WorldWideScience

Sample records for hierarchical access control

  1. A secure solution on hierarchical access control

    CERN Document Server

    Wei, Chuan-Sheng; Huang, Tone-Yau; Ong, Yao Lin

    2011-01-01

    Hierarchical access control is an important and traditional problem in information security. In 2001, Wu et.al. proposed an elegant solution for hierarchical access control by the secure-filter. Jeng and Wang presented an improvement of Wu et. al.'s method by the ECC cryptosystem. However, secure-filter method is insecure in dynaminc access control. Lie, Hsu and Tripathy, Paul pointed out some secure leaks on the secure-filter and presented some improvements to eliminate these secure flaws. In this paper, we revise the secure-filter in Jeng-Wang method and propose another secure solutions in hierarchical access control problem. CA is a super security class (user) in our proposed method and the secure-filter of $u_i$ in our solutions is a polynomial of degree $n_i+1$ in $\\mathbb{Z}_p^*$, $f_i(x)=(x-h_i)(x-a_1)...(x-a_{n_i})+L_{l_i}(K_i)$. Although the degree of our secure-filter is larger than others solutions, our solution is secure and efficient in dynamics access control.

  2. H-RBAC: A Hierarchical Access Control Model for SaaS Systems

    Directory of Open Access Journals (Sweden)

    Dancheng Li

    2011-08-01

    Full Text Available SaaS is a new way to deploy software as a hosted service and accessed over the Internet which means the customers don’t need to maintain the software code and data on their own servers. So it’s more important for SaaS systems to take security issues into account. Access control is a security mechanism that enables an authority to access to certain restricted areas and resources according to the permissions assigned to a user. Several access models have been proposed to realize the access control of single instance systems. However, most of the existing models couldn’t address the following SaaS system problems: (1 role name conflicts (2 cross-level management (3 the isomerism of tenants' access control (4 temporal delegation constraints. This paper describes a hierarchical RBAC model called H-RBAC solves all the four problems of SaaS systems mentioned above. This model addresses the SaaS system access control in both system level and tenant level. It combines the advantages of RBDM and ARBAC97 model and introduces temporal constraints to SaaS access control model. In addition, a practical approach to implement the access control module for SaaS systems based on H-RBAC model is also proposed in this paper.

  3. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered...... to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  4. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

  5. Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption

    CERN Document Server

    Asim, Muhammad; Petkovic, Milan; Trivellato, Daniel; Zannone, Nicola

    2012-01-01

    Virtual organizations are dynamic, inter-organizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforcement of the access control policies protecting the information exchanged in a distributed system, but none of them addresses the dynamicity characterizing virtual organizations. In this paper we propose a dynamic hierarchical attribute-based encryption (D-HABE) scheme that allows the institutions in a virtual organization to encrypt information according to an attribute-based policy in such a way that only users with the appropriate attributes can decrypt it. In addition, we introduce a key management scheme that determines which user is entitled to receive which attribute key from which domain authority.

  6. HIERARCHICAL ACCESS CONTROL IN DYNAMIC PEER GROUPS USING SYMMETRIC POLYNOMIAL AND TREE BASED GROUP ELLIPTIC CURVE DIFFIE HELLMAN SCHEME

    Directory of Open Access Journals (Sweden)

    Nafeesa Begum Jeddy

    2014-01-01

    Full Text Available Hierarchical Access Control in group communication is an active area of research which is difficult to achieve it. Its primary objective is to allow users of a higher authority group to access information or resource held by lower group users and preventing the lower group users to access information held by higher class users. Large collection of collaborative applications in organizations inherently has hierarchical structures for functioning, where providing security by efficient group key management is a big challenging issue. While preserving centralized methods for hierarchical access control, it is difficult to achieve efficiency as a single membership change will result in lot of changes which are difficult to maintain. So, using distributed key agreement techniques is more appropriate for this scenario. This study explore on novel group key agreement approach, which combines both the symmetric polynomial scheme and Tree Based Group elliptic Curve key exchange. Also, it yields a secure protocol suite that is good in fault-tolerant and simple. The efficiency of SP-TGECDH is better than many other schemes. Using TGECDH makes the scheme suitable small Low powered devices.

  7. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover...

  8. Optimizing data access for wind farm control over hierarchical communication networks

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Findrik, Mislav; Madsen, Tatiana Kozlova

    2016-01-01

    and communication networks on the controller performance. We start by investigating the effects of a communication network that introduces delays in the information access for the central controller. The control performance as measured by accumulated fatigue is shown to be significantly impacted by communication....... This information quality metric is called mismatch probability, mmPr, and is used to express quantitatively the information accuracy in a given scenario. Lastly measurements of different communication technologies have been performed in order to carry out the analysis in a practically relevant scenario......In this paper we investigate a centralized wind farm controller which runs periodically. The controller attempts to reduce the damage a wind turbine sustains during operation by estimating fatigue based on the wind turbine state. The investigation focuses on the impact of information access...

  9. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    Science.gov (United States)

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  10. Hierarchical Control for Smart Grids

    DEFF Research Database (Denmark)

    Trangbæk, K; Bendtsen, Jan Dimon; Stoustrup, Jakob

    2011-01-01

    This paper deals with hierarchical model predictive control (MPC) of smart grid systems. The design consists of a high level MPC controller, a second level of so-called aggregators, which reduces the computational and communication-related load on the high-level control, and a lower level...... of autonomous consumers. The control system is tasked with balancing electric power production and consumption within the smart grid, and makes active use of the flexibility of a large number of power producing and/or power consuming units. The objective is to accommodate the load variation on the grid, arising...

  11. Hierarchical unilamellar vesicles of controlled compositional heterogeneity.

    Directory of Open Access Journals (Sweden)

    Maik Hadorn

    Full Text Available Eukaryotic life contains hierarchical vesicular architectures (i.e. organelles that are crucial for material production and trafficking, information storage and access, as well as energy production. In order to perform specific tasks, these compartments differ among each other in their membrane composition and their internal cargo and also differ from the cell membrane and the cytosol. Man-made structures that reproduce this nested architecture not only offer a deeper understanding of the functionalities and evolution of organelle-bearing eukaryotic life but also allow the engineering of novel biomimetic technologies. Here, we show the newly developed vesicle-in-water-in-oil emulsion transfer preparation technique to result in giant unilamellar vesicles internally compartmentalized by unilamellar vesicles of different membrane composition and internal cargo, i.e. hierarchical unilamellar vesicles of controlled compositional heterogeneity. The compartmentalized giant unilamellar vesicles were subsequently isolated by a separation step exploiting the heterogeneity of the membrane composition and the encapsulated cargo. Due to the controlled, efficient, and technically straightforward character of the new preparation technique, this study allows the hierarchical fabrication of compartmentalized giant unilamellar vesicles of controlled compositional heterogeneity and will ease the development of eukaryotic cell mimics that resemble their natural templates as well as the fabrication of novel multi-agent drug delivery systems for combination therapies and complex artificial microreactors.

  12. 物联网感知层一种分层访问控制方案%A Hierarchical Access Control Scheme for Perceptual Layer of IoT

    Institute of Scientific and Technical Information of China (English)

    马骏; 郭渊博; 马建峰; 熊金波; 张涛

    2013-01-01

    在物联网感知层中,用于信息采集的感知层节点需要根据隐私、安全或定制消费等需要,按不同级别提供授权用户的数据访问,这导致传统的访问控制方案无法满足用户安全高效的按需访问需求.为此,提出了一种分层访问控制方案.将同安全级别感知节点划分为一个层次节点,由层次节点之间形成的偏序关系构成一个分层的访问控制模型.本方案的优势体现在:每个用户和分层节点仅存储单个密钥材料,通过密钥推导获得访问当前及下层所有资源的密钥值,减少存储开销的同时提高了系统的安全强度;支持层次节点的动态扩展及密钥材料的动态更新;满足标准模型下的可证明安全及其他扩展安全.分析表明,方案能很好地满足物联网感知层的访问控制需求.%The perceptual layer is at the most front-end of information collection,which plays a fundamental role in the Internet of Things (IoT).In the perceptual layer,mass perceptual nodes are required to sense a vast range of different data types for authorized users in accordance with privacy,security,and customization.This leads to the problem that traditional access control schemes (IBAC,RBAC etc.) fail to meet the requirements of users who want secure and efficient access resources ondemand.In this paper,a hierarchical access control scheme for perceptual layer of the IoT is presented.In the scheme,every hierarchical node,representing a class in the access hierarchy,is composed of perceptual nodes which provide information with the same levels of security.More hierarchical nodes can be modeled as a set of partially ordered classes.Besides,the scheme considers the limited computational and storage capacity of mass perceptual nodes.Compared with previous proposals,the scheme has the following advantages:Every user and perceptual node possesses a single key material to get some keys by a deterministic key derivation algorithm

  13. DC Hierarchical Control System for Microgrid Applications

    OpenAIRE

    Lu, Xiaonan; Sun, Kai; Guerrero, Josep M.; Huang, Lipei

    2013-01-01

    In order to enhance the DC side performance of AC-DC hybrid microgrid,a DC hierarchical control system is proposed in this paper.To meet the requirement of DC load sharing between the parallel power interfaces,droop method is adopted.Meanwhile,DC voltage secondary control is employed to restore the deviation in the DC bus voltage.The hierarchical control system is composed of two levels.DC voltage and AC current controllers are achieved in the primary control level.

  14. Ontology Based Access Control

    Directory of Open Access Journals (Sweden)

    Özgü CAN

    2010-02-01

    Full Text Available As computer technologies become pervasive, the need for access control mechanisms grow. The purpose of an access control is to limit the operations that a computer system user can perform. Thus, access control ensures to prevent an activity which can lead to a security breach. For the success of Semantic Web, that allows machines to share and reuse the information by using formal semantics for machines to communicate with other machines, access control mechanisms are needed. Access control mechanism indicates certain constraints which must be achieved by the user before performing an operation to provide a secure Semantic Web. In this work, unlike traditional access control mechanisms, an "Ontology Based Access Control" mechanism has been developed by using Semantic Web based policies. In this mechanism, ontologies are used to model the access control knowledge and domain knowledge is used to create policy ontologies.

  15. Hierarchical control of electron-transfer

    DEFF Research Database (Denmark)

    Westerhoff, Hans V.; Jensen, Peter Ruhdal; Egger, Louis;

    1997-01-01

    In this chapter the role of electron transfer in determining the behaviour of the ATP synthesising enzyme in E. coli is analysed. It is concluded that the latter enzyme lacks control because of special properties of the electron transfer components. These properties range from absence of a strong...... back pressure by the protonmotive force on the rate of electron transfer to hierarchical regulation of the expression of the gens that encode the electron transfer proteins as a response to changes in the bioenergetic properties of the cell.The discussion uses Hierarchical Control Analysis...

  16. Hierarchical Control of Thermostatically Controller Loads for Primary Frequency Control

    DEFF Research Database (Denmark)

    Zhao, Haoran; Wu, Qiuwei; Huang, Shaojun

    2016-01-01

    This paper proposes a hierarchical control of Thermostatically Controlled Loads (TCLs) to provide primary frequency control support. The control architecture is comprised of three levels. At the high level, an aggregator coordinates multiple distribution substations and dispatches the primary...... respond to the frequency event autonomously. Case studies show that the proposed controller can efficiently respond to frequency events and fulfill the requirement specified by the system operator. The users’ comforts are not compromised and the short cycling of TCLs is largely reduced. Due...

  17. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  18. Access Control Enforcement Testing

    OpenAIRE

    El Kateb, Donia; Elrakaiby, Yehia; Mouelhi, Tejeddine; Le Traon, Yves

    2012-01-01

    A policy-based access control architecture com- prises Policy Enforcement Points (PEPs), which are modules that intercept subjects access requests and enforce the access decision reached by a Policy Decision Point (PDP), the module implementing the access decision logic. In applications, PEPs are generally implemented manually, which can introduce errors in policy enforcement and lead to security vulnerabilities. In this paper, we propose an approach to systematically test and validate the co...

  19. Hierarchical Robot Control In A Multisensor Environment

    Science.gov (United States)

    Bhanu, Bir; Thune, Nils; Lee, Jih Kun; Thune, Mari

    1987-03-01

    Automatic recognition, inspection, manipulation and assembly of objects will be a common denominator in most of tomorrow's highly automated factories. These tasks will be handled by intelligent computer controlled robots with multisensor capabilities which contribute to desired flexibility and adaptability. The control of a robot in such a multisensor environment becomes of crucial importance as the complexity of the problem grows exponentially with the number of sensors, tasks, commands and objects. In this paper we present an approach which uses CAD (Computer-Aided Design) based geometric and functional models of objects together with action oriented neuroschemas to recognize and manipulate objects by a robot in a multisensor environment. The hierarchical robot control system is being implemented on a BBN Butterfly multi processor. Index terms: CAD, Hierarchical Control, Hypothesis Generation and Verification, Parallel Processing, Schemas

  20. ACCESS Pointing Control System

    Science.gov (United States)

    Brugarolas, Paul; Alexander, James; Trauger, John; Moody, Dwight; Egerman, Robert; Vallone, Phillip; Elias, Jason; Hejal, Reem; Camelo, Vanessa; Bronowicki, Allen; O'Connor, David; Partrick, Richard; Orzechowski, Pawel; Spitter, Connie; Lillie, Chuck

    2010-01-01

    ACCESS (Actively-Corrected Coronograph for Exoplanet System Studies) was one of four medium-class exoplanet concepts selected for the NASA Astrophysics Strategic Mission Concept Study (ASMCS) program in 2008/2009. The ACCESS study evaluated four major coronograph concepts under a common space observatory. This paper describes the high precision pointing control system (PCS) baselined for this observatory.

  1. Hierarchical Control for Multiple DC Microgrids Clusters

    DEFF Research Database (Denmark)

    Shafiee, Qobad; Dragicevic, Tomislav; Vasquez, Juan Carlos;

    2014-01-01

    This paper presents a distributed hierarchical control framework to ensure reliable operation of dc Microgrid (MG) clusters. In this hierarchy, primary control is used to regulate the common bus voltage inside each MG locally. An adaptive droop method is proposed for this level which determines....... Another distributed policy is employed then to regulate the power flow among the MGs according to their local SOCs. The proposed distributed controllers on each MG communicate with only the neighbor MGs through a communication infrastructure. Finally, the small signal model is expanded for dc MG clusters...

  2. 树形层次化组织机构中的分级访问控制模型%Multi-level access control model for tree-like hierarchical organizations

    Institute of Scientific and Technical Information of China (English)

    於光灿; 李瑞轩; 卢正鼎; Mudar Sarem; 宋伟; 苏永红

    2008-01-01

    在BLP模型基础上提出一个新的分级访问控制模型,模型中建立部门之间的层次关系,提出岗位这一新的概念,简化了安全标记指派这一烦琐工作.通过为岗位指派多个安全标记,实现上下级及平级部门之间的互相沟通,在树形层次中靠得越近的部门,其职员之间可交流的客体密级越高.定义3个层次的访问矩阵.实现多种粒度的灵活的自主访问控制.模型在增加灵活性和实用性的同时保证信息的流动始终处于系统的控制之下.继承了BLP模型最突出的优点,并通过形式化证明的方式对模型进行了验证.%An access control model is proposed based on the famous Bell-LaPadula (BLP) model. In the proposed model, hierarchical relationships among departments are built, a new concept named post is proposed, and assigning security tags to subjects and objects is greatly simplified. The interoperation among different departments is implemented through assigning multiple security tags to one post, and the more departments are dosed on the organization tree, the more secret objects can be exchanged by the staff of the departments. The access control matrices of the department, post and staff are defined. By using the three access control matrices, a multi granularity and flexible discretionary access control policy is implemented. The outstanding merit of the BLP model is inherited, and the new model can guarantee that all the information flow is under control. Finally, our study shows that compared to the BLP model, the proposed model is more flexible.

  3. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    . Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set......When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...... of credentials needed to reach a certain location in a system. This knowledge allows to identify a set of (inside) actors who have the possibility to commit an insider attack at that location. This has immediate applications in analysing log files, but also nontechnical applications such as identifying possible...

  4. Controlled Growth of a Hierarchical Nickel Carbide "Dandelion" Nanostructure.

    Science.gov (United States)

    Qiao, Liang; Zhao, Wenxia; Qin, Yueling; Swihart, Mark T

    2016-07-01

    We present a new type of highly hierarchical but nonporous nanostructure with a unique "dandelion" morphology. Based on the time evolution of these Ni3 C nanostructures, we suggest a mechanism for their formation. This type of hierarchical nanocrystal, with high accessible specific surface area in a relatively large (ca. 750 nm overall diameter) stable structure, can be valuable in catalysis and related applications.

  5. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  6. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  7. Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor

    OpenAIRE

    Desmedt, Yvo; Shaghaghi, Arash

    2016-01-01

    Security researchers have stated that the core concept behind current implementations of access control predates the Internet. These assertions are made to pinpoint that there is a foundational gap in this field, and one should consider revisiting the concepts from the ground up. Moreover, Insider threats, which are an increasing threat vector against organizations are also associated with the failure of access control. Access control models derived from access control matrix encompass three ...

  8. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  9. Hierarchical robust nonlinear switching control design for propulsion systems

    Science.gov (United States)

    Leonessa, Alexander

    1999-09-01

    The desire for developing an integrated control system- design methodology for advanced propulsion systems has led to significant activity in modeling and control of flow compression systems in recent years. In this dissertation we develop a novel hierarchical switching control framework for addressing the compressor aerodynamic instabilities of rotating stall and surge. The proposed control framework accounts for the coupling between higher-order modes while explicitly addressing actuator rate saturation constraints and system modeling uncertainty. To develop a hierarchical nonlinear switching control framework, first we develop generalized Lyapunov and invariant set theorems for nonlinear dynamical systems wherein all regularity assumptions on the Lyapunov function and the system dynamics are removed. In particular, local and global stability theorems are given using lower semicontinuous Lyapunov functions. Furthermore, generalized invariant set theorems are derived wherein system trajectories converge to a union of largest invariant sets contained in intersections over finite intervals of the closure of generalized Lyapunov level surfaces. The proposed results provide transparent generalizations to standard Lyapunov and invariant set theorems. Using the generalized Lyapunov and invariant set theorems, a nonlinear control-system design framework predicated on a hierarchical switching controller architecture parameterized over a set of moving system equilibria is developed. Specifically, using equilibria- dependent Lyapunov functions, a hierarchical nonlinear control strategy is developed that stabilizes a given nonlinear system by stabilizing a collection of nonlinear controlled subsystems. The switching nonlinear controller architecture is designed based on a generalized lower semicontinuous Lyapunov function obtained by minimizing a potential function over a given switching set induced by the parameterized system equilibria. The proposed framework provides a

  10. Controlling Access to RDF Graphs

    Science.gov (United States)

    Flouris, Giorgos; Fundulaki, Irini; Michou, Maria; Antoniou, Grigoris

    One of the current barriers towards realizing the huge potential of Future Internet is the protection of sensitive information, i.e., the ability to selectively expose (or hide) information to (from) users depending on their access privileges. Given that RDF has established itself as the de facto standard for data representation over the Web, our work focuses on controlling access to RDF data. We present a high-level access control specification language that allows fine-grained specification of access control permissions (at triple level) and formally define its semantics. We adopt an annotation-based enforcement model, where a user can explicitly associate data items with annotations specifying whether the item is accessible or not. In addition, we discuss the implementation of our framework, propose a set of dimensions that should be considered when defining a benchmark to evaluate the different access control enforcement models and present the results of our experiments conducted on different Semantic Web platforms.

  11. Hierarchical Control for Multiple DC-Microgrids Clusters

    DEFF Research Database (Denmark)

    Shafiee, Qobad; Dragicevic, Tomislav; Vasquez, Juan Carlos

    2014-01-01

    DC microgrids (MGs) have gained research interest during the recent years because of many potential advantages as compared to the ac system. To ensure reliable operation of a low-voltage dc MG as well as its intelligent operation with the other DC MGs, a hierarchical control is proposed in this p......DC microgrids (MGs) have gained research interest during the recent years because of many potential advantages as compared to the ac system. To ensure reliable operation of a low-voltage dc MG as well as its intelligent operation with the other DC MGs, a hierarchical control is proposed...

  12. Disturbance observer based hierarchical control of coaxial-rotor UAV.

    Science.gov (United States)

    Mokhtari, M Rida; Cherki, Brahim; Braham, Amal Choukchou

    2017-03-01

    This paper propose an hierarchical controller based on a new disturbance observer with finite time convergence (FTDO) to solve the path tracking of a small coaxial-rotor-typs Unmanned Aerial Vehicles (UAVs) despite of unknown aerodynamic efforts. The hierarchical control technique is used to separate the flight control problem into an inner loop that controls attitude and an outer loop that controls the thrust force acting on the vehicle. The new disturbance observer with finite time convergence is intergated to online estimate the unknown uncertainties and disturbances and to actively compensate them in finite time.The analysis further extends to the design of a control law that takes the disturbance estimation procedure into account. Numerical simulations are carried out to demonstrate the efficiency of the proposed control strategy.

  13. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  14. Hierarchical Process Control of Chemical Vapor Infiltration.

    Science.gov (United States)

    1995-05-31

    in these variables with reference to Figure 8. Conventional PID controllers are beneficially employed at this level in order to retain industry...to achieve minimum controlled-variable variations. PID controllers are beneficially employed at this level to retain industry standard functions useful

  15. Development of design support tool using integrated hierarchical control chart (HCC) and IEC61131 for nuclear power plant control

    Energy Technology Data Exchange (ETDEWEB)

    Nasimi, E.; Gabbar, H.A. [Univ. of Ontario Inst. of Tech., Oshawa, Ontario (Canada)

    2009-07-01

    This paper proposes a new intelligent and highly automated Hierarchical Control Chart (HCC) and operations mapping solution for nuclear power plant operators that provides control system designers, developers and operators with a single view of all elements and systems across a power plant with the integrated interactive data access and information retrieval capabilities that enables a faster fault diagnostics as well aids in a more efficient decision making for the routine daily tasks. (author)

  16. Hierarchical Model Predictive Control for Resource Distribution

    DEFF Research Database (Denmark)

    Bendtsen, Jan Dimon; Trangbæk, K; Stoustrup, Jakob

    2010-01-01

    This paper deals with hierarchichal model predictive control (MPC) of distributed systems. A three level hierachical approach is proposed, consisting of a high level MPC controller, a second level of so-called aggregators, controlled by an online MPC-like algorithm, and a lower level of autonomous...... facilitates plug-and-play addition of subsystems without redesign of any controllers. The method is supported by a number of simulations featuring a three-level smart-grid power control system for a small isolated power grid....

  17. Nonlinear robust hierarchical control for nonlinear uncertain systems

    Directory of Open Access Journals (Sweden)

    Leonessa Alexander

    1999-01-01

    Full Text Available A nonlinear robust control-system design framework predicated on a hierarchical switching controller architecture parameterized over a set of moving nominal system equilibria is developed. Specifically, using equilibria-dependent Lyapunov functions, a hierarchical nonlinear robust control strategy is developed that robustly stabilizes a given nonlinear system over a prescribed range of system uncertainty by robustly stabilizing a collection of nonlinear controlled uncertain subsystems. The robust switching nonlinear controller architecture is designed based on a generalized (lower semicontinuous Lyapunov function obtained by minimizing a potential function over a given switching set induced by the parameterized nominal system equilibria. The proposed framework robustly stabilizes a compact positively invariant set of a given nonlinear uncertain dynamical system with structured parametric uncertainty. Finally, the efficacy of the proposed approach is demonstrated on a jet engine propulsion control problem with uncertain pressure-flow map data.

  18. Study on Hierarchical Structure of Detailed Control Planning

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    Using case studies,this paper analyzes the characteristics of detailed control planning and its hierarchical controls,the form and composition of plan content,and methodological innovations.It then suggests improvements to the planning structure that are oriented at adaptability,fairness,centrality,and scientific principles with regard to the content,methods,and results of the planning.Regarding the hierarchical control system,the paper suggests that the detailed control plan should be composed of "block planning" and "plot planning".It is believed that through a combination of block and plot planning,the problem of joining long-term and short-term planning will be solved and it will be possible to address the need for adjustment and revision of detailed control plan.

  19. MULTILEVEL RECURRENT MODEL FOR HIERARCHICAL CONTROL OF COMPLEX REGIONAL SECURITY

    Directory of Open Access Journals (Sweden)

    Andrey V. Masloboev

    2014-11-01

    Full Text Available Subject of research. The research goal and scope are development of methods and software for mathematical and computer modeling of the regional security information support systems as multilevel hierarchical systems. Such systems are characterized by loosely formalization, multiple-aspect of descendent system processes and their interconnectivity, high level dynamics and uncertainty. The research methodology is based on functional-target approach and principles of multilevel hierarchical system theory. The work considers analysis and structural-algorithmic synthesis problem-solving of the multilevel computer-aided systems intended for management and decision-making information support in the field of regional security. Main results. A hierarchical control multilevel model of regional socio-economic system complex security has been developed. The model is based on functional-target approach and provides both formal statement and solving, and practical implementation of the automated information system structure and control algorithms synthesis problems of regional security management optimal in terms of specified criteria. An approach for intralevel and interlevel coordination problem-solving in the multilevel hierarchical systems has been proposed on the basis of model application. The coordination is provided at the expense of interconnection requirements satisfaction between the functioning quality indexes (objective functions, which are optimized by the different elements of multilevel systems. That gives the possibility for sufficient coherence reaching of the local decisions, being made on the different control levels, under decentralized decision-making and external environment high dynamics. Recurrent model application provides security control mathematical models formation of regional socioeconomic systems, functioning under uncertainty. Practical relevance. The model implementation makes it possible to automate synthesis realization of

  20. Hierarchical Control of the ATLAS Experiment

    CERN Document Server

    Barriuso-Poy, Alex; Llobet-Valero, E

    2007-01-01

    Control systems at High Energy Physics (HEP) experiments are becoming increasingly complex mainly due to the size, complexity and data volume associated to the front-end instrumentation. In particular, this becomes visible for the ATLAS experiment at the LHC accelerator at CERN. ATLAS will be the largest particle detector ever built, result of an international collaboration of more than 150 institutes. The experiment is composed of 9 different specialized sub-detectors that perform different tasks and have different requirements for operation. The system in charge of the safe and coherent operation of the whole experiment is called Detector Control System (DCS). This thesis presents the integration of the ATLAS DCS into a global control tree following the natural segmentation of the experiment into sub-detectors and smaller sub-systems. The integration of the many different systems composing the DCS includes issues such as: back-end organization, process model identification, fault detection, synchronization ...

  1. Hierarchical Control of the ATLAS Experiment

    CERN Document Server

    Barriuso-Poy, Alex; Llobet-Valero, E

    2007-01-01

    Control systems at High Energy Physics (HEP) experiments are becoming increasingly complex mainly due to the size, complexity and data volume associated to the front-end instrumentation. In particular, this becomes visible for the ATLAS experiment at the LHC accelerator at CERN. ATLAS will be the largest particle detector ever built, result of an international collaboration of more than 150 institutes. The experiment is composed of 9 different specialized sub-detectors that perform different tasks and have different requirements for operation. The system in charge of the safe and coherent operation of the whole experiment is called Detector Control System (DCS). This thesis presents the integration of the ATLAS DCS into a global control tree following the natural segmentation of the experiment into sub-detectors and smaller sub-systems. The integration of the many different systems composing the DCS includes issues such as: back-end organization, process model identification, fault detection, synchronization ...

  2. Controlling the wettability of hierarchically structured thermoplastics.

    Science.gov (United States)

    Cortese, Barbara; Morgan, Hywel

    2012-01-10

    Surfaces play an important role in defining the properties of materials, controlling wetting, adsorption, or desorption of biomolecules, and sealing/bonding of different materials. We have combined microscale features with plasma-etched nanoscale roughness and chemical modification to tailor the wettability of the substrates. Cyclic olefin polymers and copolymers (COPs/COCs) were processed to make a range of surfaces with controlled superhydrophobic or -hydrophilic properties. The hydrophobic properties of the polymers were increased by the introduction of microstructures of varying geometry and spacing through hot embossing. The COC/COP substrates were functionalized by plasma activation in O(2), CF(4), and a mixture of both gases. The plasma etching introduces nanoscale roughness and also chemically modifies the surface, creating either highly hydrophilic or highly hydrophobic (contact angle >150°) surfaces depending on the gas mixture. The influence of geometry and chemistries was characterized by atomic force microscopy, contact angle measurements, and X-ray photoelectron spectroscopy. Measurements of the contact angle and contact angle hysteresis demonstrated long-term stability of the superhydrophobic/superhydrophilic characteristics (>6 months).

  3. Enhancing Security and Privacy in Video Surveillance through Role-Oriented Access Control Mechanism

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim

    the explicitly stated ones due to the hierarchical relations between the attributes of different entities. We implement a prototype of the proposed mechanism and demonstrate that the access control policies using our approach may be specified via eXtensible Access Control Markup Language (XACML)....

  4. Hierarchical cooperative control for multiagent systems with switching directed topologies.

    Science.gov (United States)

    Hu, Jianqiang; Cao, Jinde

    2015-10-01

    The hierarchical cooperative control problem is concerned for a two-layer networked multiagent system under switching directed topologies. The group cooperative objective is to achieve finite-time formation control for the upper layer of leaders and containment control for the lower layer of followers. Two kinds of cooperative strategies, including centralized-distributed control and distributed-distributed control, are proposed for two types of switching laws: 1) random switching law with the dwell time and 2) Markov switching law with stationary distribution. Utilizing the state transition matrix methods and matrix measure techniques, some sufficient conditions are derived for asymptotical containment control and exponential almost sure containment control, respectively. Finally, some numerical examples are provided to demonstrate the effectiveness of the proposed control schemes.

  5. Hierarchical control based on Hopfield network for nonseparable optimization problems

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    The nonseparable optimization control problem is considered, where the overall objective function is not of an additive form with respect to subsystems. Since there exists the problem that computation is very slow when using iterative algorithms in multiobjective optimization, Hopfield optimization hierarchical network based on IPM is presented to overcome such slow computation difficulty. Asymptotic stability of this Hopfield network is proved and its equilibrium point is the optimal point of the original problem. The simulation shows that the net is effective to deal with the optimization control problem for large-scale nonseparable steady state systems.

  6. Flexible access control for dynamic collaborative environments

    NARCIS (Netherlands)

    Dekker, Mari Antonius Cornelis

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect confident

  7. Agent-based distributed hierarchical control of dc microgrid systems

    DEFF Research Database (Denmark)

    Meng, Lexuan; Vasquez, Juan Carlos; Guerrero, Josep M.

    2014-01-01

    In order to enable distributed control and management for microgrids, this paper explores the application of information consensus and local decisionmaking methods formulating an agent based distributed hierarchical control system. A droop controlled paralleled DC/DC converter system is taken...... as a case study. The objective is to enhance the system efficiency by finding the optimal sharing ratio of load current. Virtual resistances in local control systems are taken as decision variables. Consensus algorithms are applied for global information discovery and local control systems coordination....... Standard genetic algorithm is applied in each local control system in order to search for a global optimum. Hardware-in-Loop simulation results are shown to demonstrate the effectiveness of the method....

  8. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  9. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  10. Hierarchical Control for Optimal and Distributed Operation of Microgrid Systems

    DEFF Research Database (Denmark)

    Meng, Lexuan

    of the underlying communication features (sampling time, topology, parameters, etc.). System dynamics and sensitivity analysis are conducted based on the proposed model. A MG central controller is also developed based on the experimental system in the intelligent MG lab in Aalborg University for providing...... are also conducted in order to ensure safe operation during the optimization procedure. In addition, as the secondary and tertiary controls require global information to perform the functions, they are usually implemented in centralized fashion. In this sense the communication links are required from...... the central unit to each local unit, a single point of failure in the central controller may jerpodize the safety of the whole system, and the flexibility of the system is limited. Consequently, this project proposes the application of dynamic consensus algorithm (DCA) into existing hierarchical control...

  11. Hierarchical Model Predictive Control for Plug-and-Play Resource Distribution

    DEFF Research Database (Denmark)

    Bendtsen, Jan Dimon; Trangbæk, K; Stoustrup, Jakob

    2012-01-01

    This chapter deals with hierarchical model predictive control (MPC) of distributed systems. A three level hierarchical approach is proposed, consisting of a high level MPC controller, a second level of so-called aggregators, controlled by an online MPC-like algorithm, and a lower level of autonom......This chapter deals with hierarchical model predictive control (MPC) of distributed systems. A three level hierarchical approach is proposed, consisting of a high level MPC controller, a second level of so-called aggregators, controlled by an online MPC-like algorithm, and a lower level...

  12. Fuzzy/Kalman Hierarchical Horizontal Motion Control of Underactuated ROVs

    Directory of Open Access Journals (Sweden)

    Francesco M. Raimondi

    2010-09-01

    Full Text Available A new closed loop fuzzy motion control system including on-line Kalman's filter (KF for the two dimensional motion of underactuated and underwater Remotely Operated Vehicle (ROV is presented. Since the sway force is unactuated, new continuous and discrete time models are developed using a polar transformation. A new hierarchical control architecture is developed, where the high level fuzzy guidance controller generates the surge speed and the yaw rate needed to achieve the objective of planar motion, while the low level controller gives the thruster surge force and the yaw control signals. The Fuzzy controller ensures robustness with respect to uncertainties due to the marine environment, forward surge speed and saturation of the control signals. Also Lyapunov's stability of the motion errors is proved based on the properties of the fuzzy maps. If Inertial Measurement Unit data (IMU is employed for the feedback directly, aleatory noises due to accelerometers and gyros damage the performances of the motion control. These noises denote a king of non parametric uncertainty which perturbs the model of the ROV. Therefore a KF is inserted in the feedback of the control system to compensate for the above uncertainties and estimate the feedback signals with more precision.

  13. Fuzzy/Kalman Hierarchical Horizontal Motion Control of Underactuated ROVs

    Directory of Open Access Journals (Sweden)

    Francesco M. Raimondi

    2010-06-01

    Full Text Available A new closed loop fuzzy motion control system including on-line Kalman's filter (KF for the two dimensional motion of underactuated and underwater Remotely Operated Vehicle (ROV is presented. Since the sway force is unactuated, new continuous and discrete time models are developed using a polar transformation. A new hierarchical control architecture is developed, where the high level fuzzy guidance controller generates the surge speed and the yaw rate needed to achieve the objective of planar motion, while the low level controller gives the thruster surge force and the yaw torque control signals. The Fuzzy controller ensures robustness with respect to uncertainties due to the marine environment, forward surge speed and saturation of the control signals. Also Lyapunov's stability of the motion errors is proved based on the properties of the fuzzy maps. If Inertial Measurement Unit data (IMU is employed for the feedback directly, aleatory noises due to accelerometers and gyros damage the performances of the motion control. These noises denote a kind of non parametric uncertainty which perturbs the model of the ROV. Therefore a KF is inserted in the feedback of the control system to compensate for the above uncertainties and estimate the feedback signals with more precision.

  14. Correction: β-Sialon nanowires, nanobelts and hierarchical nanostructures: morphology control, growth mechanism and cathodoluminescence properties

    Science.gov (United States)

    Huang, Juntong; Huang, Zhaohui; Liu, Yangai; Fang, Minghao; Chen, Kai; Huang, Yaoting; Huang, Saifang; Ji, Haipeng; Yang, Jingzhou; Wu, Xiaowen; Zhang, Shaowei

    2016-07-01

    Correction for `β-Sialon nanowires, nanobelts and hierarchical nanostructures: morphology control, growth mechanism and cathodoluminescence properties' by Juntong Huang, et al., Nanoscale, 2014, 6, 424-432.

  15. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  16. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  17. Frequency Stability of Hierarchically Controlled Hybrid Photovoltaic-Battery-Hydropower Microgrids

    DEFF Research Database (Denmark)

    Guan, Yajuan; Quintero, Juan Carlos Vasquez; Guerrero, Josep M.;

    2015-01-01

    Hybrid photovoltaic (PV) -battery-hydropower microgrids can be considered to enhance electricity accessibility and availability in remote areas. However, the coexistence of different renewable energy sources with different inertias and control strategies may affect system stability. In this paper......, a hierarchical controller for hybrid PV-battery-hydropower microgrid is proposed in order to achieve the parallel operation of hydropower and PV-battery system with different rates, and to guarantee power sharing performance among PV voltage controlled inverters, while the required power to hydropower...... is derived to analyze the system stability of the hybrid microgrid. The simulation results show system frequency and voltage stability for a hybrid microgrid demonstration which includes 2 MWp PV installations, a 15.2 MWh battery system, and a 12.8 MVA hydropower plant. Experimental results on a small...

  18. A Fuzzy Logic Based Supervisory Hierarchical Control Scheme for Real Time Pressure Control

    Institute of Scientific and Technical Information of China (English)

    N.Kanagaraj; P.Sivashanmugam; S.Paramasivam

    2009-01-01

    This paper describes a supervisory hierarchical fuzzy controller (SHFC) for regulating pressure in a real-time pilot pressure control system.The input scaling factor tuning of a direct expert controller is made using the error and process input parameters in a closed loop system in order to obtain better controller performance for set-point change and load disturbances.This on-line tuning method reduces operator involvement and enhances the controller performance to a wide operating range.The hierarchical control scheme consists of an intelligent upper level supervisory fuzzy controller and a lower level direct fuzzy controller.The upper level controller provides a mechanism to the main goal of the system and the lower level controller delivers the solutions to a particular situation. The control algorithm for the proposed scheme has been developed and tested using an ARM7 microcontroller-based embedded target board for a nonlinear pressure process having dead time.To demonstrate the effectiveness,the results of the proposed hierarchical controller,fuzzy controller and conventional proportional-integral (PI) controller are analyzed.The results prove that the SHFC performance is better in terms of stability and robustness than the conventional control methods.

  19. Hierarchical control of motor units in voluntary contractions.

    Science.gov (United States)

    De Luca, Carlo J; Contessa, Paola

    2012-01-01

    For the past five decades there has been wide acceptance of a relationship between the firing rate of motor units and the afterhyperpolarization of motoneurons. It has been promulgated that the higher-threshold, larger-soma, motoneurons fire faster than the lower-threshold, smaller-soma, motor units. This relationship was based on studies on anesthetized cats with electrically stimulated motoneurons. We questioned its applicability to motor unit control during voluntary contractions in humans. We found that during linearly force-increasing contractions, firing rates increased as exponential functions. At any time and force level, including at recruitment, the firing rate values were inversely related to the recruitment threshold of the motor unit. The time constants of the exponential functions were directly related to the recruitment threshold. From the Henneman size principle it follows that the characteristics of the firing rates are also related to the size of the soma. The "firing rate spectrum" presents a beautifully simple control scheme in which, at any given time or force, the firing rate value of earlier-recruited motor units is greater than that of later-recruited motor units. This hierarchical control scheme describes a mechanism that provides an effective economy of force generation for the earlier-recruited lower force-twitch motor units, and reduces the fatigue of later-recruited higher force-twitch motor units-both characteristics being well suited for generating and sustaining force during the fight-or-flight response.

  20. An effective access control approach to support mobility in IPv6 networks

    Science.gov (United States)

    Peng, Xue-hai; Lin, Chuang

    2005-11-01

    Access control is an important method to improve network security and prevent protected resources from being used by some nodes without authority. Moreover, mobility is an important trend of internet. In this paper, based on the architecture of hierarchical mobile IPv6, we proposed an effective access control approach to support mobility in IPv6 networks, which can ensure the operation of access control when a mobile node roams in these domains with different polices, with decreased delay of access negotiation and cost of delivering messages.

  1. Managing Delegation in Access Control Models

    CERN Document Server

    Ghorbel-Talbi, Meriam Ben; Cuppens-Boulahia, Nora; Bouhoula, Adel; 10.1109/ADCOM.2007.105

    2010-01-01

    In the field of access control, delegation is an important aspect that is considered as a part of the administration mechanism. Thus, a complete access control must provide a flexible administration model to manage delegation. Unfortunately, to our best knowledge, there is no complete model for describing all delegation requirements for role-based access control. Therefore, proposed models are often extended to consider new delegation characteristics, which is a complex task to manage and necessitate the redefinition of these models. In this paper we describe a new delegation approach for extended role-based access control models. We show that our approach is flexible and is sufficient to manage all delegation requirements.

  2. Road Network Selection Based on Road Hierarchical Structure Control

    Directory of Open Access Journals (Sweden)

    HE Haiwei

    2015-04-01

    Full Text Available A new road network selection method based on hierarchical structure is studied. Firstly, road network is built as strokes which are then classified into hierarchical collections according to the criteria of betweenness centrality value (BC value. Secondly, the hierarchical structure of the strokes is enhanced using structural characteristic identification technique. Thirdly, the importance calculation model was established according to the relationships among the hierarchical structure of the strokes. Finally, the importance values of strokes are got supported with the model's hierarchical calculation, and with which the road network is selected. Tests are done to verify the advantage of this method by comparing it with other common stroke-oriented methods using three kinds of typical road network data. Comparision of the results show that this method had few need to semantic data, and could eliminate the negative influence of edge strokes caused by the criteria of BC value well. So, it is better to maintain the global hierarchical structure of road network, and suitable to meet with the selection of various kinds of road network at the same time.

