WorldWideScience

Sample records for hierarchical access control

  1. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  2. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered...... to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  3. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

  4. Hierarchical unilamellar vesicles of controlled compositional heterogeneity.

    Directory of Open Access Journals (Sweden)

    Maik Hadorn

    Full Text Available Eukaryotic life contains hierarchical vesicular architectures (i.e. organelles that are crucial for material production and trafficking, information storage and access, as well as energy production. In order to perform specific tasks, these compartments differ among each other in their membrane composition and their internal cargo and also differ from the cell membrane and the cytosol. Man-made structures that reproduce this nested architecture not only offer a deeper understanding of the functionalities and evolution of organelle-bearing eukaryotic life but also allow the engineering of novel biomimetic technologies. Here, we show the newly developed vesicle-in-water-in-oil emulsion transfer preparation technique to result in giant unilamellar vesicles internally compartmentalized by unilamellar vesicles of different membrane composition and internal cargo, i.e. hierarchical unilamellar vesicles of controlled compositional heterogeneity. The compartmentalized giant unilamellar vesicles were subsequently isolated by a separation step exploiting the heterogeneity of the membrane composition and the encapsulated cargo. Due to the controlled, efficient, and technically straightforward character of the new preparation technique, this study allows the hierarchical fabrication of compartmentalized giant unilamellar vesicles of controlled compositional heterogeneity and will ease the development of eukaryotic cell mimics that resemble their natural templates as well as the fabrication of novel multi-agent drug delivery systems for combination therapies and complex artificial microreactors.

  5. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  6. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  7. Optimizing data access for wind farm control over hierarchical communication networks

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Findrik, Mislav; Madsen, Tatiana Kozlova

    2016-01-01

    delays and also by the choice of the time instances at which sensor information is accessed. In order to optimize the latter, we introduce an information quality metric and a mathematical model based on Markov chains, which are compared performance-wise to a heuristic approach for finding this parameter......In this paper we investigate a centralized wind farm controller which runs periodically. The controller attempts to reduce the damage a wind turbine sustains during operation by estimating fatigue based on the wind turbine state. The investigation focuses on the impact of information access...

  8. Hierarchical control of electron-transfer

    DEFF Research Database (Denmark)

    Westerhoff, Hans V.; Jensen, Peter Ruhdal; Egger, Louis

    1997-01-01

    In this chapter the role of electron transfer in determining the behaviour of the ATP synthesising enzyme in E. coli is analysed. It is concluded that the latter enzyme lacks control because of special properties of the electron transfer components. These properties range from absence of a strong...... back pressure by the protonmotive force on the rate of electron transfer to hierarchical regulation of the expression of the gens that encode the electron transfer proteins as a response to changes in the bioenergetic properties of the cell.The discussion uses Hierarchical Control Analysis...

  9. Study on Mandatory Access Control in a Secure Database Management System

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper proposes a security policy model for mandatory access control in class B1 database management system whose level of labeling is tuple. The relation-hierarchical data model is extended to multilevel relation-hierarchical data model. Based on the multilevel relation-hierarchical data model, the concept of upper-lower layer relational integrity is presented after we analyze and eliminate the covert channels caused by the database integrity. Two SQL statements are extended to process polyinstantiation in the multilevel secure environment. The system is based on the multilevel relation-hierarchical data model and is capable of integratively storing and manipulating multilevel complicated objects (e. g., multilevel spatial data) and multilevel conventional data ( e. g., integer. real number and character string).

  10. Enforcing access control in virtual organizations using hierarchical attribute-based encryption

    NARCIS (Netherlands)

    Asim, M.; Ignatenko, T.; Petkovic, M.; Trivellato, D.; Zannone, N.

    2012-01-01

    Virtual organizations are dynamic, interorganizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforcement of the access control policies protecting the information exchanged in a distributed

  11. Enforcing access control in virtual organizations using hierarchical attribute-based encryption

    NARCIS (Netherlands)

    Asim, M.; Ignatenko, T.; Petkovic, M.; Trivellato, D.; Zannone, N.

    2012-01-01

    Virtual organizations are dynamic, inter-organizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforcement of the access control policies protecting the information exchanged in a distributed

  12. Dynamic control of quadruped robot with hierarchical control structure

    International Nuclear Information System (INIS)

    Wang, Yu-Zhang; Furusho, Junji; Okajima, Yosuke.

    1988-01-01

    For moving on irregular terrain, such as the inside of a nuclear power plant and outer space, it is generally recognized that the multilegged walking robot is suitable. This paper proposes a hierarchical control structure for the dynamic control of quadruped walking robots. For this purpose, we present a reduced order model which can approximate the original higher order model very well. Since this reduced order model does not require much computational time, it can be used in the real-time control of a quadruped walking robot. A hierarchical control experiment is shown in which the optimal control algorithm using a reduced order model is calculated by one microprocessor, and the other control algorithm is calculated by another microprocessor. (author)

  13. Hierarchical MAS based control strategy for microgrid

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, Z.; Li, T.; Huang, M.; Shi, J.; Yang, J.; Yu, J. [School of Information Science and Engineering, Yunnan University, Kunming 650091 (China); Xiao, Z. [School of Electrical and Electronic Engineering, Nanyang Technological University, Western Catchment Area, 639798 (Singapore); Wu, W. [Communication Branch of Yunnan Power Grid Corporation, Kunming, Yunnan 650217 (China)

    2010-09-15

    Microgrids have become a hot topic driven by the dual pressures of environmental protection concerns and the energy crisis. In this paper, a challenge for the distributed control of a modern electric grid incorporating clusters of residential microgrids is elaborated and a hierarchical multi-agent system (MAS) is proposed as a solution. The issues of how to realize the hierarchical MAS and how to improve coordination and control strategies are discussed. Based on MATLAB and ZEUS platforms, bilateral switching between grid-connected mode and island mode is performed under control of the proposed MAS to enhance and support its effectiveness. (authors)

  14. Hierarchical control of a nuclear reactor using uncertain dynamics techniques

    International Nuclear Information System (INIS)

    Rovere, L.A.; Otaduy, P.J.; Brittain, C.R.; Perez, R.B.

    1988-01-01

    Recent advances in the nonlinear optimal control area are opening new possibilities towards its implementation in process control. Algorithms for multivariate control, hierarchical decomposition, parameter tracking, model uncertainties actuator saturation effects and physical limits to state variables can be implemented on the basis of a consistent mathematical formulation. In this paper, good agreement is shown between a centralized and a hierarchical implementation of a controller for a hypothetical nuclear power plant subject to multiple demands. The performance of the hierarchical distributed system in the presence of localized subsystem failures is analyzed. 4 refs., 13 figs

  15. Hierarchical control of vehicular fuel cell / battery hybrid powertrain

    OpenAIRE

    Xu, Liangfei; Ouyang, Minggao; Li, Jianqiu; Hua, Jianfeng

    2010-01-01

    In a proton exchange membrane (PEM) fuel cell/battery hybrid vehicle, a fuel cell system fulfills the stationary power demand, and a traction battery provides the accelerating power and recycles braking energy. The entire system is coordinated by a distributed control system, incorporating three key strategies: 1) vehicle control, 2) fuel cell control and 3) battery management. They make up a hierarchical control system. This paper introduces a hierarchical control strategy for a fuel cell / ...

  16. Hierarchical Control for Multiple DC-Microgrids Clusters

    DEFF Research Database (Denmark)

    Shafiee, Qobad; Dragicevic, Tomislav; Vasquez, Juan Carlos

    2014-01-01

    DC microgrids (MGs) have gained research interest during the recent years because of many potential advantages as compared to the ac system. To ensure reliable operation of a low-voltage dc MG as well as its intelligent operation with the other DC MGs, a hierarchical control is proposed in this p......DC microgrids (MGs) have gained research interest during the recent years because of many potential advantages as compared to the ac system. To ensure reliable operation of a low-voltage dc MG as well as its intelligent operation with the other DC MGs, a hierarchical control is proposed...

  17. Hierarchical Controlled Grid-Connected Microgrid based on a Novel Autonomous Current Sharing Controller

    DEFF Research Database (Denmark)

    Guan, Yajuan; Quintero, Juan Carlos Vasquez; Guerrero, Josep M.

    2015-01-01

    In this paper, a hierarchical control system based on a novel autonomous current sharing controller for grid-connected microgrids (MGs) is presented. A three-level hierarchical control system is implemented to guarantee the power sharing performance among voltage controlled parallel inverters......, while providing the required active and reactive power to the utility grid. A communication link is used to transmit the control signal from the tertiary and secondary control levels to the primary control. Simulation results from a MG based on two grid-connected parallel inverters are shown in order...

  18. Hierarchical Discrete Event Supervisory Control of Aircraft Propulsion Systems

    Science.gov (United States)

    Yasar, Murat; Tolani, Devendra; Ray, Asok; Shah, Neerav; Litt, Jonathan S.

    2004-01-01

    This paper presents a hierarchical application of Discrete Event Supervisory (DES) control theory for intelligent decision and control of a twin-engine aircraft propulsion system. A dual layer hierarchical DES controller is designed to supervise and coordinate the operation of two engines of the propulsion system. The two engines are individually controlled to achieve enhanced performance and reliability, necessary for fulfilling the mission objectives. Each engine is operated under a continuously varying control system that maintains the specified performance and a local discrete-event supervisor for condition monitoring and life extending control. A global upper level DES controller is designed for load balancing and overall health management of the propulsion system.

  19. Hierarchical control system of advanced robot manipulator

    International Nuclear Information System (INIS)

    Oomichi, Takeo; Okino, Akihisa; Nishihara, Masatoshi; Sakamoto, Taizou; Matsuda, Koichi; Ohnishi, Ken

    1990-01-01

    We introduce a double arm with 4-finger's manipulator system which process the large volume of information at high speed. This is under research/development many type of works in the harsh condition. Namely, hierarchization of instruction unit in which motion control system as real time processing unit, and task planning unit as non-real time processing unit, interface with operation through the task planning unit has been made. Also, high speed processing of large volume information has been realized by decentralizing the motion control unit by function, hierarchizing the high speed processing unit, and developing high speed transmission, IC which does not depend on computer OS to avoid the delay in transmission. (author)

  20. Hierarchical Control for Multiple DC Microgrids Clusters

    DEFF Research Database (Denmark)

    Shafiee, Qobad; Dragicevic, Tomislav; Vasquez, Juan Carlos

    2014-01-01

    This paper presents a distributed hierarchical control framework to ensure reliable operation of dc Microgrid (MG) clusters. In this hierarchy, primary control is used to regulate the common bus voltage inside each MG locally. An adaptive droop method is proposed for this level which determines...

  1. Nonlinear robust hierarchical control for nonlinear uncertain systems

    Directory of Open Access Journals (Sweden)

    Leonessa Alexander

    1999-01-01

    Full Text Available A nonlinear robust control-system design framework predicated on a hierarchical switching controller architecture parameterized over a set of moving nominal system equilibria is developed. Specifically, using equilibria-dependent Lyapunov functions, a hierarchical nonlinear robust control strategy is developed that robustly stabilizes a given nonlinear system over a prescribed range of system uncertainty by robustly stabilizing a collection of nonlinear controlled uncertain subsystems. The robust switching nonlinear controller architecture is designed based on a generalized (lower semicontinuous Lyapunov function obtained by minimizing a potential function over a given switching set induced by the parameterized nominal system equilibria. The proposed framework robustly stabilizes a compact positively invariant set of a given nonlinear uncertain dynamical system with structured parametric uncertainty. Finally, the efficacy of the proposed approach is demonstrated on a jet engine propulsion control problem with uncertain pressure-flow map data.

  2. Hierarchically Ordered Nanopatterns for Spatial Control of Biomolecules

    Science.gov (United States)

    2015-01-01

    The development and study of a benchtop, high-throughput, and inexpensive fabrication strategy to obtain hierarchical patterns of biomolecules with sub-50 nm resolution is presented. A diblock copolymer of polystyrene-b-poly(ethylene oxide), PS-b-PEO, is synthesized with biotin capping the PEO block and 4-bromostyrene copolymerized within the polystyrene block at 5 wt %. These two handles allow thin films of the block copolymer to be postfunctionalized with biotinylated biomolecules of interest and to obtain micropatterns of nanoscale-ordered films via photolithography. The design of this single polymer further allows access to two distinct superficial nanopatterns (lines and dots), where the PEO cylinders are oriented parallel or perpendicular to the substrate. Moreover, we present a strategy to obtain hierarchical mixed morphologies: a thin-film coating of cylinders both parallel and perpendicular to the substrate can be obtained by tuning the solvent annealing and irradiation conditions. PMID:25363506

  3. On the location, strength and accessibility of Brønsted acid sites in hierarchical ZSM-5 particles

    DEFF Research Database (Denmark)

    Tzoulaki, Despina; Jentys, Andreas; Pérez-Ramírez, Javier

    2012-01-01

    Microporous and mesoporous (hierarchical) ZSM-5 samples, prepared by desilication, dealumination and templating with carbon nanoparticles have been characterized by adsorbing benzene, cyclohexane and 1,3,5-trimethylbenzene (mesitylene) to probe the location, the strength and the accessibility...

  4. Hierarchically structured distributed microprocessor network for control

    International Nuclear Information System (INIS)

    Greenwood, J.R.; Holloway, F.W.; Rupert, P.R.; Ozarski, R.G.; Suski, G.J.

    1979-01-01

    To satisfy a broad range of control-analysis and data-acquisition requirements for Shiva, a hierarchical, computer-based, modular-distributed control system was designed. This system handles the more than 3000 control elements and 1000 data acquisition units in a severe high-voltage, high-current environment. The control system design gives one a flexible and reliable configuration to meet the development milestones for Shiva within critical time limits

  5. Hierarchical fuzzy control of low-energy building systems

    Energy Technology Data Exchange (ETDEWEB)

    Yu, Zhen; Dexter, Arthur [Department of Engineering Science, University of Oxford, Parks Road, Oxford OX1 3PJ (United Kingdom)

    2010-04-15

    A hierarchical fuzzy supervisory controller is described that is capable of optimizing the operation of a low-energy building, which uses solar energy to heat and cool its interior spaces. The highest level fuzzy rules choose the most appropriate set of lower level rules according to the weather and occupancy information; the second level fuzzy rules determine an optimal energy profile and the overall modes of operation of the heating, ventilating and air-conditioning system (HVAC); the third level fuzzy rules select the mode of operation of specific equipment, and assign schedules to the local controllers so that the optimal energy profile can be achieved in the most efficient way. Computer simulation is used to compare the hierarchical fuzzy control scheme with a supervisory control scheme based on expert rules. The performance is evaluated by comparing the energy consumption and thermal comfort. (author)

  6. Agent-based distributed hierarchical control of dc microgrid systems

    DEFF Research Database (Denmark)

    Meng, Lexuan; Vasquez, Juan Carlos; Guerrero, Josep M.

    2014-01-01

    In order to enable distributed control and management for microgrids, this paper explores the application of information consensus and local decisionmaking methods formulating an agent based distributed hierarchical control system. A droop controlled paralleled DC/DC converter system is taken as ....... Standard genetic algorithm is applied in each local control system in order to search for a global optimum. Hardware-in-Loop simulation results are shown to demonstrate the effectiveness of the method.......In order to enable distributed control and management for microgrids, this paper explores the application of information consensus and local decisionmaking methods formulating an agent based distributed hierarchical control system. A droop controlled paralleled DC/DC converter system is taken...... as a case study. The objective is to enhance the system efficiency by finding the optimal sharing ratio of load current. Virtual resistances in local control systems are taken as decision variables. Consensus algorithms are applied for global information discovery and local control systems coordination...

  7. Application-Defined Decentralized Access Control

    Science.gov (United States)

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  8. Comparisons of Flow Patterns over a Hierarchical and a Non-hierarchical Surface in Relation to Biofouling Control

    Directory of Open Access Journals (Sweden)

    Bin Ahmad Fawzan Mohammed Ridha

    2018-01-01

    Full Text Available Biofouling can be defined as unwanted deposition and development of organisms on submerged surfaces. It is a major problem as it causes water contamination, infrastructures damage and increase in maintenance and operational cost especially in the shipping industry. There are a few methods that can prevent this problem. One of the most effective methods which is using chemicals particularly Tributyltin has been banned due to adverse effects on the environment. One of the non-toxic methods found to be effective is surface modification which involves altering the surface topography so that it becomes a low-fouling or a non-stick surface to biofouling organisms. Current literature suggested that non-hierarchical topographies has lower antifouling performance compared to hierarchical topographies. It is still unclear if the effects of the flow on these topographies could have aided in their antifouling properties. This research will use Computational Fluid Dynamics (CFD simulations to study the flow on these two topographies which also involves comparison study of the topographies used. According to the results obtained, it is shown that hierarchical topography has higher antifouling performance compared to non-hierarchical topography. This is because the fluid characteristics at the hierarchical topography is more favorable in controlling biofouling. In addition, hierarchical topography has higher wall shear stress distribution compared to non-hierarchical topography

  9. Implementation of hierarchical control in DC microgrids

    DEFF Research Database (Denmark)

    Jin, Chi; Wang, Peng; Xiao, Jianfang

    2014-01-01

    of Technology, Singapore. The coordination control among multiple dc sources and energy storages is implemented using a novel hierarchical control technique. The bus voltage essentially acts as an indicator of supply-demand balance. A wireless control is implemented for the reliable operation of the grid....... A reasonable compromise between the maximum power harvest and effective battery management is further enhanced using the coordination control based on a central energy management system. The feasibility and effectiveness of the proposed control strategies have been tested by a dc microgrid in WERL....

  10. Hierarchical Control of Parallel AC-DC Converter Interfaces for Hybrid Microgrids

    DEFF Research Database (Denmark)

    Lu, Xiaonan; Guerrero, Josep M.; Sun, Kai

    2014-01-01

    In this paper, a hierarchical control system for parallel power electronics interfaces between ac bus and dc bus in a hybrid microgrid is presented. Both standalone and grid-connected operation modes in the dc side of the microgrid are analyzed. Concretely, a three-level hierarchical control system...... equal or proportional dc load current sharing. The common secondary control level is designed to eliminate the dc bus voltage deviation produced by the droop control, with dc bus voltage in the hybrid microgrid boosted to an acceptable range. After guaranteeing the performance of the dc side standalone...

  11. Hierarchical Delay-Dependent Distributed Coordinated Control for DC Ring-Bus Microgrids

    DEFF Research Database (Denmark)

    Dou, Chunxia; Yue, Dong; Zhang, Zhanqiang

    2017-01-01

    In this paper, a hierarchical distributed coordinated control method is proposed based on the multi-agent system for dc ring-bus microgrids to improve the bus voltage performance. First, a two-level multi-agent system is built, where each first-level unit control agent is associated with a distri......In this paper, a hierarchical distributed coordinated control method is proposed based on the multi-agent system for dc ring-bus microgrids to improve the bus voltage performance. First, a two-level multi-agent system is built, where each first-level unit control agent is associated...

  12. Hierarchical model-based predictive control of a power plant portfolio

    DEFF Research Database (Denmark)

    Edlund, Kristian; Bendtsen, Jan Dimon; Jørgensen, John Bagterp

    2011-01-01

    One of the main difficulties in large-scale implementation of renewable energy in existing power systems is that the production from renewable sources is difficult to predict and control. For this reason, fast and efficient control of controllable power producing units – so-called “portfolio...... design for power system portfolio control, which aims specifically at meeting these demands.The design involves a two-layer hierarchical structure with clearly defined interfaces that facilitate an object-oriented implementation approach. The same hierarchical structure is reflected in the underlying...... optimisation problem, which is solved using Dantzig–Wolfe decomposition. This decomposition yields improved computational efficiency and better scalability compared to centralised methods.The proposed control scheme is compared to an existing, state-of-the-art portfolio control system (operated by DONG Energy...

  13. Control of discrete event systems modeled as hierarchical state machines

    Science.gov (United States)

    Brave, Y.; Heymann, M.

    1991-01-01

    The authors examine a class of discrete event systems (DESs) modeled as asynchronous hierarchical state machines (AHSMs). For this class of DESs, they provide an efficient method for testing reachability, which is an essential step in many control synthesis procedures. This method utilizes the asynchronous nature and hierarchical structure of AHSMs, thereby illustrating the advantage of the AHSM representation as compared with its equivalent (flat) state machine representation. An application of the method is presented where an online minimally restrictive solution is proposed for the problem of maintaining a controlled AHSM within prescribed legal bounds.

  14. Hierarchical Control for Smart Grids

    DEFF Research Database (Denmark)

    Trangbæk, K; Bendtsen, Jan Dimon; Stoustrup, Jakob

    2011-01-01

    of autonomous consumers. The control system is tasked with balancing electric power production and consumption within the smart grid, and makes active use of the flexibility of a large number of power producing and/or power consuming units. The objective is to accommodate the load variation on the grid, arising......This paper deals with hierarchical model predictive control (MPC) of smart grid systems. The design consists of a high level MPC controller, a second level of so-called aggregators, which reduces the computational and communication-related load on the high-level control, and a lower level...... on one hand from varying consumption, and on the other hand by natural variations in power production e.g. from wind turbines. The high-level MPC problem is solved using quadratic optimisation, while the aggregator level can either involve quadratic optimisation or simple sorting-based min-max solutions...

  15. Hierarchical sliding mode control for under-actuated cranes design, analysis and simulation

    CERN Document Server

    Qian, Dianwei

    2015-01-01

    This book reports on the latest developments in sliding mode overhead crane control, presenting novel research ideas and findings on sliding mode control (SMC), hierarchical SMC and compensator design-based hierarchical sliding mode. The results, which were previously scattered across various journals and conference proceedings, are now presented in a systematic and unified form. The book will be of interest to researchers, engineers and graduate students in control engineering and mechanical engineering who want to learn the methods and applications of SMC.

  16. Unified Brake Service by a Hierarchical Controller for Active Deceleration Control in an Electric and Automated Vehicle

    Directory of Open Access Journals (Sweden)

    Yuliang Nie

    2017-12-01

    Full Text Available Unified brake service is a universal service for generating certain brake force to meet the demand deceleration and is essential for an automated driving system. However, it is rather difficult to control the pressure in the wheel cylinders to reach the target deceleration of the automated vehicle, which is the key issue of the active deceleration control system (ADC. This paper proposes a hierarchical control method to actively control vehicle deceleration with active-brake actuators. In the upper hierarchical, the target pressure of wheel cylinders is obtained by dynamic equations of a pure electric vehicle. In the lower hierarchical, the solenoid valve instructions and the pump speed of hydraulic control unit (HCU are determined to satisfy the desired pressure with the feedback of measured wheel cylinder pressure by pressure sensors. Results of road experiments of a pure electric and automated vehicle indicate that the proposed method realizes the target deceleration accurately and efficiently.

  17. Naturalizing sense of agency with a hierarchical event-control approach.

    Directory of Open Access Journals (Sweden)

    Devpriya Kumar

    Full Text Available Unraveling the mechanisms underlying self and agency has been a difficult scientific problem. We argue for an event-control approach for naturalizing the sense of agency by focusing on the role of perception-action regularities present at different hierarchical levels and contributing to the sense of self as an agent. The amount of control at different levels of the control hierarchy determines the sense of agency. The current study investigates this approach in a set of two experiments using a scenario containing multiple agents sharing a common goal where one of the agents is partially controlled by the participant. The participant competed with other agents for achieving the goal and subsequently answered questions on identification (which agent was controlled by the participant, the degree to which they are confident about their identification (sense of identification and the degree to which the participant believed he/she had control over his/her actions (sense of authorship. Results indicate a hierarchical relationship between goal-level control (higher level and perceptual-motor control (lower level for sense of agency. Sense of identification ratings increased with perceptual-motor control when the goal was not completed but did not vary with perceptual-motor control when the goal was completed. Sense of authorship showed a similar interaction effect only in experiment 2 that had only one competing agent unlike the larger number of competing agents in experiment 1. The effect of hierarchical control can also be seen in the misidentification pattern and misidentification was greater with the agent affording greater control. Results from the two studies support the event-control approach in understanding sense of agency as grounded in control. The study also offers a novel paradigm for empirically studying sense of agency and self.

  18. Hierarchical optimal control of large-scale nonlinear chemical processes.

    Science.gov (United States)

    Ramezani, Mohammad Hossein; Sadati, Nasser

    2009-01-01

    In this paper, a new approach is presented for optimal control of large-scale chemical processes. In this approach, the chemical process is decomposed into smaller sub-systems at the first level, and a coordinator at the second level, for which a two-level hierarchical control strategy is designed. For this purpose, each sub-system in the first level can be solved separately, by using any conventional optimization algorithm. In the second level, the solutions obtained from the first level are coordinated using a new gradient-type strategy, which is updated by the error of the coordination vector. The proposed algorithm is used to solve the optimal control problem of a complex nonlinear chemical stirred tank reactor (CSTR), where its solution is also compared with the ones obtained using the centralized approach. The simulation results show the efficiency and the capability of the proposed hierarchical approach, in finding the optimal solution, over the centralized method.

  19. A robust H∞ control-based hierarchical mode transition control system for plug-in hybrid electric vehicle

    Science.gov (United States)

    Yang, Chao; Jiao, Xiaohong; Li, Liang; Zhang, Yuanbo; Chen, Zheng

    2018-01-01

    To realize a fast and smooth operating mode transition process from electric driving mode to engine-on driving mode, this paper presents a novel robust hierarchical mode transition control method for a plug-in hybrid electric bus (PHEB) with pre-transmission parallel hybrid powertrain. Firstly, the mode transition process is divided into five stages to clearly describe the powertrain dynamics. Based on the dynamics models of powertrain and clutch actuating mechanism, a hierarchical control structure including two robust H∞ controllers in both upper layer and lower layer is proposed. In upper layer, the demand clutch torque can be calculated by a robust H∞controller considering the clutch engaging time and the vehicle jerk. While in lower layer a robust tracking controller with L2-gain is designed to perform the accurate position tracking control, especially when the parameters uncertainties and external disturbance occur in the clutch actuating mechanism. Simulation and hardware-in-the-loop (HIL) test are carried out in a traditional driving condition of PHEB. Results show that the proposed hierarchical control approach can obtain the good control performance: mode transition time is greatly reduced with the acceptable jerk. Meanwhile, the designed control system shows the obvious robustness with the uncertain parameters and disturbance. Therefore, the proposed approach may offer a theoretical reference for the actual vehicle controller.

  20. Synchronization of Hierarchical Time-Varying Neural Networks Based on Asynchronous and Intermittent Sampled-Data Control.

    Science.gov (United States)

    Xiong, Wenjun; Patel, Ragini; Cao, Jinde; Zheng, Wei Xing

    In this brief, our purpose is to apply asynchronous and intermittent sampled-data control methods to achieve the synchronization of hierarchical time-varying neural networks. The asynchronous and intermittent sampled-data controllers are proposed for two reasons: 1) the controllers may not transmit the control information simultaneously and 2) the controllers cannot always exist at any time . The synchronization is then discussed for a kind of hierarchical time-varying neural networks based on the asynchronous and intermittent sampled-data controllers. Finally, the simulation results are given to illustrate the usefulness of the developed criteria.In this brief, our purpose is to apply asynchronous and intermittent sampled-data control methods to achieve the synchronization of hierarchical time-varying neural networks. The asynchronous and intermittent sampled-data controllers are proposed for two reasons: 1) the controllers may not transmit the control information simultaneously and 2) the controllers cannot always exist at any time . The synchronization is then discussed for a kind of hierarchical time-varying neural networks based on the asynchronous and intermittent sampled-data controllers. Finally, the simulation results are given to illustrate the usefulness of the developed criteria.

  1. Supervisory, hierarchical control for a multimodular ALMR

    International Nuclear Information System (INIS)

    Otaduy, P.J.; Brittain, C.R.; Rovere, L.A.

    1989-01-01

    This paper describes the directions and present status of research in supervisory control for multimodular nuclear plants at ORNL as part of DOE's advanced controls program ACTO. The hierarchical supervisory structure envisioned for a PRISM-like supervisor closest to the process actuators and how it has actually been implemented for demonstration in a network of CPU's is presented next. Two demonstrations of supervisory control with an expert system are also described, one for control of a plant with a single reactor and turbine, the other for control of a plant with three reactors and one turbine. An appendix contains the mathematical basis for the novel approach to large scale system decomposition we have used in the demonstrations of supervisory distributed control of the single reactor plant. 6 refs., 5 figs

  2. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  3. Hierarchical Control Strategy for the Cooperative Braking System of Electric Vehicle

    Science.gov (United States)

    Peng, Jiankun; He, Hongwen; Guo, Hongqiang

    2015-01-01

    This paper provides a hierarchical control strategy for cooperative braking system of an electric vehicle with separated driven axles. Two layers are defined: the top layer is used to optimize the braking stability based on two sliding mode control strategies, namely, the interaxle control mode and signal-axle control strategies; the interaxle control strategy generates the ideal braking force distribution in general braking condition, and the single-axle control strategy can ensure braking safety in emergency braking condition; the bottom layer is used to maximize the regenerative braking energy recovery efficiency with a reallocated braking torque strategy; the reallocated braking torque strategy can recovery braking energy as much as possible in the premise of meeting battery charging power. The simulation results show that the proposed hierarchical control strategy is reasonable and can adapt to different typical road surfaces and load cases; the vehicle braking stability and safety can be guaranteed; furthermore, the regenerative braking energy recovery efficiency can be improved. PMID:26236772

  4. Hierarchical Control Strategy for the Cooperative Braking System of Electric Vehicle.

    Science.gov (United States)

    Peng, Jiankun; He, Hongwen; Liu, Wei; Guo, Hongqiang

    2015-01-01

    This paper provides a hierarchical control strategy for cooperative braking system of an electric vehicle with separated driven axles. Two layers are defined: the top layer is used to optimize the braking stability based on two sliding mode control strategies, namely, the interaxle control mode and signal-axle control strategies; the interaxle control strategy generates the ideal braking force distribution in general braking condition, and the single-axle control strategy can ensure braking safety in emergency braking condition; the bottom layer is used to maximize the regenerative braking energy recovery efficiency with a reallocated braking torque strategy; the reallocated braking torque strategy can recovery braking energy as much as possible in the premise of meeting battery charging power. The simulation results show that the proposed hierarchical control strategy is reasonable and can adapt to different typical road surfaces and load cases; the vehicle braking stability and safety can be guaranteed; furthermore, the regenerative braking energy recovery efficiency can be improved.

  5. Hierarchical Control Strategy for the Cooperative Braking System of Electric Vehicle

    Directory of Open Access Journals (Sweden)

    Jiankun Peng

    2015-01-01

    Full Text Available This paper provides a hierarchical control strategy for cooperative braking system of an electric vehicle with separated driven axles. Two layers are defined: the top layer is used to optimize the braking stability based on two sliding mode control strategies, namely, the interaxle control mode and signal-axle control strategies; the interaxle control strategy generates the ideal braking force distribution in general braking condition, and the single-axle control strategy can ensure braking safety in emergency braking condition; the bottom layer is used to maximize the regenerative braking energy recovery efficiency with a reallocated braking torque strategy; the reallocated braking torque strategy can recovery braking energy as much as possible in the premise of meeting battery charging power. The simulation results show that the proposed hierarchical control strategy is reasonable and can adapt to different typical road surfaces and load cases; the vehicle braking stability and safety can be guaranteed; furthermore, the regenerative braking energy recovery efficiency can be improved.

  6. Hierarchical Velocity Control Based on Differential Flatness for a DC/DC Buck Converter-DC Motor System

    Directory of Open Access Journals (Sweden)

    R. Silva-Ortigoza

    2014-01-01

    Full Text Available This paper presents a hierarchical controller that carries out the angular velocity trajectory tracking task for a DC motor driven by a DC/DC Buck converter. The high level control is related to the DC motor and the low level control is dedicated to the DC/DC Buck converter; both controls are designed via differential flatness. The high level control provides a desired voltage profile for the DC motor to achieve the tracking of a desired angular velocity trajectory. Then, a low level control is designed to ensure that the output voltage of the DC/DC Buck converter tracks the voltage profile imposed by the high level control. In order to experimentally verify the hierarchical controller performance, a DS1104 electronic board from dSPACE and Matlab-Simulink are used. The switched implementation of the hierarchical average controller is accomplished by means of pulse width modulation. Experimental results of the hierarchical controller for the velocity trajectory tracking task show good performance and robustness against the uncertainties associated with different system parameters.

  7. Hierarchical control of a photovoltaic/battery based DC microgrid including electric vehicle wireless charging station

    DEFF Research Database (Denmark)

    Xiao, Zhao xia; Fan, Haodong; Guerrero, Josep M.

