a traditional relay logic hardwired loop. The external envelope barriers used in the LHC include personnel and material access devices, which are interlocked door-booths introducing increased automation of individual access control, thus removing the strain from the operators. These devices ensure the inviolability of the controlled zones by users not holding the required credentials. To this end they are equipped with personnel presence detectors and th...

  4. Upper bound for energy efficiency in multi-cell fibre-wireless access systems

    NARCIS (Netherlands)

    Koonen, A.M.J.; Popov, M.; Wessing, H.

    2013-01-01

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy

  5. Upper bound for energy efficiency in multi-cell fibre-wireless access systems

    DEFF Research Database (Denmark)

    Koonen, A.M.J.; Popov, M.; Wessing, Henrik

    2013-01-01

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy...

  6. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Science.gov (United States)

    2010-07-01

    ... National Security Division Systems—limited access. (a) The following system of records is exempted from... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of National Security Division Systems-limited access. 16.74 Section 16.74 Judicial Administration DEPARTMENT OF JUSTICE PRODUCTION OR...

  7. Connectivity and conditional models of access and abundance of species in stream networks.

    Science.gov (United States)

    Chelgren, Nathan D; Dunham, Jason B

    2015-07-01

    Barriers to passage of aquatic organisms at stream road crossings are a major cause of habitat fragmentation in stream networks. Accordingly, large investments have been made to restore passage at these crossings, but often without estimation of population-level benefits. Here, we describe a broad-scale approach to quantifying the effectiveness of passage restoration in terms interpretable at population levels, namely numbers of fish and length of stream gained through restoration, by sampling abundance in a study design that accounts for variable biogeographic species pools, variable stream and barrier configurations, and variable probabilities of capture and detectability for multiple species. We modified an existing zero-inflated negative-binomial model to estimate the probability of site access, abundance conditional on access, and capture probability of individual fish. Therein, we modeled probability of access as a function of gradient, stream road-crossing type, and downstream access by fish simultaneously with a predictive model for abundance at sites accessible to fish. Results indicated that replacement of barriers with new crossing designs intended to allow for greater movement was associated with dramatically higher probability of access for all fishes, including migratory Pacific salmon, trout, sculpin, and lamprey. Conversely, existing non-replaced crossings negatively impacted fish distributions. Assuming no downstream constraints on access, we estimated the potential length of stream restored by the program ranged between 7.33 (lamprey) and 15.28 km (small coastal cutthroat and rainbow trout). These contributions represented a fraction of the total length available upstream (187 km) of replaced crossings. When limited ranges of species were considered, the estimated contributions of culvert replacement were reduced (1.65-km range, for longnose dace to 12.31 km for small coastal cutthroat and rainbow trout). Numbers of fish contributed ranged from

  8. 47 CFR 76.971 - Commercial leased access terms and conditions.

    Science.gov (United States)

    2010-10-01

    ... operators that have not satisfied their statutory leased access requirements shall accommodate part-time..., educational and governmental access programming, provided that the operator's franchise agreement requires it... leased commercial channels. Cable operators may impose reasonable insurance requirements on leased access...

  9. Cardea: Dynamic Access Control in Distributed Systems

    Science.gov (United States)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  10. A System to Generate SignWriting for Video Tracks Enhancing Accessibility of Deaf People

    Directory of Open Access Journals (Sweden)

    Elena Verdú

    2017-12-01

    Full Text Available Video content has increased much on the Internet during last years. In spite of the efforts of different organizations and governments to increase the accessibility of websites, most multimedia content on the Internet is not accessible. This paper describes a system that contributes to make multimedia content more accessible on the Web, by automatically translating subtitles in oral language to SignWriting, a way of writing Sign Language. This system extends the functionality of a general web platform that can provide accessible web content for different needs. This platform has a core component that automatically converts any web page to a web page compliant with level AA of WAI guidelines. Around this core component, different adapters complete the conversion according to the needs of specific users. One adapter is the Deaf People Accessibility Adapter, which provides accessible web content for the Deaf, based on SignWritting. Functionality of this adapter has been extended with the video subtitle translator system. A first prototype of this system has been tested through different methods including usability and accessibility tests and results show that this tool can enhance the accessibility of video content available on the Web for Deaf people.

  11. Prospective evaluation of an internet-linked handheld computer critical care knowledge access system.

    Science.gov (United States)

    Lapinsky, Stephen E; Wax, Randy; Showalter, Randy; Martinez-Motta, J Carlos; Hallett, David; Mehta, Sangeeta; Burry, Lisa; Stewart, Thomas E

    2004-12-01

    Critical care physicians may benefit from immediate access to medical reference material. We evaluated the feasibility and potential benefits of a handheld computer based knowledge access system linking a central academic intensive care unit (ICU) to multiple community-based ICUs. Four community hospital ICUs with 17 physicians participated in this prospective interventional study. Following training in the use of an internet-linked, updateable handheld computer knowledge access system, the physicians used the handheld devices in their clinical environment for a 12-month intervention period. Feasibility of the system was evaluated by tracking use of the handheld computer and by conducting surveys and focus group discussions. Before and after the intervention period, participants underwent simulated patient care scenarios designed to evaluate the information sources they accessed, as well as the speed and quality of their decision making. Participants generated admission orders during each scenario, which were scored by blinded evaluators. Ten physicians (59%) used the system regularly, predominantly for nonmedical applications (median 32.8/month, interquartile range [IQR] 28.3-126.8), with medical software accessed less often (median 9/month, IQR 3.7-13.7). Eight out of 13 physicians (62%) who completed the final scenarios chose to use the handheld computer for information access. The median time to access information on the handheld handheld computer was 19 s (IQR 15-40 s). This group exhibited a significant improvement in admission order score as compared with those who used other resources (P = 0.018). Benefits and barriers to use of this technology were identified. An updateable handheld computer system is feasible as a means of point-of-care access to medical reference material and may improve clinical decision making. However, during the study, acceptance of the system was variable. Improved training and new technology may overcome some of the barriers we

  12. Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems

    DEFF Research Database (Denmark)

    Handlos, Line Neerup; Olwig, Karen Fog; Bygbjerg, Ib Christian

    2016-01-01

    unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia......Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely......, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than...

  13. An Information System to Access Status Information of the LHCb Online

    International Nuclear Information System (INIS)

    Frank, M; Gaspar, C

    2012-01-01

    The LHCb collaboration consists of roughly 700 physicists from 52 institutes and universities. Most of the collaborating physicists - including subdetector experts - are not permanently based at CERN. This paper describes the architecture used to publish data internal to the LHCb experiment control- and data acquisition system to the World Wide Web. Collaborators can access the online (sub-) system status and the system performance directly from the institute abroad, from home or from a smart phone without the need of direct access to the online computing infrastructure.

  14. On the Protection of Personal Data in the Access Control System

    Directory of Open Access Journals (Sweden)

    A. P. Durakovskiy

    2012-03-01

    Full Text Available The aim is to prove the qualification system of access control systems (ACS as an information system for personal data (ISPDn. Applications: systems of physical protection of facilities.

  15. A System for Web-based Access to the HSOS Database

    Science.gov (United States)

    Lin, G.

    Huairou Solar Observing Station's (HSOS) magnetogram and dopplergram are world-class instruments. Access to their data has opened to the world. Web-based access to the data will provide a powerful, convenient tool for data searching and solar physics. It is necessary that our data be provided to users via the Web when it is opened to the world. In this presentation, the author describes general design and programming construction of the system. The system will be generated by PHP and MySQL. The author also introduces basic feature of PHP and MySQL.

  16. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  17. A 10-days heatwave around flowering superimposed on climate change conditions significantly affects production of 22 barley accessions

    DEFF Research Database (Denmark)

    Ingvordsen, Cathrine Heinz; Lyngkjær, Michael F.; Peltonen-Sainio, Pirjo

    2015-01-01

    Extreme climate events as heatwaves, floods and storms cause acute changes in season variability influencing primary production and are very likely to increase in magnitude and/or frequency (IPCC, AR5, WGI). In the present study 22 primarily Nordic barley accessions were grown in four basic clima...... climate change conditions on numerous accessions in order to select appropriate genotypes for breeding future cultivars that can secure the primary production....

  18. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  19. Access to justice in the Convention on Rights system

    NARCIS (Netherlands)

    Gerards, J.H.; Glas, L.R.

    2017-01-01

    The numerous reforms to the Convention system of the past two decades have unquestionably had an effect on applicants’ means to access justice in the system. It is, however, open to question how these changes should be evaluated: with reference to the individual right to petition, or with reference

  20. Performance of African Agricultural Exports and External Market Access Conditions under International Trade Reforms

    OpenAIRE

    Nyangito, Hezron Omare

    2004-01-01

    Sub Saharan African agriculture is currently facing challenges in international trade with respect to external market access conditions and competition in world markets as a result of trade liberalization efforts under the world trade organization (WTO) agreements and in particular the agreement on agriculture (AoA). This paper presents the performance of agricultural exports for selected countries and indicates external market barriers faced and the resulting implications of the barriers on ...

  1. Cardiac MRI in patients with complex CHD following primary or secondary implantation of MRI-conditional pacemaker system.

    Science.gov (United States)

    Al-Wakeel, Nadya; O h-Ici, Darach; Schmitt, Katharina R; Messroghli, Daniel R; Riesenkampff, Eugénie; Berger, Felix; Kuehne, Titus; Peters, Bjoern

    2016-02-01

    In patients with CHD, cardiac MRI is often indicated for functional and anatomical assessment. With the recent introduction of MRI-conditional pacemaker systems, cardiac MRI has become accessible for patients with pacemakers. The present clinical study aims to evaluate safety, susceptibility artefacts, and image reading of cardiac MRI in patients with CHD and MRI-conditional pacemaker systems. Material and methods CHD patients with MRI-conditional pacemaker systems and a clinical need for cardiac MRI were examined with a 1.5-T MRI system. Lead function was tested before and after MRI. Artefacts and image readings were evaluated using a four-point grading scale. A total of nine patients with CHD (mean age 34.0 years, range 19.5-53.6 years) received a total of 11 cardiac MRI examinations. Owing to clinical indications, seven patients had previously been converted from conventional to MRI-conditional pacemaker systems. All MRI examinations were completed without adverse effects. Device testing immediately after MRI and at follow-up showed no alteration of pacemaker device and lead function. Clinical questions could be addressed and answered in all patients. Cardiac MRI can be performed safely with high certainty of diagnosis in CHD patients with MRI-conditional pacemaker systems. In case of clinically indicated lead and box changing, CHD patients with non-MRI-conditional pacemaker systems should be considered for complete conversion to MRI-conditional systems.

  2. [Access to medicines prescribed for acute health conditions in adults in South and Northeast Brazil].

    Science.gov (United States)

    Paniz, Vera Maria Vieira; Cechin, Isabel Carolina Coelho Flores; Fassa, Anaclaudia Gastal; Piccini, Roberto Xavier; Tomasi, Elaine; Thumé, Elaine; Silveira, Denise Silva da; Facchini, Luiz Augusto

    2016-01-01

    This was a cross-sectional study within Brazil's Project for the Expansion and Consolidation of Family Health, 2005, with the objective of universal and free access to the medication prescribed in the last medical appointment for acute health problems and to estimate the degree to which access may have improved with inclusion of the medicines in prevailing policies and programs. The sample included 4,060 adults living in the area of primary health care units in 41 municipalities in South and Northeast Brazil. Access was greater in the South (83.2%) than in the Northeast (71%), and free access was similar (37%), with a greater share by the Family Health Program (FHP) when compared to the traditional model, especially in the Northeast. Some 60% of prescribed medicines and 50% of those on the National List of Essential Medicines (RENAME) were paid for. No variation was observed in the proportion of medicines present on the prevailing RENAME list and access. However, 40% of the medicines that were paid for can currently be obtained through the Popular Pharmacy Program. The latter program appears to emerge as a new way to guarantee access to medicines prescribed in the health system.

  3. Single-centre experience with Renal PatientView, a web-based system that provides patients with access to their laboratory results.

    Science.gov (United States)

    Woywodt, Alexander; Vythelingum, Kervina; Rayner, Scott; Anderton, John; Ahmed, Aimun

    2014-10-01

    Renal PatientView (RPV) is a novel, web-based system in the UK that provides patients with access to their laboratory results, in conjunction with patient information. To study how renal patients within our centre access and use RPV. We sent out questionnaires in December 2011 to all 651 RPV users under our care. We collected information on aspects such as the frequency and timing of RPV usage, the parameters viewed by users, and the impact of RPV on their care. A total of 295 (45 %) questionnaires were returned. The predominant users of RPV were transplant patients (42 %) followed by pre-dialysis chronic kidney disease patients (37 %). Forty-two percent of RPV users accessed their results after their clinic appointments, 38 % prior to visiting the clinic. The majority of patients (76 %) had used the system to discuss treatment with their renal physician, while 20 % of patients gave permission to other members of their family to use RPV to monitor results on their behalf. Most users (78 %) reported accessing RPV on average 1-5 times/month. Most patients used RPV to monitor their kidney function, 81 % to check creatinine levels, 57 % to check potassium results. Ninety-two percent of patients found RPV easy to use and 93 % felt that overall the system helps them in taking care of their condition; 53 % of patients reported high satisfaction with RPV. Our results provide interesting insight into use of a system that gives patients web-based access to laboratory results. The fact that 20 % of patients delegate access to relatives also warrants further study. We propose that online access to laboratory results should be offered to all renal patients, although clinicians need to be mindful of the 'digital divide', i.e. part of the population that is not amenable to IT-based strategies for patient empowerment.

  4. Assessment of Deafblind Access to Manual Language Systems (ADAMLS)

    Science.gov (United States)

    Blaha, Robbie; Carlson, Brad

    2007-01-01

    This document presents the Assessment of Deafblind Access to Manual Language Systems (ADAMLS), a resource for educational teams who are responsible for developing appropriate adaptations and strategies for children who are deafblind who are candidates for learning manual language systems. The assessment tool should be used for all children with a…

  5. Access to essential medicines in Pakistan: policy and health systems research concerns.

    Directory of Open Access Journals (Sweden)

    Shehla Zaidi

    Full Text Available INTRODUCTION: Inadequate access to essential medicines is a common issue within developing countries. Policy response is constrained, amongst other factors, by a dearth of in-depth country level evidence. We share here i gaps related to access to essential medicine in Pakistan; and ii prioritization of emerging policy and research concerns. METHODS: An exploratory research was carried out using a health systems perspective and applying the WHO Framework for Equitable Access to Essential Medicine. Methods involved key informant interviews with policy makers, providers, industry, NGOs, experts and development partners, review of published and grey literature, and consultative prioritization in stakeholder's Roundtable. FINDINGS: A synthesis of evidence found major gaps in essential medicine access in Pakistan driven by weaknesses in the health care system as well as weak pharmaceutical regulation. 7 major policy concerns and 11 emerging research concerns were identified through consultative Roundtable. These related to weaknesses in medicine registration and quality assurance systems, unclear and counterproductive pricing policies, irrational prescribing and sub-optimal drug availability. Available research, both locally and globally, fails to target most of the identified policy concerns, tending to concentrate on irrational prescriptions. It overlooks trans-disciplinary areas of policy effectiveness surveillance, consumer behavior, operational pilots and pricing interventions review. CONCLUSION: Experience from Pakistan shows that policy concerns related to essential medicine access need integrated responses across various components of the health systems, are poorly addressed by existing evidence, and require an expanded health systems research agenda.

  6. Over-the-horizon, connected home/office (OCHO): situation management of environmental, medical, and security conditions at remote premises via broadband wireless access

    Science.gov (United States)

    Hortos, William S.

    2010-04-01

    Broadband wireless access standards, together with advances in the development of commercial sensing and actuator devices, enable the feasibility of a consumer service for a multi-sensor system that monitors the conditions within a residence or office: the environment/infrastructure, patient-occupant health, and physical security. The proposed service is a broadband reimplementation and combination of existing services to allow on-demand reports on and management of the conditions by remote subscribers. The flow of on-demand reports to subscribers and to specialists contracted to mitigate out-of-tolerance conditions is the foreground process. Service subscribers for an over-the-horizon connected home/office (OCHO) monitoring system are the occupant of the premises and agencies, contracted by the service provider, to mitigate or resolve any observed out-of-tolerance condition(s) at the premises. Collectively, these parties are the foreground users of the OCHO system; the implemented wireless standards allow the foreground users to be mobile as they request situation reports on demand from the subsystems on remote conditions that comprise OCHO via wireless devices. An OCHO subscriber, i.e., a foreground user, may select the level of detail found in on-demand reports, i.e., the amount of information displayed in the report of monitored conditions at the premises. This is one context of system operations. While foreground reports are sent only periodically to subscribers, the information generated by the monitored conditions at the premises is continuous and is transferred to a background configuration of servers on which databases reside. These databases are each used, generally, in non-real time, for the assessment and management of situations defined by attributes like those being monitored in the foreground by OCHO. This is the second context of system operations. Context awareness and management of conditions at the premises by a second group of analysts and

  7. Providers' Access of Imaging Versus Only Reports: A System Log File Analysis.

    Science.gov (United States)

    Jung, Hye-Young; Gichoya, Judy Wawira; Vest, Joshua R

    2017-02-01

    An increasing number of technologies allow providers to access the results of imaging studies. This study examined differences in access of radiology images compared with text-only reports through a health information exchange system by health care professionals. The study sample included 157,256 historical sessions from a health information exchange system that enabled 1,670 physicians and non-physicians to access text-based reports and imaging over the period 2013 to 2014. The primary outcome was an indicator of access of an imaging study instead of access of a text-only report. Multilevel mixed-effects regression models were used to estimate the association between provider and session characteristics and access of images compared with text-only reports. Compared with primary care physicians, specialists had an 18% higher probability of accessing actual images instead of text-only reports (β = 0.18; P < .001). Compared with primary care practice settings, the probability of accessing images was 4% higher for specialty care practices (P < .05) and 8% lower for emergency departments (P < .05). Radiologists, orthopedists, and neurologists accounted for 79% of all the sessions with actual images accessed. Orthopedists, radiologists, surgeons, and pulmonary disease specialists accessed imaging more often than text-based reports only. Consideration for differences in the need to access images compared with text-only reports based on the type of provider and setting of care are needed to maximize the benefits of image sharing for patient care. Copyright © 2016 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  8. Development of a wireless protection against imitation system for identification and control of vehicle access

    Directory of Open Access Journals (Sweden)

    Aleksei A. Gavrishev

    2018-03-01

    Full Text Available This article deals with wireless systems for identification and control of vehicle access to protected objects. Known systems are considered. As a result, it has been established that one of the most promising approaches to identifying and controlling vehicle access to protected objects is the use of systems based on the "friend or foe" principle. Among these systems, there are "one-directional" and "bedirectional" identification and access control systems. "Bidirectional" systems are more preferable for questions of identification and access control. However, at present, these systems should have a reduced probability of recognizing the structure of the request and response signals because the potential attacker can easily perform unauthorized access to the radio channel of the system. On this basis, developed a wireless system identification and control vehicle access to protected objects based on the principle of "friend or foe", featuring increased protection from unauthorized access and jamming through the use of rewritable drives chaotic sequences. In addition, it’s proposed to use to identify the vehicle's RFID tag containing additional information about it. Are some specifications of the developed system (the possible frequency range of the request-response signals, the communication range, data rate, the size of the transmitted data, guidelines for choosing RFID. Also, with the help of fuzzy logic, was made the security assessment from unauthorized access request-response signals based on the system of "friend or foe", which are transferred via radio channel, developed systems and analogues. The security assessment of the developed system shows an adequate degree of protection against complex threats (view, spoofing, interception and jamming of traffic in comparison with known systems of this class. Among the main advantages of the developed system it’s necessary to mention increased security from unauthorized access and jamming

  9. Problems and Concerns Regarding Access Control System Construction in Radiation Facilities Based on the NIFS Experience

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Motojima, O.

    2001-01-01

    Full text: In 1998, access control system for the large helical device (LHD) experimental hall was constructed and put into operation at the National Institute for Fusion Science (NIFS) in Toki, Japan. Since then, the system has been continuously improved. It now controls access into the LHD controlled area through four entrances. The system has five turnstile gates and enables control of access at the four entrances. The system is always checking whether the shielding doors are open or closed at eight positions. The details pertaining to the construction of the system were reported at IRPA-10 held in Hiroshima, Japan, in 2000. Based on our construction experience of the NIFS access control system, we will discuss problems related to software and operational design of the system. We will also discuss some concerns regarding the use of the system in radiation facilities. The problems we will present concern, among other thing, individual registration, time control, turnstile control, interlock signal control, data aggregation and transactions, automatic and manual control, and emergency procedures. For example, in relation to the time control and turnstile control functions, we will discuss the gate-opening time interval for an access event, the timing of access data recording, date changing, turn bar control, double access, and access error handling. (author)

  10. Geographical National Condition and Complex System

    Directory of Open Access Journals (Sweden)

    WANG Jiayao

    2016-01-01

    Full Text Available The significance of studying the complex system of geographical national conditions lies in rationally expressing the complex relationships of the “resources-environment-ecology-economy-society” system. Aiming to the problems faced by the statistical analysis of geographical national conditions, including the disunity of research contents, the inconsistency of range, the uncertainty of goals, etc.the present paper conducted a range of discussions from the perspectives of concept, theory and method, and designed some solutions based on the complex system theory and coordination degree analysis methods.By analyzing the concepts of geographical national conditions, geographical national conditions survey and geographical national conditions statistical analysis, as well as investigating the relationships between theirs, the statistical contents and the analytical range of geographical national conditions are clarified and defined. This investigation also clarifies the goals of the statistical analysis by analyzing the basic characteristics of the geographical national conditions and the complex system, and the consistency between the analysis of the degree of coordination and statistical analyses. It outlines their goals, proposes a concept for the complex system of geographical national conditions, and it describes the concept. The complex system theory provides new theoretical guidance for the statistical analysis of geographical national conditions. The degree of coordination offers new approaches on how to undertake the analysis based on the measurement method and decision-making analysis scheme upon which the complex system of geographical national conditions is based. It analyzes the overall trend via the degree of coordination of the complex system on a macro level, and it determines the direction of remediation on a micro level based on the degree of coordination among various subsystems and of single systems. These results establish

  11. Data Access System for Hydrology

    Science.gov (United States)

    Whitenack, T.; Zaslavsky, I.; Valentine, D.; Djokic, D.

    2007-12-01

    As part of the CUAHSI HIS (Consortium of Universities for the Advancement of Hydrologic Science, Inc., Hydrologic Information System), the CUAHSI HIS team has developed Data Access System for Hydrology or DASH. DASH is based on commercial off the shelf technology, which has been developed in conjunction with a commercial partner, ESRI. DASH is a web-based user interface, developed in ASP.NET developed using ESRI ArcGIS Server 9.2 that represents a mapping, querying and data retrieval interface over observation and GIS databases, and web services. This is the front end application for the CUAHSI Hydrologic Information System Server. The HIS Server is a software stack that organizes observation databases, geographic data layers, data importing and management tools, and online user interfaces such as the DASH application, into a flexible multi- tier application for serving both national-level and locally-maintained observation data. The user interface of the DASH web application allows online users to query observation networks by location and attributes, selecting stations in a user-specified area where a particular variable was measured during a given time interval. Once one or more stations and variables are selected, the user can retrieve and download the observation data for further off-line analysis. The DASH application is highly configurable. The mapping interface can be configured to display map services from multiple sources in multiple formats, including ArcGIS Server, ArcIMS, and WMS. The observation network data is configured in an XML file where you specify the network's web service location and its corresponding map layer. Upon initial deployment, two national level observation networks (USGS NWIS daily values and USGS NWIS Instantaneous values) are already pre-configured. There is also an optional login page which can be used to restrict access as well as providing a alternative to immediate downloads. For large request, users would be notified via

  12. NASA Access Mechanism - Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy F.; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited by factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  13. NASA access mechanism: Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited to factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  14. Computational experiment for the purpose of determining the probabilistic and temporal characteristics of information security systems against unauthorized access in automated information systems

    Directory of Open Access Journals (Sweden)

    A. V. Skrypnikov

    2017-01-01

    Full Text Available The article is devoted to the method of experimental estimation of parameters of functioning of standard information protection systems from unauthorized access, certified, widely used in organizations operating automated information systems. In the course of the experiment, statistical data were evaluated in the dynamics of the functioning of information security systems against unauthorized access in automated information systems. Registration of the parameters for the execution time of protective protection functions was carried out using a special utility called ProcessMonitor from the Sysinternals suite of utilities used to filter processes and threads. The loading of the processor and main memory of the computer with the use of special software, specially designed for performing experimental research, simulates the operation of GIS in real-world work for its intended purpose. A special software for simulating the work of a system with high load is developed in "VisualStudio 2015" within the framework of "ConsoleApplication". At the same time, the processor is loaded at a level of 50-70% and 60-80% of the operative memory. The obtained values of the time of implementation of protective functions in conditions of high utilization of resources of computer facilities for their intended purpose will allow us to assess the conflict and dynamic properties of the GIS. In the future, the obtained experimental estimates can be used to develop a model of information security in automated information systems, as well as in the formation of quality requirements (resource intensity, response time to the user's request, availability, etc.. Also, the results of the computational experiment in the future can be used to develop a software package for assessing the dynamic performance of information security systems against unauthorized access in automated information systems

  15. Interactive water monitoring system accessible by cordless telephone

    Science.gov (United States)

    Volpicelli, Richard; Andeweg, Pierre; Hagar, William G.

    1985-12-01

    A battery-operated, microcomputer-controlled monitoring device linked with a cordless telephone has been developed for remote measurements. This environmental sensor is self-contained and collects and processes data according to the information sent to its on-board computer system. An RCA model 1805 microprocessor forms the basic controller with a program encoded in memory for data acquisition and analysis. Signals from analog sensing devices used to monitor the environment are converted into digital signals and stored in random access memory of the microcomputer. This remote sensing system is linked to the laboratory by means of a cordless telephone whose base unit is connected to regular telephone lines. This offshore sensing system is simply accessed by a phone call originating from a computer terminal in the laboratory. Data acquisition is initiated upon request: Information continues to be processed and stored until the computer is reprogrammed by another phone call request. Information obtained may be recalled by a phone call after the desired environmental measurements are finished or while they are in progress. Data sampling parameters may be reset at any time, including in the middle of a measurement cycle. The range of the system is limited only by existing telephone grid systems and by the transmission characteristics of the cordless phone used as a communications link. This use of a cordless telephone, coupled with the on-board computer system, may be applied to other field studies requiring data transfer between an on-site analytical system and the laboratory.

  16. Natural variation in rosette size under salt stress conditions corresponds to developmental differences between Arabidopsis accessions and allelic variation in the LRR-KISS gene

    KAUST Repository

    Julkowska, Magdalena

    2016-02-11

    Natural variation among Arabidopsis accessions is an important genetic resource to identify mechanisms underlying plant development and stress tolerance. To evaluate the natural variation in salinity stress tolerance, two large-scale experiments were performed on two populations consisting of 160 Arabidopsis accessions each. Multiple traits, including projected rosette area, and fresh and dry weight were collected as an estimate for salinity tolerance. Our results reveal a correlation between rosette size under salt stress conditions and developmental differences between the accessions grown in control conditions, suggesting that in general larger plants were more salt tolerant. This correlation was less pronounced when plants were grown under severe salt stress conditions. Subsequent genome wide association study (GWAS) revealed associations with novel candidate genes for salinity tolerance such as LRR-KISS (At4g08850), flowering locus KH-domain containing protein and a DUF1639-containing protein. Accessions with high LRR-KISS expression developed larger rosettes under salt stress conditions. Further characterization of allelic variation in candidate genes identified in this study will provide more insight into mechanisms of salt stress tolerance due to enhanced shoot growth.

  17. Performance Analysis of DPSK-OCDMA System for Optical Access Network

    Science.gov (United States)

    Islam, Monirul; Ahmed, N.; Aljunid, S. A.; Ali, Sharafat; Sayeed, S.; Sabri, Naseer

    2016-03-01

    In this research, the performance of optical code division multiple access (OCDMA) using differential phase shift keying (DPSK) has been compared with OCDMA On-Off Keying (OOK). This comparison took place in terms of bit error rate (BER) and receiver power where two bit rates (155 Mbps and 622 Mbps) have been used for this analysis. Using of OptiSystem 7.0 simulation, comparing eye diagram and optical spectrum alongside with BER and Rx power. It is found that OCDMA-DPSK performs better in comparison to OCDMA-OOK. The performance analysis also provides parameter for designing and development of an OCDMA system for optical access network using DPSK.

  18. Renewable energies in the EU-Accession States

    International Nuclear Information System (INIS)

    Reiche, Danyel

    2006-01-01

    The aim of this article is to discuss obstacles and success conditions for renewable energy sources in the EU-Accession States and to compare them with the framework in the EU-15. Besides the ten states which will join the EU in 2004, Bulgaria and Romania which will probably join in 2007 as well as Turkey are analysed. Most of these countries have had a century-long tradition in the utilisation of RES, primarily in biomass and hydropower. However, the communist regimes were convinced of the superiority of large-scale systems and converted the energy sectors into centralised units. Due to this dominating belief system more decentralised applications such as installations using renewable energies had to close. One crucial driving force for future renewable energy development in the Accession States comes from the stipulations set by the EU. The EU-Directive on the promotion of electricity produced from RES gives the new EU-members targets for their RES-development until 2010. Due to the Directive many Accession States have already begun to pay more attention to the topic and to introduce more systematic policies. Six of the Accession States have introduced minimum tariffs which were one of the main success conditions (besides a stable and sound investment programme as well as favourable background conditions) in the leading wind energy countries Germany and Spain. Beside the external pressure by the EU and other international obligations other driving forces such as the path dependencies in the national energy policies (degree of coal, oil and gas exploitation, nuclear power use, import dependency), the political support schemes for renewable energies, possibilities of obtaining external financial support and the cognitive environment are discussed. Finally similarities and differences between EU-15 and Accession States are worked out

  19. A system for success: BMC Systems Biology, a new open access journal

    OpenAIRE

    Webb Penelope A; Hodgkinson Matt J

    2007-01-01

    Abstract BMC Systems Biology is the first open access journal spanning the growing field of systems biology from molecules up to ecosystems. The journal has launched as more and more institutes are founded that are similarly dedicated to this new approach. BMC Systems Biology builds on the ongoing success of the BMC series, providing a venue for all sound research in the systems-level analysis of biology.

  20. Email based remote access and surveillance system for smart home infrastructure

    Directory of Open Access Journals (Sweden)

    Pooshkar Rajiv

    2016-09-01

    Full Text Available With the rapid rise of Internet of Things in public domain, people expect fast, reliable and on-demand home security via the Internet. However, existing remote home surveillance systems place a very rigid constraint on authentication and require customized hardware and software. In this paper we have proposed an ingenious and reliable internet based, home access system for smart homes that can be easily deployed on generic hardware. The proposed architecture uses popular email service providers to notify and update the user about the home access. It sends an email to the owner with the attached picture of the person who is at the door. It also incorporates a protected mechanism to give access of the door to a remote user by responding to that email. It essentially means that we can view and give access to the person at our door via sending and receiving an email. Furthermore, an image processing based mechanism has also been incorporated to provide access without email, to few selected personnel who are trusted by the owner. It works by capturing and comparing the visitor's image with the stored images in the database. Perceptual hashing or fingerprint matching algorithm is used for comparison purposes. Similarity percentage based on hamming distance was evaluated, and the similarity threshold for providing access was set. The simulations were performed in rigorous environment. The efficiency of the hashing algorithm was found to be 97% at the similarity threshold of 95%. The results validate that the average latency is only 155 ms with low standard deviation. The CPU utilization remained quite low with a minimum value of 10 MHz and a maximum value of 30 MHz when the payload size of the sent mail was increased to 1500 kB. Thus, the proposed system can be used for developing a larger low power infrastructure.

  1. The influence of covalent immobilization conditions on antibody accessibility on nanoparticles

    NARCIS (Netherlands)

    Saha, Bedabrata; Songe, Pål; Evers, Toon H.; Prins, Menno W.J.

    2017-01-01

    The accessibility of particle-coupled antibodies is important for many analytical applications, but comprehensive data on parameters controlling the accessibility are scarce. Here we report on the site-specific accessibility of monoclonal antibodies, immobilized on magnetic nanoparticles (500 nm) by

  2. The upgrade of the J-TEXT experimental data access and management system

    International Nuclear Information System (INIS)

    Yang, C.; Zhang, M.; Zheng, W.; Liu, R.; Zhuang, G.

    2014-01-01

    Highlights: • The J-TEXT DAMS is developed based on B/S model, which makes it conveniently access the system. • The JWeb-Scope adopts segment strategy to read data that improve the speed of reading data. • DAMS have integrated the management and JWeb-Scope and make an easy way for visitors to access the experiment data. • The JWeb-Scope can be visited all over the world, plot experiment data and zoom in or out smoothly. - Abstract: The experimental data of J-TEXT tokamak are stored in the MDSplus database. The old J-TEXT data access system is based on the tools provided by MDSplus. Since the number of signals is huge, the data retrieval for an experiment is difficult. To solve this problem, the J-TEXT experimental data access and management system (DAMS) based on MDSplus has been developed. The DAMS left the old MDSplus system unchanged providing new tools, which can help users to handle all signals as well as to retrieve signals they need thanks to the user information requirements. The DAMS also offers users a way to create their jScope configuration files which can be downloaded to the local computer. In addition, the DAMS provides a JWeb-Scope tool to visualize the signal in a browser. JWeb-Scope adopts segment strategy to read massive data efficiently. Users can plot one or more signals on their own choice and zoom-in, zoom-out smoothly. The whole system is based on B/S model, so that the users only need of the browsers to access the DAMS. The DAMS has been tested and it has a better user experience. It will be integrated into the J-TEXT remote participation system later

  3. Providing Access to Library Automation Systems for Students with Disabilities.

    Science.gov (United States)

    California Community Colleges, Sacramento. High-Tech Center for the Disabled.

    This document provides information on the integration of assistive computer technologies and library automation systems at California Community Colleges in order to ensure access for students with disabilities. Topics covered include planning, upgrading, purchasing, implementing and using these technologies with library systems. As information…

  4. What systems participants know about access and service entry and why managers should listen.

    Science.gov (United States)

    Duncombe, Rohena

    2017-08-01

    Objective The present study looked at the views of people directly involved in the entry process for community health counselling using the frame of the health access literature. The concurrence of system participants' views with the access literature highlights access issues, particularly for people who are vulnerable or disadvantaged. The paper privileges the voices of the system participants, inviting local health services to consider using participatory design to improve access at the entry point. Methods People involved in the entry process for community health counselling explored the question, 'What, for you, are the features of a good intake system?' They also commented on themes identified during pilot interviews. These were thematically analysed for each participant group by the researcher to develop a voice for each stakeholder group. Results People accessing the service could be vulnerable and the entry process failed to take that into account. People directly involved in the counselling service entry system, system participants, consisted of: professionals referring in, people seeking services and reception staff taking first enquiries. They shared substantially the same concerns as each other. The responses from these system participants are consistent with the international literature on access and entry into health services. Conclusion Participatory service design could improve primary healthcare service entry at the local level. Canvassing the experiences of system participants is important for delivering services to those who have the least access and, in that way, could contribute to health equity. What is known about the topic? People with the highest health needs receive the fewest services. Health inequality is increasing. What does this paper add? System participants can provide advice consistent with the academic research literature that is useful for improving service entry at the local level. What are the implications for practitioners

  5. Average opportunity-based accessibility of public transit systems to grocery stores in small urban areas

    Directory of Open Access Journals (Sweden)

    Nimish Dharmadhikari

    2015-12-01

    Full Text Available This research studies the accessibility of grocery stores to university students using the public transportation system, drawing from a case study of Fargo, North Dakota. Taking into consideration the combined travel time components of walking, riding, and waiting, this study measures two types of accessibilities: accessibility to reach a particular place and accessibility to reach the bus stop to ride the public transit system. These two accessibilities are interdependent and cannot perform without each other. A new method to calculate the average accessibility measure for the transit routes is proposed. A step-wise case study analysis indicates that one route provides accessibility to a grocery store in eight minutes. This also suggests that the North Dakota State University area has moderate accessibility to grocery stores.

  6. Design and Implementation of a Library and Information Science Open Access Journal Union Catalogue System

    Directory of Open Access Journals (Sweden)

    Sinn-Cheng Lin

    2017-03-01

    Full Text Available Open access is a mode of academic communication that has been on the rise in recent years, but open access academic resources are widely dispersed across the internet, making it occasionally inconvenient in terms of its use. This research is focused on library and information science, using the OAIS reference model as the system framework, two open access platform, DOAJ and E-LIS as the data sources, and through system implementation develop a “library and information science open access journal union catalogue” system. Using the OAI-PMH protocol as the data interoperability standard, and LAMP as the development environment, four major functionalities: injest, archiving, management and access of information were designed, developed, and integrated into system build. Actual testing and verification showed this system is able to successfully collect data from DOAJ and E-LIS open journal resources related to library and information science. The system is now active and functional, and can be used by researchers in the library and science information field.

  7. A semi-automated vascular access system for preclinical models

    International Nuclear Information System (INIS)

    Berry-Pusey, B N; David, J; Taschereau, R; Silverman, R W; Williams, D; Ladno, W; Stout, D; Chatziioannou, A; Chang, Y C; Prince, S W; Chu, K; Tsao, T C

    2013-01-01

    Murine models are used extensively in biological and translational research. For many of these studies it is necessary to access the vasculature for the injection of biologically active agents. Among the possible methods for accessing the mouse vasculature, tail vein injections are a routine but critical step for many experimental protocols. To perform successful tail vein injections, a high skill set and experience is required, leaving most scientists ill-suited to perform this task. This can lead to a high variability between injections, which can impact experimental results. To allow more scientists to perform tail vein injections and to decrease the variability between injections, a vascular access system (VAS) that semi-automatically inserts a needle into the tail vein of a mouse was developed. The VAS uses near infrared light, image processing techniques, computer controlled motors, and a pressure feedback system to insert the needle and to validate its proper placement within the vein. The VAS was tested by injecting a commonly used radiolabeled probe (FDG) into the tail veins of five mice. These mice were then imaged using micro-positron emission tomography to measure the percentage of the injected probe remaining in the tail. These studies showed that, on average, the VAS leaves 3.4% of the injected probe in the tail. With these preliminary results, the VAS system demonstrates the potential for improving the accuracy of tail vein injections in mice. (paper)

  8. The optimal access system for future far-offshore wind farms

    Energy Technology Data Exchange (ETDEWEB)

    Obdam, T.S.; Rademakers, L.W.M.M.; Savenije, L.B. [ECN Wind Energy, Petten (Netherlands)

    2013-12-15

    Operation and maintenance (O and M) of offshore wind turbines is one of the main cost drivers of offshore wind energy. One of the aspects critical for an efficient and cost-effective O and M strategy is the selection of the access system which is used to transfer technicians and, optionally, small spare parts. Currently, most offshore wind farms are located close to shore, and their size is relatively small. For these farms the typical access system consists of catamaran-like workboats, which are used to transfer both technicians and small spare parts. As wind farms move further offshore this O and M concept might no longer be cost-effective. Currently, different alternative O and M concepts are being considered for the future far-offshore sites. In this paper an extensive and holistic comparison of different O and M concepts including different access system solutions is presented. This analysis has been performed using the OMCECalculator, ECN's software for advanced O and M cost modelling. Different sites have been considered, which are typical for the future offshore wind farms that will be commissioned during the next five years. The results of the performed analyses indicate that when moving further offshore harbour-based O and M strategies are no longer economical, even when helicopters are added to the mix. Looking at farm-based O and M concepts a supply vessel with a compensated access gangway offers great potential. However, the calculations also indicate that its ability to transfer small spare parts, in addition to technicians, is crucial.