  3. Exporting Variables in a Hierarchically Distributed Control System

    Energy Technology Data Exchange (ETDEWEB)

    Chamizo Llatas, M.

    1995-07-01

    We describe the Remote Variable Access Service (RVAS), a network service developed and used in the distributed control and monitoring system of the TJ-II Heliac, which is under construction at CIEMAT (Madrid, Spain) and devoted to plasma studies in the nuclear fusion field. The architecture of the TJ-II control system consists of one central Sun workstation Sparc 10 and several autonomous subsystems based on VME crates with embedded processors running the OS-9 (V.24) real time operating system. The RVAS service allows state variables in local control processes running in subsystems to be exported to remote processes running in the central control workstation. Thus we extend the concept of exporting of file systems in UNIX machines to variables in processes running in different machines. (Author) 6 refs.

  4. Proximity Displays for Access Control

    Science.gov (United States)

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  5. A Hierarchical Algorithm for Integrated Scheduling and Control With Applications to Power Systems

    DEFF Research Database (Denmark)

    Sokoler, Leo Emil; Dinesen, Peter Juhler; Jørgensen, John Bagterp

    2016-01-01

    The contribution of this paper is a hierarchical algorithm for integrated scheduling and control via model predictive control of hybrid systems. The controlled system is a linear system composed of continuous control, state, and output variables. Binary variables occur as scheduling decisions...... portfolio case study show that the hierarchical algorithm reduces the computation to solve the OCP by several orders of magnitude. The improvement in computation time is achieved without a significant increase in the overall cost of operation....

  6. Hierarchical model-based predictive control of a power plant portfolio

    DEFF Research Database (Denmark)

    Edlund, Kristian; Bendtsen, Jan Dimon; Jørgensen, John Bagterp

    2011-01-01

    control” – becomes increasingly important as the ratio of renewable energy in a power system grows. As a consequence, tomorrow's “smart grids” require highly flexible and scalable control systems compared to conventional power systems. This paper proposes a hierarchical model-based predictive control...... design for power system portfolio control, which aims specifically at meeting these demands.The design involves a two-layer hierarchical structure with clearly defined interfaces that facilitate an object-oriented implementation approach. The same hierarchical structure is reflected in the underlying...

  7. Hierarchical sliding mode control for under-actuated cranes design, analysis and simulation

    CERN Document Server

    Qian, Dianwei

    2015-01-01

    This book reports on the latest developments in sliding mode overhead crane control, presenting novel research ideas and findings on sliding mode control (SMC), hierarchical SMC and compensator design-based hierarchical sliding mode. The results, which were previously scattered across various journals and conference proceedings, are now presented in a systematic and unified form. The book will be of interest to researchers, engineers and graduate students in control engineering and mechanical engineering who want to learn the methods and applications of SMC.

  8. Study on Mandatory Access Control in a Secure Database Management System

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation-hierarchical data model is extended to multilevel relation-hierarchical data model. Based on the multilevel relation-hierarchical data model, the concept of upper-lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation-hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects (e. g., multilevel spatial data) and multilevel conventional data ( e. g., integer. real number and character string).

  9. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  10. A formal model for access control with supporting spatial context

    Institute of Scientific and Technical Information of China (English)

    ZHANG Hong; HE YePing; SHI ZhiGuo

    2007-01-01

    There is an emerging recognition of the importance of utilizing contextual information in authorization decisions. Controlling access to resources in the field of wireless and mobile networking require the definition of a formal model for access control with supporting spatial context. However, traditional RBAC model does not specify these spatial requirements. In this paper, we extend the existing RBAC model and propose the SC-RBAC model that utilizes spatial and location-based information in security policy definitions. The concept of spatial role is presented,and the role is assigned a logical location domain to specify the spatial boundary.Roles are activated based on the current physical position of the user which obtained from a specific mobile terminal. We then extend SC-RBAC to deal with hierarchies, modeling permission, user and activation inheritance, and prove that the hierarchical spatial roles are capable of constructing a lattice which is a means for articulate multi-level security policy and more suitable to control the information flow security for safety-critical location-aware information systems. Next, constrained SC-RBAC allows express various spatial separations of duty constraints,location-based cardinality and temporal constraints for specify fine-grained spatial semantics that are typical in location-aware systems. Finally, we introduce 9 invariants for the constrained SC-RBAC and its basic security theorem is proven. The constrained SC-RBAC provides the foundation for applications in need of the constrained spatial context aware access control.

  11. Loss Performance Modeling for Hierarchical Heterogeneous Wireless Networks With Speed-Sensitive Call Admission Control

    DEFF Research Database (Denmark)

    Huang, Qian; Huang, Yue-Cai; Ko, King-Tim;

    2011-01-01

    dimensioning and planning. This paper investigates the computationally efficient loss performance modeling for multiservice in hierarchical heterogeneous wireless networks. A speed-sensitive call admission control (CAC) scheme is considered in our model to assign overflowed calls to appropriate tiers...

  12. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  13. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  14. An accessible method for implementing hierarchical models with spatio-temporal abundance data

    Science.gov (United States)

    Ross, Beth E.; Hooten, Melvin B.; Koons, David N.

    2012-01-01

    A common goal in ecology and wildlife management is to determine the causes of variation in population dynamics over long periods of time and across large spatial scales. Many assumptions must nevertheless be overcome to make appropriate inference about spatio-temporal variation in population dynamics, such as autocorrelation among data points, excess zeros, and observation error in count data. To address these issues, many scientists and statisticians have recommended the use of Bayesian hierarchical models. Unfortunately, hierarchical statistical models remain somewhat difficult to use because of the necessary quantitative background needed to implement them, or because of the computational demands of using Markov Chain Monte Carlo algorithms to estimate parameters. Fortunately, new tools have recently been developed that make it more feasible for wildlife biologists to fit sophisticated hierarchical Bayesian models (i.e., Integrated Nested Laplace Approximation, ‘INLA’). We present a case study using two important game species in North America, the lesser and greater scaup, to demonstrate how INLA can be used to estimate the parameters in a hierarchical model that decouples observation error from process variation, and accounts for unknown sources of excess zeros as well as spatial and temporal dependence in the data. Ultimately, our goal was to make unbiased inference about spatial variation in population trends over time.

  15. A solvent evaporation route towards fabrication of hierarchically porous ZSM-11 with highly accessible mesopores

    DEFF Research Database (Denmark)

    Song, Wen; Liu, Zhiting; Liu, Liping

    2015-01-01

    A route to generate hierarchically porous zeolite ZSM-11 has been paved via solvent evaporation induced self-assembly assisted by hexadecyltrimethoxysilane to produce a preformed dry gel, followed by its subsequent transformation into zeolite via steam-assisted-crystallization. The crystallization...

  16. Vehicle Chassis Integrated Control Based on Multimodel and Multilevel Hierarchical Control

    Directory of Open Access Journals (Sweden)

    Shu-en Zhao

    2014-01-01

    Full Text Available Aiming at the differences of vehicle chassis key subsystems influence on vehicle handling stability and effective acting regions, comprehensive considering of the nonlinear characteristic of the tires and the dynamic coupling among suspension, steering, and braking subsystems in vehicle chassis, the 14-DOF full vehicle model is built. Based on the control characteristic local optimum of each subsystem, multilevel hierarchical control theory is adopted and the vehicle stability coordinated control system including organization, coordination, and execution level is established. Using sliding mode control theory and the inverse tire model, the generalized target forces and moments from organization level are translated into the tire sideslip angle and slip ratio. And then, based on the principle of functional allocation, the control functions of each subsystem are coordinated and the function decoupling of vehicle chassis complex system is realized. The Matlab/Simulink platform is used and the full vehicle stability coordinated control system is simulated. The results show that the full vehicle coordinated control system based on multilevel hierarchical control theory can improve the vehicle stability preferably than the subsystem combined control and uncontrolled system.

  17. Microgrids: Hierarchical Control and an Overview of the Control and Reserve Management Strategies

    DEFF Research Database (Denmark)

    Vandoorn, T.L.; Vasquez, Juan Carlos; de Kooning, D.M.

    2013-01-01

    in the network, allowing the DG units to actively contribute in the frequency and voltage regulation. Microgrids can provide such coordination by aggregating DG, (controllable) loads and storage in small-scale networks, that can operate both in grid-connected and islanded mode. Here, the islanded operating...... as either local or centralized. In this article, the hierarchical control for application in microgrids is discussed and an overview of the control strategies is given with respect to the reserve provision by the DG units, loads and storage equipment....

  18. Hierarchical Control of Droop-Controlled DC and AC Microgrids - A General Approach Towards Standardization

    DEFF Research Database (Denmark)

    Guerrero, Josep M.; Vásquez, Juan V.; Teodorescu, Remus

    2009-01-01

    DC and AC Microgrids are key elements to integrate renewable and distributed energy resources as well as distributed energy storage systems. In the last years, efforts toward the standardization of these Microgrids have been made. In this sense, this paper present the hierarchical control derived...... the deviations produced by the primary control; and iii) the tertiary control manage the power flow between the microgrid and the external electrical distribution system. Results from a hierarchicalcontrolled microgrid are provided to show the feasibility of the proposed approach....

  19. Distributed Hierarchical Control of Multi-Area Power Systems with Improved Primary Frequency Regulation

    Energy Technology Data Exchange (ETDEWEB)

    Lian, Jianming; Marinovici, Laurentiu D.; Kalsi, Karanjit; Du, Pengwei; Elizondo, Marcelo A.

    2012-12-12

    The conventional distributed hierarchical control architecture for multi-area power systems is revisited. In this paper, a new distributed hierarchical control architecture is proposed. In the proposed architecture, pilot generators are selected in each area to be equipped with decentralized robust control as a supplementary to the conventional droop speed control. With the improved primary frequency control, the system frequency can be restored to the nominal value without the help of secondary frequency control, which reduces the burden of the automatic generation control for frequency restoration. Moreover, the low frequency inter-area electromechanical oscillations can also be effectively damped. The effectiveness of the proposed distributed hierarchical control architecture is validated through detailed simulations.

  20. Preventing Distribution Grid Congestion by Integrating Indirect Control in a Hierarchical Electric Vehicles Management System

    DEFF Research Database (Denmark)

    Hu, Junjie; Si, Chengyong; Lind, Morten

    2016-01-01

    In this paper, a hierarchical management system is proposed to integrate electric vehicles (EVs) into a distribution grid. Three types of actors are included in the system: Distribution system operators (DSOs), Fleet operators (FOs) and EV owners. In contrast to a typical hierarchical control...... system where the upper level controller directly controls the lower level subordinated nodes, this study aims to integrate two common indirect control methods:market-based control and price-based control into the hierarchical electric vehicles management system. Specifically, on the lower level...... of the hierarchy, the FOs coordinate the charging behaviors of their EV users using a price-based control method. A parametric utility model is used on the lower level to characterize price elasticity of electric vehicles and thus used by the FO to coordinate the individual EV charging. On the upper level...

  1. Access Agent Improving The Performance Of Access Control Lists

    Directory of Open Access Journals (Sweden)

    Thelis R. S.

    2015-08-01

    Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

  2. Cryptographically Enforced Distributed Data Access Control

    NARCIS (Netherlands)

    Ibraimi, L.

    2011-01-01

    Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote server, users lose control over their sensitive data. There are two approaches to control the access to outsourced data. The first approach assumes that the outsourcee is fully trusted. This approach is

  3. STEADY-STATE HIERARCHICAL INTELLIGENT CONTROL OF LARGE-SCALE INDUSTRIAL PROCESSES

    Institute of Scientific and Technical Information of China (English)

    WAN Baiwu

    2004-01-01

    This paper considers the fourth stage of development of hierarchical control ofindustrial processes to the intelligent control and optimization stage, and reviews what theauthor and his Group have been investigating for the past decade in the on-line steady-state hierarchical intelligent control of large-scale industrial processes (LSIP)This papergives a definition of intelligent control of large-scale systems first, and then reviews the useof neural networks for identification and optimization, the use of expert systems to solvesome kinds of hierarchical multi-objective optimization problems by an intelligent decisionunit (ID), the use of fuzzy logic control, and the use of iterative learning controlSeveralimplementation examples are introducedThis paper reviews other main achievements ofthe Group alsoFinally this paper gives a perspective of future development.

  4. The linked medical data access control framework.

    Science.gov (United States)

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios.

  5. Access control mechanisms for distributed healthcare environments.

    Science.gov (United States)

    Sergl-Pommerening, Marita

    2004-01-01

    Today's IT-infrastructure provides more and more possibilities to share electronic patient data across several healthcare organizations and hospital departments. A strong requirement is sufficient data protection and security measures complying with the medical confidentiality and the data protection laws of each state or country like the European directive on data protection or the U.S. HIPAA privacy rule. In essence, the access control mechanisms and authorization structures of information systems must be able to realize the Need-To-Access principle. This principle can be understood as a set of context-sensitive access rules, regarding the patient's path across the organizations. The access control mechanisms of today's health information systems do not sufficiently satisfy this requirement, because information about participation of persons or organizations is not available within each system in a distributed environment. This problem could be solved by appropriate security services. The CORBA healthcare domain standard contains such a service for obtaining authorization decisions and administrating access decision policies (RAD). At the university hospital of Mainz we have developed an access control system (MACS), which includes the main functionality of the RAD specification and the access control logic that is needed for such a service. The basic design principles of our approach are role-based authorization, user rights with static and dynamic authorization data, context rules and the separation of three cooperating servers that provide up-to-date knowledge about users, roles and responsibilities. This paper introduces the design principles and the system design and critically evaluates the concepts based on practical experience.

  6. Access Control in Data Management Systems

    CERN Document Server

    Ferrari, Elena

    2010-01-01

    Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary,

  7. A solvent evaporation route towards fabrication of hierarchically porous ZSM-11 with highly accessible mesopores

    DEFF Research Database (Denmark)

    Song, Wen; Liu, Zhiting; Liu, Liping;

    2015-01-01

    in dry gel has been found to undergo an orientated attachment growth mechanism whereby hexadecyltrimethoxysilane directs the formation of auxiliary mesopores and inhibits the fusion of primary nucleates. Measurements such as XRD, SEM, TEM, N2-physisorption, and TEM for an inverse replica of Pt derived...... from hierarchical ZSM-11 have been conducted to characterize the textural properties of the material. Ammonia temperature-programmed-desorption (NH3-TPD) measurements and infrared spectra using probe molecules such as pyridine (Py-IR) and 2,4,6-collidine (Coll-IR) have been collected to investigate...

  8. Hierarchical Control of Parallel AC-DC Converter Interfaces for Hybrid Microgrids

    DEFF Research Database (Denmark)

    Lu, Xiaonan; Guerrero, Josep M.; Sun, Kai;

    2014-01-01

    In this paper, a hierarchical control system for parallel power electronics interfaces between ac bus and dc bus in a hybrid microgrid is presented. Both standalone and grid-connected operation modes in the dc side of the microgrid are analyzed. Concretely, a three-level hierarchical control syst...... the three control levels is developed in order to adjust the main control parameters and study the system stability. Experimental results of a 2×2.2 kW parallel ac-dc converter system have shown satisfactory realization of the designed system.......In this paper, a hierarchical control system for parallel power electronics interfaces between ac bus and dc bus in a hybrid microgrid is presented. Both standalone and grid-connected operation modes in the dc side of the microgrid are analyzed. Concretely, a three-level hierarchical control system...... is implemented. In the primary control level, the decentralized control is realized by using the droop method. Local ac current proportional-resonant controller and dc voltage proportional-integral controller are employed. When the local load is connected to the dc bus, dc droop control is applied to obtain...

  9. Access control mechanism of wireless gateway based on open flow

    Science.gov (United States)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  10. A method of transition conflict resolving in hierarchical control

    Science.gov (United States)

    Łabiak, Grzegorz

    2016-09-01

    The paper concerns the problem of automatic solving of transition conflicts in hierarchical concurrent state machines (also known as UML state machine). Preparing by the designer a formal specification of a behaviour free from conflicts can be very complex. In this paper, it is proposed a method for solving conflicts through transition predicates modification. Partially specified predicates in the nondeterministic diagram are transformed into a symbolic Boolean space, whose points of the space code all possible valuations of transition predicates. Next, all valuations under partial specifications are logically multiplied by a function which represents all possible orthogonal predicate valuations. The result of this operation contains all possible collections of predicates, which under given partial specification make that the original diagram is conflict free and deterministic.

  11. Hierarchical Control Strategy for the Cooperative Braking System of Electric Vehicle

    OpenAIRE

    Jiankun Peng; Hongwen He; Wei Liu; Hongqiang Guo

    2015-01-01

    This paper provides a hierarchical control strategy for cooperative braking system of an electric vehicle with separated driven axles. Two layers are defined: the top layer is used to optimize the braking stability based on two sliding mode control strategies, namely, the interaxle control mode and signal-axle control strategies; the interaxle control strategy generates the ideal braking force distribution in general braking condition, and the single-axle control strategy can ensure braking s...

  12. Control of optics in random access analysers

    OpenAIRE

    Truchaud, A.

    1988-01-01

    The technology behind random access analysers involves flexible optical systems which can measure absorbances for one reaction at different scheduled times, and for several reactions performed simultaneously at different wavelengths. Optics control involves light sources (continuous and flash mode), indexing of monochromatic filters, injection-moulded plastic cuvettes, optical fibres, and polychromatic analysis.

  13. Role-based access control in retrospect

    NARCIS (Netherlands)

    Franqueira, Virginia N.L.; Wieringa, Roel

    2012-01-01

    Role-Based Access Control (RBAC) has been a success in terms of the amount of research that went into it, its uptake in international standards, and its adoption by major software vendors. Yet, RBAC remains complex to implement in user organizations. In this paper we review the state of the art of R

  14. Atom-Role-Based Access Control Model

    Science.gov (United States)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  15. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  16. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  17. Hierarchical Distributed Control Design for Multi-agent Systems Using Approximate Simulation

    Institute of Scientific and Technical Information of China (English)

    TANG Yu-Tao; HONG Yi-Guang

    2013-01-01

    In this paper,we consider a hierarchical control design for multi-agent systems based on approximate simulation.To reduce complexity,we first construct a simple abstract system to guide the agents,then we discuss the simulation relations between the abstract system and multiple agents.With the help of this abstract system,distributed hierarchical control is proposed to complete a coordination task.By virtue of a common Lyapunov function,we analyze the collective behaviors with switching multi-agent topology in light of simulation functions.

  18. VHDL IMPLEMENTATION OF TEST ACCESS PORT CONTROLLER

    Directory of Open Access Journals (Sweden)

    MANPREET KAUR

    2012-06-01

    Full Text Available In this paper, an implementation of IEEE 1149.7 standard is used for designing Test Access Port (TAP Controller and testing of interconnects is done using boundary scan. By c-JTAG the pin count gets reduced which increases the performance and simplifies the connection between devices. TAP Controller is a synchronous Moore type finite state machine that is changed when the TMS and TCK signals of the test access port gets change. This controls the sequence operation of the circuitry conveyed by JTAG and c-JTAG. JTAGmainly used four pins with TAP and fifth pin is for optional use in Boundary scan. But c-JTAG uses only two pins with TAP. In this approach TDI and TDO gets multiplexed by using class T4 and T5 of c-JTAG. Various instructions are used for testing interconnects using IEEE 1149.7 standard (std.

  19. Speed control system for an access gate

    Science.gov (United States)

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  20. Hierarchical Control Strategy for the Cooperative Braking System of Electric Vehicle.

    Science.gov (United States)

    Peng, Jiankun; He, Hongwen; Liu, Wei; Guo, Hongqiang

    2015-01-01

    This paper provides a hierarchical control strategy for cooperative braking system of an electric vehicle with separated driven axles. Two layers are defined: the top layer is used to optimize the braking stability based on two sliding mode control strategies, namely, the interaxle control mode and signal-axle control strategies; the interaxle control strategy generates the ideal braking force distribution in general braking condition, and the single-axle control strategy can ensure braking safety in emergency braking condition; the bottom layer is used to maximize the regenerative braking energy recovery efficiency with a reallocated braking torque strategy; the reallocated braking torque strategy can recovery braking energy as much as possible in the premise of meeting battery charging power. The simulation results show that the proposed hierarchical control strategy is reasonable and can adapt to different typical road surfaces and load cases; the vehicle braking stability and safety can be guaranteed; furthermore, the regenerative braking energy recovery efficiency can be improved.

  1. The hierarchical expert tuning of PID controllers using tools of soft computing.

    Science.gov (United States)

    Karray, F; Gueaieb, W; Al-Sharhan, S

    2002-01-01

    We present soft computing-based results pertaining to the hierarchical tuning process of PID controllers located within the control loop of a class of nonlinear systems. The results are compared with PID controllers implemented either in a stand alone scheme or as a part of conventional gain scheduling structure. This work is motivated by the increasing need in the industry to design highly reliable and efficient controllers for dealing with regulation and tracking capabilities of complex processes characterized by nonlinearities and possibly time varying parameters. The soft computing-based controllers proposed are hybrid in nature in that they integrate within a well-defined hierarchical structure the benefits of hard algorithmic controllers with those having supervisory capabilities. The controllers proposed also have the distinct features of learning and auto-tuning without the need for tedious and computationally extensive online systems identification schemes.

  2. A Theorem on Grid Access Control

    Institute of Scientific and Technical Information of China (English)

    XU ZhiWei(徐志伟); BU GuanYing(卜冠英)

    2003-01-01

    The current grid security research is mainly focused on the authentication of grid systems. A problem to be solved by grid systems is to ensure consistent access control. This problem is complicated because the hosts in a grid computing environment usually span multiple autonomous administrative domains. This paper presents a grid access control model, based on asynchronous automata theory and the classic Bell-LaPadula model. This model is useful to formally study the confidentiality and integrity problems in a grid computing environment. A theorem is proved, which gives the necessary and sufficient conditions to a grid to maintain confidentiality.These conditions are the formalized descriptions of local (node) relations or relationship between grid subjects and node subjects.

  3. Predictive access control for distributed computation

    DEFF Research Database (Denmark)

    Yang, Fan; Hankin, Chris; Nielson, Flemming

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future...... behavior of a program. A novel feature of our approach is that we can define policies concerning secondary use of data....

  4. Controlling Torque Distribution for Parallel Hybrid Vehicle Based on Hierarchical Structure Fuzzy Logic

    Institute of Scientific and Technical Information of China (English)

    HuangMiao-hua; JinGuo-dong

    2003-01-01

    The Hierarchical Structure Fuzzy Logic Control(HSFLC) strategies of torque distribute for Parallel Hybrid Electric Vehicle (PHEV) in the mocle of operation of the vehicle i. e. , acceleration, cruise, deceleration etc. have been studied. Using secondly developed the hybrid vehicle simulation tool ADVISOR, the dynamic model of PHEV has been set up by MATLAB/SIMULINK. The engine, motor as well as the battery characteristics have been studied. Simulation results show that the proposed hierarchical structured fuzzy logic control strategy is effective over the entire operating range of the vehicle in terms of fuel economy. Based on the analyses of the simulation results and driver's experiences, a fuzzy controller is designed and developed to control the torque distribution. The controller is evaluated via hardware-in-the-loop simulator (HILS). The results show that controller verify its value.

  5. Enriching the Hierarchical Model of Achievement Motivation: Autonomous and Controlling Reasons Underlying Achievement Goals

    Science.gov (United States)

    Michou, Aikaterini; Vansteenkiste, Maarten; Mouratidis, Athanasios; Lens, Willy

    2014-01-01

    Background: The hierarchical model of achievement motivation presumes that achievement goals channel the achievement motives of need for achievement and fear of failure towards motivational outcomes. Yet, less is known whether autonomous and controlling reasons underlying the pursuit of achievement goals can serve as additional pathways between…

  6. Hierarchical predictive control scheme for distributed energy storage integrated with residential demand and photovoltaic generation

    NARCIS (Netherlands)

    Lampropoulos, I.; Garoufalis, P.; van den Bosch, P.P.J.; Kling, W.L.

    2015-01-01

    A hierarchical control scheme is defined for the energy management of a battery energy storage system which is integrated in a low-voltage distribution grid with residential customers and photovoltaic installations. The scope is the economic optimisation of the integrated system by employing predict

  7. A Quality Control Design for Validating Hierarchical Sequencing of Programed Instruction.

    Science.gov (United States)

    Tennyson, Robert D.; Boutwell, Richard C.

    A quality control model is proposed to facilitate development of effective instructional programs. The theories of R. M. Gagne and of M. D. Merrill provide the foundations for a theory of sequencing behavior into a hierarchical order in order to improve the learning potential of an instructional program. The initial step in the procedural model is…

  8. Hierarchical Motion Control for a Team of Humanoid Soccer Robots

    Directory of Open Access Journals (Sweden)

    Seung-Joon Yi

    2016-02-01

    Full Text Available Robot soccer has become an effective benchmarking problem for robotics research as it requires many aspects of robotics including perception, self localization, motion planning and distributed coordination to work in uncertain and adversarial environments. Especially with humanoid robots that lack inherent stability, a capable and robust motion controller is crucial for generating walking and kicking motions without losing balance. In this paper, we describe the details of a motion controller to control a team of humanoid soccer robots, which consists of a hierarchy of controllers with different time frames and abstraction levels. A low level controller governs the real time control of each joint angle, either using target joint angles or target endpoint transforms. A mid-level controller handles bipedal locomotion and balancing of the robot. A high level controller decides the long term behavior of the robot, and finally the team level controller coordinates the behavior of a group of robots by means of asynchronous communication between the robots. The suggested motion system has been successfully used by many humanoid robot teams at the RoboCup international robot soccer competitions, which has awarded us five successful championships in a row.

  9. Hierarchical Motion Control for a Team of Humanoid Soccer Robots

    Directory of Open Access Journals (Sweden)

    Seung-Joon Yi

    2016-02-01

    Full Text Available Robot soccer has become an effective benchmarking problem for robotics research as it requires many aspects of robotics including perception, self localization, motion planning and distributed coordination to work in uncertain and adversarial environments. Especially with humanoid robots that lack inherent stability, a capable and robust motion controller is crucial for generating walking and kicking motions without losing balance. In this paper, we describe the details of a motion controller to control a team of humanoid soccer robots, which consists of a hierarchy of controllers with different time frames and abstraction levels. A low level controller governs the real time control of each joint angle, either using target joint angles or target endpoint transforms. A mid-level controller handles bipedal locomotion and balancing of the robot. A high level controller decides the long term behavior of the robot, and finally the team level controller coordinates the behavior of a group of robots by means of asynchronous communication between the robots. The suggested motion system has been successfully used by many humanoid robot teams at the RoboCup international robot soccer competitions, which has awarded us five successful championships in a row.

  10. Hierarchical Control Scheme for Voltage Unbalance Compensation in Islanded Microgrids

    DEFF Research Database (Denmark)

    Savaghebi, Mehdi; Guerrero, Josep M.; Jalilian, Alireza;

    2011-01-01

    active and reactive power controllers, virtual impedance loop and voltage and current controllers. The secondary level is designed to compensate the voltage unbalance at the load bus (LB) of the islanded microgrid. Also, restoration of LB voltage amplitude and microgrid frequency to the rated values...... is considered in the secondary level. These functions are achieved by proper control of distributed generators (DGs) interface converters. The presented simulation results show the effectiveness of the proposed control structure in compensating the voltage unbalance and restoring the voltage amplitude...

  11. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  12. Hierarchical type-2 fuzzy aggregation of fuzzy controllers

    CERN Document Server

    Cervantes, Leticia

    2016-01-01

    This book focuses on the fields of fuzzy logic, granular computing and also considering the control area. These areas can work together to solve various control problems, the idea is that this combination of areas would enable even more complex problem solving and better results. In this book we test the proposed method using two benchmark problems: the total flight control and the problem of water level control for a 3 tank system. When fuzzy logic is used it make it easy to performed the simulations, these fuzzy systems help to model the behavior of a real systems, using the fuzzy systems fuzzy rules are generated and with this can generate the behavior of any variable depending on the inputs and linguistic value. For this reason this work considers the proposed architecture using fuzzy systems and with this improve the behavior of the complex control problems.

  13. Robust Hierarchical Control for Uncertain Multivariable Hexarotor Systems

    Directory of Open Access Journals (Sweden)

    Wei Lin

    2015-01-01

    Full Text Available Multirotor helicopter attracts more attention due to its increased load capacity and being highly maneuverable. However, these helicopters are uncertain multivariable systems, which pose a challenge for their robust controller design. In this paper, a robust two-loop control scheme is proposed for a hexarotor system. The resulted controller consists of a nominal controller and a robust compensator. The robust compensators are added to restrain the influences of uncertainties such as nonlinear dynamics, coupling, parametric uncertainties, and external disturbances. It is proven that the tracking errors are ultimately bounded with specified boundaries by choosing the parameters of the robust compensators. Simulation results on the hexarotor demonstrate the effectiveness of the proposed control method.

  14. Hierarchical Control for Voltage Harmonics Compensation in Multi-Area Microgrids

    DEFF Research Database (Denmark)

    Hashempour, Mohammad M.; Firoozabadi, Mehdi Savaghebi; Quintero, Juan Carlos Vasquez

    2015-01-01

    is proposed. Hierarchical control is applied to control DGs inverters and APFs in a coordinated way. Primary control consists of power droop controller of DGs, selective virtual impedance and voltage/current regulators. Based on the secondary control, voltage compensation of Points of Common Coupling (PCCs......) of multi-area microgrid is carried out by DGs. Voltage compensation of PCCs by DGs may cause violation from maximum allowable voltage distortion at DGs terminals. Thus, tertiary control is used to mitigate these violations by using APF in proper coordination with secondary control. Evaluation...

  15. Control Strategies for Islanded Microgrid using Enhanced Hierarchical Control Structure with Multiple Current-Loop Damping Schemes

    DEFF Research Database (Denmark)

    Han, Yang; Shen, Pan; Zhao, Xin

    2017-01-01

    In this paper, the modeling, controller design, and stability analysis of the islanded microgrid (MG) using enhanced hierarchical control structure with multiple current loop damping schemes is proposed. The islanded MG is consisted of the parallel-connected voltage source inverters using LCL...

  16. A Hierarchical Fuzzy Control Design for Indoor Mobile Robot

    Directory of Open Access Journals (Sweden)

    Foudil Abdessemed

    2014-03-01

    Full Text Available This paper presents a motion control for an autonomous robot navigation using fuzzy logic motion control and stereo vision based path-planning module. This requires the capability to maneuver in a complex unknown environment. The mobile robot uses intuitive fuzzy rules and is expected to reach a specific target or follow a prespecified trajectory while moving among unforeseen obstacles. The robot's mission depends on the choice of the task. In this paper, behavioral-based control architecture is adopted, and each local navigational task is analyzed in terms of primitive behaviors. Our approach is systematic and original in the sense that some of the fuzzy rules are not triggered in face of critical situations for which the stere

  17. Hierarchical Model Predictive Control for Sustainable Building Automation

    Directory of Open Access Journals (Sweden)

    Barbara Mayer

    2017-02-01

    Full Text Available A hierarchicalmodel predictive controller (HMPC is proposed for flexible and sustainable building automation. The implications of a building automation system for sustainability are defined, and model predictive control is introduced as an ideal tool to cover all requirements. The HMPC is presented as a development suitable for the optimization of modern buildings, as well as retrofitting. The performance and flexibility of the HMPC is demonstrated by simulation studies of a modern office building, and the perfect interaction with future smart grids is shown.

  18. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  19. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  20. On the hierarchical risk-averse control problems for diffusion processes

    OpenAIRE

    Befekadu, Getachew K.; Veremyev, Alexander; Pasiliao, Eduardo L.

    2016-01-01

    In this paper, we consider a risk-averse control problem for diffusion processes, in which there is a partition of the admissible control strategy into two decision-making groups (namely, the {\\it leader} and {\\it follower}) with different cost functionals and risk-averse satisfactions. Our approach, based on a hierarchical optimization framework, requires that a certain level of risk-averse satisfaction be achieved for the {\\it leader} as a priority over that of the {\\it follower's} risk-ave...

  1. Flexible System Integration and Advanced Hierarchical Control Architectures in the Microgrid Research Laboratory of Aalborg University

    DEFF Research Database (Denmark)

    Meng, Lexuan; Hernández, Adriana Carolina Luna; Diaz, Enrique Rodriguez

    2016-01-01

    This paper presents the system integration and hierarchical control implementation in an inverter-based microgrid research laboratory (MGRL) in Aalborg University, Denmark. MGRL aims to provide a flexible experimental platform for comprehensive studies of microgrids. The structure of the laboratory...... system supervision, advanced secondary and tertiary management are realized in a microgrid central controller. The software and hardware schemes are described. Several example case studies are introduced and performed in order to achieve power quality regulation, energy management and flywheel energy...

  2. Hierarchical control of procedural and declarative category-learning systems.

    Science.gov (United States)

    Turner, Benjamin O; Crossley, Matthew J; Ashby, F Gregory

    2017-02-16

    Substantial evidence suggests that human category learning is governed by the interaction of multiple qualitatively distinct neural systems. In this view, procedural memory is used to learn stimulus-response associations, and declarative memory is used to apply explicit rules and test hypotheses about category membership. However, much less is known about the interaction between these systems: how is control passed between systems as they interact to influence motor resources? Here, we used fMRI to elucidate the neural correlates of switching between procedural and declarative categorization systems. We identified a key region of the cerebellum (left Crus I) whose activity was bidirectionally modulated depending on switch direction. We also identified regions of the default mode network (DMN) that were selectively connected to left Crus I during switching. We propose that the cerebellum-in coordination with the DMN-serves a critical role in passing control between procedural and declarative memory systems.

  3. Linear Logic Validation and Hierarchical Modeling for Interactive Storytelling Control

    OpenAIRE

    Dang, Kim Dung; Pham, Phuong Thao; Champagnat, Ronan; Rabah, Mourad

    2013-01-01

    International audience; The games are typical interactive applications where the system has to react to user actions and behavior with respect to some predefined rules established by the designer. The storytelling allows the interactive system to unfold the scenario of the game story according to these inputs and constraints. In order to improve system's behavior, the scenario should be structured and the system's control should be validated. In this paper, we deal with these two issues. We f...

  4. Automation of control and analysis of execution of official duties and instructions in the hierarchical organization

    Directory of Open Access Journals (Sweden)

    Demchenko A.I.

    2017-01-01

    Full Text Available The article considers the problem of monitoring over execution of official duties of employees. This problem is characteristic of the enterprises having a hierarchical management structure. The functions and the modes of monitoring are defined, the types of analysis of the staff activities are provided. The description of the program complex allowing distributing functions and instructions for between the employees is given. The developed computer program allows tracking the performance, creating reports. The computer program has a demarcation of access rights and provides the can be operated in both local, and a large-scale network.

  5. Naturalizing sense of agency with a hierarchical event-control approach.

    Directory of Open Access Journals (Sweden)

    Devpriya Kumar

    Full Text Available Unraveling the mechanisms underlying self and agency has been a difficult scientific problem. We argue for an event-control approach for naturalizing the sense of agency by focusing on the role of perception-action regularities present at different hierarchical levels and contributing to the sense of self as an agent. The amount of control at different levels of the control hierarchy determines the sense of agency. The current study investigates this approach in a set of two experiments using a scenario containing multiple agents sharing a common goal where one of the agents is partially controlled by the participant. The participant competed with other agents for achieving the goal and subsequently answered questions on identification (which agent was controlled by the participant, the degree to which they are confident about their identification (sense of identification and the degree to which the participant believed he/she had control over his/her actions (sense of authorship. Results indicate a hierarchical relationship between goal-level control (higher level and perceptual-motor control (lower level for sense of agency. Sense of identification ratings increased with perceptual-motor control when the goal was not completed but did not vary with perceptual-motor control when the goal was completed. Sense of authorship showed a similar interaction effect only in experiment 2 that had only one competing agent unlike the larger number of competing agents in experiment 1. The effect of hierarchical control can also be seen in the misidentification pattern and misidentification was greater with the agent affording greater control. Results from the two studies support the event-control approach in understanding sense of agency as grounded in control. The study also offers a novel paradigm for empirically studying sense of agency and self.

  6. GOTHIC: Gravitational oct-tree code accelerated by hierarchical time step controlling

    CERN Document Server

    Miki, Yohei

    2016-01-01

    The tree method is a widely implemented algorithm for collisionless $N$-body simulations in astrophysics well suited for GPU(s). Adopting hierarchical time stepping can accelerate $N$-body simulations; however, it is infrequently implemented and its potential remains untested in GPU implementations. We have developed a Gravitational Oct-Tree code accelerated by HIerarchical time step Controlling named \\texttt{GOTHIC}, which adopts both the tree method and the hierarchical time step. The code adopts some adaptive optimizations by monitoring the execution time of each function on-the-fly and minimizes the time-to-solution by balancing the measured time of multiple functions. Results of performance measurements with realistic particle distribution performed on NVIDIA Tesla M2090, K20X, and GeForce GTX TITAN X, which are representative GPUs of the Fermi, Kepler, and Maxwell generation of GPUs, show that the hierarchical time step achieves a speedup by a factor of around 3--5 times compared to the shared time step...

  7. GOTHIC: Gravitational oct-tree code accelerated by hierarchical time step controlling

    Science.gov (United States)

    Miki, Yohei; Umemura, Masayuki

    2017-04-01

    The tree method is a widely implemented algorithm for collisionless N-body simulations in astrophysics well suited for GPU(s). Adopting hierarchical time stepping can accelerate N-body simulations; however, it is infrequently implemented and its potential remains untested in GPU implementations. We have developed a Gravitational Oct-Tree code accelerated by HIerarchical time step Controlling named GOTHIC, which adopts both the tree method and the hierarchical time step. The code adopts some adaptive optimizations by monitoring the execution time of each function on-the-fly and minimizes the time-to-solution by balancing the measured time of multiple functions. Results of performance measurements with realistic particle distribution performed on NVIDIA Tesla M2090, K20X, and GeForce GTX TITAN X, which are representative GPUs of the Fermi, Kepler, and Maxwell generation of GPUs, show that the hierarchical time step achieves a speedup by a factor of around 3-5 times compared to the shared time step. The measured elapsed time per step of GOTHIC is 0.30 s or 0.44 s on GTX TITAN X when the particle distribution represents the Andromeda galaxy or the NFW sphere, respectively, with 224 = 16,777,216 particles. The averaged performance of the code corresponds to 10-30% of the theoretical single precision peak performance of the GPU.

  8. Hierarchical Control with Virtual Resistance Optimization for Efficiency Enhancement and State-of-Charge Balancing in DC Microgrids

    DEFF Research Database (Denmark)

    Meng, Lexuan; Dragicevic, Tomislav; Quintero, Juan Carlos Vasquez

    2015-01-01

    This paper proposes a hierarchical control scheme which applies optimization method into DC microgrids in order to improve the system overall efficiency while considering the State-of-Charge (SoC) balancing at the same time. Primary droop controller, secondary voltage restoration controller...... and tertiary optimization tool formulate the complete hierarchical control system. Virtual resistances are taken as the decision variables for achieving the objective. simulation results are presented to verify the proposed approach....

  9. Control of entity interactions in a hierarchical variable resolution simulation

    Energy Technology Data Exchange (ETDEWEB)

    Powell, D.R.

    1997-10-01

    There has long been interest in variable resolution modeling to support military analysis for a broad range of interest areas. Despite the ever-present desire for models of greater fidelity at the expense of analysis and computation resources, models of moderate to low fidelity are still required at many levels of decision-making. Problems can arise due to the issue of consistency among the family of models used for analysis. To address this and other problems, models of variable resolution have been suggested. However, such variable resolution architectures inherently carry their own set of issues which must be resolved in order to be useful. First, what are the structural requirements for a variable resolution model; and second, how are interactions between entities governed, especially when the entities have different resolutions? This paper addresses these issues and discusses key mechanisms needed to develop a variable resolution combat simulation that meets several core requirements for such models: seamless aggregation/disaggregation, appropriate interactions between entities of differing resolution, and control of the aggregation/disaggregation process.

  10. Control of entity interactions in a hierarchical variable resolution simulation

    Energy Technology Data Exchange (ETDEWEB)

    Powell, D.R.

    1997-08-01

    There has long been interest in variable resolution modeling to support military analysis for a broad range of interest areas. Despite the ever-present desire for models of greater fidelity at the expense of analysis and computation resources, models of moderate to low fidelity are still required at many levels of decision-making. Problems can arise due to the issue of consistency among the family of models used for analysis. To address this and other problems, models of variable resolution have been suggested. However, such variable resolution architectures inherently carry their own set of issues which must be resolved in order to be useful. First, what are the structural requirements for a variable resolution model; and second, how are interactions between entities governed, especially when the entities have different resolutions? This paper addresses these issues and discusses key mechanisms needed to develop a variable resolution combat simulation that meets several core requirements for such models: seamless aggregation/disaggregation, appropriate interactions between entities of differing resolution, and control of the aggregation/disaggregation process.