    2017-01-01

    In this paper, the hierarchical control strategy of a photovoltaic/battery based dc microgrid is presented for electric vehicle (EV) wireless charging. Considering irradiance variations, battery charging/discharging requirements, wireless power transmission characteristics, and onboard battery...... coils, receiving coils and compensation capacitors, the wireless power transmission system is designed to be resonant when it is operating at the rated power, with the aim to achieve the optimum transmission system efficiency. Simulation and experimental results of the hierarchical control...... charging power change and other factors, the possible operation states are obtained. A hierarchical control strategy is established, which includes central and local controllers. The central controller is responsible for the selection and transfer of operation states and the management of the local...

  8. Hierarchical Model Predictive Control for Plug-and-Play Resource Distribution

    DEFF Research Database (Denmark)

    Bendtsen, Jan Dimon; Trangbæk, K; Stoustrup, Jakob

    2012-01-01

    of autonomous units. The approach is inspired by smart-grid electric power production and consumption systems, where the flexibility of a large number of power producing and/or power consuming units can be exploited in a smart-grid solution. The objective is to accommodate the load variation on the grid......This chapter deals with hierarchical model predictive control (MPC) of distributed systems. A three level hierarchical approach is proposed, consisting of a high level MPC controller, a second level of so-called aggregators, controlled by an online MPC-like algorithm, and a lower level......, arising on one hand from varying consumption, on the other hand by natural variations in power production e.g. from wind turbines. The proposed method can also be applied to supply chain management systems, where the challenge is to balance demand and supply, using a number of storages each with a maximal...

  9. The hierarchical expert tuning of PID controllers using tools of soft computing.

    Science.gov (United States)

    Karray, F; Gueaieb, W; Al-Sharhan, S

    2002-01-01

    We present soft computing-based results pertaining to the hierarchical tuning process of PID controllers located within the control loop of a class of nonlinear systems. The results are compared with PID controllers implemented either in a stand alone scheme or as a part of conventional gain scheduling structure. This work is motivated by the increasing need in the industry to design highly reliable and efficient controllers for dealing with regulation and tracking capabilities of complex processes characterized by nonlinearities and possibly time varying parameters. The soft computing-based controllers proposed are hybrid in nature in that they integrate within a well-defined hierarchical structure the benefits of hard algorithmic controllers with those having supervisory capabilities. The controllers proposed also have the distinct features of learning and auto-tuning without the need for tedious and computationally extensive online systems identification schemes.

  10. Decentralized Hierarchical Controller Design for Selective Damping of Inter Area Oscillations Using PMU Signals

    Directory of Open Access Journals (Sweden)

    Ashfaque Ahmed Hashmani

    2011-07-01

    Full Text Available This paper deals with the decentralized hierarchical PSS (Power System Stabilizer controller design to achieve a better damping of specific inter-area oscillations. The two-level decentralized hierarchical structure consists of two PSS controllers. The first level controller is a local PSS controller for each generator to damp local mode in the area where controller is located. This controller uses only local signals as input signals. The local signal comes from the generator at which the controller is located. The secondary level controller is a multivariable decentralized global PSS controller to damp inter-area modes. This controller uses selected suitable wide area PMU (Phasor Measurement Units signals as inputs. The PMU or global signals are taken from network locations where the oscillations are well observable. The global controller uses only those global input signals in which the assigned single inter-area mode is most observable and is located at a generator that is most effective in controlling the assigned mode. The global controller works mainly in a frequency band given by the natural frequency of the assigned mode. The effectiveness of the resulting hierarchical controller is demonstrated through simulation studies conducted on a test power system.

  11. Pushing Typists Back on the Learning Curve: Memory Chunking in the Hierarchical Control of Skilled Typewriting

    Science.gov (United States)

    Yamaguchi, Motonori; Logan, Gordon D.

    2016-01-01

    Hierarchical control of skilled performance depends on the ability of higher level control to process several lower level units as a single chunk. The present study investigated the development of hierarchical control of skilled typewriting, focusing on the process of memory chunking. In the first 3 experiments, skilled typists typed words or…

  12. Hierarchical Compliance Control of a Soft Ankle Rehabilitation Robot Actuated by Pneumatic Muscles.

    Science.gov (United States)

    Liu, Quan; Liu, Aiming; Meng, Wei; Ai, Qingsong; Xie, Sheng Q

    2017-01-01

    Traditional compliance control of a rehabilitation robot is implemented in task space by using impedance or admittance control algorithms. The soft robot actuated by pneumatic muscle actuators (PMAs) is becoming prominent for patients as it enables the compliance being adjusted in each active link, which, however, has not been reported in the literature. This paper proposes a new compliance control method of a soft ankle rehabilitation robot that is driven by four PMAs configured in parallel to enable three degrees of freedom movement of the ankle joint. A new hierarchical compliance control structure, including a low-level compliance adjustment controller in joint space and a high-level admittance controller in task space, is designed. An adaptive compliance control paradigm is further developed by taking into account patient's active contribution and movement ability during a previous period of time, in order to provide robot assistance only when it is necessarily required. Experiments on healthy and impaired human subjects were conducted to verify the adaptive hierarchical compliance control scheme. The results show that the robot hierarchical compliance can be online adjusted according to the participant's assessment. The robot reduces its assistance output when participants contribute more and vice versa , thus providing a potentially feasible solution to the patient-in-loop cooperative training strategy.

  13. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

    Science.gov (United States)

    Huang, Qinlong; Yang, Yixian; Shi, Yuxiang

    2018-02-24

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

  14. Hierarchical Compliance Control of a Soft Ankle Rehabilitation Robot Actuated by Pneumatic Muscles

    Directory of Open Access Journals (Sweden)

    Quan Liu

    2017-12-01

    Full Text Available Traditional compliance control of a rehabilitation robot is implemented in task space by using impedance or admittance control algorithms. The soft robot actuated by pneumatic muscle actuators (PMAs is becoming prominent for patients as it enables the compliance being adjusted in each active link, which, however, has not been reported in the literature. This paper proposes a new compliance control method of a soft ankle rehabilitation robot that is driven by four PMAs configured in parallel to enable three degrees of freedom movement of the ankle joint. A new hierarchical compliance control structure, including a low-level compliance adjustment controller in joint space and a high-level admittance controller in task space, is designed. An adaptive compliance control paradigm is further developed by taking into account patient’s active contribution and movement ability during a previous period of time, in order to provide robot assistance only when it is necessarily required. Experiments on healthy and impaired human subjects were conducted to verify the adaptive hierarchical compliance control scheme. The results show that the robot hierarchical compliance can be online adjusted according to the participant’s assessment. The robot reduces its assistance output when participants contribute more and vice versa, thus providing a potentially feasible solution to the patient-in-loop cooperative training strategy.

  15. Hierarchical Load Tracking Control of a Grid-connected Solid Oxide Fuel Cell for Maximum Electrical Efficiency Operation

    DEFF Research Database (Denmark)

    Li, Yonghui; Wu, Qiuwei; Zhu, Haiyu

    2015-01-01

    efficiency operation obtained at different active power output levels, a hierarchical load tracking control scheme for the grid-connected SOFC was proposed to realize the maximum electrical efficiency operation with the stack temperature bounded. The hierarchical control scheme consists of a fast active...... power control and a slower stack temperature control. The active power control was developed by using a decentralized control method. The efficiency of the proposed hierarchical control scheme was demonstrated by case studies using the benchmark SOFC dynamic model......Based on the benchmark solid oxide fuel cell (SOFC) dynamic model for power system studies and the analysis of the SOFC operating conditions, the nonlinear programming (NLP) optimization method was used to determine the maximum electrical efficiency of the grid-connected SOFC subject...

  16. Hierarchical Control Strategy for the Cooperative Braking System of Electric Vehicle

    OpenAIRE

    Peng, Jiankun; He, Hongwen; Liu, Wei; Guo, Hongqiang

    2015-01-01

    This paper provides a hierarchical control strategy for cooperative braking system of an electric vehicle with separated driven axles. Two layers are defined: the top layer is used to optimize the braking stability based on two sliding mode control strategies, namely, the interaxle control mode and signal-axle control strategies; the interaxle control strategy generates the ideal braking force distribution in general braking condition, and the single-axle control strategy can ensure braking s...

  17. Power flow analysis for islanded microgrid in hierarchical structure of control system using optimal control theory

    Directory of Open Access Journals (Sweden)

    Thang Diep Thanh

    2017-12-01

    Full Text Available In environmental uncertainties, the power flow problem in islanded microgrid (MG becomes complex and non-trivial. The optimal power flow (OPL problem is described in this paper by using the energy balance between the power generation and load demand. The paper also presents the hierarchical control structure which consists of primary, secondary, tertiary, and emergency controls. Clearly, optimal power flow (OPL which implements a distributed tertiary control in hierarchical control. MG consists of diesel engine generator (DEG, wind turbine generator (WTG, and photovoltaic (PV power. In the control system considered, operation planning is realized based on profiles such that the MG, load, wind and photovoltaic power must be forecasted in short-period, meanwhile the dispatch source (i.e., DEG needs to be scheduled. The aim of the control problem is to find the dispatch output power by minimizing the total cost of energy that leads to the Hamilton-Jacobi-Bellman equation. Experimental results are presented, showing the effectiveness of optimal control such that the generation allows demand profile.

  18. A Hierarchical Algorithm for Integrated Scheduling and Control With Applications to Power Systems

    DEFF Research Database (Denmark)

    Sokoler, Leo Emil; Dinesen, Peter Juhler; Jørgensen, John Bagterp

    2016-01-01

    The contribution of this paper is a hierarchical algorithm for integrated scheduling and control via model predictive control of hybrid systems. The controlled system is a linear system composed of continuous control, state, and output variables. Binary variables occur as scheduling decisions in ...

  19. Hierarchical Control of Droop-Controlled DC and AC Microgrids - A General Approach Towards Standardization

    DEFF Research Database (Denmark)

    Guerrero, Josep M.; Vásquez, Juan V.; Teodorescu, Remus

    2009-01-01

    DC and AC Microgrids are key elements to integrate renewable and distributed energy resources as well as distributed energy storage systems. In the last years, efforts toward the standardization of these Microgrids have been made. In this sense, this paper present the hierarchical control derived...

  20. Preventing Distribution Grid Congestion by Integrating Indirect Control in a Hierarchical Electric Vehicles Management System

    DEFF Research Database (Denmark)

    Hu, Junjie; Si, Chengyong; Lind, Morten

    2016-01-01

    In this paper, a hierarchical management system is proposed to integrate electric vehicles (EVs) into a distribution grid. Three types of actors are included in the system: Distribution system operators (DSOs), Fleet operators (FOs) and EV owners. In contrast to a typical hierarchical control sys...

  1. Economic–environmental hierarchical frequency management of a droop-controlled islanded microgrid

    International Nuclear Information System (INIS)

    Rezaei, Navid; Kalantar, Mohsen

    2014-01-01

    Highlights: • Modeling the steady-state frequency of the droop-controlled microgrids. • Precise formulation the hierarchical control levels of islanded microgrids. • Economic–environmental frequency management using mixed-integer linear programming. • Proposing a novel objective function based on the microgrid daily frequency profile. • Scheduling primary and secondary control reserves using a stochastic optimization. - Abstract: This paper presents a novel energy management system (EMS) for a microgrid to enhance the power system security in a cost-effective manner. Small size of the islanded microgrids, high levels of intermittency and energy fluctuations, lower inertia potential of inverter-interfaced distributed energy resources (DERs) makes the frequency a vital factor in the microgrid energy management system that should be managed subject to the economic–environmental policies of the microgrid EMS. The proposed model is based on precise energy and reserve scheduling of the DERs in a droop-controlled islanded microgrid to manage the possible microgrid frequency excursions. The expected value of the microgrid frequency excursions stem from system power deviations is employed as a new objective function in this study, which is aimed to be minimized using a two stage stochastic mixed-integer linear programming method. In order to model the hierarchical control structure of the islanded microgrid, the frequency dependent behavior of the droop-controlled inverter-interfaced DERs is formulated thoroughly. The proposed model is applied to a typical microgrid test system. The primary and secondary frequency control reserves are appropriately scheduled over a 24 h period. A methodology based on the Monte-Carlo simulation strategy is adapted to generate some random scenarios corresponding to renewable generation variations, load consumption deviations and contingencies of line/unit outages. The generated scenarios are reduced and applied to the

  2. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  3. Hierarchical Active Inference: A Theory of Motivated Control.

    Science.gov (United States)

    Pezzulo, Giovanni; Rigoli, Francesco; Friston, Karl J

    2018-04-01

    Motivated control refers to the coordination of behaviour to achieve affectively valenced outcomes or goals. The study of motivated control traditionally assumes a distinction between control and motivational processes, which map to distinct (dorsolateral versus ventromedial) brain systems. However, the respective roles and interactions between these processes remain controversial. We offer a novel perspective that casts control and motivational processes as complementary aspects - goal propagation and prioritization, respectively - of active inference and hierarchical goal processing under deep generative models. We propose that the control hierarchy propagates prior preferences or goals, but their precision is informed by the motivational context, inferred at different levels of the motivational hierarchy. The ensuing integration of control and motivational processes underwrites action and policy selection and, ultimately, motivated behaviour, by enabling deep inference to prioritize goals in a context-sensitive way. Copyright © 2018 The Author(s). Published by Elsevier Ltd.. All rights reserved.

  4. Hierarchical modeling and analysis for spatial data

    CERN Document Server

    Banerjee, Sudipto; Gelfand, Alan E

    2003-01-01

    Among the many uses of hierarchical modeling, their application to the statistical analysis of spatial and spatio-temporal data from areas such as epidemiology And environmental science has proven particularly fruitful. Yet to date, the few books that address the subject have been either too narrowly focused on specific aspects of spatial analysis, or written at a level often inaccessible to those lacking a strong background in mathematical statistics.Hierarchical Modeling and Analysis for Spatial Data is the first accessible, self-contained treatment of hierarchical methods, modeling, and dat

  5. Hierarchical Control with Virtual Resistance Optimization for Efficiency Enhancement and State-of-Charge Balancing in DC Microgrids

    DEFF Research Database (Denmark)

    Meng, Lexuan; Dragicevic, Tomislav; Quintero, Juan Carlos Vasquez

    2015-01-01

    This paper proposes a hierarchical control scheme which applies optimization method into DC microgrids in order to improve the system overall efficiency while considering the State-of-Charge (SoC) balancing at the same time. Primary droop controller, secondary voltage restoration controller...... and tertiary optimization tool formulate the complete hierarchical control system. Virtual resistances are taken as the decision variables for achieving the objective. simulation results are presented to verify the proposed approach....

  6. Hierarchical Control Scheme for Voltage Harmonics Compensation in an Islanded Droop-Controlled Microgrid

    DEFF Research Database (Denmark)

    Savaghebi, Mehdi; Guerrero, Josep M.; Jalilian, Alireza

    2011-01-01

    In this paper, a microgrid hierarchical control scheme is proposed which includes primary and secondary control levels. The primary level comprises distributed generators (DGs) local controllers. The local controller mainly consists of active and reactive power controllers, voltage and current...... controllers, and virtual impedance loop. A novel virtual impedance structure is proposed to achieve proper sharing of non-fundamental power among the microgrid DGs. The secondary level is designed to manage compensation of voltage harmonics at the microgrid load bus (LB) to which the sensitive loads may...... be connected. Also, restoration of LB voltage amplitude and microgrid frequency to the rated values is directed by the secondary level. These functions are achieved by sending proper control signals to the local controllers. The simulation results show the effectiveness of the proposed control scheme....

  7. Hierarchical Data Replication and Service Monitoring Methods in a Scientific Data Grid

    Directory of Open Access Journals (Sweden)

    Weizhong Lu

    2009-04-01

    Full Text Available In a grid and distributed computing environment, data replication is an effective way to improve data accessibility and data accessing efficiency. It is also significant in developing a real-time service monitoring system for a Chinese Scientific Data Grid to guarantee the system stability and data availability. Hierarchical data replication and service monitoring methods are proposed in this paper. The hierarchical data replication method divides the network into different domains and replicates data in local domains. The nodes in a local domain are classified into hierarchies to improve data accessibility according to bandwidth and storage memory space. An extensible agent-based prototype of a hierarchical service monitoring system is presented. The status information of services in the Chinese Scientific Data Grid is collected from the grid nodes based on agent technology and then is transformed into real-time operational pictures for management needs. This paper presents frameworks of the hierarchical data replication and service monitoring methods and gives detailed resolutions. Simulation analyses have demonstrated improved data accessing efficiency and verified the effectiveness of the methods at the same time.

  8. Microgrid central controller development and hierarchical control implemetation in the intelligent microgrid lab of Aalborg University

    OpenAIRE

    Meng, Lexuan; Savaghebi, Mehdi; Andrade, Fabio; Vasquez Quintero, Juan Carlos; Guerrero, Josep M.; Graells Sobré, Moisès

    2015-01-01

    This paper presents the development of a microgrid central controller in an inverter-based intelligent microgrid (iMG) lab in Aalborg University, Denmark. The iMG lab aims to provide a flexible experimental platform for comprehensive studies of microgrids. The complete control system applied in this lab is based on the hierarchical control scheme for microgrids and includes primary, secondary and tertiary control. The structure of the lab, including the lab facilities, configurations and comm...

  9. Road Network Selection Based on Road Hierarchical Structure Control

    Directory of Open Access Journals (Sweden)

    HE Haiwei

    2015-04-01

    Full Text Available A new road network selection method based on hierarchical structure is studied. Firstly, road network is built as strokes which are then classified into hierarchical collections according to the criteria of betweenness centrality value (BC value. Secondly, the hierarchical structure of the strokes is enhanced using structural characteristic identification technique. Thirdly, the importance calculation model was established according to the relationships among the hierarchical structure of the strokes. Finally, the importance values of strokes are got supported with the model's hierarchical calculation, and with which the road network is selected. Tests are done to verify the advantage of this method by comparing it with other common stroke-oriented methods using three kinds of typical road network data. Comparision of the results show that this method had few need to semantic data, and could eliminate the negative influence of edge strokes caused by the criteria of BC value well. So, it is better to maintain the global hierarchical structure of road network, and suitable to meet with the selection of various kinds of road network at the same time.

  10. Hierarchical video summarization

    Science.gov (United States)

    Ratakonda, Krishna; Sezan, M. Ibrahim; Crinon, Regis J.

    1998-12-01

    We address the problem of key-frame summarization of vide in the absence of any a priori information about its content. This is a common problem that is encountered in home videos. We propose a hierarchical key-frame summarization algorithm where a coarse-to-fine key-frame summary is generated. A hierarchical key-frame summary facilitates multi-level browsing where the user can quickly discover the content of the video by accessing its coarsest but most compact summary and then view a desired segment of the video with increasingly more detail. At the finest level, the summary is generated on the basis of color features of video frames, using an extension of a recently proposed key-frame extraction algorithm. The finest level key-frames are recursively clustered using a novel pairwise K-means clustering approach with temporal consecutiveness constraint. We also address summarization of MPEG-2 compressed video without fully decoding the bitstream. We also propose efficient mechanisms that facilitate decoding the video when the hierarchical summary is utilized in browsing and playback of video segments starting at selected key-frames.

  11. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  12. GOTHIC: Gravitational oct-tree code accelerated by hierarchical time step controlling

    Science.gov (United States)

    Miki, Yohei; Umemura, Masayuki

    2017-04-01

    The tree method is a widely implemented algorithm for collisionless N-body simulations in astrophysics well suited for GPU(s). Adopting hierarchical time stepping can accelerate N-body simulations; however, it is infrequently implemented and its potential remains untested in GPU implementations. We have developed a Gravitational Oct-Tree code accelerated by HIerarchical time step Controlling named GOTHIC, which adopts both the tree method and the hierarchical time step. The code adopts some adaptive optimizations by monitoring the execution time of each function on-the-fly and minimizes the time-to-solution by balancing the measured time of multiple functions. Results of performance measurements with realistic particle distribution performed on NVIDIA Tesla M2090, K20X, and GeForce GTX TITAN X, which are representative GPUs of the Fermi, Kepler, and Maxwell generation of GPUs, show that the hierarchical time step achieves a speedup by a factor of around 3-5 times compared to the shared time step. The measured elapsed time per step of GOTHIC is 0.30 s or 0.44 s on GTX TITAN X when the particle distribution represents the Andromeda galaxy or the NFW sphere, respectively, with 224 = 16,777,216 particles. The averaged performance of the code corresponds to 10-30% of the theoretical single precision peak performance of the GPU.

  13. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  14. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  15. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  16. Hierarchical Load Tracking Control of a Grid-Connected Solid Oxide Fuel Cell for Maximum Electrical Efficiency Operation

    Directory of Open Access Journals (Sweden)

    Yonghui Li

    2015-03-01

    Full Text Available Based on the benchmark solid oxide fuel cell (SOFC dynamic model for power system studies and the analysis of the SOFC operating conditions, the nonlinear programming (NLP optimization method was used to determine the maximum electrical efficiency of the grid-connected SOFC subject to the constraints of fuel utilization factor, stack temperature and output active power. The optimal operating conditions of the grid-connected SOFC were obtained by solving the NLP problem considering the power consumed by the air compressor. With the optimal operating conditions of the SOFC for the maximum efficiency operation obtained at different active power output levels, a hierarchical load tracking control scheme for the grid-connected SOFC was proposed to realize the maximum electrical efficiency operation with the stack temperature bounded. The hierarchical control scheme consists of a fast active power control and a slower stack temperature control. The active power control was developed by using a decentralized control method. The efficiency of the proposed hierarchical control scheme was demonstrated by case studies using the benchmark SOFC dynamic model.

  17. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  18. Functional annotation of hierarchical modularity.

    Directory of Open Access Journals (Sweden)

    Kanchana Padmanabhan

    method using Saccharomyces cerevisiae data from KEGG and MIPS databases and several other computationally derived and curated datasets. The code and additional supplemental files can be obtained from http://code.google.com/p/functional-annotation-of-hierarchical-modularity/ (Accessed 2012 March 13.

  19. Ion-Pair Oligomerization of Chromogenic Triangulenium Cations with Cyanostar-Modified Anions That Controls Emission in Hierarchical Materials

    DEFF Research Database (Denmark)

    Qiao, Bo; Hirsch, Brandon E.; Lee, Semin

    2017-01-01

    The hierarchical assembly of colored cationic molecules with receptor-modified counteranions can be used to control optical properties in materials. However, our knowledge of when the optical properties emerge in the hierarchical organization and the variety of cation-anion salts that are availab...

  20. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  1. Hierarchical CuO hollow microspheres: Controlled synthesis for enhanced lithium storage performance

    International Nuclear Information System (INIS)

    Guan Xiangfeng; Li Liping; Li Guangshe; Fu Zhengwei; Zheng Jing; Yan Tingjiang

    2011-01-01

    Graphical abstract: Hierarchical CuO microspheres with hollow interiors were formed through self-wrapping of a single layer of radically oriented CuO nanorods, and these microspheres showed excellent cycle performance and enhanced lithium storage capacity. Display Omitted Research highlights: → Hierarchical CuO hollow microspheres were prepared by a hydrothermal method. → The CuO hollow microspheres were assembled from radically oriented nanorods. → The growth mechanism was proposed to proceed via self-assembly and Ostwald's ripening. → The microspheres showed good cycle performance and enhanced lithium storage capacity. → Hierarchical microstructures with hollow interiors promote electrochemical property. - Abstract: In this work, hierarchical CuO hollow microspheres were hydrothermally prepared without use of any surfactants or templates. By controlling the formation reaction conditions and monitoring the relevant reaction processes using time-dependent experiments, it is demonstrated that hierarchical CuO microspheres with hollow interiors were formed through self-wrapping of a single layer of radically oriented CuO nanorods, and that hierarchical spheres could be tuned to show different morphologies and microstructures. As a consequence, the formation mechanism was proposed to proceed via a combined process of self-assembly and Ostwald's ripening. Further, these hollow microspheres were initiated as the anode material in lithium ion batteries, which showed excellent cycle performance and enhanced lithium storage capacity, most likely because of the synergetic effect of small diffusion lengths in building blocks of nanorods and proper void space that buffers the volume expansion. The strategy reported in this work is reproducible, which may help to significantly improve the electrochemical performance of transition metal oxide-based anode materials via designing the hollow structures necessary for developing lithium ion batteries and the relevant

  2. Enterprise Dynamic Access Control (EDAC)

    National Research Council Canada - National Science Library

    Fernandez, Richard

    2005-01-01

    .... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...

  3. Supervisory control in a distributed, hierarchical architecture for a multimodular LMR

    International Nuclear Information System (INIS)

    Otaduy, P.J.; Brittain, C.R.; Rovere, L.A.

    1989-01-01

    This paper describes the directions and present status of the research in supervisory control for multimodular nuclear plants being conducted at Oak Ridge National Laboratory (ORNL) as part of US Department of Energy's (DOE) Advanced Controls Program. First, the hierarchical supervisory control structure envisioned for a Power Reactor Inherently Safe Module (PRISM) multimodular LMR is discussed. Next, the architecture of the supervisory module closest to the process actuators and its implementation for demonstration in a network of CPU's are presented. 12 refs., 3 figs

  4. Cellular Decomposition Based Hybrid-Hierarchical Control Systems with Applications to Flight Management Systems

    Science.gov (United States)

    Caines, P. E.

    1999-01-01

    The work in this research project has been focused on the construction of a hierarchical hybrid control theory which is applicable to flight management systems. The motivation and underlying philosophical position for this work has been that the scale, inherent complexity and the large number of agents (aircraft) involved in an air traffic system imply that a hierarchical modelling and control methodology is required for its management and real time control. In the current work the complex discrete or continuous state space of a system with a small number of agents is aggregated in such a way that discrete (finite state machine or supervisory automaton) controlled dynamics are abstracted from the system's behaviour. High level control may then be either directly applied at this abstracted level, or, if this is in itself of significant complexity, further layers of abstractions may be created to produce a system with an acceptable degree of complexity at each level. By the nature of this construction, high level commands are necessarily realizable at lower levels in the system.

  5. A multi-mode operation control strategy for flexible microgrid based on sliding-mode direct voltage and hierarchical controls.

    Science.gov (United States)

    Zhang, Qinjin; Liu, Yancheng; Zhao, Youtao; Wang, Ning

    2016-03-01

    Multi-mode operation and transient stability are two problems that significantly affect flexible microgrid (MG). This paper proposes a multi-mode operation control strategy for flexible MG based on a three-layer hierarchical structure. The proposed structure is composed of autonomous, cooperative, and scheduling controllers. Autonomous controller is utilized to control the performance of the single micro-source inverter. An adaptive sliding-mode direct voltage loop and an improved droop power loop based on virtual negative impedance are presented respectively to enhance the system disturbance-rejection performance and the power sharing accuracy. Cooperative controller, which is composed of secondary voltage/frequency control and phase synchronization control, is designed to eliminate the voltage/frequency deviations produced by the autonomous controller and prepare for grid connection. Scheduling controller manages the power flow between the MG and the grid. The MG with the improved hierarchical control scheme can achieve seamless transitions from islanded to grid-connected mode and have a good transient performance. In addition the presented work can also optimize the power quality issues and improve the load power sharing accuracy between parallel VSIs. Finally, the transient performance and effectiveness of the proposed control scheme are evaluated by theoretical analysis and simulation results. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  6. Analyzing security protocols in hierarchical networks

    DEFF Research Database (Denmark)

    Zhang, Ye; Nielson, Hanne Riis

    2006-01-01

    Validating security protocols is a well-known hard problem even in a simple setting of a single global network. But a real network often consists of, besides the public-accessed part, several sub-networks and thereby forms a hierarchical structure. In this paper we first present a process calculus...... capturing the characteristics of hierarchical networks and describe the behavior of protocols on such networks. We then develop a static analysis to automate the validation. Finally we demonstrate how the technique can benefit the protocol development and the design of network systems by presenting a series...

  7. Flexible Access Control for Dynamic Collaborative Environments

    NARCIS (Netherlands)

    Dekker, M.A.C.

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect

  8. Optical hierarchical control of the nuclear power plant using the PPA

    International Nuclear Information System (INIS)

    Yamagishi, Yasuaki; Tsuji, Masashi; Ogawa, Yuichi

    1986-01-01

    Optimization of a large-scale system is a very difficult task due to the requirement of an extremely large amount of calculation. One effective way to avoid the difficulty is to divide the system into a number of subsystems and carry out the optimization calculation with each subsystem allowing mutual cooperation among the subsystems to meet the need to optimize the whole system. When an algorithm based on the dividing method is realized in the parallel multi-processor system instead of the conventional computor of series type operation, the efficiency of calculation will be largely improved. In this paper, using the PPA (Parallel Processor Array) located in the ''General Purpose Simulator Facility'' of this school, and utilizing the hierarchical structure which is furnished within the PPA system, we prepare a software for the multilevel optimization system, and confirm the effectiveness of the hierarchical algorithm. We then, using the prepared algorithm, design the optimal control of the primary system of two loop PWR power plant, and confirmed the effectiveness of the designed optimal control. (author)

  9. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  10. Hierarchical Control and Skilled Typing: Evidence for Word-Level Control over the Execution of Individual Keystrokes

    Science.gov (United States)

    Crump, Matthew J. C.; Logan, Gordon D.

    2010-01-01

    Routine actions are commonly assumed to be controlled by hierarchically organized processes and representations. In the domain of typing theories, word-level information is assumed to activate the constituent keystrokes required to type each letter in a word. We tested this assumption directly using a novel single-letter probe technique. Subjects…

  11. Hierarchical Control Architecture for Demand Response in Smart Grid Scenario

    DEFF Research Database (Denmark)

    Bhattarai, Bishnu Prasad; Bak-Jensen, Birgitte; Mahat, Pukar

    2013-01-01

    , a number of issues, including DR enabling technologies, control strategy, and control architecture, are still under discussion. This paper outlines novel control requirements based on the categorization of existing DR techniques. More specifically, the roles and responsibilities of smart grid actors...... effective tool for optimum asset utilization and to avoid or delay the need for new infrastructure investment. Furthermore, most of the power networks are under the process of reconfiguration to realize the concept of smart grid and are at the transforming stage to support various forms of DR. However...... for every DR category are allotted and their mode of interactions to coordinate individual as well as coordinative goals is described. Next, hierarchical control architecture (HCA) is developed for the overall coordination of control strategies for individual DR categories. The involved issues are discussed...

  12. Frequency Stability of Hierarchically Controlled Hybrid Photovoltaic-Battery-Hydropower Microgrids

    DEFF Research Database (Denmark)

    Guan, Yajuan; Quintero, Juan Carlos Vasquez; Guerrero, Josep M.

    2015-01-01

    -based local grid is supplied. In this case, the PV-battery system will operate as a PQ bus to inject the desired active and reactive powers to local grid, while the hydropower station will act as a slack bus which maintains its voltage amplitude and frequency. An integrated small-signal state-space model......, a hierarchical controller for hybrid PV-battery-hydropower microgrid is proposed in order to achieve the parallel operation of hydropower and PV-battery system with different rates, and to guarantee power sharing performance among PV voltage controlled inverters, while the required power to hydropower...

  13. Hierarchical LiFePO4 with a controllable growth of the (010) facet for lithium-ion batteries.

    Science.gov (United States)

    Guo, Binbin; Ruan, Hongcheng; Zheng, Cheng; Fei, Hailong; Wei, Mingdeng

    2013-09-27

    Hierarchically structured LiFePO4 was successfully synthesized by ionic liquid solvothermal method. These hierarchically structured LiFePO4 samples were constructed from nanostructured platelets with their (010) facets mainly exposed. To the best of our knowledge, facet control of a hierarchical LiFePO4 crystal has not been reported yet. Based on a series of experimental results, a tentative mechanism for the formation of these hierarchical structures was proposed. After these hierarchically structured LiFePO4 samples were coated with a thin carbon layer and used as cathode materials for lithium-ion batteries, they exhibited excellent high-rate discharge capability and cycling stability. For instance, a capacity of 95% can be maintained for the LiFePO4 sample at a rate as high as 20 C, even after 1000 cycles.

  14. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    as an important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control...... decisions but is also suitable for applications where access to resources is controlled by exploiting contents of the resources in the policy....

  15. An enhanced hierarchical control strategy for the Internet of Things-based home scale microgrid

    DEFF Research Database (Denmark)

    Guan, Yajuan; Quintero, Juan Carlos Vasquez; Guerrero, Josep M.