  9. Operational Circular No.2 (Rev. 2) - Conditions of access to the fenced parts of the CERN site

    CERN Multimedia

    2014-01-01

    Operational Circular No. 2 (Rev. 2) entitled “Conditions of access to the fenced parts of the CERN site” and its “implementation measures”, approved by the Director-General following discussion at the Standing Concertation Committee meeting on 20 May 2014 and entering into force on 1 September 2014, are available on the intranet site of the Human Resources Department (see here).   This circular is applicable to members of the personnel and other persons concerned. It cancels and replaces Operational Circular No. 2 (Rev. 1) entitled “Conditions of access to the fenced parts of the CERN site”, of April 1998. In particular, the revised circular provides for the possibility of mandating a person responsible for the proper implementation of the circular, specifies the rules relating to vehicles allowed on the site and the respective responsibilities of their owners, and relaxes certain administrative formalities in case of loss, theft or di...

  10. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed.......We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  11. Distributed magnetic field positioning system using code division multiple access

    Science.gov (United States)

    Prigge, Eric A. (Inventor)

    2003-01-01

    An apparatus and methods for a magnetic field positioning system use a fundamentally different, and advantageous, signal structure and multiple access method, known as Code Division Multiple Access (CDMA). This signal architecture, when combined with processing methods, leads to advantages over the existing technologies, especially when applied to a system with a large number of magnetic field generators (beacons). Beacons at known positions generate coded magnetic fields, and a magnetic sensor measures a sum field and decomposes it into component fields to determine the sensor position and orientation. The apparatus and methods can have a large `building-sized` coverage area. The system allows for numerous beacons to be distributed throughout an area at a number of different locations. A method to estimate position and attitude, with no prior knowledge, uses dipole fields produced by these beacons in different locations.

  12. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  13. Task-and-role-based access-control model for computational grid

    Institute of Scientific and Technical Information of China (English)

    LONG Tao; HONG Fan; WU Chi; SUN Ling-li

    2007-01-01

    Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.

  14. Towards Payment Systems for all: accessible POS

    Directory of Open Access Journals (Sweden)

    Begoña Pino

    2014-10-01

    Full Text Available The project presented here is a first step towards building a more accessible world through Payment Systems and a successful implementation of a User Centred Design. By means of a beep-system, a Point of Sale (POS payment device informs the user of those transaction steps that require his/her attention at the moment of payment, such as when: the card has been successfully read, the Personal Identification Number (PIN must be entered, the transaction has been successfully processed and the transaction has not been completed due to an error. The proposed solution increases the personal autonomy and security of blind people when paying at a merchant.

  15. Real-time personal exposure and health condition monitoring system

    Energy Technology Data Exchange (ETDEWEB)

    Saitou, Isamu; Kanda, Hiroaki; Asai, Akio; Takeishi, Naoki; Ota, Yoshito [Hitachi Aloka Medical, Ltd., Measuring Systems Engineering Dept., Tokyo (Japan); Hanawa, Nobuhiro; Ueda, Hisao; Kusunoki, Tsuyoshi; Ishitsuka, Etsuo; Kawamura, Hiroshi [Japan Atomic Energy Agency, Oarai Research and Development Center, Oarai, Ibaraki (Japan)

    2012-03-15

    JAEA (Japan Atomic Energy Agency) and HAM (Hitachi Aloka Medical, Ltd) have proposed novel monitoring system for workers of nuclear facility. In these facilities, exposure management for workers is mainly used access control and personal exposure recordings. This system is currently only for reports management but is not confirmative for surveillance when work in progress. Therefore, JAEA and HAM integrate access control and personal exposure recordings and two real-time monitoring systems which are position sensing and vital sign monitor. Furthermore change personal exposure management to real-time management, this system integration prevents workers from risk of accidents, and makes possible take appropriate action quickly. This novel system is going to start for tentative operation, using position sensing and real-time personal dosimeter with database in Apr. 2012. (author)

  16. From System Expansion to System Contraction: Access to Higher Education in Poland

    Science.gov (United States)

    Kwiek, Marek

    2013-01-01

    Access to higher education in Poland is changing due to the demography of smaller cohorts of potential students. Following a demand-driven educational expansion after the collapse of communism in 1989, the higher education system is now contracting. Such expansion/contraction and growth/decline in European higher education has rarely been…

  17. DOE's nation-wide system for access control can solve problems for the federal government

    International Nuclear Information System (INIS)

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy's (DOE's) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location's level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals

  18. Primary care access for mental illness in Australia: Patterns of access to general practice from 2006 to 2016.

    Science.gov (United States)

    Farrer, Louise M; Walker, Jennie; Harrison, Christopher; Banfield, Michelle

    2018-01-01

    General practice has an important role within the Australian healthcare system to provide access to care and effective management of chronic health conditions. However, people with serious mental illness experience challenges associated with service access. The current paper seeks to examine drivers of access to general practice for people with common and serious mental disorders, compared with people who access care for type II diabetes, a common physical health problem managed in general practice. The Bettering the Evaluation and Care of Health (BEACH) programme provides the most comprehensive and objective measurement of general practitioner activity in Australia. Using BEACH data, this study compared general practice encounters for depression, anxiety, bipolar disorder, schizophrenia, and type II diabetes during a 10-year period between 2006 and 2016. Analysis revealed more frequent encounters for depression compared to anxiety, and a higher representation of women in encounters for bipolar disorder compared to men. The relationship between number of encounters and patient age was strongly associated with the life course and mortality characteristics associated with each disorder. The findings highlight specific challenges associated with access to primary care for people with serious mental illness, and suggest areas of focus to improve the ability of these patients to access and navigate the health system.

  19. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  20. A System to Generate SignWriting for Video Tracks Enhancing Accessibility of Deaf People

    OpenAIRE

    Elena Verdú; Cristina Pelayo G-Bustelo; Ángeles Martínez Sánchez; Rubén Gonzalez-Crespo

    2017-01-01

    Video content has increased much on the Internet during last years. In spite of the efforts of different organizations and governments to increase the accessibility of websites, most multimedia content on the Internet is not accessible. This paper describes a system that contributes to make multimedia content more accessible on the Web, by automatically translating subtitles in oral language to Sign Writing, a way of writing Sign Language. This system extends the functionality of a general we...

  1. Privacy and Access Control for IHE-Based Systems

    Science.gov (United States)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  2. Evaluation of need for ontologies to manage domain content for the Reportable Conditions Knowledge Management System.

    Science.gov (United States)

    Eilbeck, Karen L; Lipstein, Julie; McGarvey, Sunanda; Staes, Catherine J

    2014-01-01

    The Reportable Condition Knowledge Management System (RCKMS) is envisioned to be a single, comprehensive, authoritative, real-time portal to author, view and access computable information about reportable conditions. The system is designed for use by hospitals, laboratories, health information exchanges, and providers to meet public health reporting requirements. The RCKMS Knowledge Representation Workgroup was tasked to explore the need for ontologies to support RCKMS functionality. The workgroup reviewed relevant projects and defined criteria to evaluate candidate knowledge domain areas for ontology development. The use of ontologies is justified for this project to unify the semantics used to describe similar reportable events and concepts between different jurisdictions and over time, to aid data integration, and to manage large, unwieldy datasets that evolve, and are sometimes externally managed.

  3. Bus Access Optimisation for FlexRay-based Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Pop, Traian; Pop, Paul; Eles, Petru

    2007-01-01

    -real time communication in a deterministic manner. In this paper, we propose techniques for optimising the FlexRay bus access mechanism of a distributed system, so that the hard real-time deadlines are met for all the tasks and messages in the system. We have evaluated the proposed techniques using...

  4. A novel technique to extract events from access control system and locate persons

    International Nuclear Information System (INIS)

    Vincent, M.; Vaidyanathan, Mythili; Patidar, Suresh Chandra; Prabhakara Rao, G.

    2011-01-01

    Indira Gandhi Centre for Atomic Research houses many laboratories which handle radioactive materials and classified materials. Protection and accounting of men and material and critical facilities are important aspect of nuclear security. Access Control System (ACS) is used to enhance the protective measures against elevated threat environment. Access control system hardware consists of hand geometry readers, RFID readers, Controllers, Electromagnetic door locks, Turnstiles, fiber cable laying and termination etc. Access Control System controls and monitors the people accessing the secured facilities. Access Control System generates events on: 1. Showing of RFID card, 2. Rotation of turnstile, 3. Download of valid card numbers, 4. Generation of alarms etc. Access control system turnstiles are located in main entrance of a facility, entrance of inside laboratory and door locks are fixed on secured facilities. Events are stored in SQL server database. From the events stored in database a novel technique is developed to extract events and list the persons in a particular facility, list all entry/exit events on one day, list the first in and last out entries. This paper discusses the complex multi level group by queries and software developed to extract events from database, locate persons and generate reports. Software is developed as a web application in ASP.Net and query is written in SQL. User can select the doors, type of events and generate reports. Reports are generated using the master data stored about employees RFID cards and events data stored in tables. Four types of reports are generated 1. Plant Emergency Report, 2. Locate User Report, 3. Entry - Exit Report, 4. First in Last out Report. To generate plant emergency report for whole plant only events generated in outer gates have to be considered. To generate plant emergency report for inside laboratory, events generated in entrance gates have to be ignored. (author)

  5. Telecommunication access to INIS

    International Nuclear Information System (INIS)

    Scheel, H.; Breitfeld, B.; Huebner, B.

    1983-01-01

    Proceeding from the features of on-line retrieval from the INIS data base, a description is given of the technical and organizational conditions established by the national INIS Centre of the GDR in using the INIS direct access service. Data are presented on the structure of search queries, retrieval precision, and connect time to the computer. Experience has shown that efficient dialogue searching necessitates the searcher's skill and familiarity with the system. (author)

  6. Multiagent -Learning for Aloha-Like Spectrum Access in Cognitive Radio Systems

    Directory of Open Access Journals (Sweden)

    Li Husheng

    2010-01-01

    Full Text Available An Aloha-like spectrum access scheme without negotiation is considered for multiuser and multichannel cognitive radio systems. To avoid collisions incurred by the lack of coordination, each secondary user learns how to select channels according to its experience. Multiagent reinforcement leaning (MARL is applied for the secondary users to learn good strategies of channel selection. Specifically, the framework of -learning is extended from single user case to multiagent case by considering other secondary users as a part of the environment. The dynamics of the -learning are illustrated using a Metrick-Polak plot, which shows the traces of -values in the two-user case. For both complete and partial observation cases, rigorous proofs of the convergence of multiagent -learning without communications, under certain conditions, are provided using the Robins-Monro algorithm and contraction mapping, respectively. The learning performance (speed and gain in utility is evaluated by numerical simulations.

  7. Design of pulse waveform for waveform division multiple access UWB wireless communication system.

    Science.gov (United States)

    Yin, Zhendong; Wang, Zhirui; Liu, Xiaohui; Wu, Zhilu

    2014-01-01

    A new multiple access scheme, Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function, is presented. After studying the correlation properties of different categories of single wavelet functions, the one with the best correlation property will be chosen as the foundation for combined waveform. In the communication system, each user is assigned to different combined orthogonal waveform. Demonstrated by simulation, combined waveform is more suitable than single wavelet function to be a communication medium in WDMA system. Due to the excellent orthogonality, the bit error rate (BER) of multiuser with combined waveforms is so close to that of single user in a synchronous system. That is to say, the multiple access interference (MAI) is almost eliminated. Furthermore, even in an asynchronous system without multiuser detection after matched filters, the result is still pretty ideal and satisfactory by using the third combination mode that will be mentioned in the study.

  8. Embedded systems for supporting computer accessibility.

    Science.gov (United States)

    Mulfari, Davide; Celesti, Antonio; Fazio, Maria; Villari, Massimo; Puliafito, Antonio

    2015-01-01

    Nowadays, customized AT software solutions allow their users to interact with various kinds of computer systems. Such tools are generally available on personal devices (e.g., smartphones, laptops and so on) commonly used by a person with a disability. In this paper, we investigate a way of using the aforementioned AT equipments in order to access many different devices without assistive preferences. The solution takes advantage of open source hardware and its core component consists of an affordable Linux embedded system: it grabs data coming from the assistive software, which runs on the user's personal device, then, after processing, it generates native keyboard and mouse HID commands for the target computing device controlled by the end user. This process supports any operating system available on the target machine and it requires no specialized software installation; therefore the user with a disability can rely on a single assistive tool to control a wide range of computing platforms, including conventional computers and many kinds of mobile devices, which receive input commands through the USB HID protocol.

  9. Access road reclamation

    International Nuclear Information System (INIS)

    Manson, T.; Blok, M.

    1997-01-01

    A general review of the measures involved in restoring abandoned access road sites in British Columbia was presented. Permits and licences are needed for the use of crown land for roads used by the petroleum and natural gas industry for exploration activities. However, the regulatory framework for road site reclamation is not well developed. The nature of access road reclamation is very site-specific. Some of the issues that are considered for all reclamation projects include slope stability, water control, revegetation, soil rehabilitation, access management and monitoring. The primary objective of reclaiming access road sites is to return the site to conditions that are equal or better than pre-disturbance conditions. Restoration measures must be approved by BC Environment and by the Department of Fisheries and Oceans where federal fisheries responsibilities are involved. 54 refs., 5 tabs., 3 figs

  10. A Comprehensive System for Monitoring Urban Accessibility in Smart Cities.

    Science.gov (United States)

    Mora, Higinio; Gilart-Iglesias, Virgilio; Pérez-Del Hoyo, Raquel; Andújar-Montoya, María Dolores

    2017-08-09

    The present work discusses the possibilities offered by the evolution of Information and Communication Technologies with the aim of designing a system to dynamically obtain knowledge of accessibility issues in urban environments. This system is facilitated by technology to analyse the urban user experience and movement accessibility, which enabling accurate identification of urban barriers and monitoring its effectiveness over time. Therefore, the main purpose of the system is to meet the real needs and requirements of people with movement disabilities. The information obtained can be provided as a support service for decision-making to be used by city government, institutions, researchers, professionals and other individuals of society in general to improve the liveability and quality of the lives of citizens. The proposed system is a means of social awareness that makes the most vulnerable groups of citizens visible by involving them as active participants. To perform and implement the system, the latest communication and positioning technologies for smart sensing have been used, as well as the cloud computing paradigm. Finally, to validate the proposal, a case study has been presented using the university environment as a pre-deployment step in urban environments.

  11. Open-Access, Low-Magnetic-Field MRI System for Lung Research

    Science.gov (United States)

    Mair, Ross W.; Rosen, Matthew S.; Tsai, Leo L.; Walsworth, Ronald L.; Hrovat, Mirko I.; Patz, Samuel; Ruset, Iullian C.; Hersman, F. William

    2009-01-01

    An open-access magnetic resonance imaging (MRI) system is being developed for use in research on orientational/gravitational effects on lung physiology and function. The open-access geometry enables study of human subjects in diverse orientations. This system operates at a magnetic flux density, considerably smaller than the flux densities of typical other MRI systems, that can be generated by resistive electromagnet coils (instead of the more-expensive superconducting coils of the other systems). The human subject inhales air containing He-3 or Xe-129 atoms, the nuclear spins of which have been polarized by use of a laser beam to obtain a magnetic resonance that enables high-resolution gas space imaging at the low applied magnetic field. The system includes a bi-planar, constant-current, four-coil electromagnet assembly and associated electronic circuitry to apply a static magnetic field of 6.5 mT throughout the lung volume; planar coils and associated circuitry to apply a pulsed magnetic-field-gradient for each spatial dimension; a single, detachable radio-frequency coil and associated circuitry for inducing and detecting MRI signals; a table for supporting a horizontal subject; and electromagnetic shielding surrounding the electromagnet coils.

  12. Systemic conditions affecting the breast

    International Nuclear Information System (INIS)

    Abbitt, P.L.; DeParedes, E.S.

    1987-01-01

    While the mammogram is most often used in the evaluation of diseases specific to the breast, manifestations of systemic conditions may also be recognized. Congenital systemic conditions such as neurofibromatosis and ectodermal dysplasia have graphic mammographic findings. The effects of diet, hormonal, and medication therapy can also have a dramatic impact on the appearance of the mammogram, as can common clinical states such as congestive heart failure or renal failure. Metastases to the breast from extramammary primaries may be seen mammographically as discrete masses, as causing diffusely increased density of the breast or as abnormal axillary adenopathy. The authors review a variety of conditions and their mammographic appearance

  13. Experience with the Open Source based implementation for ATLAS Conditions Data Management System

    CERN Document Server

    Amorim, A; Oliveira, C; Pedro, L; Barros, N

    2003-01-01

    Conditions Data in high energy physics experiments is frequently seen as every data needed for reconstruction besides the event data itself. This includes all sorts of slowly evolving data like detector alignment, calibration and robustness, and data from detector control system. Also, every Conditions Data Object is associated with a time interval of validity and a version. Besides that, quite often is useful to tag collections of Conditions Data Objects altogether. These issues have already been investigated and a data model has been proposed and used for different implementations based in commercial DBMSs, both at CERN and for the BaBar experiment. The special case of the ATLAS complex trigger that requires online access to calibration and alignment data poses new challenges that have to be met using a flexible and customizable solution more in the line of Open Source components. Motivated by the ATLAS challenges we have developed an alternative implementation, based in an Open Source RDBMS. Several issues...

  14. Does the public deserve free access to climate system science?

    Science.gov (United States)

    Grigorov, Ivo

    2010-05-01

    Some time ago it was the lack of public access to medical research data that really stirred the issue and gave inertia for legislation and a new publishing model that puts tax payer-funded medical research in the hands of those who fund it. In today's age global climate change has become the biggest socio-economic challenge, and the same argument resonates: climate affects us all and the publicly-funded science quantifying it should be freely accessible to all stakeholders beyond academic research. Over the last few years the ‘Open Access' movement to remove as much as possible subscription, and other on-campus barriers to academic research has rapidly gathered pace, but despite significant progress, the climate system sciences are not among the leaders in providing full access to their publications and data. Beyond the ethical argument, there are proven and tangible benefits for the next generation of climate researchers to adapt the way their output is published. Through the means provided by ‘open access', both data and ideas can gain more visibility, use and citations for the authors, but also result in a more rapid exchange of knowledge and ideas, and ultimately progress towards a sought solution. The presentation will aim to stimulate discussion and seek progress on the following questions: Should free access to climate research (& data) be mandatory? What are the career benefits of using ‘open access' for young scientists? What means and methods should, or could, be incorporated into current European graduate training programmes in climate research, and possible ways forward?

  15. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  16. A Rewritable, Random-Access DNA-Based Storage System.

    Science.gov (United States)

    Yazdi, S M Hossein Tabatabaei; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-18

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  17. REMINDER: Compliance with Operational Circular No. 2 (Rev. 1) on “Conditions of access to the fenced CERN site”

    CERN Multimedia

    2012-01-01

    The purpose of Operational Circular No. 2 (Rev. 1) is to contribute to the protection of people and property by defining the conditions of access to the Organization's fenced sites. The behaviours that cannot be tolerated under any circumstances are: use of CERN access cards by people, other than the cardholders themselves, in order to gain access to facilities without having attended the required safety course; speeding, particularly on Route Gregory and Route Weisskopf; driving in and out of the site on the wrong side of the road; parking on spaces set aside for the disabled; nuisance parking, especially in the proximity of the restaurants; dumping of wrecked vehicles. As the aforementioned instances of non-compliance can lead to dangerous situations, the Organization reserves the right to apply the penalties provided for under paragraph 26 of Operational Circular No. 2 (Rev. 1), namely to refuse access to the site to people and/or their vehicles deemed to be in infringement of the circu...

  18. On conditional residual lifetime and conditional inactivity time of k-out-of-n systems

    International Nuclear Information System (INIS)

    Tavangar, Mahdi; Bairamov, Ismihan

    2015-01-01

    In designing structures of technical systems, the reliability engineers often deal with the reliability analysis of coherent systems. Coherent system has monotone structure function and all components of the system are relevant. This paper considers some particular models of coherent systems having identical components with independent lifetimes. The main purpose of the paper is to study conditional residual lifetime of coherent system, given that at a fixed time certain number of components have failed but still there are some functioning components. Different aging and stochastic properties of variables connected with the conditional residual lifetimes of the coherent systems are obtained. An expression for the parent distribution in terms of conditional mean residual lifetime is provided. The similar result is obtained for the conditional mean inactivity time of the failed components of coherent system. The conditional mean inactivity time of failed components presents an interest in many engineering applications where the reliability of system structure is important for designing and constructing of systems. Some illustrative examples with given particular distributions are also presented. - Highlights: • Comparisons of conditional residual lifetime of k-out-of-n systems are derived. • The behavior of the coherent system is explored for IHR distributions. • The parent distribution is expressed in terms of conditional MRL and MIT. • Some illustrative examples are given to clarify the results of the paper.

  19. The assessment of exploitation process of power for access control system

    Science.gov (United States)

    Wiśnios, Michał; Paś, Jacek

    2017-10-01

    The safety of public utility facilities is a function not only of effectiveness of the electronic safety systems, used for protection of property and persons, but it also depends on the proper functioning of their power supply systems. The authors of the research paper analysed the power supply systems, which are used in buildings for the access control system that is integrated with the closed-circuit TV. The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at identification of people, vehicles allowed to cross the boundary of the reserved area, to prevent from crossing the reserved area and to generate the alarm signal informing about the attempt of crossing by an unauthorised entity. The industrial electricity with appropriate technical parameters is a basis of proper functioning of safety systems. Only the electricity supply to the systems is not equivalent to the operation continuity provision. In practice, redundant power supply systems are used. In the carried out reliability analysis of the power supply system, various power circuits of the system were taken into account. The reliability and operation requirements for this type of system were also included.

  20. Performance of desiccant air conditioning system with geothermal energy under different climatic conditions

    International Nuclear Information System (INIS)

    El-Agouz, S.A.; Kabeel, A.E.

    2014-01-01

    Highlights: • The performance of the hybrid air conditioning system is studied. • The influence of important operating parameters are estimated. • The ventilation, makeup and mix cycles are investigated at different climate. • The highest COP of the hybrid air conditioning system is 1.03. • The hybrid system provides a human thermal comfort at different climates. - Abstract: Energy saving still and continue a major seek in our life, due to the continuous increase in energy consumptions. So, a desiccant air conditioning system with geothermal energy is conducted in the current study. The thermal analysis of air conditioning system with its different components desiccant wheel, solar collector, heat exchanger, ground heat exchanger and water spray evaporative cooler is presented. Three different air conditioning cycles are simulated in the current study for different zones like: hot-dry zone, warm-dry zone, hot-humid zone and the warm-humid zone. The results show that the desiccant air conditioning system successfully provides a better thermal comfort condition in different climates. This hybrid system significantly decreases the supplied air temperature from 12.7 to 21.7 °C at different climate zones. When ω in , air and T Reg increasing, COP decreases and the ventilation cycle provides the better COP. The highest COP value of the desiccant air conditioning system is about 1.03 while the lowest value is about 0.15. The SHR of makeup cycle is higher than that ventilation cycle at warm and hot-humid zone and vice versa at warm and hot-dry zone. The highest SHR value of the desiccant air conditioning system is about 0.99 while the lowest value is about 0.2. The T sup,air , ω sup,air , COP and SHR isolines may easily be used for pre-evaluating of various cooling cycles in different climates. The hybrid system provides a human thermal comfort at different climates

  1. Seed quality of common bean accessions under organic and conventional farming systems

    Directory of Open Access Journals (Sweden)

    Diego Medeiros Gindri

    2017-06-01

    Full Text Available Agrobiodiversity is essential for a sustainable food production, and the knowledge of the potential characteristics of landrace seeds may prompt farmers to adopt the habit of seed conservation for this species. This study aimed at categorizing landrace and commercial common bean (Phaseolus vulgaris L. accessions, according to the physiological quality (viability and vigor of seeds produced in the field, during two growing seasons, under organic and conventional farming systems. Germination percentage, field emergence, electrical conductivity, accelerated aging, cold test and seedling length were assessed. The landrace bean accessions exhibit diversity in the physiological seed quality, in terms of their viability and vigor. No differences were observed between the farming systems, in relation to the physiological quality of the seeds produced. The categorization of landrace common bean accessions allows to identify those with superior physiological seed quality.

  2. Evaluasi Pemanfaatan Wireless Internet Protocol Access System di Kota Malang

    Directory of Open Access Journals (Sweden)

    Ahmad Budi Setiawan

    2012-03-01

    Full Text Available WIPAS (Wireless Internet Protocol Accsess System adalah salah satu teknologi pita lebar (broadband yang terbaru. Teknologi tersebut dikembangkan berdasarkan model point-to-multipoint access system pada jaringan nirkabel tetap atau Fixed Wireless Access (FWA dengan memanfaatkan pita frekuensi 26-GHz. Dengan besarnya pita frekuensi yang digunakan, teknologi WIPAS dapat menampung kapasitas akses untuk lalu lintas jaringan yang sangat besar. Dalam penelitian ini akan dikaji dan dievaluasi efektifitas penggunaan teknologi WIPAS melalui kasus pemanfaatan teknologi WIPAS untuk pemberdayaan komunitas di kota Malang. Dalam penelitian ini juga akan dideskripsikan pemanfaatan teknologi WIPAS untuk melihat manfaat penggunaan teknologi tersebut. Penelitian ini dilakukan dengan metode kualitatif dengan melakukan evaluasi terhadap infrastruktur yang telah dibangun untuk melihat efektifitas pemanfaatan WIPAS. Hasil penelitian ini adalah sebuah kajian evaluatif tentang pemanfaatan WIPAS di kota Malang dan rekomendasi untuk implementasi lebih lanjut.

  3. An end-to-end secure patient information access card system.

    Science.gov (United States)

    Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T

    2000-03-01

    The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.

  4. Presidential Management Fellows (PMF) Talent Acquisition System, PMF-TAS (ACCESS CONTROLLED)

    Data.gov (United States)

    Office of Personnel Management — Application and Assessment system for Presidential Management Fellows (PMF) and PMF Science, Technology, Engineering, and Math (STEM) programs. This sytem is access...

  5. 28 CFR 16.72 - Exemption of Office of the Associate Attorney General System-limited access.

    Science.gov (United States)

    2010-07-01

    ... Attorney General System-limited access. 16.72 Section 16.72 Judicial Administration DEPARTMENT OF JUSTICE....72 Exemption of Office of the Associate Attorney General System—limited access. (a) The following...) General Files System of the Office of the Associate Attorney General (JUSTICE/AAG-001). These exemptions...

  6. Access to Justice in the European Convention on Human Rights System

    NARCIS (Netherlands)

    Glas, L.R.; Gerards, J.H.

    2017-01-01

    The numerous reforms to the Convention system of the past two decades have unquestionably had an effect on applicants’ means to access justice in the system. It is, however, open to question how these changes should be evaluated: with reference to the individual right to petition, or with reference

  7. Propagation Characteristics in an Underground Shopping Area for 5GHz-band Wireless Access Systems

    Science.gov (United States)

    Itokawa, Kiyohiko; Kita, Naoki; Sato, Akio; Matsue, Hideaki; Mori, Daisuke; Watanabe, Hironobu

    5-GHz band wireless access systems, such as the RLAN (Radio Local Area Network) system of IEEE802.11a, HiperLAN/2, HiSWANa and AWA, are developed and provide transmission rates over 20 Mbps for indoor use. Those 5-GHz access systems are expected to extend service areas from the office to the so-called “hot-spot" in public areas. Underground shopping malls are one of the anticipated service areas for such a nomadic wireless access service. Broadband propagation characteristics are required for radio zone design in an underground mall environment despite previous results obtained by narrow band measurements. This paper presents results of an experimental study on the propagation characteristics for broadband wireless access systems in an underground mall environment. First, broadband propagation path loss is measured and formulated considering human body shadowing. A ray trace simulation is used to clarify the basic propagation mechanism in such a closed environment. Next, a distance dependency of the delay spread during a crowded time period, rush hour, is found to be at most 65 nsec, which is under the permitted maximum value of the present 5-GHz systems. Finally, above propagation characteristics support the result of transmission test carried out by using AWA equipment.

  8. On board processing for future satellite communications systems: Comparison of FDM, TDM and hybrid accessing schemes

    Science.gov (United States)

    Berk, G.; Jean, P. N.; Rotholz, E.

    1982-01-01

    Several satellite uplink and downlink accessing schemes for customer premises service are compared. Four conceptual system designs are presented: satellite-routed frequency division multiple access (FDMA), satellite-switched time division multiple access (TDMA), processor-routed TDMA, and frequency-routed TDMA, operating in the 30/20 GHz band. The designs are compared on the basis of estimated satellite weight, system capacity, power consumption, and cost. The systems are analyzed for fixed multibeam coverage of the continental United States. Analysis shows that the system capacity is limited by the available satellite resources and by the terminal size and cost.

  9. Information system architecture to support transparent access to distributed, heterogeneous data sources

    International Nuclear Information System (INIS)

    Brown, J.C.

    1994-08-01

    Quality situation assessment and decision making require access to multiple sources of data and information. Insufficient accessibility to data exists for many large corporations and Government agencies. By utilizing current advances in computer technology, today's situation analyst's have a wealth of information at their disposal. There are many potential solutions to the information accessibility problem using today's technology. The United States Department of Energy (US-DOE) faced this problem when dealing with one class of problem in the US. The result of their efforts has been the creation of the Tank Waste Information Network System -- TWINS. The TWINS solution combines many technologies to address problems in several areas such as User Interfaces, Transparent Access to Multiple Data Sources, and Integrated Data Access. Data related to the complex is currently distributed throughout several US-DOE installations. Over time, each installation has adopted their own set of standards as related to information management. Heterogeneous hardware and software platforms exist both across the complex and within a single installation. Standards for information management vary between US-DOE mission areas within installations. These factors contribute to the complexity of accessing information in a manner that enhances the performance and decision making process of the analysts. This paper presents one approach taken by the DOE to resolve the problem of distributed, heterogeneous, multi-media information management for the HLW Tank complex. The information system architecture developed for the DOE by the TWINS effort is one that is adaptable to other problem domains and uses

  10. GP preferences for information systems: conjoint analysis of speed, reliability, access and users.

    Science.gov (United States)

    Wyatt, Jeremy C; Batley, Richard P; Keen, Justin

    2010-10-01

    To elicit the preferences and trade-offs of UK general practitioners about key features of health information systems, to help inform the design of such systems in future. A stated choice study to uncover implicit preferences based on a binary choice between scenarios presented in random order. were all 303 general practice members of the UK Internet service provider, Medix who were approached by email to participate. The main outcome measure was the number of seconds delay in system response that general practitioners were willing to trade off for each key system feature: the reliability of the system, the sites from which the system could be accessed and which staff are able to view patient data. Doctors valued speed of response most in information systems but would be prepared to wait 28 seconds to access a system in exchange for improved reliability from 95% to 99%, a further 2 seconds for an improvement to 99.9% and 27 seconds for access to data from anywhere including their own home compared with one place in a single health care premises. However, they would require a system that was 14 seconds faster to compensate for allowing social care as well as National Health Service staff to read patient data. These results provide important new evidence about which system characteristics doctors value highly, and hence which characteristics designers need to focus on when large scale health information systems are planned. © 2010 Blackwell Publishing Ltd.

  11. Risk-Significant Adverse Condition Awareness Strengthens Assurance of Fault Management Systems

    Science.gov (United States)

    Fitz, Rhonda

    2017-01-01

    As spaceflight systems increase in complexity, Fault Management (FM) systems are ranked high in risk-based assessment of software criticality, emphasizing the importance of establishing highly competent domain expertise to provide assurance. Adverse conditions (ACs) and specific vulnerabilities encountered by safety- and mission-critical software systems have been identified through efforts to reduce the risk posture of software-intensive NASA missions. Acknowledgement of potential off-nominal conditions and analysis to determine software system resiliency are important aspects of hazard analysis and FM. A key component of assuring FM is an assessment of how well software addresses susceptibility to failure through consideration of ACs. Focus on significant risk predicted through experienced analysis conducted at the NASA Independent Verification Validation (IVV) Program enables the scoping of effective assurance strategies with regard to overall asset protection of complex spaceflight as well as ground systems. Research efforts sponsored by NASA's Office of Safety and Mission Assurance defined terminology, categorized data fields, and designed a baseline repository that centralizes and compiles a comprehensive listing of ACs and correlated data relevant across many NASA missions. This prototype tool helps projects improve analysis by tracking ACs and allowing queries based on project, mission type, domaincomponent, causal fault, and other key characteristics. Vulnerability in off-nominal situations, architectural design weaknesses, and unexpected or undesirable system behaviors in reaction to faults are curtailed with the awareness of ACs and risk-significant scenarios modeled for analysts through this database. Integration within the Enterprise Architecture at NASA IVV enables interfacing with other tools and datasets, technical support, and accessibility across the Agency. This paper discusses the development of an improved workflow process utilizing this

  12. 28 CFR 16.83 - Exemption of the Executive Office for Immigration Review System-limited access.

    Science.gov (United States)

    2010-07-01

    ... Immigration Review System-limited access. 16.83 Section 16.83 Judicial Administration DEPARTMENT OF JUSTICE....83 Exemption of the Executive Office for Immigration Review System—limited access. (a) The following system of records is exempt from 5 U.S.C. 552a(d): (1) The Executive Office for Immigration Review's...

  13. Access to medicines for acute illness in middle income countries in Central America

    Directory of Open Access Journals (Sweden)

    Isabel Cristina Martins Emmerick

    2013-12-01

    Full Text Available OBJECTIVE : To analyze the main predictors of access to medicines for persons who experienced acute health conditions. METHODS : This was a cross-sectional analytic study, based on data from household surveys. We examined the predictors of: (1 seeking care for acute illness in the formal health care system and (2 obtaining all medicines sought for the acute condition. RESULTS : The significant predictors of seeking health care for acute illnesses were urban geographic location, head of household with secondary school education or above, age under 15, severity of illness perceived by the respondent, and having health insurance. The most important predictor of obtaining full access to medicines was seeking care in the formal health care system. People who sought care in the formal system were three times more likely to receive all the medicines sought (OR 3.0, 95%CI 2.3;4.0. For those who sought care in the formal health system, the strongest predictors of full access to medicines were seeking care in the private sector, having secondary school education or above, and positive perceptions of quality of health care and medicines in public sector health facilities. For patients who did not seek care in the formal health system, full access to medicines was more likely in Honduras or Nicaragua than in Guatemala. Urban geographic location, higher economic status, and male gender were also significant predictors. CONCLUSIONS : A substantial part of the population in these three countries sought and obtained medicines outside of the formal health care system, which may compromise quality of care and pose a risk to patients. Determinants of full access to medicines inside and outside the formal health care system differ, and thus may require different strategies to improve access to medicines.

  14. Multiple Access Interference Reduction Using Received Response Code Sequence for DS-CDMA UWB System

    Science.gov (United States)

    Toh, Keat Beng; Tachikawa, Shin'ichi

    This paper proposes a combination of novel Received Response (RR) sequence at the transmitter and a Matched Filter-RAKE (MF-RAKE) combining scheme receiver system for the Direct Sequence-Code Division Multiple Access Ultra Wideband (DS-CDMA UWB) multipath channel model. This paper also demonstrates the effectiveness of the RR sequence in Multiple Access Interference (MAI) reduction for the DS-CDMA UWB system. It suggests that by using conventional binary code sequence such as the M sequence or the Gold sequence, there is a possibility of generating extra MAI in the UWB system. Therefore, it is quite difficult to collect the energy efficiently although the RAKE reception method is applied at the receiver. The main purpose of the proposed system is to overcome the performance degradation for UWB transmission due to the occurrence of MAI during multiple accessing in the DS-CDMA UWB system. The proposed system improves the system performance by improving the RAKE reception performance using the RR sequence which can reduce the MAI effect significantly. Simulation results verify that significant improvement can be obtained by the proposed system in the UWB multipath channel models.

  15. Digital Autonomous Terminal Access Communication (DATAC) system

    Science.gov (United States)

    Novacki, Stanley M., III

    1987-01-01

    In order to accommodate the increasing number of computerized subsystems aboard today's more fuel efficient aircraft, the Boeing Co. has developed the DATAC (Digital Autonomous Terminal Access Control) bus to minimize the need for point-to-point wiring to interconnect these various systems, thereby reducing total aircraft weight and maintaining an economical flight configuration. The DATAC bus is essentially a local area network providing interconnections for any of the flight management and control systems aboard the aircraft. The task of developing a Bus Monitor Unit was broken down into four subtasks: (1) providing a hardware interface between the DATAC bus and the Z8000-based microcomputer system to be used as the bus monitor; (2) establishing a communication link between the Z8000 system and a CP/M-based computer system; (3) generation of data reduction and display software to output data to the console device; and (4) development of a DATAC Terminal Simulator to facilitate testing of the hardware and software which transfer data between the DATAC's bus and the operator's console in a near real time environment. These tasks are briefly discussed.

  16. ACCESS Sub-system Performance

    Science.gov (United States)

    Kaiser, Mary Elizabeth; Morris, Matthew J.; Aldoroty, Lauren Nicole; Godon, David; Pelton, Russell; McCandliss, Stephan R.; Kurucz, Robert L.; Kruk, Jeffrey W.; Rauscher, Bernard J.; Kimble, Randy A.; Wright, Edward L.; Benford, Dominic J.; Gardner, Jonathan P.; Feldman, Paul D.; Moos, H. Warren; Riess, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, William Van Dyke; Sahnow, David J.; Lampton, Michael; Perlmutter, Saul

    2016-01-01

    ACCESS: Absolute Color Calibration Experiment for Standard Stars is a series of rocket-borne sub-orbital missions and ground-based experiments designed to leverage significant technological advances in detectors, instruments, and the precision of the fundamental laboratory standards used to calibrate these instruments to enable improvements in the precision of the astrophysical flux scale through the transfer of laboratory absolute detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass.A cross wavelength calibration of the astrophysical flux scale to this level of precision over this broad a bandpass is relevant for the data used to probe fundamental astrophysical problems such as the SNeIa photometry based measurements used to constrain dark energy theories.We will describe the strategy for achieving this level of precision, the payload and calibration configuration, present sub-system test data, and the status and preliminary performance of the integration and test of the spectrograph and telescope. NASA APRA sounding rocket grant NNX14AH48G supports this work.

  17. Design mobile satellite system architecture as an integral part of the cellular access digital network

    Science.gov (United States)

    Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.

    1988-01-01

    The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.

  18. Impact of optical hard limiter on the performance of an optical overlapped-code division multiple access system

    Science.gov (United States)

    Inaty, Elie; Raad, Robert; Tablieh, Nicole

    2011-08-01

    Throughout this paper, a closed form expression of the multiple access interference (MAI) limited bit error rate (BER) is provided for the multiwavelength optical code-division multiple-access system when the system is working above the nominal transmission rate limit imposed by the passive encoding-decoding operation. This system is known in literature as the optical overlapped code division multiple access (OV-CDMA) system. A unified analytical framework is presented emphasizing the impact of optical hard limiter (OHL) on the BER performance of such a system. Results show that the performance of the OV-CDMA system may be highly improved when using OHL preprocessing at the receiver side.

  19. Broadband and scalable mobile satellite communication system for future access networks

    Science.gov (United States)

    Ohata, Kohei; Kobayashi, Kiyoshi; Nakahira, Katsuya; Ueba, Masazumi

    2005-07-01

    Due to the recent market trends, NTT has begun research into next generation satellite communication systems, such as broadband and scalable mobile communication systems. One service application objective is to provide broadband Internet access for transportation systems, temporal broadband access networks and telemetries to remote areas. While these are niche markets the total amount of capacity should be significant. We set a 1-Gb/s total transmission capacity as our goal. Our key concern is the system cost, which means that the system should be unified system with diversified services and not tailored for each application. As satellites account for a large portion of the total system cost, we set the target satellite size as a small, one-ton class dry mass with a 2-kW class payload power. In addition to the payload power and weight, the mobile satellite's frequency band is extremely limited. Therefore, we need to develop innovative technologies that will reduce the weight and maximize spectrum and power efficiency. Another challenge is the need for the system to handle up to 50 dB and a wide data rate range of other applications. This paper describes the key communication system technologies; the frequency reuse strategy, multiplexing scheme, resource allocation scheme, and QoS management algorithm to ensure excellent spectrum efficiency and support a variety of services and quality requirements in the mobile environment.