  11. Bioactive Hierarchical Structures for Genetic Control of Bone Morphogenesis

    Directory of Open Access Journals (Sweden)

    Pilar Sepulveda

    2002-09-01

    Full Text Available For thirty years it has been known that certain compositions of Na2O-CaO-P2O5-SiO 2 glasses will form a mechanically strong, chemical bond to bone. These materials have become known as bioactive glasses and the process of bonding is called bioactive fixation. Bioactive glasses are widely used clinically in the repair of bone defects. Recent research at the Imperial College Tissue Engineering Centre has now established that there is a genetic control of the cellular response to bioactive materials. Seven families of genes are up-regulated when primary human osteoblasts are exposed to the ionic dissolution products of bioactive glasses. The gene expression occurs very rapidly, within two days, and includes enhanced expression of cell cycle regulators. The consequence is rapid differentiation of the osteoblasts into a mature phenotype and formation of large three-dimensional bone nodules within six days in vitro. These cell culture results correlate with extensive human clinical results using the same bioactive material. The new genetic theory of bioactive materials provides a scientific foundation for molecular design of new generation of resorbable bioactive materials for tissue engineering and in situ tissue regeneration and repair. Application of this theory to the synthesis of bioactive foams for tissue engineering of bone is described.

  12. Hierarchical Control and Skilled Typing: Evidence for Word-Level Control over the Execution of Individual Keystrokes

    Science.gov (United States)

    Crump, Matthew J. C.; Logan, Gordon D.

    2010-01-01

    Routine actions are commonly assumed to be controlled by hierarchically organized processes and representations. In the domain of typing theories, word-level information is assumed to activate the constituent keystrokes required to type each letter in a word. We tested this assumption directly using a novel single-letter probe technique. Subjects…

  13. Review of Active and Reactive Power Sharing Strategies in Hierarchical Controlled Microgrids

    DEFF Research Database (Denmark)

    Han, Yang; Li, Hong; Shen, Pan

    2017-01-01

    Microgrids consist of multiple parallel-connected distributed generation (DG) units with coordinated control strategies, which are able to operate in both grid-connected and islanded mode. Microgrids are attracting more and more attention since they can alleviate the stress of main transmission...... strategies are utilized as supplements of the conventional droop controls and virtual impedance methods. The improved hierarchical control approaches such as the algorithms based on graph theory, multi-agent system, the gain scheduling method and predictive control have been proposed to achieve proper...

  14. Design and evaluation of a hierarchical control architecture for an autonomous underwater vehicle

    Institute of Scientific and Technical Information of China (English)

    BIAN Xin-qian; QIN Zheng; YAN Zhe-ping

    2008-01-01

    This paper researches on a kind of control architecture for autonomous underwater vehicle (AUV). After describing the hybrid property of the AUV control system, we present the hierarchical AUV control architecture. The architecture is organized in three layers: mission layer, task layer and execution layer. State supervisor and task coordinator are two key modules handling discrete events, so we describe these two modules in detail. Finally, we carried out a series of tests to verify this architecture. The test results show that the AUV can perform autonomous missions effectively and safely. We can conclude the control architecture is valid and practical.

  15. Integrating Attributes into Role-Based Access Control

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    Role-based access control (RBAC) and attribute-based access control (ABAC) are currently the most prominent access control models. However, they both suffer from limitations and have features complimentary to each other. Due to this fact, integration of RBAC and ABAC has become a hot area...

  16. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    as an important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control...

  17. SOFM Neural Network Based Hierarchical Topology Control for Wireless Sensor Networks

    OpenAIRE

    2014-01-01

    Well-designed network topology provides vital support for routing, data fusion, and target tracking in wireless sensor networks (WSNs). Self-organization feature map (SOFM) neural network is a major branch of artificial neural networks, which has self-organizing and self-learning features. In this paper, we propose a cluster-based topology control algorithm for WSNs, named SOFMHTC, which uses SOFM neural network to form a hierarchical network structure, completes cluster head selection by the...

  18. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  19. Hierarchical Decentralized Control Strategy for Demand-Side Primary Frequency Response

    Energy Technology Data Exchange (ETDEWEB)

    Lian, Jianming; Hansen, Jacob; Marinovici, Laurentiu D.; Kalsi, Karanjit

    2016-07-21

    The Grid Friendly$^\\textrm{TM}$ Appliance~(GFA) controller, developed at Pacific Northwest National Laboratory, was designed for the purpose of autonomously switching off appliances by detecting under-frequency events. In this paper, a new frequency responsive load~(FRL) controller is first proposed by extending the functionality of the original GFA controller. The proposed FRL controller can autonomously switch on (or off) end-use loads by detecting over-frequency (or under-frequency) events through local frequency measurement. Then, a hierarchical decentralized control framework is developed for engaging the end-use loads to provide primary frequency response with the proposed FRL controller. The developed framework has several important features that are desirable in terms of providing primary frequency control. It not only exclusively maintains the autonomous operation of the end-use loads, but also effectively overcomes the stability issue associated with high penetration of FRLs. The simulation results illustrate the effectiveness of the developed hierarchical control framework for providing primary frequency response with the proposed FRL controller.

  20. Context-Based E-Health System Access Control Mechanism

    Science.gov (United States)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  1. Hierarchical robot control structure and Newton's divided difference approach to robot path planning

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A hierarchical robot control is proposed for robot soccer system. The Newton' s divided difference is utilized in robot path planning. This paper describes the problems encoutered, software design considerations, vision algorithm and controls of individual robots. The solutions.to the problems implemented are simple and di rect. It is observed that many of the ideas and solutions can be evolved based on simple theories and concepts. This paper focuses on software structure of multi-agent controls, vision algorithm and simple path planning method.

  2. Controlled Synthesis and Magnetic Properties of Uniform Hierarchical Polyhedral α-Fe2O3 Particles

    Science.gov (United States)

    Long, Nguyen Viet; Yang, Yong; Thi, Cao Minh; Phuc, Le Hong; Nogami, Masayuki

    2017-02-01

    The controlled synthesis of uniform hierarchical polyhedral iron (Fe) micro-/nanoscale oxide particles with the α-Fe2O3 structure is presented. The hierarchical polyhedral iron oxide particles were synthesized by modified polyol methods with sodium borohydride as a powerful and efficient reducing agent. A critical heat treatment process used during the synthesis allowed for the interesting formation of α-Fe2O3 hematite with a micro-/nanoscale structure. The structure and weak ferromagnetism of the α-Fe2O3 particles were investigated by x-ray diffraction with whole pattern fitting and Rietveld refinement, scanning electron microscopy, and by vibrating sample magnetometry. The as-prepared α-Fe2O3 particles and the three dimensional models presented have promising practical applications for energy storage and conversion in batteries, capacitors, and fuel cells, and related spintronic devices and technologies.

  3. Hierarchical LiFePO4 with a controllable growth of the (010) facet for lithium-ion batteries.

    Science.gov (United States)

    Guo, Binbin; Ruan, Hongcheng; Zheng, Cheng; Fei, Hailong; Wei, Mingdeng

    2013-09-27

    Hierarchically structured LiFePO4 was successfully synthesized by ionic liquid solvothermal method. These hierarchically structured LiFePO4 samples were constructed from nanostructured platelets with their (010) facets mainly exposed. To the best of our knowledge, facet control of a hierarchical LiFePO4 crystal has not been reported yet. Based on a series of experimental results, a tentative mechanism for the formation of these hierarchical structures was proposed. After these hierarchically structured LiFePO4 samples were coated with a thin carbon layer and used as cathode materials for lithium-ion batteries, they exhibited excellent high-rate discharge capability and cycling stability. For instance, a capacity of 95% can be maintained for the LiFePO4 sample at a rate as high as 20 C, even after 1000 cycles.

  4. Hierarchical Control Strategy for the Cooperative Braking System of Electric Vehicle

    Science.gov (United States)

    Peng, Jiankun; He, Hongwen; Guo, Hongqiang

    2015-01-01

    This paper provides a hierarchical control strategy for cooperative braking system of an electric vehicle with separated driven axles. Two layers are defined: the top layer is used to optimize the braking stability based on two sliding mode control strategies, namely, the interaxle control mode and signal-axle control strategies; the interaxle control strategy generates the ideal braking force distribution in general braking condition, and the single-axle control strategy can ensure braking safety in emergency braking condition; the bottom layer is used to maximize the regenerative braking energy recovery efficiency with a reallocated braking torque strategy; the reallocated braking torque strategy can recovery braking energy as much as possible in the premise of meeting battery charging power. The simulation results show that the proposed hierarchical control strategy is reasonable and can adapt to different typical road surfaces and load cases; the vehicle braking stability and safety can be guaranteed; furthermore, the regenerative braking energy recovery efficiency can be improved. PMID:26236772

  5. Hierarchical Control Strategy for the Cooperative Braking System of Electric Vehicle

    Directory of Open Access Journals (Sweden)

    Jiankun Peng

    2015-01-01

    Full Text Available This paper provides a hierarchical control strategy for cooperative braking system of an electric vehicle with separated driven axles. Two layers are defined: the top layer is used to optimize the braking stability based on two sliding mode control strategies, namely, the interaxle control mode and signal-axle control strategies; the interaxle control strategy generates the ideal braking force distribution in general braking condition, and the single-axle control strategy can ensure braking safety in emergency braking condition; the bottom layer is used to maximize the regenerative braking energy recovery efficiency with a reallocated braking torque strategy; the reallocated braking torque strategy can recovery braking energy as much as possible in the premise of meeting battery charging power. The simulation results show that the proposed hierarchical control strategy is reasonable and can adapt to different typical road surfaces and load cases; the vehicle braking stability and safety can be guaranteed; furthermore, the regenerative braking energy recovery efficiency can be improved.

  6. Hierarchical rule-based monitoring and fuzzy logic control for neuromuscular block.

    Science.gov (United States)

    Shieh, J S; Fan, S Z; Chang, L W; Liu, C C

    2000-01-01

    The important task for anaesthetists is to provide an adequate degree of neuromuscular block during surgical operations, so that it should not be difficult to antagonize at the end of surgery. Therefore, this study examined the application of a simple technique (i.e., fuzzy logic) to an almost ideal muscle relaxant (i.e., rocuronium) at general anaesthesia in order to control the system more easily, efficiently, intelligently and safely during an operation. The characteristics of neuromuscular blockade induced by rocuronium were studied in 10 ASA I or II adult patients anaesthetized with inhalational (i.e., isoflurane) anaesthesia. A Datex Relaxograph was used to monitor neuromuscular block. And, ulnar nerve was stimulated supramaximally with repeated train-of-four via surface electrodes at the wrist. Initially a notebook personal computer was linked to a Datex Relaxograph to monitor electromyogram (EMG) signals which had been pruned by a three-level hierarchical structure of filters in order to design a controller for administering muscle relaxants. Furthermore, a four-level hierarchical fuzzy logic controller using the fuzzy logic and rule of thumb concept has been incorporated into the system. The Student's test was used to compare the variance between the groups. p control of muscle relaxation with a mean T1% error of -0.19 (SD 0.66) % accommodating a range in mean infusion rate (MIR) of 0.21-0.49 mg x kg(-1) x h(-1). When these results were compared with our previous ones using the same hierarchical structure applied to mivacurium, less variation in the T1% error (p controller activity of these two drugs showed no significant difference (p > 0.5). However, the consistent medium coefficient variance (CV) of the MIR of both rocuronium (i.e., 36.13 (SD 9.35) %) and mivacurium (i.e., 34.03 (SD 10.76) %) indicated a good controller activity. The results showed that a hierarchical rule-based monitoring and fuzzy logic control architecture can provide stable control

  7. Distributed Hierarchical Control Architecture for Transient Dynamics Improvement in Power Systems

    Energy Technology Data Exchange (ETDEWEB)

    Marinovici, Laurentiu D.; Lian, Jianming; Kalsi, Karanjit; Du, Pengwei; Elizondo, Marcelo A.

    2013-08-24

    In this paper, a novel distributed hierarchical coordinated control architecture is proposed for large scale power systems. The newly considered architecture facilitates frequency restoration and power balancing functions to be decoupled and implemented at different levels. At the local level, decentralized robust generator controllers are designed to quickly restore frequency after large faults and disturbances in the system. The controllers presented herein are shown to improve transient stability performance, as compared to conventional governor and excitation control. At the area level, Automatic Generation Control (AGC) is modified and coordinates with the decentralized robust controllers to reach the interchange schedule in the tie lines. The interaction of local and zonal controllers is validated through detailed simulations.

  8. Controlled Synthesis and Ferrimagnetism of Homogeneous Hierarchical CoFe2O4 Particles

    Science.gov (United States)

    Long, Nguyen Viet; Yang, Yong; Thi, Cao Minh; Phuc, Le Hong; Lu, Le Trong; Nogami, Masayuki

    2017-10-01

    Uniform, large, spherical, hierarchical CoFe2O4 spinel particles have been successfully prepared by a modified polyol method using NaBH4 and NaOH, revealing controlled size, shape, and morphology with high crystallinity in a certain microscale range. Their inverse AB2O4-type crystal structure was intensively studied by x-ray diffraction (XRD) analysis and scanning electron microscopy (SEM). Using stock solutions of CoCl2 and FeCl3 precursors in 1:2 ratio, CoFe2O4 particles were formed well with high crystallinity in the best inverse spinel structure in space group Fd-3m. The fascinating ferrimagnetic and hysteretic properties of the as-prepared hierarchical CoFe2O4 spinel particles were investigated by vibrating-sample magnetometry (VSM) at room temperature (RT). The results confirm formation of hierarchical CoFe2O4 microscale particles with inverse-spinel AB2O4-type structure and high magnetization by modified polyol method with heat treatment.

  9. Directed assembly of bio-inspired hierarchical materials with controlled nanofibrillar architectures

    Science.gov (United States)

    Tseng, Peter; Napier, Bradley; Zhao, Siwei; Mitropoulos, Alexander N.; Applegate, Matthew B.; Marelli, Benedetto; Kaplan, David L.; Omenetto, Fiorenzo G.

    2017-05-01

    In natural systems, directed self-assembly of structural proteins produces complex, hierarchical materials that exhibit a unique combination of mechanical, chemical and transport properties. This controlled process covers dimensions ranging from the nano- to the macroscale. Such materials are desirable to synthesize integrated and adaptive materials and systems. We describe a bio-inspired process to generate hierarchically defined structures with multiscale morphology by using regenerated silk fibroin. The combination of protein self-assembly and microscale mechanical constraints is used to form oriented, porous nanofibrillar networks within predesigned macroscopic structures. This approach allows us to predefine the mechanical and physical properties of these materials, achieved by the definition of gradients in nano- to macroscale order. We fabricate centimetre-scale material geometries including anchors, cables, lattices and webs, as well as functional materials with structure-dependent strength and anisotropic thermal transport. Finally, multiple three-dimensional geometries and doped nanofibrillar constructs are presented to illustrate the facile integration of synthetic and natural additives to form functional, interactive, hierarchical networks.

  10. A multi-mode operation control strategy for flexible microgrid based on sliding-mode direct voltage and hierarchical controls.

    Science.gov (United States)

    Zhang, Qinjin; Liu, Yancheng; Zhao, Youtao; Wang, Ning

    2016-03-01

    Multi-mode operation and transient stability are two problems that significantly affect flexible microgrid (MG). This paper proposes a multi-mode operation control strategy for flexible MG based on a three-layer hierarchical structure. The proposed structure is composed of autonomous, cooperative, and scheduling controllers. Autonomous controller is utilized to control the performance of the single micro-source inverter. An adaptive sliding-mode direct voltage loop and an improved droop power loop based on virtual negative impedance are presented respectively to enhance the system disturbance-rejection performance and the power sharing accuracy. Cooperative controller, which is composed of secondary voltage/frequency control and phase synchronization control, is designed to eliminate the voltage/frequency deviations produced by the autonomous controller and prepare for grid connection. Scheduling controller manages the power flow between the MG and the grid. The MG with the improved hierarchical control scheme can achieve seamless transitions from islanded to grid-connected mode and have a good transient performance. In addition the presented work can also optimize the power quality issues and improve the load power sharing accuracy between parallel VSIs. Finally, the transient performance and effectiveness of the proposed control scheme are evaluated by theoretical analysis and simulation results.

  11. Human performance in monitoring and controlling hierarchical large-scale systems

    Energy Technology Data Exchange (ETDEWEB)

    Henneman, R.L.; Rouse, W.B.

    1984-03-01

    Human performance in monitoring and controlling activities in a hierarchical large-scale network, such as a communications system, is considered. A scenario is described that is used in an experiment to examine three factors affecting humans functioning as network supervisor: cluster size (number of elements per display page), number of levels of pages in the hierarchy, and failure rate per element. It is indicated by the results that increasing cluster size improves performance, increasing number of levels degrades performance, and failure rate affects only subjects strategies.

  12. Design and Co-simulation of Hierarchical Architecture for Demand Response Control and Coordination

    DEFF Research Database (Denmark)

    Bhattarai, Bishnu Prasad; Lévesque, Martin; Bak-Jensen, Birgitte

    2017-01-01

    Demand response (DR) plays a key role for optimum asset utilization and to avoid or delay the need of new infrastructure investment. However, coordinated execution of multiple DRs is desired to maximize the DR benefits. In this study, we propose a hierarchical DR architecture (HDRA) to control...... and coordinate the performance of various DR categories such that the operation of every DR category is backed-up by time delayed action of the others. A reliable, cost-effective communication infrastructure based on ZigBee, WiMAX, and fibers is designed to facilitate the HDRA execution. The performance...

  13. Campus Access Control System RFID Based

    Directory of Open Access Journals (Sweden)

    Mr. SANTHOSH S

    2012-06-01

    Full Text Available Radio frequency identification (RFID technology has helped many organizations to reduce cost. Nevertheless, there are challenges and issues associated with RFID adoption. The most common internal challenge for many organizations is justifying the investment and modification of processes. The focus of this project is to show the business value of RFID technology and its applications. The important issue is the security level of the whole campus because it needs to be carefully differentiated. Dormitories and special research laboratories should benefit from higher levels of security than any other campuses. The key to the problem is represented by the new Radio Frequency Identification (RFID which can support contactless cards with memory. The most important feature of the proposed system is the updating of access permission level at any time for the user based on the availability of that user. The data transfer from the reader to the database was done using wireless communication (RF communication. To achieve this here RF transmitter and the RF receiver is used. The data which is read by the reader is sent to the microcontroller. Then from the controller we can transfer the data to the database by using the UART module (serial communication which is inbuilt in the microcontroller through RF transmitter. RF receiver of the same frequency at the receiver end receives and then stores the data in the database. RF transmitter and Receiver – frequency for transmitting and receiving the data depends on the user as per the requirement for the application and it is based on the range of distance. For the data encoding and decoding process HCS-101 protocol is used.

  14. Resilient control of cyber-physical systems against intelligent attacker: a hierarchal stackelberg game approach

    Science.gov (United States)

    Yuan, Yuan; Sun, Fuchun; Liu, Huaping

    2016-07-01

    This paper is concerned with the resilient control under denial-of-service attack launched by the intelligent attacker. The resilient control system is modelled as a multi-stage hierarchical game with a corresponding hierarchy of decisions made at cyber and physical layer, respectively. Specifically, the interaction in the cyber layer between different security agents is modelled as a static infinite Stackelberg game, while in the underlying physical layer the full-information H∞ minimax control with package drops is modelled as a different Stackelberg game. Both games are solved sequentially, which is consistent with the actual situations. Finally, the proposed method is applied to the load frequency control of the power system, which demonstrates its effectiveness.

  15. A Hierarchical Control Scheme for Reactive Power and Harmonic Current Sharing in Islanded Microgrids

    DEFF Research Database (Denmark)

    Lorzadeh, Iman; Firoozabadi, Mehdi Savaghebi; Askarian Abyaneh, Hossein

    2015-01-01

    of each inverter output current are extracted at primary level and transmitted to the secondary controller. Then, instantaneous circulating currents at different frequencies are calculated and applied by the secondary level to generate proper control signals for accurate reactive power and harmonic......In this paper, a hierarchical control scheme consisting of primary and secondary levels is proposed for achieving accurate reactive power and harmonic currents sharing among interface inverters of distributed generators (DGs) in islanded microgrids. Firstly, fundamental and main harmonic components...... current sharing among the inverters. Consequently, these signals are sent to the primary level and inserted as voltage references after passing the control blocks. In contrast to the conventional virtual impedance schemes, where reactive power and harmonic current sharing are realized at the expense...

  16. Hierarchical flight control system synthesis for rotorcraft-based unmanned aerial vehicles

    Science.gov (United States)

    Shim, Hyunchul

    The Berkeley Unmanned Aerial Vehicle (UAV) research aims to design, implement, and analyze a group of autonomous intelligent UAVs and UGVs (Unmanned Ground Vehicles). The goal of this dissertation is to provide a comprehensive procedural methodology to design, implement, and test rotorcraft-based unmanned aerial vehicles (RUAVs). We choose the rotorcraft as the base platform for our aerial agents because it offers ideal maneuverability for our target scenarios such as the pursuit-evasion game. Aided by many enabling technologies such as lightweight and powerful computers, high-accuracy navigation sensors and communication devices, it is now possible to construct RUAVs capable of precise navigation and intelligent behavior by the decentralized onboard control system. Building a fully functioning RUAV requires a deep understanding of aeronautics, control theory and computer science as well as a tremendous effort for implementation. These two aspects are often inseparable and therefore equally highlighted throughout this research. The problem of multiple vehicle coordination is approached through the notion of a hierarchical system. The idea behind the proposed architecture is to build a hierarchical multiple-layer system that gradually decomposes the abstract mission objectives into the physical quantities of control input. Each RUAV incorporated into this system performs the given tasks and reports the results through the hierarchical communication channel back to the higher-level coordinator. In our research, we provide a theoretical and practical approach to build a number of RUAVs based on commercially available navigation sensors, computer systems, and radio-controlled helicopters. For the controller design, the dynamic model of the helicopter is first built. The helicopter exhibits a very complicated multi-input multi-output, nonlinear, time-varying and coupled dynamics, which is exposed to severe exogenous disturbances. This poses considerable difficulties for

  17. Open versus Controlled-Access Data | Office of Cancer Genomics

    Science.gov (United States)

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  18. Wireless Access Control with Smart Antenna for M2M Communications

    Science.gov (United States)

    Sakamoto, Hiroshi; Bandai, Masaki; Watanabe, Takashi

    Machine to machine (M2M) is a promising technology to achieve an ubiquitous environment by uniting machines and machines over the Internet. The network used for M2M consists of core network and access network. This paper discusses effective controls of the wireless access network for M2M. Among typical examples of the wireless access network for M2M is a wireless sensor network (WSN). WSN for M2M may require energy efficiency, high reliability and throughput. For these requirements, in this paper, we propose a scheme to build a hierarchical sensor network using smart antenna. The proposed scheme uses omni-directional antennas together with smart antennas. Since smart antennas can extend communications distance, the proposed scheme enables reduction of number of hops to reduce the traffic load on relay nodes. As a result, the energy consumption, data collection ratio and throughput can be improved. We implement the proposed scheme on a real testbed. The testbed uses UNAGI as smart antenna nodes and Mica Mote as sensor nodes. In addition to the fundamental evaluation on the testbed, we simulate large-scale sensor networks. The results show the effectiveness of the proposed hierarchical sensor network with smart antennas.

  19. Law-Aware Access Control and its Information Model

    CERN Document Server

    Stieghahn, Michael

    2010-01-01

    Cross-border access to a variety of data such as market information, strategic information, or customer-related information defines the daily business of many global companies, including financial institutions. These companies are obliged by law to keep a data processing legal for all offered services. They need to fulfill different security objectives specified by the legislation. Therefore, they control access to prevent unauthorized users from using data. Those security objectives, for example confidentiality or secrecy, are often defined in the eXtensible Access Control Markup Language that promotes interoperability between different systems. In this paper, we show the necessity of incorporating the requirements of legislation into access control. Based on the work flow in a banking scenario we describe a variety of available contextual information and their interrelations. Different from other access control systems our main focus is on law-compliant cross-border data access. By including legislation dir...

  20. Microgrid Central Controller Development and Hierarchical Control Implementation in the Intelligent MicroGrid Lab of Aalborg University

    DEFF Research Database (Denmark)

    Meng, Lexuan; Savaghebi, Mehdi; Andrade, Fabio

    2015-01-01

    This paper presents the development of a microgrid central controller in an inverter-based intelligent microgrid (iMG) lab in Aalborg University, Denmark. The iMG lab aims to provide a flexible experimental platform for comprehensive studies of microgrids. The complete control system applied...... in this lab is based on the hierarchical control scheme for microgrids and includes primary, secondary and tertiary control. The structure of the lab, including the lab facilities, configurations and communication network, is first introduced. Primary control loops are developed in MATLAB....../Simulink and compiled to dSPACEs for local control purposes. In order to realize system supervision and proper secondary and tertiary management, a LabVIEW-based microgrid central controller is also developed. The software and hardware schemes are described. An example case is introduced and tested in the iMG lab...

  1. Multicast Address Management and Connection Control Based on Hierarchical Autonomous Structure

    Institute of Scientific and Technical Information of China (English)

    WANG Jian; ZHANG Fuyan

    1999-01-01

    Multicast capability, including multicast address and multicast routing mechanisms, at the network layeris necessary in order to reduce the bandwidth requirements of multiparty, multicast applications. Based on hierarchical autonomous structure in accordance with the self-organization topologies of Internet, the paper puts forward a multicast address management scheme that is shown to be robust and scalable. Connection control hierarchy (CCH) based on master/slave relationship and a simple efficient building algorithm of multi-point connection is also built. The paper also describes the normal operations of multicast address management andmulti-point connection controller. Through simulation experiment, HAM, CM and DDM of Multicast Address Allocation are compared. HAM integrates the merits of CM and DDM, which is efficient as a whole, robust andscalable. CCH raises the efficiency of connection control, and is highly robust, flexible and scalable.

  2. Hierarchical control framework for integrated coordination between distributed energy resources and demand response

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Di; Lian, Jianming; Sun, Yannan; Yang, Tao; Hansen, Jacob

    2017-09-01

    Demand response is representing a significant but largely untapped resource that can greatly enhance the flexibility and reliability of power systems. In this paper, a hierarchical control framework is proposed to facilitate the integrated coordination between distributed energy resources and demand response. The proposed framework consists of coordination and device layers. In the coordination layer, various resource aggregations are optimally coordinated in a distributed manner to achieve the system-level objectives. In the device layer, individual resources are controlled in real time to follow the optimal power generation or consumption dispatched from the coordination layer. For the purpose of practical applications, a method is presented to determine the utility functions of controllable loads by taking into account the real-time load dynamics and the preferences of individual customers. The effectiveness of the proposed framework is validated by detailed simulation studies.

  3. Hierarchical Brokering with Feedback Control Framework in Mobile Device-Centric Clouds

    Directory of Open Access Journals (Sweden)

    Chao-Lieh Chen

    2016-01-01

    Full Text Available We propose a hierarchical brokering architecture (HiBA and Mobile Multicloud Networking (MMCN feedback control framework for mobile device-centric cloud (MDC2 computing. Exploiting the MMCN framework and RESTful web-based interconnection, each tier broker probes resource state of its federation for control and management. Real-time and seamless services were developed. Case studies including intrafederation energy-aware balancing based on fuzzy feedback control and higher tier load balancing are further demonstrated to show how HiBA with MMCN relieves the embedding of algorithms when developing services. Theoretical performance model and real-world experiments both show that an MDC2 based on HiBA features better quality in terms of resource availability and network latency if it federates devices with enough resources distributed in lower tier hierarchy. The proposed HiBA realizes a development platform for MDC2 computing which is a feasible solution to User-Centric Networks (UCNs.

  4. Conceptual framework for distributed expert-system use in time-sensitive hierarchical control

    Energy Technology Data Exchange (ETDEWEB)

    Henningsen, J.R.

    1987-01-01

    There are many problems faced by decision makers involved in complex, time-sensitive hierarchical control systems. These may include maintaining knowledge of the functional status of the system components, forecasting the impact of past and future events, transferring information to a distant or poorly connected location, changing the requirements for an operation according to resources available, or creating an independent course of action when system connectivity falls. These problems are transdisciplinary in nature, so decision makers in a variety of organizations face them. This research develops a framework for the use of distributed expert systems in support of time-sensitive hierarchical control systems. Attention is focused on determining ways to enhance the likelihood that a system will remain functional during a crisis in which one or more of the system nodes fail. Options in the use of distributed expert systems for this purpose are developed following investigation of related research in the areas of cooperative and distributed systems. A prototype under development of a generic system model called DES (distributed expert systems) is described. DES is a trimular form of support structure, where a trimule is defined to be a combination of a human decision agent, a component system model and an expert system. This concept is an extension of the domular theory of Tenney and Sandell (1981).

  5. Intelligent Hierarchical Modal Control of a Novel Manipulator with Slewing and Deployable Links

    Science.gov (United States)

    Modi, V. J.; Zhang, J.; de Silva, C. W.

    1. Introduction The Space Shuttle based Canada arm has vividly demonstrated its application in launching of satellites as well as retrieval of disabled spacecraft for repair. There have been proposals for free flying robotic systems with appropriate instrumentation to monitor health of spacecraft, identify problems and even perform corrective measures. Most of these applications involve multilink manipulators with revolute joints for which there is a vast body of literature [1]. On the other hand, manipulators with revolute as well as prismatic joints, permitting slewing as well as deployment/retrieval of links, have received relatively little attention [2]. Such variable geometry, snake-like manipulators have distinct advantages of reduced coupling effects leading to simpler equations of motion and inverse kinematics, less number of singularity conditions, and ease of obstacle avoidance [3]. 2. Hierarchical Structure The control system developed for the deployable manipulator has a three-level structure. This hierarchical structure takes the advantages of a crisp controller; specially, a modal controller, with those of a soft, knowledge-based, supervisory control . The overall structure can be separated and developed as three main layers. The first layer is the lowest layer of the control system. It deals with information coming from sensors attached to the plant ( manipulator). This type of information is characterized by a large amount of individual data points of high resolution, produced and collected at high frequency. The crisp controller that is used is a state feedback regulator with its feedback gain matrix determined using the eigenstructure assignment approach. The data processing for monitoring and evaluation of the system performance occurs in this intermediate or second layer. Here high-resolution, crisp data from sensors are filtered to afford representation of the current state of the manipulator. This servo-expert layer acts as an interface

  6. Distributed Role-based Access Control for Coaliagion Application

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; ZHU Xian; XING Guanglin

    2005-01-01

    Access control in multi-domain environments is one of the important questions of building coalition between domains.On the basis of RBAC access control model, the concepts of role delegation and role mapping are proposed, which support the third-party authorization.Then, a distributed RBAC model is presented.Finally the implementation issues are discussed.

  7. 49 CFR 1542.207 - Access control systems.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures...

  8. Privacy Enhanced Access Control by Means of Policy Blinding

    NARCIS (Netherlands)

    Sedghi, Saeed; Hartel, Pieter; Jonker, Willem; Nikova, Svetla; Bao, Feng; Weng, Jian

    2011-01-01

    Traditional techniques of enforcing an access control policy rely on an honest reference monitor to enforce the policy. However, for applications where the resources are sensitive, the access control policy might also be sensitive. As a result, an honest-but-curious reference monitor would glean som

  9. Dynamic User Role Assignment in Remote Access Control

    NARCIS (Netherlands)

    Saffarian, Mohsen; Tang, Qiang; Jonker, Willem; Hartel, Pieter

    2009-01-01

    The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users are known to the administrative unit of that domain, beforehand. However, the application of the conventional RBAC model for remote access control scenarios is not straightforward. In such scenarios,

  10. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  11. Dynamic User Role Assignment in Remote Access Control

    NARCIS (Netherlands)

    Saffarian, M.; Tang, Qiang; Jonker, Willem; Hartel, Pieter H.

    2009-01-01

    The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users are known to the administrative unit of that domain, beforehand. However, the application of the conventional RBAC model for remote access control scenarios is not straightforward. In such scenarios,

  12. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  13. A Model of Workflow-oriented Attributed Based Access Control

    Directory of Open Access Journals (Sweden)

    Guoping Zhang

    2011-02-01

    Full Text Available the emergence of “Internet of Things” breaks previous traditional thinking, which integrates physical infrastructure and network infrastructure into unified infrastructure. There will be a lot of resources or information in IoT, so computing and processing of information is the core supporting of IoT. In this paper, we introduce “Service-Oriented Computing” to solve the problem where each device can offer its functionality as standard services. Here we mainly discuss the access control issue of service-oriented computing in Internet of Things. This paper puts forward a model of Workflow-oriented Attributed Based Access Control (WABAC, and design an access control framework based on WABAC model. The model grants permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

  14. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  15. Hierarchical Velocity Control Based on Differential Flatness for a DC/DC Buck Converter-DC Motor System

    Directory of Open Access Journals (Sweden)

    R. Silva-Ortigoza

    2014-01-01

    Full Text Available This paper presents a hierarchical controller that carries out the angular velocity trajectory tracking task for a DC motor driven by a DC/DC Buck converter. The high level control is related to the DC motor and the low level control is dedicated to the DC/DC Buck converter; both controls are designed via differential flatness. The high level control provides a desired voltage profile for the DC motor to achieve the tracking of a desired angular velocity trajectory. Then, a low level control is designed to ensure that the output voltage of the DC/DC Buck converter tracks the voltage profile imposed by the high level control. In order to experimentally verify the hierarchical controller performance, a DS1104 electronic board from dSPACE and Matlab-Simulink are used. The switched implementation of the hierarchical average controller is accomplished by means of pulse width modulation. Experimental results of the hierarchical controller for the velocity trajectory tracking task show good performance and robustness against the uncertainties associated with different system parameters.

  16. Controllable synthesis of α-sulfur spheres with hierarchical nanostructures for efficient visible-light-driven photocatalytic ability

    Energy Technology Data Exchange (ETDEWEB)

    Dang, Xueming; Zhang, Xiufang, E-mail: zhangxf@dlpu.edu.cn; Zhang, Weiqiang; Dong, Xiaoli; Wang, Guowen; Ma, Hongchao

    2015-08-30

    Highlights: • α-Sulfur spheres with hierarchical nanostructures are controllably produced. • Addition quantity of PVP affects photocatalytic ability of α-sulfur. • The enhanced photocatalytic ability of α-sulfur hierarchical sphere is found. - Abstract: Visible-light-active α-sulfur spheres with hierarchical nanostructures were fabricated by simple solution-phase synthesis with PVP as the template for enhanced photocatalytic ability. The α-sulfur hierarchical spheres with an ultrahigh specific surface area can controllable synthesized by changing the addition quantity of PVP. The obtained products are systematically studied by X-ray diffraction (XRD), Fourier transform infrared (FT-IR), scanning electron microscopy (SEM), transmission electron microscopy (TEM), UV–vis absorption spectroscopy (DRS), Fluorescence (FL) and Brunauer-Emmett-Teller (BET). The photocatalytic activity of the as-prepared samples is evaluated by photocatalytic degradation of Rhodamine B (RhB) aqueous solution under visible light illumination. The results indicate that the morphology, specific surface area, photo absorbance ability, the separation efficiency of photogenerated carriers and the reactant adsorption performance can be controlled by varying the addition quantity of PVP. When 200 mg PVP is added, α-sulfur hierarchical spheres with uniform particle size about 1 μm and ultrahigh specific surface area of 67.1 m{sup 2}/g is obtained, and its photocatalytic activity reaches a maximum value, which can be attributed to the combined effects of photo absorbance ability, the separation efficiency of photogenerated carriers and the reactant adsorption performance.

  17. Permission to Speak: A Novel Formal Foundation for Access Control

    Science.gov (United States)

    2016-06-21

    Permission to Speak: A Novel Formal Foundation for Access Control Oleg Sokolsky Nikhil Dinesh, Insup Lee, Aravind Joshi Report Documentation Page...comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 04 NOV 2009 2. REPORT TYPE 3...DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Permission to Speak: A Novel Formal Foundation for Access Control 5a. CONTRACT

  18. Hierarchical structural control of visual properties in self-assembled photonic-plasmonic pigments

    CERN Document Server

    Koay, Natalie; Kay, Theresa M; Nerger, Bryan A; Miles-Rossouw, Malaika; Shirman, Tanya; Vu, Thy L; England, Grant; Phillips, Katherine R; Utech, Stefanie; Vogel, Nicolas; Kolle, Mathias; Aizenberg, Joanna

    2014-01-01

    We present a simple one-pot co-assembly method for the synthesis of hierarchically structured pigment particles consisting of silica inverse-opal bricks that are doped with plasmonic absorbers. We study the interplay between the plasmonic and photonic resonances and their effect on the visual appearance of macroscopic collections of photonic bricks that are distributed in randomized orientations. Manipulating the pore geometry tunes the wavelength- and angle-dependence of the scattering profile, which can be engineered to produce angle-dependent Bragg resonances that can either enhance or contrast with the color produced by the plasmonic absorber. By controlling the overall dimensions of the photonic bricks and their aspect ratios, their preferential alignment can either be encouraged or suppressed. This causes the Bragg resonance to appear either as uniform color travel in the former case or as sparse iridescent sparkle in the later case. By manipulating the surface chemistry of these photonic bricks, which ...

  19. Energy Management Systems and tertiary regulation in hierarchical control architectures for islanded micro-grids

    DEFF Research Database (Denmark)

    Sanseverino, Eleonora Riva; Di Silvestre, Maria Luisa; Quang, Ninh Nguyen;

    2015-01-01

    In this paper, the structure of the highest level of a hierarchical control architecture for micro-grids is proposed. Such structure includes two sub-levels: the Energy Management System, EMS, and the tertiary regulation. The first devoted to energy resources allocation in each time slot based...... on marginal production costs, the latter aiming at finding the match between production and consumption satisfying the constraints set by the EMS level about the energy production in each time slot. Neglecting the efficiency of the different energy generation systems as well as that of the infrastructure...... for electrical energy distribution, the problem dealt with by the EMS sub-level is linear and can be solved by well known Linear Programming optimization procedures. The tertiary sub-level, below the EMS, optimizes mainly technical objectives and requires the solution of the Optimal Power Flow problem. After...

  20. Hierarchical charge distribution controls self-assembly process of silk in vitro

    Science.gov (United States)

    Zhang, Yi; Zhang, Cencen; Liu, Lijie; Kaplan, David L.; Zhu, Hesun; Lu, Qiang

    2015-12-01

    Silk materials with different nanostructures have been developed without the understanding of the inherent transformation mechanism. Here we attempt to reveal the conversion road of the various nanostructures and determine the critical regulating factors. The regulating conversion processes influenced by a hierarchical charge distribution were investigated, showing different transformations between molecules, nanoparticles and nanofibers. Various repulsion and compressive forces existed among silk fibroin molecules and aggregates due to the exterior and interior distribution of charge, which further controlled their aggregating and deaggregating behaviors and finally formed nanofibers with different sizes. Synergistic action derived from molecular mobility and concentrations could also tune the assembly process and final nanostructures. It is suggested that the complicated silk fibroin assembly processes comply a same rule based on charge distribution, offering a promising way to develop silk-based materials with designed nanostructures.

  1. An Extended Role Based Access Control Method for XML Documents

    Institute of Scientific and Technical Information of China (English)

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  2. A new access control system by fingerprint for radioisotope facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kawamura, Hiroko; Hirata, Yasuki [Kyushu Univ., Fukuoka (Japan). Radioisotope Center; Kondo, Takahiro; Takatsuki, Katsuhiro

    1998-04-01

    We applied a new fingerprint checker for complete access control to the radiation controlled area and to the radioisotope storage room, and prepared softwares for the best use of this checker. This system consists of a personal computer, access controllers, a fingerprint register, fingerprint checkers, a tenkey and mat sensors, permits ten thousand users to register their fingerprints and its hard disk to keep more than a million records of user`s access. Only 1% of users could not register their fingerprints worn-out, registered four numbers for a fingerprint. The softwares automatically provide varieties of reports, caused a large reduction in manual works. (author)

  3. Access control management for e-Healthcare in cloud environment

    Directory of Open Access Journals (Sweden)

    Lili Sun

    2014-03-01

    Full Text Available Data outsourcing is a major component for cloud computing that allows data owners to distribute resources to external services for users and organizations who can apply the resources. A crucial problem for owners is how to make sure their sensitive information accessed by legitimate users only using the trusted services but not authorized to read the actual information. With the increased development of cloud computing, it brings challenges for data security and access control when outsourcing users’ data and sharing sensitive data in cloud environment since it is not within the same trusted domain as data owners’. Access control policies have become an important issue in the security filed in cloud computing. Semantic web technologies represent much richer forms of relationships among users, resources and actions among different web applications such as clouding computing. However, Semantic web applications pose new requirements for security mechanisms especially in the access control models. This paper addresses existing access control methods and presents a semantic based access control model which considers semantic relations among different entities in cloud computing environment. We have enriched the research for semantic web technology with role-based access control that is able to be applied in the field of medical information system or e-Healthcare system. This work shows how the semantic web technology provides efficient solutions for the management of complex and distributed data in heterogeneous systems, and it can be used in the medical information systems as well.