    2017-01-01

    As the intelligent control and detection technology improving, more and more smart devices/sensors can be used to increase the living standard. In order to integrate the Internet of Things (IoT) with microgrid (MG), an enhanced hierarchical control strategy for IoT-based home scale MG is proposed...

  16. A Hierarchically Micro-Meso-Macroporous Zeolite CaA for Methanol Conversion to Dimethyl Ether

    Directory of Open Access Journals (Sweden)

    Yan Wang

    2016-11-01

    Full Text Available A hierarchical zeolite CaA with microporous, mesoporous and macroporous structure was hydrothermally synthesized by a ”Bond-Blocking” method using organo-functionalized mesoporous silica (MS as a silica source. The characterization by XRD, SEM/TEM and N2 adsorption/desorption techniques showed that the prepared material had well-crystalline zeolite Linde Type A (LTA topological structure, microspherical particle morphologies, and hierarchically intracrystalline micro-meso-macropores structure. With the Bond-Blocking principle, the external surface area and macro-mesoporosity of the hierarchical zeolite CaA can be adjusted by varying the organo-functionalized degree of the mesoporous silica surface. Similarly, the distribution of the micro-meso-macroporous structure in the zeolite CaA can be controlled purposely. Compared with the conventional microporous zeolite CaA, the hierarchical zeolite CaA as a catalyst in the conversion of methanol to dimethyl ether (DME, exhibited complete DME selectivity and stable catalytic activity with high methanol conversion. The catalytic performances of the hierarchical zeolite CaA results clearly from the micro-meso-macroporous structure, improving diffusion properties, favoring the access to the active surface and avoiding secondary reactions (no hydrocarbon products were detected after 3 h of reaction.

  17. Joint control algorithm in access network

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To deal with long probing delay and inaccurate probing results in the endpoint admission control method,a joint local and end-to-end admission control algorithm is proposed,which introduces local probing of access network besides end-to-end probing.Through local probing,the algorithm accurately estimated the resource status of the access network.Simulation shows that this algorithm can improve admission control performance and reduce users' average waiting time when the access network is heavily loaded.

  18. Integrating Attributes into Role-Based Access Control

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    of research recently. We propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that takes into account the current contextual information while making the access control decisions....

  19. Hierarchical-control-based output synchronization of coexisting attractor networks

    International Nuclear Information System (INIS)

    Yun-Zhong, Song; Yi-Fa, Tang

    2010-01-01

    This paper introduces the concept of hierarchical-control-based output synchronization of coexisting attractor networks. Within the new framework, each dynamic node is made passive at first utilizing intra-control around its own arena. Then each dynamic node is viewed as one agent, and on account of that, the solution of output synchronization of coexisting attractor networks is transformed into a multi-agent consensus problem, which is made possible by virtue of local interaction between individual neighbours; this distributed working way of coordination is coined as inter-control, which is only specified by the topological structure of the network. Provided that the network is connected and balanced, the output synchronization would come true naturally via synergy between intra and inter-control actions, where the Tightness is proved theoretically via convex composite Lyapunov functions. For completeness, several illustrative examples are presented to further elucidate the novelty and efficacy of the proposed scheme. (general)

  20. Fabrication of Superhydrophobic Surface with Controlled Wetting Property by Hierarchical Particles.

    Science.gov (United States)

    Xu, Jianxiong; Liu, Weiwei; Du, Jingjing; Tang, Zengmin; Xu, Lijian; Li, Na

    2015-04-01

    Hierarchical particles were prepared by synthetically joining appropriately functionalized polystyrene spheres of poly[styrene-co-(3-(4-vinylphenyl)pentane-2,4-dione)] (PS-co-PVPD) nanoparticles and poly(styrene-co-chloromethylstyrene) (PS-co-PCMS) microparticles. The coupling reaction of nucleophilic substitution of pendent β-diketone groups with benzyl chloride was used to form the hierarchical particles. Since the polymeric nanoparticles and microparticles were synthesized by dispersion polymerization and emulsion polymerization, respectively, both the core microparticles and the surface nanoparticles can be different size and chemical composition. By means of changing the size of the PS-co-PVPD surface nanoparticles, a series of hierarchical particles with different scale ratio of the micro/nano surface structure were successfully prepared. Moreover, by employing the PS-co-PVPD microparticles and PS-co-PCMS nanoparticles as building blocks, hierarchical particles with surface nanoaprticles of different composition were made. These as-prepared hierarchical particles were subsequently assembled on glass substrates to form particulate films. Contact angle measurement shows that superhydrophobic surfaces can be obtained and the contact angle of water on the hierarchically structured surface can be adjusted by the scale ratio of the micro/nano surface structure and surface chemical component of hierarchical particles.

  1. Micromechanics of hierarchical materials

    DEFF Research Database (Denmark)

    Mishnaevsky, Leon, Jr.

    2012-01-01

    A short overview of micromechanical models of hierarchical materials (hybrid composites, biomaterials, fractal materials, etc.) is given. Several examples of the modeling of strength and damage in hierarchical materials are summarized, among them, 3D FE model of hybrid composites...... with nanoengineered matrix, fiber bundle model of UD composites with hierarchically clustered fibers and 3D multilevel model of wood considered as a gradient, cellular material with layered composite cell walls. The main areas of research in micromechanics of hierarchical materials are identified, among them......, the investigations of the effects of load redistribution between reinforcing elements at different scale levels, of the possibilities to control different material properties and to ensure synergy of strengthening effects at different scale levels and using the nanoreinforcement effects. The main future directions...

  2. HiPS - Hierarchical Progressive Survey Version 1.0

    Science.gov (United States)

    Fernique, Pierre; Allen, Mark; Boch, Thomas; Donaldson, Tom; Durand, Daniel; Ebisawa, Ken; Michel, Laurent; Salgado, Jesus; Stoehr, Felix; Fernique, Pierre

    2017-05-01

    This document presents HiPS, a hierarchical scheme for the description, storage and access of sky survey data. The system is based on hierarchical tiling of sky regions at finer and finer spatial resolution which facilitates a progressive view of a survey, and supports multi-resolution zooming and panning. HiPS uses the HEALPix tessellation of the sky as the basis for the scheme and is implemented as a simple file structure with a direct indexing scheme that leads to practical implementations.

  3. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  4. Control Strategies for Islanded Microgrid using Enhanced Hierarchical Control Structure with Multiple Current-Loop Damping Schemes

    DEFF Research Database (Denmark)

    Han, Yang; Shen, Pan; Zhao, Xin

    2017-01-01

    In this paper, the modeling, controller design, and stability analysis of the islanded microgrid (MG) using enhanced hierarchical control structure with multiple current loop damping schemes is proposed. The islanded MG is consisted of the parallel-connected voltage source inverters using LCL...... output filters, and the proposed control structure includes: the primary control with additional phase-shift loop, the secondary control for voltage amplitude and frequency restoration, the virtual impedance loops which contains virtual positive- and negative-sequence impedance loops at fundamental...... frequency, and virtual variable harmonic impedance loop at harmonic frequencies, and the inner voltage and current loop controllers. A small-signal model for the primary and secondary controls with additional phase-shift loop is presented, which shows an over-damped feature from eigenvalue analysis...

  5. An Attribute Based Access Control Framework for Healthcare System

    Science.gov (United States)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  6. Access control and service-oriented architectures

    NARCIS (Netherlands)

    Leune, C.J.

    2007-01-01

    Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the

  7. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  8. Morphology-controlled hydrothermal synthesis of MnCO3 hierarchical superstructures with Schiff base as stabilizer

    International Nuclear Information System (INIS)

    Hu, He; Xu, Jie-yan; Yang, Hong; Liang, Jie; Yang, Shiping; Wu, Huixia

    2011-01-01

    Graphical abstract: MnCO3 microcrystals with hierarchical superstructures were synthesized by using the CO2 in atmosphere as carbonate ions source and Schiff base as shape guiding-agent in water/ethanol system under hydrothermal condition. Highlights: → The most interesting in this work is the use of the greenhouse gases CO 2 in atmosphere as carbonate ions source to precipitate with Mn 2+ for producing MnCO 3 crystals. → This work is the first report related to the small organic molecule Schiff base as shape guiding-agent to produce different MnCO 3 hierarchical superstructures. → We are controllable synthesis of the MnCO 3 hierarchical superstructures such as chrysanthemum, straw-bundle, dumbbell and sphere-like microcrystals. → The as-prepared MnCO 3 could be used precursor to fabricate the Mn 2 O 3 hierarchical superstructures after thermal decomposition at high temperature. -- Abstract: MnCO 3 with hierarchical superstructures such as chrysanthemum, straw-bundle, dumbbell and sphere-like were synthesized in water/ethanol system under environment-friendly hydrothermal condition. In the synthesis process, the CO 2 in atmosphere was used as the source of carbonate ions and Schiff base was used as shape guiding-agent. The different superstructures of MnCO 3 could be obtained by controlling the hydrothermal temperature, the molar ratio of manganous ions to the Schiff base, or the volume ratio of water to ethanol. A tentative growth mechanism for the generation of MnCO 3 superstructures was proposed based on the rod-dumbbell-sphere model. Furthermore, the MnCO 3 as precursor could be further successfully transferred to Mn 2 O 3 microstructure after heating in the atmosphere at 500 o C, and the morphology of the Mn 2 O 3 was directly determined by that of the MnCO 3 precursor.

  9. A Hierarchical Control Scheme for Reactive Power and Harmonic Current Sharing in Islanded Microgrids

    DEFF Research Database (Denmark)

    Lorzadeh, Iman; Firoozabadi, Mehdi Savaghebi; Askarian Abyaneh, Hossein

    2015-01-01

    In this paper, a hierarchical control scheme consisting of primary and secondary levels is proposed for achieving accurate reactive power and harmonic currents sharing among interface inverters of distributed generators (DGs) in islanded microgrids. Firstly, fundamental and main harmonic componen...

  10. Internet advertising effectiveness by using hierarchical model

    OpenAIRE

    RAHMANI, Samaneh

    2015-01-01

    Abstract. Present paper has been developed with the title of internet advertising effectiveness by using hierarchical model. Presenting the question: Today Internet is an important channel in marketing and advertising. The reason for this could be the ability of the Internet to reduce costs and people’s access to online services[1]. Also advertisers can easily access a multitude of users and communicate with them at low cost [9]. On the other hand, compared to traditional advertising, interne...

  11. The Revised Hierarchical Model: A critical review and assessment

    OpenAIRE

    Kroll, Judith F.; van Hell, Janet G.; Tokowicz, Natasha; Green, David W.

    2010-01-01

    Brysbaert and Duyck (2009) suggest that it is time to abandon the Revised Hierarchical Model (Kroll and Stewart, 1994) in favor of connectionist models such as BIA+ (Dijkstra and Van Heuven, 2002) that more accurately account for the recent evidence on nonselective access in bilingual word recognition. In this brief response, we first review the history of the Revised Hierarchical Model (RHM), consider the set of issues that it was proposed to address, and then evaluate the evidence that supp...

  12. Hierarchical Mesoporous Organosilica-Silica Core-Shell Nanoparticles Capable of Controlled Fungicide Release.

    Science.gov (United States)

    Luo, Leilei; Liang, Yucang; Erichsen, Egil Severin; Anwander, Reiner

    2018-05-17

    A new class of hierarchically structured mesoporous silica core-shell nanoparticles (HSMSCSNs) with a periodic mesoporous organosilica (PMO) core and a mesoporous silica (MS) shell is reported. The applied one-pot, two-step strategy allows rational control over the core/shell chemical composition, topology, and pore/particle size, simply by adjusting the reaction conditions in the presence of cetyltrimethylammonium bromide (CTAB) as structure-directing agent under basic conditions. The spherical, ethylene- or methylene-bridged PMO cores feature hexagonal (p6mm) or cage-like cubic symmetry (Pm3‾ n) depending on the organosilica precursor. The hexagonal MS shell was obtained by n-hexane-induced controlled hydrolysis of TEOS followed by directional co-assembly/condensation of silicate/CTAB composites at the PMO cores. The HSMSCSNs feature a hierarchical pore structure with pore diameters of about 2.7 and 5.6 nm in the core and shell domains, respectively. The core sizes and shell thicknesses are adjustable in the ranges of 90-275 and 15-50 nm, respectively, and the surface areas (max. 1300 m 2  g -1 ) and pore volumes (max. 1.83 cm 3  g -1 ) are among the highest reported for core-shell nanoparticles. The adsorption and controlled release of the fungicide propiconazole by the HSMSCSNs showed a three-stage release profile. © 2018 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  13. Time dependent policy-based access control

    DEFF Research Database (Denmark)

    Vasilikos, Panagiotis; Nielson, Flemming; Nielson, Hanne Riis

    2017-01-01

    also on other attributes of the environment such as the time. In this paper, we use systems of Timed Automata to model distributed systems and we present a logic in which one can express time-dependent policies for access control. We show how a fragment of our logic can be reduced to a logic......Access control policies are essential to determine who is allowed to access data in a system without compromising the data's security. However, applications inside a distributed environment may require those policies to be dependent on the actual content of the data, the flow of information, while...... that current model checkers for Timed Automata such as UPPAAL can handle and we present a translator that performs this reduction. We then use our translator and UPPAAL to enforce time-dependent policy-based access control on an example application from the aerospace industry....

  14. Hierarchical tailoring of strut architecture to control permeability of additive manufactured titanium implants

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Z. [Department of Materials, Imperial College London, South Kensington Campus, London, SW7 2AZ (United Kingdom); Jones, D. [School of Engineering, University of Liverpool, Brownlow Hill, Liverpool, L69 3GH (United Kingdom); Yue, S. [Manchester X-ray Imaging Facility, School of Materials, The University of Manchester, Oxford Road, M13 9PL (United Kingdom); Lee, P.D., E-mail: peter.lee@manchester.ac.uk [Manchester X-ray Imaging Facility, School of Materials, The University of Manchester, Oxford Road, M13 9PL (United Kingdom); Jones, J.R. [Department of Materials, Imperial College London, South Kensington Campus, London, SW7 2AZ (United Kingdom); Sutcliffe, C.J. [School of Engineering, University of Liverpool, Brownlow Hill, Liverpool, L69 3GH (United Kingdom); Jones, E. [Department of Advanced Technology, Stryker Orthopaedics, Raheen Business Park, Limerick (Ireland)

    2013-10-15

    Porous titanium implants are a common choice for bone augmentation. Implants for spinal fusion and repair of non-union fractures must encourage blood flow after implantation so that there is sufficient cell migration, nutrient and growth factor transport to stimulate bone ingrowth. Additive manufacturing techniques allow a large number of pore network designs. This study investigates how the design factors offered by selective laser melting technique can be used to alter the implant architecture on multiple length scales to control and even tailor the flow. Permeability is a convenient parameter that characterises flow, correlating to structure openness (interconnectivity and pore window size), tortuosity and hence flow shear rates. Using experimentally validated computational simulations, we demonstrate how additive manufacturing can be used to tailor implant properties by controlling surface roughness at a microstructual level (microns), and by altering the strut ordering and density at a mesoscopic level (millimetre). Highlights: • Experimentally validated permeability prediction tools for hierarchical implants. • Randomised structures form preferential flow channels with stronger shear flows. • Hierarchical strut structures allow independent tailoring of flow and pore size.

  15. Hierarchical tailoring of strut architecture to control permeability of additive manufactured titanium implants

    International Nuclear Information System (INIS)

    Zhang, Z.; Jones, D.; Yue, S.; Lee, P.D.; Jones, J.R.; Sutcliffe, C.J.; Jones, E.

    2013-01-01

    Porous titanium implants are a common choice for bone augmentation. Implants for spinal fusion and repair of non-union fractures must encourage blood flow after implantation so that there is sufficient cell migration, nutrient and growth factor transport to stimulate bone ingrowth. Additive manufacturing techniques allow a large number of pore network designs. This study investigates how the design factors offered by selective laser melting technique can be used to alter the implant architecture on multiple length scales to control and even tailor the flow. Permeability is a convenient parameter that characterises flow, correlating to structure openness (interconnectivity and pore window size), tortuosity and hence flow shear rates. Using experimentally validated computational simulations, we demonstrate how additive manufacturing can be used to tailor implant properties by controlling surface roughness at a microstructual level (microns), and by altering the strut ordering and density at a mesoscopic level (millimetre). Highlights: • Experimentally validated permeability prediction tools for hierarchical implants. • Randomised structures form preferential flow channels with stronger shear flows. • Hierarchical strut structures allow independent tailoring of flow and pore size

  16. Hierarchical Control Strategy for Active Hydropneumatic Suspension Vehicles Based on Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Jinzhi Feng

    2015-02-01

    Full Text Available A new hierarchical control strategy for active hydropneumatic suspension systems is proposed. This strategy considers the dynamic characteristics of the actuator. The top hierarchy controller uses a combined control scheme: a genetic algorithm- (GA- based self-tuning proportional-integral-derivative controller and a fuzzy logic controller. For practical implementations of the proposed control scheme, a GA-based self-learning process is initiated only when the defined performance index of vehicle dynamics exceeds a certain debounce time threshold. The designed control algorithm is implemented on a virtual prototype and cosimulations are performed with different road disturbance inputs. Cosimulation results show that the active hydropneumatic suspension system designed in this study significantly improves riding comfort characteristics of vehicles. The robustness and adaptability of the proposed controller are also examined when the control system is subjected to extremely rough road conditions.

  17. Hierarchically nanostructured hydroxyapatite: hydrothermal synthesis, morphology control, growth mechanism, and biological activity

    Directory of Open Access Journals (Sweden)

    Ma MG

    2012-04-01

    Full Text Available Ming-Guo MaInstitute of Biomass Chemistry and Technology, College of Materials Science and Technology, Beijing Forestry University, Beijing, People's Republic of ChinaAbstract: Hierarchically nanosized hydroxyapatite (HA with flower-like structure assembled from nanosheets consisting of nanorod building blocks was successfully synthesized by using CaCl2, NaH2PO4, and potassium sodium tartrate via a hydrothermal method at 200°C for 24 hours. The effects of heating time and heating temperature on the products were investigated. As a chelating ligand and template molecule, the potassium sodium tartrate plays a key role in the formation of hierarchically nanostructured HA. On the basis of experimental results, a possible mechanism based on soft-template and self-assembly was proposed for the formation and growth of the hierarchically nanostructured HA. Cytotoxicity experiments indicated that the hierarchically nanostructured HA had good biocompatibility. It was shown by in-vitro experiments that mesenchymal stem cells could attach to the hierarchically nanostructured HA after being cultured for 48 hours.Objective: The purpose of this study was to develop facile and effective methods for the synthesis of novel hydroxyapatite (HA with hierarchical nanostructures assembled from independent and discrete nanobuilding blocks.Methods: A simple hydrothermal approach was applied to synthesize HA by using CaCl2, NaH2PO4, and potassium sodium tartrate at 200°C for 24 hours. The cell cytotoxicity of the hierarchically nanostructured HA was tested by MTT (3-(4,5-dimethylthiazol-2-yl-2,5-diphenyltetrazolium bromide assay.Results: HA displayed the flower-like structure assembled from nanosheets consisting of nanorod building blocks. The potassium sodium tartrate was used as a chelating ligand, inducing the formation and self-assembly of HA nanorods. The heating time and heating temperature influenced the aggregation and morphology of HA. The cell viability did

  18. Energy Management Systems and tertiary regulation in hierarchical control architectures for islanded micro-grids

    DEFF Research Database (Denmark)

    Sanseverino, Eleonora Riva; Di Silvestre, Maria Luisa; Quang, Ninh Nguyen

    2015-01-01

    In this paper, the structure of the highest level of a hierarchical control architecture for micro-grids is proposed. Such structure includes two sub-levels: the Energy Management System, EMS, and the tertiary regulation. The first devoted to energy resources allocation in each time slot based...

  19. Access control within military C4ISR systems

    Science.gov (United States)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  20. Hierarchically nanostructured hydroxyapatite: hydrothermal synthesis, morphology control, growth mechanism, and biological activity

    Science.gov (United States)

    Ma, Ming-Guo

    2012-01-01

    Hierarchically nanosized hydroxyapatite (HA) with flower-like structure assembled from nanosheets consisting of nanorod building blocks was successfully synthesized by using CaCl2, NaH2PO4, and potassium sodium tartrate via a hydrothermal method at 200°C for 24 hours. The effects of heating time and heating temperature on the products were investigated. As a chelating ligand and template molecule, the potassium sodium tartrate plays a key role in the formation of hierarchically nanostructured HA. On the basis of experimental results, a possible mechanism based on soft-template and self-assembly was proposed for the formation and growth of the hierarchically nanostructured HA. Cytotoxicity experiments indicated that the hierarchically nanostructured HA had good biocompatibility. It was shown by in-vitro experiments that mesenchymal stem cells could attach to the hierarchically nanostructured HA after being cultured for 48 hours. Objective The purpose of this study was to develop facile and effective methods for the synthesis of novel hydroxyapatite (HA) with hierarchical nanostructures assembled from independent and discrete nanobuilding blocks. Methods A simple hydrothermal approach was applied to synthesize HA by using CaCl2, NaH2PO4, and potassium sodium tartrate at 200°C for 24 hours. The cell cytotoxicity of the hierarchically nanostructured HA was tested by MTT (3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide) assay. Results HA displayed the flower-like structure assembled from nanosheets consisting of nanorod building blocks. The potassium sodium tartrate was used as a chelating ligand, inducing the formation and self-assembly of HA nanorods. The heating time and heating temperature influenced the aggregation and morphology of HA. The cell viability did not decrease with the increasing concentration of hierarchically nanostructured HA added. Conclusion A novel, simple and reliable hydrothermal route had been developed for the synthesis of

  1. Habits as action sequences: hierarchical action control and changes in outcome value.

    Science.gov (United States)

    Dezfouli, Amir; Lingawi, Nura W; Balleine, Bernard W

    2014-11-05

    Goal-directed action involves making high-level choices that are implemented using previously acquired action sequences to attain desired goals. Such a hierarchical schema is necessary for goal-directed actions to be scalable to real-life situations, but results in decision-making that is less flexible than when action sequences are unfolded and the decision-maker deliberates step-by-step over the outcome of each individual action. In particular, from this perspective, the offline revaluation of any outcomes that fall within action sequence boundaries will be invisible to the high-level planner resulting in decisions that are insensitive to such changes. Here, within the context of a two-stage decision-making task, we demonstrate that this property can explain the emergence of habits. Next, we show how this hierarchical account explains the insensitivity of over-trained actions to changes in outcome value. Finally, we provide new data that show that, under extended extinction conditions, habitual behaviour can revert to goal-directed control, presumably as a consequence of decomposing action sequences into single actions. This hierarchical view suggests that the development of action sequences and the insensitivity of actions to changes in outcome value are essentially two sides of the same coin, explaining why these two aspects of automatic behaviour involve a shared neural structure. © 2014 The Author(s) Published by the Royal Society. All rights reserved.

  2. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  3. Geospacial information utilized under the access control strategy

    Institute of Scientific and Technical Information of China (English)

    TIAN Jie; ZHANG Xin-fang; WANG Tong-yang; XIANG Wei; Cheng Ming

    2007-01-01

    This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a spacial data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated.

  4. Access control mechanism of wireless gateway based on open flow

    Science.gov (United States)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  5. Distributed hierarchical control architecture for integrating smart grid assets during normal and disrupted operations

    Science.gov (United States)

    Kalsi, Karan; Fuller, Jason C.; Somani, Abhishek; Pratt, Robert G.; Chassin, David P.; Hammerstrom, Donald J.

    2017-09-12

    Disclosed herein are representative embodiments of methods, apparatus, and systems for facilitating operation and control of a resource distribution system (such as a power grid). Among the disclosed embodiments is a distributed hierarchical control architecture (DHCA) that enables smart grid assets to effectively contribute to grid operations in a controllable manner, while helping to ensure system stability and equitably rewarding their contribution. Embodiments of the disclosed architecture can help unify the dispatch of these resources to provide both market-based and balancing services.

  6. Content sensitivity based access control framework for Hadoop

    Directory of Open Access Journals (Sweden)

    T.K. Ashwin Kumar

    2017-11-01

    Full Text Available Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misuse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attributes in a dataset or the user’s role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and information sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead.

  7. Hierarchical Control for Optimal and Distributed Operation of Microgrid Systems

    DEFF Research Database (Denmark)

    Meng, Lexuan

    manages the power flow with external grids, while the economic and optimal operation of MGs is not guaranteed by applying the existing schemes. Accordingly, this project dedicates to the study of real-time optimization methods for MGs, including the review of optimization algorithms, system level...... mathematical modeling, and the implementation of real-time optimization into existing hierarchical control schemes. Efficiency enhancement in DC MGs and optimal unbalance compensation in AC MGs are taken as the optimization objectives in this project. Necessary system dynamic modeling and stability analysis......, a discrete-time domain modeling method is proposed to establish an accurate system level model. Taking into account the different sampling times of real world plant, digital controller and communication devices, the system is modeled with these three parts separately, and with full consideration...

  8. Access Control Management for SCADA Systems

    Science.gov (United States)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  9. Hierarchically Structured Electrospun Fibers

    Directory of Open Access Journals (Sweden)

    Nicole E. Zander

    2013-01-01

    Full Text Available Traditional electrospun nanofibers have a myriad of applications ranging from scaffolds for tissue engineering to components of biosensors and energy harvesting devices. The generally smooth one-dimensional structure of the fibers has stood as a limitation to several interesting novel applications. Control of fiber diameter, porosity and collector geometry will be briefly discussed, as will more traditional methods for controlling fiber morphology and fiber mat architecture. The remainder of the review will focus on new techniques to prepare hierarchically structured fibers. Fibers with hierarchical primary structures—including helical, buckled, and beads-on-a-string fibers, as well as fibers with secondary structures, such as nanopores, nanopillars, nanorods, and internally structured fibers and their applications—will be discussed. These new materials with helical/buckled morphology are expected to possess unique optical and mechanical properties with possible applications for negative refractive index materials, highly stretchable/high-tensile-strength materials, and components in microelectromechanical devices. Core-shell type fibers enable a much wider variety of materials to be electrospun and are expected to be widely applied in the sensing, drug delivery/controlled release fields, and in the encapsulation of live cells for biological applications. Materials with a hierarchical secondary structure are expected to provide new superhydrophobic and self-cleaning materials.

  10. Hierarchical predictive control scheme for distributed energy storage integrated with residential demand and photovoltaic generation

    NARCIS (Netherlands)

    Lampropoulos, I.; Garoufalis, P.; van den Bosch, P.P.J.; Kling, W.L.

    2015-01-01

    A hierarchical control scheme is defined for the energy management of a battery energy storage system which is integrated in a low-voltage distribution grid with residential customers and photovoltaic installations. The scope is the economic optimisation of the integrated system by employing

  11. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  12. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  13. Controllable fabrication of large-scale hierarchical silver nanostructures for long-term stable and ultrasensitive SERS substrates

    Science.gov (United States)

    Wu, Jing; Fang, Jinghuai; Cheng, Mingfei; Gong, Xiao

    2016-09-01

    In this work, we aim to prepare effective and long-term stable hierarchical silver nanostructures serving as surface-enhanced Raman scattering (SERS) substrates simply via displacement reaction on Aluminum foils. In our experiments, Hexadecyltrimethylammonium bromide (CTAB) is used as cationic surfactant to control the velocity of displacement reaction as well as the hierarchical morphology of the resultant. We find that the volume ratio of CTAB to AgNO3 plays a dominant role in regulating the hierarchical structures besides the influence of displacement reaction time. These as-prepared hierarchical morphologies demonstrate excellent SERS sensitivity, structural stability and reproducibility with low values of relative standard deviation less than 20 %. The high SERS analytical enhancement factor of ~6.7 × 108 is achieved even at the concentration of Crystal Violet (CV) as low as 10-7 M, which is sufficient for single-molecule detection. The detection limit of CV is 10-9 M in this study. We believe that this simple and rapid approach integrating advantages of low-cost production and high reproducibility would be a promising way to facilitate routine SERS detection and will get wide applications in chemical synthesis.

  14. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  15. Microgrid Central Controller Development and Hierarchical Control Implementation in the Intelligent MicroGrid Lab of Aalborg University

    DEFF Research Database (Denmark)

    Meng, Lexuan; Savaghebi, Mehdi; Andrade, Fabio

    2015-01-01

    This paper presents the development of a microgrid central controller in an inverter-based intelligent microgrid (iMG) lab in Aalborg University, Denmark. The iMG lab aims to provide a flexible experimental platform for comprehensive studies of microgrids. The complete control system applied...... in this lab is based on the hierarchical control scheme for microgrids and includes primary, secondary and tertiary control. The structure of the lab, including the lab facilities, configurations and communication network, is first introduced. Primary control loops are developed in MATLAB....../Simulink and compiled to dSPACEs for local control purposes. In order to realize system supervision and proper secondary and tertiary management, a LabVIEW-based microgrid central controller is also developed. The software and hardware schemes are described. An example case is introduced and tested in the iMG lab...

  16. Controller synthesis for dynamic hierarchical real-time plants using timed automata

    DEFF Research Database (Denmark)

    Bin Waez, Md Tawhid; Wasowski, Andrzej; Dingel, Juergen

    2017-01-01

    We use timed I/O automata based timed games to synthesize task-level reconfiguration services for cost-effective fault tolerance in a case study. The case study shows that state-space explosion is a severe problem for timed games. By applying suitable abstractions, we dramatically improve...... the scalability. However, timed I/O automata do not facilitate algorithmic abstraction generation techniques. The case study motivates the development of timed process automata to improve modeling and analysis for controller synthesis of time-critical plants which can be hierarchical and dynamic. The model offers...

  17. Dynamically Authorized Role-Based Access Control for Grid Applications

    Institute of Scientific and Technical Information of China (English)

    YAO Hanbing; HU Heping; LU Zhengding; LI Ruixuan

    2006-01-01

    Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations". The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user's environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.

  18. Automation of control and analysis of execution of official duties and instructions in the hierarchical organization

    Directory of Open Access Journals (Sweden)

    Demchenko A.I.

    2017-01-01

    Full Text Available The article considers the problem of monitoring over execution of official duties of employees. This problem is characteristic of the enterprises having a hierarchical management structure. The functions and the modes of monitoring are defined, the types of analysis of the staff activities are provided. The description of the program complex allowing distributing functions and instructions for between the employees is given. The developed computer program allows tracking the performance, creating reports. The computer program has a demarcation of access rights and provides the can be operated in both local, and a large-scale network.

  19. Analysis hierarchical model for discrete event systems

    Science.gov (United States)

    Ciortea, E. M.

    2015-11-01

    The This paper presents the hierarchical model based on discrete event network for robotic systems. Based on the hierarchical approach, Petri network is analysed as a network of the highest conceptual level and the lowest level of local control. For modelling and control of complex robotic systems using extended Petri nets. Such a system is structured, controlled and analysed in this paper by using Visual Object Net ++ package that is relatively simple and easy to use, and the results are shown as representations easy to interpret. The hierarchical structure of the robotic system is implemented on computers analysed using specialized programs. Implementation of hierarchical model discrete event systems, as a real-time operating system on a computer network connected via a serial bus is possible, where each computer is dedicated to local and Petri model of a subsystem global robotic system. Since Petri models are simplified to apply general computers, analysis, modelling, complex manufacturing systems control can be achieved using Petri nets. Discrete event systems is a pragmatic tool for modelling industrial systems. For system modelling using Petri nets because we have our system where discrete event. To highlight the auxiliary time Petri model using transport stream divided into hierarchical levels and sections are analysed successively. Proposed robotic system simulation using timed Petri, offers the opportunity to view the robotic time. Application of goods or robotic and transmission times obtained by measuring spot is obtained graphics showing the average time for transport activity, using the parameters sets of finished products. individually.