  20. Peripheral Insertion of a Central Venous Access Device Under Fluoroscopic Guidance Using a Peripherally Accessed System (PAS) Port in the Forearm

    International Nuclear Information System (INIS)

    Hata, Yasuhiro; Morita, Sojiro; Morita, Yoshitaka; Awatani, Toshihide; Takasaki, Motohiro; Horimi, Tadashi; Ozawa, Zen

    1998-01-01

    Purpose: We describe the technique, efficacy, and complications of fluoroscopy-guided implantation of a central venous access device using a peripherally accessed system (PAS) port via the forearm. Methods: Beginning in July 1994, 105 central venous access devices were implanted in 104 patients for the long-term infusion of antibiotics or antineoplasmic agents, blood products, or parenteral nutrition. The devices was inserted under fluoroscopic guidance with real-time venography from a peripheral route. Results: All ports were successfully implanted. There were no procedure-related complications. No thrombosis or local infection was observed; however, in six patients catheter-related phlebitis occurred. Conclusion: Fluoroscopy-guided implantation of a central venous access device using a PAS port via the forearm is safe and efficacious, and injection of contrast medium through a peripheral IV catheter before introduction of the catheter helps to avoid catheter-related phlebitis

  1. Code division multiple-access techniques in optical fiber networks. II - Systems performance analysis

    Science.gov (United States)

    Salehi, Jawad A.; Brackett, Charles A.

    1989-08-01

    A technique based on optical orthogonal codes was presented by Salehi (1989) to establish a fiber-optic code-division multiple-access (FO-CDMA) communications system. The results are used to derive the bit error rate of the proposed FO-CDMA system as a function of data rate, code length, code weight, number of users, and receiver threshold. The performance characteristics for a variety of system parameters are discussed. A means of reducing the effective multiple-access interference signal by placing an optical hard-limiter at the front end of the desired optical correlator is presented. Performance calculations are shown for the FO-CDMA with an ideal optical hard-limiter, and it is shown that using a optical hard-limiter would, in general, improve system performance.

  2. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    Energy Technology Data Exchange (ETDEWEB)

    Ohmacht, Martin

    2017-08-15

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  3. Generation-based memory synchronization in a multiprocessor system with weakly consistent memory accesses

    Science.gov (United States)

    Ohmacht, Martin

    2014-09-09

    In a multiprocessor system, a central memory synchronization module coordinates memory synchronization requests responsive to memory access requests in flight, a generation counter, and a reclaim pointer. The central module communicates via point-to-point communication. The module includes a global OR reduce tree for each memory access requesting device, for detecting memory access requests in flight. An interface unit is implemented associated with each processor requesting synchronization. The interface unit includes multiple generation completion detectors. The generation count and reclaim pointer do not pass one another.

  4. Analysis and simulation of mobile air conditioning system coupled with engine cooling system

    International Nuclear Information System (INIS)

    Qi, Zhao-gang; Chen, Jiang-ping; Chen, Zhi-jiu

    2007-01-01

    Many components of the mobile air conditioning system and engine cooling system are closely interrelated and make up the vehicle climate control system. In the present paper, a vehicle climate control system model including air conditioning system and engine cooling system has been proposed under different operational conditions. All the components have been modeled on the basis of experimental data. Based on the commercial software, a computer simulation procedure of the vehicle climate control system has been developed. The performance of the vehicle climate control system is simulated, and the calculational data have good agreement with experimental data. Furthermore, the vehicle climate control simulation results have been compared with an individual air conditioning system and engine cooling system. The influences between the mobile air conditioning system and the engine cooling system are discussed

  5. Access Denied! Contrasting Data Access in the United States and Ireland

    Directory of Open Access Journals (Sweden)

    Grogan Samuel

    2016-07-01

    Full Text Available The ability of an Internet user to access data collected about himself as a result of his online activity is a key privacy safeguard. Online, data access has been overshadowed by other protections such as notice and choice. This paper describes attitudes about data access. 873 US and Irish Internet users participated in a survey designed to examine views on data access to information held by online companies and data brokers. We observed low levels of awareness of access mechanisms along with a high desire for access in both participant groups. We tested three proposed access systems in keeping with industry programs and regulatory proposals. User response was positive. We conclude that access remains an important privacy protection that is inadequately manifested in practice. Our study provides insight for lawmakers and policymakers, as well as computer scientists who implement these systems.

  6. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  7. Research of Ad Hoc Networks Access Algorithm

    Science.gov (United States)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  8. Utilization of Solar Energy for Air Conditioning System

    Directory of Open Access Journals (Sweden)

    Sutikno Juwari Purwo

    2018-01-01

    Full Text Available The purposes of this research are to do a system simulation of air conditioning utilizing solar energy with single effect absorption refrigeration method, analyze the coefficient of performance (COP for each absorbent-refrigerant variable and compare the effectivity of every absorbent-refrigerant variable used. COP is a constant that denotes the effeciency of a refrigeration system, that is ratio of work or useful output to the amount of work or energy input. The higher the number of COP, the more efficient the system is. Absorbent-refrigerant (working fluids variables used in this research depend on its chemical and thermodynamics properties. Steps in this research are including data collection and tabulation from literature and do a simulation of air conditioning system both commercial air conditioning system (using electrical energy and solar energy air conditioning system with Aspen Plus software. Next, run the simulation for each working fluid variables used and calculate the COP for each variable. Subsequently, analyze and compare the effectivity of all variables used from COP value and economical point of view with commercial air conditioning system. From the result of the simulation, can be concluded that solar air conditioning can achieve 98,85 % of energy savings than commercial air conditioning. Furthermore, from the calculation of COP, the highest COP value is achieved by solar conditioning system with LiNO3-NH3 as working fluid where 55% of the composition is the refrigerant and 45% of absorbent.

  9. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    Science.gov (United States)

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  10. Accessing simply-substituted 4-hydroxytetrahydroisoquinolines via Pomeranz–Fritsch–Bobbitt reaction with non-activated and moderately-activated systems

    Directory of Open Access Journals (Sweden)

    Marco Mottinelli

    2017-09-01

    Full Text Available Background: 1,2,3,4-Tetrahydroisoquinolines (THIQs are common motifs in alkaloids and in medicinal chemistry. Synthetic access to THIQs via the Pomeranz–Fritsch–Bobbit (PFB methodology using mineral acids for deactivated, electron-poor aromatic systems, is scarcely represented in the literature. Here, the factors controlling the regiochemical outcome of cyclization are evaluated.Results: A double reductive alkylation was telescoped into a one-pot reaction delivering good to excellent yields of desired aminoacetals for cyclization. Cyclization of activated systems proceeded smoothly under standard PFB conditions, but for non-activated systems the use of HClO4 alone was effective. When cyclization was possible in both para- and ortho-positions to the substituent, 7-substituted derivatives were formed with significant amounts of 5-substituted byproduct. The formation of the 4-hydroxy-THIQs vs the 4-methoxy-THIQ products could be controlled through modification of the reaction concentration. In addition, while a highly-activated system exclusively cyclized to the indole, this seems generally highly disfavored. When competition between 6- and 7-ring formation was investigated in non-activated systems, 5,7,8,13-tetrahydro-6,13-methanodibenzo[c,f]azonine was exclusively obtained. Furthermore, selective ring closure in the para-position could be achieved under standard PFB conditions, while a double ring closure could be obtained utilizing HClO4.Conclusion: Reactivity differences in aminoacetal precursors can be employed to control cyclization using the PFB methodology. It is now possible to select confidently the right conditions for the synthesis of N-aryl-4-hydroxy-1,2,3,4-tetrahydroisoquinolines.

  11. Accessing simply-substituted 4-hydroxytetrahydroisoquinolines via Pomeranz–Fritsch–Bobbitt reaction with non-activated and moderately-activated systems

    Science.gov (United States)

    Mottinelli, Marco; Leese, Mathew P

    2017-01-01

    Background: 1,2,3,4-Tetrahydroisoquinolines (THIQs) are common motifs in alkaloids and in medicinal chemistry. Synthetic access to THIQs via the Pomeranz–Fritsch–Bobbit (PFB) methodology using mineral acids for deactivated, electron-poor aromatic systems, is scarcely represented in the literature. Here, the factors controlling the regiochemical outcome of cyclization are evaluated. Results: A double reductive alkylation was telescoped into a one-pot reaction delivering good to excellent yields of desired aminoacetals for cyclization. Cyclization of activated systems proceeded smoothly under standard PFB conditions, but for non-activated systems the use of HClO4 alone was effective. When cyclization was possible in both para- and ortho-positions to the substituent, 7-substituted derivatives were formed with significant amounts of 5-substituted byproduct. The formation of the 4-hydroxy-THIQs vs the 4-methoxy-THIQ products could be controlled through modification of the reaction concentration. In addition, while a highly-activated system exclusively cyclized to the indole, this seems generally highly disfavored. When competition between 6- and 7-ring formation was investigated in non-activated systems, 5,7,8,13-tetrahydro-6,13-methanodibenzo[c,f]azonine was exclusively obtained. Furthermore, selective ring closure in the para-position could be achieved under standard PFB conditions, while a double ring closure could be obtained utilizing HClO4. Conclusion: Reactivity differences in aminoacetal precursors can be employed to control cyclization using the PFB methodology. It is now possible to select confidently the right conditions for the synthesis of N-aryl-4-hydroxy-1,2,3,4-tetrahydroisoquinolines. PMID:29062406

  12. Accessing simply-substituted 4-hydroxytetrahydroisoquinolines via Pomeranz-Fritsch-Bobbitt reaction with non-activated and moderately-activated systems.

    Science.gov (United States)

    Mottinelli, Marco; Leese, Mathew P; Potter, Barry V L

    2017-01-01

    Background: 1,2,3,4-Tetrahydroisoquinolines (THIQs) are common motifs in alkaloids and in medicinal chemistry. Synthetic access to THIQs via the Pomeranz-Fritsch-Bobbit (PFB) methodology using mineral acids for deactivated, electron-poor aromatic systems, is scarcely represented in the literature. Here, the factors controlling the regiochemical outcome of cyclization are evaluated. Results: A double reductive alkylation was telescoped into a one-pot reaction delivering good to excellent yields of desired aminoacetals for cyclization. Cyclization of activated systems proceeded smoothly under standard PFB conditions, but for non-activated systems the use of HClO 4 alone was effective. When cyclization was possible in both para - and ortho -positions to the substituent, 7-substituted derivatives were formed with significant amounts of 5-substituted byproduct. The formation of the 4-hydroxy-THIQs vs the 4-methoxy-THIQ products could be controlled through modification of the reaction concentration. In addition, while a highly-activated system exclusively cyclized to the indole, this seems generally highly disfavored. When competition between 6- and 7-ring formation was investigated in non-activated systems, 5,7,8,13-tetrahydro-6,13-methanodibenzo[ c , f ]azonine was exclusively obtained. Furthermore, selective ring closure in the para- position could be achieved under standard PFB conditions, while a double ring closure could be obtained utilizing HClO 4 . Conclusion: Reactivity differences in aminoacetal precursors can be employed to control cyclization using the PFB methodology. It is now possible to select confidently the right conditions for the synthesis of N- aryl-4-hydroxy-1,2,3,4-tetrahydroisoquinolines.

  13. A RADIANT AIR-CONDITIONING SYSTEM USING SOLAR-DRIVEN

    Directory of Open Access Journals (Sweden)

    S. A. ABDALLA

    2006-12-01

    Full Text Available Every air-conditioning system needs some fresh air to provide adequate ventilation air required to remove moisture, gases like ammonia and hydrogen sulphide, disease organisms, and heat from occupied spaces. However, natural ventilation is difficult to control because urban areas outside air is often polluted and cannot be supplied to inner spaces before being filtered. Besides the high electrical demand of refrigerant compression units used by most air-conditioning systems, and fans used to transport the cool air through the thermal distribution system draw a significant amount of electrical energy in comparison with electrical energy used by the building thermal conditioning systems. Part of this electricity heats the cooled air; thereby add to the internal thermal cooling peak load. In addition, refrigerant compression has both direct and indirect negative effects on the environment on both local and global scales. In seeking for innovative air-conditioning systems that maintain and improve indoor air quality under potentially more demanding performance criteria without increasing environmental impact, this paper presents radiant air-conditioning system which uses a solar-driven liquid desiccant evaporative cooler. The paper describes the proposed solar-driven liquid desiccant evaporative cooling system and the method used for investigating its performance in providing cold water for a radiant air-conditioning system in Khartoum (Central Sudan. The results of the investigation show that the system can operate in humid as well as dry climates and that employing such a system reduces air-conditioning peak electrical demands as compared to vapour compression systems.

  14. Fungal colonization of air-conditioning systems

    Directory of Open Access Journals (Sweden)

    Ljaljević-Grbić Milica

    2008-01-01

    Full Text Available Fungi have been implicated as quantitatively the most important bioaerosol component of indoor air associated with contaminated air-conditioning systems. rarely, indoor fungi may cause human infections, but more commonly allergenic responses ranging from pneumonitis to asthma-like symptoms. From all air conditioner filters analyzed, 16 fungal taxa were isolated and identified. Aspergillus fumigatus causes more lethal infections worldwide than any other mold. Air-conditioning filters that adsorb moisture and volatile organics appear to provide suitable substrates for fungal colonization. It is important to stress that fungal colonization of air-conditioning systems should not be ignored, especially in hospital environments.

  15. An Intelligent System Proposal for Improving the Safety and Accessibility of Public Transit by Highway

    Directory of Open Access Journals (Sweden)

    Carmelo R. García

    2015-08-01

    Full Text Available The development of public transit systems that are accessible and safe for everyone, including people with special needs, is an objective that is justified from the civic and economic points of view. Unfortunately, public transit services are conceived for people who do not have reduced physical or cognitive abilities. In this paper, we present an intelligent public transit system by highway with the goal of facilitating access and improving the safety of public transit for persons with special needs. The system is deployed using components that are commonly available in transport infrastructure, e.g., sensors, mobile communications systems, and positioning systems. In addition, the system can operate in non-urban transport contexts, e.g., isolated rural areas, where the availability of basic infrastructure, such as electricity and communications infrastructures, is not always guaranteed. To construct the system, the principles and techniques of Ubiquitous Computing and Ambient Intelligence have been employed. To illustrate the utility of the system, two cases of services rendered by the system are described: the first case involves a surveillance system to guarantee accessibility at bus stops; the second case involves a route assistant for blind people.

  16. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  17. Resource Sharing in Heterogeneous and Cloud Radio Access Networks

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; Iversen, Villy Bæk

    2012-01-01

    be improved. However, we identify the benefit of individual operators and show that it’s not equal but highly depends on the initial network dimensioning. Furthermore, we demonstrate that under specific conditions the blocking probability in an area is lower than for fully accessible system and therefore...

  18. Evaluation of FSO System Availability in Haze Condition

    Science.gov (United States)

    Anis, A. A.; Rashidi, C. B. M.; Aljunid, S. A.; Rahman, A. K.

    2018-03-01

    In this paper, we proposed the evaluation of FSO system availability in haze condition. The atmospheric attenuation by weather conditions in the atmosphere as the most challenging problem of FSO system as the system performance is severely degraded and causing the signal optic to be transmitted poorly. The effects of haze condition on the performance of FSO system is stressed out and focused in this paper. From the evaluation of the analysis, designs of FSO system are proposed to obtain a system with improved link performance in haze conditions. The scattering coefficient and the atmospheric attenuation are determined using Beer’s Lambert equation. From the research, the link performance of the system is greatly improved using Design 2 with minimum BER of 10-127127 and maximu m Q Factor of 23.98. The FSO system using Design 2 has better performance compared to Design 1 in haze condition as the optical signals could penetrate the dense haze better without losing much optical power during the transmission to the scattering.

  19. Is the Japanese Distribution System Becoming More Accessible to Foreign Firms?

    OpenAIRE

    Ralf bebenroth; Nir Kshetri; Reinhard Hunerberg

    2009-01-01

    Complexities in the Japanese distribution system are well-publicized. An emerging body of literature has documented recent changes in the Japanese distribution system. In this paper, it is examined whether foreign firms' accessibility to the Japanese distribution system has changed in a favorable direction in recent years. Furthermore, as foreign firms vary widely in terms of institutional barriers and complexity they face in the Japanese market, the authors also investigate the determinants ...

  20. National Geothermal Data System: an Exemplar of Open Access to Data

    Science.gov (United States)

    Allison, M. L.; Richard, S. M.; Blackman, H.; Anderson, A.

    2013-12-01

    The National Geothermal Data System's (NGDS - www.geothermaldata.org) formal launch in 2014 will provide open access to millions of datasets, sharing technical geothermal-relevant data across the geosciences to propel geothermal development and production. With information from all of the Department of Energy's sponsored development and research projects and geologic data from all 50 states, this free, interactive tool is opening new exploration opportunities and shortening project development by making data easily discoverable and accessible. We continue to populate our prototype functional data system with multiple data nodes and nationwide data online and available to the public. Data from state geological surveys and partners includes more than 5 million records online, including 1.48 million well headers (oil and gas, water, geothermal), 732,000 well logs, and 314,000 borehole temperatures and is growing rapidly. There are over 250 Web services and another 138 WMS (Web Map Services) registered in the system as of August, 2013. Companion projects run by Boise State University, Southern Methodist University, and USGS are adding millions of additional data records. The National Renewable Energy Laboratory is managing the Geothermal Data Repository which will serve as a system node and clearinghouse for data from hundreds of DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS is fully compliant with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with grants from the US Department of Energy, Geothermal Technologies Office. To keep this operational

  1. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    2015-01-01

    This study examines the effect of accessibility to urban jobs via a public transport system on individual earnings and commuting behaviour. The effect of improved public transport based accessibility on these outcomes is determined by exploiting the exogenous variation in access to a public rail...... and Metro system resulting from the construction of a new terminal Metro station connecting southern townships to Copenhagen city centre. The results show that public transport based job accessibility has a positive and permanent effect on individual earnings. The increase in earnings is associated...... with a change in commuting patterns as the improved access to public transport facilitates a shift from employment within the township to better paid jobs in the city centre, as well as in other suburbs of the Copenhagen Metropolitan area...

  2. Disparities in Alcohol, Drug Use, and Mental Health Condition Prevalence and Access to Care in Rural, Isolated, and Reservation Areas: Findings From the South Dakota Health Survey.

    Science.gov (United States)

    Davis, Melinda M; Spurlock, Margaret; Dulacki, Kristen; Meath, Thomas; Li, Hsin-Fang Grace; McCarty, Dennis; Warne, Donald; Wright, Bill; McConnell, K John

    2016-06-01

    Research on urban/rural disparities in alcohol, drug use, and mental health (ADM) conditions is inconsistent. This study describes ADM condition prevalence and access to care across diverse geographies in a predominantly rural state. Multimodal cross-sectional survey in South Dakota from November 2013 to October 2014, with oversampling in rural areas and American Indian reservations. Measures assessed demographic characteristics, ADM condition prevalence using clinical screenings and participant self-report, perceived need for treatment, health service usage, and barriers to obtaining care. We tested for differences among urban, rural, isolated, and reservation geographic areas, controlling for participant age and gender. We analyzed 7,675 surveys (48% response rate). Generally, ADM condition prevalence rates were not significantly different across geographies. However, respondents in isolated and reservation areas were significantly less likely to have access to primary care. Knowledge of treatment options was significantly lower in isolated regions and individuals in reservation areas had significantly lower odds of reporting receipt of all needed care. Across the sample there was substantial discordance between ADM clinical screenings and participant self-reported need; 98.1% of respondents who screened positive for alcohol or drug misuse and 63.8% of respondents who screened positive for a mental health condition did not perceive a need for care. In a predominantly rural state, geographic disparities in ADM conditions are related to differences in access as opposed to prevalence, particularly for individuals in isolated and reservation areas. Educational interventions about ADM condition characteristics may be as important as improving access to care. © 2015 National Rural Health Association.

  3. Total On-line Access Data System (TOADS): Phase II Final Report for the Period August 2002 - August 2004

    Energy Technology Data Exchange (ETDEWEB)

    Yuracko, K. L. [YAHSGS LLC, Richland, WA (United States); Parang, M. [YAHSGS LLC, Richland, WA (United States); Landguth, D. C. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Coleman, R. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2004-09-13

    TOADS (Total On-line Access Data System) is a new generation of real-time monitoring and information management system developed to support unattended environmental monitoring and long-term stewardship of U.S. Department of Energy facilities and sites. TOADS enables project managers, regulators, and stakeholders to view environmental monitoring information in realtime over the Internet. Deployment of TOADS at government facilities and sites will reduce the cost of monitoring while increasing confidence and trust in cleanup and long term stewardship activities. TOADS: Reliably interfaces with and acquires data from a wide variety of external databases, remote systems, and sensors such as contaminant monitors, area monitors, atmospheric condition monitors, visual surveillance systems, intrusion devices, motion detectors, fire/heat detection devices, and gas/vapor detectors; Provides notification and triggers alarms as appropriate; Performs QA/QC on data inputs and logs the status of instruments/devices; Provides a fully functional data management system capable of storing, analyzing, and reporting on data; Provides an easy-to-use Internet-based user interface that provides visualization of the site, data, and events; and Enables the community to monitor local environmental conditions in real time. During this Phase II STTR project, TOADS has been developed and successfully deployed for unattended facility, environmental, and radiological monitoring at a Department of Energy facility.

  4. Remotely Sensed Land Imagery and Access Systems: USGS Updates

    Science.gov (United States)

    Lamb, R.; Pieschke, R.; Lemig, K.

    2017-12-01

    The U.S. Geological Survey (USGS) Earth Resources Observation and Science (EROS) Center has implemented a number of updates to its suite of remotely sensed products and distribution systems. These changes will greatly expand the availability, accessibility, and usability of the image products from USGS. As of late 2017, several new datasets are available for public download at no charge from USGS/EROS Center. These products include Multispectral Instrument (MSI) Level-1C data from the Sentinel-2B satellite, which was launched in March 2017. Along with Sentinel-2A, the Sentinel-2B images are now being distributed through USGS systems as part of a collaborative effort with the European Space Agency (ESA). The Sentinel-2 imagery is highly complementary to multispectral data collected by the USGS Landsat 7 and 8 satellites. With these two missions operating together, the potential local revisit rate can be reduced to 2-4 days. Another product addition is Resourcesat-2 data acquired over the United States by the Indian Space Research Organisation (ISRO). The Resourcesat-2 products from USGS consist of Advanced Wide Field Sensor (AWiFS) and Linear Imaging Self-Scanning Sensor Three (LISS-3) images acquired August 2016 to present. In an effort to maximize future Landsat data interoperability, including time series analysis of the 45+ year archive, the reprocessing of Collection 1 for all historical Landsat Level 1 products is nearly complete. The USGS is now working on operational release of higher-level science products to support analysis of the Landsat archive at the pixel level. Major upgrades were also completed in 2017 for several USGS data discovery and access systems, including the LandsatLook Viewer (https://landsatlook.usgs.gov/) and GloVis Tool (https://glovis.usgs.gov/). Other options are now being developed to further enhance data access and overall user experience. These future options will be discussed and community feedback will be encouraged.

  5. Shared random access memory resource for multiprocessor real-time systems

    International Nuclear Information System (INIS)

    Dimmler, D.G.; Hardy, W.H. II

    1977-01-01

    A shared random-access memory resource is described which is used within real-time data acquisition and control systems with multiprocessor and multibus organizations. Hardware and software aspects are discussed in a specific example where interconnections are done via a UNIBUS. The general applicability of the approach is also discussed

  6. The Scope of the Common Commercial Policy after Lisbon: The Daiichi Sankyo and Conditional Access Services Grand Chamber Judgments

    NARCIS (Netherlands)

    Ankersmit, L.J.

    2014-01-01

    This case note discusses two important recent judgments rendered by the ECJ on the scope of the Common Commercial Policy. In Daiichi Sankyo (Case C-414/11), the Court overturned its previous case law on TRIPs in light of the entry into force of the Lisbon Treaty. In Conditional Access Services (Case

  7. A remark on accessibility

    International Nuclear Information System (INIS)

    Wu, Xinxing; Wang, Jianjun

    2016-01-01

    Highlights: • Obtain some characteristics of accessibility and Kato’s chaos. • Answer negatively a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. • A dynamical system is indecomposable if and only if it is weakly transitive. - Abstract: This note obtains some characteristics of accessibility and Kato’s chaos. Applying these results, an accessible dynamical system whose product system is not accessible is constructed, giving a negative answer to a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. Besides, it is proved that every transitive interval self-map is accessible.

  8. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  9. Ventilation-air conditioning system

    International Nuclear Information System (INIS)

    Kubokoya, Takashi.

    1991-01-01

    Heretofore, in ventilation-air conditioning systems in a nuclear power plant, exhaust gases from each of the ventilation-air conditioning systems of a reactor building, a turbine building, a waste processing building are joined and they are released into atmosphere from the top of a high main exhaustion stack. In order to build such a high main exhaustion stack, a considerable construction cost is required and, in addition, there is a worry of lacking balance with surrounding scenery. Then, in the present invention, exhaust gases are heated by waste heat in a turbine during their introduction from the ventilation-air conditioning facility in the building of a power plant to the main exhaust stack. With such a constitution, since the exhaust gases are heated and their temperature is elevated, they uprise by natural convection when they are released from the top of the main exhaustion stack to the atmosphere. Accordingly, they are released to a level higher than the conventional case in view of the volume of the blower which sends the exhaust gases under pressure, to diffuse them to the atmosphere more sufficiently compared with a conventional case. Further, the height of the main exhaustion stack can be reduced, enabling to minimize the cost for moving the blower. (T.M.)

  10. Specific characteristics of the aviary housing system affect plumage condition, mortality and production in laying hens.

    Science.gov (United States)

    Heerkens, Jasper L T; Delezie, Evelyne; Kempen, Ine; Zoons, Johan; Ampe, Bart; Rodenburg, T Bas; Tuyttens, Frank A M

    2015-09-01

    Feather pecking and high mortality levels are significant welfare problems in non-cage housing systems for laying hens. The aim of this study was to identify husbandry-related risk factors for feather damage, mortality, and egg laying performance in laying hens housed in the multi-tier non-cage housing systems known as aviaries. Factors tested included type of system flooring, degree of red mite infestation, and access to free-range areas. Information on housing characteristics, management, and performance in Belgian aviaries (N=47 flocks) were obtained from a questionnaire, farm records, and farm visits. Plumage condition and pecking wounds were scored in 50 randomly selected 60-week-old hens per flock. Associations between plumage condition, wounds, performance, mortality, and possible risk factors were investigated using a linear model with a stepwise model selection procedure. Many flocks exhibited a poor plumage condition and a high prevalence of wounds, with considerable variation between flocks. Better plumage condition was found in wire mesh aviaries (Pfeather cover had lower levels of mortality (Pnest perches. Wire mesh flooring in particular seems to have several health, welfare, and performance benefits in comparison to plastic slats, possibly related to decreased feather pecking, better hygiene, and fewer red mite infestations. This suggests that adjustments to the aviary housing design may further improve laying hen welfare and performance. © 2015 Poultry Science Association Inc.

  11. Multiple Coaxial Catheter System for Reliable Access in Interventional Stroke Therapy

    International Nuclear Information System (INIS)

    Kulcsar, Zsolt; Yilmaz, Hasan; Bonvin, Christophe; Lovblad, Karl O.; Ruefenacht, Daniel A.

    2010-01-01

    In some patients with acute cerebral vessel occlusion, navigating mechanical thrombectomy systems is difficult due to tortuous anatomy of the aortic arch, carotid arteries, or vertebral arteries. Our purpose was to describe a multiple coaxial catheter system used for mechanical revascularization that helps navigation and manipulations in tortuous vessels. A triple or quadruple coaxial catheter system was built in 28 consecutive cases presenting with acute ischemic stroke. All cases were treated by mechanical thrombectomy with the Penumbra System. In cases of unsuccessful thrombo-aspiration, additional thrombolysis or angioplasty with stent placement was used for improving recanalization. The catheter system consisted of an outermost 8-Fr and an intermediate 6-Fr guiding catheter, containing the inner Penumbra reperfusion catheters. The largest, 4.1-Fr, reperfusion catheter was navigated over a Prowler Select Plus microcatheter. The catheter system provided access to reach the cerebral lesions and provided stability for the mechanically demanding manipulations of thromboaspiration and stent navigation in all cases. Apart from their mechanical role, the specific parts of the system could also provide access to different types of interventions, like carotid stenting through the 8-Fr guiding catheter and intracranial stenting and thrombolysis through the Prowler Select Plus microcatheter. In this series, there were no complications related to the catheter system. In conclusion, building up a triple or quadruple coaxial system proved to be safe and efficient in our experience for the mechanical thrombectomy treatment of acute ischemic stroke.

  12. Interoperable Access to Near Real Time Ocean Observations with the Observing System Monitoring Center

    Science.gov (United States)

    O'Brien, K.; Hankin, S.; Mendelssohn, R.; Simons, R.; Smith, B.; Kern, K. J.

    2013-12-01

    The Observing System Monitoring Center (OSMC), a project funded by the National Oceanic and Atmospheric Administration's Climate Observations Division (COD), exists to join the discrete 'networks' of In Situ ocean observing platforms -- ships, surface floats, profiling floats, tide gauges, etc. - into a single, integrated system. The OSMC is addressing this goal through capabilities in three areas focusing on the needs of specific user groups: 1) it provides real time monitoring of the integrated observing system assets to assist management in optimizing the cost-effectiveness of the system for the assessment of climate variables; 2) it makes the stream of real time data coming from the observing system available to scientific end users into an easy-to-use form; and 3) in the future, it will unify the delayed-mode data from platform-focused data assembly centers into a standards- based distributed system that is readily accessible to interested users from the science and education communities. In this presentation, we will be focusing on the efforts of the OSMC to provide interoperable access to the near real time data stream that is available via the Global Telecommunications System (GTS). This is a very rich data source, and includes data from nearly all of the oceanographic platforms that are actively observing. We will discuss how the data is being served out using a number of widely used 'web services' (including OPeNDAP and SOS) and downloadable file formats (KML, csv, xls, netCDF), so that it can be accessed in web browsers and popular desktop analysis tools. We will also be discussing our use of the Environmental Research Division's Data Access Program (ERDDAP), available from NOAA/NMFS, which has allowed us to achieve our goals of serving the near real time data. From an interoperability perspective, it's important to note that access to the this stream of data is not just for humans, but also for machine-to-machine requests. We'll also delve into how we

  13. ATLAS, an integrated structural analysis and design system. Volume 4: Random access file catalog

    Science.gov (United States)

    Gray, F. P., Jr. (Editor)

    1979-01-01

    A complete catalog is presented for the random access files used by the ATLAS integrated structural analysis and design system. ATLAS consists of several technical computation modules which output data matrices to corresponding random access file. A description of the matrices written on these files is contained herein.

  14. Improving Urban Accessibility: A Methodology for Urban Dynamics Analysis in Smart, Sustainable and Inclusive Cities

    OpenAIRE

    Pérez-delHoyo, Raquel; Garcia-Mayor, Clara; Mora, Higinio; Gilart, Virgilio; Andújar-Montoya, María Dolores

    2016-01-01

    Despite the improvisations of current urban accessibility regulations and their application in urban systems, it is a fact that our cities are not accessible. Both, the assessment of the effectiveness of urban accessibility and its maintenance over time are issues that require a more consistent approach. In order to address these aspects, it is necessary to have an accurate awareness of the existing condition of urban accessibility. Therefore, the way this information is transformed into spec...

  15. First Experiences Using XACML for Access Control in Distributed Systems

    Science.gov (United States)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  16. Evolution of ATLAS conditions data and its management for LHC Run-2

    CERN Document Server

    Boehler, Michael; Formica, Andrea; Gallas, Elizabeth; Radescu, Voica

    2015-01-01

    The ATLAS detector at the LHC consists of several sub-detector systems. Both data taking and Monte Carlo (MC) simulation rely on an accurate description of the detector conditions from every subsystem, such as calibration constants, different scenarios of pile-up and noise conditions, size and position of the beam spot, etc. In order to guarantee database availability for critical online applications during data-taking, two database systems, one for online access and another one for all other database access have been implemented. The long shutdown period has provided the opportunity to review and improve the Run-1 system: revise workflows, include new and innovative monitoring and maintenance tools and implement a new database instance for Run-2 conditions data. The detector conditions are organized by tag identification strings and managed independently from the different sub-detector experts. The individual tags are then collected and associated into a global conditions tag, assuring synchronization of var...

  17. Effects of managed care on service use and access for publicly insured children with chronic health conditions.

    Science.gov (United States)

    Davidoff, Amy; Hill, Ian; Courtot, Brigette; Adams, Emerald

    2007-05-01

    Our goal was to estimate the effects of managed care program type on service use and access for publicly insured children with chronic health conditions. Data on Medicaid and State Children's Health Insurance Program managed care programs were linked by county and year to pooled data from the 1997-2002 National Health Interview Survey. We used multivariate techniques to examine the effects of managed care program type, relative to fee-for-service, on a broad array of service use and access outcomes. Relative to fee-for-service, managed care program assignment was associated with selected reductions in service use but not with deterioration in reported access. Capitated managed care plans with mental health or specialty carve-outs were associated with a 7.4-percentage-point reduction in the probability of a specialist visit, a 6.3-percentage-point reduction in the probability of a mental health specialty visit, and a 5.9-percentage-point decrease in the probability of regular prescription drug use. Reductions in use associated with primary care case management and integrated capitated programs (without carve-outs) were more limited, and integrated capitated plans were associated with a reduction in unmet medical care need. We failed to find significant effects of special managed care programs for children with chronic health conditions. Managed care is associated with reduced service use, particularly when capitated programs carve out services. This finding is of key policy importance, as the proportion of children enrolled in plans with carve-out arrangements has been increasing over time. It is not possible to determine whether reductions in services represent better care management or skimping. However, despite the reductions in use, we did not observe a corresponding increase in perceived unmet need; thus, the net change may represent improved care management.

  18. Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems

    Directory of Open Access Journals (Sweden)

    Luis Joyanes Aguilar

    2009-12-01

    Full Text Available Due to the significant increase in threats, attacks and vulnerabilities that affect the Web in recent years has resulted the development and implementation of pools and methods to ensure security measures in the privacy, confidentiality and data integrity of users and businesses. Under certain circumstances, despite the implementation of these tools do not always get the flow of information which is passed in a secure manner. Many of these security tools and methods cannot be accessed by people who have disabilities or assistive technologies which enable people to access the Web efficiently. Among these security tools that are not accessible are the virtual keyboard, the CAPTCHA and other technologies that help to some extent to ensure safety on the Internet and are used in certain measures to combat malicious code and attacks that have been increased in recent times on the Web. Through the implementation of intelligent systems can detect, recover and receive information on the characteristics and properties of the different tools and hardware devices or software with which the user is accessing a web application and through analysis and interpretation of these intelligent systems can infer and automatically adjust the characteristics necessary to have these tools to be accessible by anyone regardless of disability or navigation context. This paper defines a set of guidelines and specific features that should have the security tools and methods to ensure the Web accessibility through the implementation of intelligent systems.

  19. National Geothermal Data System: Open Access to Geoscience Data, Maps, and Documents

    Science.gov (United States)

    Caudill, C. M.; Richard, S. M.; Musil, L.; Sonnenschein, A.; Good, J.

    2014-12-01

    The U.S. National Geothermal Data System (NGDS) provides free open access to millions of geoscience data records, publications, maps, and reports via distributed web services to propel geothermal research, development, and production. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG), and is compliant with international standards and protocols. NGDS currently serves geoscience information from 60+ data providers in all 50 states. Free and open source software is used in this federated system where data owners maintain control of their data. This interactive online system makes geoscience data easily discoverable, accessible, and interoperable at no cost to users. The dynamic project site http://geothermaldata.org serves as the information source and gateway to the system, allowing data and applications discovery and availability of the system's data feed. It also provides access to NGDS specifications and the free and open source code base (on GitHub), a map-centric and library style search interface, other software applications utilizing NGDS services, NGDS tutorials (via YouTube and USGIN site), and user-created tools and scripts. The user-friendly map-centric web-based application has been created to support finding, visualizing, mapping, and acquisition of data based on topic, location, time, provider, or key words. Geographic datasets visualized through the map interface also allow users to inspect the details of individual GIS data points (e.g. wells, geologic units, etc.). In addition, the interface provides the information necessary for users to access the GIS data from third party software applications such as GoogleEarth, UDig, and ArcGIS. A redistributable, free and open source software package called GINstack (USGIN software stack) was also created to give data providers a simple way to release data using

  20. Effect of free-range access, shelter type and weather conditions on free-range use and welfare of slow-growing broiler chickens

    NARCIS (Netherlands)

    Stadig, Lisanne M.; Rodenburg, Bas; Ampe, Bart; Reubens, Bert; Tuyttens, Frank A.M.

    2017-01-01

    Free-range access for broiler chickens can benefit animal welfare because the birds have access to a more natural environment and more opportunities to perform natural behaviours than in indoor systems. Also, they have more space and more environmental enrichment, which could lead to better leg

  1. Access to services, quality of care, and family impact for children with autism, other developmental disabilities, and other mental health conditions.

    Science.gov (United States)

    Vohra, Rini; Madhavan, Suresh; Sambamoorthi, Usha; St Peter, Claire

    2014-10-01

    This cross-sectional study examined perceived access to services, quality of care, and family impact reported by caregivers of children aged 3-17 years with autism spectrum disorders, as compared to caregivers of children with other developmental disabilities and other mental health conditions. The 2009-2010 National Survey of Children with Special Health Care Needs was utilized to examine the association between child's special needs condition and three outcomes (N = 18,136): access to services (difficulty using services, difficulty getting referrals, lack of source of care, and inadequate insurance coverage), quality of care (lack of care coordination, lack of shared decision making, and no routine screening), and family impact (financial, employment, and time-related burden). Multivariate logistic regressions were performed to compare caregivers of children with autism spectrum disorders to caregivers of children with developmental disabilities (cerebral palsy, Down syndrome, developmental delay, or intellectual disability), mental health conditions (attention deficit hyperactivity disorder, anxiety, behavioral/conduct problems, or depression), or both developmental disabilities and mental health conditions. Caregivers of children with autism spectrum disorders were significantly more likely to report difficulty using services, lack of source of care, inadequate insurance coverage, lack of shared decision making and care coordination, and adverse family impact as compared to caregivers of children with developmental disabilities, mental health conditions, or both. © The Author(s) 2013.

  2. Air conditioning for data processing system areas

    Directory of Open Access Journals (Sweden)

    Hernando Camacho García

    1996-09-01

    Full Text Available The appropiate selection of air conditioners for data processing system areas requires the knowledge of the environmental desing conditions, the air conditioning systems succssfully used computer and the cooling loads to handle. This work contains information about a wide variety of systems designed for computer room applications. a complete example of calculation to determine the amount of heat to be removed for satisfactory operation, is also included.

  3. ICSW2AN : An Inter-vehicle Communication System Using Mobile Access Point over Wireless Wide Area Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of inter-vehicle communication system using mobile access point that internetworks wired or wireless LAN and wireless WAN anywhere. Implemented mobile access point can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. Mobile access point in the IP mechanism has to process connection setup procedure to one wireless WAN. To show the applicability of the mobile access point to inter-vehicle communication, a simplified V2I2V-based car communication system called ICSW2AN is implemented to evaluate major performance metrics by road test. In addition, results of road test for traffic information service are investigated in view of RTT, latency and server processing time. The experimental result indicates that V2I2V-based car communication system sufficiently can provide time-tolerant traffic information to moving vehicles while more than two mobile devices in restricted spaces such as car, train and ship access wireless Internet simultaneously.