  4. Urban Studies: A Study of Bibliographic Access and Control.

    Science.gov (United States)

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  5. Geospacial information utilized under the access control strategy

    Institute of Scientific and Technical Information of China (English)

    TIAN Jie; ZHANG Xin-fang; WANG Tong-yang; XIANG Wei; Cheng Ming

    2007-01-01

    This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a spacial data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated.

  6. Enriching the hierarchical model of achievement motivation: autonomous and controlling reasons underlying achievement goals.

    Science.gov (United States)

    Michou, Aikaterini; Vansteenkiste, Maarten; Mouratidis, Athanasios; Lens, Willy

    2014-12-01

    The hierarchical model of achievement motivation presumes that achievement goals channel the achievement motives of need for achievement and fear of failure towards motivational outcomes. Yet, less is known whether autonomous and controlling reasons underlying the pursuit of achievement goals can serve as additional pathways between achievement motives and outcomes. We tested whether mastery approach, performance approach, and performance avoidance goals and their underlying autonomous and controlling reasons would jointly explain the relation between achievement motives (i.e., fear of failure and need for achievement) and learning strategies (Study 1). Additionally, we examined whether the autonomous and controlling reasons underlying learners' dominant achievement goal would account for the link between achievement motives and the educational outcomes of learning strategies and cheating (Study 2). Six hundred and six Greek adolescent students (Mage = 15.05, SD = 1.43) and 435 university students (Mage M = 20.51, SD = 2.80) participated in studies 1 and 2, respectively. In both studies, a correlational design was used and the hypotheses were tested via path modelling. Autonomous and controlling reasons underlying the pursuit of achievement goals mediated, respectively, the relation of need for achievement and fear of failure to aspects of learning outcomes. Autonomous and controlling reasons underlying achievement goals could further explain learners' functioning in achievement settings. © 2014 The British Psychological Society.

  7. Adaptive Hierarchical Voltage Control of a DFIG-Based Wind Power Plant for a Grid Fault

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jinho; Muljadi, Eduard; Park, Jung-Wook; Kang, Yong Cheol

    2016-11-01

    This paper proposes an adaptive hierarchical voltage control scheme of a doubly-fed induction generator (DFIG)-based wind power plant (WPP) that can secure more reserve of reactive power (Q) in the WPP against a grid fault. To achieve this, each DFIG controller employs an adaptive reactive power to voltage (Q-V) characteristic. The proposed adaptive Q-V characteristic is temporally modified depending on the available Q capability of a DFIG; it is dependent on the distance from a DFIG to the point of common coupling (PCC). The proposed characteristic secures more Q reserve in the WPP than the fixed one. Furthermore, it allows DFIGs to promptly inject up to the Q limit, thereby improving the PCC voltage support. To avert an overvoltage after the fault clearance, washout filters are implemented in the WPP and DFIG controllers; they can prevent a surplus Q injection after the fault clearance by eliminating the accumulated values in the proportional-integral controllers of both controllers during the fault. Test results demonstrate that the scheme can improve the voltage support capability during the fault and suppress transient overvoltage after the fault clearance under scenarios of various system and fault conditions; therefore, it helps ensure grid resilience by supporting the voltage stability.

  8. Activate distributed energy resources' services: Hierarchical voltage controller as an application

    DEFF Research Database (Denmark)

    Han, Xue; Kosek, Anna Magdalena; Gehrke, Oliver

    2014-01-01

    The flexibilities from controllable distributed energy resources (DERs) offer the opportunities to mitigate some of the operation problems in the power distribution grid. The provision of system services requires the aggregation and coordination of their flexibilities, in order to obtain the flex...... the efficient aggregation and dispatch, and it simplifies the optimization complexity; the involvement of DER flexibilities in voltage services can significantly improve the voltage quality and reduce the grid power loss without additional regulating devices....... the flexible capacity of large scale. In this paper, a hierarchical controller is presented to activate the aggregation, and tries to obtain a global optimum of the grid operation. A distribution grid with large penetration of highly varying generation or load is under the risk that the voltage quality...... delivered to the end users is very poor. Hence, a coordinated voltage control function is investigated given such control hierarchy utilizing the flexibilities from the DER units to obtain an optimal voltage profile along the distribution feeder. The results are two folded: the controller enables...

  9. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  10. Modeling Access Control Policy of a Social Network

    Directory of Open Access Journals (Sweden)

    Chaimaa Belbergui

    2016-06-01

    Full Text Available Social networks bring together users in a virtual platform and offer them the ability to share -within the Community- personal and professional information’s, photos, etc. which are sometimes sensitive. Although, the majority of these networks provide access control mechanisms to their users (to manage who accesses to which information, privacy settings are limited and do not respond to all users' needs. Hence, the published information remain all vulnerable to illegal access. In this paper, the access control policy of the social network "Facebook" is analyzed in a profound way by starting with its modeling with "Organization Role Based Access Control" model, and moving to the simulation of the policy with an appropriate simulator to test the coherence aspect, and ending with a discussion of analysis results which shows the gap between access control management options offered by Facebook and the real requirements of users in the same context. Extracted conclusions prove the need of developing a new access control model that meets most of these requirements, which will be the subject of a forthcoming work.

  11. Establishing Causality Using Longitudinal Hierarchical Linear Modeling: An Illustration Predicting Achievement From Self-Control.

    Science.gov (United States)

    Duckworth, Angela Lee; Tsukayama, Eli; May, Henry

    2010-10-01

    The predictive validity of personality for important life outcomes is well established, but conventional longitudinal analyses cannot rule out the possibility that unmeasured third-variable confounds fully account for the observed relationships. Longitudinal hierarchical linear models (HLM) with time-varying covariates allow each subject to serve as his or her own control, thus eliminating between-individual confounds. HLM also allows the directionality of the causal relationship to be tested by reversing time-lagged predictor and outcome variables. We illustrate these techniques through a series of models that demonstrate that within-individual changes in self-control over time predict subsequent changes in GPA but not vice-versa. The evidence supporting a causal role for self-control was not moderated by IQ, gender, ethnicity, or income. Further analyses rule out one time-varying confound: self-esteem. The analytic approach taken in this study provides the strongest evidence to date for the causal role of self-control in determining achievement.

  12. Personnel Access Control System Evaluation for National Ignition Facility Operations

    Energy Technology Data Exchange (ETDEWEB)

    Altenbach, T; Brereton, S.; Hermes, G.; Singh, M.

    2001-06-01

    The purpose of this document is to analyze the baseline Access Control System for the National Ignition Facility (NIF), and to assess its effectiveness at controlling access to hazardous locations during full NIF operations. It reviews the various hazards present during a NIF shot sequence, and evaluates the effectiveness of the applicable set of controls at preventing access while the hazards are present. It considers only those hazards that could potentially be lethal. In addition, various types of technologies that might be applicable at NIF are reviewed, as are systems currently in use at other facilities requiring access control for safety reasons. Recommendations on how this system might be modified to reduce risk are made.

  13. Experience with ActiveX control for simple channel access

    Energy Technology Data Exchange (ETDEWEB)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-05-15

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls.

  14. Testing Efficiency Improved by Addition of Remote Access Control Room

    Science.gov (United States)

    1996-01-01

    The NASA Lewis Research Center's Remote Access Control Room (RACR) uses off-the-shelf video conferencing software integrated with existing facility data systems to provide access to the test data by networking from virtually anywhere in the country. The system allows research engineers in remote locations to participate in tests and monitor data in real time just as if they were present in the control room.

  15. Object-based task-level control: A hierarchical control architecture for remote operation of space robots

    Science.gov (United States)

    Stevens, H. D.; Miles, E. S.; Rock, S. J.; Cannon, R. H.

    1994-01-01

    Expanding man's presence in space requires capable, dexterous robots capable of being controlled from the Earth. Traditional 'hand-in-glove' control paradigms require the human operator to directly control virtually every aspect of the robot's operation. While the human provides excellent judgment and perception, human interaction is limited by low bandwidth, delayed communications. These delays make 'hand-in-glove' operation from Earth impractical. In order to alleviate many of the problems inherent to remote operation, Stanford University's Aerospace Robotics Laboratory (ARL) has developed the Object-Based Task-Level Control architecture. Object-Based Task-Level Control (OBTLC) removes the burden of teleoperation from the human operator and enables execution of tasks not possible with current techniques. OBTLC is a hierarchical approach to control where the human operator is able to specify high-level, object-related tasks through an intuitive graphical user interface. Infrequent task-level command replace constant joystick operations, eliminating communications bandwidth and time delay problems. The details of robot control and task execution are handled entirely by the robot and computer control system. The ARL has implemented the OBTLC architecture on a set of Free-Flying Space Robots. The capability of the OBTLC architecture has been demonstrated by controlling the ARL Free-Flying Space Robots from NASA Ames Research Center.

  16. Dynamically Authorized Role-Based Access Control for Grid Applications

    Institute of Scientific and Technical Information of China (English)

    YAO Hanbing; HU Heping; LU Zhengding; LI Ruixuan

    2006-01-01

    Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations". The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user's environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.

  17. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  18. Remote device access in the new accelerator controls middleware

    CERN Document Server

    Baggiolini, V; Jensen, S; Kostro, K; Risso, A; Trofimov, N N; SL

    2001-01-01

    This paper presents the Remote Device Access (RDA) package developed at CERN in the framework of the joint PS/SL Controls Middleware project. The package design reflects the Accelerator Device Model in which devices, named entities in the control system, can be controlled via properties. RDA implements this model in a distributed environment with devices residing in servers that can run anywhere in the controls network. It provides a location-independent and reliable access to the devices from control programs. By invoking the device access methods, clients can read, write and subscribe to device property values. We describe the architecture and design of RDA its API, and CORBA-based implementations in Java and C++. First applications of RDA in the CERN accelerator control systems are described as well.

  19. MODEM: a multi-agent hierarchical structure to model the human motor control system.

    Science.gov (United States)

    Emadi Andani, Mehran; Bahrami, Fariba; Jabehdar Maralani, Parviz; Ijspeert, Auke Jan

    2009-12-01

    In this study, based on behavioral and neurophysiological facts, a new hierarchical multi-agent architecture is proposed to model the human motor control system. Performance of the proposed structure is investigated by simulating the control of sit to stand movement. To develop the model, concepts of mixture of experts, modular structure, and some aspects of equilibrium point hypothesis were brought together. We have called this architecture MODularized Experts Model (MODEM). Human motor system is modeled at the joint torque level and the role of the muscles has been embedded in the function of the joint compliance characteristics. The input to the motor system, i.e., the central command, is the reciprocal command. At the lower level, there are several experts to generate the central command to control the task according to the details of the movement. The number of experts depends on the task to be performed. At the higher level, a "gate selector" block selects the suitable subordinate expert considering the context of the task. Each expert consists of a main controller and a predictor as well as several auxiliary modules. The main controller of an expert learns to control the performance of a given task by generating appropriate central commands under given conditions and/or constraints. The auxiliary modules of this expert learn to scrutinize the generated central command by the main controller. Auxiliary modules increase their intervention to correct the central command if the movement error is increased due to an external disturbance. Each auxiliary module acts autonomously and can be interpreted as an agent. Each agent is responsible for one joint and, therefore, the number of the agents of each expert is equal to the number of joints. Our results indicate that this architecture is robust against external disturbances, signal-dependent noise in sensory information, and changes in the environment. We also discuss the neurophysiological and behavioral basis of

  20. A Rapid Prototyping Tool for Embedded, Real-Time Hierarchical Control Systems

    Directory of Open Access Journals (Sweden)

    Ramamoorthy Subramanian

    2008-01-01

    Full Text Available Abstract Laboratory Virtual Instrumentation and Engineering Workbench (LabVIEW is a graphical programming tool based on the dataflow language G. Recently, runtime support for a hard real-time environment has become available for LabVIEW, which makes it an option for embedded systems prototyping. Due to its characteristics, the environment presents itself as an ideal tool for both the design and implementation of embedded software. In this paper, we study the design and implementation of embedded software by using G as the specification language and the LabVIEW RT real-time platform. One of the main advantages of this approach is that the environment leads itself to a very smooth transition from design to implementation, allowing for powerful cosimulation strategies (e.g., hardware in the loop, runtime modeling. We characterize the semantics and formal model of computation of G. We compare it to other models of computation and develop design rules and algorithms to propose sound embedded design in the language. We investigate the specification and mapping of hierarchical control systems in LabVIEW and G. Finally, we describe the development of a state-of-the-art embedded motion control system using LabVIEW as the specification, simulation and implementation tool, using the proposed design principles. The solution is state-of-the-art in terms of flexibility and control performance.

  1. Hierarchical Control Scheme for Improving Transient Voltage Recovery of a DFIG-Based WPP

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jinho; Muljadi, Eduard; Kang, Yong Cheol

    2015-06-05

    Modern grid codes require that wind power plants (WPPs) inject reactive power according to the voltage dip at a point of interconnection (POI). This requirement helps to support a POI voltage during a fault. However, if a fault is cleared, the POI and wind turbine generator (WTG) voltages are likely to exceed acceptable levels unless the WPP reduces the injected reactive power quickly. This might deteriorate the stability of a grid by allowing the disconnection of WTGs to avoid any damage. This paper proposes a hierarchical control scheme of a doubly-fed induction generator (DFIG)-based WPP. The proposed scheme aims to improve the reactive power injecting capability during the fault and suppress the overvoltage after the fault clearance. To achieve the former, an adaptive reactive power-to-voltage scheme is implemented in each DFIG controller so that a DFIG with a larger reactive power capability will inject more reactive power. To achieve the latter, a washout filter is used to capture a high frequency component contained in the WPP voltage, which is used to remove the accumulated values in the proportional-integral controllers. Test results indicate that the scheme successfully supports the grid voltage during the fault, and recovers WPP voltages without exceeding the limit after the fault clearance.

  2. A Rapid Prototyping Tool for Embedded, Real-Time Hierarchical Control Systems

    Directory of Open Access Journals (Sweden)

    Hugo Andrade

    2008-12-01

    Full Text Available Laboratory Virtual Instrumentation and Engineering Workbench (LabVIEW is a graphical programming tool based on the dataflow language G. Recently, runtime support for a hard real-time environment has become available for LabVIEW, which makes it an option for embedded systems prototyping. Due to its characteristics, the environment presents itself as an ideal tool for both the design and implementation of embedded software. In this paper, we study the design and implementation of embedded software by using G as the specification language and the LabVIEW RT real-time platform. One of the main advantages of this approach is that the environment leads itself to a very smooth transition from design to implementation, allowing for powerful cosimulation strategies (e.g., hardware in the loop, runtime modeling. We characterize the semantics and formal model of computation of G. We compare it to other models of computation and develop design rules and algorithms to propose sound embedded design in the language. We investigate the specification and mapping of hierarchical control systems in LabVIEW and G. Finally, we describe the development of a state-of-the-art embedded motion control system using LabVIEW as the specification, simulation and implementation tool, using the proposed design principles. The solution is state-of-the-art in terms of flexibility and control performance.

  3. Hierarchical path planning and control of a small fixed-wing UAV: Theory and experimental validation

    Science.gov (United States)

    Jung, Dongwon

    2007-12-01

    problem is formulated by setting up geometric linear constraints as well as boundary conditions. Subsequently, we construct B-spline path templates by solving a set of distinct optimization problems. For application in UAV motion planning, the path templates are incorporated to replace parts of the entire path by the smooth B-spline paths. Each path segment is stitched together while preserving continuity to obtain a final smooth reference path to be used for path following control. The path following control for a small fixed-wing UAV to track the prescribed smooth reference path is also addressed. Assuming the UAV is equipped with an autopilot for low level control, we adopt a kinematic error model with respect to the moving Serret-Frenet frame attached to a path for tracking controller design. A kinematic path following control law that commands heading rate is presented. Backstepping is applied to derive the roll angle command by taking into account the approximate closed-loop roll dynamics. A parameter adaptation technique is employed to account for the inaccurate time constant of the closed-loop roll dynamics during actual implementation. Finally, we implement the proposed hierarchical path control of a small UAV on the actual hardware platform, which is based on an 1/5 scale R/C model airframe (Decathlon) and the autopilot hardware and software. Based on the hardware-in-the-loop (HIL) simulation environment, the proposed hierarchical path control algorithm has been validated through on-line, real-time implementation on a small micro-controller. By a seamless integration of the control algorithms for path planning, path smoothing, and path following, it has been demonstrated that the UAV equipped with a small autopilot having limited computational resources manages to accomplish the path control objective to reach the goal while avoiding obstacles with minimal human intervention.

  4. An Efficient Admission Control Algorithm for Load Balancing In Hierarchical Mobile IPv6 Networks

    CERN Document Server

    Harini, Prof P

    2009-01-01

    In hierarchical Mobile IPv6 networks, Mobility Anchor Point (MAP) may become a single point of bottleneck as it handles more and more mobile nodes (MNs). A number of schemes have been proposed to achieve load balancing among different MAPs. However, signaling reduction is still imperfect because these schemes also avoid the effect of the number of CNs. Also only the balancing of MN is performed, but not the balancing of the actual traffic load, since CN of each MN may be different. This paper proposes an efficient admission control algorithm along with a replacement mechanism for HMIPv6 networks. The admission control algorithm is based on the number of serving CNs and achieves actual load balancing among MAPs. Moreover, a replacement mechanism is introduced to decrease the new MN blocking probability and the handoff MN dropping probability. By simulation results, we show that, the handoff delay and packet loss are reduced in our scheme, when compared with the standard HMIPv6 based handoff.

  5. CSchema: A Downgrading Policy Language for XML Access Control

    Institute of Scientific and Technical Information of China (English)

    Dong-Xi Liu

    2007-01-01

    The problem of regulating access to XML documents has attracted much attention from both academic and industry communities.In existing approaches, the XML elements specified by access policies are either accessible or inac-cessible according to their sensitivity.However, in some cases, the original XML elements are sensitive and inaccessible, but after being processed in some appropriate ways, the results become insensitive and thus accessible.This paper proposes a policy language to accommodate such cases, which can express the downgrading operations on sensitive data in XML documents through explicit calculations on them.The proposed policy language is called calculation-embedded schema (CSchema), which extends the ordinary schema languages with protection type for protecting sensitive data and specifying downgrading operations.CSchema language has a type system to guarantee the type correctness of the embedded calcula-tion expressions and moreover this type system also generates a security view after type checking a CSchema policy.Access policies specified by CSchema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against CSchema policies.These released documents are then ready tobe accessed by, for instance, XML query engines.By incorporating this validation procedure, other XML processing technologies can use CSchema as the access control module.

  6. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  7. Implementing context and team based access control in healthcare intranets.

    Science.gov (United States)

    Georgiadis, Christos K; Mavridis, Ioannis K; Nikolakopoulou, Georgia; Pangalos, George I

    2002-09-01

    The establishment of an efficient access control system in healthcare intranets is a critical security issue directly related to the protection of patients' privacy. Our C-TMAC (Context and Team-based Access Control) model is an active security access control model that layers dynamic access control concepts on top of RBAC (Role-based) and TMAC (Team-based) access control models. It also extends them in the sense that contextual information concerning collaborative activities is associated with teams of users and user permissions are dynamically filtered during runtime. These features of C-TMAC meet the specific security requirements of healthcare applications. In this paper, an experimental implementation of the C-TMAC model is described. More specifically, we present the operational architecture of the system that is used to implement C-TMAC security components in a healthcare intranet. Based on the technological platform of an Oracle Data Base Management System and Application Server, the application logic is coded with stored PL/SQL procedures that include Dynamic SQL routines for runtime value binding purposes. The resulting active security system adapts to current need-to-know requirements of users during runtime and provides fine-grained permission granularity. Apart from identity certificates for authentication, it uses attribute certificates for communicating critical security metadata, such as role membership and team participation of users.

  8. A RAMP CODE FOR FINE-GRAINED ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    Kannan Karthik

    2013-02-01

    Full Text Available Threshold ramp secret sharing schemes are designed so that (i certain subsets of shares have no information about the secret, (ii some subsets have partial information about the secret and (iii some subsets have complete information to recover the secret. However most of the ramp schemes in present literature do not control the leakage of information in partial access sets, due to which the information acquired by these sets is devoid of structure and not useful for fine-grained access control. Through a non-perfect secret sharing scheme called MIX-SPLIT, an encoding methodology for controlling the leakage in partial access sets is proposed and this is used for fine-grained access to binary strings. The ramp code generated using MIX-SPLIT requires a much smaller share size of O(n, as compared to Shamir's ramp adaptation which incurs a share size of atleast O(n2 for the same multi-access structure. The proposed ramp code is finally applied towards the protection and fine-grained access of industrial design drawings.

  9. Progesterone and oestrogen in pregnancy and parturition: comparative aspects and hierarchical control.

    Science.gov (United States)

    Heap, R B; Galil, A K; Harrison, F A; Jenkin, G; Perry, J S

    1977-01-01

    The different ways in which the progesterone requirements of pregnancy are met in various species are reviewed here. Progesterone production expressed in terms of metabolic body weight lies within about one order of magnitude in several species (but not in the rat), whether the hormone is predominantly ovarian or placental in origin. Parturition is usually preceded by a decrease in the plasma concentration of progesterone and the evidence which suggests that a decrease in secretion involves enzyme induction is summarized. In the sheep a sequence of well-marked hormonal changes can be discerned--an increase in fetal cortisol secretion followed by a fall in placental progesterone and a rise in oestrogen and prostaglandin F2alpha secretion. This sequence has been interpreted in terms of hierarchical control theory which envisages a series of levels placed in a descending order of importance and in which there is a downward transmission of a signal from a higher level that modifies activity at a lower level. A dominant level in the hierarchy in the sheep and pig seems to be the fetal hypothalamus and pituitary, but in the rabbit the maternal hypothalamus, pituitary and ovary play a more dominant role.

  10. Preparation of magnetic hierarchically porous microspheres with temperature-controlled wettability for removal of oils.

    Science.gov (United States)

    Tao, Shengyang; Ding, Yunzhe; Jiang, Lei; Li, Guangtao

    2017-04-15

    A series of monodispersed microspheres with hierarchically porous structures were prepared by microfluidic devices. Phase separation of the silica sol in microdroplets was adopted to construct these structures. The effects of velocity ratios (for both the continuous and the dispersed phases), collection solvents and calcination temperatures were investigated. The diameters of the microspheres were tuned from 148μm to 940μm by adjusting the velocity ratio. Tests revealed that the surface areas and pore volumes of the microspheres can reach 495m(2)g(-1) and 0.6068mlg(-1), respectively. The macroporous structure can be controlled by the collection solvents, and the wettability of the microspheres is determined by the calcination temperature. A calcination temperature of 450°C leads to a hydrophilic surface property. Fe3O4 nanoparticles were added to the silica sol to form magnetic microspheres, and the porous structure was not affected. This kind of hybrid microsphere adsorbs 3.29 times its own weight in toluene. These spheres can adsorb oil on water surfaces, and then be removed from the water with an external magnetic field. The microspheres can be recovered and reused more than 10 times. Copyright © 2016 Elsevier Inc. All rights reserved.

  11. Formation and shape-control of hierarchical cobalt nanostructures using quaternary ammonium salts in aqueous media

    Science.gov (United States)

    Deshmukh, Ruchi; Mehra, Anurag

    2017-01-01

    Aggregation and self-assembly are influenced by molecular interactions. With precise control of molecular interactions, in this study, a wide range of nanostructures ranging from zero-dimensional nanospheres to hierarchical nanoplates and spindles have been successfully synthesized at ambient temperature in aqueous solution. The nanostructures reported here are formed by aggregation of spherical seed particles (monomers) in presence of quaternary ammonium salts. Hydroxide ions and a magnetic moment of the monomers are essential to induce shape anisotropy in the nanostructures. The cobalt nanoplates are studied in detail, and a growth mechanism based on collision, aggregation, and crystal consolidation is proposed based on a electron microscopy studies. The growth mechanism is generalized for rods, spindles, and nearly spherical nanostructures, obtained by varying the cation group in the quaternary ammonium hydroxides. Electron diffraction shows different predominant lattice planes on the edge and on the surface of a nanoplate. The study explains, hereto unaddressed, the temporal evolution of complex magnetic nanostructures. These ferromagnetic nanostructures represent an interesting combination of shape anisotropy and magnetic characteristics.

  12. Femtosecond double-pulse fabrication of hierarchical nanostructures based on electron dynamics control for high surface-enhanced Raman scattering.

    Science.gov (United States)

    Zhang, Ning; Li, Xin; Jiang, Lan; Shi, Xuesong; Li, Cong; Lu, Yongfeng

    2013-09-15

    This Letter presents a simple, efficient approach for high surface-enhanced Raman scattering by one-step controllable fabrication of hierarchical structures (nanoparticles+subwavelength ripples) on silicon substrates in silver nitrate solutions using femtosecond double pulses based on nanoscale electron dynamics control. As the delays of the double pulses increase from 0 fs to 1 ps, the hierarchical structures can be controlled with (1) nanoparticles--the number of nanoparticles in the range of 40-100 nm reaches the maximum at 800 fs and (2) ripples--the subwavelength ripples become intermittent with decreased ablation depths. The redistributed nanoparticles and the modified ripple structures contribute to the maximum enhancement factor of 2.2×10(8) (measured by 10(-6)  M rhodamine 6G solution) at the pulse delay of 800 fs.

  13. Session Types for Access and Information Flow Control

    OpenAIRE

    Capecchi, Sara; Castellani, Ilaria; Dezani-Ciancaglini, Mariangiola; Rezk, Tamara

    2010-01-01

    We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both session safety and a form of access control. Moreover, this type system ensures secure information flow, including controlled forms of declassification. In particular, it prevents leaks due to the specific control constructs of the calculus, such as session opening, selection, branching and delegation. We illustrate the ...

  14. Controllable fabrication of large-scale hierarchical silver nanostructures for long-term stable and ultrasensitive SERS substrates

    Science.gov (United States)

    Wu, Jing; Fang, Jinghuai; Cheng, Mingfei; Gong, Xiao

    2016-09-01

    In this work, we aim to prepare effective and long-term stable hierarchical silver nanostructures serving as surface-enhanced Raman scattering (SERS) substrates simply via displacement reaction on Aluminum foils. In our experiments, Hexadecyltrimethylammonium bromide (CTAB) is used as cationic surfactant to control the velocity of displacement reaction as well as the hierarchical morphology of the resultant. We find that the volume ratio of CTAB to AgNO3 plays a dominant role in regulating the hierarchical structures besides the influence of displacement reaction time. These as-prepared hierarchical morphologies demonstrate excellent SERS sensitivity, structural stability and reproducibility with low values of relative standard deviation less than 20 %. The high SERS analytical enhancement factor of ~6.7 × 108 is achieved even at the concentration of Crystal Violet (CV) as low as 10-7 M, which is sufficient for single-molecule detection. The detection limit of CV is 10-9 M in this study. We believe that this simple and rapid approach integrating advantages of low-cost production and high reproducibility would be a promising way to facilitate routine SERS detection and will get wide applications in chemical synthesis.

  15. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  16. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  17. Privacy Preservation in Role-based Access Control Model

    Directory of Open Access Journals (Sweden)

    Zuo Chen

    2011-08-01

    Full Text Available Privacy preservation is a crucial problem in resource sharing and collaborating among multi-domains. Based on this problem, we propose a role-based access control model for privacy preservation. This scheme avoided the privacy leakage of resources while implementing access control, and it has the advantage of lower communication overhead. We demonstrate this scheme meets the IND-CCA2 semantic security by using random oracle. The simulation result shows this scheme has better execution efficiency and application effects.

  18. Are watershed and lacustrine controls on planktonic N2 fixation hierarchically structured?

    Science.gov (United States)

    Scott, J Thad; Doyle, Robert D; Prochnow, Shane J; White, Joseph D

    2008-04-01

    N2 fixation can be an important source of N to limnetic ecosystems and can influence the structure of phytoplankton communities. However, watershed-scale conditions that favor N2 fixation in lakes and reservoirs have not been well studied. We measured N2 fixation and lacustrine variables monthly over a 19-month period in Waco Reservoir, Texas, USA, and linked these data with nutrient-loading estimates from a physically based watershed model. Readily available topographic, soil, land cover, effluent discharge, and climate data were used in the Soil and Water Assessment Tool (SWAT) to derive watershed nutrient-loading estimates. Categorical and regression tree (CART) analysis revealed that lacustrine and watershed correlates of N2 fixation were hierarchically structured. Lacustrine conditions showed greater predictive capability temporally. For instance, low NO3(-) concentration (27 degrees C) in the reservoir were correlated with the initiation of N2 fixation seasonally. When lacustrine conditions were favorable for N2 fixation, watershed conditions appeared to influence spatial patterns of N2 fixation within the reservoir. For example, spatially explicit patterns of N2 fixation were correlated with the ratio of N:P in nutrient loadings and the N loading rate, which were driven by anthropogenic activity in the watershed and periods of low stream flow, respectively. Although N2 fixation contributed <5% of the annual N load to the reservoir, 37% of the N load was derived from atmospheric N2 fixation during summertime when stream flow in the watershed was low. This study provides evidence that watershed anthropogenic activity can exert control on planktonic N2 fixation, but that temporality is controlled by lacustrine conditions. Furthermore, this study also supports suggestions that reduced inflows may increase the propensity of N2-fixing cyanobacterial blooms in receiving waters of anthropogenically modified landscapes.

  19. Navy Commercial Access Control System Did Not Effectively Mitigate Access Control Risks

    Science.gov (United States)

    2013-09-16

    the capability to perform NCIC checks to vet contractor employees, and not all Navy installations nave the ability to access NCIC, NCACS is not...Management Corp 10,017 REA to contract N40085-06-D-1260 Goodwill Industries 199,148 Overhead charge to contract N00189-09- C-Z003 DynCorp international

  20. Database design for Physical Access Control System for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in

    2016-08-15

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  1. Review of Access Control Models for Cloud Computing

    Directory of Open Access Journals (Sweden)

    Natarajan Meghanathan

    2013-05-01

    Full Text Available The relationship between users and resources is dyn amic in the cloud, and service providers and users are typically not in the same security do main. Identity-based security (e.g., discretionary or mandatory access control models c annot be used in an open cloud computing environment, where each resource node may not be fa miliar, or even do not know each other. Users are normally identified by their attributes o r characteristics and not by predefined identities. There is often a need for a dynamic acc ess control mechanism to achieve cross- domain authentication. In this paper, we will focus on the following three broad categories of access control models for cloud computing: (1 Role -based models; (2 Attribute-based encryption models and (3 Multi-tenancy models. We will review the existing literature on each of the above access control models and their varian ts (technical approaches, characteristics, applicability, pros and cons, and identify future research directions for developing access control models for cloud computing environments .

  2. Regulatory Accessibility and Social Influences on State Self-Control

    OpenAIRE

    vanDellen, Michelle R.; Hoyle, Rick H.

    2009-01-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals’ state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-contro...

  3. Access Control of Web and Java Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  4. Ubiquitous access control and policy management in personal networks

    DEFF Research Database (Denmark)

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case...

  5. Fine-Grained Access Control for Electronic Health Record Systems

    Science.gov (United States)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  6. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  7. Access Control for Agent-based Computing: A Distributed Approach.

    Science.gov (United States)

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  8. Correlation between Hierarchical Structure and Processing Control of Large-area Spray-coated Polymer Solar Cells toward High Performance.

    Science.gov (United States)

    Huang, Yu-Ching; Tsao, Cheng-Si; Cha, Hou-Chin; Chuang, Chih-Min; Su, Chun-Jen; Jeng, U-Ser; Chen, Charn-Ying

    2016-01-28

    The formation mechanism of a spray-coated film is different from that of a spin-coated film. This study employs grazing incidence small- and wide-angle X-ray Scattering (GISAXS and GIWAXS, respectively) quantitatively and systematically to investigate the hierarchical structure and phase-separated behavior of a spray-deposited blend film. The formation of PCBM clusters involves mutual interactions with both the P3HT crystal domains and droplet boundary. The processing control and the formed hierarchical structure of the active layer in the spray-coated polymer/fullerene blend film are compared to those in the spin-coated film. How the different post-treatments, such as thermal and solvent vapor annealing, tailor the hierarchical structure of the spray-coated films is quantitatively studied. Finally, the relationship between the processing control and tailored BHJ structures and the performance of polymer solar cell devices is established here, taking into account the evolution of the device area from 1 × 0.3 and 1 × 1 cm(2). The formation and control of the special networks formed by the PCBM cluster and P3HT crystallites, respectively, are related to the droplet boundary. These structures are favorable for the transverse transport of electrons and holes.

  9. Correlation between Hierarchical Structure and Processing Control of Large-area Spray-coated Polymer Solar Cells toward High Performance

    Science.gov (United States)

    Huang, Yu-Ching; Tsao, Cheng-Si; Cha, Hou-Chin; Chuang, Chih-Min; Su, Chun-Jen; Jeng, U-Ser; Chen, Charn-Ying

    2016-01-01

    The formation mechanism of a spray-coated film is different from that of a spin-coated film. This study employs grazing incidence small- and wide-angle X-ray Scattering (GISAXS and GIWAXS, respectively) quantitatively and systematically to investigate the hierarchical structure and phase-separated behavior of a spray-deposited blend film. The formation of PCBM clusters involves mutual interactions with both the P3HT crystal domains and droplet boundary. The processing control and the formed hierarchical structure of the active layer in the spray-coated polymer/fullerene blend film are compared to those in the spin-coated film. How the different post-treatments, such as thermal and solvent vapor annealing, tailor the hierarchical structure of the spray-coated films is quantitatively studied. Finally, the relationship between the processing control and tailored BHJ structures and the performance of polymer solar cell devices is established here, taking into account the evolution of the device area from 1 × 0.3 and 1 × 1 cm2. The formation and control of the special networks formed by the PCBM cluster and P3HT crystallites, respectively, are related to the droplet boundary. These structures are favorable for the transverse transport of electrons and holes. PMID:26817585

  10. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  11. Compulsory licensing, price controls, and access to patented foreign products

    OpenAIRE

    Eric Bond; Kamal Saggi

    2012-01-01

    Motivated by existing multilateral rules regarding intellectual property, we develop a North-South model to highlight the dual roles price controls and compulsory licensing play in determining Southern access to a patented Northern product. The Northern patent-holder chooses whether and how to work its patent in the South (either via entry or voluntarily licensing) while the South determines the price control and whether to issue a compulsory license. The threat of compulsory licensing benefi...

  12. Modemless Multiple Access Communications over Powerlines for DC Microgrid Control

    OpenAIRE

    Angjelichinoski, Marko; Stefanovic, Cedomir; Popovski, Petar

    2016-01-01

    We present a communication solution tailored specifically for DC microgrids (MGs) that exploits: (i) the communication potential residing in power electronic converters interfacing distributed generators to powerlines and (ii) the multiple access nature of the communication channel presented by powerlines. The communication is achieved by modulating the parameters of the primary control loop implemented by the converters, fostering execution of the upper layer control applications. We present...

  13. Evaluation of the hierarchical control of distributed Energy Storage Systems in islanded Microgrids based on Std IEC/ISO 62264

    DEFF Research Database (Denmark)

    Palizban, Omid; Kauhaniemi, Kimmo; Guerrero, Josep M.

    2016-01-01

    In this paper, a decentralized control methodology based on hierarchical control levels is investigated. In recent years, efforts have been made to standardize microgrids (MGs), and the decentralized control method evaluated here is based on the IEC/ISO 62264 standard. Since the main challenge...... proportionally and directly proportionally, respectively, to the state of charge (SoC) of each battery unit during discharging and charging mode. To evaluate this decentralized method based on the IEC/ISO 62264 standard, PSCAD/EMTDC software is used....

  14. Integrity Based Access Control Model for Multilevel XML Document

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; FENG Xue-bin; HUANO Zhi; ZHENG Ming-hui

    2008-01-01

    XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT,UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application.

  15. Controlling user access to electronic resources without password

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  16. Shape Controlled Hierarchical Porous Hydrophobic/Oleophilic Metal-Organic Nanofibrous Gel Composites for Oil Adsorption.

    Science.gov (United States)

    Jayaramulu, Kolleboyina; Geyer, Florian; Petr, Martin; Zboril, Radek; Vollmer, Doris; Fischer, Roland A

    2017-03-01

    A versatile and facile synthetic route toward a ultralight hierarchical poroushybrid composed of metal-organic gels and fluorinated graphene oxide is reported. The composite gels show excellent absorbency of oil and various organic solvents due to their prominent meso/macropores, notable hydrophobicity, and superoleophilicity. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  17. Controlled Fabrication of Flower-like Nickel Oxide Hierarchical Structures and Their Application in Water Treatment

    Directory of Open Access Journals (Sweden)

    Linxia Wang

    2012-01-01

    Full Text Available Flower-like NiO hierarchical structures with 2–5 μm diameter assembled from nanosheet building blocks have been successfully fabricated via a wet-chemical method combined with thermodecomposition technology. The template-free method is facile and effective in preparing flower-like NiO superstructures in high yield. The intermediate product and final hierarchical structures are characterized by transmission electron microscopy (TEM, scanning electron microscopy (SEM, X-ray diffraction (XRD, Fourier transform IR (FTIR, and thermogravimetric analysis (TGA. The effects of growth temperature and reaction time on the morphologies of the as-prepared structures were investigated by SEM characterization and a possible mechanism for the formation of flower-like NiO is proposed. Based on the nitrogen adsorption and desorption measurements, the BET surface area of the as-obtained sample is 55.7 m2/g and the pore-size distribution plot indicates a bimodal mesopore distribution, with pore sizes of ca. 2.6 nm and 7.4 nm, respectively. In comparison with sphere-like and rod-like structures, the flower-like NiO hierarchical structures show an excellent ability to rapidly remove various pollutants when used as adsorbent and photocatalyst in waste-water treatment, which may be attributed to its unique hierarchical and porous surface structures.

  18. Distributed reservation control protocols for random access broadcasting channels

    Science.gov (United States)

    Greene, E. P.; Ephremides, A.

    1981-05-01

    Attention is given to a communication network consisting of an arbitrary number of nodes which can communicate with each other via a time-division multiple access (TDMA) broadcast channel. The reported investigation is concerned with the development of efficient distributed multiple access protocols for traffic consisting primarily of single packet messages in a datagram mode of operation. The motivation for the design of the protocols came from the consideration of efficient multiple access utilization of moderate to high bandwidth (4-40 Mbit/s capacity) communication satellite channels used for the transmission of short (1000-10,000 bits) fixed length packets. Under these circumstances, the ratio of roundtrip propagation time to packet transmission time is between 100 to 10,000. It is shown how a TDMA channel can be adaptively shared by datagram traffic and constant bandwidth users such as in digital voice applications. The distributed reservation control protocols described are a hybrid between contention and reservation protocols.

  19. Quantum control without access to the controlling interaction

    CERN Document Server

    Janzing, D; Zeier, R; Beth, T; Janzing, Dominik; Armknecht, Frederik; Zeier, Robert; Beth, Thomas

    2001-01-01

    In our model a fixed Hamiltonian acts on the joint Hilbert space of a quantum system and its controller. We show under which conditions measurements, state preparations, and unitary implementations on the system can be performed by quantum operations on the controller only. It turns out that a measurement of the observable A and an implementation of the one-parameter group exp(iAr) can be performed by almost the same sequence of control operations. Furthermore measurement procedures for A+B, for (AB+BA), and for i[A,B] can be constructed from measurements of A and B. This shows that the algebraic structure of the set of observables can be explained by the Lie group structure of the unitary evolutions on the joint Hilbert space of the measuring device and the measured system. A spin chain model with nearest neighborhood coupling shows that the border line between controller and system can be shifted consistently.

  20. Application of Attribute Based Access Control Model for Industrial Control Systems

    Directory of Open Access Journals (Sweden)

    Erkan Yalcinkaya

    2017-02-01

    Full Text Available The number of reported security vulnerabilities and incidents related to the industrial control systems (ICS has increased recent years. As argued by several researchers, authorization issues and poor access control are key incident vectors. The majority of ICS are not designed security in mind and they usually lack strong and granular access control mechanisms. The attribute based access control (ABAC model offers high authorization granularity, central administration of access policies with centrally consolidated and monitored logging properties. This research proposes to harness the ABAC model to address the present and future ICS access control challenges. The proposed solution is also implemented and rigorously tested to demonstrate the feasibility and viability of ABAC model for ICS.