  20. Hierarchical Nanoceramics for Industrial Process Sensors

    Energy Technology Data Exchange (ETDEWEB)

    Ruud, James, A.; Brosnan, Kristen, H.; Striker, Todd; Ramaswamy, Vidya; Aceto, Steven, C.; Gao, Yan; Willson, Patrick, D.; Manoharan, Mohan; Armstrong, Eric, N., Wachsman, Eric, D.; Kao, Chi-Chang

    2011-07-15

    This project developed a robust, tunable, hierarchical nanoceramics materials platform for industrial process sensors in harsh-environments. Control of material structure at multiple length scales from nano to macro increased the sensing response of the materials to combustion gases. These materials operated at relatively high temperatures, enabling detection close to the source of combustion. It is anticipated that these materials can form the basis for a new class of sensors enabling widespread use of efficient combustion processes with closed loop feedback control in the energy-intensive industries. The first phase of the project focused on materials selection and process development, leading to hierarchical nanoceramics that were evaluated for sensing performance. The second phase focused on optimizing the materials processes and microstructures, followed by validation of performance of a prototype sensor in a laboratory combustion environment. The objectives of this project were achieved by: (1) synthesizing and optimizing hierarchical nanostructures; (2) synthesizing and optimizing sensing nanomaterials; (3) integrating sensing functionality into hierarchical nanostructures; (4) demonstrating material performance in a sensing element; and (5) validating material performance in a simulated service environment. The project developed hierarchical nanoceramic electrodes for mixed potential zirconia gas sensors with increased surface area and demonstrated tailored electrocatalytic activity operable at high temperatures enabling detection of products of combustion such as NOx close to the source of combustion. Methods were developed for synthesis of hierarchical nanostructures with high, stable surface area, integrated catalytic functionality within the structures for gas sensing, and demonstrated materials performance in harsh lab and combustion gas environments.

  1. Speed-Accuracy Trade-Off in Skilled Typewriting: Decomposing the Contributions of Hierarchical Control Loops

    Science.gov (United States)

    Yamaguchi, Motonori; Crump, Matthew J. C.; Logan, Gordon D.

    2013-01-01

    Typing performance involves hierarchically structured control systems: At the higher level, an outer loop generates a word or a series of words to be typed; at the lower level, an inner loop activates the keystrokes comprising the word in parallel and executes them in the correct order. The present experiments examined contributions of the outer-…

  2. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  3. Activate distributed energy resources' services: Hierarchical voltage controller as an application

    DEFF Research Database (Denmark)

    Han, Xue; Kosek, Anna Magdalena; Gehrke, Oliver

    2014-01-01

    The flexibilities from controllable distributed energy resources (DERs) offer the opportunities to mitigate some of the operation problems in the power distribution grid. The provision of system services requires the aggregation and coordination of their flexibilities, in order to obtain the flex......The flexibilities from controllable distributed energy resources (DERs) offer the opportunities to mitigate some of the operation problems in the power distribution grid. The provision of system services requires the aggregation and coordination of their flexibilities, in order to obtain...... the flexible capacity of large scale. In this paper, a hierarchical controller is presented to activate the aggregation, and tries to obtain a global optimum of the grid operation. A distribution grid with large penetration of highly varying generation or load is under the risk that the voltage quality...... delivered to the end users is very poor. Hence, a coordinated voltage control function is investigated given such control hierarchy utilizing the flexibilities from the DER units to obtain an optimal voltage profile along the distribution feeder. The results are two folded: the controller enables...

  4. Task-role-based Access Control Model in Smart Health-care System

    OpenAIRE

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  5. Smart microgrid hierarchical frequency control ancillary service provision based on virtual inertia concept: An integrated demand response and droop controlled distributed generation framework

    International Nuclear Information System (INIS)

    Rezaei, Navid; Kalantar, Mohsen

    2015-01-01

    Highlights: • Detailed formulation of the microgrid static and dynamic securities based on droop control and virtual inertia concepts. • Constructing a novel objective function using frequency excursion and rate of change of frequency profiles. • Ensuring the microgrid security subject to the microgrid economic and environmental policies. • Coordinated management of demand response and droop controlled distributed generation resources. • Precise scheduling of day-ahead hierarchical frequency control ancillary services using a scenario based stochastic programming. - Abstract: Low inertia stack, high penetration levels of renewable energy source and great ratio of power deviations in a small power delivery system put microgrid frequency at risk of instability. On the basis of the close coupling between the microgrid frequency and system security requirements, procurement of adequate ancillary services from cost-effective and environmental friendly resources is a great challenge requests an efficient energy management system. Motivated by this need, this paper presents a novel energy management system that is aimed to coordinately manage the demand response and distributed generation resources. The proposed approach is carried out by constructing a hierarchical frequency control structure in which the frequency dependent control functions of the microgrid components are modeled comprehensively. On the basis of the derived modeling, both the static and dynamic frequency securities of an islanded microgrid are provided in primary and secondary control levels. Besides, to cope with the low inertia stack of islanded microgrids, novel virtual inertia concept is devised based on the precise modeling of droop controlled distributed generation resources. The proposed approach is applied to typical test microgrid. Energy and hierarchical reserve resource are scheduled precisely using a scenario-based stochastic programming methodology. Moreover, analyzing the

  6. Flexible System Integration and Advanced Hierarchical Control Architectures in the Microgrid Research Laboratory of Aalborg University

    DEFF Research Database (Denmark)

    Meng, Lexuan; Hernández, Adriana Carolina Luna; Diaz, Enrique Rodriguez

    2016-01-01

    This paper presents the system integration and hierarchical control implementation in an inverter-based microgrid research laboratory (MGRL) in Aalborg University, Denmark. MGRL aims to provide a flexible experimental platform for comprehensive studies of microgrids. The structure of the laborato...

  7. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...... common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker’s actions usually will be logged as permissible, standard actions—if they are logged at all....... Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...

  8. Disk access controller for Multi 8 computer

    International Nuclear Information System (INIS)

    Segalard, Jean

    1970-01-01

    After having presented the initial characteristics and weaknesses of the software provided for the control of a memory disk coupled with a Multi 8 computer, the author reports the development and improvement of this controller software. He presents the different constitutive parts of the computer and the operation of the disk coupling and of the direct access to memory. He reports the development of the disk access controller: software organisation, loader, subprograms and statements

  9. Requirements for implementing real-time control functional modules on a hierarchical parallel pipelined system

    Science.gov (United States)

    Wheatley, Thomas E.; Michaloski, John L.; Lumia, Ronald

    1989-01-01

    Analysis of a robot control system leads to a broad range of processing requirements. One fundamental requirement of a robot control system is the necessity of a microcomputer system in order to provide sufficient processing capability.The use of multiple processors in a parallel architecture is beneficial for a number of reasons, including better cost performance, modular growth, increased reliability through replication, and flexibility for testing alternate control strategies via different partitioning. A survey of the progression from low level control synchronizing primitives to higher level communication tools is presented. The system communication and control mechanisms of existing robot control systems are compared to the hierarchical control model. The impact of this design methodology on the current robot control systems is explored.

  10. The linked medical data access control framework.

    Science.gov (United States)

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios. Copyright © 2014 Elsevier Inc. All rights reserved.

  11. Multiple-Time-Scales Hierarchical Frequency Stability Control Strategy of Medium-Voltage Isolated Microgrid

    DEFF Research Database (Denmark)

    Zhao, Zhuoli; Yang, Ping; Guerrero, Josep M.

    2016-01-01

    In this paper, an islanded medium-voltage (MV) microgrid placed in Dongao Island is presented, which integrates renewable-energy-based distributed generations (DGs), energy storage system (ESS), and local loads. In an isolated microgrid without connection to the main grid to support the frequency......, it is more complex to control and manage. Thus in order to maintain the frequency stability in multiple-time-scales, a hierarchical control strategy is proposed. The proposed control architecture divides the system frequency in three zones: (A) stable zone, (B) precautionary zone and (C) emergency zone...... of Zone B. Theoretical analysis, time-domain simulation and field test results under various conditions and scenarios in the Dongao Island microgrid are presented to prove the validity of the introduced control strategy....

  12. A distributed hierarchical architecture of expert systems for supervisory control of multimodular nuclear reactors

    International Nuclear Information System (INIS)

    Otaduy, P.J.; Brittain, C.R.; Rovere, L.A.; Gove, N.B.

    1991-01-01

    A hierarchical supervisory control architecture has being implemented at ORNL to coordinate the controllers of a multimodular nuclear plant. The supervisory controller form a network of distributed expert system interfaced with a real-time simulation of the plant, the plant's automatic controllers, and the human operator. The main goal of the supervisory controllers is to maintain the plant operating within safety envelopes while optimizing availability, minimizing stress to components and operators, and facilitating operations. Representative rules implementing strategies for situation dependent reassignment of process goals by embedding diagnostics into the control philosophy are discussed. It should noted that the control philosophies here described use the ALMR concept for illustration purposes and are not part of the official ALMR design at this time. 3 refs., 1 fig

  13. Nearly Cyclic Pursuit and its Hierarchical variant for Multi-agent Systems

    DEFF Research Database (Denmark)

    Iqbal, Muhammad; Leth, John-Josef; Ngo, Trung Dung

    2015-01-01

    The rendezvous problem for multiple agents under nearly cyclic pursuit and hierarchical nearly cyclic pursuit is discussed in this paper. The control law designed under nearly cyclic pursuit strategy enables the agents to converge at a point dictated by a beacon. A hierarchical version of the nea......The rendezvous problem for multiple agents under nearly cyclic pursuit and hierarchical nearly cyclic pursuit is discussed in this paper. The control law designed under nearly cyclic pursuit strategy enables the agents to converge at a point dictated by a beacon. A hierarchical version...

  14. Access control based on attribute certificates for medical intranet applications.

    Science.gov (United States)

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  15. Intelligent Hierarchical Modal Control of a Novel Manipulator with Slewing and Deployable Links

    Science.gov (United States)

    Modi, V. J.; Zhang, J.; de Silva, C. W.

    1. Introduction The Space Shuttle based Canada arm has vividly demonstrated its application in launching of satellites as well as retrieval of disabled spacecraft for repair. There have been proposals for free flying robotic systems with appropriate instrumentation to monitor health of spacecraft, identify problems and even perform corrective measures. Most of these applications involve multilink manipulators with revolute joints for which there is a vast body of literature [1]. On the other hand, manipulators with revolute as well as prismatic joints, permitting slewing as well as deployment/retrieval of links, have received relatively little attention [2]. Such variable geometry, snake-like manipulators have distinct advantages of reduced coupling effects leading to simpler equations of motion and inverse kinematics, less number of singularity conditions, and ease of obstacle avoidance [3]. 2. Hierarchical Structure The control system developed for the deployable manipulator has a three-level structure. This hierarchical structure takes the advantages of a crisp controller; specially, a modal controller, with those of a soft, knowledge-based, supervisory control . The overall structure can be separated and developed as three main layers. The first layer is the lowest layer of the control system. It deals with information coming from sensors attached to the plant ( manipulator). This type of information is characterized by a large amount of individual data points of high resolution, produced and collected at high frequency. The crisp controller that is used is a state feedback regulator with its feedback gain matrix determined using the eigenstructure assignment approach. The data processing for monitoring and evaluation of the system performance occurs in this intermediate or second layer. Here high-resolution, crisp data from sensors are filtered to afford representation of the current state of the manipulator. This servo-expert layer acts as an interface

  16. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  17. Role Based Access Control system in the ATLAS experiment

    International Nuclear Information System (INIS)

    Valsan, M L; Dumitru, I; Darlea, G L; Bujor, F; Dobson, M; Miotto, G Lehmann; Schlenker, S; Avolio, G; Scannicchio, D A; Filimonov, V; Khomoutnikov, V; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Twomey, M

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  18. The Revised Hierarchical Model: A critical review and assessment

    NARCIS (Netherlands)

    Kroll, J.F.; Hell, J.G. van; Tokowicz, N.; Green, D.W.

    2010-01-01

    Brysbaert and Duyck (this issue) suggest that it is time to abandon the Revised Hierarchical Model (Kroll and Stewart, 1994) in favor of connectionist models such as BIA+ (Dijkstra and Van Heuven, 2002) that more accurately account for the recent evidence on non-selective access in bilingual word

  19. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  20. Ensemble-based hierarchical multi-objective production optimization of smart wells

    NARCIS (Netherlands)

    Fonseca, R.M.; Leeuwenburgh, O.; Hof, P.M.J. Van den; Jansen, J.D.

    2014-01-01

    In an earlier study, two hierarchical multiobjective methods were suggested to include short-term targets in life-cycle production optimization. However, this earlier study has two limitations: (1) the adjoint formulation is used to obtain gradient information, requiring simulator source code access

  1. Ensemble-based hierarchical multi-objective production optimization of smart wells

    NARCIS (Netherlands)

    Fonseca, R.M.; Leeuwenburgh, O.; Van den Hof, P.M.J.; Jansen, J.D.

    2014-01-01

    In an earlier study two hierarchical multi-objective methods were suggested to include short-term targets in life-cycle production optimization. However this earlier study has two limitations: 1) the adjoint formulation is used to obtain gradient information, requiring simulator source code access

  2. Role Based Access Control system in the ATLAS experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  3. Role Based Access Control System in the ATLAS Experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  4. Hierarchical control of motor units in voluntary contractions.

    Science.gov (United States)

    De Luca, Carlo J; Contessa, Paola

    2012-01-01

    For the past five decades there has been wide acceptance of a relationship between the firing rate of motor units and the afterhyperpolarization of motoneurons. It has been promulgated that the higher-threshold, larger-soma, motoneurons fire faster than the lower-threshold, smaller-soma, motor units. This relationship was based on studies on anesthetized cats with electrically stimulated motoneurons. We questioned its applicability to motor unit control during voluntary contractions in humans. We found that during linearly force-increasing contractions, firing rates increased as exponential functions. At any time and force level, including at recruitment, the firing rate values were inversely related to the recruitment threshold of the motor unit. The time constants of the exponential functions were directly related to the recruitment threshold. From the Henneman size principle it follows that the characteristics of the firing rates are also related to the size of the soma. The "firing rate spectrum" presents a beautifully simple control scheme in which, at any given time or force, the firing rate value of earlier-recruited motor units is greater than that of later-recruited motor units. This hierarchical control scheme describes a mechanism that provides an effective economy of force generation for the earlier-recruited lower force-twitch motor units, and reduces the fatigue of later-recruited higher force-twitch motor units-both characteristics being well suited for generating and sustaining force during the fight-or-flight response.

  5. Hierarchical Brokering with Feedback Control Framework in Mobile Device-Centric Clouds

    Directory of Open Access Journals (Sweden)

    Chao-Lieh Chen

    2016-01-01

    Full Text Available We propose a hierarchical brokering architecture (HiBA and Mobile Multicloud Networking (MMCN feedback control framework for mobile device-centric cloud (MDC2 computing. Exploiting the MMCN framework and RESTful web-based interconnection, each tier broker probes resource state of its federation for control and management. Real-time and seamless services were developed. Case studies including intrafederation energy-aware balancing based on fuzzy feedback control and higher tier load balancing are further demonstrated to show how HiBA with MMCN relieves the embedding of algorithms when developing services. Theoretical performance model and real-world experiments both show that an MDC2 based on HiBA features better quality in terms of resource availability and network latency if it federates devices with enough resources distributed in lower tier hierarchy. The proposed HiBA realizes a development platform for MDC2 computing which is a feasible solution to User-Centric Networks (UCNs.

  6. STAR-TYPE LOCAL AREA NETWORK ACCESS CONTROL

    Institute of Scientific and Technical Information of China (English)

    逯昭义; 齐藤忠夫

    1990-01-01

    The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.

  7. Electroactive nanoparticle directed assembly of functionalized graphene nanosheets into hierarchical structures with hybrid compositions for flexible supercapacitors

    Science.gov (United States)

    Choi, Bong Gill; Huh, Yun Suk; Hong, Won Hi; Erickson, David; Park, Ho Seok

    2013-04-01

    Hierarchical structures of hybrid materials with the controlled compositions have been shown to offer a breakthrough for energy storage and conversion. Here, we report the integrative assembly of chemically modified graphene (CMG) building blocks into hierarchical complex structures with the hybrid composition for high performance flexible pseudocapacitors. The formation mechanism of hierarchical CMG/Nafion/RuO2 (CMGNR) microspheres, which is triggered by the cooperative interplay during the in situ synthesis of RuO2 nanoparticles (NPs), was extensively investigated. In particular, the hierarchical CMGNR microspheres consisting of the aggregates of CMG/Nafion (CMGN) nanosheets and RuO2 NPs provided large surface area and facile ion accessibility to storage sites, while the interconnected nanosheets offered continuous electron pathways and mechanical integrity. The synergistic effect of CMGNR hybrids on the supercapacitor (SC) performance was derived from the hybrid composition of pseudocapacitive RuO2 NPs with the conductive CMGNs as well as from structural features. Consequently, the CMGNR-SCs showed a specific capacitance as high as 160 F g-1, three-fold higher than that of conventional graphene SCs, and a capacitance retention of >95% of the maximum value even after severe bending and 1000 charge-discharge tests due to the structural and compositional features.Hierarchical structures of hybrid materials with the controlled compositions have been shown to offer a breakthrough for energy storage and conversion. Here, we report the integrative assembly of chemically modified graphene (CMG) building blocks into hierarchical complex structures with the hybrid composition for high performance flexible pseudocapacitors. The formation mechanism of hierarchical CMG/Nafion/RuO2 (CMGNR) microspheres, which is triggered by the cooperative interplay during the in situ synthesis of RuO2 nanoparticles (NPs), was extensively investigated. In particular, the hierarchical CMGNR

  8. Role based access control design using Triadic concept analysis

    Institute of Scientific and Technical Information of China (English)

    Ch Aswani Kumar; S Chandra Mouliswaran; LI Jin-hai; C Chandrasekar

    2016-01-01

    Role based access control is one of the widely used access control models. There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis (FCA), description logics, and Ontology for representing access control mechanism. However, while using FCA, investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts. This transformation is mainly to derive the formal concepts, lattice structure and implications to represent role hierarchy and constraints of RBAC. In this work, we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts. Our discussion is on two lines of inquiry. We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature.

  9. Resilient control of cyber-physical systems against intelligent attacker: a hierarchal stackelberg game approach

    Science.gov (United States)

    Yuan, Yuan; Sun, Fuchun; Liu, Huaping

    2016-07-01

    This paper is concerned with the resilient control under denial-of-service attack launched by the intelligent attacker. The resilient control system is modelled as a multi-stage hierarchical game with a corresponding hierarchy of decisions made at cyber and physical layer, respectively. Specifically, the interaction in the cyber layer between different security agents is modelled as a static infinite Stackelberg game, while in the underlying physical layer the full-information H∞ minimax control with package drops is modelled as a different Stackelberg game. Both games are solved sequentially, which is consistent with the actual situations. Finally, the proposed method is applied to the load frequency control of the power system, which demonstrates its effectiveness.

  10. Active Power Quality Improvement Strategy for Grid-connected Microgrid Based on Hierarchical Control

    DEFF Research Database (Denmark)

    Wei, Feng; Sun, Kai; Guan, Yajuan

    2018-01-01

    proposes an active, unbalanced, and harmonic GCC suppression strategy based on hierarchical theory. The voltage error between the bus of the DCGC-MG and the grid’s PCC was transformed to the dq frame. On the basis of the grid, an additional compensator, which consists of multiple resonant voltage......When connected to a distorted grid utility, droop-controlled grid-connected microgrids (DCGC-MG) exhibit low equivalent impedance. The harmonic and unbalanced voltage at the point of common coupling (PCC) deteriorates the power quality of the grid-connected current (GCC) of DCGC-MG. This work...... regulators, was then added to the original secondary control to generate the negative fundamental and unbalanced harmonic voltage reference. Proportional integral and multiple resonant controllers were adopted as voltage controller at the original primary level to improve the voltage tracking performance...

  11. Multiple bottlenecks in hierarchical control of action sequences: what does "response selection" select in skilled typewriting?

    Science.gov (United States)

    Yamaguchi, Motonori; Logan, Gordon D; Li, Vanessa

    2013-08-01

    Does response selection select words or letters in skilled typewriting? Typing performance involves hierarchically organized control processes: an outer loop that controls word level processing, and an inner loop that controls letter (or keystroke) level processing. The present study addressed whether response selection occurs in the outer loop or the inner loop by using the psychological refractory period (PRP) paradigm in which Task1 required typing single words and Task2 required vocal responses to tones. The number of letters (string length) in the words was manipulated to discriminate selection of words from selection of keystrokes. In Experiment 1, the PRP effect depended on string length of words in Task1, suggesting that response selection occurs in the inner loop. To assess contributions of the outer loop, the influence of string length was examined in a lexical-decision task that also involves word encoding and lexical access (Experiment 2), or to-be-typed words were preexposed so outer-loop processing could finish before typing started (Experiment 3). Response time for Task2 (RT2) did not depend on string length with lexical decision, and RT2 still depended on string length with typing preexposed strings. These results support the inner-loop locus of the PRP effect. In Experiment 4, typing was performed as Task2, and the effect of string length on typing RT interacted with stimulus onset asynchrony superadditively, implying that another bottleneck also exists in the outer loop. We conclude that there are at least two bottleneck processes in skilled typewriting. 2013 APA, all rights reserved

  12. Owner-Based Role-Based Access Control OB-RBAC

    NARCIS (Netherlands)

    Saffarian, M.; Sadighi, Babak

    Administration of an access control model deals with the question of who is authorized to update policies defined on the basis of that model. One of the models whose administration has absorbed relatively large research is the Role-Based Access Control (RBAC) model. All the existing role-based

  13. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  14. Towards an Approach of Semantic Access Control for Cloud Computing

    Science.gov (United States)

    Hu, Luokai; Ying, Shi; Jia, Xiangyang; Zhao, Kai

    With the development of cloud computing, the mutual understandability among distributed Access Control Policies (ACPs) has become an important issue in the security field of cloud computing. Semantic Web technology provides the solution to semantic interoperability of heterogeneous applications. In this paper, we analysis existing access control methods and present a new Semantic Access Control Policy Language (SACPL) for describing ACPs in cloud computing environment. Access Control Oriented Ontology System (ACOOS) is designed as the semantic basis of SACPL. Ontology-based SACPL language can effectively solve the interoperability issue of distributed ACPs. This study enriches the research that the semantic web technology is applied in the field of security, and provides a new way of thinking of access control in cloud computing.

  15. Effects of a GPC-PID control strategy with hierarchical structure for a cooling coil unit

    International Nuclear Information System (INIS)

    Xu Min; Li Shaoyuan; Cai Wenjian; Lu Lu

    2006-01-01

    This paper presents a GPC-PID control strategy for a cooling-coil unit in heating, ventilation and air conditioning systems. By analysis of the cooling towers and chillers, different models in the occupied period are considered in each operating condition. Because of the complication of components, well tuned PID controllers are unsatisfied, and the results are poor over a wide range of operation conditions. To solve this problem, a GPC-PID controller with hierarchical structure is proposed based on minimizing the generalized predictive control criterion to tune conventional PID controller parameters. Simulation and experiments show that the proposed controller is able to deal with a wide range of operating conditions and to achieve better performance than conventional methods

  16. METHOD AND ABSTRACT MODEL FOR CONTROL AND ACCESS RIGHTS BY REQUESTS REDIRECTION

    Directory of Open Access Journals (Sweden)

    K. A. Shcheglov

    2015-11-01

    Full Text Available We have researched implementation problems of control and access rights of subjects to objects in modern computer systems. We have suggested access control method based on objects access requests redirection. The method possesses a distinctive feature as compared to discretional access control. In case when a subject needs to deny writing (object modification, it is not denied but redirected (access rights are not changed, but operation is performed with another object. This gives the possibility to implement access policies to system objects without breaking the system and applications operability, and share correctly access objects between subjects. This important property of suggested access control method enables to solve fundamentally new system objects securing problems like system resources virtualization aimed to protect system objects from users’ and applications attacks. We have created an abstract model, and it shows that this method (access control from subjects to objects based on requests redirection can be used as self-sufficient access control method, implementing any access control policy (from subjects to objects, thus being an alternative to discretional access control method.

  17. Hierarchical Control Design for Shipboard Power System with DC Distribution and Energy Storage aboard Future More-Electric Ships

    DEFF Research Database (Denmark)

    Jin, Zheming; Meng, Lexuan; Guerrero, Josep M.

    2018-01-01

    power system (SPS) with DC distribution and energy storage system (ESS) is picked as study case. To meet the requirement of control and management of such a large-scale mobile power system, a hierarchical control design is proposed in this paper. In order to fully exploit the benefit of ESS, as well...

  18. Making Statistical Data More Easily Accessible on the Web Results of the StatSearch Case Study

    CERN Document Server

    Rajman, M; Boynton, I M; Fridlund, B; Fyhrlund, A; Sundgren, B; Lundquist, P; Thelander, H; Wänerskär, M

    2005-01-01

    In this paper we present the results of the StatSearch case study that aimed at providing an enhanced access to statistical data available on the Web. In the scope of this case study we developed a prototype of an information access tool combining a query-based search engine with semi-automated navigation techniques exploiting the hierarchical structuring of the available data. This tool enables a better control of the information retrieval, improving the quality and ease of the access to statistical information. The central part of the presented StatSearch tool consists in the design of an algorithm for automated navigation through a tree-like hierarchical document structure. The algorithm relies on the computation of query related relevance score distributions over the available database to identify the most relevant clusters in the data structure. These most relevant clusters are then proposed to the user for navigation, or, alternatively, are the support for the automated navigation process. Several appro...

  19. Task-and-role-based access-control model for computational grid

    Institute of Scientific and Technical Information of China (English)

    LONG Tao; HONG Fan; WU Chi; SUN Ling-li

    2007-01-01

    Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.

  20. Exporting Variables in a Hierarchically Distributed Control System

    Energy Technology Data Exchange (ETDEWEB)

    Chamizo Llatas, M

    1995-07-01

    We describe the Remote Variable Access Service (RVAS), a network service developed and used in the distributed control and monitoring system of the TJ-II Heliac, which is under construction at CIEMAT (Madrid, Spain) and devoted to plasma studies in the nuclear fusion field. The architecture of the TJ-II control system consists of one central Sun workstation Sparc 10 and several autonomous subsystems based on VME crates with embedded processors running the OS-9 (V.24) real time operating system. The RVAS service allows state variables in local control processes running in subsystems to be exported to remote processes running in the central control workstation. Thus we extend the concept of exporting of file systems in UNIX machines to variables in processes running in different machines. (Author) 6 refs.

  1. Exporting Variables in a Hierarchically Distributed Control System

    International Nuclear Information System (INIS)

    Diaz Martin; Martinez Laso, L.

    1995-01-01

    We describe the Remote Variable Access Service (RVAS), a network service developed and use in the distributed control and monitoring system of the TJ-II Heliac, which is under construction at CIEMAT (Madrid, Spain) and devoted to plasma studies in the nuclear fusion field. The architecture of the TJ-II control system consists of one central Sun workstation Sparc 10 and several autonomous subsystems based on VME crates with embedded processors running the os-9 (V.24) real time operating system. The RVAS service allows state variables in local control processes running in subsystems to be exported to remote processes running in the central control workstation. Thus we extend the concept of exporting of file systems in UNIX machines to variables in processes running in different machines. (Author)

  2. Exporting Variables in a Hierarchically Distributed Control System

    International Nuclear Information System (INIS)

    Chamizo Llatas, M.

    1995-01-01

    We describe the Remote Variable Access Service (RVAS), a network service developed and used in the distributed control and monitoring system of the TJ-II Heliac, which is under construction at CIEMAT (Madrid, Spain) and devoted to plasma studies in the nuclear fusion field. The architecture of the TJ-II control system consists of one central Sun workstation Sparc 10 and several autonomous subsystems based on VME crates with embedded processors running the OS-9 (V.24) real time operating system. The RVAS service allows state variables in local control processes running in subsystems to be exported to remote processes running in the central control workstation. Thus we extend the concept of exporting of file systems in UNIX machines to variables in processes running in different machines. (Author) 6 refs

  3. Distributed Role-based Access Control for Coaliagion Application

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; ZHU Xian; XING Guanglin

    2005-01-01

    Access control in multi-domain environments is one of the important questions of building coalition between domains.On the basis of RBAC access control model, the concepts of role delegation and role mapping are proposed, which support the third-party authorization.Then, a distributed RBAC model is presented.Finally the implementation issues are discussed.

  4. XACML to build access control policies for Internet of Things

    OpenAIRE

    Atlam, Hany F.; Alassafi, Madini, Obad; Alenezi, Ahmed; Walters, Robert; Wills, Gary

    2018-01-01

    Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an ef...

  5. An application-layer based centralized information access control for VPN

    Institute of Scientific and Technical Information of China (English)

    OUYANG Kai; ZHOU Jing-li; XIA Tao; YU Sheng-sheng

    2006-01-01

    With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the internal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that ifone vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem.To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC-the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC's constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.

  6. Kinetically Controlled Synthesis of Pt-Based One-Dimensional Hierarchically Porous Nanostructures with Large Mesopores as Highly Efficient ORR Catalysts.

    Science.gov (United States)

    Fu, Shaofang; Zhu, Chengzhou; Song, Junhua; Engelhard, Mark H; Xia, Haibing; Du, Dan; Lin, Yuehe

    2016-12-28

    Rational design and construction of Pt-based porous nanostructures with large mesopores have triggered significant considerations because of their high surface area and more efficient mass transport. Hydrochloric acid-induced kinetically controlled reduction of metal precursors in the presence of soft template F-127 and hard template tellurium nanowires has been successfully demonstrated to construct one-dimensional hierarchical porous PtCu alloy nanostructures with large mesopores. Moreover, the electrochemical experiments demonstrated that the PtCu hierarchically porous nanostructures synthesized under optimized conditions exhibit enhanced electrocatalytic performance for oxygen reduction reaction in acid media.

  7. Review of Active and Reactive Power Sharing Strategies in Hierarchical Controlled Microgrids

    DEFF Research Database (Denmark)

    Han, Yang; Li, Hong; Shen, Pan

    2017-01-01

    Microgrids consist of multiple parallel-connected distributed generation (DG) units with coordinated control strategies, which are able to operate in both grid-connected and islanded mode. Microgrids are attracting more and more attention since they can alleviate the stress of main transmission...... systems, reduce feeder losses, and improve system power quality. When the islanded microgrids are concerned, it is important to maintain system stability and achieve load power sharing among the multiple parallel-connected DG units. However, the poor active and reactive power sharing problems due...... in this paper for active power sharing. Moreover, nonlinear and unbalanced loads could further affect the reactive power sharing when regulating the active power, and it is difficult to share the reactive power accurately only by using the enhanced virtual impedance method. Therefore, the hierarchical control...

  8. A Theorem on Grid Access Control

    Institute of Scientific and Technical Information of China (English)

    XU ZhiWei(徐志伟); BU GuanYing(卜冠英)

    2003-01-01

    The current grid security research is mainly focused on the authentication of grid systems. A problem to be solved by grid systems is to ensure consistent access control. This problem is complicated because the hosts in a grid computing environment usually span multiple autonomous administrative domains. This paper presents a grid access control model, based on asynchronous automata theory and the classic Bell-LaPadula model. This model is useful to formally study the confidentiality and integrity problems in a grid computing environment. A theorem is proved, which gives the necessary and sufficient conditions to a grid to maintain confidentiality.These conditions are the formalized descriptions of local (node) relations or relationship between grid subjects and node subjects.

  9. How Drug Control Policy and Practice Undermine Access to Controlled Medicines.

    Science.gov (United States)

    Burke-Shyne, Naomi; Csete, Joanne; Wilson, Duncan; Fox, Edward; Wolfe, Daniel; Rasanathan, Jennifer J K

    2017-06-01

    Drug conventions serve as the cornerstone for domestic drug laws and impose a dual obligation upon states to prevent the misuse of controlled substances while ensuring their adequate availability for medical and scientific purposes. Despite the mandate that these obligations be enforced equally, the dominant paradigm enshrined in the drug conventions is an enforcement-heavy criminal justice response to controlled substances that prohibits and penalizes their misuse. Prioritizing restrictive control is to the detriment of ensuring adequate availability of and access to controlled medicines, thereby violating the rights of people who need them. This paper argues that the drug conventions' prioritization of criminal justice measures-including efforts to prevent non-medical use of controlled substances-undermines access to medicines and infringes upon the right to health and the right to enjoy the benefits of scientific progress. While the effects of criminalization under drug policy limit the right to health in multiple ways, we draw on research and documented examples to highlight the impact of drug control and criminalization on access to medicines. The prioritization and protection of human rights-specifically the right to health and the right to enjoy the benefits of scientific progress-are critical to rebalancing drug policy.

  10. Partitioning,Automation and Error Recovery in the Control and Monitoring System of an LHC Experiment

    Institute of Scientific and Technical Information of China (English)

    C.Gaspar

    2001-01-01

    The Joint Controls Project(JCOP)is a collaboration between CERN and the four LHC experiments to find and implement common solutions for their control and monitoring systems.As part of this project and Architecture Working Group was set up in order to study the requirements and devise an architectural model that would suit the four experiments.Many issues were studied by this working group:Alarm handling,Access Control,Hierarchical Control,etc.This paper will report on the specific issue of hierarchical control and in particular partitioning,automation and error recovery.