  4. An assessment of accessibility and utilisation of toilet facilities in Wa

    African Journals Online (AJOL)

    2009-10-13

    Oct 13, 2009 ... cultural conditions, the current system of public toilet operating in the ... beliefs and needs of potential users such as the flush system of public toilets. ... Access to and efficient use of safe sanitation facilities is an essential part of public health. ... managed and have become the site of local political conflict, ...

  5. Demystifying Open Access

    International Nuclear Information System (INIS)

    Mele, Salvatore

    2007-01-01

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  6. Predictors of appendiceal perforation in an equal access system.

    Science.gov (United States)

    Walker, Avery; Hatch, Quinton; Drake, Thurston; Nelson, Daniel W; Fitzpatrick, Emilie; Bingham, Jason; Black, George; Maykel, Justin A; Steele, Scott R

    2014-07-01

    Discrepancies in socioeconomic factors have been associated with higher rates of perforated appendicitis. As an equal-access health care system theoretically removes these barriers, we aimed to determine if remaining differences in demographics, education, and pay result in disparate outcomes in the rate of perforated appendicitis. All patients undergoing appendectomy for acute appendicitis (November 2004-October 2009) at a tertiary care equal access institution were categorized by demographics and perioperative data. Rank of the sponsor was used as a surrogate for economic status. A multivariate logistic regression model was performed to determine patient and clinical characteristics associated with perforated appendicitis. A total of 680 patients (mean age 30±16 y; 37% female) were included. The majority were Caucasian (56.4% [n=384]; African Americans 5.6% [n=38]; Asians 1.9% [n=13]; and other 48.9% [n=245]) and enlisted (87.2%). Overall, 6.4% presented with perforation, with rates of 6.6%, 5.8%, and 6.7% (P=0.96) for officers, enlisted soldiers, and contractors, respectively. There was no difference in perforation when stratified by junior or senior status for either officers or enlisted (9.3% junior versus 4.40% senior officers, P=0.273; 6.60% junior versus 5.50% senior enlisted, P=0.369). On multivariate analysis, parameters such as leukocytosis and temperature, as well as race and rank were not associated with perforation (P=0.7). Only age had a correlation, with individuals aged 66-75 y having higher perforation rates (odds ratio, 1.04; 95% confidence interval, 1.02-1.05; P<0.001). In an equal-access health care system, older age, not socioeconomic factors, correlated with increased appendiceal perforation rates. Published by Elsevier Inc.

  7. Adaptation of AMO-FBMC-OQAM in optical access network for accommodating asynchronous multiple access in OFDM-based uplink transmission

    Science.gov (United States)

    Jung, Sun-Young; Jung, Sang-Min; Han, Sang-Kook

    2015-01-01

    Exponentially expanding various applications in company with proliferation of mobile devices make mobile traffic exploded annually. For future access network, bandwidth efficient and asynchronous signals converged transmission technique is required in optical network to meet a huge bandwidth demand, while integrating various services and satisfying multiple access in perceived network resource. Orthogonal frequency division multiplexing (OFDM) is highly bandwidth efficient parallel transmission technique based on orthogonal subcarriers. OFDM has been widely studied in wired-/wireless communication and became a Long term evolution (LTE) standard. Consequently, OFDM also has been actively researched in optical network. However, OFDM is vulnerable frequency and phase offset essentially because of its sinc-shaped side lobes, therefore tight synchronism is necessary to maintain orthogonality. Moreover, redundant cyclic prefix (CP) is required in dispersive channel. Additionally, side lobes act as interference among users in multiple access. Thus, it practically hinders from supporting integration of various services and multiple access based on OFDM optical transmission In this paper, adaptively modulated optical filter bank multicarrier system with offset QAM (AMO-FBMC-OQAM) is introduced and experimentally investigated in uplink optical transmission to relax multiple access interference (MAI), while improving bandwidth efficiency. Side lobes are effectively suppressed by using FBMC, therefore the system becomes robust to path difference and imbalance among optical network units (ONUs), which increase bandwidth efficiency by reducing redundancy. In comparison with OFDM, a signal performance and an efficiency of frequency utilization are improved in the same experimental condition. It enables optical network to effectively support heterogeneous services and multiple access.

  8. “Future Directions”: m-government computer systems accessed via cloud computing – advantages and possible implementations

    OpenAIRE

    Daniela LIŢAN

    2015-01-01

    In recent years, the activities of companies and Public Administration had been automated and adapted to the current information system. Therefore, in this paper, I will present and exemplify the benefits of m-government computer systems development and implementation (which can be accessed from mobile devices and which are specific to the workflow of Public Administrations) starting from the “experience” of e-government systems implementation in the context of their access and usage through ...

  9. Defense Hotline Allegations Concerning the Biometric Identification System for Access Omnibus Contract

    National Research Council Canada - National Science Library

    2008-01-01

    .... According to the Strategic Services Sourcing (S3) performance work statement the purpose of the BISA is to provide a biometric base access control system that can operate in a hostile environment...

  10. Guide on Project Web Access of SFR R and D and Technology Monitoring System

    International Nuclear Information System (INIS)

    Lee, Dong Uk; Won, Byung Chool; Lee, Yong Bum; Kim, Young In; Hahn, Do Hee

    2008-09-01

    The SFR R and D and technology monitoring system based on the MS enterprise project management is developed for systematic effective management of 'Development of Basic Key Technologies for Gen IV SFR' project which was performed under the Mid- and Long-term Nuclear R and D Program sponsored by the Ministry of Education, Science and Technology. This system is a tool for project management based on web access. Therefore this manual is a detailed guide for Project Web Access(PWA). Section 1 describes the common guide for using of system functions such as project server 2007 client connection setting, additional outlook function setting etc. The section 2 describes the guide for system administrator. It is described the guide for project management in section 3, 4

  11. Performance enhancement of optical code-division multiple-access systems using transposed modified Walsh code

    Science.gov (United States)

    Sikder, Somali; Ghosh, Shila

    2018-02-01

    This paper presents the construction of unipolar transposed modified Walsh code (TMWC) and analysis of its performance in optical code-division multiple-access (OCDMA) systems. Specifically, the signal-to-noise ratio, bit error rate (BER), cardinality, and spectral efficiency were investigated. The theoretical analysis demonstrated that the wavelength-hopping time-spreading system using TMWC was robust against multiple-access interference and more spectrally efficient than systems using other existing OCDMA codes. In particular, the spectral efficiency was calculated to be 1.0370 when TMWC of weight 3 was employed. The BER and eye pattern for the designed TMWC were also successfully obtained using OptiSystem simulation software. The results indicate that the proposed code design is promising for enhancing network capacity.

  12. Guide on Project Web Access of SFR R and D and Technology Monitoring System

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Dong Uk; Won, Byung Chool; Lee, Yong Bum; Kim, Young In; Hahn, Do Hee

    2008-09-15

    The SFR R and D and technology monitoring system based on the MS enterprise project management is developed for systematic effective management of 'Development of Basic Key Technologies for Gen IV SFR' project which was performed under the Mid- and Long-term Nuclear R and D Program sponsored by the Ministry of Education, Science and Technology. This system is a tool for project management based on web access. Therefore this manual is a detailed guide for Project Web Access(PWA). Section 1 describes the common guide for using of system functions such as project server 2007 client connection setting, additional outlook function setting etc. The section 2 describes the guide for system administrator. It is described the guide for project management in section 3, 4.

  13. Scheduling with Bus Access Optimization for Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Eles, Petru; Doboli, Alex; Pop, Paul

    2000-01-01

    of control. Our goal is to derive a worst case delay by which the system completes execution, such that this delay is as small as possible; to generate a logically and temporally deterministic schedule; and to optimize parameters of the communication protocol such that this delay is guaranteed. We have......In this paper, we concentrate on aspects related to the synthesis of distributed embedded systems consisting of programmable processors and application-specific hardware components. The approach is based on an abstract graph representation that captures, at process level, both dataflow and the flow......, generates an efficient bus access scheme as well as the schedule tables for activation of processes and communications....

  14. ITS Multi-path Communications Access Decision Scheme

    Directory of Open Access Journals (Sweden)

    Miroslav Svitek

    2008-02-01

    Full Text Available Intelligent Transport Systems (ITS require widely spread and guarantied quality communications services. Method of ITS decomposition to set of subsystems and quantification of communications subsystems parameters is introduced. Due to typical complexity of the IST solution and mobility as the typical system elements property idea of communications systems with multipath multivendor structures is adopted. Resolution of seamless switching within a set of available wireless access solutions is presented. CALM based system or specifically designed and configured L3/L2 switching can be relevant solution for multi-path access communication system. These systems meet requirements of the seamless secure communications functionality within even extensive cluster of moving objects. Competent decision processes based on precisely quantified system requirements and each performance indicator tolerance range must be implemented to keep service up and running with no influence of continuously changing conditions in time and served space. Method of different paths service quality evaluation and selection of the best possible active communications access path is introduced. Proposed approach is based on Kalman filtering, which separates reasonable part of noise and also allows prediction of the individual parameters near future behavior. Presented classification algorithm applied on filtered measured data combined with deterministic parameters is trained using training data, i.e. combination of parameters vectors line and relevant decisions. Quality of classification is dependent on the size and quality of the training sets. This method is studied within projects e-Ident, DOTEK and SRATVU which are elaborating results of project CAMNA.

  15. Introduction to the Personal Access Satellite System Study

    Science.gov (United States)

    Sue, Miles K.

    1990-01-01

    A recent study by the National Telecommunications and Information Administration (NTIA) has concluded that the 21st century will be the age of information in which the telecommunication infrastructure will be vital to the social and economic well being of society. To meet the challenge of the coming age, JPL has been performing studies on a personal access satellite system (PASS) for the 21st century. The PASS study can be traced back to a study in which the technical feasibility and potential applications of a high frequency, low data rate satellite system were identified using small fixed terminals. Herein, the PASS concept is described along with the strawman design. Then the key challenges are identified along with possible solutions. Finally, the plan for the future is summarized from the key results.

  16. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    Directory of Open Access Journals (Sweden)

    Wen-Jye Shyr

    2013-02-01

    Full Text Available This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC and WebAccess. A mechatronics module, a Web-CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equipment from a remote location. Mechatronics control and long-distance monitoring were realized by establishing communication between the PLC and WebAccess. Analytical results indicate that the proposed system is feasible. The suitability of this system is demonstrated in the department of industrial education and technology at National Changhua University of Education, Taiwan. Preliminary evaluation of the system was encouraging and has shown that it has achieved success in helping students understand concepts and master remote monitoring and control techniques.

  17. Perceived Accessibility of Public Transport as a Potential Indicator of Social Inclusion

    Directory of Open Access Journals (Sweden)

    Katrin Lättman

    2016-06-01

    Full Text Available Perceived accessibility has been acknowledged as an important aspect of transport policy since the 70s. Nevertheless, very few empirical studies have been conducted in this field. When aiming to improve social inclusion, by making sustainable transport modes accessible to all, it is important to understand the factors driving perceived accessibility. Unlike conventional accessibility measures, perceived accessibility focuses on the perceived possibilities and ease of engaging in preferred activities using different transport modes. We define perceived accessibility in terms of how easy it is to live a satisfactory life with the help of the transport system, which is not necessarily the same thing as the objective standard of the system. According to previous research, perceived accessibility varies with the subjectively-rated quality of the mode of transport. Thus, improvements in quality (e.g. trip planning, comfort, or safety increase the perceived accessibility and make life easier to live using the chosen mode of transport. This study (n=750 focuses on the perceived accessibility of public transport, captured using the Perceived Accessibility Scale PAC (Lättman, Olsson, & Friman, 2015. More specifically, this study aims to determine how level of quality affects the perceived accessibility in public transport. A Conditional Process Model shows that, in addition to quality, feeling safe and frequency of travel are important predictors of perceived accessibility. Furthermore, elderly and those in their thirties report a lower level of perceived accessibility to their day-to-day activities using public transport. The basic premise of this study is that subjective experiences may be as important as objective indicators when planning and designing for socially inclusive transport systems.

  18. Quaternion Based Thermal Condition Monitoring System

    Science.gov (United States)

    Wong, Wai Kit; Loo, Chu Kiong; Lim, Way Soong; Tan, Poi Ngee

    In this paper, we will propose a new and effective machine condition monitoring system using log-polar mapper, quaternion based thermal image correlator and max-product fuzzy neural network classifier. Two classification characteristics namely: peak to sidelobe ratio (PSR) and real to complex ratio of the discrete quaternion correlation output (p-value) are applied in the proposed machine condition monitoring system. Large PSR and p-value observe in a good match among correlation of the input thermal image with a particular reference image, while small PSR and p-value observe in a bad/not match among correlation of the input thermal image with a particular reference image. In simulation, we also discover that log-polar mapping actually help solving rotation and scaling invariant problems in quaternion based thermal image correlation. Beside that, log-polar mapping can have a two fold of data compression capability. Log-polar mapping can help smoother up the output correlation plane too, hence makes a better measurement way for PSR and p-values. Simulation results also show that the proposed system is an efficient machine condition monitoring system with accuracy more than 98%.

  19. Welcome to Systems — A New Interdisciplinary Open Access Journal for Systems Science and Engineering

    Directory of Open Access Journals (Sweden)

    Thomas Huynh

    2012-04-01

    Full Text Available Natural and human-made systems abound around us. Our solar system, the human body, the food chain, and ecosystems are some examples of natural systems. Some human-made systems are transportation systems, weapon systems, computer systems, software systems, satellite communications systems, ships, missile defense systems, health care systems, the internet, financial systems, and regional economies. Understanding of natural systems is essential to the survival of the human species, which is intertwined with the survival of other species on earth. Having the knowledge and ability to build human-made systems is critical to the employment of systems that effectively serve the needs of their users. To gain such understanding and to acquire such knowledge and ability, it is necessary that cutting-edge research in systems science, systems engineering, and systems-related fields continue. This open access journal aims to achieve quick and global dissemination of results of such research. [...

  20. Development of Decision-Making Automated System for Optimal Placement of Physical Access Control System’s Elements

    Science.gov (United States)

    Danilova, Olga; Semenova, Zinaida

    2018-04-01

    The objective of this study is a detailed analysis of physical protection systems development for information resources. The optimization theory and decision-making mathematical apparatus is used to formulate correctly and create an algorithm of selection procedure for security systems optimal configuration considering the location of the secured object’s access point and zones. The result of this study is a software implementation scheme of decision-making system for optimal placement of the physical access control system’s elements.

  1. Risk of infection due to medical interventions via central venous catheters or implantable venous access port systems at the middle port of a three-way cock: luer lock cap vs. luer access split septum system (Q-Syte).

    Science.gov (United States)

    Pohl, Fabian; Hartmann, Werner; Holzmann, Thomas; Gensicke, Sandra; Kölbl, Oliver; Hautmann, Matthias G

    2014-01-25

    Many cancer patients receive a central venous catheter or port system prior to therapy to assure correct drug administration. Even appropriate hygienic intervention maintenance carries the risk of contaminating the middle port (C-port) of a three-way cock (TWC), a risk that increases with the number of medical interventions. Because of the complexity of the cleaning procedure with disconnection and reconnection of the standard luer lock cap (referred as "intervention"), we compared luer lock caps with a "closed access system" consisting of a luer access split septum system with regard to process optimization (work simplification, process time), efficiency (costs) and hygiene (patient safety). For determination of process optimization the workflow of an intervention according to the usual practice and risks was depicted in a process diagram. For determining the actual process costs, we analyzed use of material and time parameters per intervention and used the process parameters for programming the process into a simulation run (n = 1000) to determine the process costs as well as their differences (ACTUAL vs. NOMINAL) within the framework of a discrete event simulation.Additionally cultures were carried out at the TWC C-ports to evaluate possible contamination. With the closed access system, the mean working time of 5.5 minutes could be reduced to 2.97 minutes. The results for average process costs (labour and material costs per use) were 3.92 € for luer lock caps and 2.55 € for the closed access system. The hypothesis test (2-sample t-test, CI 0.95, p-valuerisks (related to material, surroundings, staff handling) could be reduced by 65.38%. In the present research, the closed access system with a divided split septum was superior to conventional luer lock caps. The advantage of the closed access system lies in the simplified handling for staff, which results in a reduced risk of patient infection due to improved clinical hygiene.

  2. Study and development of a document file system with selective access

    International Nuclear Information System (INIS)

    Mathieu, Jean-Claude

    1974-01-01

    The objective of this research thesis was to design and to develop a set of software aimed at an efficient management of a document file system by using methods of selective access to information. Thus, the three main aspects of file processing (creation, modification, reorganisation) have been addressed. The author first presents the main problems related to the development of a comprehensive automatic documentation system, and their conventional solutions. Some future aspects, notably dealing with the development of peripheral computer technology, are also evoked. He presents the characteristics of INIS bibliographic records provided by the IAEA which have been used to create the files. In the second part, he briefly describes the file system general organisation. This system is based on the use of two main files: an inverse file which contains for each descriptor a list of of numbers of files indexed by this descriptor, and a dictionary of descriptor or input file which gives access to the inverse file. The organisation of these both files is then describes in a detailed way. Other related or associated files are created, and the overall architecture and mechanisms integrated into the file data input software are described, as well as various processing applied to these different files. Performance and possible development are finally discussed

  3. U-Access: a web-based system for routing pedestrians of differing abilities

    Science.gov (United States)

    Sobek, Adam D.; Miller, Harvey J.

    2006-09-01

    For most people, traveling through urban and built environments is straightforward. However, for people with physical disabilities, even a short trip can be difficult and perhaps impossible. This paper provides the design and implementation of a web-based system for the routing and prescriptive analysis of pedestrians with different physical abilities within built environments. U-Access, as a routing tool, provides pedestrians with the shortest feasible route with respect to one of three differing ability levels, namely, peripatetic (unaided mobility), aided mobility (mobility with the help of a cane, walker or crutches) and wheelchair users. U-Access is also an analytical tool that can help identify obstacles in built environments that create routing discrepancies among pedestrians with different physical abilities. This paper discusses the system design, including database, algorithm and interface specifications, and technologies for efficiently delivering results through the World Wide Web (WWW). This paper also provides an illustrative example of a routing problem and an analytical evaluation of the existing infrastructure which identifies the obstacles that pose the greatest discrepancies between physical ability levels. U-Access was evaluated by wheelchair users and route experts from the Center for Disability Services at The University of Utah, USA.

  4. The equipment access software for a distributed UNIX-based accelerator control system

    International Nuclear Information System (INIS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Herve

    1994-01-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain. ((orig.))

  5. An API-based search system for one click access to information

    NARCIS (Netherlands)

    Ionita, Dan; Tax, Niek; Hiemstra, Djoerd

    This paper proposes a prototype One Click access system, based on previous work in the field and the related 1CLICK-2@NTCIR10 task. The proposed solution integrates methods from into a three tier algorithm: query categorization, information extraction and output generation and offers suggestions on

  6. Completeness and overlap in open access systems: Search engines, aggregate institutional repositories and physics-related open sources.

    Science.gov (United States)

    Tsay, Ming-Yueh; Wu, Tai-Luan; Tseng, Ling-Li

    2017-01-01

    This study examines the completeness and overlap of coverage in physics of six open access scholarly communication systems, including two search engines (Google Scholar and Microsoft Academic), two aggregate institutional repositories (OAIster and OpenDOAR), and two physics-related open sources (arXiv.org and Astrophysics Data System). The 2001-2013 Nobel Laureates in Physics served as the sample. Bibliographic records of their publications were retrieved and downloaded from each system, and a computer program was developed to perform the analytical tasks of sorting, comparison, elimination, aggregation and statistical calculations. Quantitative analyses and cross-referencing were performed to determine the completeness and overlap of the system coverage of the six open access systems. The results may enable scholars to select an appropriate open access system as an efficient scholarly communication channel, and academic institutions may build institutional repositories or independently create citation index systems in the future. Suggestions on indicators and tools for academic assessment are presented based on the comprehensiveness assessment of each system.

  7. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  8. Reduced feedback selective cluster index scheduling with user pre-selection for next-generation multi-input multi-output orthogonal frequency division multiple access system

    OpenAIRE

    Nicolaou, M; Doufexi, A; Armour, SMD; Sun, Y

    2011-01-01

    The joint use of opportunistic scheduling and orthogonal frequency division multiple access (OFDMA) provide significant gains in environments of low mobility and scatter for which channel variations are low. The downside of opportunistic scheduling in multicarrier systems such as OFDMA, lies in the substantial uplink overhead required to feed back by the mobile stations (MSs) describing users' instantaneous link conditions. This study presents a novel approach towards multicarrier opportunist...

  9. 5 CFR 293.504 - Composition of, and access to, the Employee Medical File System.

    Science.gov (United States)

    2010-01-01

    ... Employee Medical File System. 293.504 Section 293.504 Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS PERSONNEL RECORDS Employee Medical File System Records § 293.504 Composition of, and access to, the Employee Medical File System. (a) All employee occupational medical records...

  10. AcconPred: Predicting Solvent Accessibility and Contact Number Simultaneously by a Multitask Learning Framework under the Conditional Neural Fields Model.

    Science.gov (United States)

    Ma, Jianzhu; Wang, Sheng

    2015-01-01

    The solvent accessibility of protein residues is one of the driving forces of protein folding, while the contact number of protein residues limits the possibilities of protein conformations. The de novo prediction of these properties from protein sequence is important for the study of protein structure and function. Although these two properties are certainly related with each other, it is challenging to exploit this dependency for the prediction. We present a method AcconPred for predicting solvent accessibility and contact number simultaneously, which is based on a shared weight multitask learning framework under the CNF (conditional neural fields) model. The multitask learning framework on a collection of related tasks provides more accurate prediction than the framework trained only on a single task. The CNF method not only models the complex relationship between the input features and the predicted labels, but also exploits the interdependency among adjacent labels. Trained on 5729 monomeric soluble globular protein datasets, AcconPred could reach 0.68 three-state accuracy for solvent accessibility and 0.75 correlation for contact number. Tested on the 105 CASP11 domain datasets for solvent accessibility, AcconPred could reach 0.64 accuracy, which outperforms existing methods.

  11. Experimental demonstration of 2.5 Gbit/S incoherent two-dimensional optical code division multiple access system

    International Nuclear Information System (INIS)

    Glesk, I.; Baby, V.; Bres, C.-S.; Xu, L.; Rand, D.; Prucnal, P.R.

    2004-01-01

    We demonstrated error-free operation of 4 simultaneous users in a fast frequency-hopping time-spreading optical code division multiple access system operating at 2.5 Gbit/s a Star architecture. Effective power penalty was ≤0.5dB. Novel optical code division multiple access receiver based on Terahertz Optical Asymmetric Demultiplexer was demonstrated to eliminate multiple access interference (Authors)

  12. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Science.gov (United States)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  13. Computer network access to scientific information systems for minority universities

    Science.gov (United States)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  14. The Baker system for nuclear access authorization screening: a psychologically developed system for access screening of vendor and owner applicants at nuclear power plants

    International Nuclear Information System (INIS)

    Baker, E.G.; Crouter, F.L.

    1985-01-01

    This paper presents a comprehensive screening program for unescorted access which has proven to be highly effective in determining the intergrity, trustworthiness, socialibility, behaviors and tendencies of an employee applicant--past, present and future. This procedure, designed specifically for the nuclear industry, can be used with owner or vendor applicants, and meets or exceeds all of the NRC's requirements. The Baker system has been used for nuclear selection since 1979

  15. Knockdown of hypocretin attenuates extended access of cocaine self-administration in rats.

    Science.gov (United States)

    Schmeichel, Brooke E; Matzeu, Alessandra; Koebel, Pascale; Vendruscolo, Leandro F; Sidhu, Harpreet; Shahryari, Roxana; Kieffer, Brigitte L; Koob, George F; Martin-Fardon, Rémi; Contet, Candice

    2018-04-06

    The hypocretin/orexin (HCRT) neuropeptide system regulates feeding, arousal state, stress responses, and reward, especially under conditions of enhanced motivational relevance. In particular, HCRT neurotransmission facilitates drug-seeking behavior in circumstances that demand increased effort and/or motivation to take the drug. The present study used a shRNA-encoding adeno-associated viral vector to knockdown Hcrt expression throughout the dorsal hypothalamus in adult rats and determine the role of HCRT in cocaine self-administration. Chronic Hcrt silencing did not impact cocaine self-administration under short-access conditions, but robustly attenuated cocaine intake under extended access conditions, a model that mimics key features of compulsive cocaine taking. In addition, Hcrt silencing decreased motivation for both cocaine and a highly palatable food reward (i.e., sweetened condensed milk; SCM) under a progressive ratio schedule of reinforcement, but did not alter responding for SCM under a fixed ratio schedule. Importantly, Hcrt silencing did not affect food or water consumption, and had no consequence for general measures of arousal and stress reactivity. At the molecular level, chronic Hcrt knockdown reduced the number of neurons expressing dynorphin (DYN), and to a smaller extent melanin-concentrating hormone (MCH), in the dorsal hypothalamus. These original findings support the hypothesis that HCRT neurotransmission promotes operant responding for both drug and non-drug rewards, preferentially under conditions requiring a high degree of motivation. Furthermore, the current study provides compelling evidence for the involvement of the HCRT system in cocaine self-administration also under low-effort conditions in rats allowed extended access, possibly via functional interactions with DYN and MCH signaling.

  16. Economic analysis of condition monitoring systems for offshore wind turbine sub-systems

    DEFF Research Database (Denmark)

    May, Allan; MacMillan, David; Thöns, Sebastian

    2015-01-01

    The use of condition monitoring systems on offshore wind turbines has increased dramatically in recent times. However, their use is mostly restricted to vibration based monitoring systems for the gearbox, generator and drive train. A survey of commercially available condition monitoring systems...... year life cycle. The model uses Hidden Markov Models to represent both the actual system state and the observed condition monitoring state. The CM systems are modelled to include reduced failure types, false alarms, detection rates and 6 month failure warnings. The costs for system failures are derived...... and their associated costs has been completed for the blades, drive train, tower and foundation. This paper considers what value can be obtained from integrating these additional systems into the maintenance plan. This is achieved by running simulations on an operations and maintenance model for a wind farm over a 20...

  17. Primary user localisation and uplink resource allocation in orthogonal frequency division multiple access cognitive radio systems

    KAUST Repository

    Nam, Haewoon

    2015-05-21

    In cognitive radio networks, secondary users (SUs) can share spectrum with primary users (PUs) under the condition that no interference is caused to the PUs. To evaluate the interference imposed to the PUs, the cognitive systems discussed in the literature usually assume that the channel state information (CSI) of the link from a secondary transmitter to a primary receiver (interference link) is known at the secondary transmitter. However, this assumption may often be impractical in cognitive radio systems, since the PUs need to be oblivious to the presence of the SUs. The authors first discuss PU localisation and then introduce an uplink resource allocation algorithm for orthogonal frequency division multiple access-based cognitive radio systems, where relative location information between primary and SUs is used instead of CSI of the interference link to estimate the interference. Numerical and simulation results show that it is indeed effective to use location information as a part of resource allocation and thus a near-optimal capacity is achieved. © The Institution of Engineering and Technology 2015.

  18. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments

    Directory of Open Access Journals (Sweden)

    Olusegun Folorunso

    2015-07-01

    Full Text Available Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the quality of its computation. In this paper, a combination of Trust-Based Access Control (TBAC strategy and fuzzy-expert systems was used to enhance the quality of human computation in crowdsourcing environment. A TBAC-fuzzy algorithm was developed and implemented using MATLAB 7.6.0 to compute trust value (Tvalue, priority value as evaluated by fuzzy inference system (FIS and finally generate access decision to each crowd-worker. In conclusion, the use of TBAC is feasible in improving quality of human computation in crowdsourcing environments.

  19. Effects of Job Accessibility Improved by Public Transport System: Natural Experimental Evidence from the Copenhagen Metro

    DEFF Research Database (Denmark)

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    2015-01-01

    This study examines the effect of accessibility to urban jobs via a public transport system on individual earnings and commuting behaviour. The effect of improved public transport based accessibility on these outcomes is determined by exploiting the exogenous variation in access to a public rail ...... with a change in commuting patterns as the improved access to public transport facilitates a shift from employment within the township to better paid jobs in the city centre, as well as in other suburbs of the Copenhagen Metropolitan area...

  20. Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources

    Science.gov (United States)

    Dittmann, Jana; Steinebach, Martin; Wohlmacher, Petra; Ackermann, Ralf

    2002-12-01

    Digital watermarking is well known as enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multimedia data and analyze the spread spectrum of the data over networks and servers. Research has shown that data hiding techniques can be applied successfully to other application areas like manipulations recognition. In this paper, we show our innovative approach for integrating watermark and cryptography based methods within a framework of new application scenarios spanning a wide range from dedicated and user specific services, "Try&Buy" mechanisms to general means for long-term customer relationships. The tremendous recent efforts to develop and deploy ubiquitous mobile communication possibilities are changing the demands but also possibilities for establishing new business and commerce relationships. Especially we motivate annotation watermarks and aspects of M-Commerce to show important scenarios for access control. Based on a description of the challenges of the application domain and our latest work we discuss, which methods can be used for establishing services in a fast convenient and secure way for conditional access services based on digital watermarking combined with cryptographic techniques. We introduce an example scenario for digital audio and an overview of steps in order to establish these concepts practically.

  1. Consistency conditions for data base systems: a new problem of systems analysis

    International Nuclear Information System (INIS)

    Schlageter, G.

    1976-01-01

    A data base can be seen as a model of a system in the real world. During the systems analysis conditions must be derived which guarantee a close correspondence between the real system and the data base. These conditions are called consistency constraints. The notion of consistency is analyzed; different types of consistency constraints are presented. (orig.) [de

  2. Above the nominal limit performance evaluation of multiwavelength optical code-division multiple-access systems

    Science.gov (United States)

    Inaty, Elie; Raad, Robert; Fortier, Paul; Shalaby, Hossam M. H.

    2009-03-01

    We provide an analysis for the performance of a multiwavelength optical code-division multiple-access (MW-OCDMA) network when the system is working above the nominal transmission rate limit imposed by passive encoding-decoding operation. We address the problem of overlapping in such a system and how it can directly affect the bit error rate (BER). A unified mathematical framework is presented under the assumption of one-coincidence sequences with nonrepeating wavelengths. A closed form expression of the multiple access interference limited BER is provided as a function of different system parameters. Results show that the performance of the MW-OCDMA system can be critically affected when working above the nominal limit, an event that can happen when the network operates at a high transmission rate. In addition, the impact of the derived error probability on the performance of two newly proposed medium access control (MAC) protocols, the S-ALOHA and the R3T, is also investigated. It is shown that for low transmission rates, the S-ALOHA is better than the R3T, while the R3T is better at very high transmission rates. In general, it is postulated that the R3T protocol suffers a higher delay mainly because of the presence of additional modes.

  3. Conditional density matrix: systems and subsystems in quantum mechanics

    International Nuclear Information System (INIS)

    Belokurov, V.V.; Khrustalev, O.A.; Sadovnichij, V.A.; Timofeevskaya, O.D.

    2003-01-01

    A new quantum mechanical notion - Conditional Density Matrix - is discussed and is applied to describe some physical processes. This notion is a natural generalization of von Neumann density matrix for such processes as divisions of quantum systems into subsystems and reunifications of subsystems into new joint systems. Conditional Density Matrix assigns a quantum state to a subsystem of a composite system on condition that another part of the composite system is in some pure state

  4. Techniques to Access Databases and Integrate Data for Hydrologic Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Whelan, Gene; Tenney, Nathan D.; Pelton, Mitchell A.; Coleman, Andre M.; Ward, Duane L.; Droppo, James G.; Meyer, Philip D.; Dorow, Kevin E.; Taira, Randal Y.

    2009-06-17

    This document addresses techniques to access and integrate data for defining site-specific conditions and behaviors associated with ground-water and surface-water radionuclide transport applicable to U.S. Nuclear Regulatory Commission reviews. Environmental models typically require input data from multiple internal and external sources that may include, but are not limited to, stream and rainfall gage data, meteorological data, hydrogeological data, habitat data, and biological data. These data may be retrieved from a variety of organizations (e.g., federal, state, and regional) and source types (e.g., HTTP, FTP, and databases). Available data sources relevant to hydrologic analyses for reactor licensing are identified and reviewed. The data sources described can be useful to define model inputs and parameters, including site features (e.g., watershed boundaries, stream locations, reservoirs, site topography), site properties (e.g., surface conditions, subsurface hydraulic properties, water quality), and site boundary conditions, input forcings, and extreme events (e.g., stream discharge, lake levels, precipitation, recharge, flood and drought characteristics). Available software tools for accessing established databases, retrieving the data, and integrating it with models were identified and reviewed. The emphasis in this review was on existing software products with minimal required modifications to enable their use with the FRAMES modeling framework. The ability of four of these tools to access and retrieve the identified data sources was reviewed. These four software tools were the Hydrologic Data Acquisition and Processing System (HDAPS), Integrated Water Resources Modeling System (IWRMS) External Data Harvester, Data for Environmental Modeling Environmental Data Download Tool (D4EM EDDT), and the FRAMES Internet Database Tools. The IWRMS External Data Harvester and the D4EM EDDT were identified as the most promising tools based on their ability to access and

  5. Techniques to Access Databases and Integrate Data for Hydrologic Modeling

    International Nuclear Information System (INIS)

    Whelan, Gene; Tenney, Nathan D.; Pelton, Mitchell A.; Coleman, Andre M.; Ward, Duane L.; Droppo, James G.; Meyer, Philip D.; Dorow, Kevin E.; Taira, Randal Y.

    2009-01-01

    This document addresses techniques to access and integrate data for defining site-specific conditions and behaviors associated with ground-water and surface-water radionuclide transport applicable to U.S. Nuclear Regulatory Commission reviews. Environmental models typically require input data from multiple internal and external sources that may include, but are not limited to, stream and rainfall gage data, meteorological data, hydrogeological data, habitat data, and biological data. These data may be retrieved from a variety of organizations (e.g., federal, state, and regional) and source types (e.g., HTTP, FTP, and databases). Available data sources relevant to hydrologic analyses for reactor licensing are identified and reviewed. The data sources described can be useful to define model inputs and parameters, including site features (e.g., watershed boundaries, stream locations, reservoirs, site topography), site properties (e.g., surface conditions, subsurface hydraulic properties, water quality), and site boundary conditions, input forcings, and extreme events (e.g., stream discharge, lake levels, precipitation, recharge, flood and drought characteristics). Available software tools for accessing established databases, retrieving the data, and integrating it with models were identified and reviewed. The emphasis in this review was on existing software products with minimal required modifications to enable their use with the FRAMES modeling framework. The ability of four of these tools to access and retrieve the identified data sources was reviewed. These four software tools were the Hydrologic Data Acquisition and Processing System (HDAPS), Integrated Water Resources Modeling System (IWRMS) External Data Harvester, Data for Environmental Modeling Environmental Data Download Tool (D4EM EDDT), and the FRAMES Internet Database Tools. The IWRMS External Data Harvester and the D4EM EDDT were identified as the most promising tools based on their ability to access and

  6. Existence conditions of optimal trajectories in dynamic control processes; Conditions d'existence de trajectoires optimales des processus dynamiques commandes

    Energy Technology Data Exchange (ETDEWEB)

    Bonnemay-Juricek, L [Commissariat a l' Energie Atomique, Saclay (France). Centre d' Etudes Nucleaires

    1968-07-01

    The existence of solutions in the optimal control problems with free endpoints is studied in this report and existence conditions are established without the usual assumption that the control region is convex. Furthermore the results, in order to be of some utility in physical applications, are expressed only by means of conditions on the parameters defining the system. (author) [French] Ce rapport etudie l'existence de solutions optimales dans les problemes de commande ou le point terminal est libre et ou la duree de l'evolution du systeme a optimiser est connue. Des conditions d'existence y sont formulees sans recourir a l'hypothese usuelle de convexite du domaine des valeurs des commandes. De plus on a cherche a rendre utilisables les resultats en ne faisant porter les conditions que sur les parametres directement accessibles du systeme. (auteur)

  7. Completeness and overlap in open access systems: Search engines, aggregate institutional repositories and physics-related open sources.

    Directory of Open Access Journals (Sweden)

    Ming-Yueh Tsay

    Full Text Available This study examines the completeness and overlap of coverage in physics of six open access scholarly communication systems, including two search engines (Google Scholar and Microsoft Academic, two aggregate institutional repositories (OAIster and OpenDOAR, and two physics-related open sources (arXiv.org and Astrophysics Data System. The 2001-2013 Nobel Laureates in Physics served as the sample. Bibliographic records of their publications were retrieved and downloaded from each system, and a computer program was developed to perform the analytical tasks of sorting, comparison, elimination, aggregation and statistical calculations. Quantitative analyses and cross-referencing were performed to determine the completeness and overlap of the system coverage of the six open access systems. The results may enable scholars to select an appropriate open access system as an efficient scholarly communication channel, and academic institutions may build institutional repositories or independently create citation index systems in the future. Suggestions on indicators and tools for academic assessment are presented based on the comprehensiveness assessment of each system.

  8. Massive M2M Access with Reliability Guarantees in LTE Systems

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2015-01-01

    Machine-to-Machine (M2M) communications are one of the major drivers of the cellular network evolution towards 5G systems. One of the key challenges is on how to provide reliability guarantees to each accessing device in a situation in which there is a massive number of almost-simultaneous arriva...

  9. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  10. Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System

    Institute of Scientific and Technical Information of China (English)

    Wen-Min Li; Xue-Lei Li; Qiao-Yan Wen; Shuo Zhang; Hua Zhang

    2017-01-01

    In hybrid cloud computing, encrypted data access control can provide a fine-grained access method for orga-nizations to enact policies closer to organizational policies. This paper presents an improved CP-ABE (ciphertext-policy attribute-based encryption) scheme to construct an encrypted data access control solution that is suitable for mobile users in hybrid cloud system. In our improvement, we split the original decryption keys into a control key, a secret key and a set of transformation keys. The private cloud managed by the organization administrator takes charge of updating the transformation keys using the control key. It helps to handle the situation of flexible access management and attribute alteration. Meanwhile, the mobile user's single secret key remains unchanged as well as the ciphertext even if the data user's attribute has been revoked. In addition, we modify the access control list through adding the attributes with corresponding control key and transformation keys so as to manage user privileges depending upon the system version. Finally, the analysis shows that our scheme is secure, flexible and efficient to be applied in mobile hybrid cloud computing.

  11. Multi-views storage model and access methods of conversation history in converged IP messaging system

    Science.gov (United States)

    Lu, Meilian; Yang, Dong; Zhou, Xing

    2013-03-01

    Based on the analysis of the requirements of conversation history storage in CPM (Converged IP Messaging) system, a Multi-views storage model and access methods of conversation history are proposed. The storage model separates logical views from physical storage and divides the storage into system managed region and user managed region. It simultaneously supports conversation view, system pre-defined view and user-defined view of storage. The rationality and feasibility of multi-view presentation, the physical storage model and access methods are validated through the implemented prototype. It proves that, this proposal has good scalability, which will help to optimize the physical data storage structure and improve storage performance.

  12. Open Access Intellectual Property Systems: A Comparison to Commercial Solutions in Competitive Intelligence

    Directory of Open Access Journals (Sweden)

    Jan Cerny

    2016-07-01

    Full Text Available ICT/IS management plays an important role within the framework of innovation management, and one of the key elements of this role is the support of Competitive Intelligence in the context of innovation processes. The strategic information needs of innovation management are also directed towards different kinds of intellectual property (IP information entities and commercialization. The purpose of this paper is to define these entities and IP information systems as an important part of a company’s Competitive Intelligence Unit for competitor analysis and technology trends. The open access IP information systems will be analysed together with commercial solutions.. The aim of this paper is to underline the importance of open access IP systems compared to added value commercial solutions for competitive intelligence purposes for SMEs. The comparison will be carried out using examples of patent searches within a concrete dataset.