  1. Phase-Controlled Iron Oxide Nanobox Deposited on Hierarchically Structured Graphene Networks for Lithium Ion Storage and Photocatalysis

    Science.gov (United States)

    Yun, Sol; Lee, Young-Chul; Park, Ho Seok

    2016-01-01

    The phase control, hierarchical architecturing and hybridization of iron oxide is important for achieving multifunctional capability for many practical applications. Herein, hierarchically structured reduced graphene oxide (hrGO)/α-Fe2O3 and γ-Fe3O4 nanobox hybrids (hrGO/α-Fe and hrGO/γ-Fe NBhs) are synthesized via a one-pot, hydrothermal process and their functionality controlled by the crystalline phases is adapted for energy storage and photocatalysis. The three-dimensionally (3D) macroporous structure of hrGO/α-Fe NBhs is constructed, while α-Fe2O3 nanoboxes (NBs) in a proximate contact with the hrGO surface are simultaneously grown during a hydrothermal treatment. The discrete α-Fe2O3 NBs are uniformly distributed on the surface of the hrGO/α-Fe and confined in the 3D architecture, thereby inhibiting the restacking of rGO. After the subsequent phase transition into γ-Fe3O4, the hierarchical structure and the uniform distribution of NBs are preserved. Despite lower initial capacity, the hrGO/α-Fe NBhs show better rate and cyclic performances than those of commercial rGO/α-Fe due to the uniform distribution of discrete α-Fe2O3 NBs and electronic conductivity, macroporosity, and buffering effect of the hrGO for lithium ion battery anodes. Moreover, the catalytic activity and kinetics of hrGO/γ-Fe NBhs are enhanced for photo-Fenton reaction because of the uniform distribution of discrete γ-Fe3O4 NBs on the 3D hierarchical architecture.

  2. Hierarchical hybrid control network design based on LON and master-slave RS-422/485 protocol

    Institute of Scientific and Technical Information of China (English)

    彭可; 陈际达; 陈岚

    2002-01-01

    Aiming at the weaknesses of LON bus, combining the coexistence of fieldbus and DCS (Distribu-ted Control Systems) in control networks, the authors introduce a hierarchical hybrid control network design based on LON and master-slave RS-422/485 protocol. This design adopts LON as the trunk, master-slave RS-422/485 control networks are connected to LON as special subnets by dedicated gateways. It is an implementation method for isomerous control network integration. Data management is ranked according to real-time requirements for different network data. The core components, such as control network nodes, router and gateway, are detailed in the paper. The design utilizes both communication advantage of LonWorks technology and the more powerful control ability of universal MCUs or PLCs, thus it greatly increases system response speed and performance-cost ratio.

  3. Negative Sequence Droop Method based Hierarchical Control for Low Voltage Ride-Through in Grid-Interactive Microgrids

    DEFF Research Database (Denmark)

    Zhao, Xin; Firoozabadi, Mehdi Savaghebi; Quintero, Juan Carlos Vasquez

    2015-01-01

    . In this paper, a voltage support strategy based on negative sequence droop control, which regulate the positive/negative sequence active and reactive power flow by means of sending proper voltage reference to the inner control loop, is proposed for the grid connected MGs to ride through voltage sags under...... complex line impedance conditions. In this case, the MGs should inject a certain amount of positive and negative sequence power to the grid so that the voltage quality at load side can be maintained at a satisfied level. A two layer hierarchical control strategy is proposed in this paper. The primary...... control loop consists of voltage and current inner loops, conventional droop control and virtual impedance loop while the secondary control loop is based on positive/negative sequence droop control which can achieve power injection under voltage sags. Experimental results with asymmetrical voltage sags...

  4. Rapid phase-controlled microwave synthesis of nanostructured hierarchical tetragonal and cubic β-In 2S 3 dandelion flowers

    Science.gov (United States)

    Naik, S. D.; Jagadale, T. C.; Apte, S. K.; Sonawane, R. S.; Kulkarni, M. V.; Patil, S. I.; Ogale, S. B.; Kale, B. B.

    2008-02-01

    Phase controlled synthesis of hierarchical nanostructured β-In 2S 3 dandelion flowers is realized by a rapid microwave solvothermal process using indium metal, nitric acid and thiourea as precursors. The tetragonal and cubic phases of the compound have been successfully and separately stabilized in the same type of dandelion morphology by using aqueous-mediated and methanol-mediated synthesis, respectively. The possible mechanism responsible for phase control is discussed. Optical properties of the flowers as well as their hydrogen generation capability by photodecomposition of H 2S under visible light are also reported.

  5. Access Control Design and Implementations in the ATLAS Experiment

    CERN Document Server

    Leahu, M C; Avolio, G

    2008-01-01

    The ATLAS experiment operates with a significant number of hardware and software resources. Their protection against misuse is an essential task to ensure a safe and optimal operation. To achieve this goal, the Role Based Access Control (RBAC) model has been chosen for its scalability, flexibility, ease of administration and usability from the lowest operating system level to the highest software application level. This paper presents the overall design of RBAC implementation in the ATLAS experiment and the enforcement solutions in different areas such as the system administration, control room desktops and the data acquisition software. The users and the roles are centrally managed using a directory service based on Lightweight Directory Access Protocol which is kept in synchronization with the human resources and IT datab

  6. Secure Communication and Access Control for Mobile Web Service Provisioning

    CERN Document Server

    Srirama, Satish Narayana

    2010-01-01

    It is now feasible to host basic web services on a smart phone due to the advances in wireless devices and mobile communication technologies. While the applications are quite welcoming, the ability to provide secure and reliable communication in the vulnerable and volatile mobile ad-hoc topologies is vastly becoming necessary. The paper mainly addresses the details and issues in providing secured communication and access control for the mobile web service provisioning domain. While the basic message-level security can be provided, providing proper access control mechanisms for the Mobile Host still poses a great challenge. This paper discusses details of secure communication and proposes the distributed semantics-based authorization mechanism.

  7. Controllable preparation of hierarchically core–shell structure NiO/C microspheres for non-enzymatic glucose sensor

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Zhenzhen; Yin, Haoyong; Nie, Qiulin, E-mail: nieqiulin@hdu.edu.cn

    2015-05-25

    Highlights: • Hierarchically core–shell structure NiO/C microspheres were prepared. • The NiO/C microspheres were obtained via layer-by-layer assembly methods. • The NiO/C sensor shows excellent performance in glucose detection. • Good stability and anti-interference were also obtained on the NiO/C sensor. - Abstract: Hierarchically core–shell structure NiO/C microspheres were controllably fabricated with a facile hydrothermal method via layer-by-layer assembly. The single-/double-/triple-/quadri-shelled NiO/C microspheres were characterized by scanning electron microscope (SEM), transmission electron microscope (TEM), X-ray diffraction (XRD), and energy dispersive X-ray spectroscopy (EDX). The results showed that the NiO/C composites are flower-like hierarchically structured microspheres composed of the interconnecting porous nanoplates with the thickness of about 50 nm. Every nanoplate is assembled by NiO nanoparticles with diameter about 10 nm. All the multi-shelled NiO/C microspheres show high electro-catalytic activity toward the oxidation of glucose. The double-shelled NiO/C glucose sensor exhibits the best performance with a much wider linear range of 2 μM–1.279 mM, higher sensitivity of 30.19 mA mM{sup −1} cm{sup −2} and lower detection limit of 2 μM. Importantly, long-term stability and favorable anti-interference were obtained thanks to the hierarchically core–shell structure.

  8. An approach to access control in electronic health record.

    Science.gov (United States)

    Sucurovic, Snezana

    2010-08-01

    OASIS is a non-for-profit consortium that drives the development convergence and adoption of open standards for the global information society. It involves more than 600 organizations and individuals as well as IT leaders Sun, Microsoft, IBM and Oracle. One of its standards is XACML which appeared a few years ago and now there are about 150,000 hits on Google. XACML (eXtensible Access Control Markup Language) is not technology related. Sun published in 2004 open source Sun XACML which is in compliance with XACML 1.0. specification and now works to make it comply with XACML 2.0. The heart of XACML are attributes values of defined type and name that is to be attached to a subject, a resource, an action and an environment in which a subject request action on resource. In that way XACML is to replace Role Based Access Control which dominated for years. The paper examines performances in CEN 13 606 and ISO 22 600 based healthcare system which uses XACML for access control.

  9. Authorisation and access control for electronic health record systems.

    Science.gov (United States)

    Blobel, Bernd

    2004-03-31

    Enabling the shared care paradigm, centralised or even decentralised electronic health record (EHR) systems increasingly become core applications in hospital information systems and health networks. For realising multipurpose use and reuse as well as inter-operability at knowledge level, EHR have to meet special architectural requirements. The component-oriented and model-based architecture should meet international standards. Especially in extended health networks realising inter-organisational communication and co-operation, authorisation cannot be organised at user level anymore. Therefore, models, methods and tools must be established to allow formal and structured policy definition, policy agreements, role definition, authorisation and access control. Based on the author's international engagement in EHR architecture and security standards referring to the revision of CEN ENV 13606, the GEHR/open EHR approach, HL7 and CORBA, models for health-specific and EHR-related roles, for authorisation management and access control have been developed. The basic concept is the separation of structural roles defining organisational entity-to-entity relationships and enabling specific acts on the one hand, and functional roles bound to specific activities and realising rights and duties on the other hand. Aggregation of organisational, functional, informational and technological components follows specific rules. Using UML and XML, the principles as well as some examples for analysis, design, implementation and maintenance of policy and authorisation management as well as access control have been practically implemented.

  10. Adaptive Hierarchical Sliding Mode Control with Input Saturation for Attitude Regulation of Multi-satellite Tethered System

    Science.gov (United States)

    Ma, Zhiqiang; Sun, Guanghui

    2017-06-01

    This paper proposes a novel adaptive hierarchical sliding mode control for the attitude regulation of the multi-satellite inline tethered system, where the input saturation is taken into account. The governing equations for the attitude dynamics of the three-satellite inline tethered system are derived firstly by utilizing Lagrangian mechanics theory. Considering the fact that the attitude of the central satellite can be adjusted by using the simple exponential stabilization scheme, the decoupling of the central satellite and the terminal ones is presented, and in addition, the new adaptive sliding mode control law is applied to stabilize the attitude dynamics of the two terminal satellites based on the synchronization and partial contraction theory. In the adaptive hierarchical sliding mode control design, the input is modeled as saturated input due to the fact that the flywheel torque is bounded, and meanwhile, an adaptive update rate is introduced to eliminate the effect of the saturated input and the external perturbation. The proposed control scheme can be applied on the two-satellite system to achieve fixed-point rotation. Numerical results validate the effectiveness of the proposed method.

  11. Adaptive Hierarchical Sliding Mode Control with Input Saturation for Attitude Regulation of Multi-satellite Tethered System

    Science.gov (United States)

    Ma, Zhiqiang; Sun, Guanghui

    2016-11-01

    This paper proposes a novel adaptive hierarchical sliding mode control for the attitude regulation of the multi-satellite inline tethered system, where the input saturation is taken into account. The governing equations for the attitude dynamics of the three-satellite inline tethered system are derived firstly by utilizing Lagrangian mechanics theory. Considering the fact that the attitude of the central satellite can be adjusted by using the simple exponential stabilization scheme, the decoupling of the central satellite and the terminal ones is presented, and in addition, the new adaptive sliding mode control law is applied to stabilize the attitude dynamics of the two terminal satellites based on the synchronization and partial contraction theory. In the adaptive hierarchical sliding mode control design, the input is modeled as saturated input due to the fact that the flywheel torque is bounded, and meanwhile, an adaptive update rate is introduced to eliminate the effect of the saturated input and the external perturbation. The proposed control scheme can be applied on the two-satellite system to achieve fixed-point rotation. Numerical results validate the effectiveness of the proposed method.

  12. OJADEAC: An Ontology Based Access Control Model for JADE Platform

    Directory of Open Access Journals (Sweden)

    Ban Sharief Mustafa

    2014-06-01

    Full Text Available Java Agent Development Framework (JADE is a software framework to make easy the development of Multi-Agent applications in compliance with the Foundation for Intelligent Physical Agents (FIPA specifications. JADE propose new infrastructure solutions to support the development of useful and convenient distributed applications. Security is one of the most important issues in implementing and deploying such applications. JADE-S security add-ons are one of the most popular security solutions in JADE platform. It provides several security services including authentication, authorization, signature and encryption services. Authorization service will give authorities to perform an action based on a set of permission objects attached to every authenticated user. This service has several drawbacks when implemented in a scalable distributed context aware applications. In this paper, an ontology-based access control model called (OJADEAC is proposed to be applied in JADE platform by combining Semantic Web technologies with context-aware policy mechanism to overcome the shortcoming of this service. The access control model is represented by a semantic ontology, and a set of two level semantic rules representing platform and application specific policy rules. OJADEAC model is distributed, intelligent, dynamic, context-aware and use reasoning engine to infer access decisions based on ontology knowledge.

  13. A study of multiple access schemes in satellite control network

    Science.gov (United States)

    Mo, Zijian; Wang, Zhonghai; Xiang, Xingyu; Wang, Gang; Chen, Genshe; Nguyen, Tien; Pham, Khanh; Blasch, Erik

    2016-05-01

    Satellite Control Networks (SCN) have provided launch control for space lift vehicles; tracking, telemetry and commanding (TTC) for on-orbit satellites; and, test support for space experiments since the 1960s. Currently, SCNs encounter a new challenge: how to maintain the high reliability of services when sharing the spectrum with emerging commercial services. To achieve this goal, the capability of multiple satellites reception is deserved as an update/modernization of SCN in the future. In this paper, we conducts an investigation of multiple access techniques in SCN scenario, e.g., frequency division multiple access (FDMA) and coded division multiple access (CDMA). First, we introduce two upgrade options of SCN based on FDMA and CDMA techniques. Correspondingly, we also provide their performance analysis, especially the system improvement in spectrum efficiency and interference mitigation. Finally, to determine the optimum upgrade option, this work uses CRISP, i.e., Cost, Risk, Installation, Supportability and Performance, as the baseline approach for a comprehensive trade study of these two options. Extensive numerical and simulation results are presented to illustrate the theoretical development.

  14. Multihop Medium Access Control for WSNs: An Energy Analysis Model

    Directory of Open Access Journals (Sweden)

    Haapola Jussi

    2005-01-01

    Full Text Available We present an energy analysis technique applicable to medium access control (MAC and multihop communications. Furthermore, the technique's application gives insight on using multihop forwarding instead of single-hop communications. Using the technique, we perform an energy analysis of carrier-sense-multiple-access (CSMA- based MAC protocols with sleeping schemes. Power constraints set by battery operation raise energy efficiency as the prime factor for wireless sensor networks. A detailed energy expenditure analysis of the physical, the link, and the network layers together can provide a basis for developing new energy-efficient wireless sensor networks. The presented technique provides a set of analytical tools for accomplishing this. With those tools, the energy impact of radio, MAC, and topology parameters on the network can be investigated. From the analysis, we extract key parameters of selected MAC protocols and show that some traditional mechanisms, such as binary exponential backoff, have inherent problems.

  15. Access Control Model for Sharing Composite Electronic Health Records

    Science.gov (United States)

    Jin, Jing; Ahn, Gail-Joon; Covington, Michael J.; Zhang, Xinwen

    The adoption of electronically formatted medical records, so called Electronic Health Records (EHRs), has become extremely important in healthcare systems to enable the exchange of medical information among stakeholders. An EHR generally consists of data with different types and sensitivity degrees which must be selectively shared based on the need-to-know principle. Security mechanisms are required to guarantee that only authorized users have access to specific portions of such critical record for legitimate purposes. In this paper, we propose a novel approach for modelling access control scheme for composite EHRs. Our model formulates the semantics and structural composition of an EHR document, from which we introduce a notion of authorized zones of the composite EHR at different granularity levels, taking into consideration of several important criteria such as data types, intended purposes and information sensitivities.

  16. Controllable synthesis of branched ZnO/Si nanowire arrays with hierarchical structure.

    Science.gov (United States)

    Huang, Shengli; Yang, Qianqian; Yu, Binbin; Li, Dingguo; Zhao, Ruisheng; Li, Shuping; Kang, Junyong

    2014-01-01

    A rational approach for creating branched ZnO/Si nanowire arrays with hierarchical structure was developed based on a combination of three simple and cost-effective synthesis pathways. The crucial procedure included growth of crystalline Si nanowire arrays as backbones by chemical etching of Si substrates, deposition of ZnO thin film as a seed layer by magnetron sputtering, and fabrication of ZnO nanowire arrays as branches by hydrothermal growth. The successful synthesis of ZnO/Si heterogeneous nanostructures was confirmed by morphologic, structural, and optical characterizations. The roles of key experimental parameters, such as the etchant solution, the substrate direction, and the seed layer on the hierarchical nanostructure formation, were systematically investigated. It was demonstrated that an etchant solution with an appropriate redox potential of the oxidant was crucial for a moderate etching speed to achieve a well-aligned Si nanowire array with solid and round surface. Meanwhile, the presence of gravity gradient was a key issue for the growth of branched ZnO nanowire arrays. The substrate should be placed vertically or facedown in contrast to the solution surface during the hydrothermal growth. Otherwise, only the condensation of the ZnO nanoparticles took place in a form of film on the substrate surface. The seed layer played another important role in the growth of ZnO nanowire arrays, as it provided nucleation sites and determined the growing direction and density of the nanowire arrays for reducing the thermodynamic barrier. The results of this study might provide insight on the synthesis of hierarchical three-dimensional nanostructure materials and offer an approach for the development of complex devices and advanced applications.

  17. Evaluation of secure capability-based access control in the M2M local cloud platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    of multiple distributed M2M gateways, creating new challenges in the access control. Some existing access control systems lack in scalability and flexibility to manage access from users or entity that belong to different authorization domains, or fails to provide fine grained and flexible access right...... delegation. Recently, the capability based access control has been considered as method to manage access in the Internet of Things (IoT) or M2M domain. In this paper, the implementation and evaluation of a proposed secure capability based access control in the M2M local cloud platform is presented...

  18. Admission Control and Interference Management in Dynamic Spectrum Access Networks

    Directory of Open Access Journals (Sweden)

    Jorge Martinez-Bauset

    2010-01-01

    Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

  19. Controllable synthesis of ZnO hierarchical architectures and their photocatalytic property

    Science.gov (United States)

    Fang, Linxia; Zhang, Baoliang; Li, Wei; Li, Xiangjie; Xin, Tinjun; Zhang, Qiuyu

    2014-11-01

    A facile solution route to synthesize ZnO hierarchical architectures was carried out employing trisodium citrate as structure-directing agent. Three different morphologies and crystal phase samples, including double-layer hexagonal prism ascribed to wurtzite ZnO (JCPDS No. 36-1451), porous microspheres ascribed to an unusual ZnO phase (JCPDS No. 21-1486) and smooth solid amorphous zinc citrate microsphere, were obtained. FESEM, TEM, XRD and FT-IR spectroscope were used to investigate the structure character of the products. The influence of the citrate concentration on ZnO microstructure was studied. It was found that the citrate concentration played a key role in evolution of the morphology and crystal phase. On the basis of experimental results, a possible formation mechanism of the ZnO hierarchical nanostructures was proposed. Photocatalytic property of the samples was evaluated by photodegradation reaction of methylene blue (MB) under UV irradiation. Among these products, double-layer hexagonal prism samples exhibited the highest photocatalytic activity.

  20. An Access Control Model of Virtual Machine Security

    Directory of Open Access Journals (Sweden)

    QIN Zhong-yuan

    2013-07-01

    Full Text Available Virtualization technology becomes a hot IT technolo gy with the popu-larity of Cloud Computing. However, new security issues arise with it. Specifically, the resources sharing and data communication in virtual machines are most con cerned. In this paper an access control model is proposed which combines the Chinese Wall a nd BLP model. BLP multi-level security model is introduced with corresponding improvement based on PCW (Prioritized Chinese Wall security model. This model can be used to safely co ntrol the resources and event behaviors in virtual machines. Experimental results show its eff ectiveness and safety.

  1. Privacy and Access Control for IHE-Based Systems

    Science.gov (United States)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  2. Efficient identity management and access control in cloud environment

    Science.gov (United States)

    Gloster, Jonathan

    2013-05-01

    As more enterprises are enticed to move data to a cloud environment to enhance data sharing and reduce operating costs by exploiting shared resources, concerns have risen over the ability to secure information within the cloud. This paper examines how a traditional Identity and Access Control (IDAM) architecture can be adapted to address security concerns of a cloud environment. We propose changing the paradigm of IDAM form a pure trust model to a risk based model will enable information to be protected securely in a cloud environment without impacting efficiencies of cloud environments.

  3. Precise size control over ultrafine rutile titania nanocrystallites in hierarchical nanotubular silica/titania hybrids with efficient photocatalytic activity.

    Science.gov (United States)

    Gu, Yuanqing; Huang, Jianguo

    2013-08-12

    Hierarchical-structured nanotubular silica/titania hybrids incorporated with particle-size-controllable ultrafine rutile titania nanocrystallites were realized by deposition of ultrathin titania sandwiched silica gel films onto each nanofiber of natural cellulose substances (e.g., common commercial filter paper) and subsequent flame burning in air. The rapid flame burning transforms the initially amorphous titania into rutile phase titania, and the silica gel films suppress the crystallite growth of rutile titania, thereby achieving nano-precise size regulation of ultrafine rutile titania nanocrystallites densely embedded in the silica films of the nanotubes. The average diameters of these nanocrystallites are adjustable in a range of approximately 3.3-16.0 nm by a crystallite size increment rate of about 2.4 nm per titania deposition cycle. The silica films transfer the electrons activated by crystalline titania and generate catalytic reactive species at the outer surface. The size-tuned ultrafine rutile titania nanocrystallites distributed in the unique hierarchical networks significantly improve the photocatalytic performance of the rutile phase titania, thereby enabling a highly efficient photocatalytic degradation of the methylene blue dye under ultraviolet light irradiation, which is even superior to the pure anatase-titania-based materials. The facile stepwise size control of the rutile titania crystallites described here opens an effective pathway for the design and preparation of fine-nanostructured rutile phase titania materials to explore potential applications.

  4. Controlled synthesis, growth mechanism and highly efficient solar photocatalysis of nitrogen-doped bismuth subcarbonate hierarchical nanosheets architectures.

    Science.gov (United States)

    Dong, Fan; Sun, Yanjuan; Ho, Wing-Kei; Wu, Zhongbiao

    2012-07-21

    The synthesis and self-assembly of hierarchical architectures from nanoscale building blocks with unique morphology, orientation and dimension have opened up new opportunities to enhance their functional performances and remain a great challenge. This work represents tunable synthesis of various types of 3D monodisperse in situ N-doped (BiO)(2)CO(3) hierarchical architectures composed of 2D single-crystal nanosheets with dominant (001) facets by a one-pot template-free hydrothermal method from bismuth citrate and ammonia solution. Depending on the concentration of ammonia solution, the morphology of N-doped (BiO)(2)CO(3), including dandelion-like, hydrangea-like and peony flower-like microspheres, can be selectively constructed due to different self-assembly patterns of nanosheets. It was revealed that the ammonia played dual roles in the formation of N-doped (BiO)(2)CO(3) architectures. One is to hydrolyze bismuth citrate, and the other is to behave as a nitrogen doping source. The in situ doped nitrogen substituted for oxygen in (BiO)(2)CO(3) and subsequently narrowed the band gap, making N-doped (BiO)(2)CO(3) visible light active. Due to the special nanosheets architectures, the prepared various N-doped (BiO)(2)CO(3) materials exhibited especially efficient photocatalytic activity and high durability for the removal of NO in air under both visible and UV light irradiation. Based on the direct observation of the growth process with respect to phase structure, chemical composition and morphological structure, a novel growth mechanism is revealed, which involves a unique multistep pathway, including reaction-nucleation, aggregation, crystallization, dissolution-recrystallization, and Ostwald ripening. The facile synthesis approach and the proposed growth mechanism could provide new insights into the design and controlled synthesis of inorganic hierarchical materials with new or enhanced properties.

  5. Advent of Biometric Sensors in Field of Access Control

    Directory of Open Access Journals (Sweden)

    Ali Anas

    2015-09-01

    Full Text Available Biometrics is the science of measuring and analyzing biological data. It is used to uniquely identify individuals by their physical characteristics or personal behavior traits.The results from scrutiny of various themes including unimodal, multimodal, physiological, behavioural bio-metrics. Bio-metrics, Physiological and behavioural are compared in the review. The article addresses a particular aspect of utilizing biometrics for authentication, identification and access control. The use of systems like fingerprint, face recognition, hand geometry, Palm print, DNA analysis, iris recognition, retina and odour/scent will be dealt with herewith. This study deals with various applications of this technology, like surveillance, employee identification, device access etc with mentions respective of hardware used. The influence of such features is yet to be documented properly, but it is safe to say that it has been a huge step towards better information security and identification control.Over the course of this text, we will try to bring to light our analysis of the subject and provide an in-depth examination of contemporary and futuristic technologies pertaining to this field.

  6. A Hierarchical Reliability Control Method for a Space Manipulator Based on the Strategy of Autonomous Decision-Making

    Directory of Open Access Journals (Sweden)

    Xin Gao

    2016-01-01

    Full Text Available In order to maintain and enhance the operational reliability of a robotic manipulator deployed in space, an operational reliability system control method is presented in this paper. First, a method to divide factors affecting the operational reliability is proposed, which divides the operational reliability factors into task-related factors and cost-related factors. Then the models describing the relationships between the two kinds of factors and control variables are established. Based on this, a multivariable and multiconstraint optimization model is constructed. Second, a hierarchical system control model which incorporates the operational reliability factors is constructed. The control process of the space manipulator is divided into three layers: task planning, path planning, and motion control. Operational reliability related performance parameters are measured and used as the system’s feedback. Taking the factors affecting the operational reliability into consideration, the system can autonomously decide which control layer of the system should be optimized and how to optimize it using a control level adjustment decision module. The operational reliability factors affect these three control levels in the form of control variable constraints. Simulation results demonstrate that the proposed method can achieve a greater probability of meeting the task accuracy requirements, while extending the expected lifetime of the space manipulator.

  7. Controlling Hierarchically Self-Assembly in Supramolecular Tailed-Dendron Systems

    Science.gov (United States)

    Merlet-Lacroix, Nathalie; Rao, Jingui; Zhang, Afang; Schlüter, Dieter; Ruokolainen, Janne; Mezzenga, Raffaele

    2010-03-01

    We study the self-assembly of a dendritic macromolecular system formed by a second-generation dendron and a polymer chain emanating from its focal point. We use supramolecular ionic interactions to attach to the periphery of the dendrons sulphated alkyl tails. The resulting ``triblock copolymers'' have a molecular architecture similar to a four-arm pitchfork with varying arms and holder lengths. The bulk morphologies observed by SAXS and TEM show thermodynamically stable, hierarchical ``inverted'' hexagonal or lamellar structures. The structural models for the molecular packing emerging from experimental findings are benchmarked to available self-consistent field theories (SCFT) and experiments and theoretical predictions are found in perfect agreement. The present results show that supramolecular systems based on tailed dendrons and surfactants can be used to scale up of the structural organization from the liquid crystalline length scale to the block copolymer length scale, while preserving the inverted unconventional morphologies offering new possibilities in the design of nanostructured materials.

  8. Micromechanics of hierarchical materials

    DEFF Research Database (Denmark)

    Mishnaevsky, Leon, Jr.

    2012-01-01

    A short overview of micromechanical models of hierarchical materials (hybrid composites, biomaterials, fractal materials, etc.) is given. Several examples of the modeling of strength and damage in hierarchical materials are summarized, among them, 3D FE model of hybrid composites...... with nanoengineered matrix, fiber bundle model of UD composites with hierarchically clustered fibers and 3D multilevel model of wood considered as a gradient, cellular material with layered composite cell walls. The main areas of research in micromechanics of hierarchical materials are identified, among them......, the investigations of the effects of load redistribution between reinforcing elements at different scale levels, of the possibilities to control different material properties and to ensure synergy of strengthening effects at different scale levels and using the nanoreinforcement effects. The main future directions...

  9. Hierarchical auxetic mechanical metamaterials.

    Science.gov (United States)

    Gatt, Ruben; Mizzi, Luke; Azzopardi, Joseph I; Azzopardi, Keith M; Attard, Daphne; Casha, Aaron; Briffa, Joseph; Grima, Joseph N

    2015-02-11

    Auxetic mechanical metamaterials are engineered systems that exhibit the unusual macroscopic property of a negative Poisson's ratio due to sub-unit structure rather than chemical composition. Although their unique behaviour makes them superior to conventional materials in many practical applications, they are limited in availability. Here, we propose a new class of hierarchical auxetics based on the rotating rigid units mechanism. These systems retain the enhanced properties from having a negative Poisson's ratio with the added benefits of being a hierarchical system. Using simulations on typical hierarchical multi-level rotating squares, we show that, through design, one can control the extent of auxeticity, degree of aperture and size of the different pores in the system. This makes the system more versatile than similar non-hierarchical ones, making them promising candidates for industrial and biomedical applications, such as stents and skin grafts.

  10. Hierarchical Auxetic Mechanical Metamaterials

    Science.gov (United States)

    Gatt, Ruben; Mizzi, Luke; Azzopardi, Joseph I.; Azzopardi, Keith M.; Attard, Daphne; Casha, Aaron; Briffa, Joseph; Grima, Joseph N.

    2015-02-01

    Auxetic mechanical metamaterials are engineered systems that exhibit the unusual macroscopic property of a negative Poisson's ratio due to sub-unit structure rather than chemical composition. Although their unique behaviour makes them superior to conventional materials in many practical applications, they are limited in availability. Here, we propose a new class of hierarchical auxetics based on the rotating rigid units mechanism. These systems retain the enhanced properties from having a negative Poisson's ratio with the added benefits of being a hierarchical system. Using simulations on typical hierarchical multi-level rotating squares, we show that, through design, one can control the extent of auxeticity, degree of aperture and size of the different pores in the system. This makes the system more versatile than similar non-hierarchical ones, making them promising candidates for industrial and biomedical applications, such as stents and skin grafts.

  11. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-08-21

    ... Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control... RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  12. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-08-16

    ... Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  13. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Science.gov (United States)

    2012-04-30

    ... Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held May 30, 2012, from...

  14. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  15. Hierarchical nitrogen doped bismuth niobate architectures: Controllable synthesis and excellent photocatalytic activity

    Energy Technology Data Exchange (ETDEWEB)

    Hou, Jungang, E-mail: lorinhjg@yahoo.com.cn [School of Metallurgical and Ecological Engineering, University of Science and Technology Beijing, Beijing 100083 (China); Cao, Rui; Wang, Zheng [School of Metallurgical and Ecological Engineering, University of Science and Technology Beijing, Beijing 100083 (China); Jiao, Shuqiang, E-mail: sjiao@ustb.edu.cn [School of Metallurgical and Ecological Engineering, University of Science and Technology Beijing, Beijing 100083 (China); Zhu, Hongmin [School of Metallurgical and Ecological Engineering, University of Science and Technology Beijing, Beijing 100083 (China)

    2012-05-30

    Graphical abstract: Efficient visible-light-driven photocatalysts of peony-like nitrogen doped Bi{sub 3}NbO{sub 7} hierarchical architectures and silver-layered Bi{sub 3}NbO{sub 7-x}Nx heterostructures were successfully synthesized in this discovery. Highlights: Black-Right-Pointing-Pointer N-Bi{sub 3}NbO{sub 7} architectures were synthesized via two-step hydrothermal process. Black-Right-Pointing-Pointer Electronic structure calculations indicated that N replaced O in samples. Black-Right-Pointing-Pointer Growth mechanism is proposed for transformation of nanoparticles to microflowers. Black-Right-Pointing-Pointer Excellent activities of N-Bi{sub 3}NbO{sub 7} architectures were obtained for degradation. Black-Right-Pointing-Pointer Enhanced photocatalytic performance was observed for Ag/N-Bi{sub 3}NbO{sub 7} architectures. - Abstract: Nitrogen doped bismuth niobate (N-Bi{sub 3}NbO{sub 7}) hierarchical architectures were synthesized via a facile two-step hydrothermal process. XRD patterns revealed that the defect fluorite-type crystal structure of Bi{sub 3}NbO{sub 7} remained intact upon nitrogen doping. Electron microscopy showed the N-Bi{sub 3}NbO{sub 7} architecture has a unique peony-like spherical superstructure composed of numerous nanosheets. UV-vis spectra indicated that nitrogen doping in the compound results in a red-shift of the absorption edge from 450 nm to 470 nm. XPS indicated that [Bi/Nb]-N bonds were formed by inducing nitrogen to replace a small amount of oxygen in Bi{sub 3}NbO{sub 7-x}N{sub x}, which is explained by electronic structure calculations including energy band and density of states. Based on observations of architectures formation, a possible growth mechanism was proposed to explain the transformation of polyhedral-like nanoparticles to peony-like microflowers via an Ostwald riping mechanism followed by self-assembly. The N-Bi{sub 3}NbO{sub 7} architectures due to the large specific surface area and nitrogen doping exhibited higher

  16. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever......-changing environmental energy sources. In this paper, we present an improved and extended version of ODMAC and we analyze it by means of an analytical model that can approximate several performance metrics in an arbitrary network topology. The simulations and the analytical experiments show ODMAC's ability to satisfy...... three key properties of EH-WSNs: adaptability of energy consumption, distributed energy-aware load balancing and support for different application-specific requirements....

  17. Access Control in Decentralised Publish/Subscribe Systems

    Directory of Open Access Journals (Sweden)

    Lauri I.W. Pesonen

    2007-04-01

    Full Text Available Publish/subscribe has emerged as an attractive communication paradigm for building Internet-wide distributed systems by decoupling message senders from receivers. Large scale publish/subscribe systems are likely to employ components of the event transport network owned by cooperating, but independent organisations. As the number of participants in the network increases, security becomes an increasing concern. So far most of the research on publish/subscribe has focused on efficient event routing, event filtering, and composite event detection. Very little research has been published regarding securing publish/subscribe systems. This paper extends our previous work to present and evaluate a secure multi-domain publish/subscribe infrastructure that supports and enforces fine-grained access control over the individual attributes of event types.

  18. Adaptive Hierarchical Control for the Muscle Strength Training of Stroke Survivors in Robot-aided Upper-limb Rehabilitation

    Directory of Open Access Journals (Sweden)

    Guozheng Xu

    2012-10-01

    Full Text Available Muscle strength training for stroke patients is of vital importance for helping survivors to progressively restore muscle strength and improve the performance of their activities in daily living (ADL. An adaptive hierarchical therapy control framework which integrates the patient’s real biomechanical state estimation with task‐performance quantitative evaluation is proposed. Firstly, a high‐level progressive resistive supervisory controller is designed to determine the resistive force base for each training session based on the patient’s online task‐performance evaluation. Then, a low‐level adaptive resistive force triggered controller is presented to further regulate the interactive resistive force corresponding to the patient’s real‐time biomechanical state ‐ characterized by the patient’s bio‐damping and bio‐stiffness in the course of one training session, so that the patient is challenged in a moderate but engaging and motivating way. Finally, a therapeutic robot system using a Barrett WAMTM compliant manipulator is set up. We recruited eighteen inpatient and outpatient stroke participants who were randomly allocated in experimental (robot‐aided and control (conventional physical therapy groups and enrolled for sixteen weeks of progressive resistance training. The preliminary results show that the proposed therapy control strategies can enhance the recovery of strength and motor control ability.

  19. The chromosome axis controls meiotic events through a hierarchical assembly of HORMA domain proteins.

    Science.gov (United States)

    Kim, Yumi; Rosenberg, Scott C; Kugel, Christine L; Kostow, Nora; Rog, Ofer; Davydov, Vitaliy; Su, Tiffany Y; Dernburg, Abby F; Corbett, Kevin D

    2014-11-24

    Proteins of the HORMA domain family play central, but poorly understood, roles in chromosome organization and dynamics during meiosis. In Caenorhabditis elegans, four such proteins (HIM-3, HTP-1, HTP-2, and HTP-3) have distinct but overlapping functions. Through combined biochemical, structural, and in vivo analysis, we find that these proteins form hierarchical complexes through binding of their HORMA domains to cognate peptides within their partners' C-terminal tails, analogous to the "safety belt" binding mechanism of Mad2. These interactions are critical for recruitment of HIM-3, HTP-1, and HTP-2 to chromosome axes. HTP-3, in addition to recruiting the other HORMA domain proteins to the axis, plays an independent role in sister chromatid cohesion and double-strand break formation. Finally, we find that mammalian HORMAD1 binds a motif found both at its own C terminus and at that of HORMAD2, indicating that this mode of intermolecular association is a conserved feature of meiotic chromosome structure in eukaryotes. Copyright © 2014 Elsevier Inc. All rights reserved.

  20. A Hybrid System of Hierarchical Planning of Behaviour Selection Networks for Mobile Robot Control

    Directory of Open Access Journals (Sweden)

    Young-Seol Lee

    2014-04-01

    Full Text Available An office delivery robot receives a large amount of sensory data and there is uncertainty in its action outcomes. The robot should not only accomplish its goals using environmental information, but also consider various exceptions simultaneously. In this paper, we propose a hybrid system using hierarchical planning of modular behaviour selection networks to generate autonomous behaviour in the office delivery robot. Behaviour selection networks, one of the well-known behaviour-based methods suitable for goal-oriented tasks, are made up of several smaller behaviour modules. Planning is attached to the construct and adjust sequences of the modules by considering the sub-goals, the priority in each task and the user feedback. This helps the robot to quickly react in dynamic situations as well as achieve global goals efficiently. The proposed system is verified with both the Webot simulator and a Khepera II robot that runs in a real office environment carrying out delivery tasks. Experimental results have shown that a robot can achieve goals and generate module sequences successfully even in unpredictable situations. Additionally, the proposed planning method reduced the elapsed time during tasks by 17.5% since it adjusts the behaviour module sequences more effectively.

  1. Controlled synthesis of hierarchical TiO2 nanoparticles on glass fibres and their photocatalytic performance.

    Science.gov (United States)

    Chen, Lin; Yang, Sudong; Mäder, Edith; Ma, Peng-Cheng

    2014-09-07

    This paper reports the synthesis of novel photocatalysts consisting of TiO2 nanoparticles and glass fibres (GF) using a two-step process. The method involves the hydrolysis of titanium tetrachloride in the presence of GF and a following hydrothermal process under alkaline conditions. Various techniques are employed to characterize the morphology, structure and crystallinity of TiO2 on the fibre surface. The results show that depending on the experiment setups, TiO2 nanoparticles exhibit spherical or flake-like morphology, forming characteristic hierarchical structures along with flexible GF. Flake-like TiO2/GF exhibits much enhanced photocatalytic activity thanks to the large surface area and the hetero-junction of anatase and TiO2-B phases observed in its structure. An interesting observation is that the alkali treatment of GF leads to the formation of porous structures on the fibre surface, facilitating the adsorption-concentration-promoted photocatalytic process. The removal ratio of the organic dye by employing TiO2/GF remains more than 80% after six cyclic runs, showing the reusability of photocatalysts in real application. The novelty of this work lies in the synergy arising from materials with unique morphologies, structures and availabilities as well as capabilities in separating photogenerated electron-hole pairs, which have not been specifically considered previously in photocatalytic semiconductors.

  2. Database Security System for Applying Sophisticated Access Control via Database Firewall Server

    OpenAIRE

    Eun-Ae Cho; Chang-Joo Moon; Dae-Ha Park; Kang-Bin Yim

    2014-01-01

    Database security, privacy, access control, database firewall, data break masking Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even though they tried to apply more strict permissions in recent database systems, it was difficult to properly adopt sophisticated access control policies to commercial databases...

  3. Safety systems and access control in the National Ignition Facility.

    Science.gov (United States)

    Reed, Robert K; Bell, Jayce C

    2013-06-01

    The National Ignition Facility (NIF) is the world's largest and most energetic laser system. The facility has the potential to generate ionizing radiation due to the interaction between the laser beams and target material, with neutrons and gamma rays being produced during deuterium-tritium fusion reactions. To perform these experiments, several types of hazards must be mitigated and controlled to ensure personnel safety. NIF uses a real-time safety system to monitor and mitigate the hazards presented by the facility. The NIF facility Safety Interlock System (SIS) monitors for oxygen deficiency and controls access to the facility preventing exposure to laser light and radiation from the Radiation Generating Devices. It also interfaces to radiation monitoring and other radiological monitoring and alarm systems. The SIS controls permissives to the hazard-generating equipment and annunciates hazard levels in the facility. To do this reliably and safely, the SIS has been designed as a fail-safe system with a proven performance record now spanning over 10 y. This paper discusses the SIS, its design, implementation, operator interfaces, validation/verification, and the hazard mitigation approaches employed in the NIF. A brief discussion of the Failure Modes and Effect Analysis supporting the SIS will also be presented. The paper ends with a general discussion of SIS do's and don'ts and common design flaws that should be avoided in SIS design.