  11. Hierarchical ordering with partial pairwise hierarchical relationships on the macaque brain data sets.

    Directory of Open Access Journals (Sweden)

    Woosang Lim

    Full Text Available Hierarchical organizations of information processing in the brain networks have been known to exist and widely studied. To find proper hierarchical structures in the macaque brain, the traditional methods need the entire pairwise hierarchical relationships between cortical areas. In this paper, we present a new method that discovers hierarchical structures of macaque brain networks by using partial information of pairwise hierarchical relationships. Our method uses a graph-based manifold learning to exploit inherent relationship, and computes pseudo distances of hierarchical levels for every pair of cortical areas. Then, we compute hierarchy levels of all cortical areas by minimizing the sum of squared hierarchical distance errors with the hierarchical information of few cortical areas. We evaluate our method on the macaque brain data sets whose true hierarchical levels are known as the FV91 model. The experimental results show that hierarchy levels computed by our method are similar to the FV91 model, and its errors are much smaller than the errors of hierarchical clustering approaches.

  12. Numerical study of magneto-optical traps through a hierarchical tree method

    International Nuclear Information System (INIS)

    Oliveira, R.S. de; Raposo, E.P.; Vianna, S.S.

    2004-01-01

    We approach the problem of N atoms in a magneto-optical trap through a hierarchical tree method, using an algorithm originally developed by Barnes and Hut (BH) in the astrophysical context. Such an algorithm numerically takes care of the particle-particle interaction by controlling the approximation level in a way that offers more physical fidelity than the mean-field treatment and considerably less time consumption (τ∼N log 10 N in the hierarchical BH method, in contrast with the τ∼N 2 and τ∼N 3/2 dependences found in direct and mean-field approaches, respectively). Our results reproduce the experimentally reported single-ring orbital mode for N 6 atoms and also find indication of a double-ring structure for N∼10 7 , a situation mimicked by a N=10 6 system with enhanced radiative force, in agreement with experimental observations. We stress that this high-density regime is not accessed by direct integration of the equations of motion, due to the enormous computing times required, and is not suitably described through mean-field approaches, due to the rather unphysical enhancement of the particle-particle interactions and the presence of a spurious numerical grid dependence

  13. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  14. A conceptual modeling framework for discrete event simulation using hierarchical control structures

    Science.gov (United States)

    Furian, N.; O’Sullivan, M.; Walker, C.; Vössner, S.; Neubacher, D.

    2015-01-01

    Conceptual Modeling (CM) is a fundamental step in a simulation project. Nevertheless, it is only recently that structured approaches towards the definition and formulation of conceptual models have gained importance in the Discrete Event Simulation (DES) community. As a consequence, frameworks and guidelines for applying CM to DES have emerged and discussion of CM for DES is increasing. However, both the organization of model-components and the identification of behavior and system control from standard CM approaches have shortcomings that limit CM’s applicability to DES. Therefore, we discuss the different aspects of previous CM frameworks and identify their limitations. Further, we present the Hierarchical Control Conceptual Modeling framework that pays more attention to the identification of a models’ system behavior, control policies and dispatching routines and their structured representation within a conceptual model. The framework guides the user step-by-step through the modeling process and is illustrated by a worked example. PMID:26778940

  15. A conceptual modeling framework for discrete event simulation using hierarchical control structures.

    Science.gov (United States)

    Furian, N; O'Sullivan, M; Walker, C; Vössner, S; Neubacher, D

    2015-08-01

    Conceptual Modeling (CM) is a fundamental step in a simulation project. Nevertheless, it is only recently that structured approaches towards the definition and formulation of conceptual models have gained importance in the Discrete Event Simulation (DES) community. As a consequence, frameworks and guidelines for applying CM to DES have emerged and discussion of CM for DES is increasing. However, both the organization of model-components and the identification of behavior and system control from standard CM approaches have shortcomings that limit CM's applicability to DES. Therefore, we discuss the different aspects of previous CM frameworks and identify their limitations. Further, we present the Hierarchical Control Conceptual Modeling framework that pays more attention to the identification of a models' system behavior, control policies and dispatching routines and their structured representation within a conceptual model. The framework guides the user step-by-step through the modeling process and is illustrated by a worked example.

  16. Strategy Implementation through Hierarchical Couplings in a Management Control Package: An Explorative Case Study

    OpenAIRE

    van der Kolk, Berend; Schokker, Tom

    2016-01-01

    We examine how couplings of management control (MC) elements help to implement an organization’s strategy. Despite prior research stating that couplings between MC elements form fruitful soil for further research, empirical studies in this area are still scarce. We draw on coupling theory to explore three hierarchical relations between MC elements, and examine how these couplings help to implement the organization’s strategy. We conducted a single case study in a medium-sized Dutch municipali...

  17. Foundation for a Time Interval Access Control Model

    National Research Council Canada - National Science Library

    Afinidad, Francis B; Levin, Timothy E; Irvine, Cynthia E; Nguyen, Thuy D

    2005-01-01

    A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects and objects, and a time interval access graph...

  18. Advances in Applications of Hierarchical Bayesian Methods with Hydrological Models

    Science.gov (United States)

    Alexander, R. B.; Schwarz, G. E.; Boyer, E. W.

    2017-12-01

    Mechanistic and empirical watershed models are increasingly used to inform water resource decisions. Growing access to historical stream measurements and data from in-situ sensor technologies has increased the need for improved techniques for coupling models with hydrological measurements. Techniques that account for the intrinsic uncertainties of both models and measurements are especially needed. Hierarchical Bayesian methods provide an efficient modeling tool for quantifying model and prediction uncertainties, including those associated with measurements. Hierarchical methods can also be used to explore spatial and temporal variations in model parameters and uncertainties that are informed by hydrological measurements. We used hierarchical Bayesian methods to develop a hybrid (statistical-mechanistic) SPARROW (SPAtially Referenced Regression On Watershed attributes) model of long-term mean annual streamflow across diverse environmental and climatic drainages in 18 U.S. hydrological regions. Our application illustrates the use of a new generation of Bayesian methods that offer more advanced computational efficiencies than the prior generation. Evaluations of the effects of hierarchical (regional) variations in model coefficients and uncertainties on model accuracy indicates improved prediction accuracies (median of 10-50%) but primarily in humid eastern regions, where model uncertainties are one-third of those in arid western regions. Generally moderate regional variability is observed for most hierarchical coefficients. Accounting for measurement and structural uncertainties, using hierarchical state-space techniques, revealed the effects of spatially-heterogeneous, latent hydrological processes in the "localized" drainages between calibration sites; this improved model precision, with only minor changes in regional coefficients. Our study can inform advances in the use of hierarchical methods with hydrological models to improve their integration with stream

  19. Performance estimates for personnel access control systems

    International Nuclear Information System (INIS)

    Bradley, R.G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  20. Controllable hydrothermal synthesis of Ni/H-BEA with a hierarchical core-shell structure and highly enhanced biomass hydrodeoxygenation performance.

    Science.gov (United States)

    Ma, Bing; Cui, Huimei; Wang, Darui; Wu, Peng; Zhao, Chen

    2017-05-11

    Ni based catalysts are wildly used in catalytic industrial processes due to their low costs and high activities. The design of highly hierarchical core-shell structured Ni/HBEA is achieved using a sustainable, simple, and easy-tunable hydrothermal synthesis approach using combined NH 4 Cl and NH 3 ·H 2 O as a co-precipitation agent at 120 °C. Starting from a single-crystalline hierarchical H + -exchanged beta polymorph zeolite (HBEA), the adjustment of the precipitate conditions shows that mixed NH 4 Cl and NH 3 ·H 2 O precipitates with proper concentrations are vital in the hydrothermal synthesis for preserving a good crystalline morphology of HBEA and generating abundant highly-dispersed Ni nanoparticles (loading: 41 wt%, 5.9 ± 0.7 nm) encapsulated onto/into the support. NH 4 Cl solution without an alkali is unable to generate abundant Ni nanoparticles from Ni salts under the hydrothermal conditions, whereas NH 3 ·H 2 O seriously damages the pore structure. After studying the in situ changes in infrared, X-ray diffractometry, temperature-programmed reduction, and scanning electron microscopy measurements, as well as variations in the filtrate pH, Si/Al ratios, and solid sample Ni loading, a two-step dissolution-recrystallization process is proposed. The process consists of Si dissolution and no change in elemental Al, and after the dissolved Si(iv) concentrations have promoted Ni phyllosilicate nanosheet solubility, further growth of multilayered Ni phyllosilicate nanosheets commences. The precursor Ni phyllosilicate is changeable between Ni 3 Si 2 O 5 (OH) 4 and Ni 3 Si 4 O 10 (OH) 2 , because of competition in kinetically-favored and thermodynamically-controlled species caused by different basic agents. The superior catalytic performance is demonstrated in the metal/acid catalyzed biomass derived bulky stearic acid hydrodeoxygenation with 90% octadecane selectivity and a promising rate of 54 g g -1 h -1 , which highly excels the reported rates catalyzed by

  1. Hierarchical energy management system for stand-alone hybrid system based on generation costs and cascade control

    International Nuclear Information System (INIS)

    Torreglosa, J.P.; García, P.; Fernández, L.M.; Jurado, F.

    2014-01-01

    Highlights: • We present an energy management system for a stand-alone WT/PV/hydrogen/battery hybrid system. • Hierarchical control composed by master and slave control strategies. • Control assures reliable electricity support for stand-alone applications subject to technical and economic criteria. - Abstract: This paper presents an energy management system (EMS) for stand-alone hybrid systems composed by photovoltaic (PV) solar panels and a wind turbine (WT) as primary energy sources and two energy storage systems, which are a hydrogen system and a battery. The hydrogen system is composed of fuel cell (FC), electrolyzer and hydrogen storage tank. The EMS is a hierarchical control composed by a master control strategy and a slave control strategy. On the one hand, the master control generates the reference powers to meet several premises (such as to satisfy the load power demand, and to maintain the hydrogen tank level and the state of charge (SOC) of the battery between their target margins), taking also into account economic aspects to discriminate between using the battery or hydrogen system. On the other hand, the slave control modifies the reference powers generated by the master control according to the energy sources dynamic limitations, and maintains the DC bus voltage at its reference value. The models, implemented in MATLAB-Simulink environment, have been developed from commercially available components. To check the viability of the proposed EMS, two kinds of simulations were carried out: (1) A long-term simulation of 25 years (expected lifetime of the system) with a sample time of one hour to validate the master control of the EMS; and (2) A short-term simulation with sudden net power variations to validate the slave control of the EMS

  2. Self-assembled three-dimensional hierarchical graphene/polypyrrole nanotube hybrid aerogel and its application for supercapacitors.

    Science.gov (United States)

    Ye, Shibing; Feng, Jiachun

    2014-06-25

    A three-dimensional hierarchical graphene/polypyrrole aerogel (GPA) has been fabricated using graphene oxide (GO) and already synthesized one-dimensional hollow polypyrrole nanotubes (PNTs) as the feedstock. The amphiphilic GO is helpful in effectively promoting the dispersion of well-defined PNTs to result in a stable, homogeneous GO/PNT complex solution, while the PNTs not only provide a large accessible surface area for fast transport of hydrate ions but also act as spacers to prevent the restacking of graphene sheets. By a simple one-step reduction self-assembly process, hierarchically structured, low-density, highly compressible GPAs are easily obtained, which favorably combine the advantages of graphene and PNTs. The supercapacitor electrodes based on such materials exhibit excellent electrochemical performance, including a high specific capacitance up to 253 F g(-1), good rate performance, and outstanding cycle stability. Moreover, this method may be feasible to prepare other graphene-based hybrid aerogels with structure-controllable nanostructures in large scale, thereby holding enormous potential in many application fields.

  3. Hierarchically Nanostructured Transition Metal Oxides for Lithium‐Ion Batteries

    Science.gov (United States)

    Zheng, Mingbo; Tang, Hao; Li, Lulu; Hu, Qin; Zhang, Li; Xue, Huaiguo

    2018-01-01

    Abstract Lithium‐ion batteries (LIBs) have been widely used in the field of portable electric devices because of their high energy density and long cycling life. To further improve the performance of LIBs, it is of great importance to develop new electrode materials. Various transition metal oxides (TMOs) have been extensively investigated as electrode materials for LIBs. According to the reaction mechanism, there are mainly two kinds of TMOs, one is based on conversion reaction and the other is based on intercalation/deintercalation reaction. Recently, hierarchically nanostructured TMOs have become a hot research area in the field of LIBs. Hierarchical architecture can provide numerous accessible electroactive sites for redox reactions, shorten the diffusion distance of Li‐ion during the reaction, and accommodate volume expansion during cycling. With rapid research progress in this field, a timely account of this advanced technology is highly necessary. Here, the research progress on the synthesis methods, morphological characteristics, and electrochemical performances of hierarchically nanostructured TMOs for LIBs is summarized and discussed. Some relevant prospects are also proposed. PMID:29593962

  4. The Practice of Hospital Intranet Terminal Access Control Solution

    Institute of Scientific and Technical Information of China (English)

    QI Shi-tao; TANG Li-ming

    2016-01-01

    Along with the increasingly urgent management needs of intranet terminals in hospital, and large scaled deployment of terminal management system, terminal access control has become one of the standard functions of terminal management. This paper mainly aims at some simple research for the system construction of hospital intranet terminal access control.

  5. A utility perspective on radiation worker access control systems

    International Nuclear Information System (INIS)

    Watson, B.A.; Goff, T.E.

    1984-01-01

    Based on an evaluation of the current commercial Radiation Worker Access Control Software Systems, Baltimore Gas and Electric Company has elected to design and develop a site specific access control and accountability system for the Calvert Cliffs Nuclear Power Plant. The vendor provided systems allow for radiation worker access control based on training and external exposure records and authorizations. These systems do not afford internal exposure control until after bioassay measurements or maximum permissible concentration-hours are tabulated. The vendor provided systems allow for data trending for ALARA purposes, but each software package must be modified to meet site specific requirements. Unlike the commercial systems, the Calvert Cliffs Radiological Controls and Accountability System (RCAS) will provide radiation worker exposure control, both internal and external. The RCAS is designed to fulfill the requirements by integrating the existing Radiation Safety, Dosemetry, and Training data bases with a comprehensive radiological surveillance program. Prior to each worker's entry into the Radiological Control Area; his training and qualifications, radiation exposure history and authorization, will be compared with administrative controls, such as radiation work permits, and respiratory protection requirements and the radiological conditions in the work area. The RCAS, a computer based applied health physics access control system is described as it is presently configured for development. The mechanisms for enhancing worker internal and external exposure controls are discussed. Proposed data application to both the Calvert Cliffs ALARA and outage planning programs is included

  6. Experience with ActiveX control for simple channel access

    International Nuclear Information System (INIS)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-01-01

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls

  7. The Methods and Mechanisms for Access Control of Encrypted Data in Clouds

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2013-09-01

    Full Text Available The paper is about the problem of data access control in clouds. The main mechanisms for access control of encrypted data in untrusted cloud environments are analyzed and described. The comparative analysis of access control algorithms and implementation issues are offered. The main practical result of research is a web-based (Wikipedia-like reference and information system devoted to the access control methods and mechanisms.

  8. Access Control of Web and Java Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  9. Dynamic modeling and hierarchical compound control of a novel 2-DOF flexible parallel manipulator with multiple actuation modes

    Science.gov (United States)

    Liang, Dong; Song, Yimin; Sun, Tao; Jin, Xueying

    2018-03-01

    This paper addresses the problem of rigid-flexible coupling dynamic modeling and active control of a novel flexible parallel manipulator (PM) with multiple actuation modes. Firstly, based on the flexible multi-body dynamics theory, the rigid-flexible coupling dynamic model (RFDM) of system is developed by virtue of the augmented Lagrangian multipliers approach. For completeness, the mathematical models of permanent magnet synchronous motor (PMSM) and piezoelectric transducer (PZT) are further established and integrated with the RFDM of mechanical system to formulate the electromechanical coupling dynamic model (ECDM). To achieve the trajectory tracking and vibration suppression, a hierarchical compound control strategy is presented. Within this control strategy, the proportional-differential (PD) feedback controller is employed to realize the trajectory tracking of end-effector, while the strain and strain rate feedback (SSRF) controller is developed to restrain the vibration of the flexible links using PZT. Furthermore, the stability of the control algorithm is demonstrated based on the Lyapunov stability theory. Finally, two simulation case studies are performed to illustrate the effectiveness of the proposed approach. The results indicate that, under the redundant actuation mode, the hierarchical compound control strategy can guarantee the flexible PM achieves singularity-free motion and vibration attenuation within task workspace simultaneously. The systematic methodology proposed in this study can be conveniently extended for the dynamic modeling and efficient controller design of other flexible PMs, especially the emerging ones with multiple actuation modes.

  10. Mandatory and Location-Aware Access Control for Relational Databases

    Science.gov (United States)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  11. Microfluidic Droplet-Facilitated Hierarchical Assembly for Dual Cargo Loading and Synergistic Delivery.

    Science.gov (United States)

    Yu, Ziyi; Zheng, Yu; Parker, Richard M; Lan, Yang; Wu, Yuchao; Coulston, Roger J; Zhang, Jing; Scherman, Oren A; Abell, Chris

    2016-04-06

    Bottom-up hierarchical assembly has emerged as an elaborate and energy-efficient strategy for the fabrication of smart materials. Herein, we present a hierarchical assembly process, whereby linear amphiphilic block copolymers are self-assembled into micelles, which in turn are accommodated at the interface of microfluidic droplets via cucurbit[8]uril-mediated host-guest chemistry to form supramolecular microcapsules. The monodisperse microcapsules can be used for simultaneous carriage of both organic (Nile Red) and aqueous-soluble (fluorescein isothiocyanate-dextran) cargo. Furthermore, the well-defined compartmentalized structure benefits from the dynamic nature of the supramolecular interaction and offers synergistic delivery of cargos with triggered release or through photocontrolled porosity. This demonstration of premeditated hierarchical assembly, where interactions from the molecular to microscale are designed, illustrates the power of this route toward accessing the next generation of functional materials and encapsulation strategies.

  12. Development of an access control system for the LHD experimental hall

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Uda, T.; Yamanishi, H.; Miyake, H.; Tanahashi, S.; Motozima, O.

    2000-01-01

    An access control system for the LHD (Large Helical Device) experimental hall had been constructed and its practical operation started in March 1998. Continuously, the system has been improved. The present system keeps watch on involved entrance and exit for the use of persons at four entrances by using five turnstile gates while watching on eight shielding doors at eight positions (four entrances, three carriage entrances and a hall overview) and a stairway connecting the LHD main hall with the LHD basement. Besides, for the security of safety operation of the LHD, fifteen kinds of interlock signals are exchanged between the access control system and the LHD control system. Seven of the interlock signals are properly sent as the occasional demands from the access control system to the LHD control system, in which three staple signals are B Personnel Access to Controlled Area, D Shielding Door Closed, and E No Entrance. It is important that any plasma experiments of the LHD are not permitted while the signal B being sent or D being not sent. The signal E is sent to inform the LHD control system that the turnstile gates are locked. All the plasma experiments should not be done unless the lock procedure of the turnstile is confirmed. When the turnstile gates are locked, any persons cannot enter into the LHD controlled area, but are permissible to exit only. Six of the interlock signals are used to send the information of the working at that time in the LHD controlled area to the access control system. When one signal of the operation mode is sent to the access control system from the LHD, the access control system sets the turnstile gate in situation corresponding to the operation mode, A Equipment Operation, B Vacuum Pumping, C Coil Cooling, D Coil Excitation, and E Plasma Experiment. If the access control system receives, for example, the signal B, this system sets the turnstile gate in the condition of control such that only persons assigned to the work of vacuum

  13. Design and measurement of fully digital ternary content addressable memory using ratioless static random access memory cells and hierarchical-AND matching comparator

    Science.gov (United States)

    Nishikata, Daisuke; Ali, Mohammad Alimudin Bin Mohd; Hosoda, Kento; Matsumoto, Hiroshi; Nakamura, Kazuyuki

    2018-04-01

    A 36-bit × 32-entry fully digital ternary content addressable memory (TCAM) using the ratioless static random access memory (RL-SRAM) technology and fully complementary hierarchical-AND matching comparators (HAMCs) was developed. Since its fully complementary and digital operation enables the effect of device variabilities to be avoided, it can operate with a quite low supply voltage. A test chip incorporating a conventional TCAM and a proposed 24-transistor ratioless TCAM (RL-TCAM) cells and HAMCs was developed using a 0.18 µm CMOS process. The minimum operating voltage of 0.25 V of the developed RL-TCAM, which is less than half of that of the conventional TCAM, was measured via the conventional CMOS push–pull output buffers with the level-shifting and flipping technique using optimized pull-up voltage and resistors.

  14. A hierarchical framework for air traffic control

    Science.gov (United States)

    Roy, Kaushik

    Air travel in recent years has been plagued by record delays, with over $8 billion in direct operating costs being attributed to 100 million flight delay minutes in 2007. Major contributing factors to delay include weather, congestion, and aging infrastructure; the Next Generation Air Transportation System (NextGen) aims to alleviate these delays through an upgrade of the air traffic control system. Changes to large-scale networked systems such as air traffic control are complicated by the need for coordinated solutions over disparate temporal and spatial scales. Individual air traffic controllers must ensure aircraft maintain safe separation locally with a time horizon of seconds to minutes, whereas regional plans are formulated to efficiently route flows of aircraft around weather and congestion on the order of every hour. More efficient control algorithms that provide a coordinated solution are required to safely handle a larger number of aircraft in a fixed amount of airspace. Improved estimation algorithms are also needed to provide accurate aircraft state information and situational awareness for human controllers. A hierarchical framework is developed to simultaneously solve the sometimes conflicting goals of regional efficiency and local safety. Careful attention is given in defining the interactions between the layers of this hierarchy. In this way, solutions to individual air traffic problems can be targeted and implemented as needed. First, the regional traffic flow management problem is posed as an optimization problem and shown to be NP-Hard. Approximation methods based on aggregate flow models are developed to enable real-time implementation of algorithms that reduce the impact of congestion and adverse weather. Second, the local trajectory design problem is solved using a novel slot-based sector model. This model is used to analyze sector capacity under varying traffic patterns, providing a more comprehensive understanding of how increased automation

  15. Open versus Controlled-Access Data | Office of Cancer Genomics

    Science.gov (United States)

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  16. An Extended Role Based Access Control Method for XML Documents

    Institute of Scientific and Technical Information of China (English)

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  17. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  18. Statistical Significance for Hierarchical Clustering

    Science.gov (United States)

    Kimes, Patrick K.; Liu, Yufeng; Hayes, D. Neil; Marron, J. S.

    2017-01-01

    Summary Cluster analysis has proved to be an invaluable tool for the exploratory and unsupervised analysis of high dimensional datasets. Among methods for clustering, hierarchical approaches have enjoyed substantial popularity in genomics and other fields for their ability to simultaneously uncover multiple layers of clustering structure. A critical and challenging question in cluster analysis is whether the identified clusters represent important underlying structure or are artifacts of natural sampling variation. Few approaches have been proposed for addressing this problem in the context of hierarchical clustering, for which the problem is further complicated by the natural tree structure of the partition, and the multiplicity of tests required to parse the layers of nested clusters. In this paper, we propose a Monte Carlo based approach for testing statistical significance in hierarchical clustering which addresses these issues. The approach is implemented as a sequential testing procedure guaranteeing control of the family-wise error rate. Theoretical justification is provided for our approach, and its power to detect true clustering structure is illustrated through several simulation studies and applications to two cancer gene expression datasets. PMID:28099990

  19. Au functionalized ZnO rose-like hierarchical structures and their enhanced NO2 sensing performance

    Science.gov (United States)

    Shingange, K.; Swart, H. C.; Mhlongo, G. H.

    2018-04-01

    Herein, we present ZnO rose-like hierarchical nanostructures employed as support to Au nanoparticles to produce Au functionalized three dimensional (3D) ZnO hierarchical nanostructures (Au/ZnO) for NO2 detection using a microwave-assisted method. Comparative analysis of NO2 sensing performance between the pristine ZnO and Au/ZnO rose-like structures at 300 °C revealed improved NO2 response and rapid response-recovery times with Au incorporation owing to a combination of high surface accessibility induced by hierarchical nanostructure design and catalytic activity of the small Au nanoparticles. Structural and optical analyses acquired from X-ray diffraction, scanning electron microscopy, transmission electron microscope and photoluminescence spectroscopy were also performed.

  20. Fine-Grained Access Control for Electronic Health Record Systems

    Science.gov (United States)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  1. A solvent evaporation route towards fabrication of hierarchically porous ZSM-11 with highly accessible mesopores

    DEFF Research Database (Denmark)

    Song, Wen; Liu, Zhiting; Liu, Liping

    2015-01-01

    A route to generate hierarchically porous zeolite ZSM-11 has been paved via solvent evaporation induced self-assembly assisted by hexadecyltrimethoxysilane to produce a preformed dry gel, followed by its subsequent transformation into zeolite via steam-assisted-crystallization. The crystallization...

  2. Access control and privilege management in electronic health record: a systematic literature review.

    Science.gov (United States)

    Jayabalan, Manoj; O'Daniel, Thomas

    2016-12-01

    This study presents a systematic literature review of access control for electronic health record systems to protect patient's privacy. Articles from 2006 to 2016 were extracted from the ACM Digital Library, IEEE Xplore Digital Library, Science Direct, MEDLINE, and MetaPress using broad eligibility criteria, and chosen for inclusion based on analysis of ISO22600. Cryptographic standards and methods were left outside the scope of this review. Three broad classes of models are being actively investigated and developed: access control for electronic health records, access control for interoperability, and access control for risk analysis. Traditional role-based access control models are extended with spatial, temporal, probabilistic, dynamic, and semantic aspects to capture contextual information and provide granular access control. Maintenance of audit trails and facilities for overriding normal roles to allow full access in emergency cases are common features. Access privilege frameworks utilizing ontology-based knowledge representation for defining the rules have attracted considerable interest, due to the higher level of abstraction that makes it possible to model domain knowledge and validate access requests efficiently.

  3. Negative Sequence Droop Method based Hierarchical Control for Low Voltage Ride-Through in Grid-Interactive Microgrids

    DEFF Research Database (Denmark)

    Zhao, Xin; Firoozabadi, Mehdi Savaghebi; Quintero, Juan Carlos Vasquez

    2015-01-01

    . In this paper, a voltage support strategy based on negative sequence droop control, which regulate the positive/negative sequence active and reactive power flow by means of sending proper voltage reference to the inner control loop, is proposed for the grid connected MGs to ride through voltage sags under...... complex line impedance conditions. In this case, the MGs should inject a certain amount of positive and negative sequence power to the grid so that the voltage quality at load side can be maintained at a satisfied level. A two layer hierarchical control strategy is proposed in this paper. The primary...... control loop consists of voltage and current inner loops, conventional droop control and virtual impedance loop while the secondary control loop is based on positive/negative sequence droop control which can achieve power injection under voltage sags. Experimental results with asymmetrical voltage sags...

  4. Regulatory accessibility and social influences on state self-control.

    Science.gov (United States)

    vanDellen, Michelle R; Hoyle, Rick H

    2010-02-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals' state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-control leads to increases in state self-control and thinking of others with bad trait or state self-control leads to decreases in state self-control. Study 5 provides evidence that the salience of significant others influences both regulatory accessibility and state self-control. Combined, these studies suggest that the effects of social influences on state self-control occur through multiple mechanisms.

  5. The judgement of simultaneous commutation failure in HVDC about hierarchical connection to AC grid

    Science.gov (United States)

    Li, Ming; Song, Xinli; Huang, Daoshan; Liu, Wenzhuo; Zhao, Shutao; Ye, Xiaohui; Meng, Hang

    2017-09-01

    The hierarchical connection to AC grid at inverter sides in UHVDC has been take in several projects. This paper introduced the frame of the connection mode in hierarchical access system and compared it with the traditional one at the case of HVDC-Cigre. Then the criterion of commutation failure according to the same valves current was deduced. In order to verify the accuracy of the criterion, this paper used PSD-BPA (Bonneville Power Administration) to simulate the setting voltage drop in the East China power grid and certified the correctness of the formula.

  6. Object oriented programming techniques applied to device access and control

    International Nuclear Information System (INIS)

    Goetz, A.; Klotz, W.D.; Meyer, J.

    1992-01-01

    In this paper a model, called the device server model, has been presented for solving the problem of device access and control faced by all control systems. Object Oriented Programming techniques were used to achieve a powerful yet flexible solution. The model provides a solution to the problem which hides device dependancies. It defines a software framework which has to be respected by implementors of device classes - this is very useful for developing groupware. The decision to implement remote access in the root class means that device servers can be easily integrated in a distributed control system. A lot of the advantages and features of the device server model are due to the adoption of OOP techniques. The main conclusion that can be drawn from this paper is that 1. the device access and control problem is adapted to being solved with OOP techniques, 2. OOP techniques offer a distinct advantage over traditional programming techniques for solving the device access problem. (J.P.N.)

  7. Creating Hierarchical Pores by Controlled Linker Thermolysis in Multivariate Metal-Organic Frameworks.

    Science.gov (United States)

    Feng, Liang; Yuan, Shuai; Zhang, Liang-Liang; Tan, Kui; Li, Jia-Luo; Kirchon, Angelo; Liu, Ling-Mei; Zhang, Peng; Han, Yu; Chabal, Yves J; Zhou, Hong-Cai

    2018-02-14

    Sufficient pore size, appropriate stability, and hierarchical porosity are three prerequisites for open frameworks designed for drug delivery, enzyme immobilization, and catalysis involving large molecules. Herein, we report a powerful and general strategy, linker thermolysis, to construct ultrastable hierarchically porous metal-organic frameworks (HP-MOFs) with tunable pore size distribution. Linker instability, usually an undesirable trait of MOFs, was exploited to create mesopores by generating crystal defects throughout a microporous MOF crystal via thermolysis. The crystallinity and stability of HP-MOFs remain after thermolabile linkers are selectively removed from multivariate metal-organic frameworks (MTV-MOFs) through a decarboxylation process. A domain-based linker spatial distribution was found to be critical for creating hierarchical pores inside MTV-MOFs. Furthermore, linker thermolysis promotes the formation of ultrasmall metal oxide nanoparticles immobilized in an open framework that exhibits high catalytic activity for Lewis acid-catalyzed reactions. Most importantly, this work provides fresh insights into the connection between linker apportionment and vacancy distribution, which may shed light on probing the disordered linker apportionment in multivariate systems, a long-standing challenge in the study of MTV-MOFs.

  8. Hierarchical silica particles by dynamic multicomponent assembly

    DEFF Research Database (Denmark)

    Wu, Z. W.; Hu, Q. Y.; Pang, J. B.

    2005-01-01

    Abstract: Aerosol-assisted assembly of mesoporous silica particles with hierarchically controllable pore structure has been prepared using cetyltrimethylammonium bromide (CTAB) and poly(propylene oxide) (PPO, H[OCH(CH3)CH2],OH) as co-templates. Addition of the hydrophobic PPO significantly...... influences the delicate hydrophilic-hydrophobic balance in the well-studied CTAB-silicate co-assembling system, resulting in various mesostructures (such as hexagonal, lamellar, and hierarchical structure). The co-assembly of CTAB, silicate clusters, and a low-molecular-weight PPO (average M-n 425) results...... in a uniform lamellar structure, while the use of a high-molecular-weight PPO (average M-n 2000), which is more hydrophobic, leads to the formation of hierarchical pore structure that contains meso-meso or meso-macro pore structure. The role of PPO additives on the mesostructure evolution in the CTAB...

  9. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  10. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  11. A General Attribute and Rule Based Role-Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.

  12. IMPROVING NEAREST NEIGHBOUR SEARCH IN 3D SPATIAL ACCESS METHOD

    Directory of Open Access Journals (Sweden)

    A. Suhaibaha

    2016-10-01

    Full Text Available Nearest Neighbour (NN is one of the important queries and analyses for spatial application. In normal practice, spatial access method structure is used during the Nearest Neighbour query execution to retrieve information from the database. However, most of the spatial access method structures are still facing with unresolved issues such as overlapping among nodes and repetitive data entry. This situation will perform an excessive Input/Output (IO operation which is inefficient for data retrieval. The situation will become more crucial while dealing with 3D data. The size of 3D data is usually large due to its detail geometry and other attached information. In this research, a clustered 3D hierarchical structure is introduced as a 3D spatial access method structure. The structure is expected to improve the retrieval of Nearest Neighbour information for 3D objects. Several tests are performed in answering Single Nearest Neighbour search and k Nearest Neighbour (kNN search. The tests indicate that clustered hierarchical structure is efficient in handling Nearest Neighbour query compared to its competitor. From the results, clustered hierarchical structure reduced the repetitive data entry and the accessed page. The proposed structure also produced minimal Input/Output operation. The query response time is also outperformed compared to the other competitor. For future outlook of this research several possible applications are discussed and summarized.