  13. EMODnet Physics: One-stop Portal to access Multiplatform Observing Systems

    Science.gov (United States)

    Novellino, Antonio; Benedetti, Giacomo; D'Angelo, Paolo; Gorringe, Patrick; Thjisse, Peter; Schaap, Dick; Pouliquen, Sylvie; Manzella, Giuseppe

    2016-04-01

    The EMODnet Physics is being developed through a stepwise approach in three major stages and is currently in its second phase of development (2013 - 2016). It is a one-stop portal to access to near real time and historical achieved data sets. It provides a combined array of services and functionalities (such as dynamic map facility for viewing and downloading, dashboard reporting and machine-to-machine communication services) to users for obtaining free of charge data, meta-data and data products on the physical conditions of European sea basins and oceans. Moreover, the system provides full interoperability with third-party software through WMS service, Web Service and Web catalogues in order to exchange data and products according to the most recent standards. In particular, interoperability is assured with the IODE Ocean Data Portal with which EMODnet Physics is collaborating. EMODnet Physics is built on and it is working in coordination and cooperation EuroGOOS-ROOSs, CMEMS and the SeaDataNet network of NODCs. By means of joint activities with its three pillars and with the most relevant Organizations and associations within the sector, EMODnet is undergoing significant improvements and expansion. In the last year, EMODnet Physics has steadily enhanced the number and type of platforms covered providing high quality data integrating sources from a growing network. In particular, a major step forward sees the integration of emerging measuring systems such as HF radars, which are able to provide the resolution of surface current speeds and directions covering large regions of the coastal oceans, and that now do populate the EMODnet Platform. Nowadays the system does integrate information by more than 7.300 stations, among which 2915 moorings, 2728 drifting buoys and around 1200 ARGO floats. EMODnet Physics was also updated with two ready-to-use data products: the Ice (Copernicus CMEMS - SEAICE_GLO_SEAICE_L4_NRT_OBSERVATIONS_011_001) and Sea Level Trends (produced

  14. Access to Services, Quality of Care, and Family Impact for Children with Autism, Other Developmental Disabilities, and Other Mental Health Conditions

    Science.gov (United States)

    Vohra, Rini; Madhavan, Suresh; Sambamoorthi, Usha; St Peter, Claire

    2014-01-01

    This cross-sectional study examined perceived access to services, quality of care, and family impact reported by caregivers of children aged 3-17 years with autism spectrum disorders, as compared to caregivers of children with other developmental disabilities and other mental health conditions. The 2009-2010 National Survey of Children with…

  15. Multi-level access control in the data pipeline of the international supply chain system

    NARCIS (Netherlands)

    Pruksasri, P.; Berg, J. van den; Hofman, W.; Daskapan, S.

    2013-01-01

    The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to

  16. Necessary conditions for super-integrability of Hamiltonian systems

    Energy Technology Data Exchange (ETDEWEB)

    Maciejewski, Andrzej J. [Institute of Astronomy, University of Zielona Gora, Podgorna 50, PL-65-246 Zielona Gora (Poland)], E-mail: maciejka@astro.ia.uz.zgora.pl; Przybylska, Maria [Torun Centre for Astronomy, N. Copernicus University, Gagarina 11, PL-87-100 Torun (Poland)], E-mail: maria.przybylska@astri.uni.torun.pl; Yoshida, Haruo [National Astronomical Observatory, 2-21-1 Osawa, Mitaka, 181-8588 Tokyo (Japan)], E-mail: h.yoshida@nao.ac.jp

    2008-08-18

    We formulate a general theorem which gives a necessary condition for the maximal super-integrability of a Hamiltonian system. This condition is expressed in terms of properties of the differential Galois group of the variational equations along a particular solution of the considered system. An application of this general theorem to natural Hamiltonian systems of n degrees of freedom with a homogeneous potential gives easily computable and effective necessary conditions for the super-integrability. To illustrate an application of the formulated theorems, we investigate: three known families of integrable potentials, and the three body problem on a line.

  17. Surface free energy for systems with integrable boundary conditions

    International Nuclear Information System (INIS)

    Goehmann, Frank; Bortz, Michael; Frahm, Holger

    2005-01-01

    The surface free energy is the difference between the free energies for a system with open boundary conditions and the same system with periodic boundary conditions. We use the quantum transfer matrix formalism to express the surface free energy in the thermodynamic limit of systems with integrable boundary conditions as a matrix element of certain projection operators. Specializing to the XXZ spin-1/2 chain we introduce a novel 'finite temperature boundary operator' which characterizes the thermodynamical properties of surfaces related to integrable boundary conditions

  18. A federated capability-based access control mechanism for internet of things (IoTs)

    Science.gov (United States)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  19. The ESPRIT project CAFE : high security digital payment systems

    NARCIS (Netherlands)

    Boly, J.P.; Bosselaers, A.; Cramer, R.; Michelsen, R.; Mjølsnes, S.F.; Muller, F.; Pedersen, T.P.; Pfitzmann, B.; Rooij, de P.; Schoenmakers, B.; Schunter, M.; Vallée, L.; Waidner, M.; Gollmann, D.

    1994-01-01

    CAFE (“Conditional Access for Europe”) is an ongoing project in the European Community's ESPRIT program. The goal of CAFE is to develop innovative systems for conditional access, and in particular, digital payment systems. An important aspect of CAFE is high security of all parties concerned, with

  20. Air conditioning system with supplemental ice storing and cooling capacity

    Science.gov (United States)

    Weng, Kuo-Lianq; Weng, Kuo-Liang

    1998-01-01

    The present air conditioning system with ice storing and cooling capacity can generate and store ice in its pipe assembly or in an ice storage tank particularly equipped for the system, depending on the type of the air conditioning system. The system is characterized in particular in that ice can be produced and stored in the air conditioning system whereby the time of supplying cooled air can be effectively extended with the merit that the operation cycle of the on and off of the compressor can be prolonged, extending the operation lifespan of the compressor in one aspect. In another aspect, ice production and storage in great amount can be performed in an off-peak period of the electrical power consumption and the stored ice can be utilized in the peak period of the power consumption so as to provide supplemental cooling capacity for the compressor of the air conditioning system whereby the shift of peak and off-peak power consumption can be effected with ease. The present air conditioning system can lower the installation expense for an ice-storing air conditioning system and can also be applied to an old conventional air conditioning system.

  1. National Geothermal Data System (USA): an Exemplar of Open Access to Data

    Science.gov (United States)

    Allison, M. Lee; Richard, Stephen; Blackman, Harold; Anderson, Arlene; Patten, Kim

    2014-05-01

    The National Geothermal Data System's (NGDS - www.geothermaldata.org) formal launch in April, 2014 will provide open access to millions of data records, sharing -relevant geoscience and longer term to land use data to propel geothermal development and production. NGDS serves information from all of the U.S. Department of Energy's sponsored development and research projects and geologic data from all 50 states, using free and open source software. This interactive online system is opening new exploration opportunities and potentially shortening project development by making data easily discoverable, accessible, and interoperable. We continue to populate our prototype functional data system with multiple data nodes and nationwide data online and available to the public. Data from state geological surveys and partners includes more than 6 million records online, including 1.72 million well headers (oil and gas, water, geothermal), 670,000 well logs, and 497,000 borehole temperatures and is growing rapidly. There are over 312 interoperable Web services and another 106 WMS (Web Map Services) registered in the system as of January, 2014. Companion projects run by Southern Methodist University and U.S. Geological Survey (USGS) are adding millions of additional data records. The DOE Geothermal Data Repository, currently hosted on OpenEI, is a system node and clearinghouse for data from hundreds of U.S. DOE-funded geothermal projects. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG). NGDS complies with the White House Executive Order of May 2013, requiring all federal agencies to make their data holdings publicly accessible online in open source, interoperable formats with common core and extensible metadata. The National Geothermal Data System is being designed, built, deployed, and populated primarily with support from the US

  2. Computer Model to Estimate Reliability Engineering for Air Conditioning Systems

    International Nuclear Information System (INIS)

    Afrah Al-Bossly, A.; El-Berry, A.; El-Berry, A.

    2012-01-01

    Reliability engineering is used to predict the performance and optimize design and maintenance of air conditioning systems. Air conditioning systems are expose to a number of failures. The failures of an air conditioner such as turn on, loss of air conditioner cooling capacity, reduced air conditioning output temperatures, loss of cool air supply and loss of air flow entirely can be due to a variety of problems with one or more components of an air conditioner or air conditioning system. Forecasting for system failure rates are very important for maintenance. This paper focused on the reliability of the air conditioning systems. Statistical distributions that were commonly applied in reliability settings: the standard (2 parameter) Weibull and Gamma distributions. After distributions parameters had been estimated, reliability estimations and predictions were used for evaluations. To evaluate good operating condition in a building, the reliability of the air conditioning system that supplies conditioned air to the several The company's departments. This air conditioning system is divided into two, namely the main chilled water system and the ten air handling systems that serves the ten departments. In a chilled-water system the air conditioner cools water down to 40-45 degree F (4-7 degree C). The chilled water is distributed throughout the building in a piping system and connected to air condition cooling units wherever needed. Data analysis has been done with support a computer aided reliability software, this is due to the Weibull and Gamma distributions indicated that the reliability for the systems equal to 86.012% and 77.7% respectively. A comparison between the two important families of distribution functions, namely, the Weibull and Gamma families was studied. It was found that Weibull method performed for decision making.

  3. Reduction of the near-far effect in mobile communication systems with Code-Division Multiple-Access

    Science.gov (United States)

    Purchla, Magdalena

    2006-02-01

    In this paper the basic methods for reducing Multiple Access Interference (MAI) and combating the near-far effect in Direct-Sequence Code-Division Multiple-Access (DS-CDMA) mobile communication systems are presented. MAI and the near-far effect are inevitable in DS-CDMA systems with quasi-orthogonal spreading sequences. An effective method of reducing MAI can increase the capacity of the system that is why so many researchers are working in this field. In this article three most important techniques of decreasing MAI are presented: power control, multiuser detection and space-time processing. There is a short introduction to each topic and one or more examples found in literature of algorithms suitable for practical applications (although not all algorithms are yet used in existing systems).

  4. Providing Internet Access to the Ohio Career Information System for All Residents: A Feasibility Study.

    Science.gov (United States)

    Lewis, Morgan V.

    Expanded Internet access to the Ohio Career Information System (OCIS) would provide adults in Ohio who need to or wish to make career changes with the best available information about occupations, education and training programs, and financial aid. In order to determine the feasibility of improving access without cost to users, an advisory group,…

  5. Synergies in the Asian energy system: Climate change, energy security, energy access and air pollution

    International Nuclear Information System (INIS)

    Vliet, Oscar van; Krey, Volker; McCollum, David; Pachauri, Shonali; Nagai, Yu; Rao, Shilpa; Riahi, Keywan

    2012-01-01

    We use the MESSAGE model to examine multiple dimensions of sustainable development for three Asian regions in a set of scenarios developed for the Asian Modelling Exercise. Using climate change mitigation as a starting point for the analysis, we focus on the interaction of climate and energy with technology choice, energy security, energy access, and air pollution, which often have higher policy priority than climate change. Stringent climate policies drive the future energy supply in Asia from being dominated by coal and oil to a more diversified system based mostly on natural gas, coal with CCS, nuclear and renewable energy. The increase in diversity helps to improve the energy security of individual countries and regions. Combining air pollution control policies and universal energy access policies with climate policy can further help to reduce both outdoor and indoor air pollution related health impacts. Investments into the energy system must double by 2030 to achieve stringent climate goals, but are largely offset by lower costs for O and M and air pollution abatement. Strong focus on end-use efficiency also helps lowering overall total costs and allows for limiting or excluding supply side technologies from the mitigation portfolio. Costs of additional energy access policies and measures are a small fraction of total energy system costs. - Highlights: ► Half of added investments in energy offset by lower costs for O and M and air pollution. ► Costs for achieving universal energy access much smaller than energy system costs. ► Combined emissions and access policies further reduce air pollution impacts on health. ► Strong focus on end-use efficiency allows for more flexibility on energy sources. ► Stringent climate policy can improve energy security of Asian regions.

  6. Polarization diversity scheme on spectral polarization coding optical code-division multiple-access network

    Science.gov (United States)

    Yen, Chih-Ta; Huang, Jen-Fa; Chang, Yao-Tang; Chen, Bo-Hau

    2010-12-01

    We present an experiment demonstrating the spectral-polarization coding optical code-division multiple-access system introduced with a nonideal state of polarization (SOP) matching conditions. In the proposed system, the encoding and double balanced-detection processes are implemented using a polarization-diversity scheme. Because of the quasiorthogonality of Hadamard codes combining with array waveguide grating routers and a polarization beam splitter, the proposed codec pair can encode-decode multiple code words of Hadamard code while retaining the ability for multiple-access interference cancellation. The experimental results demonstrate that when the system is maintained with an orthogonal SOP for each user, an effective reduction in the phase-induced intensity noise is obtained. The analytical SNR values are found to overstate the experimental results by around 2 dB when the received effective power is large. This is mainly limited by insertion losses of components and a nonflattened optical light source. Furthermore, the matching conditions can be improved by decreasing nonideal influences.

  7. AcconPred: Predicting Solvent Accessibility and Contact Number Simultaneously by a Multitask Learning Framework under the Conditional Neural Fields Model

    Directory of Open Access Journals (Sweden)

    Jianzhu Ma

    2015-01-01

    Full Text Available Motivation. The solvent accessibility of protein residues is one of the driving forces of protein folding, while the contact number of protein residues limits the possibilities of protein conformations. The de novo prediction of these properties from protein sequence is important for the study of protein structure and function. Although these two properties are certainly related with each other, it is challenging to exploit this dependency for the prediction. Method. We present a method AcconPred for predicting solvent accessibility and contact number simultaneously, which is based on a shared weight multitask learning framework under the CNF (conditional neural fields model. The multitask learning framework on a collection of related tasks provides more accurate prediction than the framework trained only on a single task. The CNF method not only models the complex relationship between the input features and the predicted labels, but also exploits the interdependency among adjacent labels. Results. Trained on 5729 monomeric soluble globular protein datasets, AcconPred could reach 0.68 three-state accuracy for solvent accessibility and 0.75 correlation for contact number. Tested on the 105 CASP11 domain datasets for solvent accessibility, AcconPred could reach 0.64 accuracy, which outperforms existing methods.

  8. 75 FR 4101 - Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior...

    Science.gov (United States)

    2010-01-26

    ... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5376-N-05] Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior and User Agreement AGENCY... Access, Authorization Form and Rules Of Behavior and User Agreement. OMB Approval Number: 2577-New. Form...

  9. Existence conditions of optimal trajectories in dynamic control processes; Conditions d'existence de trajectoires optimales des processus dynamiques commandes

    Energy Technology Data Exchange (ETDEWEB)

    Bonnemay-Juricek, L. [Commissariat a l' Energie Atomique, Saclay (France). Centre d' Etudes Nucleaires

    1968-07-01

    The existence of solutions in the optimal control problems with free endpoints is studied in this report and existence conditions are established without the usual assumption that the control region is convex. Furthermore the results, in order to be of some utility in physical applications, are expressed only by means of conditions on the parameters defining the system. (author) [French] Ce rapport etudie l'existence de solutions optimales dans les problemes de commande ou le point terminal est libre et ou la duree de l'evolution du systeme a optimiser est connue. Des conditions d'existence y sont formulees sans recourir a l'hypothese usuelle de convexite du domaine des valeurs des commandes. De plus on a cherche a rendre utilisables les resultats en ne faisant porter les conditions que sur les parametres directement accessibles du systeme. (auteur)

  10. Design and Implementation of a Web-based Monitoring System by using EPICS Channel Access Protocol

    International Nuclear Information System (INIS)

    An, Eun Mi; Song, Yong Gi

    2009-01-01

    Proton Engineering Frontier Project (PEFP) has developed a 20MeV proton accelerator, and established a distributed control system based on EPICS for sub-system components such as vacuum unit, beam diagnostics, and power supply system. The control system includes a real-time monitoring and alarm functions. From the aspect of a efficient maintenance of a control system and a additional extension of subsystems, EPICS software framework was adopted. In addition, a control system should be capable of providing an easy access for users and a real-time monitoring on a user screen. Therefore, we have implemented a new web-based monitoring server with several libraries. By adding DB module, the new IOC web monitoring system makes it possible to monitor the system through the web. By integrating EPICS Channel Access (CA) and Database libraries into a Database module, the web-based monitoring system makes it possible to monitor the sub-system status through user's internet browser. In this study, we developed a web based monitoring system by using EPICS IOC (Input Output Controller) with IBM server

  11. Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example

    Directory of Open Access Journals (Sweden)

    Line Neerup Handlos

    2016-09-01

    Full Text Available Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption.

  12. Return Migrants’ Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example

    Science.gov (United States)

    Neerup Handlos, Line; Fog Olwig, Karen; Bygbjerg, Ib Christian; Norredam, Marie

    2016-01-01

    Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants’ access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption. PMID:27657096

  13. Return Migrants' Experience of Access to Care in Corrupt Healthcare Systems: The Bosnian Example.

    Science.gov (United States)

    Neerup Handlos, Line; Fog Olwig, Karen; Bygbjerg, Ib Christian; Norredam, Marie

    2016-09-19

    Equal and universal access to healthcare services is a core priority for a just health system. A key societal determinant seen to create inequality in access to healthcare is corruption in the healthcare system. How return migrants' access to healthcare is affected by corruption is largely unstudied, even though return migrants may be particularly vulnerable to problems related to corruption due to their period of absence from their country of origin. This article investigates how corruption in the healthcare sector affects access to healthcare for refugees who repatriated to Bosnia, a country with a high level of corruption, from Denmark, a country with a low level of corruption. The study is based on 18 semi-structured interviews with 33 refugees who returned after long-term residence in Denmark. We found that the returned refugees faced greater problems with corruption than was the case for those who had not left the country, as doctors considered them to be better endowed financially and therefore demanded larger bribes from them than they did from those who had remained in Bosnia. Moreover, during their stay abroad the returnees had lost the connections that could have helped them sidestep the corruption. Returned refugees are thus particularly vulnerable to the effects of corruption.

  14. 76 FR 65105 - Special Conditions: Gulfstream Aerospace Corporation, Model GIV-X Airplane; Isolation or Aircraft...

    Science.gov (United States)

    2011-10-20

    ...-1140; Special Conditions No. 25-450-SC] Special Conditions: Gulfstream Aerospace Corporation, Model GIV-X Airplane; Isolation or Aircraft Electronic System Security Protection From Unauthorized Internal Access AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Final special conditions; request for...

  15. Multigigabit W-Band (75–110 GHz) Bidirectional Hybrid Fiber-Wireless Systems in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Lebedev, Alexander; Vegas Olmos, Juan José

    2014-01-01

    compare the transmission performances in terms of achievable wireless distances with and without using a high-frequency electrical power amplifier at the wireless transmitter. A downlink 16-Gbit/s QPSK signal and an uplink 1.25-Gbit/s ASK signal transmission over the two implementations are experimentally......We experimentally demonstrate multigigabit capacity bidirectional hybrid fiber-wireless systems with RF carrier frequencies at the W-band (75-110 GHz) that enables the seamless convergence between wireless and fiber-optic data transmission systems in access networks. In this study, we evaluate...... the transmission performances in two scenarios: a fiber-wireless access link that directly provide high-speed connections to wireless end users, and a fiber-wireless-fiber signal relay where a high capacity wireless link can be used to bridge two access fiber spans over physical obstacles. In both scenarios, we...

  16. Direct data access protocols benchmarking on DPM

    Science.gov (United States)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  17. The Principle of Non-Refoulement and Access to Asylum System: Two Sides of the Same Coin

    Directory of Open Access Journals (Sweden)

    Goranka Lalić Novak

    2015-12-01

    Full Text Available The European Union and other countries on the Balkan route for migrants have recorded a large increase in the number of asylum seekers. In parallel with the increased number of refugees trying to enter the territory of the EU, measures for migration management have tightened, and the right to asylum at the level of the Member States has been interpreted more and more restrictive. Search for protection from persecution has become a reason for closing borders and disabling access to territory and asylum system. However, access to asylum system is the first step in the realization of the right to asylum as guaranteed by international, European and national law. In addition to allowing access to territory and asylum system, which implies an obligation of states to accept refugees in order to confirm the need for international protection in a fair and efficient procedure, the states are obliged to respect the principle of non-refoulement. The aim of this paper is to clarify the connection between providing access to asylum system and respect for the principle of non-refoulement. Analysis in the paper was done by legal-dogmatic method of research and interpretation of legal acts and other authorities, as well as of UNHCR relevant recommendations and documents. The assumption is that without the provision of access to territory and asylum system the principle of non-refoulement cannot be respected. Apart from the international refugee law and doctrinal interpretations, it derives from the practice of the European Court of Human Rights regarding the prohibition of torture or other inhuman treatment or punishment guaranteed by the Convention for the Protection of Human Rights and Fundamental Freedoms. The conclusion is that the states must take into account international and European standards regarding the protection of the principle of non-refoulement when considering the introduction of new measures to manage migration movements.

  18. Intelligent Access to Sequence and Structure Databases (IASSD) - an interface for accessing information from major web databases.

    Science.gov (United States)

    Ganguli, Sayak; Gupta, Manoj Kumar; Basu, Protip; Banik, Rahul; Singh, Pankaj Kumar; Vishal, Vineet; Bera, Abhisek Ranjan; Chakraborty, Hirak Jyoti; Das, Sasti Gopal

    2014-01-01

    With the advent of age of big data and advances in high throughput technology accessing data has become one of the most important step in the entire knowledge discovery process. Most users are not able to decipher the query result that is obtained when non specific keywords or a combination of keywords are used. Intelligent access to sequence and structure databases (IASSD) is a desktop application for windows operating system. It is written in Java and utilizes the web service description language (wsdl) files and Jar files of E-utilities of various databases such as National Centre for Biotechnology Information (NCBI) and Protein Data Bank (PDB). Apart from that IASSD allows the user to view protein structure using a JMOL application which supports conditional editing. The Jar file is freely available through e-mail from the corresponding author.

  19. The NASA Astrophysics Data System Free Access to the Astronomical Literature On-Line and through Email

    CERN Document Server

    Eichhorn, G; Grant, C S; Kurtz, M J; Murray, S S

    2001-01-01

    The Astrophysics Data System (ADS) provides access to the astronomical literature through the World Wide Web. It is a NASA funded project and access to all the ADS services is free to everybody world-wide.The ADS Abstract Service allows the searching of four databases with abstracts in Astronomy, Instrumentation, Physics/Geophysics, and the LANL Preprints with a total of over 2.2 million references. The system also provides access to reference and citation information, links to on-line data, electronic journal articles, and other on-line information. The ADS Article Service contains the articles for most of the astronomical literature back to volume 1. It contains the scanned pages of all the major journals (Astrophysical Journal, Astronomical Journal, Astronomy & Astrophysics, Monthly Notices of the Royal Astronomical Society, and Solar Physics), as well as most smaller journals back to volume 1. The ADS can be accessed through any web browser without signup or login. Alternatively an email interface is ...

  20. Professional Access 2013 programming

    CERN Document Server

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  1. Access control and interlock system at the Advanced Photon Source

    International Nuclear Information System (INIS)

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D.

    1997-01-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS's design philosophy, configuration, hardware, functionality, validation requirements, and operational experience

  2. Design and Implementation of File Access and Control System Based on Dynamic Web

    Institute of Scientific and Technical Information of China (English)

    GAO Fuxiang; YAO Lan; BAO Shengfei; YU Ge

    2006-01-01

    A dynamic Web application, which can help the departments of enterprise to collaborate with each other conveniently, is proposed. Several popular design solutions are introduced at first. Then, dynamic Web system is chosen for developing the file access and control system. Finally, the paper gives the detailed process of the design and implementation of the system, which includes some key problems such as solutions of document management and system security. Additionally, the limitations of the system as well as the suggestions of further improvement are also explained.

  3. 28 CFR 16.71 - Exemption of the Office of the Deputy Attorney General System-limited access.

    Science.gov (United States)

    2010-07-01

    ... Attorney General System-limited access. 16.71 Section 16.71 Judicial Administration DEPARTMENT OF JUSTICE....71 Exemption of the Office of the Deputy Attorney General System—limited access. (a) The following... of the Office of the Deputy Attorney General (JUSTICE/DAG-013). (d) In addition, the Drug Enforcement...

  4. There Are Many Purposes for Conditional Incentives to Accessing Healthcare; Comment on “Denial of Treatment to Obese Patients—the Wrong Policy on Personal Responsibility for Health”

    Directory of Open Access Journals (Sweden)

    Sridhar Venkatapuram

    2013-01-01

    Full Text Available This commentary is a brief response to Nir Eyal’s argument that health policies should not make healthy behaviour a condition or prerequisite in order to access healthcare as it could result in the people who need healthcare the most not being able to access healthcare. While in general agreement due to the shared concern for equity, I argue that making health behaviour a condition to accessing healthcare can serve to develop commitment to lifestyle changes, make the health intervention more successful, help appreciate the value of the resources being spent, and help reflect on the possible risks of the intervention. I also argue that exporting or importing the carrot and stick policies to other countries without a solid understanding of the fiscal and political context of the rise of such policies in the US can lead to perverse consequences.

  5. Ventilation and air-conditioning system for PWR nuclear power plant

    International Nuclear Information System (INIS)

    Ohmoto, Kenji

    1987-01-01

    This report outlines the ventilation and air conditioning facilities for PWR nuclear power plant as well as design re-evaluation and optimization of ventilation and air-conditioning. The primary PWR installations are generally housed in the nuclear reactor building, auxiliary buildings and control building, which are equipped with their own ventilation and air-conditioning systems to serve for their specific purposes. A ventilation/air-conditioning system should be able to work effectively not only for maintaining the ordinary reactor operation but also for controlling the environmental temperature in the event of an accident. Designing of a ventilation/air-conditioning system relied on empirical data in the past, but currently it is performed based on information obtained from various analyses to optimize the system configuration and ventilation capacity. Design re-evaluation of ventilation/air-conditioning systems are conducted widely in various areas, aiming at the integration of safety systems, optimum combination of air-cooling and water-cooling systems, and optimization of the ventilation rate for controlling the concentrations of radioactive substances in the atmosphere in the facilities. It is pointed out that performance evaluation of ventilation/air-conditioning systems, which has been conducted rather macroscopically, should be carried out more in detal in the future to determine optimum air streams and temperature distribution. (Nogami, K.)

  6. The condition monitoring system of turbine system components for nuclear power plants

    International Nuclear Information System (INIS)

    Ono, Shigetoshi

    2013-01-01

    The thermal and nuclear power plants have been imposed a stable supply of electricity. To certainly achieve this, we built the plant condition monitoring system based on the heat and mass balance calculation. If there are some performance changes on the turbine system components of their power plants, the heat and mass balance of the turbine system will change. This system has ability to detect the abnormal signs of their components by finding the changes of the heat and mass balance. Moreover we note that this system is built for steam turbine cycle operating with saturated steam conditions. (author)

  7. Asset Condition, Information Systems and Decision Models

    CERN Document Server

    Willett, Roger; Brown, Kerry; Mathew, Joseph

    2012-01-01

    Asset Condition, Information Systems and Decision Models, is the second volume of the Engineering Asset Management Review Series. The manuscripts provide examples of implementations of asset information systems as well as some practical applications of condition data for diagnostics and prognostics. The increasing trend is towards prognostics rather than diagnostics, hence the need for assessment and decision models that promote the conversion of condition data into prognostic information to improve life-cycle planning for engineered assets. The research papers included here serve to support the on-going development of Condition Monitoring standards. This volume comprises selected papers from the 1st, 2nd, and 3rd World Congresses on Engineering Asset Management, which were convened under the auspices of ISEAM in collaboration with a number of organisations, including CIEAM Australia, Asset Management Council Australia, BINDT UK, and Chinese Academy of Sciences, Beijing University of Chemical Technology, Chin...

  8. Electrical impedance tomography system: an open access circuit design

    Directory of Open Access Journals (Sweden)

    Soleimani Manuchehr

    2006-05-01

    Full Text Available Abstract Background This paper reports a simple 2-D system for electrical impedance tomography EIT, which works efficiently and is low cost. The system has been developed in the Sharif University of Technology Tehran-Iran (for the author's MSc Project. Methods The EIT system consists of a PC in which an I/O card is installed with an external current generator, a multiplexer, a power supply and a phantom with an array of electrodes. The measurement system provides 12-bit accuracy and hence, suitable data acquisition software has been prepared accordingly. The synchronous phase detection method has been implemented for voltage measurement. Different methods of image reconstruction have been used with this instrument to generate electrical conductivity images. Results The results of simulation and real measurement of the system are presented. The reconstruction programs were written in MATLAB and the data acquisition software in C++. The system has been tested with both static and dynamic mode in a 2-D domain. Better results have been produced in the dynamic mode of operation, due to the cancellation of errors. Conclusion In the spirit of open access publication the design details of this simple EIT system are made available here.

  9. Evaluation on the Occupational Information Access System as Used at Churchill High School. A Project Report.

    Science.gov (United States)

    McKinlay, Bruce; Adams, Daniel

    The Occupational Information Access System (OIAS) improves the accessibility of occupational labor market information for career planning. Its operation at Churchill High School is evaluated from several angels: the likes and dislikes of users; the effect of OIAS on users' knowledge of occupational information and on their career plans; why other…

  10. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  11. Assessing the impact of a medical image access system

    Science.gov (United States)

    McNeill, Kevin M.; Maloney, Kris; Parra, Miguel V.; Ovitt, Theron W.; Dallas, William J.

    1994-05-01

    We have developed and installed a Medical Image Access System in an intensive care unit. Images are acquired and transmitted automatically to this system, thus expanding on the previous results of Shile et. al. It is our goal to determine what effect regular, sustained availability of image data in the clinic has on the Intensive Care Unit and the Department of Radiology. Our system is installed and has been in regular use in the hospital since late August of 1993. Since the time of installation we have been collecting usage information from both the manual and automated systems. From this data we are performing the standard measures established by DeSimone et. al. Our initial results support the original findings that image availability in the clinic leads to earlier patient care decision based on the image data. However, our findings do not seem to indicate that there is a breakdown of communication between the clinician and the radiologist as a result of the use of the clinical display system. In addition to the established measure we are investigating other criteria to measure time saved by both the clinician and radiologist. The results are reported in this paper.

  12. Flexible Access Control for Dynamic Collaborative Environments

    NARCIS (Netherlands)

    Dekker, M.A.C.

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect

  13. Complementary role of two evaluation methods in the usability and accessibility evaluation of a non-standard system

    CSIR Research Space (South Africa)

    Adebesin, F

    2010-10-01

    Full Text Available and used by people with varying abilities. Although accessibility concerns are aimed at making systems usable for people with disabilities, support for direct accessibility, the built-in redundancies in an application that enable as many people as possible...

  14. Conditional symmetries for systems of PDEs: new definitions and their application for reaction-diffusion systems

    International Nuclear Information System (INIS)

    Cherniha, Roman

    2010-01-01

    New definitions of Q-conditional symmetry for systems of PDEs are presented, which generalize the standard notation of non-classical (conditional) symmetry. It is shown that different types of Q-conditional symmetry of a system generate a hierarchy of conditional symmetry operators. A class of two-component nonlinear reaction-diffusion systems is examined to demonstrate the applicability of the definitions proposed and it is shown when different definitions of Q-conditional symmetry lead to the same operators.

  15. Access to medication in the Public Health System and equity: populational health surveys in São Paulo, Brazil.

    Science.gov (United States)

    Monteiro, Camila Nascimento; Gianini, Reinaldo José; Barros, Marilisa Berti de Azevedo; Cesar, Chester Luiz Galvão; Goldbaum, Moisés

    2016-03-01

    Since 2003, the access to medication has been increasing in Brazil and particularly in São Paulo. The present study aimed to analyze the access to medication obtained in the public sector and the socioeconomic differences in this access in 2003 and 2008. Also, we explored the difference in access to medication from 2003 to 2008. Data were obtained from two cross-sectional population-based household surveys from São Paulo, Brazil (ISA-Capital 2003 and ISA-Capital 2008). Concentration curve and concentration index were calculated to analyze the associations between socioeconomic factors and access to medication in the public sector. Additionally, the differences between 2003 and 2008 regarding socioeconomic characteristics and access to medication were studied. Access to medication was 89.55% in 2003 and 92.99% in 2008, and the proportion of access to medication did not change in the period. Access in the public sector increased from 26.40% in 2003 to 48.55% in 2008 and there was a decrease in the concentration index between 2003 and 2008 in access to medication in the public sector. The findings indicate an expansion of Brazilian Unified Health System (Sistema Único de Saúde ) users, with the inclusion of people of higher socioeconomic position in the public sector. As the SUS gives more support to people of lower socioeconomic position in terms of medication provision, the SUS tends to equity. Nevertheless, universal coverage for medication and equity in access to medication in the public sector are still challenges for the Brazilian public health system.

  16. Design of a control system for self-shielded irradiators with remote access capability

    International Nuclear Information System (INIS)

    Iyengar, R.D.; Verma, P.B.; Prasad, V.V.S.S.; George, Jain R.; Das, Tripti; Deshmukh, D.K.

    2001-01-01

    With self-shielded irradiators like Gamma chambers, and Blood irradiators are being sold by BRIT to customers both within and outside the country, it has become necessary to improve the quality of service without increasing the overheads. The recent advances in the field of communications and information technology can be exploited for improving the quality of service to the customers. A state of the art control system with remote accessibility has been designed for these irradiators enhancing their performance. This will provide an easy access to these units wherever they might be located, through the Internet. With this technology it will now be possible to attend to the needs of the customers, as regards fault rectification, error debugging, system software update, performance testing, data acquisition etc. This will not only reduce the downtime of these irradiators but also reduce the overheads. (author)

  17. Beat Noise Cancellation in 2-D Optical Code-Division Multiple-Access Systems Using Optical Hard-Limiter Array

    Science.gov (United States)

    Dang, Ngoc T.; Pham, Anh T.; Cheng, Zixue

    We analyze the beat noise cancellation in two-dimensional optical code-division multiple-access (2-D OCDMA) systems using an optical hard-limiter (OHL) array. The Gaussian shape of optical pulse is assumed and the impact of pulse propagation is considered. We also take into account the receiver noise and multiple access interference (MAI) in the analysis. The numerical results show that, when OHL array is employed, the system performance is greatly improved compared with the cases without OHL array. Also, parameters needed for practical system design are comprehensively analyzed.

  18. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-08-06

    ... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright... nonsubstantial correction to its regulation announcing the prohibition against circumvention of technological... the final rule governing exemption to prohibition on circumvention of copyright protection systems for...

  19. Center conditions and limit cycles for BiLienard systems

    Directory of Open Access Journals (Sweden)

    Jaume Gine

    2017-03-01

    Full Text Available In this article we study the center problem for polynomial BiLienard systems of degree n. Computing the focal values and using Grobner bases we find the center conditions for such systems for n=6. We also establish a conjecture about the center conditions for polynomial BiLienard systems of arbitrary degree.

  20. Notified Access: Extending Remote Memory Access Programming Models for Producer-Consumer Synchronization

    KAUST Repository

    Belli, Roberto; Hoefler, Torsten

    2015-01-01

    Remote Memory Access (RMA) programming enables direct access to low-level hardware features to achieve high performance for distributed-memory programs. However, the design of RMA programming schemes focuses on the memory access and less on the synchronization. For example, in contemporary RMA programming systems, the widely used producer-consumer pattern can only be implemented inefficiently, incurring in an overhead of an additional round-trip message. We propose Notified Access, a scheme where the target process of an access can receive a completion notification. This scheme enables direct and efficient synchronization with a minimum number of messages. We implement our scheme in an open source MPI-3 RMA library and demonstrate lower overheads (two cache misses) than other point-to-point synchronization mechanisms for each notification. We also evaluate our implementation on three real-world benchmarks, a stencil computation, a tree computation, and a Colicky factorization implemented with tasks. Our scheme always performs better than traditional message passing and other existing RMA synchronization schemes, providing up to 50% speedup on small messages. Our analysis shows that Notified Access is a valuable primitive for any RMA system. Furthermore, we provide guidance for the design of low-level network interfaces to support Notified Access efficiently.

  1. Notified Access: Extending Remote Memory Access Programming Models for Producer-Consumer Synchronization

    KAUST Repository

    Belli, Roberto

    2015-05-01

    Remote Memory Access (RMA) programming enables direct access to low-level hardware features to achieve high performance for distributed-memory programs. However, the design of RMA programming schemes focuses on the memory access and less on the synchronization. For example, in contemporary RMA programming systems, the widely used producer-consumer pattern can only be implemented inefficiently, incurring in an overhead of an additional round-trip message. We propose Notified Access, a scheme where the target process of an access can receive a completion notification. This scheme enables direct and efficient synchronization with a minimum number of messages. We implement our scheme in an open source MPI-3 RMA library and demonstrate lower overheads (two cache misses) than other point-to-point synchronization mechanisms for each notification. We also evaluate our implementation on three real-world benchmarks, a stencil computation, a tree computation, and a Colicky factorization implemented with tasks. Our scheme always performs better than traditional message passing and other existing RMA synchronization schemes, providing up to 50% speedup on small messages. Our analysis shows that Notified Access is a valuable primitive for any RMA system. Furthermore, we provide guidance for the design of low-level network interfaces to support Notified Access efficiently.

  2. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  3. Accessibility

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2017-01-01

    This contribution is timely as it addresses accessibility in regards system hardware and software aligned with introduction of the Twenty-First Century Communications and Video Accessibility Act (CVAA) and adjoined game industry waiver that comes into force January 2017. This is an act created...... by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...... platforms; and games software. However, the CVAA has no legal status in the EU. This text succinctly introduces and questions implications, impact, and wider adoption. By presenting the full CVAA and game industry waiver the text targets to motivate discussions and further publications on the subject...

  4. Analysis on a hybrid desiccant air-conditioning system

    International Nuclear Information System (INIS)

    Jia, C.X.; Dai, Y.J.; Wu, J.Y.; Wang, R.Z.

    2006-01-01

    Hybrid desiccant-assisted preconditioner and split cooling coil system, which combines the merits of moisture removal by desiccant and cooling coil for sensible heat removal, is a potential alternative to conventional vapor compression cooling systems. In this paper, experiments on a hybrid desiccant air-conditioning system, which is actually an integration of a rotary solid desiccant dehumidification and a vapor compression air-conditioning unit, had been carried out. It is found that, compared with the conventional VC (vapor compression) system, the hybrid desiccant cooling system economizes 37.5% electricity powers when the process air temperature and relative humidity are maintained at 30 o C, and 55% respectively. The reason why the hybrid desiccant cooling system features better performance relative to the VC system lies in the improvement brought about in the performance of the evaporator in VC unit due to desiccant dehumidification. A thermodynamic model of the hybrid desiccant system with R-22 as the refrigerant has been developed and the impact of operating parameters on the sensible heat ratio of the evaporator and the electric power saving rate has been analyzed. It is found that a majority of evaporators can operate in the dry condition even if the regeneration temperature is lower (i.e. 80 o C)

  5. Housing and Food Insecurity, Care Access, and Health Status Among the Chronically Ill: An Analysis of the Behavioral Risk Factor Surveillance System.