  4. On Energy Efficient Hierarchical Cross-Layer Design: Joint Power Control and Routing for Ad Hoc Networks

    CERN Document Server

    Comaniciu, Cristina

    2007-01-01

    In this paper, a hierarchical cross-layer design approach is proposed to increase energy efficiency in ad hoc networks through joint adaptation of nodes' transmitting powers and route selection. The design maintains the advantages of the classic OSI model, while accounting for the cross-coupling between layers, through information sharing. The proposed joint power control and routing algorithm is shown to increase significantly the overall energy efficiency of the network, at the expense of a moderate increase in complexity. Performance enhancement of the joint design using multiuser detection is also investigated, and it is shown that the use of multiuser detection can increase the capacity of the ad hoc network significantly for a given level of energy consumption.

  5. Morphology and Crystallinity-controlled Synthesis of Manganese Cobalt Oxide/Manganese Dioxides Hierarchical Nanostructures for High-Performance Supercapacitors

    Institute of Scientific and Technical Information of China (English)

    Fei; Li; Gang; Li; Hao; Chen; Jia; Qi; Jia; Fan; Dong; Yao; Bo; Hu; Zheng; Guo; Shang; 张育新

    2015-01-01

    We demonstrate a novel preparative strategy for the well-controlled MnCo2O4.5@MnO2 hierarchical nanostructures.Bothδ-MnO2 nanosheets andα-MnO2 nanorods can uniformly decorate the surface of MnCo2O4.5nanowires to form core-shell heterostructures.Detailed electrochemical characterization reveals that MnCo2O4.5@δ-MnO2 pattern exhibits not only high specific capacitance of 357.5 F g-1at a scan rate of 0.5 A g-1,but also good cycle stability(97%capacitance retention after 1000 cycles at a scan rate of 5 A g-1),which make it have a promising application as a supercapacitor electrode material.

  6. A novel 300 kW arc plasma inverter system based on hierarchical controlled building block structure

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To date, the high power arc plasma technology is widely used. A next generation high power arc plasma system based on building block structure is presented. The whole arc plasma inverter system is composed of 12 paralleled units to increase the system output capability. The hierarchical control system is adopted to improve the reliability and flexibility of the high power arc plasma inverter. To ensure the reliable turn on and off of the IGBT module in each building block unit, a special pulse drive circuit is designed by using pulse transformer. The experimental result indicates that the high power arc plasma inverter system can transfer 300 kW arc plasma energy reliably with high efficiency.

  7. On Energy-Efficient Hierarchical Cross-Layer Design: Joint Power Control and Routing for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Poor HVincent

    2007-01-01

    Full Text Available A hierarchical cross-layer design approach is proposed to increase energy efficiency in ad hoc networks through joint adaptation of nodes' transmitting powers and route selection. The design maintains the advantages of the classic OSI model, while accounting for the cross-coupling between layers, through information sharing. The proposed joint power control and routing algorithm is shown to increase significantly the overall energy efficiency of the network, at the expense of a moderate increase in complexity. Performance enhancement of the joint design using multiuser detection is also investigated, and it is shown that the use of multiuser detection can increase the capacity of the ad hoc network significantly for a given level of energy consumption.

  8. Hierarchical tree-structured control network for the Antares laser facility

    Energy Technology Data Exchange (ETDEWEB)

    McGirt, F.

    1979-01-01

    The design and implementation of a distributed, computer-based control system for the Antares 100-kJ gas laser fusion facility is presented. Control system requirements and their operational interrelationships that consider both integrated system control and individual subsystem control are described. Several configurations of minicomputers are established to provide direct control of sets of microcomputers and to provide points of operator-laser interaction. Over 100 microcomputers are located very close to the laser device control points or sources of data and perform the real-time functions of the control system, such as data and control signal multiplexing, stepping motor control, and vacuum and gas system control. These microcomputers are designed to be supported as an integral part of the control network and to be software compatible with the larger minicomputers.

  9. A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems.

    Science.gov (United States)

    Choi, Donghee; Kim, Dohoon; Park, Seog

    2015-01-01

    Since the access control environment has changed and the threat of insider information leakage has come to the fore, studies on risk-based access control models that decide access permissions dynamically have been conducted vigorously. Medical information systems should protect sensitive data such as medical information from insider threat and enable dynamic access control depending on the context such as life-threatening emergencies. In this paper, we suggest an approach and framework for context sensitive risk-based access control suitable for medical information systems. This approach categorizes context information, estimating and applying risk through context- and treatment-based permission profiling and specifications by expanding the eXtensible Access Control Markup Language (XACML) to apply risk. The proposed framework supports quick responses to medical situations and prevents unnecessary insider data access through dynamic access authorization decisions in accordance with the severity of the context and treatment.

  10. Hierarchical photocatalysts.

    Science.gov (United States)

    Li, Xin; Yu, Jiaguo; Jaroniec, Mietek

    2016-05-01

    As a green and sustainable technology, semiconductor-based heterogeneous photocatalysis has received much attention in the last few decades because it has potential to solve both energy and environmental problems. To achieve efficient photocatalysts, various hierarchical semiconductors have been designed and fabricated at the micro/nanometer scale in recent years. This review presents a critical appraisal of fabrication methods, growth mechanisms and applications of advanced hierarchical photocatalysts. Especially, the different synthesis strategies such as two-step templating, in situ template-sacrificial dissolution, self-templating method, in situ template-free assembly, chemically induced self-transformation and post-synthesis treatment are highlighted. Finally, some important applications including photocatalytic degradation of pollutants, photocatalytic H2 production and photocatalytic CO2 reduction are reviewed. A thorough assessment of the progress made in photocatalysis may open new opportunities in designing highly effective hierarchical photocatalysts for advanced applications ranging from thermal catalysis, separation and purification processes to solar cells.

  11. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-05-24

    ...: RTCA Special Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation... 224, Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access...

  12. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-02-18

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Access Control Systems (Update to DO-230B): Agenda March 10, 2011 Welcome/Introductions/Administrative... Federal Aviation Administration Fifth Meeting: RTCA Special Committee 224: Airport Security Access...

  13. Suction catheter for enhanced control and accuracy of transseptal access.

    Science.gov (United States)

    Sulkin, Matthew S; Berwick, Zachary C; Hermiller, James B; Navia, Jose A; Kassab, Ghassan S

    2016-12-20

    Percutaneous structural heart therapies, such as mitral value repair, require site-specific transseptal access (TSA). This can be challenging for interventional cardiologists. We describe a TSA catheter (TSAC) that utilises suction for enhanced control and puncture accuracy. Here, we aim to evaluate the safety and efficacy of the device. Ex vivo interatrial septum preparations were dissected from swine (n=8) and diseased human hearts (n=6) to quantify TSAC suction and needle puncture force. TSAC suction was 6.5-fold greater than the opposing needle puncture force, and thus provides sufficient stabilisation for punctures. The safety and efficacy of TSAC was evaluated in a chronic mitral regurgitation swine model (n=10) and compared to a conventional TSA device. MR was induced by disrupting one to three mitral chordae tendineae, and the progression of heart disease was followed for three weeks. During device testing, procedure time and fluoroscopy exposure were not statistically different between devices. TSAC reduced septal displacement from 8.7±0.30 mm to 3.60±0.19 mm (p<0.05) and improved puncture accuracy 1.75-fold. TSAC provides controlled TSA and improves puncture accuracy, while maintaining procedure time and workflow. These findings provide a strong rationale for a first-in-man study to demonstrate the clinical utility of the device.

  14. Frequency Stability of Hierarchically Controlled Hybrid Photovoltaic-Battery-Hydropower Microgrids

    DEFF Research Database (Denmark)

    Guan, Yajuan; Vasquez, Juan Carlos; Guerrero, Josep M.;

    2014-01-01

    analysis is presented based on small signal models of the hybrid PV-HP microgrid, including 2 MWp PV station, 15.2 MWh battery storage system, and 12.8 MVA hydropower plant. Simulation results of the microgrid and experimental results on a scaled-down laboratory prototype verify the effectiveness......Hybrid photovolvaic battery-hydropower microgrids can increase electricity accessibility and availability in remote areas. In those microgrids with grid-connected and islanded modes capabilities, seamless transition between both modes is needed as well. However, the different resources...

  15. Complexity, Robustness, and Multistability in Network Systems with Switching Topologies: A Hierarchical Hybrid Control Approach

    Science.gov (United States)

    2015-05-22

    Control Problem for UAV For- mations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.2. Output Feedback Adaptive...10 2.6. On the Equivalence Between Dissipativity and Optimality of Discontinuous Nonlinear Regulators for Filippov Dynamical Systems...dynamical 1 systems controlled by optimal and inverse optimal discontinuous regulators . These results were used to design protocol controllers for group

  16. Data Access, Ownership, and Control: Toward Empirical Studies of Access Practices.

    Science.gov (United States)

    Hilgartner, Stephen; Brandt-Rauf, Sherry I.

    1994-01-01

    Examines how the new sociology of science can approach data access issues. A perspective is developed based on an analysis of the process of scientific production, data streams, and intellectual policy issues. (Contains 55 references.) (JLB)

  17. A Trusted Host's Authentication Access and Control Model Faced on User Action

    Institute of Scientific and Technical Information of China (English)

    ZHANG Miao; XU Guoai; HU Zhengming; YANG Yixian

    2006-01-01

    The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

  18. Hierarchical nanostructures of copper(II) phthalocyanine on electrospun TiO(2) nanofibers: controllable solvothermal-fabrication and enhanced visible photocatalytic properties.

    Science.gov (United States)

    Zhang, Mingyi; Shao, Changlu; Guo, Zengcai; Zhang, Zhenyi; Mu, Jingbo; Cao, Tieping; Liu, Yichun

    2011-02-01

    In the present work, 2,9,16,23-tetranitrophthalocyanine copper(II) (TNCuPc)/TiO(2) hierarchical nanostructures were successfully fabricated by a simple combination method of electrospinning technique and solvothermal processing. Scanning electron microscopy (SEM), energy-dispersive X-ray (EDX) spectroscopy, X-ray diffraction (XRD), UV-vis diffuse reflectance (DR), Fourier transform infrared spectrum (FT-IR), X-ray photoelectron spectroscopy (XPS), and thermal gravimetric and differential thermal analysis (TG-DTA) were used to characterize the as-synthesized TNCuPc/TiO(2) hierarchical nanostructures. The results showed that the secondary TNCuPc nanostructures were not only successfully grown on the primary TiO(2) nanofibers substrates but also uniformly distributed without aggregation. By adjusting the solvothermal fabrication parameters, the TNCuPc nanowires or nanoflowers were facilely fabricated, and also the loading amounts of TNCuPc could be controlled on the TNCuPc/TiO(2) hierarchical nanostructural nanofibers. And, there might exist the interaction between TNCuPc and TiO(2). A possible mechanism for the formation of TNCuPc/TiO(2) hierarchical nanostructures was suggested. The photocatalytic studies revealed that the TNCuPc/TiO(2) hierarchical nanostructures exhibited enhanced photocatalytic efficiency of photodegradation of Rhodamine B (RB) compared with the pure TNCuPc or TiO(2) nanofibers under visible-light irradiation.

  19. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  20. How Drug Control Policy and Practice Undermine Access to Controlled Medicines

    Science.gov (United States)

    Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J. K.

    2017-01-01

    Abstract Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions’ prioritization of criminal justice measures—including efforts to prevent non-medical use of controlled substances—undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights—specifically the right to health and the right to enjoy the benefits of scientific progress—are critical to rebalancing drug policy. PMID:28630556

  1. 3级递阶舰艇作战系统控制结构%Kind of three-level hierarchical control architecture for shipborne combat system

    Institute of Scientific and Technical Information of China (English)

    吕遐东; 姚腾钢; 黄心汉

    2011-01-01

    介绍了一种舰艇作战系统3级递阶集成控制结构,该结构自上而下包括系统组织级、资源协调级和设备执行级,形成了“信号-数据-知识”的3层信息递阶关系和“伺服-协调-组织”的3层控制递阶关系;同时融合了基于领域专家设计经验和指挥员作战知识的学习控制,结合“人在回路”设计实现人机智能的统一.针对作战系统分级递阶控制的信息度量、资源调度的离散事件建模、基于知识/规则的系统控制等基础理论问题进行了分析探讨.%A kind of three-level hierarchical control architecture for shipborne combat system Was introduced. The architecture consisted of three control levels from top to bottom including system-organizing layer, resource-coordinating layer and device-executing layer. It induced "signal-data-knowledge" hierarchical information model and "servo-coordinate-organize" hierarchical control model. The architecture also fused learning control based on expert experience and commander knowledge to integrate with human and machine intelligence by "man-in-loop" design. Considering hierarchical information evaluation, discrete event modeling for resource scheduling and knowledge-based system control, these theoretical fundamental issues had been discussed to combat system's hierarchical control application.

  2. A TDMA based media access control protocol for wireless ad hoc networks

    Science.gov (United States)

    Yang, Qi; Tang, Biyu

    2013-03-01

    This paper presents a novel Time Division Multiplex Access (TDMA) based Media Access Control (MAC) protocol of wireless Ad Hoc network. To achieve collision free transmission, time slots in a MAC frame are cataloged into three types, that is access slot, control slot and traffic slot. Nodes in the network access to the network in the access slot, and an exclusive control is allocated subsequently. Data packets are transmission by dynamic schedule the traffic slots. Throughput and transmission delay are also analyzed by simulation experiment. The proposed protocol is capable of providing collision free transmission and achieves high throughput.

  3. Principles of Eliminating Access Control Lists within a Domain

    Directory of Open Access Journals (Sweden)

    Vic Grout

    2012-04-01

    Full Text Available The infrastructure of large networks is broken down into areas that have a common security policy called a domain. Security within a domain is commonly implemented at all nodes. However this can have a negative effect on performance since it introduces a delay associated with packet filtering. When Access Control Lists (ACLs are used within a router for this purpose then a significant overhead is introduced associated with this process. It is likely that identical checks are made at multiple points within a domain prior to a packet reaching its destination. Therefore by eliminating ACLs within a domain by modifying the ingress/egress points with equivalent functionality an improvement in the overall performance can be obtained. This paper considers the effect of the delays when using router operating systems offering different levels of functionality. It considers factors which contribute to the delay particularly due to ACLs and by using theoretical principles modified by practical calculation a model is created. Additionally this paper provides an example of an optimized solution which reduces the delay through network routers by distributing the security rules to the ingress/egress points of the domain without affecting the security policy.

  4. Remarks on Hierarchic Control for a Linearized Micropolar Fluids System in Moving Domains

    Energy Technology Data Exchange (ETDEWEB)

    Jesus, Isaías Pereira de, E-mail: isaias@ufpi.edu.br [Universidade Federal do Piauí, Dpto. Matemática (Brazil)

    2015-12-15

    We study a Stackelberg strategy subject to the evolutionary linearized micropolar fluids equations in domains with moving boundaries, considering a Nash multi-objective equilibrium (non necessarily cooperative) for the “follower players” (as is called in the economy field) and an optimal problem for the leader player with approximate controllability objective. We will obtain the following main results: the existence and uniqueness of Nash equilibrium and its characterization, the approximate controllability of the linearized micropolar system with respect to the leader control and the existence and uniqueness of the Stackelberg–Nash problem, where the optimality system for the leader is given.

  5. On the hierarchical optimal control of a chain of distributed systems

    OpenAIRE

    Befekadu, Getachew K.; Pasiliao, Eduardo L.

    2015-01-01

    In this paper, we consider a chain of distributed systems governed by a degenerate parabolic equation, which satisfies a weak H\\"{o}rmander type condition, with a control distributed over an open subdomain. In particular, we consider two objectives that we would like to accomplish. The first one being of a controllability type that consists of guaranteeing the terminal state to reach a target set starting from an initial condition; while the second one is keeping the state trajectory of the o...

  6. Serial grey-box model of a stratified thermal tank for hierarchical control of a solar plant

    Energy Technology Data Exchange (ETDEWEB)

    Arahal, Manuel R. [Universidad de Sevilla, Dpto. de Ingenieria de Sistemas y Automatica, Camino de los Descubrimientos s/n, 41092 Sevilla (Spain); Cirre, Cristina M. [Convenio Universidad de Almeria-Plataforma Solar de Almeria, Ctra. Senes s/n, 04200 Tabernas, Almeria (Spain); Berenguel, Manuel [Universidad de Almeria, Dpto. Lenguajes y Computacion, Ctra. Sacramento s/n, 04120, Almeria (Spain)

    2008-05-15

    The ACUREX collector field together with a thermal storage tank and a power conversion system forms the Small Solar Power Systems plant of the Plataforma Solar de Almeria, a facility that has been used for research for the last 25 years. A simulator of the collector field produced by the last author has been available to and used as a test-bed for control strategies. Up to now, however, there is not a model for the whole plant. Such model is needed for hierarchical control schemes also proposed by the authors. In this paper a model of the thermal storage tank is derived using the Simultaneous Perturbation Stochastic Approximation technique to adjust the parameters of a serial grey-box model structure. The benefits of the proposed approach are discussed in the context of the intended use, requiring a model capable of simulating the behavior of the storage tank with low computational load and low error over medium to large horizons. The model is tested against real data in a variety of situations showing its performance in terms of simulation error in the temperature profile and in the usable energy stored in the tank. The results obtained demonstrate the viability of the proposed approach. (author)

  7. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  8. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  9. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  10. 21 CFR 1311.125 - Requirements for establishing logical access control-Individual practitioner.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access... Prescriptions § 1311.125 Requirements for establishing logical access control—Individual practitioner. (a) At... his two-factor authentication credential to satisfy the logical access controls. The second...

  11. 21 CFR 1311.130 - Requirements for establishing logical access control-Institutional practitioner.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 9 2010-04-01 2010-04-01 false Requirements for establishing logical access...) Electronic Prescriptions § 1311.130 Requirements for establishing logical access control—Institutional... practitioner that enters permissions for logical access controls into the application. The...

  12. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-03-18

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 4, 2013 from...

  13. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-09-26

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of a meeting of RTCA Special Committee 224: Airport Security Access Control...

  14. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held on June 20,...

  15. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-11-30

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held December 13,...

  16. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-03-15

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of meeting RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... 224, Airport Security Access Control Systems DATES: The meeting will be held April 5, 2012, from 10...

  17. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-04-12

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held April 9-10,...

  18. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-09-11

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems DATES: The meeting will be held September 27-28,...

  19. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-07-01

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is... Access Control Systems. DATES: The meeting will be held July 15, 2011, from 10 a.m. to 1 p.m....

  20. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-10-23

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held November 15,...

  1. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-02-04

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY... Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held February 21,...

  2. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-01-21

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is... Access Control Systems. DATES: The meeting will be held February 8, 2011, from 10 a.m. to 5...

  3. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-11-24

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is... Access Control Systems. DATES: The meeting will be held December 9, 2010, from 10 a.m. to 5...

  4. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-01-17

    ... Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Notice of RTCA Special Committee 224, Airport Security Access Control Systems. SUMMARY: The FAA..., Airport Security Access Control Systems. DATES: The meeting will be held February 9, 2012, from 10...

  5. Wi-Fi Networks Security and Accessing Control

    Directory of Open Access Journals (Sweden)

    Tarek S. Sobh

    2013-06-01

    Full Text Available As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP problem has raised more attention and resulted in obtaining wireless access without subscriber permission.This work assumes Wi-Fi AP under attack specially rogue AP and/or ad-hoc client. It provides a solution for detecting and preventing this attack. In addition, it provides the required user permissions to allow/block access of the files on the user of ad-hoc client. The experiments include the rogue AP attack are maintained and the effectiveness of the proposed solution are tested.

  6. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...... interfacing and signal routing. Equipment and infrastructure simplification was recognized as the path towards more efficient metropolitan and access networks providing a spectrum of high-bandwidth services to large number of users. Several approaches have been proposed and developed in order to enable...

  7. Strategy Implementation through Hierarchical Couplings in a Management Control Package : An Explorative Case Study

    NARCIS (Netherlands)

    van der Kolk, Berend; Schokker, Tom

    2016-01-01

    We examine how couplings of management control (MC) elements help to implement an organization’s strategy. Despite prior research stating that couplings between MC elements form fruitful soil for further research, empirical studies in this area are still scarce. We draw on coupling theory to explore

  8. Active Power Quality Improvement Strategy for Grid-connected Microgrid Based on Hierarchical Control

    DEFF Research Database (Denmark)

    Wei, Feng; Sun, Kai; Guan, Yajuan

    2017-01-01

    When connected to a distorted grid utility, droop-controlled grid-connected microgrids (DCGC-MG) exhibit low equivalent impedance. The harmonic and unbalanced voltage at the point of common coupling (PCC) deteriorates the power quality of the grid-connected current (GCC) of DCGC-MG. This work...

  9. Role-based access control through on-demand classification of electronic health record.

    Science.gov (United States)

    Tiwari, Basant; Kumar, Abhay

    2015-01-01

    Electronic health records (EHR) provides convenient method to exchange medical information of patients between different healthcare providers. Access control mechanism in healthcare services characterises authorising users to access EHR records. Role Based Access Control helps to restrict EHRs to users in a certain role. Significant works have been carried out for access control since last one decade but little emphasis has been given to on-demand role based access control. Presented work achieved access control through physical data isolation which is more robust and secure. We propose an algorithm in which selective combination of policies for each user of the EHR database has been defined. We extend well known data mining technique 'classification' to group EHRs with respect to the given role. Algorithm works by taking various roles as class and defined their features as a vector. Here, features are used as a Feature Vector for classification to describe user authority.

  10. Economic COP Optimization of a Heat Pump with Hierarchical Model Predictive Control

    DEFF Research Database (Denmark)

    Tahersima, Fatemeh; Stoustrup, Jakob; Rasmussen, Henrik

    2012-01-01

    A low-temperature heating system is studied in this paper. It consists of hydronic under-floor heating pipes and an air/ground source heat pump. The heat pump in such a setup is conventionally controlled only by feed-forwarding the ambient temperature. Having shown >10% cut-down on electricity...... bills by involving feedback control in a previous study, this paper has continued the same line of argument and has investigated effects of a priori knowledge on weather forecast and electricity price profile to alleviate the total electricity cost subject to constraints on resident's thermal comfort......'s coefficient of performance. At the same time, it determines the actual temperature set-points of the rooms by deviating from the user-defined set-points within a thermal tolerance zone. Simulations results confirm significant cut-down on electricity bills without sacrificing resident thermal comfort...

  11. Multiple-Time-Scales Hierarchical Frequency Stability Control Strategy of Medium-Voltage Isolated Microgrid

    DEFF Research Database (Denmark)

    Zhao, Zhuoli; Yang, Ping; Guerrero, Josep M.

    2016-01-01

    In this paper, an islanded medium-voltage (MV) microgrid placed in Dongao Island is presented, which integrates renewable-energy-based distributed generations (DGs), energy storage system (ESS), and local loads. In an isolated microgrid without connection to the main grid to support the frequency...... of Zone B. Theoretical analysis, time-domain simulation and field test results under various conditions and scenarios in the Dongao Island microgrid are presented to prove the validity of the introduced control strategy....

  12. Task-and-role-based access-control model for computational grid

    Institute of Scientific and Technical Information of China (English)

    LONG Tao; HONG Fan; WU Chi; SUN Ling-li

    2007-01-01

    Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.

  13. Mesochanneled hierarchically porous aluminosiloxane aerogel microspheres as a stable support for pH-responsive controlled drug release.

    Science.gov (United States)

    Vazhayal, Linsha; Talasila, Sindhoor; Abdul Azeez, Peer Mohamed; Solaiappan, Ananthakumar

    2014-09-10

    The molecular-scale self-assembly of a 3D aluminosiloxane (Al-O-Si) hybrid gel network was successfully performed via the cocondensation of hydrolyzed alumina (AlOOH) and (3-aminopropyl)trimethoxysilane (APS). It was transformed into a microspherical aerogel framework of Al-O-Si containing mesochannels with tunable hierarchically bimodal meso/macroporosities by a subcritical drying technique. Good homogeneity of AlOOH and APS brought during the synthesis guaranteed a uniform distribution of two metal oxides in a single body. A systematic characterization of the aerogel support was carried out using FTIR, SEM, TEM, nitrogen adsorption/desorption analysis, WAXS, SAXS, and ξ-potential measurement in order to explore the material for drug uptake and release. The drug loading and release capacity and chemical stability of an aluminosiloxane aerogel were studied using two nonsteroidal antiinflammatory drugs, ibuprofen and aspirin. A comprehensive evaluation of the aluminosiloxane aerogel with ordered mesoporous MCM-41 was also performed. Aerogel supports showed a high drug loading capacity and a pH-responsive controlled-release property compared to MCM-41. Meanwhile, kinetic modeling studies indicate that the drug releases with a zero-order profile following the Korsmeyer-Peppas model. The biocompatibility of aluminosiloxane aerogels was established via ex vivo and in vivo studies. We also outline the use of aluminosiloxane aerogel as a support for a possible 3D matrix for an osteoconductive structure for bone tissue engineering.

  14. Controlled lecithin release from a hierarchical architecture on blood-contacting surface to reduce hemolysis of stored red blood cells.

    Science.gov (United States)

    Shi, Qiang; Fan, Qunfu; Ye, Wei; Hou, Jianwen; Wong, Shing-Chung; Xu, Xiaodong; Yin, Jinghua

    2014-06-25

    Hemolysis of red blood cells (RBCs) caused by implant devices in vivo and nonpolyvinyl chloride containers for RBC preservation in vitro has recently gained much attention. To develop blood-contacting biomaterials with long-term antihemolysis capability, we present a facile method to construct a hydrophilic, 3D hierarchical architecture on the surface of styrene-b-(ethylene-co-butylene)-b-styrene elastomer (SEBS) with poly(ethylene oxide) (PEO)/lecithin nano/microfibers. The strategy is based on electrospinning of PEO/lecithin fibers onto the surface of poly [poly(ethylene glycol) methyl ether methacrylate] [P(PEGMEMA)]-modified SEBS, which renders SEBS suitable for RBC storage in vitro. We demonstrate that the constructed 3D architecture is composed of hydrophilic micro- and nanofibers, which transforms to hydrogel networks immediately in blood; the controlled release of lecithin is achieved by gradual dissolution of PEO/lecithin hydrogels, and the interaction of lecithin with RBCs maintains the membrane flexibility and normal RBC shape. Thus, the blood-contacting surface reduces both mechanical and oxidative damage to RBC membranes, resulting in low hemolysis of preserved RBCs. This work not only paves new way to fabricate high hemocompatible biomaterials for RBC storage in vitro, but provides basic principles to design and develop antihemolysis biomaterials for implantation in vivo.

  15. Modeling and sensitivity analysis of consensus algorithm based distributed hierarchical control for dc microgrids

    DEFF Research Database (Denmark)

    Meng, Lexuan; Dragicevic, Tomislav; Vasquez, Juan Carlos

    2015-01-01

    of dynamic study. The aim of this paper is to model the complete DC microgrid system in z-domain and perform sensitivity analysis for the complete system. A generalized modeling method is proposed and the system dynamics under different control parameters, communication topologies and communication speed...... the dynamics of electrical and communication systems interact with each other. Apart from that, the communication characteristics also affect the dynamics of the system. Due to discrete nature of information exchange in communication network, Laplace domain analysis is not accurate enough for this kind...

  16. The Model and Control Methods of Access to Information and Technology Resources of Automated Control Systems in Water Supply Industry

    Science.gov (United States)

    Rytov, M. Yu; Spichyack, S. A.; Fedorov, V. P.; Petreshin, D. I.

    2017-01-01

    The paper describes a formalized control model of access to information and technological resources of automated control systems at water supply enterprises. The given model considers the availability of various communication links with information systems and technological equipment. There are also studied control methods of access to information and technological resources of automated control systems at water supply enterprises. On the basis of the formalized control model and appropriate methods there was developed a software-hardware complex for rapid access to information and technological resources of automated control systems, which contains an administrator’s automated workplace and ultimate users.

  17. Admission Control for Multiservices Traffic in Hierarchical Mobile IPv6 Networks by Using Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Jung-Shyr Wu

    2012-01-01

    Full Text Available CAC (Call Admission Control plays a significant role in providing QoS (Quality of Service in mobile wireless networks. In addition to much research that focuses on modified Mobile IP to get better efficient handover performance, CAC should be introduced to Mobile IP-based network to guarantee the QoS for users. In this paper, we propose a CAC scheme which incorporates multiple traffic types and adjusts the admission threshold dynamically using fuzzy control logic to achieve better usage of resources. The method can provide QoS in Mobile IPv6 networks with few modifications on MAP (Mobility Anchor Point functionality and slight change in BU (Binding Update message formats. According to the simulation results, the proposed scheme presents good performance of voice and video traffic at the expenses of poor performance on data traffic. It is evident that these CAC schemes can reduce the probability of the handoff dropping and the cell overload and limit the probability of the new call blocking.

  18. Building on the Enriched Hierarchical Model of Achievement Motivation: Autonomous and Controlling Reasons Underlying Mastery Goals

    Directory of Open Access Journals (Sweden)

    Aikaterini Michou

    2016-07-01

    Full Text Available Two motivational theories – the Achievement Goal Theory and Self-Determination Theory – have recently been combined to explain students’ motivation, making it possible to study the “what” and the “why” of learners’ achievement strivings. The present study built on this approach by (a investigating whether the distinction between autonomous or volitional and controlling or pressuring reasons can be meaningfully applied to the adoption of mastery-avoidance goals, (b investigating the concurrent and prospective relations between mastery-avoidance goals and their underlying reasons and learning strategies when mastery-approach goals and their underlying reasons were also considered, and by (c incorporating psychological need experiences as an explanatory variable in the relation between achievement motives (i.e., the motive to succeed and motive to avoid failure and both mastery goals and their underlying reasons. In two Turkish university students samples ('N' = 226, 'Mage '= 22.36; 'N' = 331, 'Mage '= 19.5, autonomous and controlling reasons appeared applicable to mastery-avoidance goals and regression and path analysis further showed that mastery-avoidance goals and their underlying autonomous reasons fail to predicted learning strategies over and above the pursuit of mastery-approach goals and their underlying reasons. Finally, need experiences were established as mediators between achievement motives and both mastery goals and their underlying reasons.

  19. Implementing Discretionary Access Control with Time Character in Linux and Performance Analysis

    Institute of Scientific and Technical Information of China (English)

    TAN Liang; ZHOU Ming-Tian

    2006-01-01

    DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC_T_Linux is carried out. It is proved that the DAC_T_Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.

  20. A Generic Role Based Access Control Model for Wind Power Systems

    DEFF Research Database (Denmark)

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...... power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused...... while adhering to the proposed access model....

  1. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...

  2. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  3. Open access, readership, citations: a randomized controlled trial of scientific journal publishing.

    Science.gov (United States)

    Davis, Philip M

    2011-07-01

    Does free access to journal articles result in greater diffusion of scientific knowledge? Using a randomized controlled trial of open access publishing, involving 36 participating journals in the sciences, social sciences, and humanities, we report on the effects of free access on article downloads and citations. Articles placed in the open access condition (n=712) received significantly more downloads and reached a broader audience within the first year, yet were cited no more frequently, nor earlier, than subscription-access control articles (n=2533) within 3 yr. These results may be explained by social stratification, a process that concentrates scientific authors at a small number of elite research universities with excellent access to the scientific literature. The real beneficiaries of open access publishing may not be the research community but communities of practice that consume, but rarely contribute to, the corpus of literature.

  4. Template-particle stabilized bicontinuous emulsion yielding controlled assembly of hierarchical high-flux filtration membranes.

    Science.gov (United States)

    Hess, Samuel C; Kohll, A Xavier; Raso, Renzo A; Schumacher, Christoph M; Grass, Robert N; Stark, Wendelin J

    2015-01-14

    A novel solvent-evaporation-based process that exploits template-particle stabilized bicontinuous emulsions for the formation of previously unreached membrane morphologies is reported in this article. Porous membranes have a wide range of applications spanning from water filtration, pharmaceutical purification, and battery separators to scaffolds for tissue engineering. Different situations require different membrane morphologies including various pore sizes and pore gradients. However, most of the previously reported membrane preparation procedures are restricted to specific morphologies and morphology alterations require an extensive optimization process. The tertiary system presented in this article, which consists of a poly(ether sulfone)/dimethylacetamide (PES/DMAc) solution, glycerol, and ZnO-nanoparticles, allows simple and exact tuning of pore diameters ranging from sub-20 nm, up to 100 nm. At the same time, the pore size gradient is controlled from 0 up to 840%/μm yielding extreme asymmetry. In addition to structural analysis, water flux rates of over 5600 L m(-2) h(-1) are measured for membranes retaining 45 nm silica beads.

  5. Controlling the contractile strength of engineered cardiac muscle by hierarchal tissue architecture.

    Science.gov (United States)

    Feinberg, Adam W; Alford, Patrick W; Jin, Hongwei; Ripplinger, Crystal M; Werdich, Andreas A; Sheehy, Sean P; Grosberg, Anna; Parker, Kevin Kit

    2012-08-01

    The heart is a muscular organ with a wrapping, laminar structure embedded with neural and vascular networks, collagen fibrils, fibroblasts, and cardiac myocytes that facilitate contraction. We hypothesized that these non-muscle components may have functional benefit, serving as important structural alignment cues in inter- and intra-cellular organization of cardiac myocytes. Previous studies have demonstrated that alignment of engineered myocardium enhances calcium handling, but how this impacts actual force generation remains unclear. Quantitative assays are needed to determine the effect of alignment on contractile function and muscle physiology. To test this, micropatterned surfaces were used to build 2-dimensional myocardium from neonatal rat ventricular myocytes with distinct architectures: confluent isotropic (serving as the unaligned control), confluent anisotropic, and 20 μm spaced, parallel arrays of multicellular myocardial fibers. We combined image analysis of sarcomere orientation with muscular thin film contractile force assays in order to calculate the peak sarcomere-generated stress as a function of tissue architecture. Here we report that increasing peak systolic stress in engineered cardiac tissues corresponds with increasing sarcomere alignment. This change is larger than would be anticipated from enhanced calcium handling and increased uniaxial alignment alone. These results suggest that boundary conditions (heterogeneities) encoded in the extracellular space can regulate muscle tissue function, and that structural organization and cytoskeletal alignment are critically important for maximizing peak force generation.

  6. Access control and privilege management in electronic health record: a systematic literature review.

    Science.gov (United States)

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  7. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-08-06

    ... circumvention of copyright protection systems for access control technologies which was published July 27, 2010... Copyright Office 37 CFR Part 201 Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright Office, Library of Congress. ACTION: Final...

  8. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-10-06

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): November 2, 2010 Welcome/Introductions/Administrative Remarks Agenda... Federal Aviation Administration First Meeting: RTCA Special Committee 224: Airport Security Access...

  9. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-03-23

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): Agenda April 13, 2011 Welcome/Introductions/Administrative Remarks... Federal Aviation Administration Sixth Meeting: RTCA Special Committee 224: Airport Security Access...

  10. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-12-23

    ... meeting: Airport Security Access Control Systems (Update to DO-230B). SUMMARY: The FAA is issuing this... Control Systems (Update to DO-230B): Agenda January 13, 2011 Welcome/Introductions/Administrative Remarks... Federal Aviation Administration Third Meeting: RTCA Special Committee 224: Airport Security Access...

  11. Owner-Based Role-Based Access Control OB-RBAC

    NARCIS (Netherlands)

    Saffarian, Mohsen; Sadighi, Babak

    2010-01-01

    Administration of an access control model deals with the question of who is authorized to update policies defined on the basis of that model. One of the models whose administration has absorbed relatively large research is the Role-Based Access Control (RBAC) model. All the existing role-based admin

  12. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an a

  13. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an a

  14. Modelling and Analysing Access Control Policies in XACML 3.0

    DEFF Research Database (Denmark)

    Ramli, Carroline Dewi Puspa Kencana

    XACML (eXtensible Access Control Markup Language) is a prominent access control language that is widely adopted both in industry and academia. XACML is an international standard in the field of information security. The problem with XACML is that its specification is described in natural language...

  15. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  16. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  17. Hierarchical Robot Control System and Method for Controlling Select Degrees of Freedom of an Object Using Multiple Manipulators

    Science.gov (United States)

    Abdallah, Muhammad E. (Inventor); Platt, Robert (Inventor); Wampler, II, Charles W. (Inventor)

    2013-01-01

    A robotic system includes a robot having manipulators for grasping an object using one of a plurality of grasp types during a primary task, and a controller. The controller controls the manipulators during the primary task using a multiple-task control hierarchy, and automatically parameterizes the internal forces of the system for each grasp type in response to an input signal. The primary task is defined at an object-level of control, e.g., using a closed-chain transformation, such that only select degrees of freedom are commanded for the object. A control system for the robotic system has a host machine and algorithm for controlling the manipulators using the above hierarchy. A method for controlling the system includes receiving and processing the input signal using the host machine, including defining the primary task at the object-level of control, e.g., using a closed-chain definition, and parameterizing the internal forces for each of grasp type.

  18. A dynamic access control method based on QoS requirement

    Science.gov (United States)

    Li, Chunquan; Wang, Yanwei; Yang, Baoye; Hu, Chunyang

    2013-03-01

    A dynamic access control method is put forward to ensure the security of the sharing service in Cloud Manufacturing, according to the application characteristics of cloud manufacturing collaborative task. The role-based access control (RBAC) model is extended according to the characteristics of cloud manufacturing in this method. The constraints are considered, which are from QoS requirement of the task context to access control, based on the traditional static authorization. The fuzzy policy rules are established about the weighted interval value of permissions. The access control authorities of executable service by users are dynamically adjusted through the fuzzy reasoning based on the QoS requirement of task. The main elements of the model are described. The fuzzy reasoning algorithm of weighted interval value based QoS requirement is studied. An effective method is provided to resolve the access control of cloud manufacturing.

  19. The Study of Access Control for Service-Oriented Computing in Internet of Things

    Directory of Open Access Journals (Sweden)

    Guoping Zhang

    2012-06-01

    Full Text Available In Internet of Things, computing and processing of information is the core supporting. In this paper, we introduce “Service-Oriented Computing” to solve the computing and processing of information in IoT. However, a key challenge in service-oriented environment is the design of effective access control schemas.We put forward a model of Workflow -oriented Attributed Based Access Control (WABAC, and an access control framework based on WABAC model. WABAC model grants and adapts permissions to subjects according to subject atttribute, resource attribute, environment attribute and current task, meeting access control request of SOC. Using the approach presented can effectively enhance the access control security for SOC applications, and prevent the abuse of subject permissions.

  20. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  1. HDS: Hierarchical Data System

    Science.gov (United States)

    Pearce, Dave; Walter, Anton; Lupton, W. F.; Warren-Smith, Rodney F.; Lawden, Mike; McIlwrath, Brian; Peden, J. C. M.; Jenness, Tim; Draper, Peter W.

    2015-02-01

    The Hierarchical Data System (HDS) is a file-based hierarchical data system designed for the storage of a wide variety of information. It is particularly suited to the storage of large multi-dimensional arrays (with their ancillary data) where efficient access is needed. It is a key component of the Starlink software collection (ascl:1110.012) and is used by the Starlink N-Dimensional Data Format (NDF) library (ascl:1411.023). HDS organizes data into hierarchies, broadly similar to the directory structure of a hierarchical filing system, but contained within a single HDS container file. The structures stored in these files are self-describing and flexible; HDS supports modification and extension of structures previously created, as well as functions such as deletion, copying, and renaming. All information stored in HDS files is portable between the machines on which HDS is implemented. Thus, there are no format conversion problems when moving between machines. HDS can write files in a private binary format (version 4), or be layered on top of HDF5 (version 5).

  2. Hierarchical video summarization

    Science.gov (United States)

    Ratakonda, Krishna; Sezan, M. Ibrahim; Crinon, Regis J.

    1998-12-01

    We address the problem of key-frame summarization of vide in the absence of any a priori information about its content. This is a common problem that is encountered in home videos. We propose a hierarchical key-frame summarization algorithm where a coarse-to-fine key-frame summary is generated. A hierarchical key-frame summary facilitates multi-level browsing where the user can quickly discover the content of the video by accessing its coarsest but most compact summary and then view a desired segment of the video with increasingly more detail. At the finest level, the summary is generated on the basis of color features of video frames, using an extension of a recently proposed key-frame extraction algorithm. The finest level key-frames are recursively clustered using a novel pairwise K-means clustering approach with temporal consecutiveness constraint. We also address summarization of MPEG-2 compressed video without fully decoding the bitstream. We also propose efficient mechanisms that facilitate decoding the video when the hierarchical summary is utilized in browsing and playback of video segments starting at selected key-frames.

  3. Growth of self-organized hierarchical ZnO nanoarchitectures by a simple In/In2S3 controlled thermal evaporation process.