  13. Frequency-Division Power Sharing and Hierarchical Control Design for DC Shipboard Microgrids with Hybrid Energy Storage Systems

    DEFF Research Database (Denmark)

    Jin, Zheming; Meng, Lexuan; Quintero, Juan Carlos Vasquez

    2017-01-01

    Due to the increasing need to reduce the cost and emission of ships, shipboard applications are calling advanced technologies to go onboard. Recently, cleaner power sources (i.e. gas turbines, fuel cell, solar and wind power), energy storage, advanced control and power/energy management......, the operation point of prime movers can be maintained at their optimal area, meanwhile, different energy storages will provide characteristic based response. On the basis of the proposed power sharing method, voltage restoration and power management-level control methods are also introduced to form hierarchical...

  14. Enhanced Two-Stage Hierarchical Control for a Dual Mode WECS-Based Microgrid

    Directory of Open Access Journals (Sweden)

    Rasool M. Imran

    2018-05-01

    Full Text Available Along with the great benefits of utilizing renewable energy (e.g., wind energy in the power system, there are also some issues, such as increasing the uncertainty and reducing the system inertia. Communication-based centralized control has started to play a significant role in reacting to the aforementioned issues, especially for relatively small systems, such as microgrids. In this context, in this paper, an enhanced communication-based hierarchical control for a dual mode wind energy conversion system-based microgrid is modeled and investigated. The primary stage utilized the P-V/Q-f droop method, which is the preferred droop method to be used in microgrids when the line impedance is mainly resistive. The secondary stage relied on an enhanced methodology for compensating the deviations of voltage and frequency and improving the performance of the microgrid during small and large signal disturbances. Moreover, as this microgrid operates in a dual mode, the mode transition cases from grid-tied mode to autonomous mode and vice versa have been addressed. Thereafter, an improved control scheme for the unplanned outage transition and a modified control scheme for the pre-synchronization and reconnection transition were proposed. Finally, the proposed work was evaluated by the simulation results in MATLAB environment.

  15. Hierarchic control of the production of energy by means of plants of distributed solar collectors; Control jerarquico de la produccion de energia mediante plantas de colectores solares distribuidos

    Energy Technology Data Exchange (ETDEWEB)

    Martinez Cirre, C. R.

    2008-07-01

    This work presents several different approaches to hierarchical control algorithms designed for a parabolic-trough solar collector field to demonstrate the possibility of maximizing hypothetical profit possible from this type of plant by improving and increasing plant automation. This study was developed in the current world power supply scenario, posing the possibility of using renewable energies (among which is solar thermal power), which the author is interested in contributing to advancing through research on improved plant operation control. The design was made for the ACUREX distributed solar collector field at the Plataforma Solar de Almeria. The control structures implemented to improve production in the solar collector field are based on a simple two-layered hierarchical control. One regulation layer (Layer 1) in which two proposals have been implemented: a control scheme developed using the feedback linearization technique and another proposal consisting on parallel deed forward control with an I-PD (Integral-Proportional Derivative) control. three proposals were implemented in the top layer (Layer 2) for generating the setpoint, the first one based on a physical model, the second one based on a fuzzy model, and the last uses the physical model and an optimization function for finding the optimum setpoint. (Author)

  16. Implementing Discretionary Access Control with Time Character in Linux and Performance Analysis

    Institute of Scientific and Technical Information of China (English)

    TAN Liang; ZHOU Ming-Tian

    2006-01-01

    DAC (Discretionary Access Control Policy) is access control based on ownership relations between subject and object, the subject can discretionarily decide on that who, by what methods, can access his owns object. In this paper, the system time is looked as a basic secure element. The DAC_T (Discretionary Access Control Policy with Time Character) is presented and formalized. The DAC_T resolves that the subject can discretionarily decide that who, on when, can access his owns objects. And then the DAC_T is implemented on Linux based on GFAC (General Framework for Access Control), and the algorithm is put forward. Finally, the performance analysis for the DAC_T_Linux is carried out. It is proved that the DAC_T_Linux not only can realize time constraints between subject and object but also can still be accepted by us though its performance have been decreased.

  17. Access and control of information and intellectual property

    Science.gov (United States)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  18. Novel hierarchical microparticles super-assembled from nanoparticles with the induction of casein micelles

    Energy Technology Data Exchange (ETDEWEB)

    Xiong, Xiaopeng, E-mail: xpxiong@xmu.edu.cn; Duan, Jiangjiang; Wang, Yong; Yu, Zhaoju [Xiamen University, Department of Materials Science and Engineering, College of Materials (China)

    2013-08-15

    We have demonstrated a solution-based synthesis of novel waxberry-like hierarchical ZnO microparticles in the presence casein micelles under mild conditions. The microstructures of the sub-micrometer-sized hierarchical microparticles were characterized, and the synthesis conditions were optimized. The formation mechanism of the hierarchical microparticle was analyzed through control experiments. The hierarchical ZnO microparticles are found to be super-assemblies of 30-70 nm ZnO nanoparticles, which are thought to be based on casein micelle induction followed by Ostwald ripening. In the same manner, copper-based hierarchical microparticles with a similar morphology have also been successfully synthesized. By controlling the synthetic time or temperature, solid or hollow microparticles can be fabricated. The narrowly distributed ZnO microparticles have a high specific surface area, exhibiting great potential application in fields such as photocatalytic and energy conversion. Our findings may meanwhile open a new bottom-up strategy in order to construct structurally sophisticated nanomaterials.

  19. Novel hierarchical microparticles super-assembled from nanoparticles with the induction of casein micelles

    Science.gov (United States)

    Xiong, Xiaopeng; Duan, Jiangjiang; Wang, Yong; Yu, Zhaoju

    2013-08-01

    We have demonstrated a solution-based synthesis of novel waxberry-like hierarchical ZnO microparticles in the presence casein micelles under mild conditions. The microstructures of the sub-micrometer-sized hierarchical microparticles were characterized, and the synthesis conditions were optimized. The formation mechanism of the hierarchical microparticle was analyzed through control experiments. The hierarchical ZnO microparticles are found to be super-assemblies of 30-70 nm ZnO nanoparticles, which are thought to be based on casein micelle induction followed by Ostwald ripening. In the same manner, copper-based hierarchical microparticles with a similar morphology have also been successfully synthesized. By controlling the synthetic time or temperature, solid or hollow microparticles can be fabricated. The narrowly distributed ZnO microparticles have a high specific surface area, exhibiting great potential application in fields such as photocatalytic and energy conversion. Our findings may meanwhile open a new bottom-up strategy in order to construct structurally sophisticated nanomaterials.

  20. Novel hierarchical microparticles super-assembled from nanoparticles with the induction of casein micelles

    International Nuclear Information System (INIS)

    Xiong, Xiaopeng; Duan, Jiangjiang; Wang, Yong; Yu, Zhaoju

    2013-01-01

    We have demonstrated a solution-based synthesis of novel waxberry-like hierarchical ZnO microparticles in the presence casein micelles under mild conditions. The microstructures of the sub-micrometer-sized hierarchical microparticles were characterized, and the synthesis conditions were optimized. The formation mechanism of the hierarchical microparticle was analyzed through control experiments. The hierarchical ZnO microparticles are found to be super-assemblies of 30–70 nm ZnO nanoparticles, which are thought to be based on casein micelle induction followed by Ostwald ripening. In the same manner, copper-based hierarchical microparticles with a similar morphology have also been successfully synthesized. By controlling the synthetic time or temperature, solid or hollow microparticles can be fabricated. The narrowly distributed ZnO microparticles have a high specific surface area, exhibiting great potential application in fields such as photocatalytic and energy conversion. Our findings may meanwhile open a new bottom-up strategy in order to construct structurally sophisticated nanomaterials

  1. Runtime Concepts of Hierarchical Software Components

    Czech Academy of Sciences Publication Activity Database

    Bureš, Tomáš; Hnětynka, P.; Plášil, František

    2007-01-01

    Roč. 8, special (2007), s. 454-463 ISSN 1525-9293 R&D Projects: GA AV ČR 1ET400300504 Institutional research plan: CEZ:AV0Z10300504 Keywords : component-based development * hierarchical components * connectors * controlers * runtime environment Subject RIV: JC - Computer Hardware ; Software

  2. Hopping control channel MAC protocol for opportunistic spectrum access networks

    Institute of Scientific and Technical Information of China (English)

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  3. Characterization of genetic diversity of bird-of-paradise accessions

    Directory of Open Access Journals (Sweden)

    Alessandro Aparecido Brito dos Santos

    2018-04-01

    Full Text Available This study aimed to characterize genetic diversity in the bird-of-paradise (Strelitzia reginae collection at the Universidade do Estado de Mato Grosso Carlos Alberto Reyes Maldonado (UNEMAT by estimating genetic divergence among genotypes based on agronomic characteristics. Seven agronomic characters were evaluated with average Euclidean distance. The UPGMA (Unweighted Pair Group Method with Arithmetic Mean hierarchical clustering method was used between groups, as well as Tocher’s optimization clustering method and principal component analysis (PCA, in order to classify the genotypes with maximum similarity between groups. Measures of genetic dissimilarity with average Euclidean distance verified the existence of genetic variability among accessions since the amplitude of dissimilarity values ranged from 1.09 to 36.97. Tocher’s clustering method verified the formation of two distinct groups. UPGMA hierarchical clustering, based on the dissimilarity matrix, verified the formation of three groups with 30% cutoff point. Based on the main components analysis, we verified genetic divergence between the bird-of-paradise accessions in the UNEMAT Collection. The most promising combinations for future crosses in breeding programs comprise accessions 1, 11, and 23 and accession 1 as the most divergent among the accessions evaluated.

  4. Access Agent Improving The Performance Of Access Control Lists

    Directory of Open Access Journals (Sweden)

    Thelis R. S.

    2015-08-01

    Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

  5. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    Moore, J.W.; Banks, W.W.

    1988-01-01

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  6. 75 FR 4007 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2010-01-26

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... or other persons, to implement risk management controls and supervisory procedures reasonably... access may not utilize any pre-trade risk management controls (i.e., ``unfiltered'' or ``naked'' access...

  7. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Science.gov (United States)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  8. Interference mitigation for broadcast in hierarchical cell structure networks: Transmission strategy and area spectral efficiency

    KAUST Repository

    Yang, Yuli; Salama, Khaled N.; Aï ssa, Sonia

    2014-01-01

    In this paper, a hierarchical cell structure (HCS) is considered, where an access point (AP) broadcasts to local nodes (LNs) over orthogonal frequency subbands within a local cell located in a macrocell. Since the local cell shares the spectrum

  9. Controlled synthesis of three-dimensional hierarchical Bi2WO6 microspheres with optimum photocatalytic activity

    International Nuclear Information System (INIS)

    Wang, Hong; Song, Jimei; Zhang, Hui; Gao, Fei; Zhao, Shaojuan; Hu, Haiqin

    2012-01-01

    Highlights: ► The synthesized method is very simple. It can be widely used in the production. ► The morphology is novel and the property is fine. ► The formation of 3D hierarchical microsphere can be induced by changing the concentration of KNO 3 . -- Abstract: Three-dimensional (3D) hierarchical Bi 2 WO 6 microsphere and octahedral Bi 2 WO 6 have been synthesized by a facile hydrothermal method using KNO 3 solution and distilled water as solvent, respectively. The obtained products were characterized by X-ray diffraction, scanning electron microscopy, N 2 adsorption/desorption, and UV–vis diffuse reflectance spectroscopy in detail. The concentration of KNO 3 played a key role in the formation of 3D hierarchical Bi 2 WO 6 microspheres. A possible formation mechanism of Bi 2 WO 6 microsphere was proposed. The photocatalytic activity of the as-synthesized products was evaluated by monitoring the degradation of MB solution under sunlight irradiation. It was found that the photocatalytic activity of the 3D hierarchical Bi 2 WO 6 microsphere was superior to the octahedral Bi 2 WO 6 , which was attributed to the larger surface area and special hierarchical structure of Bi 2 WO 6 microsphere.

  10. Hierarchical Network Design

    DEFF Research Database (Denmark)

    Thomadsen, Tommy

    2005-01-01

    Communication networks are immensely important today, since both companies and individuals use numerous services that rely on them. This thesis considers the design of hierarchical (communication) networks. Hierarchical networks consist of layers of networks and are well-suited for coping...... with changing and increasing demands. Two-layer networks consist of one backbone network, which interconnects cluster networks. The clusters consist of nodes and links, which connect the nodes. One node in each cluster is a hub node, and the backbone interconnects the hub nodes of each cluster and thus...... the clusters. The design of hierarchical networks involves clustering of nodes, hub selection, and network design, i.e. selection of links and routing of ows. Hierarchical networks have been in use for decades, but integrated design of these networks has only been considered for very special types of networks...

  11. Introduction to Hierarchical Bayesian Modeling for Ecological Data

    CERN Document Server

    Parent, Eric

    2012-01-01

    Making statistical modeling and inference more accessible to ecologists and related scientists, Introduction to Hierarchical Bayesian Modeling for Ecological Data gives readers a flexible and effective framework to learn about complex ecological processes from various sources of data. It also helps readers get started on building their own statistical models. The text begins with simple models that progressively become more complex and realistic through explanatory covariates and intermediate hidden states variables. When fitting the models to data, the authors gradually present the concepts a

  12. Creating Hierarchical Pores by Controlled Linker Thermolysis in Multivariate Metal-Organic Frameworks

    KAUST Repository

    Feng, Liang

    2018-01-18

    Sufficient pore size, appropriate stability and hierarchical porosity are three prerequisites for open frameworks designed for drug delivery, enzyme immobilization and catalysis involving large molecules. Herein, we report a powerful and general strate-gy, linker thermolysis, to construct ultra-stable hierarchically porous metal−organic frameworks (HP-MOFs) with tunable pore size distribution. Linker instability, usually an undesirable trait of MOFs, was exploited to create mesopores by generating crystal defects throughout a microporous MOF crystal via thermolysis. The crystallinity and stability of HP-MOFs remain after thermolabile linkers are selectively removed from multivariate metal-organic frameworks (MTV-MOFs) through a decarboxyla-tion process. A domain-based linker spatial distribution was found to be critical for creating hierarchical pores inside MTV-MOFs. Furthermore, linker thermolysis promotes the formation of ultra-small metal oxide (MO) nanoparticles immobilized in an open framework that exhibits high catalytic activity for Lewis acid catalyzed reactions. Most importantly, this work pro-vides fresh insights into the connection between linker apportionment and vacancy distribution, which may shed light on prob-ing the disordered linker apportionment in multivariate systems, a long-standing challenge in the study of MTV-MOFs.

  13. A proof-of-concept implementation of persistence in a hierarchical storage system

    International Nuclear Information System (INIS)

    Grossman, R.; Qin, Xiao; Lifka, D.

    1992-01-01

    The concept of providing transparent access to a collection of files in a mass storage system is a familiar one. The goal of this project was to investigate the feasibility of providing similar access to a collection of persistent, complex objects. We describe an architecture for interfacing a persistent store of complex objects to a hierarchical storage system. Persistent object stores support the uniform creation, storage, and access of complex objects, regardless of their lifetimes. In other words, a mechanism is provided so that persistent objects outlive the processes which create them and can be accessed in a uniform manner by other processes. We validated this architecture by implementing a proof-of-concept system and testing the system on two stores of data. These tests indicate that this architecture supports the creation. storage and access of very large persistent object stores

  14. Hierarchical Controlled Remote State Preparation by Using a Four-Qubit Cluster State

    Science.gov (United States)

    Ma, Peng-Cheng; Chen, Gui-Bin; Li, Xiao-Wei; Zhan, You-Bang

    2018-02-01

    We propose a scheme for hierarchical controlled remote preparation of an arbitrary single-qubit state via a four-qubit cluster state as the quantum channel. In this scheme, a sender wishes to help three agents to remotely prepare a quantum state, respectively. The three agents are divided into two grades, that is, an agent is in the upper grade and other two agents are in the lower grade. In this process of remote state preparation, the agent of the upper grade only needs the assistance of any one of the other two agents for recovering the sender's original state, while an agent of the lower grade needs the collaboration of all the other two agents. In other words, the agents of two grades have different authorities to reconstruct sender's original state.

  15. Hierarchical Controlled Remote State Preparation by Using a Four-Qubit Cluster State

    Science.gov (United States)

    Ma, Peng-Cheng; Chen, Gui-Bin; Li, Xiao-Wei; Zhan, You-Bang

    2018-06-01

    We propose a scheme for hierarchical controlled remote preparation of an arbitrary single-qubit state via a four-qubit cluster state as the quantum channel. In this scheme, a sender wishes to help three agents to remotely prepare a quantum state, respectively. The three agents are divided into two grades, that is, an agent is in the upper grade and other two agents are in the lower grade. In this process of remote state preparation, the agent of the upper grade only needs the assistance of any one of the other two agents for recovering the sender's original state, while an agent of the lower grade needs the collaboration of all the other two agents. In other words, the agents of two grades have different authorities to reconstruct sender's original state.

  16. Role-Based Access Control in Retrospect

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; Wieringa, Roelf J.

    Role-Based Access Control (RBAC) has been a success in terms of the amount of research that went into it, its uptake in international standards, and its adoption by major software vendors. Yet, RBAC remains complex to implement in user organizations. In this paper we review the state of the art of

  17. A Comparative Analysis of Wiki Discretionary Access Control in a CONOPS Environment

    National Research Council Canada - National Science Library

    Crawford, Frederick L

    2008-01-01

    This research conducts a comparative analysis of discretionary access controls of current wikis by experimenting with their discretionary access controls and functionality, comparing the wiki software...

  18. Requirements for Scalable Access Control and Security Management Architectures

    National Research Council Canada - National Science Library

    Keromytis, Angelos D; Smith, Jonathan M

    2005-01-01

    Maximizing local autonomy has led to a scalable Internet. Scalability and the capacity for distributed control have unfortunately not extended well to resource access control policies and mechanisms...

  19. Urban Studies: A Study of Bibliographic Access and Control.

    Science.gov (United States)

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  20. Database design for Physical Access Control System for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in

    2016-08-15

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  1. Database design for Physical Access Control System for nuclear facilities

    International Nuclear Information System (INIS)

    Sathishkumar, T.; Rao, G. Prabhakara; Arumugam, P.

    2016-01-01

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  2. Applications of hierarchically structured porous materials from energy storage and conversion, catalysis, photocatalysis, adsorption, separation, and sensing to biomedicine.

    Science.gov (United States)

    Sun, Ming-Hui; Huang, Shao-Zhuan; Chen, Li-Hua; Li, Yu; Yang, Xiao-Yu; Yuan, Zhong-Yong; Su, Bao-Lian

    2016-06-13

    Over the last decade, significant effort has been devoted to the applications of hierarchically structured porous materials owing to their outstanding properties such as high surface area, excellent accessibility to active sites, and enhanced mass transport and diffusion. The hierarchy of porosity, structural, morphological and component levels in these materials is key for their high performance in all kinds of applications. The introduction of hierarchical porosity into materials has led to a significant improvement in the performance of materials. Herein, recent progress in the applications of hierarchically structured porous materials from energy conversion and storage, catalysis, photocatalysis, adsorption, separation, and sensing to biomedicine is reviewed. Their potential future applications are also highlighted. We particularly dwell on the relationship between hierarchically porous structures and properties, with examples of each type of hierarchically structured porous material according to its chemical composition and physical characteristics. The present review aims to open up a new avenue to guide the readers to quickly obtain in-depth knowledge of applications of hierarchically porous materials and to have a good idea about selecting and designing suitable hierarchically porous materials for a specific application. In addition to focusing on the applications of hierarchically porous materials, this comprehensive review could stimulate researchers to synthesize new advanced hierarchically porous solids.

  3. Constructing storyboards based on hierarchical clustering analysis

    Science.gov (United States)

    Hasebe, Satoshi; Sami, Mustafa M.; Muramatsu, Shogo; Kikuchi, Hisakazu

    2005-07-01

    There are growing needs for quick preview of video contents for the purpose of improving accessibility of video archives as well as reducing network traffics. In this paper, a storyboard that contains a user-specified number of keyframes is produced from a given video sequence. It is based on hierarchical cluster analysis of feature vectors that are derived from wavelet coefficients of video frames. Consistent use of extracted feature vectors is the key to avoid a repetition of computationally-intensive parsing of the same video sequence. Experimental results suggest that a significant reduction in computational time is gained by this strategy.

  4. A federated capability-based access control mechanism for internet of things (IoTs)

    Science.gov (United States)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  5. Hierarchical data security in a Query-By-Example interface for a shared database.

    Science.gov (United States)

    Taylor, Merwyn

    2002-06-01

    Whenever a shared database resource, containing critical patient data, is created, protecting the contents of the database is a high priority goal. This goal can be achieved by developing a Query-By-Example (QBE) interface, designed to access a shared database, and embedding within the QBE a hierarchical security module that limits access to the data. The security module ensures that researchers working in one clinic do not get access to data from another clinic. The security can be based on a flexible taxonomy structure that allows ordinary users to access data from individual clinics and super users to access data from all clinics. All researchers submit queries through the same interface and the security module processes the taxonomy and user identifiers to limit access. Using this system, two different users with different access rights can submit the same query and get different results thus reducing the need to create different interfaces for different clinics and access rights.

  6. External access to ALICE controls conditions data

    International Nuclear Information System (INIS)

    Jadlovský, J; Jadlovská, A; Sarnovský, J; Jajčišin, Š; Čopík, M; Jadlovská, S; Papcun, P; Bielek, R; Čerkala, J; Kopčík, M; Chochula, P; Augustinus, A

    2014-01-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead – users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data – an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  7. Master–Slave Based Hierarchical Control for a Small Power DC-Distributed Microgrid System with a Storage Device

    Directory of Open Access Journals (Sweden)

    Seung-Woon Lee

    2016-10-01

    Full Text Available In this paper, we analyze one of the main drawbacks of droop control-based DC microgrid systems, and propose a novel control method to overcome this problem. Typically, DC microgrid systems use droop control techniques to enable communication independency and expandability. However, as these advantages are based on bus quality and regulation abandonment, droop-based schemes have limitations in terms of high bus impedance and bus regulation. This paper proposes a novel master–slave based hierarchical control technique for a DC distribution system, in which a DC bus signaling method is used to overcome the communication dependency and the expandability limitations of conventional master–slave control methods. The concept and design considerations of the proposed control method are presented, and a 1 kW simulation under a Powersim (PSIM environment and hardware prototype—built to verify the system—is described.

  8. Design of Fuzzy Enhanced Hierarchical Motion Stabilizing Controller of Unmanned Ground Vehicle in Three DimensionalSpace

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2011-12-01

    Full Text Available In this paper, stabilizing control of tracked unmanned ground vehicle in 3-D space was presented. Firstly, models of major modules of tracked UGV were established. Next, to reveal the mechanism of disturbances applied on the UGV, two kinds of representative disturbances (slope and general disturbances in yaw motion were discussed in depth. Consequently, an attempting PID method was employed to compensate the impacts of disturbances andsimulation results proved the validity for disturbance incited by slope force, but revealed the lack for general disturbance on yaw motion. Finally, a hierarchical fuzzy controller combined with PID controller was proposed. In lower level, there were two PID controllers to compensate the disturbance of slope force, and on top level, the fuzzy logic controller was employed to correct the yaw motion error based on the differences between the model and the real UGV, which was able to guide the UGV maintain on the stable state. Simulation results demonstrated the excellent effectiveness of the newly designed controller.

  9. Hierarchical Broadcasting in the Future Mobile Internet

    NARCIS (Netherlands)

    Hesselman, C.E.W.; Eertink, E.H.; Fernandez, Milagros; Crnkovic, Ivica; Fohler, Gerhard; Griwodz, Carsten; Plagemann, Thomas; Gruenbacher, Paul

    2002-01-01

    We describe an architecture for the hierarchical distribution of multimedia broadcasts in the future mobile Internet. The architecture supports network as well as application-layer mobility solutions, and uses stream control functions that are influenced by available network resources, user-defined

  10. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  11. Detecting Hierarchical Structure in Networks

    DEFF Research Database (Denmark)

    Herlau, Tue; Mørup, Morten; Schmidt, Mikkel Nørgaard

    2012-01-01

    Many real-world networks exhibit hierarchical organization. Previous models of hierarchies within relational data has focused on binary trees; however, for many networks it is unknown whether there is hierarchical structure, and if there is, a binary tree might not account well for it. We propose...... a generative Bayesian model that is able to infer whether hierarchies are present or not from a hypothesis space encompassing all types of hierarchical tree structures. For efficient inference we propose a collapsed Gibbs sampling procedure that jointly infers a partition and its hierarchical structure....... On synthetic and real data we demonstrate that our model can detect hierarchical structure leading to better link-prediction than competing models. Our model can be used to detect if a network exhibits hierarchical structure, thereby leading to a better comprehension and statistical account the network....

  12. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... control. Highlights of my research include my proposal and experimental proof of principle of an optical coherent detection based optical access network architecture providing support for a large number of users over a single distribution fiber; a spectral amplitude encoded label detection technique...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...

  13. A slotted access control protocol for metropolitan WDM ring networks

    Science.gov (United States)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  14. Epitaxial Growth of Hetero-Ln-MOF Hierarchical Single Crystals for Domain- and Orientation-Controlled Multicolor Luminescence 3D Coding Capability.

    Science.gov (United States)

    Pan, Mei; Zhu, Yi-Xuan; Wu, Kai; Chen, Ling; Hou, Ya-Jun; Yin, Shao-Yun; Wang, Hai-Ping; Fan, Ya-Nan; Su, Cheng-Yong

    2017-11-13

    Core-shell or striped heteroatomic lanthanide metal-organic framework hierarchical single crystals were obtained by liquid-phase anisotropic epitaxial growth, maintaining identical periodic organization while simultaneously exhibiting spatially segregated structure. Different types of domain and orientation-controlled multicolor photophysical models are presented, which show either visually distinguishable or visible/near infrared (NIR) emissive colors. This provides a new bottom-up strategy toward the design of hierarchical molecular systems, offering high-throughput and multiplexed luminescence color tunability and readability. The unique capability of combining spectroscopic coding with 3D (three-dimensional) microscale spatial coding is established, providing potential applications in anti-counterfeiting, color barcoding, and other types of integrated and miniaturized optoelectronic materials and devices. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. Epitaxial growth of hetero-Ln-MOF hierarchical single crystals for domain- and orientation-controlled multicolor luminescence 3D coding capability

    International Nuclear Information System (INIS)

    Pan, Mei; Zhu, Yi-Xuan; Wu, Kai; Chen, Ling; Hou, Ya-Jun; Yin, Shao-Yun; Wang, Hai-Ping; Fan, Ya-Nan; Su, Cheng-Yong

    2017-01-01

    Core-shell or striped heteroatomic lanthanide metal-organic framework hierarchical single crystals were obtained by liquid-phase anisotropic epitaxial growth, maintaining identical periodic organization while simultaneously exhibiting spatially segregated structure. Different types of domain and orientation-controlled multicolor photophysical models are presented, which show either visually distinguishable or visible/near infrared (NIR) emissive colors. This provides a new bottom-up strategy toward the design of hierarchical molecular systems, offering high-throughput and multiplexed luminescence color tunability and readability. The unique capability of combining spectroscopic coding with 3D (three-dimensional) microscale spatial coding is established, providing potential applications in anti-counterfeiting, color barcoding, and other types of integrated and miniaturized optoelectronic materials and devices. (copyright 2017 Wiley-VCH Verlag GmbH and Co. KGaA, Weinheim)

  16. Epitaxial growth of hetero-Ln-MOF hierarchical single crystals for domain- and orientation-controlled multicolor luminescence 3D coding capability

    Energy Technology Data Exchange (ETDEWEB)

    Pan, Mei; Zhu, Yi-Xuan; Wu, Kai; Chen, Ling; Hou, Ya-Jun; Yin, Shao-Yun; Wang, Hai-Ping; Fan, Ya-Nan [MOE Laboratory of Bioinorganic and Synthetic Chemistry, Lehn Institute of Functional Materials, School of Chemistry, Sun Yat-Sen University, Guangzhou (China); Su, Cheng-Yong [MOE Laboratory of Bioinorganic and Synthetic Chemistry, Lehn Institute of Functional Materials, School of Chemistry, Sun Yat-Sen University, Guangzhou (China); State Key Laboratory of Applied Organic Chemistry, Lanzhou University, Lanzhou (China)

    2017-11-13

    Core-shell or striped heteroatomic lanthanide metal-organic framework hierarchical single crystals were obtained by liquid-phase anisotropic epitaxial growth, maintaining identical periodic organization while simultaneously exhibiting spatially segregated structure. Different types of domain and orientation-controlled multicolor photophysical models are presented, which show either visually distinguishable or visible/near infrared (NIR) emissive colors. This provides a new bottom-up strategy toward the design of hierarchical molecular systems, offering high-throughput and multiplexed luminescence color tunability and readability. The unique capability of combining spectroscopic coding with 3D (three-dimensional) microscale spatial coding is established, providing potential applications in anti-counterfeiting, color barcoding, and other types of integrated and miniaturized optoelectronic materials and devices. (copyright 2017 Wiley-VCH Verlag GmbH and Co. KGaA, Weinheim)

  17. Optimizing data access in the LAMPF control system

    International Nuclear Information System (INIS)

    Schaller, S.C.; Corley, J.K.; Rose, P.A.

    1985-01-01

    The LAMPF control system data access software offers considerable power and flexibility to application programs through symbolic device naming and an emphasis on hardware independence. This paper discusses optimizations aimed at improving the performance of the data access software while retaining these capabilities. The only aspects of the optimizations visible to the application programs are ''vector devices'' and ''aggregate devices.'' A vector device accesses a set of hardware related data items through a single device name. Aggregate devices allow run-time optimization of references to groups of unrelated devices. Optimizations not visible on the application level include careful handling of: network message traffic; the sharing of global resources; and storage allocation

  18. Policy reconciliation for access control in dynamic cross-enterprise collaborations

    Science.gov (United States)

    Preuveneers, D.; Joosen, W.; Ilie-Zudor, E.

    2018-03-01

    In dynamic cross-enterprise collaborations, different enterprises form a - possibly temporary - business relationship. To integrate their business processes, enterprises may need to grant each other limited access to their information systems. Authentication and authorization are key to secure information handling. However, access control policies often rely on non-standardized attributes to describe the roles and permissions of their employees which convolutes cross-organizational authorization when business relationships evolve quickly. Our framework addresses the managerial overhead of continuous updates to access control policies for enterprise information systems to accommodate disparate attribute usage. By inferring attribute relationships, our framework facilitates attribute and policy reconciliation, and automatically aligns dynamic entitlements during the evaluation of authorization decisions. We validate our framework with a Industry 4.0 motivating scenario on networked production where such dynamic cross-enterprise collaborations are quintessential. The evaluation reveals the capabilities and performance of our framework, and illustrates the feasibility of liberating the security administrator from manually provisioning and aligning attributes, and verifying the consistency of access control policies for cross-enterprise collaborations.

  19. The COSY control system

    International Nuclear Information System (INIS)

    Bongers, N.; Hacker, U.; Henn, K.; Richert, A.; Simon, M.; Sobotta, K.; Stephan, M.; Vashegyi, T.; Weinert, A.

    1992-01-01

    The COSY control system architecture is organized strongly hierarchically with distributed intelligence and extensive use of standards. At the top level of computer control hardware work stations give the operator graphical access to the process. For these tasks Hewlett Packard HP 9000 Series 700 computers with HP-UX and X-Windows/Motif are in use. Also used as work-cells this RISC computers give computing power for model calculations and long term databases. This computers are interconnected using Ethernet and TCP/IP to the next layer of hardware. (author) 3 refs.; 5 figs

  20. [Public control and equity of access to hospitals under non-State public administration].

    Science.gov (United States)

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  1. Access Control from an Intrusion Detection Perspective

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.