    Science.gov (United States)

    Charkhchi, Paniz; Fazeli Dehkordy, Soudabeh; Carlos, Ruth C

    2018-05-01

    The proportion of the United States population with chronic illness continues to rise. Understanding the determinants of quality of care-particularly social determinants-is critical to the provision of care in this population. To estimate the prevalence of housing and food insecurity among persons with common chronic conditions and to assess the independent effects of chronic illness and sociodemographic characteristics on (1) housing and food insecurity, and (2) health care access hardship and health status. Cross-sectional study. We used data from the 11 states and one territory that completed the social context module of the 2015 Behavioral Risk Factor Surveillance System (BRFSS). We estimated the prevalence of housing and food insecurity among patients with cancer, stroke, cardiovascular disease, and chronic lung disease. Logistic regression models were used to assess the independent effects of housing and food insecurity, chronic conditions, and demographics on health care access and health status. Among the chronically ill, 36.71% (95% CI: 35.54-37.88) experienced housing insecurity and 30.60% (95% CI: 29.49-31.71) experienced food insecurity. Cardiovascular and lung disease increased the likelihood of housing (OR 1.69, 95% CI: 1.07-2.66 and OR 1.71, 95% CI: 1.12-2.60, respectively) and food insecurity (OR 1.75, 95% CI: 1.12-2.73 and OR 1.78, 95% CI: 1.20-2.63, respectively). Housing and food insecurity significantly increased the risk of health care access hardship. Being insured or having an income level above 200% of the federal poverty level significantly reduced the likelihood of access hardship, while female gender significantly increased the likelihood. Chronic illness independently affects housing and food insecurity. In turn, food and housing anxiety leads to reduced access to care, likely due to cost concerns, and correlates with poorer health. A more complete understanding of the pathways by which chronic illness influences social determinants and

  6. Enhancing Access to Drought Information Using the CUAHSI Hydrologic Information System

    Science.gov (United States)

    Schreuders, K. A.; Tarboton, D. G.; Horsburgh, J. S.; Sen Gupta, A.; Reeder, S.

    2011-12-01

    The National Drought Information System (NIDIS) Upper Colorado River Basin pilot study is investigating and establishing capabilities for better dissemination of drought information for early warning and management. As part of this study we are using and extending functionality from the Consortium of Universities for the Advancement of Hydrologic Science, Inc. (CUAHSI) Hydrologic Information System (HIS) to provide better access to drought-related data in the Upper Colorado River Basin. The CUAHSI HIS is a federated system for sharing hydrologic data. It is comprised of multiple data servers, referred to as HydroServers, that publish data in a standard XML format called Water Markup Language (WaterML), using web services referred to as WaterOneFlow web services. HydroServers can also publish geospatial data using Open Geospatial Consortium (OGC) web map, feature and coverage services and are capable of hosting web and map applications that combine geospatial datasets with observational data served via web services. HIS also includes a centralized metadata catalog that indexes data from registered HydroServers and a data access client referred to as HydroDesktop. For NIDIS, we have established a HydroServer to publish drought index values as well as the input data used in drought index calculations. Primary input data required for drought index calculation include streamflow, precipitation, reservoir storages, snow water equivalent, and soil moisture. We have developed procedures to redistribute the input data to the time and space scales chosen for drought index calculation, namely half monthly time intervals for HUC 10 subwatersheds. The spatial redistribution approaches used for each input parameter are dependent on the spatial linkages for that parameter, i.e., the redistribution procedure for streamflow is dependent on the upstream/downstream connectivity of the stream network, and the precipitation redistribution procedure is dependent on elevation to account

  7. Pro Access 2010 Development

    CERN Document Server

    Collins, Mark

    2011-01-01

    Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for Applications (VBA) tools for Access applications, integrate Access with SharePoint and other business systems, and much more. Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, co

  8. Remote access to an interferometric fringes stabilization active system via RENATA

    Science.gov (United States)

    Espitia-Gómez, Javier; Ángel-Toro, Luciano

    2013-11-01

    The Advanced Technology National Network (RENATA, for its acronym in Spanish) is a Colombian, collaborative work tool, linked to other networks worldwide, in which take participation researchers, teachers and students, by sharing laboratory resources located in different universities, institutes and research centers throughout the country. In the Universidad EAFIT (Medellín, Colombia) it has been designed an interferometric fringes stabilization active system, which can be accessed remotely via the RENATA network. A Mach-Zehnder interferometer was implemented, with independent piezoelectric actuators in each arm, with which the lengths of optical path of light that goes over in each of them can be modified. Using these actuators, one can simultaneously perturb the system and compensate the phase differences caused by that perturbation. This allows us to experiment with different disturbs, and analyze the system response to each one of them. This can be made from any location worldwide, and especially from those regions in which optical and optoelectronic components required for the implementation of the interferometer or for the stabilization system are not available. The device can also be used as a platform in order to conduct diverse experiments, involving optical and controlling aspects, constituting with this in a pedagogic tool. For the future, it can be predicted that remote access to available applications would be possible, as well as modifications of the implemented code in labVIEW™, so that researchers and teachers can adapt and improve their functionalities or develop new applications, based on the collaborative work.

  9. FODA/IBEA satellite access scheme for MIXED traffic at variable bit and coding rates system description

    OpenAIRE

    Celandroni, Nedo; Ferro, Erina; Mihal, Vlado; Potort?, Francesco

    1992-01-01

    This report describes the FODA system working at variable coding and bit rates (FODA/IBEA-TDMA) FODA/IBEA is the natural evolution of the FODA-TDMA satellite access scheme working at 2 Mbit/s fixed rate with data 1/2 coded or uncoded. FODA-TDMA was used in the European SATINE-II experiment [8]. We remind here that the term FODA/IBEA system is comprehensive of the FODA/IBEA-TDMA (1) satellite access scheme and of the hardware prototype realised by the Marconi R.C. (U.K.). Both of them come fro...

  10. Low Access Delay Anti-Collision Algorithm for Reader in RFID systems

    DEFF Research Database (Denmark)

    Galiotto, Carlo; Marchetti, Nicola; Prasad, Neeli R.

    2010-01-01

    Radio Frequency Identification (RFID) is a technology which is spreading more and more as a medium to identify, locate and track assets through the productive chain. As all the wireless communication devices sharing the same transmission channel, RFID readers and tags experience collisions whenever...... deployed over the same area. In this work, the RFID reader collision problem is studied and a centralized scheduling-based algorithm is proposed as possible candidate solution, especially for those scenarios involving static or low mobility readers. Taking into account the circuitry limitations of the tags......, which do not allow to use frequency or code division multiple access schemes in the RFID systems, this paper proposes an algorithm aiming to prevent the readers collisions, while keeping the access delay of the readers to the channel possibly low. The simulation results show that this algorithm performs...

  11. A new model with an anatomically accurate human renal collecting system for training in fluoroscopy-guided percutaneous nephrolithotomy access.

    Science.gov (United States)

    Turney, Benjamin W

    2014-03-01

    Obtaining renal access is one of the most important and complex steps in learning percutaneous nephrolithotomy (PCNL). Ideally, this skill should be practiced outside the operating room. There is a need for anatomically accurate and cheap models for simulated training. The objective was to develop a cost-effective, anatomically accurate, nonbiologic training model for simulated PCNL access under fluoroscopic guidance. Collecting systems from routine computed tomography urograms were extracted and reformatted using specialized software. These images were printed in a water-soluble plastic on a three-dimensional (3D) printer to create biomodels. These models were embedded in silicone and then the models were dissolved in water to leave a hollow collecting system within a silicone model. These PCNL models were filled with contrast medium and sealed. A layer of dense foam acted as a spacer to replicate the tissues between skin and kidney. 3D printed models of human collecting systems are a useful adjunct in planning PCNL access. The PCNL access training model is relatively low cost and reproduces the anatomy of the renal collecting system faithfully. A range of models reflecting the variety and complexity of human collecting systems can be reproduced. The fluoroscopic triangulation process needed to target the calix of choice can be practiced successfully in this model. This silicone PCNL training model accurately replicates the anatomic architecture and orientation of the human renal collecting system. It provides a safe, clean, and effective model for training in accurate fluoroscopy-guided PCNL access.

  12. Get the right access rights!

    CERN Multimedia

    Rosaria Marraffino

    2015-01-01

    On 11 May, a major change concerning the requirements to access the CERN beam facilities was put in place and implemented in ADaMS in order to reduce the number of courses that people who need access to multiple installations have to follow. This revision includes dedicated safety training courses that replace, in particular, the “Safety during LS1” e-learning course, which is now to be considered obsolete.   CERN’s Access Distribution and Management System (ADaMS). As of 11 May, an important improvement was implemented in ADaMS (CERN’s Access Distribution and Management System) regarding the requisites to access safety zones. This change is closely related to the introduction of a generic e-learning course ("CERN Beam Facilities") covering the common risks and systems present in CERN's beam facilities. Two e-learning courses are no longer valid, nor available on the SIR (Safety Information Registration) catalogue: the &ld...

  13. Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems

    Science.gov (United States)

    Kollár, Martin

    2012-05-01

    In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (ie WCDMA and LTE).

  14. Impact of Users Identities and Access Conditions on Downlink Performance in Closed Small-Cell Networks

    KAUST Repository

    Radaydeh, Redha

    2015-05-26

    This paper investigates the effect of various operation parameters on the downlink user performance in overlaid small-cell networks. The case study considers closed-access small cells (e.g., femtocells), wherein only active authorized user equipments (UEs) can be served, and each of which is allocated single downlink channel at a time. On the other hand, the macrocell base station can unconditionally serve macrocell UEs that exist inside its coverage space. The available channels can be shared simultaneously in the macrocell network and the femtocell network. Moreover, a channel can be reused only at the macrocell base station. The analysis provides quantitative approaches to model UEs identities, their likelihoods of being active, and their likelihoods of producing interference, considering UEs classifications, locations, and access capabilities. Moreover, it develops models for various interference sources observed from effective interference femtocells, considering femtocells capacities and operation conditions. The associated formulations to describe a desired UE performance and the impact of the number of available channels as well as the adopted channel assignment approach are thoroughly investigated. The results are generally presented for any channel models of interference sources as well as the desired source of the served UE. Moreover, specific channel models are then adopted, for which generalized closedform analytical results for the desired UE outage probability performance are obtained. Numerical and simulation results are presented to further clarify the main outcomes of the developed analysis.

  15. A new approach to the tradeoff between quality and accessibility of health care.

    Science.gov (United States)

    Tanke, Marit A C; Ikkersheim, David E

    2012-05-01

    Quality of care is associated with patient volume. Regionalization of care is therefore one of the approaches that is suited to improve quality of care. A disadvantage of regionalization is that the accessibility of the facilities can decrease. By investigating the tradeoff between quality and accessibility it is possible to determine the optimal amount of treatment locations in a health care system. In this article we present a new model to quantitatively 'solve' this tradeoff. We use the condition breast cancer in the Netherlands as an example. We calculated the expected quality gains in Quality Adjusted Lifetime Years (QALY's) due to stepwise regionalization using 'volume-outcome' literature for breast cancer. Decreased accessibility was operationalized as increased (travel) costs due to regionalization by using demographic data, drive-time information, and the national median income. The total sum of the quality and accessibility function determines the optimum range of treatment locations for this particular condition, given the 'volume-quality' relationship and Dutch demographics and geography. Currently, 94 locations offer breast cancer treatment in the Netherlands. Our model estimates that the optimum range of treatment locations for this particular condition in the Netherlands varies from 15 locations to 44 locations. Our study shows that the Dutch society would benefit from regionalization of breast cancer care as possible quality gains outweigh heightened travel costs. In addition, this model can be used for other medical conditions and in other countries. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  16. Distributed Multi-Sensor Real-Time Building Environmental Parameters Monitoring System with Remote Data Access

    Directory of Open Access Journals (Sweden)

    Beinarts Ivars

    2014-12-01

    Full Text Available In this paper the advanced monitoring system of multiple environmental parameters is presented. The purpose of the system is a long-term estimation of energy efficiency and sustainability for the research test stands which are made of different building materials. Construction of test stands, and placement of main sensors are presented in the first chapter. The structure of data acquisition system includes a real-time interface with sensors and a data logger that allows to acquire and log data from all sensors with fixed rate. The data logging system provides a remote access to the processing of the acquired data and carries out periodical saving at a remote FTP server using an Internet connection. The system architecture and the usage of sensors are explained in the second chapter. In the third chapter implementation of the system, different interfaces of sensors and energy measuring devices are discussed and several examples of data logger program are presented. Each data logger is reading data from analog and digital channels. Measurements can be displayed directly on a screen using WEB access or using data from FTP server. Measurements and acquired data graphical results are presented in the fourth chapter in the selected diagrams. The benefits of the developed system are presented in the conclusion.

  17. 智能门禁系统设计要点探讨%Discussion on the Design of Intelligent Access Control System

    Institute of Scientific and Technical Information of China (English)

    朱矩龙

    2015-01-01

    Access control system is the basis and security of the use of building security, the use of advanced technology to design intelligent access control system is conducive to improve the safety of the building. Discusses a based on TM card intelligent access control system design, expounds the main problems existing in traditional access control system, comprehensive description of the hardware design and software design of the intelligent access control system, and the system is simulated and tested.%门禁系统是建筑使用安全性的基础和保障,使用先进技术对智能门禁系统进行设计有利于提高建筑的安全性能。探讨了一种基于TM卡技术的智能门禁系统设计,阐述了传统门禁系统存在的主要问题,综合说明了智能门禁系统的硬件设计和软件设计,并对系统进行了仿真测试。

  18. Air-conditioning and ventilation systems and components of nuclear facilities

    International Nuclear Information System (INIS)

    2006-01-01

    The Guide defines the requirements for the design, implementation and operation of the air-conditioning and ventilation systems of nuclear facilities belonging to safety classes 3 and 4, and for the related documents to be submitted to STUK (Radiation and Nuclear Safety Authority, Finland). Furthermore, the Guide describes the inspections of air-conditioning and ventilation systems to be conducted by STUK during construction and operation of the facilities. As far as systems and components belonging to safety class 2 are concerned, STUK sets additional requirements case by case. In general, air-conditioning systems refer to systems designed to manage the indoor air cleanness, temperature, humidity and movement. In some rooms of a nuclear power plant, ventilation systems are also used to prevent radioactive materials from spreading outside the rooms. Guide YVL1.0 defines the safety principles concerning the air-conditioning and ventilation of nuclear power plants. Guide YVL2.0 gives the requirements for the design of nuclear power plant systems. In addition, YVLGuide groups 3, 4, 5 and 7 deal with the requirements for air-conditioning and ventilation systems with regard to the mechanical equipment, fire prevention, electrical systems, instrumentation and control technology, and the restriction of releases. The rules and regulations issued by the Ministry of the Environment and the Ministry of the Interior (RakMK, the Finnish building code) concerning the design and operation of air-conditioning and ventilation systems and the related fire protection design bases also apply to nuclear facilities. Exhaust gas treatment systems, condenser vacuum systems of boiling water reactor plants and leak collection systems are excluded from the scope of this Guide

  19. 78 FR 38867 - Gastroenterology-Urology Devices; Reclassification of Implanted Blood Access Devices

    Science.gov (United States)

    2013-06-28

    ... artificial kidney system for the treatment of patients with renal failure or toxemic conditions and provides.... Additionally, some patients may have inadequate vascular anatomy to establish a more permanent vascular access... Kidney Diseases, vol. 30, pp. 213-218, 1997. 11. Schnabel, K.J., M.E. Simons, G.F. Zevallos, et al...

  20. Periodic solutions of asymptotically linear Hamiltonian systems without twist conditions

    Energy Technology Data Exchange (ETDEWEB)

    Cheng Rong [Coll. of Mathematics and Physics, Nanjing Univ. of Information Science and Tech., Nanjing (China); Dept. of Mathematics, Southeast Univ., Nanjing (China); Zhang Dongfeng [Dept. of Mathematics, Southeast Univ., Nanjing (China)

    2010-05-15

    In dynamical system theory, especially in many fields of applications from mechanics, Hamiltonian systems play an important role, since many related equations in mechanics can be written in an Hamiltonian form. In this paper, we study the existence of periodic solutions for a class of Hamiltonian systems. By applying the Galerkin approximation method together with a result of critical point theory, we establish the existence of periodic solutions of asymptotically linear Hamiltonian systems without twist conditions. Twist conditions play crucial roles in the study of periodic solutions for asymptotically linear Hamiltonian systems. The lack of twist conditions brings some difficulty to the study. To the authors' knowledge, very little is known about the case, where twist conditions do not hold. (orig.)

  1. Signal conditioning circuitry design for instrumentation systems.

    Energy Technology Data Exchange (ETDEWEB)

    Larsen, Cory A.

    2012-01-01

    This report details the current progress in the design, implementation, and validation of the signal conditioning circuitry used in a measurement instrumentation system. The purpose of this text is to document the current progress of a particular design in signal conditioning circuitry in an instrumentation system. The input of the signal conditioning circuitry comes from a piezoresistive transducer and the output will be fed to a 250 ksps, 12-bit analog-to-digital converter (ADC) with an input range of 0-5 V. It is assumed that the maximum differential voltage amplitude input from the sensor is 20 mV with an unknown, but presumably high, sensor bandwidth. This text focuses on a specific design; however, the theory is presented in such a way that this text can be used as a basis for future designs.

  2. An online condition monitoring system implemented an internet connectivity and FTP for low speed slew bearing

    Science.gov (United States)

    Caesarendra, W.; Kosasih, B.; Tjahjowidodo, T.; Ariyanto, M.; Daryl, LWQ; Pamungkas, D.

    2018-04-01

    Rapid and reliable information in slew bearing maintenance is not trivial issue. This paper presents the online monitoring system to assist maintenance engineer in order to monitor the bearing condition of low speed slew bearing in sheet metal company. The system is able to pass the vibration information from the place where the bearing and accelerometer sensors are attached to the data center; and from the data center it can be access by opening the online monitoring website from any place and by any person. The online monitoring system is built using some programming languages such as C language, MATLAB, PHP, HTML and CSS. Generally, the flow process is start with the automatic vibration data acquisition; then features are calculated from the acquired vibration data. These features are then sent to the data center; and form the data center, the vibration features can be seen through the online monitoring website. This online monitoring system has been successfully applied in School of Mechanical, Materials and Mechatronic Engineering, University of Wollongong.

  3. The Access Pricing Problem: A Synthesis.

    OpenAIRE

    Armstrong, Mark; Doyle, Chris; Vickers, John

    1996-01-01

    The Baumol-Willig efficient component pricing rule states that it is efficient to set the price of access to an essential facility equal to the direct cost of access plus the opportunity cost to the integrated access provider. The authors analyze the relevant notion of 'opportunity cost' under various assumptions about demand and supply conditions, including product differentiation, bypass, and substitution possibilities, which all reduce opportunity cost compared to the benchmark case. They ...

  4. Design of Nutrition Catering System for Athletes Based on Access Database

    OpenAIRE

    Hongjiang Wu,; Haiyan Zhao; Xugang Liu; Mingshun Xing

    2015-01-01

    In order to monitor and adjust athletes' dietary nutrition scientifically, Active X Data Object (ADO) and Structure Query Language (SQL) were used to produce program under the development environment of Visual Basic 6.0 and Access database. The consulting system on food nutrition and dietary had been developed with the two languages combination and organization of the latest nutrition information. Nutrition balance of physiological characteristics, assessment for nutrition intake, inquiring n...

  5. On-Chip Fluorescence Switching System for Constructing a Rewritable Random Access Data Storage Device.

    Science.gov (United States)

    Nguyen, Hoang Hiep; Park, Jeho; Hwang, Seungwoo; Kwon, Oh Seok; Lee, Chang-Soo; Shin, Yong-Beom; Ha, Tai Hwan; Kim, Moonil

    2018-01-10

    We report the development of on-chip fluorescence switching system based on DNA strand displacement and DNA hybridization for the construction of a rewritable and randomly accessible data storage device. In this study, the feasibility and potential effectiveness of our proposed system was evaluated with a series of wet experiments involving 40 bits (5 bytes) of data encoding a 5-charactered text (KRIBB). Also, a flexible data rewriting function was achieved by converting fluorescence signals between "ON" and "OFF" through DNA strand displacement and hybridization events. In addition, the proposed system was successfully validated on a microfluidic chip which could further facilitate the encoding and decoding process of data. To the best of our knowledge, this is the first report on the use of DNA hybridization and DNA strand displacement in the field of data storage devices. Taken together, our results demonstrated that DNA-based fluorescence switching could be applicable to construct a rewritable and randomly accessible data storage device through controllable DNA manipulations.

  6. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    OpenAIRE

    Wen-Jye Shyr; Te-Jen Su; Chia-Ming Lin

    2013-01-01

    This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC) and WebAccess. A mechatronics module, a Web‐CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equ...

  7. Perceptions of the use of intelligent information access systems in university level active learning activities among teachers of biomedical subjects.

    Science.gov (United States)

    Aparicio, Fernando; Morales-Botello, María Luz; Rubio, Margarita; Hernando, Asunción; Muñoz, Rafael; López-Fernández, Hugo; Glez-Peña, Daniel; Fdez-Riverola, Florentino; de la Villa, Manuel; Maña, Manuel; Gachet, Diego; Buenaga, Manuel de

    2018-04-01

    approaches in both the preparation and the effective use of these activities in the classroom. Specifically, the themes highlighted by a greater number of teachers after analyzing the responses to the open-ended questions were the usefulness of BioAnnote system to provide reliable sources of medical information and the usefulness of the bilingual nature of CLEiM system for learning medical terminology in English. Three intelligent information access systems were successfully used to evaluate the teacher's perceptions regarding the utility of these systems in learning activities. The results of this study showed that integration of reliable sources of information, bilingualism and selective annotation of concepts were the most valued features by the teachers, who also considered the incorporation of these systems into learning activities to be potentially very useful. In addition, in the context of our experimental conditions, our work provides useful insights into the way to appropriately integrate this type of intelligent information access systems into learning activities, revealing key themes to consider when developing such approaches. Copyright © 2017 The Authors. Published by Elsevier B.V. All rights reserved.

  8. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  9. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  10. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  11. Test-Access Planning and Test Scheduling for Embedded Core-Based System Chips

    OpenAIRE

    Goel, Sandeep Kumar

    2005-01-01

    Advances in the semiconductor process technology enable the creation of a complete system on one single die, the so-called system chip or SOC. To reduce time-to-market for large SOCs, reuse of pre-designed and pre-veried blocks called cores is employed. Like the design style, testing of SOCs can be best approached in a core-based fashion. In order to enable core-based test development, an embedded core should be isolated from its surrounding circuitry and electrical test access from chip pins...

  12. 42 CFR 493.1240 - Condition: Preanalytic systems.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 5 2010-10-01 2010-10-01 false Condition: Preanalytic systems. 493.1240 Section 493.1240 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN... of the preanalytic systems and correct identified problems as specified in § 493.1249 for each...

  13. An Automatic Control System for Conditioning 30 GHz Accelerating Structures

    CERN Document Server

    Dubrovskiy, A

    2008-01-01

    A software application programme has been developed to allow fast and automatic high-gradient conditioning of accelerating structures at 30 GHz in CTF3. The specificity of the application is the ability to control the high-power electron beam which produces the 30 GHz RF power used to condition the accelerating structures. The programme permits operation round the clock with minimum manpower requirements. In this paper the fast control system, machine control system, logging system, graphical user control interface and logging data visualization are described. An outline of the conditioning control system itself and of the feedback controlling peak power and pulse length is given. The software allows different types of conditioning strategies to be programmed

  14. A web accessible scientific workflow system for vadoze zone performance monitoring: design and implementation examples

    Science.gov (United States)

    Mattson, E.; Versteeg, R.; Ankeny, M.; Stormberg, G.

    2005-12-01

    Long term performance monitoring has been identified by DOE, DOD and EPA as one of the most challenging and costly elements of contaminated site remedial efforts. Such monitoring should provide timely and actionable information relevant to a multitude of stakeholder needs. This information should be obtained in a manner which is auditable, cost effective and transparent. Over the last several years INL staff has designed and implemented a web accessible scientific workflow system for environmental monitoring. This workflow environment integrates distributed, automated data acquisition from diverse sensors (geophysical, geochemical and hydrological) with server side data management and information visualization through flexible browser based data access tools. Component technologies include a rich browser-based client (using dynamic javascript and html/css) for data selection, a back-end server which uses PHP for data processing, user management, and result delivery, and third party applications which are invoked by the back-end using webservices. This system has been implemented and is operational for several sites, including the Ruby Gulch Waste Rock Repository (a capped mine waste rock dump on the Gilt Edge Mine Superfund Site), the INL Vadoze Zone Research Park and an alternative cover landfill. Implementations for other vadoze zone sites are currently in progress. These systems allow for autonomous performance monitoring through automated data analysis and report generation. This performance monitoring has allowed users to obtain insights into system dynamics, regulatory compliance and residence times of water. Our system uses modular components for data selection and graphing and WSDL compliant webservices for external functions such as statistical analyses and model invocations. Thus, implementing this system for novel sites and extending functionality (e.g. adding novel models) is relatively straightforward. As system access requires a standard webbrowser

  15. Global system data bus using the Digital Autonomous Terminal Access Communication protocol

    Science.gov (United States)

    Holmes, David C. E.

    1986-01-01

    Modern digital avionic systems with distributed processing require networking to connect the many elements. Digital Autonomous Terminal Access Communication (DATAC) is one of many such networks. DATAC has been implemented on the Transport Systems Research Vehicle (TSRV), a Boeing 737 aircraft operated by the National Aeronautics and Space Administration's Advanced Transport Operating Systems Program Office (ATOPS). This paper presents the TSRV implementation of the DATAC bus, a description of the DATAC system, a synchronization mechanism, details of data flow throughout the system, and a discussion of the modes available with DATAC. Numerous flight tests have been conducted using DATAC as the only means of communication between systems with outstanding results. DATAC is now an integral part of the TSRV and is expected to satisfy near term as well as future requirements for growth and flexibility.

  16. Dual-mode ultraflow access networks: a hybrid solution for the access bottleneck

    Science.gov (United States)

    Kazovsky, Leonid G.; Shen, Thomas Shunrong; Dhaini, Ahmad R.; Yin, Shuang; De Leenheer, Marc; Detwiler, Benjamin A.

    2013-12-01

    Optical Flow Switching (OFS) is a promising solution for large Internet data transfers. In this paper, we introduce UltraFlow Access, a novel optical access network architecture that offers dual-mode service to its end-users: IP and OFS. With UltraFlow Access, we design and implement a new dual-mode control plane and a new dual-mode network stack to ensure efficient connection setup and reliable and optimal data transmission. We study the impact of the UltraFlow system's design on the network throughput. Our experimental results show that with an optimized system design, near optimal (around 10 Gb/s) OFS data throughput can be attained when the line rate is 10Gb/s.

  17. High average power solid state laser power conditioning system

    International Nuclear Information System (INIS)

    Steinkraus, R.F.

    1987-01-01

    The power conditioning system for the High Average Power Laser program at Lawrence Livermore National Laboratory (LLNL) is described. The system has been operational for two years. It is high voltage, high power, fault protected, and solid state. The power conditioning system drives flashlamps that pump solid state lasers. Flashlamps are driven by silicon control rectifier (SCR) switched, resonant charged, (LC) discharge pulse forming networks (PFNs). The system uses fiber optics for control and diagnostics. Energy and thermal diagnostics are monitored by computers

  18. Telemedical systems for home monitoring of patients with chronic conditions in rural environment

    Directory of Open Access Journals (Sweden)

    Marcin Maciejewski

    2014-03-01

    Full Text Available This paper describes the requirements and possible implementations of a telemedical system. The idea of remote patient monitoring is a point of interest for researchers in Poland, and is also in high demand in fields such as diabetology, cardiology, and geriatrics, among others. Aging society, medical care costs and many other factors make remote patient care a promising idea for the future. For each and every condition, a specialized type of sensor must be used to allow specific measurements to be performed. Moreover, a local data storage and communication device must be provided for the sensor to be able to relay data to the station. A smart phone can be used perform such tasks. By implementing such remote diagnostic systems it is possible to collect, process, store and present vital medical data that can be used immediately to perform diagnosis, or later as reference for expert systems. The ‘Borboleta’ and ‘SaguiSaúde’ systems already implemented can serve as a base for system analysis. The systems provide necessary functions and can be used as reference. Many factors contribute to the success of the telemedical system, such as ease of access, scalability, safety, platform independence, and many others. For easier implementation and clarity, the system should be divided into independent layers, which will also make it easier to modify and integrate into other medical systems. Making the system easy to use for patients, medical staff, administrators and data managers makes the task of system design especially challenging. One must decide which information is necessary for each type of user and provide them clearly and in an orderly fashion.

  19. Muscular condition monitoring system using fiber bragg grating sensors

    International Nuclear Information System (INIS)

    Kim, Heon Young; Lee, Jin Hyuk; Kim, Dae Hyun

    2014-01-01

    Fiber optic sensors (FOS) have advantages such as electromagnetic interference (EMI) immunity, corrosion resistance and multiplexing capability. For these reasons, they are widely used in various condition monitoring systems (CMS). This study investigated a muscular condition monitoring system using fiber optic sensors (FOS). Generally, sensors for monitoring the condition of the human body are based on electro-magnetic devices. However, such an electrical system has several weaknesses, including the potential for electro-magnetic interference and distortion. Fiber Bragg grating (FBG) sensors overcome these weaknesses, along with simplifying the devices and increasing user convenience. To measure the level of muscle contraction and relaxation, which indicates the muscle condition, a belt-shaped FBG sensor module that makes it possible to monitor the movement of muscles in the radial and circumferential directions was fabricated in this study. In addition, a uniaxial tensile test was carried out in order to evaluate the applicability of this FBG sensor module. Based on the experimental results, a relationship was observed between the tensile stress and Bragg wavelength of the FBG sensors, which revealed the possibility of fabricating a muscular condition monitoring system based on FBG sensors.

  20. Muscular condition monitoring system using fiber bragg grating sensors

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Heon Young; Lee, Jin Hyuk; Kim, Dae Hyun [Seoul National University of Technology, Seoul (Korea, Republic of)

    2014-10-15

    Fiber optic sensors (FOS) have advantages such as electromagnetic interference (EMI) immunity, corrosion resistance and multiplexing capability. For these reasons, they are widely used in various condition monitoring systems (CMS). This study investigated a muscular condition monitoring system using fiber optic sensors (FOS). Generally, sensors for monitoring the condition of the human body are based on electro-magnetic devices. However, such an electrical system has several weaknesses, including the potential for electro-magnetic interference and distortion. Fiber Bragg grating (FBG) sensors overcome these weaknesses, along with simplifying the devices and increasing user convenience. To measure the level of muscle contraction and relaxation, which indicates the muscle condition, a belt-shaped FBG sensor module that makes it possible to monitor the movement of muscles in the radial and circumferential directions was fabricated in this study. In addition, a uniaxial tensile test was carried out in order to evaluate the applicability of this FBG sensor module. Based on the experimental results, a relationship was observed between the tensile stress and Bragg wavelength of the FBG sensors, which revealed the possibility of fabricating a muscular condition monitoring system based on FBG sensors.

  1. Sensor Access to the Cellular Microenvironment Using the Sensing Cell Culture Flask.

    Science.gov (United States)

    Kieninger, Jochen; Tamari, Yaara; Enderle, Barbara; Jobst, Gerhard; Sandvik, Joe A; Pettersen, Erik O; Urban, Gerald A

    2018-04-26

    The Sensing Cell Culture Flask (SCCF) is a cell culture monitoring system accessing the cellular microenvironment in 2D cell culture using electrochemical microsensors. The system is based on microfabricated sensor chips embedded in standard cell culture flasks. Ideally, the sensor chips could be equipped with any electrochemical sensor. Its transparency allows optical inspection of the cells during measurement. The surface of the sensor chip is in-plane with the flask surface allowing undisturbed cell growth on the sensor chip. A custom developed rack system allows easy usage of multiple flasks in parallel within an incubator. The presented data demonstrates the application of the SCCF with brain tumor (T98G) and breast cancer (T-47D) cells. Amperometric oxygen sensors were used to monitor cellular respiration with different incubation conditions. Cellular acidification was accessed with potentiometric pH sensors using electrodeposited iridium oxide films. The system itself provides the foundation for electrochemical monitoring systems in 3D cell culture.

  2. Sensor Access to the Cellular Microenvironment Using the Sensing Cell Culture Flask

    Directory of Open Access Journals (Sweden)

    Jochen Kieninger

    2018-04-01

    Full Text Available The Sensing Cell Culture Flask (SCCF is a cell culture monitoring system accessing the cellular microenvironment in 2D cell culture using electrochemical microsensors. The system is based on microfabricated sensor chips embedded in standard cell culture flasks. Ideally, the sensor chips could be equipped with any electrochemical sensor. Its transparency allows optical inspection of the cells during measurement. The surface of the sensor chip is in-plane with the flask surface allowing undisturbed cell growth on the sensor chip. A custom developed rack system allows easy usage of multiple flasks in parallel within an incubator. The presented data demonstrates the application of the SCCF with brain tumor (T98G and breast cancer (T-47D cells. Amperometric oxygen sensors were used to monitor cellular respiration with different incubation conditions. Cellular acidification was accessed with potentiometric pH sensors using electrodeposited iridium oxide films. The system itself provides the foundation for electrochemical monitoring systems in 3D cell culture.

  3. Open access to transmission

    International Nuclear Information System (INIS)

    Keith, D.M.

    1996-01-01

    For the past 12 to 15 years, the US electric power and energy industry and its federal regulators have been going through a prolonged exercise leading to opening up the national interconnected transmission grid for all qualified wholesale users to have open and equal access. The debates have been painful in a sense that not all parties - especially some of the transmission system owning utilities - believe that the concept of Open Access is achievable, due to technical constraints on the systems. The present Open Access activity is limited to wholesales transaction under the federal jurisdiction, but several states are either experimenting with or considering retail wheeling. In fact, the FERC - Federal Energy Regulatory Commission - has already expanded its view to embrace retail transmission, if the retail transaction involves the use of the interstate transmission systems which are under FERC's jurisdiction. This paper delves into some of the results of the technical cost and pricing analysis for open access. The statutes and resulting regulations are not addressed herein. (author). 1 fig

  4. Small photovoltaic setup for the air conditioning system

    Directory of Open Access Journals (Sweden)

    Masiukiewicz Maciej

    2017-01-01

    Full Text Available The increasing interest in air conditioning systems for residential applications in Poland will certainly increase the demand for electricity during the summer period. Due to this fact a growing interest in solutions that help to lower the electricity consumption in this sector is observed. The problem of increased energy demand for air conditioning purposes can be solved by transfer the consumption of electricity from the grid system to renewable energy sources (RES. The greatest demand for cooling occurs during the biggest sunlight. This is the basis for the analysis of technical power system based on photovoltaic cells (PV to power the split type air conditioner. The object of the study was the commercial residential airconditioning inverter units with a capacity of 2.5kW. A network electricity production system for their own use with the possibility of buffering energy in batteries (OFF-GRID system. Currently, on the Polish market, there are no developed complete solutions dedicated to air conditioning systems based on PV. In Poland, solar energy is mainly used for heat production in solar collectors. The proposed solution will help to increase the popularity of PV systems in the Polish market as an alternative to other RES. The basic conclusion is that the amount of PV energy generated was sufficient to cover the daily energy requirement of the air conditioner.

  5. Small photovoltaic setup for the air conditioning system

    Science.gov (United States)

    Masiukiewicz, Maciej

    2017-10-01

    The increasing interest in air conditioning systems for residential applications in Poland will certainly increase the demand for electricity during the summer period. Due to this fact a growing interest in solutions that help to lower the electricity consumption in this sector is observed. The problem of increased energy demand for air conditioning purposes can be solved by transfer the consumption of electricity from the grid system to renewable energy sources (RES). The greatest demand for cooling occurs during the biggest sunlight. This is the basis for the analysis of technical power system based on photovoltaic cells (PV) to power the split type air conditioner. The object of the study was the commercial residential airconditioning inverter units with a capacity of 2.5kW. A network electricity production system for their own use with the possibility of buffering energy in batteries (OFF-GRID system). Currently, on the Polish market, there are no developed complete solutions dedicated to air conditioning systems based on PV. In Poland, solar energy is mainly used for heat production in solar collectors. The proposed solution will help to increase the popularity of PV systems in the Polish market as an alternative to other RES. The basic conclusion is that the amount of PV energy generated was sufficient to cover the daily energy requirement of the air conditioner.

  6. Evolution of ATLAS conditions data and its management for LHC Run-2

    International Nuclear Information System (INIS)

    Böhler, Michael; Borodin, Mikhail; Formica, Andrea; Gallas, Elizabeth; Radescu, Voica

    2015-01-01

    The ATLAS detector at the LHC consists of several sub-detector systems. Both data taking and Monte Carlo (MC) simulation rely on an accurate description of the detector conditions from every subsystem, such as calibration constants, different scenarios of pile-up and noise conditions, size and position of the beam spot, etc. In order to guarantee database availability for critical online applications during data-taking, two database systems, one for online access and another one for all other database access, have been implemented.The long shutdown period has provided the opportunity to review and improve the Run-1 system: revise workflows, include new and innovative monitoring and maintenance tools and implement a new database instance for Run-2 conditions data. The detector conditions are organized by tag identification strings and managed independently by the different sub-detector experts. The individual tags are then collected and associated into a global conditions tag, assuring synchronization of various sub-detector improvements. Furthermore, a new concept was introduced to maintain conditions over all different data run periods into a single tag, by using Interval of Validity (IOV) dependent detector conditions for the MC database as well. This allows on the fly preservation of past conditions for data and MC and assures their sustainability with software evolution.This paper presents an overview of the commissioning of the new database instance, improved tools and workflows, and summarizes the actions taken during the Run-2 commissioning phase in the beginning of 2015. (paper)

  7. Employing optical code division multiple access technology in the all fiber loop vibration sensor system

    Science.gov (United States)

    Tseng, Shin-Pin; Yen, Chih-Ta; Syu, Rong-Shun; Cheng, Hsu-Chih

    2013-12-01

    This study proposes a spectral amplitude coding-optical code division multiple access (SAC-OCDMA) framework to access the vibration frequency of a test object on the all fiber loop vibration sensor (AFLVS). Each user possesses an individual SAC, and fiber Bragg grating (FBG) encoders/decoders using multiple FBG arrays were adopted, providing excellent orthogonal properties in the frequency domain. The system also mitigates multiple access interference (MAI) among users. When an optical fiber is bent to a point exceeding the critical radius, the fiber loop sensor becomes sensitive to external physical parameters (e.g., temperature, strain, and vibration). The AFLVS involves placing a fiber loop with a specific radius on a designed vibration platform.

  8. 42 CFR 493.1290 - Condition: Postanalytic systems.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 5 2010-10-01 2010-10-01 false Condition: Postanalytic systems. 493.1290 Section 493.1290 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN... systems and correct identified problems as specified in § 493.1299 for each specialty and subspecialty of...

  9. 42 CFR 493.1250 - Condition: Analytic systems.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 5 2010-10-01 2010-10-01 false Condition: Analytic systems. 493.1250 Section 493.1250 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES, DEPARTMENT OF HEALTH AND HUMAN SERVICES... quality testing. The laboratory must monitor and evaluate the overall quality of the analytic systems and...

  10. Microsoft DirectAccess best practices and troubleshooting

    CERN Document Server

    Krause, Jordan

    2013-01-01

    This book covers best practices and acts as a complete guide to DirectAccess and automatic remote access.Microsoft DirectAccess Best Practices and Troubleshooting is an ideal guide for any existing or future DirectAccess administrator and system administrators who are working on Windows Server 2012. This book will also be beneficial for someone with a basic knowledge of networking and deployment of Microsoft operating systems and software who wants to learn the intricacies of DirectAccess and its interfaces.