    Science.gov (United States)

    Shen, Guozhen; Bando, Yoshio; Lee, Cheol-Jin

    2005-06-02

    Novel hierarchical ZnO nanoarchitectures, such as microtrepangs, microbelts, nanoflowers, nanocombs, nanowheels, and nanofans assembled by ZnO nanocones, nanobowling pins, nanobottles, nanoarrows, and nanonails, have had their growth controlled by the thermal evaporation of Zn and a mixture of In and In2S3. Both the morphologies of the products and their construction units could be efficiently controlled by simple adjustment of the weight ratio of In/In2S3. The phase structure, morphologies, and photoluminescence properties of the ZnO products were investigated by X-ray diffraction, scanning electron microscopy, high-resolution transmission electron microscopy, and photoluminescence spectroscopy. These novel hierarchical ZnO nanoarchitectures may be attractive building blocks for creating optical or other nanodevices.

  4. Secure Remote Access Issues in a Control Center Environment

    Science.gov (United States)

    Pitts, Lee; McNair, Ann R. (Technical Monitor)

    2002-01-01

    The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.

  5. Controls Over the Contractor Common Access Card Life Cycle

    Science.gov (United States)

    2008-10-10

    Identification System SES Senior Executive Service SPOC Service Point of Contact TASM Trusted Agent Security Manager USD (AT&L) Under...the final report by October 31, 2008. 53 Finding D. Oversight of Common Access Card Sponsors DoD CVS Service Points of Contact ( SPOCs ...authorization to approve contractor CACs. Organization of CAC Application Sites Each Service agency has an SPOC who is responsible for coordinating with

  6. Evolutionary Games for Multiple Access Control: From Egoism to Altruism

    OpenAIRE

    Gaiech, Houssem; El-Azouzi, Rachid; Haddad, Majed; Altman, Eitan; Mabrouki, Issam

    2014-01-01

    International audience; This paper studies multiple access games within a large population of mobiles decomposed into several groups. Mobiles interfere with each other through many local interactions. We assume that each mobile (or player) cooperates with its group by taking into account the performance of its group. We parameterize the degree of cooperation which allows to cover the fully non-cooperative behavior, the fully cooperative behavior, and even more, the fully altruistic behavior, ...

  7. Characterization of accessibility for affine connection control systems at some points with nonzero velocity

    CERN Document Server

    Barbero-Liñán, María

    2011-01-01

    Affine connection control systems are mechanical control systems that model a wide range of real systems such as robotic legs, hovercrafts, planar rigid bodies, rolling pennies, snakeboards and so on. In 1997 the accessibility and a particular notion of controllability was intrinsically described by A. D. Lewis and R. Murray at points of zero velocity. Here, we present a novel generalization of the description of accessibility algebra for those systems at some points with nonzero velocity as long as the affine connection restricts to the distribution given by the symmetric closure. The results are used to describe the accessibility algebra of different mechanical control systems.

  8. Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC), are not suf......Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC......), are not sufficient to address the new challenges introduced by these location-based applications. Several recent research efforts have enhanced RBAC with spatio-temporal features. Nevertheless, the state-of-the-art does not deal with mobility of both subjects and objects and does not support the utilization...... of complex access control decisions based on spatio-temporal relationships among subjects and objects. Furthermore, such relationships change frequently in dynamic environments, requiring efficient mechanisms to monitor and re-evaluate access control decisions. In this position paper, we present a healthcare...

  9. An application-layer based centralized information access control for VPN

    Institute of Scientific and Technical Information of China (English)

    OUYANG Kai; ZHOU Jing-li; XIA Tao; YU Sheng-sheng

    2006-01-01

    With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the internal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that ifone vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem.To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC-the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC's constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.

  10. A General Attribute and Rule Based Role-Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.

  11. A Fault-Tolerant Emergency-Aware Access Control Scheme for Cyber-Physical Systems

    CERN Document Server

    Wu, Guowei; Xia, Feng; Yao, Lin

    2012-01-01

    Access control is an issue of paramount importance in cyber-physical systems (CPS). In this paper, an access control scheme, namely FEAC, is presented for CPS. FEAC can not only provide the ability to control access to data in normal situations, but also adaptively assign emergency-role and permissions to specific subjects and inform subjects without explicit access requests to handle emergency situations in a proactive manner. In FEAC, emergency-group and emergency-dependency are introduced. Emergencies are processed in sequence within the group and in parallel among groups. A priority and dependency model called PD-AGM is used to select optimal response-action execution path aiming to eliminate all emergencies that occurred within the system. Fault-tolerant access control polices are used to address failure in emergency management. A case study of the hospital medical care application shows the effectiveness of FEAC.

  12. Proximity-based access control for context-sensitive information provision in SOA-based systems

    Science.gov (United States)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  13. Controllable growth of polyaniline nanowire arrays on hierarchical macro/mesoporous graphene foams for high-performance flexible supercapacitors

    Science.gov (United States)

    Yu, Pingping; Zhao, Xin; Li, Yingzhi; Zhang, Qinghua

    2017-01-01

    Free-standing hierarchical macro/mesoporous flexible graphene foam have been constructed by rational intergration ofwell dispersed graphene oxide sheets and amino-modified polystyrene (PS) spheres through a facile ;templating and embossing; technique. The three dimensional (3D) macro/mesoporous flexible graphene foam not only inherits the uniform porous structures of graphene foam, but also contains hierarchical macro/mesopores on the struts by sacrificing PS spheres and the activation of KOH, which could providing rapid pathways for ionic and electronic transport to high specific capacitance. Vertically polyaniline (PANI) nanowire arrays are then uniformly deposited onto the hierarchical macro/mesoporous graphene foam(fRGO-F/PANI) by a simple in situ polymerization, which show a high specific capacitance of 939 F g-1. Thanks to the synergistic function of 3D bicontinuous hierarchical porous structure of graphene foam and effective immobilization of PANI nanowires on the struts, the assembled symmetric supercapctior with fRGO-F/PANI as electrodes exhibits a maximum energy density and power density of 20.9 Wh kg-1 and 103.2 kW kg-1, respectively. Moreover, it also displays an excellent cyclic stability with a 88.7% retention after 5000 cycles.

  14. Two-layer hierarchical control solutions for traffic signal%面向交通信号的两层递阶控制解决方案

    Institute of Scientific and Technical Information of China (English)

    戈军; 周莲英

    2015-01-01

    针对现有交通信号控制系统的诸多不足,提出了一种用于交通信号控制的两层递阶多Agent系统解决方案。通过将交通网络进行区域划分,利用底层Agent控制各交叉口,顶层Agent控制区域,从而实现两层递阶控制。底层Agent采用经典Q学习同步学习最优策略,顶层Agent利用Tile Coding非凡的连续空间处理能力,实现Q学习的动作值函数逼近方法。仿真实验结果表明,该分层递阶控制不但提高了交通信号控制系统效率,而且也为大规模应用提供了很好的可伸缩解决方案。%In view of the existing deficiencies of traffic signal control system, this paper proposes two-layer hierarchical multi-Agent system solution for traffic signal control. Through regional division of the traffic network, it uses the bottom level Agent to control the intersection, the top level Agent to control areas, so as to achieve the two-layer hierarchical con-trol. The bottom level Agent uses the classical Q-learning to synchronize the optimal strategy, the top level Agent utilizes the special continuous space processing ability of Tile Coding to achieve Q learning of action value function approxima-tion method. The simulation test results show that, the hierarchical control not only improves the efficiency of traffic signal control system, but also provides a good scalable solution for large-scale applications.

  15. Hierarchically Structured Electrospun Fibers

    Directory of Open Access Journals (Sweden)

    Nicole E. Zander

    2013-01-01

    Full Text Available Traditional electrospun nanofibers have a myriad of applications ranging from scaffolds for tissue engineering to components of biosensors and energy harvesting devices. The generally smooth one-dimensional structure of the fibers has stood as a limitation to several interesting novel applications. Control of fiber diameter, porosity and collector geometry will be briefly discussed, as will more traditional methods for controlling fiber morphology and fiber mat architecture. The remainder of the review will focus on new techniques to prepare hierarchically structured fibers. Fibers with hierarchical primary structures—including helical, buckled, and beads-on-a-string fibers, as well as fibers with secondary structures, such as nanopores, nanopillars, nanorods, and internally structured fibers and their applications—will be discussed. These new materials with helical/buckled morphology are expected to possess unique optical and mechanical properties with possible applications for negative refractive index materials, highly stretchable/high-tensile-strength materials, and components in microelectromechanical devices. Core-shell type fibers enable a much wider variety of materials to be electrospun and are expected to be widely applied in the sensing, drug delivery/controlled release fields, and in the encapsulation of live cells for biological applications. Materials with a hierarchical secondary structure are expected to provide new superhydrophobic and self-cleaning materials.

  16. Fertility effects of abortion and birth control pill access for minors.

    Science.gov (United States)

    Guldi, Melanie

    2008-11-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors' fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors' access to abortion and minors' birth rates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment-including abortion-in some states but not in others, and to construct abortion access variables reflecting this. In this article, age-specific policy variables measure either a minor's legal ability to obtain an abortion or to obtain the birth control pill without parental involvement. I find fairly strong evidence that young women's birth rates dropped as a result of abortion access as well as evidence that birth control pill access led to a drop in birth rates among whites.

  17. Assessment of current practices in creating and using passwords as a control mechanism for information access

    Directory of Open Access Journals (Sweden)

    P. L. Wessels

    2007-11-01

    Full Text Available One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information.

  18. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres

    2014-01-01

    and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....

  19. Functional annotation of hierarchical modularity.

    Directory of Open Access Journals (Sweden)

    Kanchana Padmanabhan

    method using Saccharomyces cerevisiae data from KEGG and MIPS databases and several other computationally derived and curated datasets. The code and additional supplemental files can be obtained from http://code.google.com/p/functional-annotation-of-hierarchical-modularity/ (Accessed 2012 March 13.

  20. Computer Program Development Specification Terminal Access Controller. Appendix B. Access Line Modes.

    Science.gov (United States)

    1979-04-06

    CG-510262 Part 1 of 2 6 April 1979 Page B17 iS U £ 44 0 o a, U, 00 0 ,.- C 2 50 St -: 2-, CG-510262 Part 1 of 2 6 April 1979 Page B18 00 0 0 0 4 4 0...receipt of RM as the response to a block and acknowledged wit , receive control character ACK2. CAN is never transmitted wit’iin t-ne text portion of a

  1. Problem of two-level hierarchical minimax program control the final state of regional social and economic system with incomplete information

    Science.gov (United States)

    Shorikov, A. F.

    2016-12-01

    In this article we consider a discrete-time dynamical system consisting of a set a controllable objects (region and forming it municipalities). The dynamics each of these is described by the corresponding linear or nonlinear discrete-time recurrent vector relations and its control system consist from two levels: basic level (control level I) that is dominating level and auxiliary level (control level II) that is subordinate level. Both levels have different criterions of functioning and united by information and control connections which defined in advance. In this article we study the problem of optimization of guaranteed result for program control by the final state of regional social and economic system in the presence of risks vectors. For this problem we propose a mathematical model in the form of two-level hierarchical minimax program control problem of the final states of this system with incomplete information and the general scheme for its solving.

  2. Enhancing Subject Access to OPACs: Controlled Vocabulary vs. Natural Language.

    Science.gov (United States)

    Cousins, Shirley Anne

    1992-01-01

    Investigation of retrieval performance of controlled vocabulary derived from natural language terms in tables of contents and book indexes assumed that controlled vocabulary representative of users' queries should adequately represent documents' contents. Queries were indexed using Library of Congress Subject Headings (LSCH), Dewey Decimal…

  3. 一类高阶线性系统的分层控制%Hierarchical Control of a Class of High-dimensional Linear Systems

    Institute of Scientific and Technical Information of China (English)

    杨开红; 季海波

    2015-01-01

    近年来,一种基于系统层次结构的分层控制方法发展了起来,它主要针对的是高阶复杂系统。为了分析和控制这类系统,我们首先根据需要构建一个合适的低阶抽象系统,然后在此基础上分析和设计原始系统控制律,即所谓的接口函数。本文将此方法用于一类高阶线性系统的稳定控制问题,并得到了相应的控制律。最后,算例部分的仿真结果说明了这种方法的有效性。%Recently, the hierarchical control method based on a hierarchical architecture has been developed, which is mainly aimed at large-scale complex systems. In order to analyze and control this class of systems, we at first, construct an appropri-ate and low-dimensional abstract system, then synthesize and lift the control law from the obtained abstraction of the original system by the notion of interface function. This paper studies the stable control problem of a class of high-dimensional linear systems and obtains the results by employing the hierarchical control method. Finally, a simulation example is given to illus-trate the effectiveness of this method.

  4. 77 FR 26789 - Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and...

    Science.gov (United States)

    2012-05-07

    ... From the Federal Register Online via the Government Publishing Office ] INTERNATIONAL TRADE COMMISSION Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and Products Containing Same; Determination Rescinding the Exclusion Order and Cease and Desist Orders...

  5. Role-Based Access Control for the Large Hadron Collider at CERN

    CERN Document Server

    Yastrebov, I

    2010-01-01

    Large Hadron Collider (LHC) is the largest scientific instrument ever created. It was built with the intention of testing the most extreme conditions of the matter. Taking into account the significant dangers of LHC operations, European Organization for Nuclear Research (CERN) has developed multi-pronged approach for machine safety, including access control system. This system is based on role-based access control (RBAC) concept. It was designed to protect from accidental and unauthorized access to the LHC and injector equipment. This paper introduces the new model of the role-based access control developed at CERN and gives detailed mathematical description of it. We propose a new technique called dynamic authorization that allows deploying RBAC gradually in the large systems. Moreover, we show how the protection for the very large distributed equipment control system may be implemented in efficient way. This paper also describes motivation of the project, requirements and overview of the main components: au...

  6. The Design of the M-B-Quadro Optical Switch and Its Access Control Strategies

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    This paper proposes a new simple contention resolution switching architecture, M-B-Quadro, and its underlying access control strategies. By incorporating delay and buffer lines, the switching node can effectively obtain very low packet deflection probability.

  7. Distributed Medium Access Control with SDMA Support for WLANs

    Science.gov (United States)

    Zhou, Sheng; Niu, Zhisheng

    With simultaneous multi-user transmissions, spatial division multiple access (SDMA) provides substantial throughput gain over the single user transmission. However, its implementation in WLANs with contention-based IEEE 802.11 MAC remains challenging. Problems such as coordinating and synchronizing the multiple users need to be solved in a distributed way. In this paper, we propose a distributed MAC protocol for WLANs with SDMA support. A dual-mode CTS responding mechanism is designed to accomplish the channel estimation and user synchronization required for SDMA. We analytically study the throughput performance of the proposed MAC, and dynamic parameter adjustment is designed to enhance the protocol efficiency. In addition, the proposed MAC protocol does not rely on specific physical layer realizations, and can work on legacy IEEE 802.11 equipment with slight software updates. Simulation results show that the proposed MAC outperforms IEEE 802.11 significantly, and that the dynamic parameter adjustment can effectively track the load variation in the network.

  8. Access Control in the ATLAS TDAQ Online Cluster

    CERN Document Server

    Leahu, Marius Constantin; Stoichescu, D A; Lehmann Miotto, G

    ATLAS (A Toroidal LHC Apparatus) is a general-purpose detector for studying high-energy particle interactions: it is the largest particle detector experiment at CERN and it is built around one of the interaction points of the proton beams accelerated by the Large Hadron Collider (LHC). The detector generates an impressive amount of raw data: 64 TB per second as a result of 40 MHz proton-proton collision rate with 1.6 MB data for each such event. The handling of such data rate is managed by a three levels Trigger and Data Acquisition (TDAQ) system, which filters out the events not relevant from physics research point of view and selects in the end in the order of 1000 events per second to be stored for offline analyses. This system comprises a significant number of hardware devices, software applications and human personnel to supervise the experiment operation. Their protection against damages as a result of misuse and their optimized exploitation by avoiding the conflicting accesses to resources are key requ...

  9. Smart packet access and call admission control for efficient resource management in advanced wireless networks

    OpenAIRE

    Phan, V. V. (Vinh V.)

    2005-01-01

    Abstract Efficient management of rather limited resources, including radio spectrum and mobile-terminal battery power, has been the fundamental design challenge of wireless networks and one of the most widespread research problems over the years. MAC (Medium Access Control) for packet access and CAC (Call Admission Control) for connection-oriented service domains are commonly used as effective tools to manage radio resources, capacity and performance of wireless networks while providing ad...

  10. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  11. Controllable synthesis of hierarchical MnOx/TiO2 composite nanofibers for complete oxidation of low-concentration acetone.

    Science.gov (United States)

    Zhu, Xuecheng; Zhang, Shuo; Yu, Xinning; Zhu, Xinbo; Zheng, Chenghang; Gao, Xiang; Luo, Zhongyang; Cen, Kefa

    2017-09-05

    A novel hierarchical MnOx/TiO2 composite nanofiber was fabricated by combining the electrospinning technique and hydrothermal growth method. The synthesized nanomaterial, which comprised primary TiO2 nanofibers and secondary MnOx nanoneedles, was further investigated for complete catalytic oxidation of volatile organic compounds for the first time, and this presented high-oxidation performance on low-concentration acetone. The morphological, structural, physicochemical characterization, and catalytic performance analyses demonstrated that the highest catalytic activity was achieved from the obtained MnOx/TiO2 nanofiber catalyst with 30wt.% manganese loading. This finding can be ascribed to the synergistic effect of the specific hierarchical nanofibrous morphology, the abundant surface-adsorbed oxygen, the superior redox property, and the sufficient specific surface. Copyright © 2017. Published by Elsevier B.V.

  12. Springfield Processing Plant* (A Hypothetical Facility) SPP, Entry Control Point and Vehicle Gate Access Control Post Order

    Energy Technology Data Exchange (ETDEWEB)

    Baum, Gregory A. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2014-06-01

    This hypothetical order provides the requirements and instructions for the Springfield Processing Plant (SPP) Vehicle Gate and Entry Control Point (ECP) in the perimeter access building. The purpose of this post is to prevent the theft, sabotage or diversion of nuclear material (NM), control access and exit at the protected area, and to respond to emergencies according the SPP Guard Force (GF) Contingency Plan and as directed by a Guard Force Supervisor.

  13. TEMPORAL, DELEGABLE AND CHEAP UPDATE ACCESS CONTROL TO PUBLISHED XML DOCUMENTS

    Directory of Open Access Journals (Sweden)

    Waleed Halboob

    2013-01-01

    Full Text Available Providing access control for published XML documents on the Web is an important topic. It involves the use of cryptographic techniques, addressing different requirements and, as a result, facing several challenges. Existing solutions still have some weaknesses such as system update cost, number of required secret encryption/decryption keys, size of encrypted document and supporting temporal and delegable access. This study propose a push--based access control policy enforcement mechanism for addressing these issues using a Dynamic Key Management Table (DKMT and based on Identity Based Encryption (IBE. The proposed mechanism addresses the existing challenges and provides a more acceptable solution.

  14. Unifying the Access Control Mechanism for the Enterprises Using XACML Policy Levels

    Directory of Open Access Journals (Sweden)

    N. Senthil Kumar

    2015-11-01

    Full Text Available —Many enterprises have intended to promote their applications with stern access control mechanism and yield the stringent authorization deployment in their individual proprietary manner. The development of this build up will result in tight coupling of authorization mechanisms within the enterprise applications. In many enterprises setup, the implicit authorization processes are embedded within the application and promote error prone accessing of requested policies. This sort of embedded authorization will let the users to carry out the specific actions without knowing the access control policy as well as its embedded setup with the help of third party involvement. But this approach has some serious effects in controlling the issues such as skipping the trust based applications, violates the policy setups and pave the way to exploit the authorized data to the end users. Many enterprises had faced serious problem in controlling its sensitive data from this implicit authorization decisions and hence decided to develop a security mechanism which can be totally controlled by centralized way of access policy. Therefore, the eXtensible Access Control Markup Language (XACML provides a very simple and powerful remedy for authorization mechanism and for the access policy set ups.

  15. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2011-06-30

    ... COMMISSION 17 CFR Part 240 RIN 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access... establish, document, and maintain a system of risk management controls and supervisory procedures that... develop, test, and implement the relevant risk management controls and supervisory procedures...

  16. Cognitive Control and Lexical Access in Younger and Older Bilinguals

    Science.gov (United States)

    Bialystok, Ellen; Craik, Fergus; Luk, Gigi

    2008-01-01

    Ninety-six participants, who were younger (20 years) or older (68 years) adults and either monolingual or bilingual, completed tasks assessing working memory, lexical retrieval, and executive control. Younger participants performed most of the tasks better than older participants, confirming the effect of aging on these processes. The effect of…

  17. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...

  18. Hierarchical Control Strategy of Heat and Power for Zero Energy Buildings including Hybrid Fuel Cell/Photovoltaic Power Sources and Plug-in Electric Vehicle

    DEFF Research Database (Denmark)

    Ghiasi, Mohammad Iman; Aliakbar Golkar, Masoud; Hajizadeh, Amin

    2016-01-01

    complexities and uncertainties in this kind of hybrid system, a hybrid supervisory control with an adaptive fuzzy sliding power control strategy is proposed to regulate the amount of requested fuel from a fuel cell power source to produce the electrical power and heat. Then, simulation results are used......This paper presents a hierarchical control strategy for heat and electric power control of a building integrating hybrid renewable power sources including photovoltaic, fuel cell and battery energy storage with Plug-in Electric Vehicles (PEV) in smart distribution systems. Because...... of the controllability of fuel cell power, this power sources plays the main role for providing heat and electric power to zero emission buildings. First, the power flow structure between hybrid power resources is described. To do so, all necessary electrical and thermal equations are investigated. Next, due to the many...

  19. Hierarchical Control Strategy of Heat and Power for Zero Energy Buildings including Hybrid Fuel Cell/Photovoltaic Power Sources and Plug-in Electric Vehicle

    DEFF Research Database (Denmark)

    Ghiasi, Mohammad Iman; Aliakbar Golkar, Masoud; Hajizadeh, Amin

    2016-01-01

    This paper presents a hierarchical control strategy for heat and electric power control of a building integrating hybrid renewable power sources including photovoltaic, fuel cell and battery energy storage with Plug-in Electric Vehicles (PEV) in smart distribution systems. Because...... of the controllability of fuel cell power, this power sources plays the main role for providing heat and electric power to zero emission buildings. First, the power flow structure between hybrid power resources is described. To do so, all necessary electrical and thermal equations are investigated. Next, due to the many...... complexities and uncertainties in this kind of hybrid system, a hybrid supervisory control with an adaptive fuzzy sliding power control strategy is proposed to regulate the amount of requested fuel from a fuel cell power source to produce the electrical power and heat. Then, simulation results are used...

  20. A Security Architecture for Data Aggregation and Access Control in Smart Grids

    CERN Document Server

    Ruj, Sushmita; Stojmenovic, Ivan

    2011-01-01

    We propose an integrated architecture for smart grids, that supports data aggregation and access control. Data can be aggregated by home area network, building area network and neighboring area network in such a way that the privacy of customers is protected. We use homomorphic encryption technique to achieve this. The consumer data that is collected is sent to the substations where it is monitored by remote terminal units (RTU). The proposed access control mechanism gives selective access to consumer data stored in data repositories and used by different smart grid users. Users can be maintenance units, utility centers, pricing estimator units or analyzing and prediction groups. We solve this problem of access control using cryptographic technique of attribute-based encryption. RTUs and users have attributes and cryptographic keys distributed by several key distribution centers (KDC). RTUs send data encrypted under a set of attributes. Users can decrypt information provided they have valid attributes. The ac...

  1. DESIGN AND IMPLEMENTATION OF ROLE BASE ACCESS CONTROL SYSTEM FOR NETWORK RESOURCES

    Directory of Open Access Journals (Sweden)

    S.R. Kodituwakku

    2010-11-01

    Full Text Available Role Based Access Control is very useful for providing a high level description of access control for organizational applications. This paper proposes a role based framework that deals with security problems in an intranet environment. The proposed framework protects intranet resources from unauthorized users. The salient feature of the framework is that it allows intranet users to access only authorized resources. It consists of two kinds of role hierarchies: global role hierarchy and local role hierarchy, and two levels of permissions: server permission and object permission. They simplify the way of structuring authority and responsibility in the whole intranet and the allocation of privileges for different objects within a particular server. The proposed framework is implemented over Windows platform and tested for the validity. The test results indicated that it can successfully be used to control accessing network objects.

  2. Generalized access control strategies for integrated services token passing systems

    Science.gov (United States)

    Pang, Joseph W. M.; Tobagi, Fouad A.; Boyd, Stephen

    1994-08-01

    The demand for integrated services local area networks is increasing at a rapid pace with the advent of many new and exciting applications: office and factory automation, distributed computing, and multimedia communications. To support these new applications, it is imperative to integrate traffic with diverse statistical characteristics and differing delay requirements on the same network. An attractive approach for integrating traffic has been adopted in two token passing local area network standards, the IEEE 802.4 token bus standard and FDDI. The idea is to control the transmissions of each station based on a distributed timing algorithm, so as to achieve the following goals: (1) to limit the token cycles so that time-critical traffic can be accommodated, and (2) to allocate pre-specified bandwidths to different stations when the network is overloaded. We have investigated the analysis and design of this protocol. In this paper, we generalize the transmission control algorithm used previously. The major advantages of the generalization over the original protocol are: (1) it provides a much expanded design space, (2) it guarantees convergent behavior, and (3) it gives meaningful insights into the dynamics of the basic control algorithm.

  3. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  4. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

    Directory of Open Access Journals (Sweden)

    Mang Su

    2014-01-01

    Full Text Available This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.

  5. TRBAC:基于信任的访问控制模型%TRBAC: Trust Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    刘武; 段海新; 张洪; 任萍; 吴建平

    2011-01-01

    访问控制是根据网络用户的身份或属性,对该用户执行某些操作或访问某些网络资源进行控制的过程.对现有访问控制模型进行分析,并针对其不足对RBAC模型进行了扩展,提出了基于信任的访问控制模型TRBAC(trust based access control model).该模型可以提供更加安全、灵活以及细粒度的动态访问授权机制,从而提高授权机制的安全性与可靠性.%Access control is a process which controls users to execute some operations or access some network resources according to the users' identity or attribution. The discretionary access control and mandatory access control are two main access control modes which are broadly used in secure operating systems. Discretionary access control is based on user identity and/or groups and mandatory access control is usually based on sensitivity labels. Neither of these two modes can completely satisfy the requirements of all access control. Discretionary access control is too loose to restrict the propagation of privileges while mandatory access control is too rigid to use flexibly. This paper analyzes current access control models, and extends the RBAC (role based access control) model aiming at its deficiency, and based on which we propose a trust based access control model (TRBAC). The TRBAC model can provide more security, flexible and fine-grained dynamic access control mechanism, and therefore improve both the security and the reliability of authorization mechanism.

  6. ACAFD: Secure and Scalable Access Control with Assured File Deletion for Outsourced Data in Cloud

    Directory of Open Access Journals (Sweden)

    Sudha Senthilkumar

    2014-11-01

    Full Text Available Cloud storage has emerged as a popular paradigm to outsource data to third party and share it with the collaborators. While this new paradigm enables users to outsource their sensitive data and reduces data management costs, it brings forth the new challenges to the user to keep their data secure. Data storage security and access control in the cloud is one of the challenging ongoing research works to alleviate the data leakage problem from unauthorized users. Existing solutions that use pure cryptographic techniques suffers from heavy computation work with respect to key management and key distribution.  Attribute based encryption is an alternative solution that map the user access structure with the data file attributes to control the data access. However any of the existing schemes doesn’t address the access control with assured deletion of the files upon revocation of user access. This article addresses this open issue using a trusted authority that manages the access control list and takes care of key management and key distribution and file deletion upon user revocation. The prototype of model has been presented and analyzed the security features over existing scheme.

  7. Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon

    Control (MAC) protocols that are following the receiver-initiated paradigm of asynchronous communication. According to the receiver-initiated paradigm the communication is initiated by the receiver that states its availability to receive data through beacons. The sender is passively listening...... to the channel until it receives the beacon of interest. In this context, the dissertation begins with an in-depth survey of all the receiverinitiated MAC protocols and presents their unique optimization features, which deal with several challenges of the link layer such as mitigation of the energy consumption......-efficient features that aim to adapt the consumed energy to match the harvested energy, distribute the load with respect to the harvested energy, decrease the overhead of the communication, address the requirements for collision avoidance, prioritize urgent traffic and secure the system against beacon replay attacks...

  8. Distributed Random Access Algorithm: Scheduling and Congesion Control

    CERN Document Server

    Jiang, Libin; Shin, Jinwoo; Walrand, Jean

    2009-01-01

    This paper provides proofs of the rate stability, Harris recurrence, and epsilon-optimality of CSMA algorithms where the backoff parameter of each node is based on its backlog. These algorithms require only local information and are easy to implement. The setup is a network of wireless nodes with a fixed conflict graph that identifies pairs of nodes whose simultaneous transmissions conflict. The paper studies two algorithms. The first algorithm schedules transmissions to keep up with given arrival rates of packets. The second algorithm controls the arrivals in addition to the scheduling and attempts to maximize the sum of the utilities of the flows of packets at the different nodes. For the first algorithm, the paper proves rate stability for strictly feasible arrival rates and also Harris recurrence of the queues. For the second algorithm, the paper proves the epsilon-optimality. Both algorithms operate with strictly local information in the case of decreasing step sizes, and operate with the additional info...

  9. Hierarchical nitrogen and cobalt co-doped TiO{sub 2} prepared by an interface-controlled self-aggregation process

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Shishuai; Li, Qiang; Hou, Chengcheng; Feng, Xiaodong; Guan, Zisheng, E-mail: zishengguan@163.com

    2013-10-25

    Highlights: •N–Co-codoped TiO{sub 2} was prepared by hydrothermal method at vapor–liquid interface. •Hierarchical N–Co-codoped TiO{sub 2} was synthesized. •Growth mechanism of N–Co-codoped TiO{sub 2} was discussed. •Ferromagnetism was found on the titanate N–Co-codoped TiO{sub 2} at room temperature. •Light absorption edge of N–Co-codoped TiO{sub 2} was shifted to visible light region. -- Abstract: Hierarchical N and Co co-doped TiO{sub 2} (NCT) self-aggregates were prepared by the interfacial self-aggregation in an autoclave, where a mixed Ti(SO{sub 4}){sub 2} and Co(NO{sub 3}){sub 2} solution reacted with polyacrylate-controlled-releasing ammonia at the vapor–liquid interface. The SEM images show that the typical hierarchical NCT self-aggregates were composed of perpendicular nanosheets on the top, granule aggregates in the middle, and flower-like nanosheets at the bottom. A possible mechanism of their formation has been proposed on the basis of a series of experiments. We found that the morphology and crystal structure of the NCT self-aggregates can be controlled by adjusting reaction temperature, reaction time, and the amount of ammonia solution. The demonstration of hysteresis loops in the magnetization curves indicates that the NCT self-aggregate samples prepared at 150 °C were ferromagnetic at room temperature. The absorption spectra of the samples prepared at 150 °C showed evident absorption in the visible region. These NCT self-aggregates may be potentially useful in photoelectrochemical and magneto-electronic applications.

  10. A Traffic Forecasting Method with Function to Control Residual Error Distribution for IP Access Networks

    Science.gov (United States)

    Kitahara, Takeshi; Furuya, Hiroki; Nakamura, Hajime

    Since traffic in IP access networks is less aggregated than in backbone networks, its variance could be significant and its distribution may be long-tailed rather than Gaussian in nature. Such characteristics make it difficult to forecast traffic volume in IP access networks for appropriate capacity planning. This paper proposes a traffic forecasting method that includes a function to control residual error distribution in IP access networks. The objective of the proposed method is to grasp the statistical characteristics of peak traffic variations, while conventional methods focus on average rather than peak values. In the proposed method, a neural network model is built recursively while weighting residual errors around the peaks. This enables network operators to control the trade-off between underestimation and overestimation errors according to their planning policy. Evaluation with a total of 136 daily traffic volume data sequences measured in actual IP access networks demonstrates the performance of the proposed method.

  11. Embedded real-time control of optically amplified repeaters in broadband access networks

    Science.gov (United States)

    Stubbe, Brecht; Vaes, Peter; Gouwy, Lieven; Coene, Chris; Qiu, Xing-Zhi; Staelens, Bart; Vandewege, Jan; Slabbinck, B. Hans; Martin, Claire M.; Van de Voorde, Ingrid

    1997-10-01

    This paper presents the use of distributed, intelligent control and management in optically amplified repeaters. These optical repeater units (ORUs) are used in an optical access network. A semiconductor optical amplifier (SOA) has been used in the upstream direction because of the possibility of fast switching. The real time control platform consists of both a hard- and a software part. The software control is handled with the embedded control system FORTRESS developed by IMEC.

  12. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  13. A hybrid medium access control for convergence of broadband wireless and wireline ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    2000-01-01

    of contention, reservation and polling access techniques based on the dynamic TDMA system. Extensive simulation results using realistic data traffic sources, show that the proposed medium access scheme may provide QoS guarantees to different ATM traffic including the realistic MPEG video traces with low cell......In this paper, we propose a hybrid medium access control protocol for supporting broadband integrated services in the wireless ATM networks. The integrated services include CBR, VBR and ABR traffic varying from low bit-rate to very high bit-rate. The proposed protocol is an excellent compromise...

  14. Steganography-based access control to medical data hidden in electrocardiogram.

    Science.gov (United States)

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data.

  15. Fertility Effects of Abortion and Birth Control Pill Access for Minors

    OpenAIRE

    GULDI, MELANIE

    2008-01-01

    This article empirically assesses whether age-restricted access to abortion and the birth control pill influence minors’ fertility in the United States. There is not a strong consensus in previous literature regarding the relationship between laws restricting minors’ access to abortion and minors’ birthrates. This is the first study to recognize that state laws in place prior to the 1973 Roe v. Wade decision enabled minors to legally consent to surgical treatment—including abortion—in some st...

  16. Exploration on Access Control Policies of the Internet of Things%物联网访问控制策略探析

    Institute of Scientific and Technical Information of China (English)

    罗洪; 杨杰

    2014-01-01

    With the rapid development of computer technology, the security of the Internet of Things will increasingly attract the attention of people. Based on the hierarchical structure of the Internet of Things, analyses the security requirements of each layer ,and puts forward some sug-gestions for access control policies of the Internet of Things.%随着计算机技术的快速发展,各种物联网应用在人们生活中越来越多,因而物联网安全问题也更加引人关注。针对物联网安全中的访问控制问题,分析物联网分层结构中各层的安全需求,给出联网的环境下的访问控制策略供参考。

  17. Access to the Birth Control Pill and the Career Plans of Young Men and Women

    DEFF Research Database (Denmark)

    Steingrimsdottir, Herdis

    The paper explores the effect of unrestricted access to the birth control pill on young people’s career plans, using annual surveys of college freshmen from 1968 to 1980. In particular it addresses the question of who was affected by the introduction of the birth control pill by looking at career...

  18. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  19. Hierarchical modeling and analysis for spatial data

    CERN Document Server

    Banerjee, Sudipto; Gelfand, Alan E

    2003-01-01

    Among the many uses of hierarchical modeling, their application to the statistical analysis of spatial and spatio-temporal data from areas such as epidemiology And environmental science has proven particularly fruitful. Yet to date, the few books that address the subject have been either too narrowly focused on specific aspects of spatial analysis, or written at a level often inaccessible to those lacking a strong background in mathematical statistics.Hierarchical Modeling and Analysis for Spatial Data is the first accessible, self-contained treatment of hierarchical methods, modeling, and dat

  20. MAAC: a software tool for user authentication and access control to the electronic patient record in an open distributed environment

    Science.gov (United States)

    Motta, Gustavo H.; Furuie, Sergio S.

    2004-04-01

    Designing proper models for authorization and access control for the electronic patient record (EPR) is essential to wide scale use of the EPR in large health organizations. This work presents MAAC (Middleware for Authentication and Access Control), a tool that implements a contextual role-based access control (RBAC) authorization model. RBAC regulates user"s access to computers resources based on their organizational roles. A contextual authorization uses environmental information available at access-request time, like user/patient relationship, in order to decide whether a user has the right to access an EPR resource. The software architecture where MAAC is implemented uses Lightweight Directory Access Protocol, Java programming language and the CORBA/OMG standards CORBA Security Service and Resource Access Decision Facility. With those open and distributed standards, heterogeneous EPR components can request user authentication and access authorization services in a unified and consistent fashion across multiple platforms.

  1. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  2. Enhancing Data Security and Access Control in Cloud Environment using Modified Attribute Based Encryption Mechanism

    Directory of Open Access Journals (Sweden)

    Apurva R. Naik

    2016-10-01

    Full Text Available Social networking and growing popularity of cloud services have made everyone to communicate each other in an easiest way. File sharing and distribution are the frequently used services provided by cloud service providers, although these facilities reduce cost of data sharing but at the same time data security and access control is the major problem. Many renowned service providers have faced the challenges to secure data and provide better access control, and we know once the data is leaked we cannot recover the data loss. Thus in order to ensure better security we need for focus on the two major problems, and those are access control and encryption policy. Cipher text policy attribute based encryption is the most effective solution for access control in real time scenarios where owner can actually decide the access rights for the end-user, but it comes with key escrow problem. We are proposing our modified escrow-free key issuing protocol to solve the problem of key escrow and our Modified Attribute Based Encryption scheme to achieve all security requirements to get a robust and secure system. Further we evaluate our model on the basis of results and lastly we conclude the paper.

  3. Network Access Control for Location-Based Mobile Services in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Dae-Young Kim

    2017-01-01

    Full Text Available Recent advances in information communication technology and software have enabled mobile terminals to employ various capabilities as a smartphone. They adopt multiple interfaces for wireless communication and run as a portable computer. Mobile services are also transferred from voice to data. Mobile terminals can access Internet for data services anytime anywhere. By using location-based information, improved mobile services are enabled in heterogeneous networks. In the mobile service environment, it is required that mobile terminals should efficiently use wireless network resources. In addition, because video stream becomes a major service among the data services of mobile terminals in heterogeneous networks, the necessity of the efficient network access control for heterogeneous wireless networks is raised as an important topic. That is, quality of services of the location-based video stream is determined by the network access control. Therefore, this paper proposes a novel network access control in the heterogeneous wireless networks. The proposed method estimates the network status with Naïve Bayesian Classifier and performs network access control according to the estimated network status. Thus, it improves data transmission efficiency to satisfy the quality of services. The efficiency of the proposed method is validated through the extensive computer simulation.

  4. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned......Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... attacks. The protocol evaluation by using security protocol verification tool shows that IECAC is secure against these attacks. This paper also discusses performance analysis of the protocol in terms of computational time and compared with other existing solutions....

  5. A Novel Digital Certificate Based Remote Data Access Control Scheme in WSN

    Directory of Open Access Journals (Sweden)

    Wei Liang

    2015-01-01

    Full Text Available A digital certificate based remote data access control scheme is proposed for safe authentication of accessor in wireless sensor network (WSN. The scheme is founded on the access control scheme on the basis of characteristic expression (named CEB scheme. Data is divided by characteristics and the key for encryption is related to characteristic expression. Only the key matching with characteristic expression can decrypt the data. Meanwhile, three distributed certificate detection methods are designed to prevent the certificate from being misappropriated by hostile anonymous users. When a user starts query, the key access control method can judge whether the query is valid. In this case, the scheme can achieve public certificate of users and effectively protect query privacy as well. The security analysis and experiments show that the proposed scheme is superior in communication overhead, storage overhead, and detection probability.

  6. A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure

    Institute of Scientific and Technical Information of China (English)

    ZHANG Shaomin; WANG Baoyi; ZHOU Lihua

    2006-01-01

    PMI(privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC(Role-based Access Control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is described in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.

  7. Distributed Access Control Based on Proxy Signature in M2M Sensor Networks

    Directory of Open Access Journals (Sweden)

    Lingyu Lee

    2013-05-01

    Full Text Available In this study, we have a research of the distributed access control based on proxy signature in M2M sensor networks M2M sensor networks. As M2M sensor networks are usually deployed in hostile environment, the global communication security of M2M sensor networks is and will continue to be a major concern. Although there are many related works on access control in WSNs (Wireless Sensor Networks, Ad-hoc networks, MANETs (Mobile Ad-hoc Networks and etc., they cannot be applied to M2M sensor networks directly. Motivated by this consideration, we develop a secure and distributed access control scheme based on proxy signature for M2M sensor networks, which provides strong authentication and achieves efficiency. Moreover, security of the proposed technique does not rely on availability of a secure channel.

  8. Automating Access Control Logics in Simple Type Theory with LEO-II (Techreport)

    CERN Document Server

    Benzmueller, Christoph

    2009-01-01

    Garg and Abadi recently proved that prominent access control logics can be translated in a sound and complete way into modal logic S4. We have previously outlined how normal multimodal logics, including monomodal logics K and S4, can be embedded in simple type theory (which is also known as higher-order logic) and we have demonstrated that the higher-order theorem prover LEO-II can automate reasoning in and about them. In this paper we combine these results and describe a sound and complete embedding of different access control logics in simple type theory. Employing this framework we show that the off the shelf theorem prover LEO-II can be applied to automate reasoning in prominent access control logics.