    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the

  2. Automated biometric access control system for two-man-rule enforcement

    International Nuclear Information System (INIS)

    Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule

  3. An Access Control Model for the Uniframe Framework

    National Research Council Canada - National Science Library

    Crespi, Alexander M

    2005-01-01

    ... security characteristics from the properties of individual components would aid in the creation of more secure systems In this thesis, a framework for characterizing the access control properties...

  4. Cluster Based Hierarchical Routing Protocol for Wireless Sensor Network

    OpenAIRE

    Rashed, Md. Golam; Kabir, M. Hasnat; Rahim, Muhammad Sajjadur; Ullah, Shaikh Enayet

    2012-01-01

    The efficient use of energy source in a sensor node is most desirable criteria for prolong the life time of wireless sensor network. In this paper, we propose a two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP). We introduce a new concept called head-set, consists of one active cluster head and some other associate cluster heads within a cluster. The head-set members are responsible for control and management of the network. Results show that t...

  5. A hierarchical model predictive voltage control for NPC/H-bridge converters with a reduced computational burden

    DEFF Research Database (Denmark)

    Gong, Zheng; Dai, Peng; Wu, Xiaojie

    2017-01-01

    In recent years, voltage source multilevel converters are very popular in medium/high-voltage industrial applications, among which the NPC/H-Bridge converter is a popular solution to the medium/high-voltage drive systems. The conventional finite control set model predictive control (FCS-MPC) stra......In recent years, voltage source multilevel converters are very popular in medium/high-voltage industrial applications, among which the NPC/H-Bridge converter is a popular solution to the medium/high-voltage drive systems. The conventional finite control set model predictive control (FCS......-MPC) strategy is not practical for multilevel converters due to their substantial calculation requirements, especially under high number of voltage levels. To solve this problem, a hierarchical model predictive voltage control (HMPVC) strategy with referring to the implementation of g-h coordinate space vector...... and experiments with a down-scaled NPC/H-Bridge converter prototype under various conditions, which validate the proposed HMPVC strategy....

  6. WebVis: a hierarchical web homepage visualizer

    Science.gov (United States)

    Renteria, Jose C.; Lodha, Suresh K.

    2000-02-01

    WebVis, the Hierarchical Web Home Page Visualizer, is a tool for managing home web pages. The user can access this tool via the WWW and obtain a hierarchical visualization of one's home web pages. WebVis is a real time interactive tool that supports many different queries on the statistics of internal files such as sizes, age, and type. In addition, statistics on embedded information such as VRML files, Java applets, images and sound files can be extracted and queried. Results of these queries are visualized using color, shape and size of different nodes of the hierarchy. The visualization assists the user in a variety of task, such as quickly finding outdated information or locate large files. WebVIs is one solution to the growing web space maintenance problem. Implementation of WebVis is realized with Perl and Java. Perl pattern matching and file handling routines are used to collect and process web space linkage information and web document information. Java utilizes the collected information to produce visualization of the web space. Java also provides WebVis with real time interactivity, while running off the WWW. Some WebVis examples of home web page visualization are presented.

  7. Wetting and Dewetting Transitions on Submerged Superhydrophobic Surfaces with Hierarchical Structures.

    Science.gov (United States)

    Wu, Huaping; Yang, Zhe; Cao, Binbin; Zhang, Zheng; Zhu, Kai; Wu, Bingbing; Jiang, Shaofei; Chai, Guozhong

    2017-01-10

    The wetting transition on submersed superhydrophobic surfaces with hierarchical structures and the influence of trapped air on superhydrophobic stability are predicted based on the thermodynamics and mechanical analyses. The dewetting transition on the hierarchically structured surfaces is investigated, and two necessary thermodynamic conditions and a mechanical balance condition for dewetting transition are proposed. The corresponding thermodynamic phase diagram of reversible transition and the critical reversed pressure well explain the experimental results reported previously. Our theory provides a useful guideline for precise controlling of breaking down and recovering of superhydrophobicity by designing superhydrophobic surfaces with hierarchical structures under water.

  8. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  9. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  10. Hierarchical Colored Petri Nets for Modeling and Analysis of Transit Signal Priority Control Systems

    Directory of Open Access Journals (Sweden)

    Yisheng An

    2018-01-01

    Full Text Available In this paper, we consider the problem of developing a model for traffic signal control with transit priority using Hierarchical Colored Petri nets (HCPN. Petri nets (PN are useful for state analysis of discrete event systems due to their powerful modeling capability and mathematical formalism. This paper focuses on their use to formalize the transit signal priority (TSP control model. In a four-phase traffic signal control model, the transit detection and two kinds of transit priority strategies are integrated to obtain the HCPN-based TSP control models. One of the advantages to use these models is the clear presentation of traffic light behaviors in terms of conditions and events that cause the detection of a priority request by a transit vehicle. Another advantage of the resulting models is that the correctness and reliability of the proposed strategies are easily analyzed. After their full reachable states are generated, the boundness, liveness, and fairness of the proposed models are verified. Experimental results show that the proposed control model provides transit vehicles with better effectiveness at intersections. This work helps advance the state of the art in the design of signal control models related to the intersection of roadways.

  11. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class B...

  12. Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC), are not suf...... to such settings. We overview the main technical issues to be addressed, and we describe the architecture for policy decision and enforcement points....

  13. The choice of Park & Ride Facilities: an analysis using a context-dependent hierarchical choice experiment

    OpenAIRE

    Heijden, R.E.C.M. van der; Molin, E.J.E.; Timmermans, H.J.P.

    2004-01-01

    Park and Ride facilities have been proposed in several countries to alleviate the accessibility problems in cities. Despite growing accessibility problems, these facilities do not seem to attract the expected number of car drivers and are under-used. In an attempt to measure consumer evaluations of the attributes of Park and Ride facilities, a stated choice experiment, based on the method of hierarchical information integration, was conducted in the city of Nijmegen, The Netherlands. This pap...

  14. Catalysis with hierarchical zeolites

    DEFF Research Database (Denmark)

    Holm, Martin Spangsberg; Taarning, Esben; Egeblad, Kresten

    2011-01-01

    Hierarchical (or mesoporous) zeolites have attracted significant attention during the first decade of the 21st century, and so far this interest continues to increase. There have already been several reviews giving detailed accounts of the developments emphasizing different aspects of this research...... topic. Until now, the main reason for developing hierarchical zeolites has been to achieve heterogeneous catalysts with improved performance but this particular facet has not yet been reviewed in detail. Thus, the present paper summaries and categorizes the catalytic studies utilizing hierarchical...... zeolites that have been reported hitherto. Prototypical examples from some of the different categories of catalytic reactions that have been studied using hierarchical zeolite catalysts are highlighted. This clearly illustrates the different ways that improved performance can be achieved with this family...

  15. A nontransferring dry adhesive with hierarchical polymer nanohairs.

    Science.gov (United States)

    Jeong, Hoon Eui; Lee, Jin-Kwan; Kim, Hong Nam; Moon, Sang Heup; Suh, Kahp Y

    2009-04-07

    We present a simple yet robust method for fabricating angled, hierarchically patterned high-aspect-ratio polymer nanohairs to generate directionally sensitive dry adhesives. The slanted polymeric nanostructures were molded from an etched polySi substrate containing slanted nanoholes. An angled etching technique was developed to fabricate slanted nanoholes with flat tips by inserting an etch-stop layer of silicon dioxide. This unique etching method was equipped with a Faraday cage system to control the ion-incident angles in the conventional plasma etching system. The polymeric nanohairs were fabricated with tailored leaning angles, sizes, tip shapes, and hierarchical structures. As a result of controlled leaning angle and bulged flat top of the nanohairs, the replicated, slanted nanohairs showed excellent directional adhesion, exhibiting strong shear attachment (approximately 26 N/cm(2) in maximum) in the angled direction and easy detachment (approximately 2.2 N/cm(2)) in the opposite direction, with a hysteresis value of approximately 10. In addition to single scale nanohairs, monolithic, micro-nanoscale combined hierarchical hairs were also fabricated by using a 2-step UV-assisted molding technique. These hierarchical nanoscale patterns maintained their adhesive force even on a rough surface (roughness <20 microm) because of an increase in the contact area by the enhanced height of hierarchy, whereas simple nanohairs lost their adhesion strength. To demonstrate the potential applications of the adhesive patch, the dry adhesive was used to transport a large-area glass (47.5 x 37.5 cm(2), second-generation TFT-LCD glass), which could replace the current electrostatic transport/holding system with further optimization.

  16. A nontransferring dry adhesive with hierarchical polymer nanohairs

    KAUST Repository

    Jeong, H. E.

    2009-03-20

    We present a simple yet robust method for fabricating angled, hierarchically patterned high-aspect-ratio polymer nanohairs to generate directionally sensitive dry adhesives. The slanted polymeric nanostructures were molded from an etched polySi substrate containing slanted nanoholes. An angled etching technique was developed to fabricate slanted nanoholes with flat tips by inserting an etch-stop layer of silicon dioxide. This unique etching method was equipped with a Faraday cage system to control the ion-incident angles in the conventional plasma etching system. The polymeric nanohairs were fabricated with tailored leaning angles, sizes, tip shapes, and hierarchical structures. As a result of controlled leaning angle and bulged flat top of the nanohairs, the replicated, slanted nanohairs showed excellent directional adhesion, exhibiting strong shear attachment (approximately 26 N/cm(2) in maximum) in the angled direction and easy detachment (approximately 2.2 N/cm(2)) in the opposite direction, with a hysteresis value of approximately 10. In addition to single scale nanohairs, monolithic, micro-nanoscale combined hierarchical hairs were also fabricated by using a 2-step UV-assisted molding technique. These hierarchical nanoscale patterns maintained their adhesive force even on a rough surface (roughness <20 microm) because of an increase in the contact area by the enhanced height of hierarchy, whereas simple nanohairs lost their adhesion strength. To demonstrate the potential applications of the adhesive patch, the dry adhesive was used to transport a large-area glass (47.5 x 37.5 cm(2), second-generation TFT-LCD glass), which could replace the current electrostatic transport/holding system with further optimization.

  17. Hierarchical processing in the prefrontal cortex in a variety of cognitive domains

    Directory of Open Access Journals (Sweden)

    Hyeon-Ae eJeon

    2014-11-01

    Full Text Available This review scrutinizes several findings on human hierarchical processing within the prefrontal cortex (PFC in diverse cognitive domains. Converging evidence from previous studies has shown that the PFC, specifically Brodmann area (BA 44, may function as the essential region for hierarchical processing across the domains. In language fMRI studies, BA 44 was significantly activated for the hierarchical processing of center-embedded sentences and this pattern of activations was also observed in artificial grammar. The same pattern was observed in the visuo-spatial domain where BA44 was actively involved in the processing of hierarchy for the visual symbol. Musical syntax, which is the rule-based arrangement of musical sets, has also been construed as hierarchical processing as in the language domain such that the activation in BA44 was observed in a chord sequence paradigm. P600 ERP was also engendered during the processing of musical hierarchy. Along with a longstanding idea that a human’s number faculty is developed as a by-product of language faculty, BA44 was closely involved in hierarchical processing in mental arithmetic. This review extended its discussion of hierarchical processing to hierarchical behavior, that is, human action which has been referred to as being hierarchically composed. Several lesion and TMS studies supported the involvement of BA44 for hierarchical processing in the action domain. Lastly, the hierarchical organization of cognitive controls was discussed within the PFC, forming a cascade of top-down hierarchical processes operating along a posterior-to-anterior axis of the lateral PFC including BA44 within the network. It is proposed that PFC is actively involved in different forms of hierarchical processing and specifically BA44 may play an integral role in the process. Taking levels of proficiency and subcortical areas into consideration may provide further insight into the functional role of BA44 for hierarchical

  18. Hierarchical matrices algorithms and analysis

    CERN Document Server

    Hackbusch, Wolfgang

    2015-01-01

    This self-contained monograph presents matrix algorithms and their analysis. The new technique enables not only the solution of linear systems but also the approximation of matrix functions, e.g., the matrix exponential. Other applications include the solution of matrix equations, e.g., the Lyapunov or Riccati equation. The required mathematical background can be found in the appendix. The numerical treatment of fully populated large-scale matrices is usually rather costly. However, the technique of hierarchical matrices makes it possible to store matrices and to perform matrix operations approximately with almost linear cost and a controllable degree of approximation error. For important classes of matrices, the computational cost increases only logarithmically with the approximation error. The operations provided include the matrix inversion and LU decomposition. Since large-scale linear algebra problems are standard in scientific computing, the subject of hierarchical matrices is of interest to scientists ...

  19. Parallel hierarchical radiosity rendering

    Energy Technology Data Exchange (ETDEWEB)

    Carter, Michael [Iowa State Univ., Ames, IA (United States)

    1993-07-01

    In this dissertation, the step-by-step development of a scalable parallel hierarchical radiosity renderer is documented. First, a new look is taken at the traditional radiosity equation, and a new form is presented in which the matrix of linear system coefficients is transformed into a symmetric matrix, thereby simplifying the problem and enabling a new solution technique to be applied. Next, the state-of-the-art hierarchical radiosity methods are examined for their suitability to parallel implementation, and scalability. Significant enhancements are also discovered which both improve their theoretical foundations and improve the images they generate. The resultant hierarchical radiosity algorithm is then examined for sources of parallelism, and for an architectural mapping. Several architectural mappings are discussed. A few key algorithmic changes are suggested during the process of making the algorithm parallel. Next, the performance, efficiency, and scalability of the algorithm are analyzed. The dissertation closes with a discussion of several ideas which have the potential to further enhance the hierarchical radiosity method, or provide an entirely new forum for the application of hierarchical methods.

  20. Hierarchical prisoner’s dilemma in hierarchical game for resource competition

    Science.gov (United States)

    Fujimoto, Yuma; Sagawa, Takahiro; Kaneko, Kunihiko

    2017-07-01

    Dilemmas in cooperation are one of the major concerns in game theory. In a public goods game, each individual cooperates by paying a cost or defecting without paying it, and receives a reward from the group out of the collected cost. Thus, defecting is beneficial for each individual, while cooperation is beneficial for the group. Now, groups (say, countries) consisting of individuals also play games. To study such a multi-level game, we introduce a hierarchical game in which multiple groups compete for limited resources by utilizing the collected cost in each group, where the power to appropriate resources increases with the population of the group. Analyzing this hierarchical game, we found a hierarchical prisoner’s dilemma, in which groups choose the defecting policy (say, armament) as a Nash strategy to optimize each group’s benefit, while cooperation optimizes the total benefit. On the other hand, for each individual, refusing to pay the cost (say, tax) is a Nash strategy, which turns out to be a cooperation policy for the group, thus leading to a hierarchical dilemma. Here the group reward increases with the group size. However, we find that there exists an optimal group size that maximizes the individual payoff. Furthermore, when the population asymmetry between two groups is large, the smaller group will choose a cooperation policy (say, disarmament) to avoid excessive response from the larger group, and the prisoner’s dilemma between the groups is resolved. Accordingly, the relevance of this hierarchical game on policy selection in society and the optimal size of human or animal groups are discussed.

  1. Chelating agent-free, vapor-assisted crystallization method to synthesize hierarchical microporous/mesoporous MIL-125 (Ti).

    Science.gov (United States)

    McNamara, Nicholas D; Hicks, Jason C

    2015-03-11

    Titanium-based microporous heterogeneous catalysts are widely studied but are often limited by the accessibility of reactants to active sites. Metal-organic frameworks (MOFs), such as MIL-125 (Ti), exhibit enhanced surface areas due to their high intrinsic microporosity, but the pore diameters of most microporous MOFs are often too small to allow for the diffusion of larger reactants (>7 Å) relevant to petroleum and biomass upgrading. In this work, hierarchical microporous MIL-125 exhibiting significantly enhanced interparticle mesoporosity was synthesized using a chelating-free, vapor-assisted crystallization method. The resulting hierarchical MOF was examined as an active catalyst for the oxidation of dibenzothiophene (DBT) with tert-butyl hydroperoxide and outperformed the solely microporous analogue. This was attributed to greater access of the substrate to surface active sites, as the pores in the microporous analogues were of inadequate size to accommodate DBT. Moreover, thiophene adsorption studies suggested the mesoporous MOF contained larger amounts of unsaturated metal sites that could enhance the observed catalytic activity.

  2. A Trusted Host's Authentication Access and Control Model Faced on User Action

    Institute of Scientific and Technical Information of China (English)

    ZHANG Miao; XU Guoai; HU Zhengming; YANG Yixian

    2006-01-01

    The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

  3. Controlling Access to Input/Output Peripheral Devices

    Directory of Open Access Journals (Sweden)

    E. Y. Rodionov

    2010-03-01

    Full Text Available In this paper the author proposes a system that manages information security policy on enterprise. Problems related to managing information security policy on enterprise and access to peripheral devices in computer systems functioning under control of Microsoft Windows NT operating systems are considered.

  4. An Internet of Things Based Multi-Level Privacy-Preserving Access Control for Smart Living

    Directory of Open Access Journals (Sweden)

    Usama Salama

    2018-05-01

    Full Text Available The presence of the Internet of Things (IoT in healthcare through the use of mobile medical applications and wearable devices allows patients to capture their healthcare data and enables healthcare professionals to be up-to-date with a patient’s status. Ambient Assisted Living (AAL, which is considered as one of the major applications of IoT, is a home environment augmented with embedded ambient sensors to help improve an individual’s quality of life. This domain faces major challenges in providing safety and security when accessing sensitive health data. This paper presents an access control framework for AAL which considers multi-level access and privacy preservation. We focus on two major points: (1 how to use the data collected from ambient sensors and biometric sensors to perform the high-level task of activity recognition; and (2 how to secure the collected private healthcare data via effective access control. We achieve multi-level access control by extending Public Key Infrastructure (PKI for secure authentication and utilizing Attribute-Based Access Control (ABAC for authorization. The proposed access control system regulates access to healthcare data by defining policy attributes over healthcare professional groups and data classes classifications. We provide guidelines to classify the data classes and healthcare professional groups and describe security policies to control access to the data classes.

  5. Creating Hierarchical Pores by Controlled Linker Thermolysis in Multivariate Metal-Organic Frameworks

    KAUST Repository

    Feng, Liang; Yuan, Shuai; Zhang, Liang-Liang; Tan, Kui; Li, Jia-Luo; Kirchon, Angelo; Liu, Ling-Mei; Zhang, Peng; Han, Yu; Chabal, Yves J.; Zhou, Hong-Cai

    2018-01-01

    strate-gy, linker thermolysis, to construct ultra-stable hierarchically porous metal−organic frameworks (HP-MOFs) with tunable pore size distribution. Linker instability, usually an undesirable trait of MOFs, was exploited to create mesopores

  6. Need an Information Security in Access Control System?

    Directory of Open Access Journals (Sweden)

    V. R. Petrov

    2011-12-01

    Full Text Available The purpose of this paper is the general problems of information security in access control system. The field of using is the in project of reconstruction Physical protection system.

  7. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  8. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  9. Formalization of the Access Control on ARM-Android Platform with the B Method

    Science.gov (United States)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  10. A Dynamic Active Multicast Group Access Control Framework Based on Trust Management System

    Institute of Scientific and Technical Information of China (English)

    YANG Chang; CHEN Xiaolin; ZHANG Huanguo

    2006-01-01

    The current multicast model provides no access control mechanism. Any host can send data directly to a multicast address or join a multicast group to become a member, which brings safety problems to multicast. In this paper, we present a new active multicast group access control mechanism that is founded on trust management. This structure can solve the problem that exists in multicast members' access control and distributing authorization of traditional IP multicast.

  11. Predictive access control for distributed computation

    DEFF Research Database (Denmark)

    Yang, Fan; Hankin, Chris; Nielson, Flemming

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future beh...... behavior of a program. A novel feature of our approach is that we can define policies concerning secondary use of data....

  12. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  13. How hierarchical is language use?

    Science.gov (United States)

    Frank, Stefan L.; Bod, Rens; Christiansen, Morten H.

    2012-01-01

    It is generally assumed that hierarchical phrase structure plays a central role in human language. However, considerations of simplicity and evolutionary continuity suggest that hierarchical structure should not be invoked too hastily. Indeed, recent neurophysiological, behavioural and computational studies show that sequential sentence structure has considerable explanatory power and that hierarchical processing is often not involved. In this paper, we review evidence from the recent literature supporting the hypothesis that sequential structure may be fundamental to the comprehension, production and acquisition of human language. Moreover, we provide a preliminary sketch outlining a non-hierarchical model of language use and discuss its implications and testable predictions. If linguistic phenomena can be explained by sequential rather than hierarchical structure, this will have considerable impact in a wide range of fields, such as linguistics, ethology, cognitive neuroscience, psychology and computer science. PMID:22977157

  14. Collaborative Access Control For Critical Infrastructures

    Science.gov (United States)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  15. Accessibility to tuberculosis control services and tuberculosis programme performance in southern Ethiopia

    Directory of Open Access Journals (Sweden)

    Mesay Hailu Dangisso

    2015-11-01

    Full Text Available Background: Despite the expansion of health services and community-based interventions in Ethiopia, limited evidence exists about the distribution of and access to health facilities and their relationship with the performance of tuberculosis (TB control programmes. We aim to assess the geographical distribution of and physical accessibility to TB control services and their relationship with TB case notification rates (CNRs and treatment outcome in the Sidama Zone, southern Ethiopia. Design: We carried out an ecological study to assess physical accessibility to TB control facilities and the association of physical accessibility with TB CNRs and treatment outcome. We collected smear-positive pulmonary TB (PTB cases treated during 2003–2012 from unit TB registers and TB service data such as availability of basic supplies for TB control and geographic locations of health services. We used ArcGIS 10.2 to measure the distance from each enumeration location to the nearest TB control facilities. A linear regression analysis was employed to assess factors associated with TB CNRs and treatment outcome. Results: Over a decade the health service coverage (the health facility–to-population ratio increased by 36% and the accessibility to TB control facilities also improved. Thus, the mean distance from TB control services was 7.6 km in 2003 (ranging from 1.8 to 25.5 km between kebeles (the smallest administrative units and had decreased to 3.2 km in 2012 (ranging from 1.5 to 12.4 km. In multivariate linear regression, as distance from TB diagnostic facilities (b-estimate=−0.25, p<0.001 and altitude (b-estimate=−0.31, p<0.001 increased, the CNRs of TB decreased, whereas a higher population density was associated with increased TB CNRs. Similarly, distance to TB control facilities (b-estimate=−0.27, p<0.001 and altitude (b-estimate=−0.30, p<0.001 were inversely associated with treatment success (proportion of treatment completed or cured cases

  16. Lattice-Symmetry-Driven Epitaxy of Hierarchical GaN Nanotripods

    KAUST Repository

    Wang, Ping

    2017-01-18

    Lattice-symmetry-driven epitaxy of hierarchical GaN nanotripods is demonstrated. The nanotripods emerge on the top of hexagonal GaN nanowires, which are selectively grown on pillar-patterned GaN templates using molecular beam epitaxy. High-resolution transmission electron microscopy confirms that two kinds of lattice-symmetry, wurtzite (wz) and zinc-blende (zb), coexist in the GaN nanotripods. Periodical transformation between wz and zb drives the epitaxy of the hierarchical nanotripods with N-polarity. The zb-GaN is formed by the poor diffusion of adatoms, and it can be suppressed by improving the ability of the Ga adatoms to migrate as the growth temperature increased. This controllable epitaxy of hierarchical GaN nanotripods allows quantum dots to be located at the phase junctions of the nanotripods and nanowires, suggesting a new recipe for multichannel quantum devices.

  17. The choice of park and ride facilities: an analysis using a context-dependent hierarchical choice experiment

    OpenAIRE

    Ilona D M Bos; Rob E C M Van der Heijden; Eric J E Molin; Harry J P Timmermans

    2004-01-01

    Park and ride (P & R) facilities have been proposed in several countries to alleviate the accessibility problems in cities. Despite growing accessibility problems, these facilities do not seem to attract the expected number of car drivers and are underused. In an attempt to measure consumer evaluations of the attributes of P & R facilities, a stated choice experiment, based on the method of hierarchical information integration, was conducted in the city of Nijmegen, The Netherlands. This pape...

  18. An interference cancellation strategy for broadcast in hierarchical cell structure

    KAUST Repository

    Yang, Yuli; Aï ssa, Sonia; Eltawil, Ahmed M.; Salama, Khaled N.

    2014-01-01

    In this paper, a hierarchical cell structure is considered, where public safety broadcasting is fulfilled in a femtocell located within a macrocell. In the femtocell, also known as local cell, an access point broadcasts to each local node (LN) over an orthogonal frequency sub-band independently. Since the local cell shares the spectrum licensed to the macrocell, a given LN is interfered by transmissions of the macrocell user (MU) in the same sub-band. To improve the broadcast performance in the local cell, a novel scheme is proposed to mitigate the interference from the MU to the LN while achieving diversity gain. For the sake of performance evaluation, ergodic capacity of the proposed scheme is quantified and a corresponding closed-form expression is obtained. By comparing with the traditional scheme that suffers from the MU's interference, numerical results substantiate the advantage of the proposed scheme and provide a useful tool for the broadcast design in hierarchical cell systems.

  19. An interference cancellation strategy for broadcast in hierarchical cell structure

    KAUST Repository

    Yang, Yuli

    2014-12-01

    In this paper, a hierarchical cell structure is considered, where public safety broadcasting is fulfilled in a femtocell located within a macrocell. In the femtocell, also known as local cell, an access point broadcasts to each local node (LN) over an orthogonal frequency sub-band independently. Since the local cell shares the spectrum licensed to the macrocell, a given LN is interfered by transmissions of the macrocell user (MU) in the same sub-band. To improve the broadcast performance in the local cell, a novel scheme is proposed to mitigate the interference from the MU to the LN while achieving diversity gain. For the sake of performance evaluation, ergodic capacity of the proposed scheme is quantified and a corresponding closed-form expression is obtained. By comparing with the traditional scheme that suffers from the MU\\'s interference, numerical results substantiate the advantage of the proposed scheme and provide a useful tool for the broadcast design in hierarchical cell systems.

  20. Controlled self-assembly of PbS nanoparticles into macrostar-like hierarchical structures

    International Nuclear Information System (INIS)

    Li, Guowei; Li, Changsheng; Tang, Hua; Cao, Kesheng; Chen, Juan

    2011-01-01

    Graphical abstract: The aggregation and rotation of nanoparticles to adopt parallel orientations in three dimensions was indirectly illustrated by TEM and HRTEM images. Highlights: → Macrostar-like PbS hierarchical structures was successfully synthesized by a simple hydrothermal method and mesostars were assembled from the PbS nanocube building blocks with edge lengths of about 100 nm. → Ostwald-ripening-assisted oriented attachment is believed to play a key role in the growth behavior of novel 3D structures. → Optical properties indicating few defects on the surface of the PbS structure and exhibit large blue-shifts compared to bulk PbS. -- Abstract: The synthesis of macrostar-like PbS hierarchical structures by a simple hydrothermal method at 180 o C for 24 h is proven successful with the assistance of a new surfactant called tetrabutylammonium bromide (TBAB). The as-obtained product is characterized by means of X-ray powder diffraction, field emission scanning electron microscopy, energy dispersive spectrometry, high resolution transmission electron microscopy, and selected area electron diffraction. The presence of TBAB and NaF plays an important role in the formation of PbS macrostructures. Ostwald-ripening-assisted oriented attachment is believed to play a key role in the growth behavior of novel 3D structures. As such, a possible self-assembly mechanism is proposed to explain the formation of the said structures. The present study aims to introduce new insights into understanding the formation process of such unique hierarchical superstructures.

  1. Problems and Concerns Regarding Access Control System Construction in Radiation Facilities Based on the NIFS Experience

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Motojima, O.

    2001-01-01

    Full text: In 1998, access control system for the large helical device (LHD) experimental hall was constructed and put into operation at the National Institute for Fusion Science (NIFS) in Toki, Japan. Since then, the system has been continuously improved. It now controls access into the LHD controlled area through four entrances. The system has five turnstile gates and enables control of access at the four entrances. The system is always checking whether the shielding doors are open or closed at eight positions. The details pertaining to the construction of the system were reported at IRPA-10 held in Hiroshima, Japan, in 2000. Based on our construction experience of the NIFS access control system, we will discuss problems related to software and operational design of the system. We will also discuss some concerns regarding the use of the system in radiation facilities. The problems we will present concern, among other thing, individual registration, time control, turnstile control, interlock signal control, data aggregation and transactions, automatic and manual control, and emergency procedures. For example, in relation to the time control and turnstile control functions, we will discuss the gate-opening time interval for an access event, the timing of access data recording, date changing, turn bar control, double access, and access error handling. (author)

  2. Hierarchical architecture of active knits

    International Nuclear Information System (INIS)

    Abel, Julianna; Luntz, Jonathan; Brei, Diann

    2013-01-01

    Nature eloquently utilizes hierarchical structures to form the world around us. Applying the hierarchical architecture paradigm to smart materials can provide a basis for a new genre of actuators which produce complex actuation motions. One promising example of cellular architecture—active knits—provides complex three-dimensional distributed actuation motions with expanded operational performance through a hierarchically organized structure. The hierarchical structure arranges a single fiber of active material, such as shape memory alloys (SMAs), into a cellular network of interlacing adjacent loops according to a knitting grid. This paper defines a four-level hierarchical classification of knit structures: the basic knit loop, knit patterns, grid patterns, and restructured grids. Each level of the hierarchy provides increased architectural complexity, resulting in expanded kinematic actuation motions of active knits. The range of kinematic actuation motions are displayed through experimental examples of different SMA active knits. The results from this paper illustrate and classify the ways in which each level of the hierarchical knit architecture leverages the performance of the base smart material to generate unique actuation motions, providing necessary insight to best exploit this new actuation paradigm. (paper)

  3. Nested and Hierarchical Archimax copulas

    KAUST Repository

    Hofert, Marius

    2017-07-03

    The class of Archimax copulas is generalized to nested and hierarchical Archimax copulas in several ways. First, nested extreme-value copulas or nested stable tail dependence functions are introduced to construct nested Archimax copulas based on a single frailty variable. Second, a hierarchical construction of d-norm generators is presented to construct hierarchical stable tail dependence functions and thus hierarchical extreme-value copulas. Moreover, one can, by itself or additionally, introduce nested frailties to extend Archimax copulas to nested Archimax copulas in a similar way as nested Archimedean copulas extend Archimedean copulas. Further results include a general formula for the density of Archimax copulas.

  4. Nested and Hierarchical Archimax copulas

    KAUST Repository

    Hofert, Marius; Huser, Raphaë l; Prasad, Avinash

    2017-01-01

    The class of Archimax copulas is generalized to nested and hierarchical Archimax copulas in several ways. First, nested extreme-value copulas or nested stable tail dependence functions are introduced to construct nested Archimax copulas based on a single frailty variable. Second, a hierarchical construction of d-norm generators is presented to construct hierarchical stable tail dependence functions and thus hierarchical extreme-value copulas. Moreover, one can, by itself or additionally, introduce nested frailties to extend Archimax copulas to nested Archimax copulas in a similar way as nested Archimedean copulas extend Archimedean copulas. Further results include a general formula for the density of Archimax copulas.

  5. Evaluation of secure capability-based access control in the M2M local cloud platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    delegation. Recently, the capability based access control has been considered as method to manage access in the Internet of Things (IoT) or M2M domain. In this paper, the implementation and evaluation of a proposed secure capability based access control in the M2M local cloud platform is presented......Managing access to and protecting resources is one of the important aspect in managing security, especially in a distributed computing system such as Machine-to-Machine (M2M). One such platform known as the M2M local cloud platform, referring to BETaaS architecture [1], which conceptually consists...... of multiple distributed M2M gateways, creating new challenges in the access control. Some existing access control systems lack in scalability and flexibility to manage access from users or entity that belong to different authorization domains, or fails to provide fine grained and flexible access right...

  6. CSchema: A Downgrading Policy Language for XML Access Control

    Institute of Scientific and Technical Information of China (English)

    Dong-Xi Liu

    2007-01-01

    The problem of regulating access to XML documents has attracted much attention from both academic and industry communities.In existing approaches, the XML elements specified by access policies are either accessible or inac-cessible according to their sensitivity.However, in some cases, the original XML elements are sensitive and inaccessible, but after being processed in some appropriate ways, the results become insensitive and thus accessible.This paper proposes a policy language to accommodate such cases, which can express the downgrading operations on sensitive data in XML documents through explicit calculations on them.The proposed policy language is called calculation-embedded schema (CSchema), which extends the ordinary schema languages with protection type for protecting sensitive data and specifying downgrading operations.CSchema language has a type system to guarantee the type correctness of the embedded calcula-tion expressions and moreover this type system also generates a security view after type checking a CSchema policy.Access policies specified by CSchema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against CSchema policies.These released documents are then ready tobe accessed by, for instance, XML query engines.By incorporating this validation procedure, other XML processing technologies can use CSchema as the access control module.