  11. Identity and Access Management and Security in Higher Education.

    Science.gov (United States)

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…

  12. LIPAc personnel protection system for realizing radiation licensing conditions on injector commissioning with deuteron beam

    Energy Technology Data Exchange (ETDEWEB)

    Takahashi, Hiroki, E-mail: takahashi.hiroki@jaea.go.jp [IFMIF/EVEDA Accelerator Group, Japan Atomic Energy Agency (JAEA), Rokkasho, Aomori (Japan); Narita, Takahiro; Kasugai, Atsushi [IFMIF/EVEDA Accelerator Group, Japan Atomic Energy Agency (JAEA), Rokkasho, Aomori (Japan); Kojima, Toshiyuki [Gitec Co. Ltd., Hachinohe, Aomori (Japan); Marqueta, Alvaro; Nishiyama, Koichi [IFMIF/EVEDA Project Team, Rokkasho, Aomori (Japan); Sakaki, Hironao [Quantum Beam Science Center, JAEA, Kizu, Kyoto (Japan); Gobin, Raphael [Commissariat à l’Energie Atomique et aux Energies Alternatives, CEA/Saclay, DSM/IRFU, Gif/Yvette (France)

    2016-11-01

    Highlights: • Personnel Protection System (PPS) is developed to adapt the radiation licensing. • PPS achieves the target performance to secure the personnel safety. • Pulse Duty Management System (PDMS) is developed to manage the beam-operation-time. • Satisfying performance of PDMS is confirmed by injector operation with H+ beam. • By the result of PPS and PDMS tests, the radiation license was successfully obtained. - Abstract: The performance validation of the Linear IFMIF Prototype Accelerator (LIPAc), up to the energy of 9 MeV deuteron beam with 125 mA continuous wave (CW), is planned in Rokkasho, Japan. There are three main phases of LIPAc performance validation: Injector commissioning, RFQ commissioning and LIPAc commissioning. Injector commissioning was started by H{sup +} and D{sup +} beam. To apply the radiation licensing for the Injector commissioning, the entering/leaving to/from accelerator vault should be under control, and access to the accelerator vault has to be prohibited for any person during the beam operation. The Personnel Protection System (PPS) was developed to adapt the radiation licensing conditions. The licensing requests that PPS must manage the accumulated D{sup +} current. So, to manage the overall D{sup +} beam time during injector operation, Pulse Duty Management System (PDMS) was developed as a configurable subsystem as part of the PPS. The PDMS was tested during H{sup +} beam (as simulated D{sup +}) operation, to confirm that it can handle the beam inhibit from Injector before the beam accumulation is above the threshold value specified in the radiation licensing condition. In this paper, the design and configuration of these systems and the result of the tests are presented.

  13. INSTITUTION FOR THE AGED: ASSESSING THE CONDITIONS OF ACCESSIBILITY AND FUNCTIONALITY OF THE ELDERLY.

    Directory of Open Access Journals (Sweden)

    Raphaella Lomanto Santos de Almeida

    2015-04-01

    Full Text Available The study aim was to assess the capacity to undertake the Basic Activities of Daily Living (BADL of elderly residents of an Institution for the Aged (IA and their level of accessibility. This is an observational, descriptive, cross-sectional study. The level of independence for BADL was assessed by the Barthel Index and the degree of accessibility of IA was verified through a check-list, based on the Brazilian Standard (NBR 9050/2004, the Brazilian Association of Technical Standards (ABNT. Of the 62 seniors who participated in the study, 64.5% had some degree of functional dependence. Noteworthy the level of functional dependency for activities undertaken in the bathroom among elderly on wheelchair. The assessed physical structure does not fully follow the technical standards established by NBR 9050, with differences mainly in the parameters of bedrooms, bathrooms and stairs. Although much of the institutionalized elderly presenting advanced and most functional vulnerability ages, level of IA architectural accessibility is still insufficient. Rooms and bathrooms are the places with the highest deficit of accessibility and also higher prevalence of falls among the elderly residents. A good level of accessibility in IA, can be an important factor in improving the level of independence for everyday activities and to prevent the risk of falls.

  14. La Resolución de problemas mediante el sistema de aplicación Microsoft Access Problem solving by means of Microsoft Access application system

    Directory of Open Access Journals (Sweden)

    Pablo González Ruíz

    2010-03-01

    and to carry out relationships among these; that is why it is necessary to elaborate a system of exercises considering the levels of cognitive performance which contribute with the development of skills of problem-solving with computers, using Microsoft Access System, and taking into account the following aspects: the design or the table work as a basic premise ( Diagram entity- relation and the Model entity-relation. The system of exercises is based on a quasi-experimental study covering two groups of medical students in 1st academic year in the Medical University, Pinar del Rio municipality. The bases of this research paper are on lecture controls and knowledge checking, which show difficulties in problem-solving when using the Microsoft Access database. The newness of this system is that it envisages the exercises upon a developing perspective of the levels of cognitive performance. The essential conclusion stated is that, with the creation of this system the student will quickly get familiar with the concepts (tables, attributes, field, register, key field and others, before approaching to an informative system, that is to say, a better way of logic thinking is achieved, from the living contemplation to the abstract thinking and from this to the practice as a prove of truth.

  15. Operational experience of air washer based ventilation system for power conditioning system of Indus-2

    International Nuclear Information System (INIS)

    Pandey, R.M.; Baghel, S.L.; Parate, J.K.; Ahlawat, Sandeep; Rawlani, B.K.; Chouksey, Sanjay

    2015-01-01

    Indus-2 Synchrotron Accelerator requires high quality conditioned uninterrupted AC mains power for their smooth and reliable operation. Three units of 1670 kVA and one unit of 1100 kVA capacity rotary uninterruptible power conditioning systems (UPS) were installed and commissioned. These UPS units require dust free and cool ambient conditions for smooth operation. In order to meet the ventilation requirements, an evaporative cooling system of 80000 cubic meter/hour capacity with filtration units was designed, installed and commissioned in February 2011 and is operational on round-the-clock basis. Evaporative cooling scheme was chosen as has various advantages over a refrigerated system like lower initial capital costs, lower energy usage, lower running costs, less greenhouse gas and it does not contribute to ozone depletion. The ventilation system filters the environment air in stages up to 5 micron level and being conditioned with an automatic controlled soft water circulating system with cooling pads. An instrumentation and control scheme is included in the system to provide the automation requirements for operating 24 x 7 through the year. All the mechanical, hydraulic and electrical devices are maintained by providing preventive maintenance work without affecting the accelerator machine operation. Availability and reliability of the system was analysed based on the failure data. In Year 2014, the ventilation system was upgraded to accommodate standby blower unit, coupling unit and improved quality of supply air with new air conditioning devices. The control panel monitors the condition of air in the UPS hall and maintainsup to 28°C air temperature and 85% maximum relative humidity in round-the clock shift with more than 98% operational reliability. In this paper, we present design philosophy, installation, instrumentation, testing, operation experience and availability of the ventilation system for Power Conditioning System, Indus complex. (author)

  16. 78 FR 73993 - Special Conditions: Cessna Model 680 Series Airplanes; Aircraft Electronic System Security...

    Science.gov (United States)

    2013-12-10

    ... design feature associated with the architecture and connectivity capabilities of the airplanes' computer... vulnerabilities to the airplanes' systems. The proposed network architecture includes the following connectivity.... Operator business and administrative support systems, and 3. Passenger entertainment systems, and access by...

  17. [Legal and sanitary aspects conditioning access to medicines in Brazilian courts].

    Science.gov (United States)

    Pandolfo, Mércia; Delduque, Maria Célia; Amaral, Rita Goreti

    2012-01-01

    The search for having access to health care and medicines right granted through Judicial Courts has increased in Brazil. What has been nominated "health judicialization" is a multidimensional phenomenon, a need for dealing with it in a multidisciplinary way involving legal-judicial, political-institutional and sanitary approaches has raised. The Health is recognized as a fundamental human right in the Brazilian Constitution giving it a different legal protection under the legal-constitutional order and the country guarantees the right to health are not only the Constitution and the law strictly, but mainly in an normative infralegal arc that define the goals and outcomes to be achieved by public policy. The lawsuits by drugs may be a reflection of the difficulty of access to health services, to empty and downgrading of health care. Therefore, this turns out to affect the judicialization of pharmaceutical care in Brazil.

  18. LHCb Conditions database operation assistance systems

    International Nuclear Information System (INIS)

    Clemencic, M; Shapoval, I; Cattaneo, M; Degaudenzi, H; Santinelli, R

    2012-01-01

    The Conditions Database (CondDB) of the LHCb experiment provides versioned, time dependent geometry and conditions data for all LHCb data processing applications (simulation, high level trigger (HLT), reconstruction, analysis) in a heterogeneous computing environment ranging from user laptops to the HLT farm and the Grid. These different use cases impose front-end support for multiple database technologies (Oracle and SQLite are used). Sophisticated distribution tools are required to ensure timely and robust delivery of updates to all environments. The content of the database has to be managed to ensure that updates are internally consistent and externally compatible with multiple versions of the physics application software. In this paper we describe three systems that we have developed to address these issues. The first system is a CondDB state tracking extension to the Oracle 3D Streams replication technology, to trap cases when the CondDB replication was corrupted. Second, an automated distribution system for the SQLite-based CondDB, providing also smart backup and checkout mechanisms for the CondDB managers and LHCb users respectively. And, finally, a system to verify and monitor the internal (CondDB self-consistency) and external (LHCb physics software vs. CondDB) compatibility. The former two systems are used in production in the LHCb experiment and have achieved the desired goal of higher flexibility and robustness for the management and operation of the CondDB. The latter one has been fully designed and is passing currently to the implementation stage.

  19. SM18 Visits and Access

    CERN Multimedia

    2012-01-01

      VISITS The rules and conditions to be followed for visits in the SM18 Hall are laid out in the EDMS 1205328 document. No visit is allowed without prior reservation.   ACCESS Special access right is needed ONLY from 7 p.m. to 7 a.m. and during week-ends. From 1 December, the current SM18 access database will be closed and a new one “SM18-OWH outside normal hours” started from scratch. Requests, via EDH SM18-OWH, will have to be duly justified.   For further information, please contact Evelyne Delucinge.

  20. Methodology for quantitative assessment of technical condition in industrial systems

    Energy Technology Data Exchange (ETDEWEB)

    Steinbach, C [Marintek AS (Norway); Soerli, A [Statoil (Norway)

    1999-12-31

    As part of the Eureka project Ageing Management a methodology has been developed to assess the technical condition of industrial systems. The first part of the presentation argues for the use of technical condition parameters in the context of maintenance strategies. Thereafter the term `technical condition` is defined more thoroughly as it is used within the project. It is claimed that the technical condition of a system - such as a feed water system of a nuclear power plant, or a water injection system on an oil platform - may be determined by aggregating the condition of its smaller components using a hierarchic approach. The hierarchy has to be defined in co-operation with experienced personnel and reflects the impact of degradation of elements on a lower level to nodes higher in the hierarchy. The impact is divided into five categories with respect to safety, environment, availability, costs and man-hours. To determine the technical condition of the bottom elements of the hierarchy, available data is used from both an on-line condition monitoring system and maintenance history. The second part of the presentation introduces the prototype software tool TeCoMan which utilises the theory and applies it to installations of the participating companies. First results and gained experiences with the method and tool are discussed. (orig.)

  1. Methodology for quantitative assessment of technical condition in industrial systems

    Energy Technology Data Exchange (ETDEWEB)

    Steinbach, C. [Marintek AS (Norway); Soerli, A. [Statoil (Norway)

    1998-12-31

    As part of the Eureka project Ageing Management a methodology has been developed to assess the technical condition of industrial systems. The first part of the presentation argues for the use of technical condition parameters in the context of maintenance strategies. Thereafter the term `technical condition` is defined more thoroughly as it is used within the project. It is claimed that the technical condition of a system - such as a feed water system of a nuclear power plant, or a water injection system on an oil platform - may be determined by aggregating the condition of its smaller components using a hierarchic approach. The hierarchy has to be defined in co-operation with experienced personnel and reflects the impact of degradation of elements on a lower level to nodes higher in the hierarchy. The impact is divided into five categories with respect to safety, environment, availability, costs and man-hours. To determine the technical condition of the bottom elements of the hierarchy, available data is used from both an on-line condition monitoring system and maintenance history. The second part of the presentation introduces the prototype software tool TeCoMan which utilises the theory and applies it to installations of the participating companies. First results and gained experiences with the method and tool are discussed. (orig.)

  2. Data access performance through parallelization and vectored access. Some results

    International Nuclear Information System (INIS)

    Furano, F; Hanushevsky, A

    2008-01-01

    High Energy Physics data processing and analysis applications typically deal with the problem of accessing and processing data at high speed. Recent studies, development and test work have shown that the latencies due to data access can often be hidden by parallelizing them with the data processing, thus giving the ability to have applications which process remote data with a high level of efficiency. Techniques and algorithms able to reach this result have been implemented in the client side of the Scalla/xrootd system, and in this contribution we describe the results of some tests done in order to compare their performance and characteristics. These techniques, if used together with multiple streams data access, can also be effective in allowing to efficiently and transparently deal with data repositories accessible via a Wide Area Network

  3. A METHOD OF AND A SYSTEM FOR CONTROLLING ACCESS TO A SHARED RESOURCE

    DEFF Research Database (Denmark)

    2006-01-01

    A method and a system of controlling access of data items to a shared resource, wherein the data items each is assigned to one of a plurality of priorities, and wherein, when a predetermined number of data items of a priority have been transmitted to the shared resource, that priority...

  4. Hacking Blackboard: Customizing Access to Library Resources through the Blackboard Course Management System

    Science.gov (United States)

    Kellam, Lynda M.; Cox, Richard; Winkler, Hannah

    2009-01-01

    Academic libraries have long been trying to gain access to users through their favorite online spaces, such as social networking sites. In this article a project of the University of North Carolina at Greensboro's University Libraries, which integrated library resources with the campus course management system, Blackboard, is detailed. The main…

  5. 48 CFR 504.602-71 - Federal Procurement Data System-Public access to data.

    Science.gov (United States)

    2010-10-01

    ... Government procurement to the public. (b) Fee for direct hook-up. To the extent that a member of the public... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Federal Procurement Data... Procurement Data System—Public access to data. (a) The FPDS database. The General Services Administration...

  6. Recent results on cleaning and conditioning the ATF vacuum system

    International Nuclear Information System (INIS)

    Langley, R.A.; Clark, T.L.; Glowienka, J.C.; Goulding, R.H.; Mioduszewski, P.K.; Rasmussen, D.A.; Rayburn, T.F.; Schaich, C.R.; Shepard, T.D.; Simpkins, J.E.; Yarber, J.L.

    1990-01-01

    Techniques for cleaning and conditioning the vacuum vessel of the Advanced Toroidal Facility (ATF) and its internal components are described. The vacuum vessel cleaning technique combines baking to 150 degree C and glow discharges with hydrogen gas. Chromium gettering is used to further condition the system. The major internal components are the anodized aluminum baffles in the Thomson scattering system, a graphite-shielded ICRF antenna, two graphite limiters, and a diagnostic graphite plate. Three independent heating systems are used to bake some of the major components of the system. The major characteristics used for assessing cleanliness and conditioning progress are the maximum pressure attained during bakeout, the results of gas analysis, and revelant plasma parameters (e.g., time to radiative decay). Details of the various cleaning and conditioning procedures and results are presented

  7. Development of condition monitoring and diagnosis system for standby diesel generator

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Kwang Hee; Park, Jong Hyuck; Park, Jong Eun [Korea Electric Power Research Institute, Daejeon (Korea, Republic of)

    2009-05-15

    The emergency diesel generator (EDG) of the nuclear power plant is designed to supply the power to the nuclear on Station Black Out (SBO) condition. The operation reliability of onsite emergency diesel generator should be ensured by a condition monitoring system designed to monitor and analysis the condition of diesel generator. For this purpose, we have developed the online condition monitoring and diagnosis system for the wolsong unit 3 and 4 standby diesel generator including diesel engine performance. In this paper, technologies of condition monitoring and diagnosis system (SDG MDS) for the wolsong standby diesel generator are described. By using the condition monitoring module of the SDG MDS, performance monitoring function for major operating parameters of EDG reliability program required by Reg. guide 1.155 can be operated as on line monitoring system.

  8. Development of condition monitoring and diagnosis system for standby diesel generator

    International Nuclear Information System (INIS)

    Choi, Kwang Hee; Park, Jong Hyuck; Park, Jong Eun

    2009-01-01

    The emergency diesel generator (EDG) of the nuclear power plant is designed to supply the power to the nuclear on Station Black Out (SBO) condition. The operation reliability of onsite emergency diesel generator should be ensured by a condition monitoring system designed to monitor and analysis the condition of diesel generator. For this purpose, we have developed the online condition monitoring and diagnosis system for the wolsong unit 3 and 4 standby diesel generator including diesel engine performance. In this paper, technologies of condition monitoring and diagnosis system (SDG MDS) for the wolsong standby diesel generator are described. By using the condition monitoring module of the SDG MDS, performance monitoring function for major operating parameters of EDG reliability program required by Reg. guide 1.155 can be operated as on line monitoring system

  9. Financing off-grid sustainable energy access for the poor

    International Nuclear Information System (INIS)

    Glemarec, Yannick

    2012-01-01

    This paper examines the role of public instruments in promoting private finance to achieve off-grid sustainable energy access. Renewable energy technologies are increasingly becoming the cheapest solutions for off-grid energy access. The dramatic uptake of mobile phones in developing countries shows how quickly decentralized services can develop on a commercial basis under the right conditions, and raises the prospect that private finance could also drive decentralized energy access for the poor. Indeed, there are already a number of instances of clean energy solutions – such as solar portable lights, household biogas units or solar home systems – that have managed to scale-up through leveraging private finance. However, the experience gained from first-generation market development projects show that, in almost all cases, significant public resources have been necessary to increase the affordability of clean energy technologies, provide access to financing for the poor, and remove non-economic barriers. Such public interventions may be funded by international public finance, domestic budgets and carbon finance. Despite mounting fiscal constraints facing governments worldwide, the emergence of new sources of climate finance and the political momentum in support of energy subsidy reforms, as well as new programming modalities, offer opportunities to leverage additional resources to achieve universal energy access by 2030. - Highlights: ► Renewable energy is increasingly the cheapest solution for off-grid energy access. ► Universal access to energy now depends less on technology and more business models. ► Substantial public finance will still be required to support universal energy access.

  10. NuDat system for access to nuclear data

    International Nuclear Information System (INIS)

    Dunford, C.L.; Kinsey, R.R.

    1998-01-01

    The NuDat program provides a user with access to nuclear properties and to some nuclear reaction data. The program operates on DEC VMS operating systems and on PC's with Microsoft operating systems. The program has four user interfaces, all having the same content and functionality. These interfaces are Web, Video and Sequential for VMS. The PC interface is identical to the VMS Video interface. Forms are used to supply the type of data the user desires, the retrieval parameters, the output format, and the sort order of the data. The program and associated database is used in basic research, particularly for the systematic study of nuclear properties. It is also a useful tool for applied research to identify radiations from radionuclides contained in environmental samples, or from those produced by neutron or charged particle activation. The NuDat database is derived from several databases maintained by the National Nuclear Data Center. The databases are the Adopted Levels and Gammas data sets from ENSDF, the Nuclear Wallet Cards, Decay Radiations derived from ENSDF decay data sets processed by RADLIST, and Thermal Neutron Cross Sections

  11. 28 CFR 16.70 - Exemption of the Office of the Attorney General System-limited access.

    Science.gov (United States)

    2010-07-01

    ....70 Exemption of the Office of the Attorney General System—limited access. (a) The following system of...); and (g): (1) General Files System of the Office of the Attorney General (JUSTICE/OAG-001). These... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Exemption of the Office of the Attorney...

  12. The application of gas ejector for road transport air conditioning system

    Science.gov (United States)

    Sumeru, Nasution, Henry; Ani, Farid Nasir

    2012-06-01

    The depletion of fossil fuel supply requires fuel and energy saving in energy utilization system. Therefore, these required the development of new and efficient technologies as to reduce fuel consumption especially in air conditioning of road vehicles. Currently, the air conditioning for road vehicles uses vapor compression system. Although the vapor compression system has high COP, the compressor is driven by vehicle engines, which take additional fuel consumption when the air conditioning system is in operation. In this study, the waste heat of radiator drives the ejector refrigeration for air conditioning. Although the ejector refrigeration system has low COP, the use of heat driven air conditioning will reduce the fuel consumption as compared with conventional system. This is because the systems do not use the mechanical engine load. The analysis of this study is based on the ejector refrigeration system using natural refrigerant (isobutene). The evaporation temperature is 10°C, condensation temperature is 35°C, generator temperature is 90°C with ejector isentropic efficiency of 0.7, and the COP system is 0.25. The heat released by the radiator of typical small road vehicles is between 60 to 100 kW and if the generator absorbs 20% of the heat, the heat contained in the generator is 12 to 20 kW. When the ejector air conditioning system has a COP 0.25, it will generate cooling capacity between 3 to 5 kW, compared with the conventional air conditioning of similar vehicles, which is approximately 2 to 4.4 kW.

  13. Thermal energy recovery of air conditioning system--heat recovery system calculation and phase change materials development

    International Nuclear Information System (INIS)

    Gu Zhaolin; Liu Hongjuan; Li Yun

    2004-01-01

    Latent heat thermal energy storage systems can be used to recover the rejected heat from air conditioning systems, which can be used to generate low-temperature hot water. It decreases not only the consumption of primary energy for heating domestic hot water but also the calefaction to the surroundings due to the rejection of heat from air conditioning systems. A recovery system using phase change materials (PCMs) to store the rejected (sensible and condensation) heat from air conditioning system has been developed and studied, making up the shortage of other sensible heat storage system. Also, PCMs compliant for heat recovery of air conditioning system should be developed. Technical grade paraffin wax has been discussed in this paper in order to develop a paraffin wax based PCM for the recovery of rejected heat from air conditioning systems. The thermal properties of technical grade paraffin wax and the mixtures of paraffin wax with lauric acid and with liquid paraffin (paraffin oil) are investigated and discussed, including volume expansion during the phase change process, the freezing point and the heat of fusion

  14. Factors influencing the transport accessibility level - seniors point of view

    Energy Technology Data Exchange (ETDEWEB)

    Zakowska, L.; Pulawska-Obiedowska, S.

    2016-07-01

    The growing group of European older inhabitants, namely senior citizens (aged + 65) belong to the most vulnerable group to social exclusion. Transport accessibility is a concept, that can lead to enhancing life quality of seniors, which is shown based on the case study of Cracow, Poland as a European city. 100 seniors, that are living in different areas (urban, suburban), were asked for define different aspects that may influence their travel behaviour. Respondents were indicating their individual concerns connected with travelling, the existing barriers and expected solutions.The goal of the paper is to present the main outcomes of the conducted surveys, in order to present the concept of transport accessibility in the context of the most important factors influencing seniors life quality. The accessibility conditions and barriers, which can affect mobility possibilities and different activities of senior citizens in urban areas, are indicated in the paper. The identification of the crucial aspects of accessibility play an important role in development of sustainable transport system together with sustainable urban design, that will be friendly for all citizens in aging society. (Author)

  15. Wire system aging assessment and condition monitoring (WASCO)

    International Nuclear Information System (INIS)

    Fantoni, P.F.

    2007-04-01

    Nuclear facilities rely on electrical wire systems to perform a variety of functions for successful operation. Many of these functions directly support the safe operation of the facility; therefore, the continued reliability of wire systems, even as they age, is critical. Condition Monitoring (CM) of installed wire systems is an important part of any aging program, both during the first 40 years of the qualified life and even more in anticipation of the license renewal for a nuclear power plant. This report contains some test results of a method for wire system condition monitoring, developed at the Halden Reactor Project, called LIRA (LIne Resonance Analysis), which can be used on-line to detect any local or global changes in the cable electrical parameters as a consequence of insulation faults or degradation. (au)

  16. Thermodynamic analysis of the two-phase ejector air-conditioning system for buses

    International Nuclear Information System (INIS)

    Ünal, Şaban; Yilmaz, Tuncay

    2015-01-01

    Air-conditioning compressors of the buses are usually operated with the power taken from the engine of the buses. Therefore, an improvement in the air-conditioning system will reduce the fuel consumption of the buses. The improvement in the coefficient of performance (COP) of the air-conditioning system can be provided by using the two-phase ejector as an expansion valve in the air-conditioning system. In this study, the thermodynamic analysis of bus air-conditioning system enhanced with a two-phase ejector and two evaporators is performed. Thermodynamic analysis is made assuming that the mixing process in ejector occurs at constant cross-sectional area and constant pressure. The increase rate in the COP with respect to conventional system is analyzed in terms of the subcooling, condenser and evaporator temperatures. The analysis shows that COP improvement of the system by using the two phase ejector as an expansion device is 15% depending on design parameters of the existing bus air-conditioning system. - Highlights: • Thermodynamic analysis of the two-phase ejector refrigeration system. • Analysis of the COP increase rate of bus air-conditioning system. • Analysis of the entrainment ratio of the two-phase ejector refrigeration system

  17. A New Time-Hopping Multiple Access Communication System Simulator: Application to Ultra-Wideband

    Directory of Open Access Journals (Sweden)

    José M. Páez-Borrallo

    2005-03-01

    Full Text Available Time-hopping ultra-wideband technology presents some very attractive features for future indoor wireless systems in terms of achievable transmission rate and multiple access capabilities. This paper develops an algorithm to design time-hopping system simulators specially suitable for ultra-wideband, which takes advantage of some of the specific characteristics of this kind of systems. The algorithm allows an improvement of both the time capabilities and the achievable sampling rate and can be used to research into the influence of different parameters on the performance of the system. An additional result is the validation of a new general performance formula for time-hopping ultra-wideband systems with multipath channels.

  18. Linearizability conditions for Lotka-Volterra planar complex cubic systems

    International Nuclear Information System (INIS)

    Gine, Jaume; Romanovski, Valery G

    2009-01-01

    In this paper, we investigate the linearizability problem for the two-dimensional planar complex system x-dot=x(1-a 10 x-a 01 y-a 20 x 2 -a 11 xy-a 02 y 2 ), y-dot=(1-b 10 x-b 01 y-b 20 x 2 -b 11 xy-b 02 y 2 ). The necessary and sufficient conditions for the linearizability of this system are found. From them the conditions for isochronicity of the corresponding real system can be derived

  19. Dynamic simulation of variable capacity refrigeration systems under abnormal conditions

    International Nuclear Information System (INIS)

    Liang Nan; Shao Shuangquan; Tian Changqing; Yan Yuying

    2010-01-01

    There are often abnormal working conditions at evaporator outlet of a refrigeration system, such as two-phase state in transient process, and it is essential to investigate such transient behaviours for system design and control strategy. In this paper, a dynamic lumped parameter model is developed to simulate the transient behaviours of refrigeration system with variable capacity in both normal and abnormal working conditions. The appropriate discriminant method is adopted to switch the normal and abnormal conditions smoothly and to eliminate the simulated data oscillation. In order to verify the dynamic model, we built a test system with variable frequency compressor, water-cooling condenser, evaporator and electronic expansion valve. Calculated values from the mathematical model show reasonable agreement with the experimental data. The simulation results show that the transient behaviours of the variable capacity refrigeration system in the abnormal working conditions can be calculated reliably with the dynamic model when the compressor rotary speed or the opening of electronic expansion valve changes abruptly.

  20. Remaining useful life estimation for deteriorating systems with time-varying operational conditions and condition-specific failure zones

    Directory of Open Access Journals (Sweden)

    Li Qi

    2016-06-01

    Full Text Available Dynamic time-varying operational conditions pose great challenge to the estimation of system remaining useful life (RUL for the deteriorating systems. This paper presents a method based on probabilistic and stochastic approaches to estimate system RUL for periodically monitored degradation processes with dynamic time-varying operational conditions and condition-specific failure zones. The method assumes that the degradation rate is influenced by specific operational condition and moreover, the transition between different operational conditions plays the most important role in affecting the degradation process. These operational conditions are assumed to evolve as a discrete-time Markov chain (DTMC. The failure thresholds are also determined by specific operational conditions and described as different failure zones. The 2008 PHM Conference Challenge Data is utilized to illustrate our method, which contains mass sensory signals related to the degradation process of a commercial turbofan engine. The RUL estimation method using the sensor measurements of a single sensor was first developed, and then multiple vital sensors were selected through a particular optimization procedure in order to increase the prediction accuracy. The effectiveness and advantages of the proposed method are presented in a comparison with existing methods for the same dataset.

  1. Form of Government and Political System: Conditions of Impossibility

    Directory of Open Access Journals (Sweden)

    Bogdan Iancu

    2012-12-01

    Full Text Available Successful constitutions manage to predetermine in juridical frame the political life of a country, by imposing a durable core equilibrium, i.e., a specific political system. The integrative function of the constitution derives from a reflexive political decision, at the constitution-making moment, for a specific form. The current theoretical difficulty in characterizing with precision the political system established by the Constitution of 1991 reflects the syncopated constitutional conflicts of recent years. The instability can be traced back to the continued absence of the preconditions for a genuine constitutional foundation. The initial indecision has been reinforced by later influences, including the EU accession process.

  2. Recent results on cleaning and conditioning the ATF vacuum system

    International Nuclear Information System (INIS)

    Langley, R.A.; Clark, T.L.; Glowienka, J.C.

    1989-01-01

    Techniques for cleaning and conditioning the vacuum vessel of the Advanced Toroidal Facility (ATF) and its internal components are described. The vacuum vessel cleaning technique combines baking to 150/degree/C and glow discharges with hydrogen gas. Chromium gettering is used to further condition the system. The major internal components are the anodized aluminum baffles in the Thomson scattering system, a graphite-shielded ICRF antenna, two graphite limiters, and a diagnostic graphite plate. Three independent heating systems are used to bake some of the major components of the system. The major characteristics used for assessing cleanliness and conditioning progress are the maximum pressure attained during bakeout, the results of gas analysis, and relevant plasma parameters (e.g., time to radiative decay). Details of the various cleaning and conditioning procedures and results are presented. 5 refs., 8 figs., 3 tabs

  3. Onboard power line conditioning system for an electric or hybrid vehicle

    Science.gov (United States)

    Kajouke, Lateef A.; Perisic, Milun

    2016-06-14

    A power line quality conditioning system for a vehicle includes an onboard rechargeable direct current (DC) energy storage system and an onboard electrical system coupled to the energy storage system. The energy storage system provides DC energy to drive an electric traction motor of the vehicle. The electrical system operates in a charging mode such that alternating current (AC) energy from a power grid external to the vehicle is converted to DC energy to charge the DC energy storage system. The electrical system also operates in a vehicle-to-grid power conditioning mode such that DC energy from the DC energy storage system is converted to AC energy to condition an AC voltage of the power grid.

  4. Centralized optical-frequency-comb-based RF carrier generator for DWDM fiber-wireless access systems

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Beltran, Marta; Sanchez, Jose

    2014-01-01

    In this paper, we report on a gigabit capacity fiber-wireless system that enables smooth integration between high-speed wireless networks and dense wavelength-division-multiplexing (DWDM) access networks. By employing a centralized optical frequency comb, both the wireline and the wireless services...

  5. The effects of system configuration and operating condition on the MCFC system efficiency

    Energy Technology Data Exchange (ETDEWEB)

    Kang, B.S. [Korea Electric Power Research Institute, Taejeon (Korea)

    2001-07-01

    The process simulation model of an externally reformed molten carbonate fuel cell (MCFC) system is used to analyze quantitatively the parametric effect on the system efficiency. In order to verify the MCFC process simulation model, the 25-kW system was analyzed on the basis of the experimental data and its calculated efficiency showed reasonable. The overall system efficiency of high-temperature fuel cell system, especially MCFC, can not be increased without the proper thermal integration between heat recovery units and additional power generation from auxiliary power generating units such as turbines. The simulation results show that the configuration of unit operators in a given system has great effect on the system efficiency while the system size and operating condition have slightly lower effect on it. Based on the system configuration, optimal operating condition including fuel, oxidant utilization, and recycle ratio can be specified to maximize the system efficiency. (author). 12 refs., 10 figs., 2 tabs.

  6. Mitigation of Beat Noise in Time Wavelength Optical Code-Division Multiple-Access Systems

    Science.gov (United States)

    Bazan, Taher M.; Harle, David; Andonovic, Ivan

    2006-11-01

    This paper presents an analysis of two methods for enhancing the performance of two-dimensional time wavelength Optical code-division multiple-access systems by mitigating the effects of beat noise. The first methodology makes use of an optical hard limiter (OHL) in the receiver prior to the optical correlator; a general formula for the error probability as a function of crosstalk level for systems adopting OHLs is given, and the implications of the OHL's nonideal transfer characteristics are then examined. The second approach adopts pulse position modulation, and system performance is estimated and compared to that associated with on off keying.

  7. Variation in Educational Services Receipt Among US Children With Developmental Conditions.

    Science.gov (United States)

    Lindly, Olivia J; Sinche, Brianna K; Zuckerman, Katharine E

    2015-01-01

    To examine the relationship between ease of access to needed community-based services (ease of access) and educational services receipt, and variation in educational services receipt by sociodemographic and need factors among a nationally representative sample of children with autism spectrum disorder (ASD), developmental delay (DD), and/or intellectual disability (ID). Data from the 2009-2010 National Survey of Children with Special Health Care Needs were linked to the 2011 Survey of Pathways to Diagnosis and Services on a sample of 3502 US children aged 6 to 17 years with ASD, DD, and/or ID. Descriptive statistics, chi-square tests, and multivariable logistic regression models were used to determine associations of educational services receipt with ease of access and sociodemographic and need factors. Among children with developmental conditions, nearly half (49.7%) lacked easy access to services, and 16.9% did not have an individualized education program (IEP). Among children with an IEP, those with ease of access were more likely to have an IEP that addressed parent concerns about the child's development and education than those unable to easily access services (adjusted odds ratio 2.77; 95% confidence interval 1.71-4.49). Need factors, including functional limitations status, care coordination need, developmental condition type, and early intervention receipt, were significantly associated with educational services receipt. Cross-systems initiatives facilitating service access remain important to ensuring the developmental needs of children with ASD, DD, and/or ID are met. Increased interprofessional collaboration promoting quality educational services receipt for children diagnosed with developmental conditions may further reduce disparities. Copyright © 2015 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.

  8. Assessing health systems for type 1 diabetes in sub-Saharan Africa: developing a 'Rapid Assessment Protocol for Insulin Access'

    Directory of Open Access Journals (Sweden)

    de Courten Maximilian

    2006-02-01

    Full Text Available Abstract Background In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol for the gathering of other data through site visits, discussions, and document reviews. Methods The Rapid Assessment Protocol for Insulin Access draws on the principles of Rapid Assessment Protocols which have been developed and implemented in several different areas. This protocol was adapted through a thorough literature review on diabetes, chronic condition management and medicine supply in developing countries. A visit to three countries in sub-Saharan Africa and meetings with different experts in the field of diabetes helped refine the questionnaires. Following the development of the questionnaires these were tested with various people familiar with diabetes and/or healthcare in developing countries. The Protocol was piloted in Mozambique then refined and had two further iterations in Zambia and Mali. Translations of questionnaires were made into local languages when necessary, with back translation to ensure precision. Results In each country the protocol was implemented in 3 areas – the capital city, a large urban centre and a predominantly rural area and their respective surroundings. Interviews were carried out by local teams trained on how to use the tool. Data was then collected and entered into a database for analysis. Conclusion The Rapid Assessment Protocol for Insulin Access was developed to provide a situational analysis of Type 1 diabetes, in order to make recommendations to the national Ministries of Health and Diabetes Associations. It provided valuable information on patients' access to insulin, syringes, monitoring and care. It was thus able to sketch a picture of the health care system with regards to its ability to

  9. Thermal Environment for Classrooms. Central System Approach to Air Conditioning.

    Science.gov (United States)

    Triechler, Walter W.

    This speech compares the air conditioning requirements of high-rise office buildings with those of large centralized school complexes. A description of one particular air conditioning system provides information about the system's arrangement, functions, performance efficiency, and cost effectiveness. (MLF)

  10. Potential Evaluation of Solar Heat Assisted Desiccant Hybrid Air Conditioning System

    Science.gov (United States)

    Tran, Thien Nha; Hamamoto, Yoshinori; Akisawa, Atsushi; Kashiwagi, Takao

    The solar thermal driven desiccant dehumidification-absorption cooling hybrid system has superior advantage in hot-humid climate regions. The reasonable air processing of desiccant hybrid air conditioning system and the utility of clean and free energy make the system environment friendly and energy efficient. The study investigates the performance of the desiccant dehumidification air conditioning systems with solar thermal assistant. The investigation is performed for three cases which are combinations of solar thermal and absorption cooling systems with different heat supply temperature levels. Two solar thermal systems are used in the study: the flat plate collector (FPC) and the vacuum tube with compound parabolic concentrator (CPC). The single-effect and high energy efficient double-, triple-effect LiBr-water absorption cooling cycles are considered for cooling systems. COP of desiccant hybrid air conditioning systems are determined. The evaluation of these systems is subsequently performed. The single effect absorption cooling cycle combined with the flat plate collector solar system is found to be the most energy efficient air conditioning system.

  11. EPICS: Channel Access security design

    International Nuclear Information System (INIS)

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer's interface is given. Security protocol is described and finally aids for reading the access security code are provided

  12. An overview of the access issue

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Transmission access if a term used to describe the concept of making a utility's transmission lines available to other utilities and non-utilities for buying and selling electricity. Interest in the issue has increased recently because of current industry conditions. Marketing excess capacity, exploiting cost differences between utilities, and the growth of non-utility capacity have made transmission important to many of the traditional and non-traditional industry participants. Although, transmission service has increased substantially faster than retail sales, there is some concern the present supply and access conditions are inadequate. Moreover, many believe there remains significant potential for broad economic benefits from power transfers which are precluded by current institutional constraints. Proposals for greater access are usually justified on the basis of competition. A main benefit of wheeling is that customers are no longer limited to a single supplier for their electric needs

  13. Radiation alarms and access control systems: Recommendations of the National Council on Radiation Protection and Measurements

    International Nuclear Information System (INIS)

    1986-01-01

    In facilities where radioactive materials are handled, or where radiation-producing equipment is used, the building, the equipment, and the associated safety procedures should be designed and developed together to provide a safe work environment. The specific combination of requirements for a given facility is defined by the operational radiation safety program. It should be emphasized that this report describes a range of alarm and access control systems that can provide an acceptable level of safety at many types of facilities. Depending on circumstances, the solutions offered may not be appropriate for certain facilities because they are to restrictive, not restrictive enough, or do not cover all circumstances. The document is offered as a starting point providing ideas that professional health physicists can adapt to meet the needs of a particular situation. Under no circumstances should this report be interpreted in ''cookbook'' fashion, with literal adherence to every recommendation demanded, nor should it be expected to provide adequate protection in every case without consideration of local conditions

  14. Equity for open-access journal publishing.

    Directory of Open Access Journals (Sweden)

    Stuart M Shieber

    2009-08-01

    Full Text Available Open-access journals, which provide access to their scholarly articles freely and without limitations, are at a systematic disadvantage relative to traditional closed-access journal publishing and its subscription-based business model. A simple, cost-effective remedy to this inequity could put open-access publishing on a path to become a sustainable, efficient system.

  15. NUDAT. System for access to nuclear data. Summary description

    International Nuclear Information System (INIS)

    Dunford, C.L.; Kinsey, R.R.

    1998-01-01

    The NUDAT program with its associated database provides access to nuclear properties and some nuclear reaction data. The program has interfaces for WWW, Telnet online access, and PC. The database contains the following information: level and gamma-ray adopted properties from ENSDF; nuclear ground and metastable state properties; radioactive decay radiations from ENSDF; thermal neutron cross sections and resonance integrals as published in 'Neutron Cross Sections', Vol. 1. The online version is accessible through the IAEA's WWW site or through the Telnet online service NDIS, the PC version is available by FTP or on CD-ROM. (author)

  16. 40 CFR 267.34 - When must personnel have access to communication equipment or an alarm system?