  9. Traffic Adaptive Energy Efficient and Low Latency Medium Access Control for Wireless Sensor Networks

    Science.gov (United States)

    Yadav, Rajesh; Varma, Shirshu; Malaviya, N.

    2008-05-01

    Medium access control for wireless sensor networks has been a very active research area in the recent years. The traditional wireless medium access control protocol such as IEEE 802.11 is not suitable for the sensor network application because these are battery powered. The recharging of these sensor nodes is expensive and also not possible. The most of the literature in the medium access for the sensor network focuses on the energy efficiency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control packet overhead and overhearing taking nodes latency into consideration based on the network traffic. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach. The validation of the simulation results of the proposed MAC has been done by comparing it with the analytical model. This protocol has been simulated in Network Simulator ns-2.

  10. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  11. Hierarchical Network Design

    DEFF Research Database (Denmark)

    Thomadsen, Tommy

    2005-01-01

    of different types of hierarchical networks. This is supplemented by a review of ring network design problems and a presentation of a model allowing for modeling most hierarchical networks. We use methods based on linear programming to design the hierarchical networks. Thus, a brief introduction to the various....... The thesis investigates models for hierarchical network design and methods used to design such networks. In addition, ring network design is considered, since ring networks commonly appear in the design of hierarchical networks. The thesis introduces hierarchical networks, including a classification scheme...... linear programming based methods is included. The thesis is thus suitable as a foundation for study of design of hierarchical networks. The major contribution of the thesis consists of seven papers which are included in the appendix. The papers address hierarchical network design and/or ring network...

  12. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far'few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces correaponding formal rules, rulebased reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally,the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-ori-ented product data management (PDM) system.

  13. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces corresponding formal rules, rule-based reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally, the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-oriented product data management (PDM) system.

  14. Virus spreading in wireless sensor networks with a medium access control mechanism

    Institute of Scientific and Technical Information of China (English)

    Wang Ya-Qi; Yang Xiao-Yuan

    2013-01-01

    In this paper,an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks.Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks,which has been ignored in previous studies.It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes.The theoretical results are confirmed by numerical simulations.

  15. Hierarchical Multiagent Reinforcement Learning

    Science.gov (United States)

    2004-01-25

    In this paper, we investigate the use of hierarchical reinforcement learning (HRL) to speed up the acquisition of cooperative multiagent tasks. We...introduce a hierarchical multiagent reinforcement learning (RL) framework and propose a hierarchical multiagent RL algorithm called Cooperative HRL. In

  16. A Model of Hierarchical Key Assignment Scheme

    Institute of Scientific and Technical Information of China (English)

    ZHANG Zhigang; ZHAO Jing; XU Maozhi

    2006-01-01

    A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme will be defined in this paper. Also, our scheme model will meet this property.

  17. Optimum feedback strategy for access control mechanism modelled as stochastic differential equation in computer network

    Directory of Open Access Journals (Sweden)

    Ahmed N. U.

    2004-01-01

    Full Text Available We consider optimum feedback control strategy for computer communication network, in particular, the access control mechanism. The dynamic model representing the source and the access control system is described by a system of stochastic differential equations developed in our previous works. Simulated annealing (SA was used to optimize the parameters of the control law based on neural network. This technique was found to be computationally intensive. In this paper, we have proposed to use a more powerful algorithm known as recursive random search (RRS. By using this technique, we have been able to reduce the computation time by a factor of five without compromising the optimality. This is very important for optimization of high-dimensional systems serving a large number of aggregate users. The results show that the proposed control law can improve the network performance by improving throughput, reducing multiplexor and TB losses, and relaxing, not avoiding, congestion.

  18. Mechanism and control of the structural evolution of a polymer solar cell from a bulk heterojunction to a thermally unstable hierarchical structure.

    Science.gov (United States)

    Chen, Charn-Ying; Tsao, Cheng-Si; Huang, Yu-Ching; Liu, Hung-Wei; Chiu, Wen-Yen; Chuang, Chih-Min; Jeng, U-Ser; Su, Chun-Jen; Wu, Wei-Ru; Su, Wei-Fang; Wang, Leeyih

    2013-08-21

    We simultaneously employed grazing incidence small-angle and wide-angle X-ray scattering (GISAXS and GIWAXS) techniques to quantitatively study the structural evolution and kinetic behavior of poly(3-hexylthiophene) (P3HT) crystallization, [6,6]-phenyl-C61-butyric acid methyl ester (PCBM) aggregation and amorphous P3HT/PCBM domains from a bulk heterojunction (BHJ) to a thermally unstable structure. The independent phase separation regimes on the nanoscale (∼10 nm), mesoscale (∼100 nm) and macroscale (∼μm) are revealed for the first time. Bis-PCBM molecules as inhibitors incorporated into the P3HT/PCBM blend films were adopted as a case study of a control strategy for improving the thermal stability of P3HT/PCBM solar cell. The detailed information on the formation, growth, transformation and mutual interaction between different phases during the hierarchical structural evolution of P3HT/PCBM:xbis-PCBM (x = 8-100%) blend films are presented herein. This systematic study proposes the mechanisms of thermal instability for a polymer/fullerene-based solar cell. We demonstrate a new fundamental concept that the structural evolution and thermal stability of mesoscale amorphous P3HT/PCBM domains during heating are the origin of controlling thermal instability rather than those of nanoscale thermally-stable BHJ structures. It leads to a low-cost and easy-fabrication control strategy for effectively tailoring the hierarchical morphology against thermal instability from molecular to macro scales. The optimum treatment achieving high thermal stability, control of mesoscale domains, can be effectively designed. It is independent of the original BHJ nanostructure design of a polymer/fullerene-based solar cell with high performance. It advances the general knowledge on the thermal instability directly arising from the nanoscale structure.

  19. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    Directory of Open Access Journals (Sweden)

    Mesay Hailu Dangisso

    2015-11-01

    Full Text Available Background: Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs and treatment outcome in the Sidama Zone, southern Ethiopia. Design: We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results: Over a decade the health service coverage (the health facility–to-population ratio increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km between kebeles (the smallest administrative units and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km. In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001 and altitude (b-estimate=−0.31, p<0.001 increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001 and altitude (b-estimate=−0.30, p<0.001 were inversely associated with treatment success (proportion of treatment completed or cured cases

  20. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    Science.gov (United States)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  1. Electronic Wallet and Access Control Solution Based on RFID MiFare Cards

    Directory of Open Access Journals (Sweden)

    Stefan Victor Lefter

    2013-03-01

    Full Text Available With the advent of Radio Frequency Identification technologies or RFID for short, different types of products and security-relevant applications have been developed for use in fields and businesses like: inventory management, product tracking, access control, passports or transport fare collection. Even though RFID has been around for quite some time, there are some types of businesses like theme parks, water parks or music festivals that haven’t yet tested the benefits that this technology brings. This paper focuses on presenting advantages and disadvantages of using an unified access control and electronic wallet system based on RFID cards like MiFare tags as an alternative to existing ticket/currency access and payment systems employed by the majority of the businesses mentioned above.

  2. A test bed for the future access control system the AD Project

    CERN Document Server

    Scibile, L

    1999-01-01

    This paper describes the design, management and development of the new access control system for the Antiproton Deceleration experimental area, called the AD Project. As this project includes all the elements for the industrial evolution of the present access control system it is an ideal test bed for future access systems. The adoption of new technologies and techniques are described, and the benefits and the shortfalls are highlighted. The open redundant architecture solution, based on a PROFIBUS network and standard industrial components (HP-UNIX, Siemens S7 PLC, Siemens Industrial PC, door locks), guarantees reliability, safety and optimal integration. The project team took advantage of the Goal Directed Project Management technique and managed to define a clear and effective strategy.

  3. PRESENTATION OF MANDATORY POLICY OF ACCESS CONTROL VIA THE HARRISONRUSSO-WILLIAM’S MODEL

    Directory of Open Access Journals (Sweden)

    Korolev I. D.

    2015-03-01

    Full Text Available The accepted model of the access control is realized with the monitor of safety in the protected automated information system. Models of safety are considered, as a rule, as a system which is a single whole and has the uniform monitor of safety. Nevertheless, the architecture of the real automated information systems and processes of their functioning can be characterized by distribution. The distributed automated information system consists more than of one local segment representing isolated set of subjects and objects of access. In the distributed system local segments can be realized both on the basis of discretionary, and on the basis of mandatory models of safety (i.e. to be diverse. One of directions of a safety in this case is realization of the general monitor of the safety providing the uniform (coordinated policy of access control. For safe interaction of patchwork systems it’s necessary to bring them to a single model. Hence, while the integration of information systems the problem of their interaction becomes persistent. Thus in the systems processing the information of a various level of confidentiality, it is necessary to realize mandatory access control. In given clause the mandatory policy of the safety presented by classical model of Bell-LaPadula, is described by the elements of classical model of Harrison-Russo-William. Using the mechanisms of change of a matrix access the opportunity of assignment and change of confidentiality marks is described and the observance of safe practices within the limits of mandatory access control is analyzed. The safety of application of the given approach has been proved. The perspective direction of research has been defined

  4. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow.

    Science.gov (United States)

    Le, Xuan Hung; Doll, Terry; Barbosu, Monica; Luque, Amneris; Wang, Dongwen

    2012-12-01

    Although information access control models have been developed and applied to various applications, few of the previous works have addressed the issue of managing information access in the combined context of team collaboration and workflow. To facilitate this requirement, we have enhanced the Role-Based Access Control (RBAC) model through formulating universal constraints, defining bridging entities and contributing attributes, extending access permissions to include workflow contexts, synthesizing a role-based access delegation model to target on specific objects, and developing domain ontologies as instantiations of the general model to particular applications. We have successfully applied this model to the New York State HIV Clinical Education Initiative (CEI) project to address the specific needs of information management in collaborative processes. An initial evaluation has shown this model achieved a high level of agreement with an existing system when applied to 4576 cases (kappa=0.801). Comparing to a reference standard, the sensitivity and specificity of the enhanced RBAC model were at the level of 97-100%. These results indicate that the enhanced RBAC model can be effectively used for information access management in context of team collaboration and workflow to coordinate clinical education programs. Future research is required to incrementally develop additional types of universal constraints, to further investigate how the workflow context and access delegation can be enriched to support the various needs on information access management in collaborative processes, and to examine the generalizability of the enhanced RBAC model for other applications in clinical education, biomedical research, and patient care.

  5. An Optimal Medium Access Control with Partial Observations for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Servetto Sergio D

    2005-01-01

    Full Text Available We consider medium access control (MAC in multihop sensor networks, where only partial information about the shared medium is available to the transmitter. We model our setting as a queuing problem in which the service rate of a queue is a function of a partially observed Markov chain representing the available bandwidth, and in which the arrivals are controlled based on the partial observations so as to keep the system in a desirable mildly unstable regime. The optimal controller for this problem satisfies a separation property: we first compute a probability measure on the state space of the chain, namely the information state, then use this measure as the new state on which the control decisions are based. We give a formal description of the system considered and of its dynamics, we formalize and solve an optimal control problem, and we show numerical simulations to illustrate with concrete examples properties of the optimal control law. We show how the ergodic behavior of our queuing model is characterized by an invariant measure over all possible information states, and we construct that measure. Our results can be specifically applied for designing efficient and stable algorithms for medium access control in multiple-accessed systems, in particular for sensor networks.

  6. Socio-economic status influences blood pressure control despite equal access to care

    DEFF Research Database (Denmark)

    Paulsen, M S; Andersen, M; Munck, A P

    2012-01-01

    OBJECTIVE: Denmark has a health care system with free and equal access to care irrespective of age and socio-economic status (SES). We conducted a cross-sectional study to investigate a possible association between SES and blood pressure (BP) control of hypertensive patients treated in general...

  7. Access and control of agro-biotechnology : Bt cotton, ecological change and risk in China

    NARCIS (Netherlands)

    Ho, Peter; Zhao, Jennifer H.; Xue, Dayuan

    2009-01-01

    This article argues that if the introduction of genetically modified crops (GM crops) in developing countries is to be successful, we can and should not evade questions of access and control of technology. It implies probing into the experiences, perceptions and understanding of GM crops by the prim

  8. A Random-Walk Based Privacy-Preserving Access Control for Online Social Networks

    Directory of Open Access Journals (Sweden)

    You-sheng Zhou

    2016-02-01

    Full Text Available Online social networks are popularized with people to connect friends, share resources etc. Meanwhile, the online social networks always suffer the problem of privacy exposure. The existing methods to prevent exposure are to enforce access control provided by the social network providers or social network users. However, those enforcements are impractical since one of essential goal of social network application is to share updates freely and instantly. To better the security and availability in social network applications, a novel random walking based access control of social network is proposed in this paper. Unlike using explicit attribute based match in the existing schemes, the results from random walking are employed to securely compute L1 distance between two social network users in the presented scheme, which not only avoids the leakage of private attributes, but also enables each social network user to define access control policy independently. The experimental results show that the proposed scheme can facilitate the access control for online social network.

  9. Access and control of agro-biotechnology : Bt cotton, ecological change and risk in China

    NARCIS (Netherlands)

    Ho, Peter; Zhao, Jennifer H.; Xue, Dayuan

    2009-01-01

    This article argues that if the introduction of genetically modified crops (GM crops) in developing countries is to be successful, we can and should not evade questions of access and control of technology. It implies probing into the experiences, perceptions and understanding of GM crops by the prim

  10. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    Directory of Open Access Journals (Sweden)

    Changyu Liu

    2014-01-01

    Full Text Available We developed an online multimedia event detection (MED system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  11. Secure access control and large scale robust representation for online multimedia event detection.

    Science.gov (United States)

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  12. Policy Based Access Control in Dynamic Grid-based Collaborative Environment

    NARCIS (Netherlands)

    Y. Demchenko; L. Gommans; A. Tokmakoff; R. van Buuren

    2006-01-01

    This paper describes the design and development of a flexible, customer-driven, security infrastructure for Gridbased Collaborative Environments. The paper proposes further development of the access control model built around a service or resource provisioning agreement (e.g., an experiment or proje

  13. An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments

    Science.gov (United States)

    Zhang, Yue

    2010-01-01

    Multidomain environments where multiple organizations interoperate with each other are becoming a reality as can be seen in emerging Internet-based enterprise applications. Access control to ensure secure interoperation in such an environment is a crucial challenge. A multidomain environment can be categorized as "tightly-coupled" and…

  14. Multi-level access control in the data pipeline of the international supply chain system

    NARCIS (Netherlands)

    Pruksasri, P.; Berg, J. van den; Hofman, W.; Daskapan, S.

    2013-01-01

    The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to b

  15. Data is key: introducing the data-based access control paradigm

    NARCIS (Netherlands)

    Pieters, Wolter; Tang, Qiang

    2009-01-01

    According to the Jericho forum, the trend in information security is moving the security perimeter as close to the data as possible. In this context, we suggest the idea of data-based access control, where decryption of data is made possible by knowing enough of the data. Trust is thus based on what

  16. Benefits of Location-Based Access Control:A Literature Study

    NARCIS (Netherlands)

    Cleeff, van André; Pieters, Wolter; Wieringa, Roel

    2010-01-01

    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been inve

  17. Toward an open-access global database for mapping, control, and surveillance of neglected tropical diseases

    DEFF Research Database (Denmark)

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina

    2011-01-01

    for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken...

  18. 30 CFR 817.66 - Use of explosives: Blasting signs, warnings, and access control.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-UNDERGROUND MINING ACTIVITIES § 817.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 817.11. The operator...

  19. 30 CFR 816.66 - Use of explosives: Blasting signs, warnings, and access control.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 3 2010-07-01 2010-07-01 false Use of explosives: Blasting signs, warnings... STANDARDS-SURFACE MINING ACTIVITIES § 816.66 Use of explosives: Blasting signs, warnings, and access control. (a) Blasting signs. Blasting signs shall meet the specifications of § 816.11. The operator shall—...

  20. Hierarchical Network Design

    DEFF Research Database (Denmark)

    Thomadsen, Tommy

    2005-01-01

    Communication networks are immensely important today, since both companies and individuals use numerous services that rely on them. This thesis considers the design of hierarchical (communication) networks. Hierarchical networks consist of layers of networks and are well-suited for coping...... the clusters. The design of hierarchical networks involves clustering of nodes, hub selection, and network design, i.e. selection of links and routing of ows. Hierarchical networks have been in use for decades, but integrated design of these networks has only been considered for very special types of networks....... The thesis investigates models for hierarchical network design and methods used to design such networks. In addition, ring network design is considered, since ring networks commonly appear in the design of hierarchical networks. The thesis introduces hierarchical networks, including a classification scheme...

  1. RCT: Module 2.10, Access Control and Work Area Setup, Course 8776

    Energy Technology Data Exchange (ETDEWEB)

    Hillmer, Kurt T. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-08-11

    This course presents information on radiological work permits (RWPs), various types of postings used in radiological areas, radiological area setups, access controls, and releases of material from radiological areas. All of these are fundamental duties of RCTs. This course will prepare the student with the skills necessary for radiological control technician (RCT) qualification by passing quizzes, tests, and the RCT Comprehensive Phase 1, Unit 2 Examination (TEST 27566) and providing in-thefield skills.

  2. The rostral prefrontal cortex underlies individual differences in working memory capacity: An approach from the hierarchical model of the cognitive control.

    Science.gov (United States)

    Minamoto, Takehiro; Yaoi, Ken; Osaka, Mariko; Osaka, Naoyuki

    2015-10-01

    Neuroimaging and behavioral evidence has suggested that the lateral prefrontal cortex is involved in individual differences in working memory capacity (WMC). However, few studies have localized the neural structures that differentiate high and low WMC individuals, considering the functional architecture of the prefrontal cortex. The present study aimed to identify a frontal region that underlies individual differences from the perspective of the hierarchical architecture of the frontal cortex. By manipulating an episodic factor of cognitive control (control in selecting an appropriate task set according to a temporal context) and using a parametric modulation analysis, we found that both high- and low- WMC individuals have similar activation patterns in the premotor cortex (BA6, 8), caudal prefrontal cortex (BA44, 45), and frontopolar cortex (BA10, 11), but differed in the rostral part of the prefrontal cortex (BA46/47); high WMC individuals showed greater activation in the higher episodic control condition, whereas low WMC individuals showed reduced activation when episodic control was required. Similar patterns of activation were found in the right inferior parietal and middle/inferior temporal cortices. These results indicate that the rostral prefrontal cortex, which supports episodic cognitive control, possibly by sending a weighting signal toward the inferior parietal and middle/inferior temporal cortices that modulate saliency and sensory processing, underlies individual differences in WMC. Episodic control account, which considers the organization of the prefrontal cortex, fits well with previous findings of individual differences in WMC.

  3. Extending AAA operational model for profile-based access control in ethernet-based Neutral Access Networks

    NARCIS (Netherlands)

    Matias, J.; Jacob, E.; Demchenko, Y.; de Laat, C.; Gommans, L.; Macías López, E.M.; Bogliolo, A.; Perry, M.; Ran, M

    2010-01-01

    Neutral Access Networks (NAN) have appeared as a new model to overcome some restrictions and lack of flexibility that are present currently in broadband access networks. NAN brings new business opportunities by opening this market to new stakeholders. Although the NAN model is accepted, there are so

  4. PRODUCT LIFECYCLE OPTIMISATION OF CAR CLIMATE CONTROLS USING ANALYTICAL HIERARCHICAL PROCESS (AHP ANALYSIS AND A MULTI-OBJECTIVE GROUPING GENETIC ALGORITHM (MOGGA

    Directory of Open Access Journals (Sweden)

    MICHAEL J. LEE

    2016-01-01

    Full Text Available A product’s lifecycle performance (e.g. assembly, outsourcing, maintenance and recycling can often be improved through modularity. However, modularisation under different and often conflicting lifecycle objectives is a complex problem that will ultimately require trade-offs. This paper presents a novel multi-objective modularity optimisation framework; the application of which is illustrated through the modularisation of a car climate control system. Central to the framework is a specially designed multi-objective grouping genetic algorithm (MOGGA that is able to generate a whole range of alternative product modularisations. Scenario analysis, using the principles of the analytical hierarchical process (AHP, is then carried out to explore the solution set and choose a suitable modular architecture that optimises the product lifecycle according to the company’s strategic vision.

  5. A survey of medium access control protocols for wireless ad hoc networks

    Directory of Open Access Journals (Sweden)

    Elvio João Leonardo

    2004-01-01

    Full Text Available A number of issues distinguishes Medium Access Control (MAC protocols for wireless networks from those used in wireline systems. In addition, for ad-hoc networks, the characteristics of the radio channel, the diverse physical-layer technologies available and the range of services envisioned make it a difficult task to design an algorithm to discipline the access to the shared medium that results efficient, fair, power consumption sensitive and delay bound. This article presents the current “state-of-art” in this area, including solutions already commercially available as well as those still in study.

  6. Joint Power and Multiple Access Control for Wireless Mesh Network with Rose Projection Method

    Science.gov (United States)

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches. PMID:24883384

  7. Joint power and multiple access control for wireless mesh network with Rose projection method.

    Science.gov (United States)

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches.

  8. Media access control and resource allocation for next generation passive optical networks

    CERN Document Server

    Ansari, Nirwan

    2013-01-01

    This book focuses on various Passive optical networks (PONs)  types, including currently deployed Ethernet PON (EPON) and Gigabit PON (GPON) as well as next generation WDM PON and OFDM PON. Also this book examines the integrated optical and wireless access networks. Concentrating on two issues in these networks: media access control (MAC) and resource allocation. These two problems can greatly affect performances of PONs such as network resource utilization and QoS of end users. Finally this book will discuss various solutions to address the MAC and resource allocation issues in various PON networks.

  9. Implementation of a Cross-Layer Sensing Medium-Access Control Scheme.

    Science.gov (United States)

    Su, Yishan; Fu, Xiaomei; Han, Guangyao; Xu, Naishen; Jin, Zhigang

    2017-04-10

    In this paper, compressed sensing (CS) theory is utilized in a medium-access control (MAC) scheme for wireless sensor networks (WSNs). We propose a new, cross-layer compressed sensing medium-access control (CL CS-MAC) scheme, combining the physical layer and data link layer, where the wireless transmission in physical layer is considered as a compress process of requested packets in a data link layer according to compressed sensing (CS) theory. We first introduced using compressive complex requests to identify the exact active sensor nodes, which makes the scheme more efficient. Moreover, because the reconstruction process is executed in a complex field of a physical layer, where no bit and frame synchronizations are needed, the asynchronous and random requests scheme can be implemented without synchronization payload. We set up a testbed based on software-defined radio (SDR) to implement the proposed CL CS-MAC scheme practically and to demonstrate the validation. For large-scale WSNs, the simulation results show that the proposed CL CS-MAC scheme provides higher throughput and robustness than the carrier sense multiple access (CSMA) and compressed sensing medium-access control (CS-MAC) schemes.

  10. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  11. Secured Resource Sharing in Cloud Storage using Policy based Access Control

    Directory of Open Access Journals (Sweden)

    S. Imavathy

    2015-11-01

    Full Text Available Cloud computing is a general term anything that involves delivering hosted services, Anything as a Service (AaaS, over the web on demand basis. It uses the web and central remote servers to maintain data and applications. The lack of confidence in trusting information flow(users data are usually processes remotely in unknown machines that do not owned or operated by user in cloud has become common, as users fears of losing control of their own data (like personal, professional, financial, Health. In this approach, a secured cloud storage system that achieves policy-based access control is proposed with an information accountability cloud framework to keep track of the actual usage of the clients data.The access policy generated for the file controls the file accesses and policy revocation makes the file permanently inaccessible. The system is built upon a set of cryptographic key operations that are self- maintained by a set of key managers and adds security features. The access details of the data are logged and auditing also performed.

  12. Algorithm for solving of two-level hierarchical minimax program control problem in discrete-time dynamical system with incomplete information

    Science.gov (United States)

    Shorikov, A. F.

    2016-12-01

    This article discusses the discrete-time dynamical system consisting from two controlled objects and described by a linear recurrent vector equations in the presence of uncertain perturbations. This dynamical system has two levels of a control: dominant level (the first level or the level I) and subordinate level (the second level or the level II) and both have different linear terminal criterions of functioning and united a priori by determined information and control connections. It is assumed that the sets constraining all a priori undefined parameters are known and they are a finite sets or convex, closed and bounded polyhedrons in the corresponding finite-dimensional vector spaces. For the dynamical system in question, we propose a mathematical formalization in the form of solving two-level hierarchical minimax program control problem with incomplete information. In this article for solving of the investigated problem is proposed the algorithm that has a form of a recurrent procedure of solving a linear programming and a finite optimization problems. The results obtained in this article can be used for computer simulation of an actual dynamical processes and for designing controlling and navigation systems.

  13. Optimal Medium Access Control in Cognitive Radios: A Sequential Design Approach

    CERN Document Server

    Lai, Lifeng; Jiang, Hai; Poor, H Vincent

    2008-01-01

    The design of medium access control protocols for a cognitive user wishing to opportunistically exploit frequency bands within parts of the radio spectrum having multiple bands is considered. In the scenario under consideration, the availability probability of each channel is unknown a priori to the cognitive user. Hence efficient medium access strategies must strike a balance between exploring the availability of channels and exploiting the opportunities identified thus far. Using a sequential design approach, an optimal medium access strategy is derived. To avoid the prohibitive computational complexity of this optimal strategy, a low complexity asymptotically optimal strategy is also developed. The proposed strategy does not require any prior statistical knowledge about the traffic pattern on the different channels.

  14. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani;

    2013-01-01

    This paper advocates for a new Medium Access Control (MAC) strategy for wireless meshed networks by identifying overload scenarios in order to provide additional channel access priority to the relay. The key behind our MAC protocol is that the relay will adjust its back off window size according...... to the incoming and outgoing packet ratio. We describe the new protocol as an extension to the CSMA/CA protocol and implement the protocol on our own hardware platform. By means of our own testbed, we investigate two basic network structures, namely, the two-way relay and the cross topology. It is well known...... that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over...

  15. On the Impact of information access delays on remote control of a wind turbine

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Barradas Berglind, Jose de Jesus; Madsen, Tatiana Kozlova;

    2015-01-01

    It is important to reduce the impact of renewable production in the power grid by means of control, due to increased frequency deviations and imbalances caused by these assets. Cost efficient deployment of asset control frequently results in a distributed control architecture where the controller...... is connected via a communication network to the sensors and actuators on the asset. Such a distributed control scheme may be implemented over a communication network that introduces delay and possibly also message loss. In this paper, we look at the impact of such an imperfect communication network on a wind...... by the controller to gather sensor information and and quantitatively characterize the impact of these access strategies on the controller performance...

  16. Toward an open-access global database for mapping, control, and surveillance of neglected tropical diseases

    DEFF Research Database (Denmark)

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina;

    2011-01-01

    After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark...... for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken...

  17. Hierarchical control theory and power system automation research%分层递阶控制理论与电力系统自动化研究

    Institute of Scientific and Technical Information of China (English)

    冯进兵

    2012-01-01

      随着科学技术及电力设计的发展,电力系统的自动化水平日益提高,智能控制技术在电力系统中的应用越越来越深入。本文分析了分层递阶控制理论与电力系统智能化之间的联系,以及相似的理论与实践间的相互促进关系。并在电力控制系统中引入了仿人智能控制理论,分析了职能技术在电力自动化系统中的应用。%  with the development of science and technology and design of electric power development,power system automation level increasing,intel igent control technology and its application in power system is more and more thorough.This paper analyzes the hierarchical control theory and power system intel igent connection between theory and practice,as wel as the similarity of the mutual promotion relationship.And in the power control is introduced to the system of the imitation of human intel igent control theory,analysis the function of technology in electric power automation system application.

  18. Access Control in IoT/M2M - Cloud Platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu

    and quality of life. This paradigm, which is often called Internet of Things (IoT) or Machine-to-Machine (M2M), will provide an unprecedented opportunity to create applications and services that go far beyond the mere purpose of each participant. Many studies on the both technical and social aspects of IoT...... of a system can be accessed by other parties by means of a set of access policies. For an IoT system such as Radio Frequency Identification (RFID) that collects huge amounts of RFID events data and may store it in the cloud storage for tracking purpose, access control to such data becomes a critical point...... management in RFID system is of paramount importance. A distributed cloud platform approach for the IoT/M2M, which consists of a set of IoT/M2M gateways, is introduced to cope with some inherent issues of IoT network which is highly heterogeneous and distributed in nature. As aresult, access control becomes...

  19. State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

    Directory of Open Access Journals (Sweden)

    Neetesh Saxena

    2015-10-01

    Full Text Available The smart grid (SG is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications in the smart grid network. Therefore, this paper addresses the required objectives of an authentication protocol in the smart grid network along with the focus on mutual authentication, access control, and secure integration among different SG components. We review the existing authentication protocols, and analyze mutual authentication, privacy, trust, integrity, and confidentiality of communicating information in the smart grid network. We review authentications between the communicated entities in the smart grid, such as smart appliance, smart meter, energy provider, control center (CC, and home/building/neighborhood area network gateways (GW. We also review the existing authentication schemes for the vehicle-to-grid (V2G communication network along with various available secure integration and access control schemes. We also discuss the importance of the mutual authentication among SG entities while providing confidentiality and privacy preservation, seamless integration, and required access control with lower overhead, cost, and delay. This paper will help to provide a better understanding of current authentication, authorization, and secure integration issues in the smart grid network and directions to create interest among researchers to further explore these promising areas.

  20. Distributed joint power and access control algorithm for secondary spectrum sharing

    Science.gov (United States)

    Li, Hongyan; Chen, Enqing; Fu, Hongliang

    2010-08-01

    Based on interference temperature model, the problem of efficient secondary spectrum sharing is formulated as a power optimization problem with some constraints at physical layer. These constraints and optimization objective limit a feasible power vector set which leads to the need of access control besides power control. In this paper, we consider the decentralized cognitive radio network scenario where short-term data service is required, and the problem of distributed joint power and access control is studied to maximize the total secondary system throughput, subject to Quality of Service (QoS) constraints from individual secondary users and interference temperature limit (ITL) from primary system. Firstly, a pricing-based game model was used to solve distributed power allocation optimization problem in both high and low signal to interference noise ratio (SINR) scenarios. Secondly, when not all the secondary links can be supported with their QoS requirement and ITL, a distributed joint power and access control algorithm was introduced to find the allowable links which results in maximum network throughput with all the constraints satisfied, and the convergence performance is tested by simulations.

  1. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    Science.gov (United States)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  2. 基于角色和任务的工作流访问控制管理模型%An Administrative Model for Task-Role Based on Access Control in Workflow Systems

    Institute of Scientific and Technical Information of China (English)

    张晶; 杨国林; 萨智海

    2011-01-01

    针对现有访问控制模型在工作流系统安全方面存在的不足,提出一种基于角色和任务的工作流访问控制管理模型(ATRBAC).该模型将ARBAC模型中的管理思想融入TRBAC模型,并引入管理员及管理权限,同时对管理员实行层次管理,解决了系统管理员的权限过大而产生的隐患,加强了系统的安全性.%To overcome the weaknesses of security existing in the old access control models of workflow systems,a new model called Administrative Model for Task-Role Based Access Control (ATRBAC) is presented in this paper.In this model the administrative idea of ARBAC (Administrative Model for Role Based Access Control) is integrated into the TRBAC (Task-Role Based Access Control) through adding administrator and administrative privilege.By applying hierarchical management on administrators, the hidden risk caused by the excessive privileges of system administrator is solved, and the security of workflow system is further strengthened.

  3. Hierarchical System and the Controlling in Firms%科层制度与企业内部控制

    Institute of Scientific and Technical Information of China (English)

    宋婵蓉; 徐向阳

    2011-01-01

    Moral hazard is an important reason which incurs teamwork' s low efficiency. Traditional theory holds that people who have the residual claim to exert oversight functions can settle this problem effectively, the firm is essentially a monitoring mechanism. But, in fact, in order to enable the supervisors who have activity to supervise others, we do not need to give the residual claim to the supervisors. In a team game,the principal can design a discriminatory incentives, make supervisors and supervisees ( under the supervision of the supervisor) choosing hardworking to constitute a Nash equilibrium. The hierarchical nature of the firm greatly reduces the incentive costs, and make certain cooperation which face the Prisoner's Dilemma can be achieved.%道德风险引起的搭便车是使团队效率低下的重要原因,传统理论认为让一个具有剩余索取权的人发挥监督职能将有效解决这一问题。但实际上,为使监督者有积极性监督别人,并不需要赋予监督者剩余索取权。在一个团队合作的博弈中,委托人只需采用一个歧视性的激励机制,即科层制度,使监督者和被监督者都选择努力工作构成一个纳什均衡。科层制度使得完成相同任务的代理人具有不同的收益,因此本质上是一个具有监督功能的歧视性激励机制。企业的科层性质大大减少了激励成本,并使得某些面临囚徒困境的合作得以实现。

  4. An internet of things example: classrooms access control over near field communication.

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  5. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Directory of Open Access Journals (Sweden)

    Daniel Palma

    2014-04-01

    Full Text Available The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  6. An Extension for Combination of Duty Constraints in Role-Based Access Control

    CERN Document Server

    Hosseini, Ali

    2010-01-01

    Among access control models, Role Based Access Control (RBAC) is very useful and is used in many computer systems. Static Combination of Duty (SCD) and Dynamic Combination of Duty (DCD) constraints have been introduced recently for this model to handle dependent roles. These roles must be used together and can be considered as a contrary point of conflicting roles. In this paper, we propose several new types of SCD and DCD constraints. Also, we introduce strong dependent roles and define new groups of SCD constraints for these types of roles as SCD with common items and SCD with union items. In addition, we present an extension for SCD constraints in the presence of hierarchy.

  7. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... is secure against aforementioned attacks. This paper also discusses performance analysis of the protocol in terms of computational time compared to other existing solutions. Furthermore, this paper addresses challenges in IoT and security attacks are modelled with the use cases to give an actual view of IoT......In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...

  8. Medium Access Control for Wireless Sensor Networks based on Impulse Radio Ultra Wideband

    CERN Document Server

    Berthe, Abdoulaye; Dragomirescu, Daniela; Plana, Robert

    2010-01-01

    This paper describes a detailed performance evaluation of distributed Medium Access Control (MAC) protocols for Wireless Sensor Networks based on Impulse Radio Ultra Wideband (IR-UWB) Physical layer (PHY). Two main classes of Medium Access Control protocol have been considered: Slotted and UnSlotted with reliability. The reliability is based on Automatic Repeat ReQuest (ARQ). The performance evaluation is performed using a complete Wireless Sensor Networks (WSN) simulator built on the Global Mobile Information System Simulator (GloMoSim). The optimal operating parameters are first discussed for IR-UWB in terms of slot size, retransmission delay and the number of retransmission, then a comparison between IR-UWB and other transmission techniques in terms of reliability latency and power efficiency.

  9. Proposal for the award of a contract for security and access control services

    CERN Document Server

    2005-01-01

    This document concerns the award of a contract for security and access control services. The Finance Committee is invited to agree to the negotiation of a contract with ENTREPRISE TECHNIQUE DE SECURITE (FR), the lowest bidder, for the provision of security and access control services for three years for a total amount of 7 105 750 euros (11 078 466 Swiss francs), not subject to revision until 1 July 2008, with options for additional services, for an additional amount of 192 420 euros (300 000 Swiss francs), not subject to revision until 1 July 2008, bringing the total amount to 7 298 170 euros (11 378 466 Swiss francs), not subject to revision until 1 July 2008. The contract will include options for two one-year extensions beyond the initial three-year period. The rate of exchange used is that stipulated in the tender

  10. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  11. A distributed Synchronous reservation multiple access control protocol for mobile Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yanling; SUN Xianpu; LI Jiandong

    2007-01-01

    This study proposes a new multiple access control protocol named distributed synchronous reservation multiple access control protocol.in which the hidden and exposed terminal problems are solved,and the quality of service(QoS)requirements for real-time traffic are guaranteed.The protocol is founded on time division multiplex address and a different type of traffic is assigned to difierent priority,according to which a node should compete for and reserve the free slots in a different method.Moreover,there is a reservation acknowledgement process before data transmit in each reserved slot,so that the intruded terminal problem is solved.The throughput and average packets drop probability of this protocol are analyzed and simulated in a fully connected network.the results of which indicate that this protocol is efficient enough to support the real-time traffic.and it is more suitable to MANETs.

  12. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-01-01

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733

  13. A threat intelligence framework for access control security in the oil industry

    Science.gov (United States)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  14. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  15. Quality Test Template toward Multi-user Access Control of Internet-Based System

    Directory of Open Access Journals (Sweden)

    Nan Nie

    2011-06-01

    Full Text Available Aiming at three kinds of Internet-based system quality problems, which is performance, liability and security, the paper proposes a kind of test template during multi-user login and resource access control, which includes test requirement, login script, role-resource correlating and mutation test technique. Some Internet-based systems are tested and diagnosed by automation test technique of test template. At last, system quality can be verified and improved through the realization mechanism of test template.

  16. A virtual curtain for the detection of humans and access control

    OpenAIRE

    2010-01-01

    Biometrics has become a popular field for the development of techniques that aim at recognizing humans based upon one or more intrinsic physical or behavioral traits. In particular, many solutions dedicated to access control integrate biometric features like fingerprinting or face recognition. This paper describes a new method designed to interpret what happens when crossing an invisible vertical plane, called virtual curtain hereafter, at the footstep of a door frame. It relies on the use...

  17. Towards an anonymous access control and accountability scheme for cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schäge, Sven; Schwenk, Jörg

    2010-01-01

    An important aspect of trust in cloud computing consists in preventing the cloud provider from misusing the user's data. In this work-in-progress paper, we propose the approach of data anonymization to solve this problem. As this directly leads to problems of cloud usage accounting, we also propose...... a solution for anonymous yet reliable access control and account-ability based on ring and group signatures....

  18. Request Stream Control for the Access to Broadband Multimedia Educational Resources in the Distance Learning System

    Directory of Open Access Journals (Sweden)

    Irina Pavlovna Bolodurina

    2013-10-01

    Full Text Available This article presents a model of queuing system for broadband multimedia educational resources, as well as a model of access to a hybrid cloud system storage. These models are used to enhance the efficiency of computing resources in a distance learning system. An additional OpenStack control module has been developed to achieve the distribution of request streams and balance the load between cloud nodes.

  19. GolS controls the response to gold by the hierarchical induction of Salmonella-specific genes that include a CBA efflux-coding operon.

    Science.gov (United States)

    Pontel, Lucas B; Audero, María E Pérez; Espariz, Martín; Checa, Susana K; Soncini, Fernando C

    2007-11-01

    Salmonella employs a specific set of proteins that allows it to detect the presence of gold salts in the environment and to mount the appropriate resistance response. This includes a P-type ATPase, GolT, and a small cytoplasmic metal binding protein, GolB. Their expression is controlled by a MerR-like sensor, GolS, which is highly selective for Au ions. Here, we identify a new GolS-controlled operon named gesABC which codes for a CBA efflux system, and establish its role in Au resistance. GesABC can also mediate drug resistance when induced by Au in a GolS-dependent manner, in a strain deleted in the main drug transporter acrAB. The GolS-controlled transcription of gesABC differs from the other GolS-regulated loci. It is activated by gold, but not induced by copper, even in a strain deleted of the main Cu transporter gene copA, which triggers a substantial GolS-dependent induction of golTS and golB. We demonstrate that the Au-dependent induction of gesABC transcription requires higher GolS levels than for the other members of the gol regulon. This correlates with a divergent GolS operator in the gesABC promoter. We propose that the hierarchical induction within the gol regulon allows Salmonella to cope with Au-contaminated environments.

  20. 分层递阶多模型自适应解耦控制器%Multivariable Adaptive Decoupling Controller Using Hierarchical Multiple Models

    Institute of Scientific and Technical Information of China (English)

    王昕; 李少远; 岳恒

    2005-01-01

    To solve the problem such as too many models, long computing time and so on, a hierarchical multiple models direct adaptive decoupling controller is designed. It consists of multiple levels. In the upper level, the best model is chosen according to the switching index. Then multiple fixed models are constructed on line to cover the region which the above chosen fixed model lies in.In the last level, one free-running and one re-initialized adaptive model are added to guarantee the stability and improve the transient response. By selection of the weighting polynomial matrix, it not only eliminates the steady output error and places the poles of the closed loop system arbitrarily, but also decouples the system dynamically. At last, for this multiple models switching system, global convergence is obtained under common assumptions. Compared with the conventional multiple models adaptive controller, it reduces the number of the fixed models greatly. If the same number of the fixed models is used, the system transient response and decoupling result are improved. The simulation example illustrates the power of the derived controller.