    Science.gov (United States)

    2010-07-01

    ... to an internal alarm or emergency communication device, either directly or through visual or voice... communication equipment or an alarm system? 267.34 Section 267.34 Protection of Environment ENVIRONMENTAL... have access to communication equipment or an alarm system? (a) Whenever hazardous waste is being poured...

  17. Russia's accession to the WTO as an important factor of the country's integration into the world economy

    Directory of Open Access Journals (Sweden)

    Linetsky Alexander

    2011-12-01

    Full Text Available Russia's accession to the WTO is an efficient instrument of the country's integration into the globalized world economy. However, it can adversely affect a number of enterprises and industries within the national economy. Thus, there is a need to develop a methodology for the assessment of the preparedness for operating under WTO membership conditions, which can be practically applied in the development of measures aimed at increasing the competitiveness of economic entities. This determines the objective of the research. This article offers the author's assessment of the reasonability of Russia's accession to the WTO and suggests methodological approaches to the assessment of preparedness of the constituent entities of the Russian Federation for functioning in the new economic conditions based on the algorithm of choosing a system of indicators, as well as the organisation of enterprise monitoring according to this system, which makes it possible to formulate rational administrative decisions in order to minimise the adverse effects of Russia's accession to the WTO. The major result of the research is the conclusion that, although the objective of identifying the start position of the constituent entities before the accession to the WTO and its possible implications is quite difficult to attain, it is both theoretically and practically feasible.

  18. Informal workers and access to healthcare: a qualitative study of facilitators and barriers to accessing healthcare for beer promoters in the Lao People's Democratic Republic.

    Science.gov (United States)

    Sychareun, Vanphanom; Vongxay, Viengnakhone; Thammavongsa, Vassana; Thongmyxay, Souksamone; Phummavongsa, Phouthong; Durham, Jo

    2016-04-18

    Informal workers often face considerable risks and vulnerabilities as a consequence of their work and employment conditions. The purpose of this study was to examine the interplay between the experience of informal work and access to health, using as an example, female beer promoters employed in the informal economy, in the Lao People's Democratic Republic. In-depth interviews were undertaken with 24 female beer promoters working in beer shops, restaurants and entertainment venues in Vientiane City. The recruitment strategy of snowball sampling was used. Interviews explored the beer promoter's experience of the organization of work, perceived healthcare needs, access to healthcare and insurance, and health seeking practices. The data was analysed thematically and subsequently using Bourdieu's concepts of habitus, capital and field. Most of the beer promoters included in the study were 18 years of age, single, had worked as beer promoters for more than one year and just over half were working to support their higher education. The beer promoters demonstrated a holistic view of health, also viewing good health as contributing to being beautiful - an important attribute in their work. Many reported that their work conditions, including the noisy environment, exposure to second-hand tobacco smoke, long hours on their feet and sexual harassment negatively affected their physical and mental health. Only four participants had any form of health insurance with access to healthcare constrained by individual characteristics, health system factors and the conditions of their informal employment. Drawing on the work of Bourdieu, the study shows how both employment and illness are linked to habitus embodied in everyday practices, access to capital and the position the female beer promoters hold in the social hierarchy in the field of employment.

  19. DEVELOPMENT OF AUTOMATED SYSTEM OF CLIMATE CONDITIONS MANAGEMENT

    Directory of Open Access Journals (Sweden)

    Novikova L.V.

    2017-12-01

    Full Text Available The scientific work is devoted to the analysis and development of the automated control system of the climatic conditions of the minites. The analysis of existing automated control systems is carried out, in particular attention is paid to the systems of climate control of greenhouses. The technical means of the control system are determined. As a platform, Arduino®Uno is selected.

  20. Access control system in Hamaoka Nuclear Power Station

    International Nuclear Information System (INIS)

    Kaneda, Hisashi; Shimura, Shigetaka; Suzuki, Katsuhiko; Kitazawa, Toshiichi

    1983-01-01

    The new computerized system has introduced to improve function of radiation protection for those who enter the radiation control area, by dealing with measurement of radiation dose, check of personal qualification, resistration of working condition and statistical treatment of these data. This system uses combined TLD, ''TL BADGE'', as a radiation detection sensor, instead of conventional pocket dosimeter and film badge. TL BADGE reading instrument are installed at the entrance to the control area and at working areas. The data of radiation dose, personal qualification etc. read by the reading instrument are transmitted directly to the computer system, which compiles and transacts these data. This system is consisted of three minicomputers, double memory files, CRTs for effective data search and display and floppy disks as a medium for registration, etc. Thus the computer system improves its reliability and the maintenanceability of data, being capable of automatical transaction of a great amount of data quickly. This report describes: Concept of using computer system, System outline, Measurement of radiation dose and Operational functions. (author)

  1. Direct data access protocols benchmarking on DPM

    CERN Document Server

    Furano, Fabrizio; Keeble, Oliver; Mancinelli, Valentina

    2015-01-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring infor...

  2. 76 FR 10529 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-02-25

    ... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... electronic system security protection for the aircraft control domain and airline information domain from... identified and assessed, and that effective electronic system security protection strategies are implemented...

  3. 76 FR 36863 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-06-23

    ... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... for Gulfstream GVI airplanes. 1. The applicant must ensure electronic system security protection for... that effective electronic system security protection strategies are implemented to protect the airplane...

  4. Enabling technologies for millimeter-wave radio-over-fiber systems in next generation heterogeneous mobile access networks

    Science.gov (United States)

    Zhang, Junwen; Yu, Jianjun; Wang, Jing; Xu, Mu; Cheng, Lin; Lu, Feng; Shen, Shuyi; Yan, Yan; Cho, Hyunwoo; Guidotti, Daniel; Chang, Gee-kung

    2017-01-01

    Fifth-generation (5G) wireless access network promises to support higher access data rate with more than 1,000 times capacity with respect to current long-term evolution (LTE) systems. New radio-access-technologies (RATs) based on higher carrier frequencies to millimeter-wave (MMW) radio-over-fiber, and carrier-aggregation (CA) using multi-band resources are intensively studied to support the high data rate access and effectively use of frequency resources in heterogeneous mobile network (Het-Net). In this paper, we investigate several enabling technologies for MMW RoF systems in 5G Het-Net. Efficient mobile fronthaul (MFH) solutions for 5G centralized radio access network (C-RAN) and beyond are proposed, analyzed and experimentally demonstrated based on the analog scheme. Digital predistortion based on memory polynomial for analog MFH linearization are presented with improved EVM performances and receiver sensitivity. We also propose and experimentally demonstrate a novel inter-/intra- RAT CA scheme for 5G Het- Net. The real-time standard 4G-LTE signal is carrier-aggregated with three broadband 60GHz MMW signals based on proposed optical-domain band-mapping method. RATs based on new waveforms have also been studied here to achieve higher spectral-efficiency (SE) in asynchronous environments. Full-duplex asynchronous quasi-gapless carrier aggregation scheme for MMW ROF inter-/intra-RAT based on the FBMC is also presented with 4G-LTE signals. Compared with OFDM-based signals with large guard-bands, FBMC achieves higher spectral-efficiency with better EVM performance at less received power and smaller guard-bands.

  5. A satellite mobile communication system based on Band-Limited Quasi-Synchronous Code Division Multiple Access (BLQS-CDMA)

    Science.gov (United States)

    Degaudenzi, R.; Elia, C.; Viola, R.

    1990-01-01

    Discussed here is a new approach to code division multiple access applied to a mobile system for voice (and data) services based on Band Limited Quasi Synchronous Code Division Multiple Access (BLQS-CDMA). The system requires users to be chip synchronized to reduce the contribution of self-interference and to make use of voice activation in order to increase the satellite power efficiency. In order to achieve spectral efficiency, Nyquist chip pulse shaping is used with no detection performance impairment. The synchronization problems are solved in the forward link by distributing a master code, whereas carrier forced activation and closed loop control techniques have been adopted in the return link. System performance sensitivity to nonlinear amplification and timing/frequency synchronization errors are analyzed.

  6. An air-conditioning, ventilation and automatic ventilation monitoring and recording system constructed in an unsealed radioisotope laboratory. Energy-saving measures in Nagasaki University Radioisotope Center

    International Nuclear Information System (INIS)

    Takatsuji, Toshihiro; Yoshida, Masahiro; Takao, Hideaki; Okumura, Yutaka; Ooura, Tosinobu; Kotoura, Kazuki; Yamanaka, Yasushi; Yanagita, Hiroyoshi.

    1998-01-01

    We constructed an automatic operation system of air-conditioners and ventilators in a radiation controlled area to minimize electric consumption. The system operates the air-conditioner and the ventilator of each ventilation unit when someone is staying in rooms belonging to the unit based on information from an access control system to the controlled area and lighting switches in front of individual room. For understanding of operation conditions and confirmation of radioactive concentration in air lower than the legal limit at the ventilation stack, we also constructed an automatic ventilation monitoring and recording system, which makes complete operation records of each ventilator automatically. These systems enabled to achieve sharp energy-saving compatible with radiation protection. (author)

  7. J-TEXT WebScope: An efficient data access and visualization system for long pulse fusion experiment

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Wei, E-mail: zhenghaku@gmail.com [State Key Laboratory of Advanced Electromagnetic Engineering and Technology in Huazhong University of Science and Technology, Wuhan 430074 (China); School of Electrical and Electronic Engineering in Huazhong University of Science and Technology, Wuhan 430074 (China); Wan, Kuanhong; Chen, Zhi; Hu, Feiran; Liu, Qiang [State Key Laboratory of Advanced Electromagnetic Engineering and Technology in Huazhong University of Science and Technology, Wuhan 430074 (China); School of Electrical and Electronic Engineering in Huazhong University of Science and Technology, Wuhan 430074 (China)

    2016-11-15

    Highlights: • No matter how large the data is, the response time is always less than 500 milliseconds. • It is intelligent and just gives you the data you want. • It can be accessed directly over the Internet without installing special client software if you already have a browser. • Adopt scale and segment technology to organize data. • To support a new database for the WebScope is quite easy. • With the configuration stored in user’s profile, you have your own portable WebScope. - Abstract: Fusion research is an international collaboration work. To enable researchers across the world to visualize and analyze the experiment data, a web based data access and visualization tool is quite important [1]. Now, a new WebScope based on RIA (Rich Internet Application) is designed and implemented to meet these requirements. On the browser side, a fluent and intuitive interface is provided for researchers at J-TEXT laboratory and collaborators from all over the world to view experiment data and related metadata. The fusion experiments will feature long pulse and high sampling rate in the future. The data access and visualization system in this work has adopted segment and scale concept. Large data samples are re-sampled in different scales and then split into segments for instant response. It allows users to view extremely large data on the web browser efficiently, without worrying about the limitation on the size of the data. The HTML5 and JavaScript based web front-end can provide intuitive and fluent user experience. On the server side, a RESTful (Representational State Transfer) web API, which is based on ASP.NET MVC (Model View Controller), allows users to access the data and its metadata through HTTP (HyperText Transfer Protocol). An interface to the database has been designed to decouple the data access and visualization system from the data storage. It can be applied upon any data storage system like MDSplus or JTEXTDB, and this system is very easy to

  8. J-TEXT WebScope: An efficient data access and visualization system for long pulse fusion experiment

    International Nuclear Information System (INIS)

    Zheng, Wei; Wan, Kuanhong; Chen, Zhi; Hu, Feiran; Liu, Qiang

    2016-01-01

    Highlights: • No matter how large the data is, the response time is always less than 500 milliseconds. • It is intelligent and just gives you the data you want. • It can be accessed directly over the Internet without installing special client software if you already have a browser. • Adopt scale and segment technology to organize data. • To support a new database for the WebScope is quite easy. • With the configuration stored in user’s profile, you have your own portable WebScope. - Abstract: Fusion research is an international collaboration work. To enable researchers across the world to visualize and analyze the experiment data, a web based data access and visualization tool is quite important [1]. Now, a new WebScope based on RIA (Rich Internet Application) is designed and implemented to meet these requirements. On the browser side, a fluent and intuitive interface is provided for researchers at J-TEXT laboratory and collaborators from all over the world to view experiment data and related metadata. The fusion experiments will feature long pulse and high sampling rate in the future. The data access and visualization system in this work has adopted segment and scale concept. Large data samples are re-sampled in different scales and then split into segments for instant response. It allows users to view extremely large data on the web browser efficiently, without worrying about the limitation on the size of the data. The HTML5 and JavaScript based web front-end can provide intuitive and fluent user experience. On the server side, a RESTful (Representational State Transfer) web API, which is based on ASP.NET MVC (Model View Controller), allows users to access the data and its metadata through HTTP (HyperText Transfer Protocol). An interface to the database has been designed to decouple the data access and visualization system from the data storage. It can be applied upon any data storage system like MDSplus or JTEXTDB, and this system is very easy to

  9. Variation of Enzyme Activities and Metabolite Levels in 24 Arabidopsis Accessions Growing in Carbon-Limited Conditions1[W

    Science.gov (United States)

    Cross, Joanna M.; von Korff, Maria; Altmann, Thomas; Bartzetko, Linda; Sulpice, Ronan; Gibon, Yves; Palacios, Natalia; Stitt, Mark

    2006-01-01

    Our understanding of the interaction of carbon (C) metabolism with nitrogen (N) metabolism and growth is based mainly on studies of responses to environmental treatments, and studies of mutants and transformants. Here, we investigate which metabolic parameters vary and which parameters change in a coordinated manner in 24 genetically diverse Arabidopsis (Arabidopsis thaliana) accessions, grown in C-limited conditions. The accessions were grown in short days, moderate light, and high nitrate, and analyzed for rosette biomass, levels of structural components (protein, chlorophyll), total phenols and major metabolic intermediates (sugars, starch, nitrate, amino acids), and the activities of seven representative enzymes from central C and N metabolism. The largest variation was found for plant weight, reducing sugars, starch at the end of the night, and several enzyme activities. High levels of one sugar correlated with high levels of other sugars and starch, and a trend to increased amino acids, slightly lower nitrate, and higher protein. The activities of enzymes at the interface of C and N metabolism correlated with each other, but were unrelated to carbohydrates, amino acid levels, and total protein. Rosette weight was unrelated or showed a weak negative trend to sugar and amino acid contents at the end of the day in most of the accessions, and was negatively correlated with starch at the end of the night. Rosette weight was positively correlated with several enzyme activities. We propose that growth is not related to the absolute levels of starch, sugars, and amino acids; instead, it is related to flux, which is indicated by the enzymatic capacity to use these central resources. PMID:17085515

  10. New Fast Beam Conditions Monitoring (BCM1F) system for CMS

    Science.gov (United States)

    Zagozdzinska, A. A.; Bell, A. J.; Dabrowski, A. E.; Hempel, M.; Henschel, H. M.; Karacheban, O.; Przyborowski, D.; Leonard, J. L.; Penno, M.; Pozniak, K. T.; Miraglia, M.; Lange, W.; Lohmann, W.; Ryjov, V.; Lokhovitskiy, A.; Stickland, D.; Walsh, R.

    2016-01-01

    The CMS Beam Radiation Instrumentation and Luminosity (BRIL) project is composed of several systems providing the experiment protection from adverse beam conditions while also measuring the online luminosity and beam background. Although the readout bandwidth of the Fast Beam Conditions Monitoring system (BCM1F—one of the faster monitoring systems of the CMS BRIL), was sufficient for the initial LHC conditions, the foreseen enhancement of the beams parameters after the LHC Long Shutdown-1 (LS1) imposed the upgrade of the system. This paper presents the new BCM1F, which is designed to provide real-time fast diagnosis of beam conditions and instantaneous luminosity with readout able to resolve the 25 ns bunch structure.

  11. EQUITABLE ACCESS TO HEALTH SERVICE IN BANYUWANGI

    Directory of Open Access Journals (Sweden)

    Lusi Herawati Sunyoto Usman Mark Zuidgeest

    2012-06-01

    as indicators. Flowmap tool is used to analyze catchment area of each health facility using different transport modes choice:becak and public transport for poor group and motorcycle and car for non-poor group with different travel time within 30, 60 and more than 60 minutes. It is concluded that there was an accessibility difference between poor and non-poor group. The accessibility to the health facilities of poor group was lower than non-poor group. This condition occurred because the government policy of equitable access to health service facility did not pay attention to accessibility of poor group.

  12. Study on Mandatory Access Control in a Secure Database Management System

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation-hierarchical data model is extended to multilevel relation-hierarchical data model. Based on the multilevel relation-hierarchical data model, the concept of upper-lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation-hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects (e. g., multilevel spatial data) and multilevel conventional data ( e. g., integer. real number and character string).

  13. Integrability and boundary conditions of supersymmetric systems

    International Nuclear Information System (INIS)

    Yue Ruihong; Liang Hong

    1996-01-01

    By studying the solutions of the reflection equations, we find out a series of integrable supersymmetric systems with different boundary conditions. The Hamiltonian contains four free parameters which describe the contribution of the boundary terms

  14. The System-Synergetic Approach to Development of Banking Systems under Conditions of Financial Instability

    Directory of Open Access Journals (Sweden)

    Karcheva Ganna T.

    2015-03-01

    Full Text Available The aim of the article is to study the theoretical and practical aspects of using the system-synergetic approach to the development and functioning of banking systems under conditions of financial instability. It has been grounded that the theoretical foundations for the development of banking systems are based on the system approach, according to which the banking systems belong to a class of special complex dynamic, self-motivated and open systems with an integrated structure of subsystems and functions. The study of such systems should include two aspects — system-cybernetic and system-synergetic ones. It has been proved that under stationary conditions the banking system development goes on in accordance with the systemcybernetic model, which suggests the presence of a management subsystem, which functions are performed by the central bank. Under conditions of financial instability, in the pre-crisis, crisis and post-crisis periods to study the development of banking systems the system-synergetic approach taking into account the multi-variant and alternative development of the banking system at bifurcation points is used. The criteria of the banking system entering the phase of bifurcation based on assessing the volatility of the current liabilities and possibility of building an analytical trend have been determined. The methodical approaches to evaluating the synergistic effects and level of financial stability of the banking system have been suggested, experimental calculations have been made.

  15. Systemic conditions and treatments as risk for therapy with dental implants

    International Nuclear Information System (INIS)

    Arguedas Vega, Natalia; Alfaro Mayorga, Erika

    2013-01-01

    The possible risks for osseointegration are described in patients with specific systemic conditions, medical treatment such as radiation, cardiovascular diseases, HIV and smoking habit. The principal complications for osseointegration of diseases and systemic treatments are exposed. The review and search of the available literature are realized in databases. The scientific literature obtained from human studies has reported the survival of patients with dental implants. The implants are placed in patients with at least one of the conditions studied. The risks of the surgical procedures required for the placement of implants are analyzed in systemically compromised patients. Comparisons of patients with and without systemic conditions in controlled form have remained without analyzing. The level of evidence of absolute and relative contraindications has been low for the therapy with implants in patients with systemic diseases. The revised information is detailed according the systemic conditions, and each of them are evaluated separately [es

  16. Understanding the political economy and key drivers of energy access in addressing national energy access priorities and policies: African Perspective

    International Nuclear Information System (INIS)

    Khennas, Smail

    2012-01-01

    This paper is focused on the key drivers of energy access in North and sub-Saharan Africa which are characterized by huge discrepancies in terms of energy access to modern forms of energy. The paper points out that long term development strategies and large programmes with significant financial resources are essential to achieving substantial results in terms of energy access. The paper argues that building up the energy infrastructure (power plants, grid interconnections and small-scale decentralized energy options in rural areas.) is a pre-condition for economic growth and ultimately for energy access. It underlines that historically there is a trend towards more efficient, convenient and cost effective forms of energy. Low carbon path and above all renewable will therefore play an increasing role in the energy mix in the next couple of decades. Manufacturing of capital goods for the renewable energy industry in Africa will be a key challenge to achieving energy security economic growth and energy access. - Highlights: ► Sharp differences of energy access situation and approaches between North and Sub Saharan Africa. ► Energy infrastructure is a pre-condition to economic growth and energy access. ► Interconnections and small-scale decentralized energy schemes are a good mechanism to increasing energy access. ► However interconnections will only contribute marginally to the urban-rural energy divide. ► Manufacturing of capital goods is a key challenge to economic development.

  17. Incident and Trafficking Database: New Systems for Reporting and Accessing State Information

    International Nuclear Information System (INIS)

    Dimitrovski, D.; Kittley, S.

    2015-01-01

    The IAEA's Incident and Trafficking Database (ITDB) is the Agency's authoritative source for information on incidents in which nuclear and other radioactive material is out of national regulatory control. It was established in 1995 and, as of June 2014, 126 States participate in the ITDB programme. Currently, the database contains over 2500 confirmed incidents, out of which 21% involve nuclear material, 62% radioactive source and 17% radioactively contaminated material. In recent years, the system for States to report incidents to the ITDB has been evolving — moving from fax-based to secure email and most recently to secure on-line reporting. A Beta version of the on-line system was rolled out this June, offering a simple, yet secure, communication channel for member states to provide information. In addition the system serves as a central hub for information related to official communication of the IAEA with Member States so some communication that is traditionally shared by e-mail does not get lost when ITDB counterparts change. In addition the new reporting system incorporates optional features that allow multiple Member State users to collaboratively contribute toward an INF. States are also being given secure on-line access to a streamlined version of the ITDB. This improves States' capabilities to retrieve and analyze information for their own purposes. In addition, on-line access to ITDB statistical information on incidents is available to States through an ITDB Dashboard. The dashboard contains aggregate information on number and types of incidents, material involved, as well some other statistics related to the ITDB that is typically provided in the ITDB Quarterly reports. (author)

  18. Mobile and Accessible Learning for MOOCs

    Science.gov (United States)

    Sharples, Mike; Kloos, Carlos Delgado; Dimitriadis, Yannis; Garlatti, Serge; Specht, Marcus

    2015-01-01

    Many modern web-based systems provide a "responsive" design that allows material and services to be accessed on mobile and desktop devices, with the aim of providing "ubiquitous access." Besides offering access to learning materials such as podcasts and videos across multiple locations, mobile, wearable and ubiquitous…

  19. Air conditioning systems as non-infectious health hazards inducing acute respiratory symptoms.

    Science.gov (United States)

    Gerber, Alexander; Fischer, Axel; Willig, Karl-Heinz; Groneberg, David A

    2006-04-01

    Chronic and acute exposure to toxic aerosols belongs to frequent causes of airway diseases. However, asthma attacks due to long-distance inhalative exposure to organic solvents, transmitted via an air condition system, have not been reported so far. The present case illustrates the possibility of air conditioning systems as non-infectious health hazards in occupational medicine. So far, only infectious diseases such as legionella pneumophila pneumonia have commonly been associated to air-conditioning exposures but physicians should be alert to the potential of transmission of toxic volatile substances via air conditioning systems. In view of the events of the 11th of September 2001 with a growing danger of large building terrorism which may even use air conditioning systems to transmit toxins, facility management security staff should be alerted to possible non-infectious toxic health hazards arising from air-conditioning systems.

  20. User-Based Information Retrieval System Interface Evaluation: An Examination of an On-Line Public Access Catalog.

    Science.gov (United States)

    Hert, Carol A.; Nilan, Michael S.

    1991-01-01

    Presents preliminary data that characterizes the relationship between what users say they are trying to accomplish when using an online public access catalog (OPAC) and their perceptions of what input to give the system. Human-machine interaction is discussed, and appropriate methods for evaluating information retrieval systems are considered. (18…

  1. Open Access Publishing in Particle Physics

    CERN Document Server

    2007-01-01

    Particle Physics, often referred to as High Energy Physics (HEP), spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-Web era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peerreview system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs...

  2. On the generalization of attitude accessibility after repeated attitude expression

    Science.gov (United States)

    Spruyt, Adriaan; Fazio, Russell H.; Hermans, Dirk

    2016-01-01

    Abstract The more accessible an attitude is, the stronger is its influence on information processing and behavior. Accessibility can be increased through attitude rehearsal, but it remains unknown whether attitude rehearsal also affects the accessibility of related attitudes. To investigate this hypothesis, participants in an experimental condition repeatedly expressed their attitudes towards exemplars of several semantic categories during an evaluative categorization task. Participants in a control condition performed a non‐evaluative task with the same exemplars and evaluated unrelated attitude objects. After a 30‐minute interval, participants in the experimental condition were faster than controls to evaluate not only the original exemplars but also novel exemplars of the same categories. This finding suggests that the effect of attitude rehearsal on accessibility generalizes to attitudes towards untrained but semantically related attitude objects. © 2016 The Authors. European Journal of Social Psychology published by John Wiley & Sons, Ltd. PMID:28701803

  3. An Automated Mouse Tail Vascular Access System by Vision and Pressure Feedback.

    Science.gov (United States)

    Chang, Yen-Chi; Berry-Pusey, Brittany; Yasin, Rashid; Vu, Nam; Maraglia, Brandon; Chatziioannou, Arion X; Tsao, Tsu-Chin

    2015-08-01

    This paper develops an automated vascular access system (A-VAS) with novel vision-based vein and needle detection methods and real-time pressure feedback for murine drug delivery. Mouse tail vein injection is a routine but critical step for preclinical imaging applications. Due to the small vein diameter and external disturbances such as tail hair, pigmentation, and scales, identifying vein location is difficult and manual injections usually result in poor repeatability. To improve the injection accuracy, consistency, safety, and processing time, A-VAS was developed to overcome difficulties in vein detection noise rejection, robustness in needle tracking, and visual servoing integration with the mechatronics system.

  4. Architectural Considerations of Fiber-Radio Millimeter-Wave Wireless Access Systems

    Science.gov (United States)

    Kitayama, Ken-Ichi

    The architecture of fiber-radio mm-wave wireless access systems critically depends upon the optical mm-wave generation and transport techniques. Four optical mm-wave generation and transport techniques: 1) optical self-heterodyning, 2) external modulation, 3) up- and downconversion, and 4) optical transceiver, will be assessed. From the technical viewpoints, their advantages and disadvantages are discussed. The economical assessment, focusing on the cost of a base station BS ( ), will suggest that the optical transceiver looks the most promising in the long run, but in the near future, however, the external modulation will be cost-effective. The experimental results of 60 GHz testbeds using the external modulation will support the conclusion.

  5. Informatics and Society: The Challenge of Improving IT Accessibility

    Directory of Open Access Journals (Sweden)

    Bruce Diamond

    2005-12-01

    Full Text Available Information technology (IT is an important part of society and has assumed an increasing role in education, medicine, commercial, leisure, and sociopolitical applications. However, while progress in developing IT hardware and software has advanced, our understanding of user needs and how these needs can be translated into more accessible and effective system design lags behind. The challenge that we face is rooted in the fact that many individuals across this planet who are differently-abled due to aging, developmental or neurologic conditions or to individual differences in learning, face obstacles in using and accessing IT. The central thesis of this paper is that the effective delivery of IT to the differently-abled is contingent on deriving enough information about user populations to allow for the development and use of personalized interfaces and customized content. To this end, it is proposed that a combination of adaptive hypermedia and cognitive adaptive strategies integrating metadata architecture for representing the results of cognitive and functional assessments be designed and implemented. Keywords: Information technology, accessibility, differently-abled, adaptive hypermedia, informatics

  6. Atomic memory access hardware implementations

    Science.gov (United States)

    Ahn, Jung Ho; Erez, Mattan; Dally, William J

    2015-02-17

    Atomic memory access requests are handled using a variety of systems and methods. According to one example method, a data-processing circuit having an address-request generator that issues requests to a common memory implements a method of processing the requests using a memory-access intervention circuit coupled between the generator and the common memory. The method identifies a current atomic-memory access request from a plurality of memory access requests. A data set is stored that corresponds to the current atomic-memory access request in a data storage circuit within the intervention circuit. It is determined whether the current atomic-memory access request corresponds to at least one previously-stored atomic-memory access request. In response to determining correspondence, the current request is implemented by retrieving data from the common memory. The data is modified in response to the current request and at least one other access request in the memory-access intervention circuit.

  7. Power conditioning system for a nuclear reactor

    International Nuclear Information System (INIS)

    Higashigawa, Yuichi; Joge, Toshio.

    1981-01-01

    Purpose: To provide a power conditioning system for a BWR type reactor which has a function to be automatically operated within a range that the relationship between the heat power of the reactor and the electric power of an electric generator does not lose the safety of fuel by eliminating the unnecessary fluctuation of the power of the reactor. Constitution: A load request error signal fed from a conventional turbine control system to recirculation flow regulator is eliminated, and a reactor power conditioning system is newly provided, to which an electric generator power signal, a reactor average power area monitor signal and a load request signal are inputted. Thus, the load request signal is compared directly with the electric power of the electric generator, the recirculation flow rate is controlled by the compared result, and whether the correlation between the heat power of the reqctor and the electric power of the generator satisfies the correlation determined to prove the safety of fuel or not is checked. If this correlation is satisfied, the recirculation flow rate is merely automatically controlled. (Yoshino, Y.)

  8. An expert fault diagnosis system for vehicle air conditioning product development

    NARCIS (Netherlands)

    Tan, C.F.; Tee, B.T.; Khalil, S.N.; Chen, W.; Rauterberg, G.W.M.

    2015-01-01

    The paper describes the development of the vehicle air-conditioning fault diagnosis system in automotive industries with expert system shell. The main aim of the research is to diagnose the problem of new vehicle air-conditioning system development process and select the most suitable solution to

  9. Exergy characteristics of a ceiling-type residential air conditioning system operating under different climatic conditions

    Energy Technology Data Exchange (ETDEWEB)

    Ozbek, Arif [Dept. of Mechanical Engineering, Ceyhan Engineering Faculty, Cukurova University, Adana (Turkmenistan)

    2016-11-15

    In this study an energy and exergy analysis of a Ceiling-type residential air conditioning (CTRAC) system operating under different climatic conditions have been investigated for provinces within the different geographic regions of Turkey. Primarily, the hourly cooling load capacities of a sample building (Q{sub evap}) during the months of April, May, June, July, August and September were determined. The hourly total heat gain of the sample building was determined using the Hourly analysis program (HAP). The Coefficient of performance (COP), exergy efficiency (η) and exergy destruction (Ex{sub dest}) values for the whole system and for each component were obtained. The results showed that lower atmospheric temperature (T{sub atm}) influenced the performance of the system and each of its components.

  10. [An Exploration of Working Conditions and Flexible System for Hospital Nurses].

    Science.gov (United States)

    Huang, Chung-I; Yu, Chien; Yu, Chin-Cheh

    2016-04-01

    The lack of sufficient numbers of professional nurses in the healthcare system in Taiwan is an issue that affects the sustainability of this system and that relates closely to working conditions. The present study explores the expectations that nurses hold with regard to working conditions and the operation of a flexible system in hospitals. A literature review and focus-group interviews were used to develop the questionnaire Working Conditions and Flexible System. A total of 1,150 copies of this questionnaire were distributed to practicing nurses using stratified random sampling, with 1,146 valid copies returned for a valid recovery rate of 99.65%. The results show that the expectations of participants concerning working conditions and a flexible system focus on the 6 factors of task, numerical, divisional, temporal, wages, and leading flexibility. The total mean was 4.35 (SD=0.42). The means for the 6 types of flexibility were all greater than 4.0. Participants deemed flexibility to be of high importance. The demographic variables hospital, work location, age, education level, work position, work unit, and total work years all affected the 6 types of flexibility significantly. The present study supports that the retention of nurses is significantly associated with working conditions and the operation of a flexible system. Administrators and mangers must create positive working conditions and a flexible system in order to enhance the retention and career development of nurses.

  11. Digital predistortion of 75–110 GHz W-band frequency multiplier for fiber wireless short range access systems

    DEFF Research Database (Denmark)

    Zhao, Ying; Deng, Lei; Pang, Xiaodan

    2011-01-01

    be effectively pre-compensated. Without using costly W-band components, a transmission system with 26km fiber and 4m wireless transmission operating at 99.6GHz is experimentally validated. Adjacent-channel power ratio (ACPR) improvements for IQ-modulated vector signals are guaranteed and transmission......We present a W-band fiber-wireless transmission system based on a nonlinear frequency multiplier for high-speed wireless short range access applications. By implementing a baseband digital signal predistortion scheme, intensive nonlinear distortions induced in a sextuple frequency multiplier can...... performances for fiber and wireless channels are studied. This W-band predistortion technique is a promising candidate for applications in high capacity wireless-fiber access systems....

  12. Endoscopic Ultrasonography-Guided Techniques for Accessing and Draining the Biliary System and the Pancreatic Duct.

    Science.gov (United States)

    Rimbaş, Mihai; Larghi, Alberto

    2017-10-01

    When endoscopic retrograde cholangiopancreatography (ERCP) fails to decompress the biliary system or the pancreatic duct, endoscopic ultrasonography (EUS)-guided biliary or pancreatic access and drainage can be used. Data show a high success rate and acceptable adverse event rate for EUS-guided biliary drainage. The outcomes of EUS-guided biliary drainage seem equivalent to percutaneous drainage and ERCP, whereas only retrospective studies are available for pancreatic duct drainage. In this article, revision of the technical and clinical status and the current evidence of interventional EUS-guided biliary and pancreatic duct access and drainage are presented. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Time dependent policy-based access control

    DEFF Research Database (Denmark)

    Vasilikos, Panagiotis; Nielson, Flemming; Nielson, Hanne Riis

    2017-01-01

    also on other attributes of the environment such as the time. In this paper, we use systems of Timed Automata to model distributed systems and we present a logic in which one can express time-dependent policies for access control. We show how a fragment of our logic can be reduced to a logic......Access control policies are essential to determine who is allowed to access data in a system without compromising the data's security. However, applications inside a distributed environment may require those policies to be dependent on the actual content of the data, the flow of information, while...... that current model checkers for Timed Automata such as UPPAAL can handle and we present a translator that performs this reduction. We then use our translator and UPPAAL to enforce time-dependent policy-based access control on an example application from the aerospace industry....

  14. Telemetric measurement system of beehive environment conditions

    Science.gov (United States)

    Walendziuk, Wojciech; Sawicki, Aleksander

    2014-11-01

    This work presents a measurement system of beehive environmental conditions. The purpose of the device is to perform measurements of parameters such as ambient temperature, atmospheric pressure, internal temperature, humidity and sound level. The measured values were transferred to the MySQL database, which is located on an external server, with the use of GPRS protocol. A website presents the measurement data in the form of tables and graphs. The study also shows exemplary results of environmental conditions measurements recorded in the beehive by hour cycle.

  15. The Mission Accessibility of Near-Earth Asteroids

    Science.gov (United States)

    Barbee, Brent W.; Abell, P. A.; Adamo, D. R.; Mazanek, D. D.; Johnson, L. N.; Yeomans, D. K.; Chodas, P. W.; Chamberlin, A. B.; Benner, L. A. M.; Taylor, P.; hide

    2015-01-01

    The population of near-Earth asteroids (NEAs) that may be accessible for human space flight missions is defined by the Near-Earth Object Human Space Flight Accessible Targets Study (NHATS). The NHATS is an automated system designed to monitor the accessibility of, and particular mission opportunities offered by, the NEA population. This is analogous to systems that automatically monitor the impact risk posed to Earth by the NEA population. The NHATS system identifies NEAs that are potentially accessible for future round-trip human space flight missions and provides rapid notification to asteroid observers so that crucial follow-up observations can be obtained following discovery of accessible NEAs. The NHATS was developed in 2010 and was automated by early 2012. NHATS data are provided via an interactive web-site, and daily NHATS notification emails are transmitted to a mailing list; both resources are available to the public.

  16. Research on the Legal Regulation of Market Access for Agricultural Products in China

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    On the basis of defining the concept of market access for agricultural products,this paper analyzes the necessity of establishing market access system of agricultural products,proposes the conception of establishing market access system of agricultural products in China;sets up the frame of market access system of agricultural products;analyzes the rationality of the frame of market access system of agricultural products;poses the consideration of economic law regarding setup of market access system of agricultural products.This paper also puts forward the legislative suggestions for establishing market access system of agricultural products as follows:establish the frame of market access system of agricultural products taking quality access as core;establish and perfect the compensation and relief system of guaranteeing benefit of manager and producers;establish the market access system of agricultural products with hierarchical structure;sort out existing laws and form the sound the legal frame of market access system of agricultural products.

  17. Title III Evaluation Report for the Access Road System

    International Nuclear Information System (INIS)

    H.R. Montalvo

    1998-01-01

    The objective of this evaluation is to provide recommendations to ensure consistency between the technical baseline requirements, baseline design, and the as-constructed Access Roads. Recommendations for resolving discrepancies between the as-constructed system, the technical baseline requirements, and the baseline design are included in this report. Cost and Schedule estimates are provided for all recommended modifications. This report does not address items which do not meet current safety or code requirements. These items are identified to the CMO and immediate action is taken to correct the situation. The report does identify safety and code items for which the A/E is recommending improvements. The recommended improvements will exceed the minimum requirements of applicable code and safety guide lines. These recommendations are intended to improve and enhance the operation and maintenance of the facility

  18. Does Access Trump Ownership? Exploring Consumer Acceptance of Access-Based Consumption in the Case of Smartphones

    Directory of Open Access Journals (Sweden)

    Flora Poppelaars

    2018-06-01

    Full Text Available Value creation in a circular economy is based on products being returned after use. In the case of smartphones, most are never returned and tend to be kept in drawers. Smartphone access services (e.g., leasing or upgrade have been experimented with in the Netherlands but have been largely unsuccessful. This study explores the reasons why consumers rejected these access-based smartphone services and is one of the very few to address this topic. The findings are compared with the case of car access services, which are socially better accepted, to identify potential areas for improvement. The qualitative study consists of in-depth interviews with consumers (n = 18 who either adopted and used a smartphone or car access service, or had considered a new smartphone or car but did not choose access-based consumption. The findings of this small-scale study suggest that the main reasons for the rejection of smartphone access services are a lack of awareness, misunderstanding of terms and conditions, and unsatisfactory compensation for their sacrifice of not owning. Smartphone access providers could thus clearly communicate customers’ rights and responsibilities, offer an excellent service experience (especially during repair by taking over the burdens of ownership, and stimulate the societal logic shift from ownership to access.

  19. Conditional Toxin Splicing Using a Split Intein System.

    Science.gov (United States)

    Alford, Spencer C; O'Sullivan, Connor; Howard, Perry L

    2017-01-01

    Protein toxin splicing mediated by split inteins can be used as a strategy for conditional cell ablation. The approach requires artificial fragmentation of a potent protein toxin and tethering each toxin fragment to a split intein fragment. The toxin-intein fragments are, in turn, fused to dimerization domains, such that addition of a dimerizing agent reconstitutes the split intein. These chimeric toxin-intein fusions remain nontoxic until the dimerizer is added, resulting in activation of intein splicing and ligation of toxin fragments to form an active toxin. Considerations for the engineering and implementation of conditional toxin splicing (CTS) systems include: choice of toxin split site, split site (extein) chemistry, and temperature sensitivity. The following method outlines design criteria and implementation notes for CTS using a previously engineered system for splicing a toxin called sarcin, as well as for developing alternative CTS systems.

  20. Novel secure and bandwidth efficient optical code division multiplexed system for future access networks

    Science.gov (United States)

    Singh, Simranjit

    2016-12-01

    In this paper, a spectrally coded optical code division multiple access (OCDMA) system using a hybrid modulation scheme has been investigated. The idea is to propose an effective approach for simultaneous improvement of the system capacity and security. Data formats, NRZ (non-return to zero), DQPSK (differential quadrature phase shift keying), and PoISk (polarisation shift keying) are used to get the orthogonal modulated signal. It is observed that the proposed hybrid modulation provides efficient utilisation of bandwidth, increases the data capacity and enhances the data confidentiality over existing OCDMA systems. Further, the proposed system performance is compared with the current state-of-the-art OCDMA schemes.