  7. Designing a Secure E-commerce with Credential Purpose-based Access Control

    OpenAIRE

    Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek

    2014-01-01

    The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-commerce must establish a secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features. The e-commerce application must authorize access to only tho...

  8. 36 CFR 1256.70 - What controls access to national security-classified information?

    Science.gov (United States)

    2010-07-01

    ... national security-classified information? 1256.70 Section 1256.70 Parks, Forests, and Public Property... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access...

  9. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces corresponding formal rules, rule-based reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally, the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-oriented product data management (PDM) system.

  10. Consistency maintenance for constraint in role-based access control model

    Institute of Scientific and Technical Information of China (English)

    韩伟力; 陈刚; 尹建伟; 董金祥

    2002-01-01

    Constraint is an important aspect of role-based access control and is sometimes argued to be the principal motivation for role-based access control (RBAC). But so far'few authors have discussed consistency maintenance for constraint in RBAC model. Based on researches of constraints among roles and types of inconsistency among constraints, this paper introduces correaponding formal rules, rulebased reasoning and corresponding methods to detect, avoid and resolve these inconsistencies. Finally,the paper introduces briefly the application of consistency maintenance in ZD-PDM, an enterprise-ori-ented product data management (PDM) system.

  11. Regulatory Accessibility and Social Influences on State Self-Control

    OpenAIRE

    vanDellen, Michelle R.; Hoyle, Rick H.

    2009-01-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals’ state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-contro...

  12. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  13. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  14. Effect of the sheet thickness of hierarchical SnO_2 on the gas sensing performance

    International Nuclear Information System (INIS)

    Zhang, Wenlong; Zeng, Wen; BinMiao; Wang, Zhongchang

    2015-01-01

    Graphical abstract: - Highlights: • A unique flower-like SnO_2 hierarchical architecture assembled with nanosheets were successfully synthesized. • The thickness of the unique hierarchical nanoflowers was precisely controlled. • The nanoflowers composed of thinner nanosheets show a significantly enhanced gas sensing properties. • A possible growth mechanism for the unique hierarchical SnO_2 nanoflower assembled with nanosheets of different thickness is proposed. - Abstract: A unique hierarchical SnO_2 nanoflower was successfully synthesized via a facile one-step hydrothermal method. The nanoflower was analyzed in detail using X ray diffraction, field-emission electron microscope and transmission electron microscope. It was found that the nanoflowers are all assembled from nanosheets. The nanosheet thickness could be precisely controlled by tuning the dosage of NaOH. Gas sensing tests demonstrated that the thickness of the sheet significantly affects the gas sensing performance. The improved gas sensing properties are attributed to the thinned petals as well as their pores and defects. These results show that the thickness and morphology of hierarchical nanostructures affect the functionality of gas sensors.

  15. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  16. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres

    2014-01-01

    new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....

  17. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  18. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Directory of Open Access Journals (Sweden)

    Luis Cruz-Piris

    2018-03-01

    Full Text Available Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT. One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.. To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT. As an access control scheme, we have selected User-Managed Access (UMA, an existing Open Authorization (OAuth 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  19. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    Science.gov (United States)

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  20. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Science.gov (United States)

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  1. Database application research in real-time data access of accelerator control system

    International Nuclear Information System (INIS)

    Chen Guanghua; Chen Jianfeng; Wan Tianmin

    2012-01-01

    The control system of Shanghai Synchrotron Radiation Facility (SSRF) is a large-scale distributed real-time control system, It involves many types and large amounts of real-time data access during the operating. Database system has wide application prospects in the large-scale accelerator control system. It is the future development direction of the accelerator control system, to replace the differently dedicated data structures with the mature standardized database system. This article discusses the application feasibility of database system in accelerators based on the database interface technology, real-time data access testing, and system optimization research and to establish the foundation of the wide scale application of database system in the SSRF accelerator control system. Based on the database interface technology, real-time data access testing and system optimization research, this article will introduce the application feasibility of database system in accelerators, and lay the foundation of database system application in the SSRF accelerator control system. (authors)

  2. Access control system for two person rule at Rokkasho Reprocessing Plant

    International Nuclear Information System (INIS)

    Yanagisawa, Sawako; Ino, Munekazu; Yamada, Noriyuki; Oota, Hiroto; Iwasaki, Mitsuaki; Kodani, Yoshiki; Iwamoto, Tomonori

    2014-01-01

    Following the amendment and enforcement of Regulation of Reprocessing Activity on March 29th 2012, two person rule has become compulsory for the specific rooms to counter and prevent the sabotage or theft of nuclear materials by the insiders at reprocessing plant in Japan. The rooms will include those which contains cooling systems for decay heat removal from spent fuels and so on, scavenging systems to prevent the hydrogen accumulation, and those which contains nuclear material. To ensure the two person rule at Rokkasho Reprocessing Plant, JNFL has recently, after comprehensive study, introduced efficient and effective access control system for the rooms mentioned above. The system is composed of bio-attestation devices, surveillance cameras and electronic locks to establish access control system. This report outlines the access control system for two person rule and introduces the operation. (author)

  3. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  4. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  5. Simple measurement-based admission control for DiffServ access networks

    Science.gov (United States)

    Lakkakorpi, Jani

    2002-07-01

    In order to provide good Quality of Service (QoS) in a Differentiated Services (DiffServ) network, a dynamic admission control scheme is definitely needed as an alternative to overprovisioning. In this paper, we present a simple measurement-based admission control (MBAC) mechanism for DiffServ-based access networks. Instead of using active measurements only or doing purely static bookkeeping with parameter-based admission control (PBAC), the admission control decisions are based on bandwidth reservations and periodically measured & exponentially averaged link loads. If any link load on the path between two endpoints is over the applicable threshold, access is denied. Link loads are periodically sent to Bandwidth Broker (BB) of the routing domain, which makes the admission control decisions. The information needed in calculating the link loads is retrieved from the router statistics. The proposed admission control mechanism is verified through simulations. Our results prove that it is possible to achieve very high bottleneck link utilization levels and still maintain good QoS.

  6. Information Security and Wireless: Alternate Approaches for Controlling Access to Critical Information

    National Research Council Canada - National Science Library

    Nandram, Winsome

    2004-01-01

    .... Typically, network managers implement countermeasures to augment security. The goal of this thesis is to research approaches that compliment existing security measures with fine grain access control measures. The Extensible Markup Language (XML) is adopted to accommodate such granular access control as it provides the mechanisms for scaling security down to the document content level.

  7. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  8. Distributed Smart Decision-Making for a Multimicrogrid System Based on a Hierarchical Interactive Architecture

    DEFF Research Database (Denmark)

    Marzband, Mousa; Parhizi, Narges; Savaghebi, Mehdi

    2016-01-01

    In this paper, a comprehensive real-time interactive EMS framework for the utility and multiple electrically-coupled MGs is proposed. A hierarchical bi-level control scheme-BLCS with primary and secondary level controllers is applied in this regard. The proposed hierarchical architecture consists...... are treated as uncertainties in the proposed structure. In order to handle the uncertainties, Taguchi0s orthogonal array testing-TOAT approach is utilized. Then, the shortage or surplus of the MGs power should be submitted to a central EMS-CEMS in the secondary-level. In order to validate the proposed control...

  9. Easy synthesis of hierarchical carbon spheres with superior capacitive performance in supercapacitors.

    Science.gov (United States)

    Huang, Xinhua; Kim, Seok; Heo, Min Seon; Kim, Ji Eun; Suh, Hongsuk; Kim, Il

    2013-10-01

    An easy template-free approach to the fabrication of pure carbon microspheres has been achieved via direct pyrolysis of as-prepared polyaromatic hydrocarbons including polynaphthalene and polypyrene. The polyaromatics were synthesized from aromatic hydrocarbons (AHCs) using anhydrous zinc chloride as the Friedel-Crafts catalyst and chloromethyl methyl ether as a cross-linker. The experimental results show that the methylene bridges between phenyl rings generate a hierarchical porous polyaromatic precursor to form three-dimensionally (3D) interconnected micro-, meso-, and macroporous networks during carbonization. These hierarchical porous carbon aggregates of spherical carbon spheres exhibit faster ion transport/diffusion behavior and increased surface area usage in electric double-layer capacitors. Furthermore, micropores are present in the 3D interconnected network inside the cross-linked AHC-based carbon microspheres, thus imparting an exceptionally large, electrochemically accessible surface area for charge accumulation.

  10. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  11. Enriching the hierarchical model of achievement motivation: autonomous and controlling reasons underlying achievement goals.

    Science.gov (United States)

    Michou, Aikaterini; Vansteenkiste, Maarten; Mouratidis, Athanasios; Lens, Willy

    2014-12-01

    The hierarchical model of achievement motivation presumes that achievement goals channel the achievement motives of need for achievement and fear of failure towards motivational outcomes. Yet, less is known whether autonomous and controlling reasons underlying the pursuit of achievement goals can serve as additional pathways between achievement motives and outcomes. We tested whether mastery approach, performance approach, and performance avoidance goals and their underlying autonomous and controlling reasons would jointly explain the relation between achievement motives (i.e., fear of failure and need for achievement) and learning strategies (Study 1). Additionally, we examined whether the autonomous and controlling reasons underlying learners' dominant achievement goal would account for the link between achievement motives and the educational outcomes of learning strategies and cheating (Study 2). Six hundred and six Greek adolescent students (Mage = 15.05, SD = 1.43) and 435 university students (Mage M = 20.51, SD = 2.80) participated in studies 1 and 2, respectively. In both studies, a correlational design was used and the hypotheses were tested via path modelling. Autonomous and controlling reasons underlying the pursuit of achievement goals mediated, respectively, the relation of need for achievement and fear of failure to aspects of learning outcomes. Autonomous and controlling reasons underlying achievement goals could further explain learners' functioning in achievement settings. © 2014 The British Psychological Society.

  12. An Optimal Medium Access Control with Partial Observations for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Servetto Sergio D

    2005-01-01

    Full Text Available We consider medium access control (MAC in multihop sensor networks, where only partial information about the shared medium is available to the transmitter. We model our setting as a queuing problem in which the service rate of a queue is a function of a partially observed Markov chain representing the available bandwidth, and in which the arrivals are controlled based on the partial observations so as to keep the system in a desirable mildly unstable regime. The optimal controller for this problem satisfies a separation property: we first compute a probability measure on the state space of the chain, namely the information state, then use this measure as the new state on which the control decisions are based. We give a formal description of the system considered and of its dynamics, we formalize and solve an optimal control problem, and we show numerical simulations to illustrate with concrete examples properties of the optimal control law. We show how the ergodic behavior of our queuing model is characterized by an invariant measure over all possible information states, and we construct that measure. Our results can be specifically applied for designing efficient and stable algorithms for medium access control in multiple-accessed systems, in particular for sensor networks.

  13. Graphs for information security control in software defined networks

    Science.gov (United States)

    Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.

    2017-07-01

    Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.

  14. Design and Implementation of Linux Access Control Model

    Institute of Scientific and Technical Information of China (English)

    Wei Xiaomeng; Wu Yongbin; Zhuo Jingchuan; Wang Jianyun; Haliqian Mayibula

    2017-01-01

    In this paper,the design and implementation of an access control model for Linux system are discussed in detail. The design is based on the RBAC model and combines with the inherent characteristics of the Linux system,and the support for the process and role transition is added.The core idea of the model is that the file is divided into different categories,and access authority of every category is distributed to several roles.Then,roles are assigned to users of the system,and the role of the user can be transited from one to another by running the executable file.

  15. Distributed hierarchical radiation monitoring system

    International Nuclear Information System (INIS)

    Barak, D.

    1985-01-01

    A solution to the problem of monitoring the radiation levels in and around a nuclear facility is presented in this paper. This is a private case of a large scale general purpose data acqisition system with high reliability, availability and short maintenance time. The physical layout of the detectors in the plant, and the strict control demands dictated a distributed and hierarchical system. The system is comprised of three levels, each level contains modules. Level one contains the Control modules which collects data from groups of detectors and executes emergency local control tasks. In level two are the Group controllers which concentrate data from the Control modules, and enable local display and communication. The system computer is in level three, enabling the plant operator to receive information from the detectors and execute control tasks. The described system was built and is operating successfully for about two years. (author)

  16. Automated personal identification: a new technique for controlling access to nuclear materials and facilities

    International Nuclear Information System (INIS)

    Eccles, D.R.

    1975-01-01

    Special nuclear materials must be protected against the threat of diversion or theft, and nuclear facilities against the threat of industrial sabotage. Implicit in this protection is the means of controlling access to protected areas, material access areas, and vital areas. With the advent of automated personal identification technology, the processes of access control can be automated to yield both higher security and reduced costs. This paper first surveys the conventional methods of access control; next, automated personal identification concepts are presented and various systems approaches are highlighted; finally, Calspan's FINGERSCAN /sub TM/ system for identity verification is described

  17. ACCESS: Detector Control and Performance

    Science.gov (United States)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  18. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Science.gov (United States)

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  19. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Directory of Open Access Journals (Sweden)

    Seungsoo Baek

    2014-01-01

    Full Text Available There has been an explosive increase in the population of the OSN (online social network in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  20. TRBAC:基于信任的访问控制模型%TRBAC: Trust Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    刘武; 段海新; 张洪; 任萍; 吴建平

    2011-01-01

    访问控制是根据网络用户的身份或属性,对该用户执行某些操作或访问某些网络资源进行控制的过程.对现有访问控制模型进行分析,并针对其不足对RBAC模型进行了扩展,提出了基于信任的访问控制模型TRBAC(trust based access control model).该模型可以提供更加安全、灵活以及细粒度的动态访问授权机制,从而提高授权机制的安全性与可靠性.%Access control is a process which controls users to execute some operations or access some network resources according to the users' identity or attribution. The discretionary access control and mandatory access control are two main access control modes which are broadly used in secure operating systems. Discretionary access control is based on user identity and/or groups and mandatory access control is usually based on sensitivity labels. Neither of these two modes can completely satisfy the requirements of all access control. Discretionary access control is too loose to restrict the propagation of privileges while mandatory access control is too rigid to use flexibly. This paper analyzes current access control models, and extends the RBAC (role based access control) model aiming at its deficiency, and based on which we propose a trust based access control model (TRBAC). The TRBAC model can provide more security, flexible and fine-grained dynamic access control mechanism, and therefore improve both the security and the reliability of authorization mechanism.

  1. Research on a Hierarchical Dynamic Automatic Voltage Control System Based on the Discrete Event-Driven Method

    Directory of Open Access Journals (Sweden)

    Yong Min

    2013-06-01

    Full Text Available In this paper, concepts and methods of hybrid control systems are adopted to establish a hierarchical dynamic automatic voltage control (HD-AVC system, realizing the dynamic voltage stability of power grids. An HD-AVC system model consisting of three layers is built based on the hybrid control method and discrete event-driven mechanism. In the Top Layer, discrete events are designed to drive the corresponding control block so as to avoid solving complex multiple objective functions, the power system’s characteristic matrix is formed and the minimum amplitude eigenvalue (MAE is calculated through linearized differential-algebraic equations. MAE is applied to judge the system’s voltage stability and security and construct discrete events. The Middle Layer is responsible for management and operation, which is also driven by discrete events. Control values of the control buses are calculated based on the characteristics of power systems and the sensitivity method. Then control values generate control strategies through the interface block. In the Bottom Layer, various control devices receive and implement the control commands from the Middle Layer. In this way, a closed-loop power system voltage control is achieved. Computer simulations verify the validity and accuracy of the HD-AVC system, and verify that the proposed HD-AVC system is more effective than normal voltage control methods.

  2. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  3. Hierarchical video summarization based on context clustering

    Science.gov (United States)

    Tseng, Belle L.; Smith, John R.

    2003-11-01

    A personalized video summary is dynamically generated in our video personalization and summarization system based on user preference and usage environment. The three-tier personalization system adopts the server-middleware-client architecture in order to maintain, select, adapt, and deliver rich media content to the user. The server stores the content sources along with their corresponding MPEG-7 metadata descriptions. In this paper, the metadata includes visual semantic annotations and automatic speech transcriptions. Our personalization and summarization engine in the middleware selects the optimal set of desired video segments by matching shot annotations and sentence transcripts with user preferences. Besides finding the desired contents, the objective is to present a coherent summary. There are diverse methods for creating summaries, and we focus on the challenges of generating a hierarchical video summary based on context information. In our summarization algorithm, three inputs are used to generate the hierarchical video summary output. These inputs are (1) MPEG-7 metadata descriptions of the contents in the server, (2) user preference and usage environment declarations from the user client, and (3) context information including MPEG-7 controlled term list and classification scheme. In a video sequence, descriptions and relevance scores are assigned to each shot. Based on these shot descriptions, context clustering is performed to collect consecutively similar shots to correspond to hierarchical scene representations. The context clustering is based on the available context information, and may be derived from domain knowledge or rules engines. Finally, the selection of structured video segments to generate the hierarchical summary efficiently balances between scene representation and shot selection.

  4. An approach to separating the levels of hierarchical structure building in language and mathematics.

    Science.gov (United States)

    Makuuchi, Michiru; Bahlmann, Jörg; Friederici, Angela D

    2012-07-19

    We aimed to dissociate two levels of hierarchical structure building in language and mathematics, namely 'first-level' (the build-up of hierarchical structure with externally given elements) and 'second-level' (the build-up of hierarchical structure with internally represented elements produced by first-level processes). Using functional magnetic resonance imaging, we investigated these processes in three domains: sentence comprehension, arithmetic calculation (using Reverse Polish notation, which gives two operands followed by an operator) and a working memory control task. All tasks required the build-up of hierarchical structures at the first- and second-level, resulting in a similar computational hierarchy across language and mathematics, as well as in a working memory control task. Using a novel method that estimates the difference in the integration cost for conditions of different trial durations, we found an anterior-to-posterior functional organization in the prefrontal cortex, according to the level of hierarchy. Common to all domains, the ventral premotor cortex (PMv) supports first-level hierarchy building, while the dorsal pars opercularis (POd) subserves second-level hierarchy building, with lower activation for language compared with the other two tasks. These results suggest that the POd and the PMv support domain-general mechanisms for hierarchical structure building, with the POd being uniquely efficient for language.

  5. Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

    OpenAIRE

    Yekini N.A.; Itegboje A.O.; Oyeyinka I.K.; Akinwole A.K.

    2012-01-01

    An automatic teller machine requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with structured questions among the ATM users and the result proofed that a lot of problems was associated with ATM smartcard for access control. Among the problems are; it is very difficult to prevent another person from attaining and using a legitimate persons card, ...

  6. Access control issues and solutions for large sites

    International Nuclear Information System (INIS)

    Warren, F.E.

    1992-07-01

    The Lawrence Livermore National Laboratory (LLNL) operates an automated access control system consisting of more than 100 portals. We have gained considerable practical experience in the issues involved in operating this large system, and have identified the central issues to include system reliability, the large user population, the need for central control, constant change, high visibility and the budget. This paper outlines these issues and draws from our experience to discuss some fruitful ways of addressing them

  7. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  8. The OPL Access Control Policy Language

    Science.gov (United States)

    Alm, Christopher; Wolf, Ruben; Posegga, Joachim

    Existing policy languages suffer from a limited ability of directly and elegantly expressing high-level access control principles such as history-based separation of duty [22], binding of duty [26], context constraints [24], Chinese wall properties [10], and obligations [20]. It is often difficult to extend a language in order to retrofit these features once required or it is necessary to use complicated and complex language constructs to express such concepts. The latter, however, is cumbersome and error-prone for humans dealing with policy administration.

  9. A novel technique to extract events from access control system and locate persons

    International Nuclear Information System (INIS)

    Vincent, M.; Vaidyanathan, Mythili; Patidar, Suresh Chandra; Prabhakara Rao, G.

    2011-01-01

    Indira Gandhi Centre for Atomic Research houses many laboratories which handle radioactive materials and classified materials. Protection and accounting of men and material and critical facilities are important aspect of nuclear security. Access Control System (ACS) is used to enhance the protective measures against elevated threat environment. Access control system hardware consists of hand geometry readers, RFID readers, Controllers, Electromagnetic door locks, Turnstiles, fiber cable laying and termination etc. Access Control System controls and monitors the people accessing the secured facilities. Access Control System generates events on: 1. Showing of RFID card, 2. Rotation of turnstile, 3. Download of valid card numbers, 4. Generation of alarms etc. Access control system turnstiles are located in main entrance of a facility, entrance of inside laboratory and door locks are fixed on secured facilities. Events are stored in SQL server database. From the events stored in database a novel technique is developed to extract events and list the persons in a particular facility, list all entry/exit events on one day, list the first in and last out entries. This paper discusses the complex multi level group by queries and software developed to extract events from database, locate persons and generate reports. Software is developed as a web application in ASP.Net and query is written in SQL. User can select the doors, type of events and generate reports. Reports are generated using the master data stored about employees RFID cards and events data stored in tables. Four types of reports are generated 1. Plant Emergency Report, 2. Locate User Report, 3. Entry - Exit Report, 4. First in Last out Report. To generate plant emergency report for whole plant only events generated in outer gates have to be considered. To generate plant emergency report for inside laboratory, events generated in entrance gates have to be ignored. (author)

  10. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  11. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; Gadducci, F.

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e.before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  12. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  13. RESEARCH Improving access and quality of care in a TB control ...

    African Journals Online (AJOL)

    or treatment. Improving access and quality of care in a. TB control programme. Vera Scott, Virginia Azevedo, Judy Caldwell. Objectives. To use a quality improvement approach to improve access to and quality of tuberculosis (TB) diagnosis and care in. Cape Town. Methods. Five HIV/AIDS/sexually transmitted infections/TB.

  14. Catalytically active and hierarchically porous SAPO-11 zeolite synthesized in the presence of polyhexamethylene biguanidine

    KAUST Repository

    Liu, Yan

    2014-03-01

    Hierarchically porous SAPO-11 zeolite (H-SAPO-11) is rationally synthesized from a starting silicoaluminophosphate gel in the presence of polyhexamethylene biguanidine as a mesoscale template. The sample is well characterized by XRD, N2 sorption, SEM, TEM, NMR, XPS, NH3-TPD, and TG techniques. The results show that the sample obtained has good crystallinity, hierarchical porosity (mesopores at ca. 10nm and macropores at ca. 50-200nm), high BET surface area (226m2/g), large pore volume (0.25cm3/g), and abundant medium and strong acidic sites (0.36mmol/g). After loading Pt (0.5wt.%) on H-SAPO-11 by using wet impregnation method, catalytic hydroisomerization tests of n-dodecane show that the hierarchical Pt/SAPO-11 zeolite exhibits high conversion of n-dodecane and enhanced selectivity for branched products as well as reduced selectivity for cracking products, compared with conventional Pt/SAPO-11 zeolite. This phenomenon is reasonably attributed to the presence of hierarchical porosity, which is favorable for access of reactants on catalytically active sites. The improvement in catalytic performance in long-chain paraffin hydroisomerization over Pt/SAPO-11-based catalyst is of great importance for its industrial applications in the future. © 2013 Elsevier Inc.

  15. TiO2 nanowire-templated hierarchical nanowire network as water-repelling coating

    Science.gov (United States)

    Hang, Tian; Chen, Hui-Jiuan; Xiao, Shuai; Yang, Chengduan; Chen, Meiwan; Tao, Jun; Shieh, Han-ping; Yang, Bo-ru; Liu, Chuan; Xie, Xi

    2017-12-01

    Extraordinary water-repelling properties of superhydrophobic surfaces make them novel candidates for a great variety of potential applications. A general approach to achieve superhydrophobicity requires low-energy coating on the surface and roughness on nano- and micrometre scale. However, typical construction of superhydrophobic surfaces with micro-nano structure through top-down fabrication is restricted by sophisticated fabrication techniques and limited choices of substrate materials. Micro-nanoscale topographies templated by conventional microparticles through surface coating may produce large variations in roughness and uncontrollable defects, resulting in poorly controlled surface morphology and wettability. In this work, micro-nanoscale hierarchical nanowire network was fabricated to construct self-cleaning coating using one-dimensional TiO2 nanowires as microscale templates. Hierarchical structure with homogeneous morphology was achieved by branching ZnO nanowires on the TiO2 nanowire backbones through hydrothermal reaction. The hierarchical nanowire network displayed homogeneous micro/nano-topography, in contrast to hierarchical structure templated by traditional microparticles. This hierarchical nanowire network film exhibited high repellency to both water and cell culture medium after functionalization with fluorinated organic molecules. The hierarchical structure templated by TiO2 nanowire coating significantly increased the surface superhydrophobicity compared to vertical ZnO nanowires with nanotopography alone. Our results demonstrated a promising strategy of using nanowires as microscale templates for the rational design of hierarchical coatings with desired superhydrophobicity that can also be applied to various substrate materials.

  16. High-energy supercapacitors based on hierarchical porous carbon with an ultrahigh ion-accessible surface area in ionic liquid electrolytes

    Science.gov (United States)

    Zhong, Hui; Xu, Fei; Li, Zenghui; Fu, Ruowen; Wu, Dingcai

    2013-05-01

    A very important yet really challenging issue to address is how to greatly increase the energy density of supercapacitors to approach or even exceed those of batteries without sacrificing the power density. Herein we report the fabrication of a new class of ultrahigh surface area hierarchical porous carbon (UHSA-HPC) based on the pore formation and widening of polystyrene-derived HPC by KOH activation, and highlight its superior ability for energy storage in supercapacitors with ionic liquid (IL) as electrolyte. The UHSA-HPC with a surface area of more than 3000 m2 g-1 shows an extremely high energy density, i.e., 118 W h kg-1 at a power density of 100 W kg-1. This is ascribed to its unique hierarchical nanonetwork structure with a large number of small-sized nanopores for IL storage and an ideal meso-/macroporous network for IL transfer.A very important yet really challenging issue to address is how to greatly increase the energy density of supercapacitors to approach or even exceed those of batteries without sacrificing the power density. Herein we report the fabrication of a new class of ultrahigh surface area hierarchical porous carbon (UHSA-HPC) based on the pore formation and widening of polystyrene-derived HPC by KOH activation, and highlight its superior ability for energy storage in supercapacitors with ionic liquid (IL) as electrolyte. The UHSA-HPC with a surface area of more than 3000 m2 g-1 shows an extremely high energy density, i.e., 118 W h kg-1 at a power density of 100 W kg-1. This is ascribed to its unique hierarchical nanonetwork structure with a large number of small-sized nanopores for IL storage and an ideal meso-/macroporous network for IL transfer. Electronic supplementary information (ESI) available: Sample preparation, material characterization, electrochemical characterization and specific mass capacitance and energy density. See DOI: 10.1039/c3nr00738c

  17. Neutrosophic Hierarchical Clustering Algoritms

    Directory of Open Access Journals (Sweden)

    Rıdvan Şahin

    2014-03-01

    Full Text Available Interval neutrosophic set (INS is a generalization of interval valued intuitionistic fuzzy set (IVIFS, whose the membership and non-membership values of elements consist of fuzzy range, while single valued neutrosophic set (SVNS is regarded as extension of intuitionistic fuzzy set (IFS. In this paper, we extend the hierarchical clustering techniques proposed for IFSs and IVIFSs to SVNSs and INSs respectively. Based on the traditional hierarchical clustering procedure, the single valued neutrosophic aggregation operator, and the basic distance measures between SVNSs, we define a single valued neutrosophic hierarchical clustering algorithm for clustering SVNSs. Then we extend the algorithm to classify an interval neutrosophic data. Finally, we present some numerical examples in order to show the effectiveness and availability of the developed clustering algorithms.

  18. A Protective Mechanism for the Access Control System in the Virtual Domain

    Institute of Scientific and Technical Information of China (English)

    Jinan Shen; Deqing Zou; Hai Jin; Kai Yang; Bin Yuan; Weiming Li

    2016-01-01

    In traditional framework,mandatory access control (MAC) system and malicious software are run in kernel mode.Malicious software can stop MAC systems to be started and make it do invalid.This problem cannot be solved under the traditional framework if the operating system (OS) is comprised since malwares are running in ring0 level.In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems.We separate the access control system into three parts:policy management (PM),security server (SS) and policy enforcement (PE).Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks.We add an access vector cache (AVC) between SS and PE in the guest OS,in order to speed up communication between the guest OS and the security domain.The policy enforcement module is retained in the guest OS for performance.The security of AVC and PE can be ensured by using a memory protection mechanism.The goal of protecting the OS kemel is to ensure the security of the execution path.We implement the system by a modified Xen hypervisor.The result shows that we can secure the security of the access control system in the guest OS with no overhead compared with modules in the latter.Our system offers a centralized security policy for virtual domains in virtual machine environments.

  19. The Hierarchical Perspective

    Directory of Open Access Journals (Sweden)

    Daniel Sofron

    2015-05-01

    Full Text Available This paper is focused on the hierarchical perspective, one of the methods for representing space that was used before the discovery of the Renaissance linear perspective. The hierarchical perspective has a more or less pronounced scientific character and its study offers us a clear image of the way the representatives of the cultures that developed it used to perceive the sensitive reality. This type of perspective is an original method of representing three-dimensional space on a flat surface, which characterises the art of Ancient Egypt and much of the art of the Middle Ages, being identified in the Eastern European Byzantine art, as well as in the Western European Pre-Romanesque and Romanesque art. At the same time, the hierarchical perspective is also present in naive painting and infantile drawing. Reminiscences of this method can be recognised also in the works of some precursors of the Italian Renaissance. The hierarchical perspective can be viewed as a subjective ranking criterion, according to which the elements are visually represented by taking into account their relevance within the image while perception is ignored. This paper aims to show how the main objective of the artists of those times was not to faithfully represent the objective reality, but rather to emphasize the essence of the world and its perennial aspects. This may represent a possible explanation for the refusal of perspective in the Egyptian, Romanesque and Byzantine painting, characterised by a marked two-dimensionality.

  20. Three-Dimensional ZnO Hierarchical Nanostructures: Solution Phase Synthesis and Applications

    Directory of Open Access Journals (Sweden)

    Xiaoliang Wang

    2017-11-01

    Full Text Available Zinc oxide (ZnO nanostructures have been studied extensively in the past 20 years due to their novel electronic, photonic, mechanical and electrochemical properties. Recently, more attention has been paid to assemble nanoscale building blocks into three-dimensional (3D complex hierarchical structures, which not only inherit the excellent properties of the single building blocks but also provide potential applications in the bottom-up fabrication of functional devices. This review article focuses on 3D ZnO hierarchical nanostructures, and summarizes major advances in the solution phase synthesis, applications in environment, and electrical/electrochemical devices. We present the principles and growth mechanisms of ZnO nanostructures via different solution methods, with an emphasis on rational control of the morphology and assembly. We then discuss the applications of 3D ZnO hierarchical nanostructures in photocatalysis, field emission, electrochemical sensor, and lithium ion batteries. Throughout the discussion, the relationship between the device performance and the microstructures of 3D ZnO hierarchical nanostructures will be highlighted. This review concludes with a personal perspective on the current challenges and future research.

  1. The Influences of Health Insurance and Access to Information on Prostate Cancer Screening among Men in Dominican Republic

    International Nuclear Information System (INIS)

    Kangmennaang, J.; Luginaah, I.

    2016-01-01

    Although research demonstrates the public health burden of prostate cancer among men in the Caribbean, relatively little is known about the factors that underlie the low levels of testing for the disease among this population. Study Design. A cross-sectional study of prostate cancer testing behaviours among men aged 40-60 years in Dominican Republic using the Demographic and Health Survey (2013). Methods. We use hierarchical binary logit regression models and average treatment effects combined with propensity score matching to explore the determinants of prostate screening as well as the average effect of health insurance coverage on screening. The use of hierarchical binary logit regression enabled us to control for the effect of unobserved heterogeneity at the cluster level that may affect prostate cancer testing behaviours. Results. Screening varied significantly with health insurance coverage, knowledge of cholesterol level, education, and wealth. Insured men were more likely to test for prostate cancer (OR=1.65, P=0.01) compared to the uninsured. Conclusions. The expansion and restructuring of Dominican Republic universal health insurance scheme to ensure equity in access may improve health access that would potentially impact positively on prostate cancer screening among men.

  2. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  3. Integrity Based Access Control Model for Multilevel XML Document

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; FENG Xue-bin; HUANO Zhi; ZHENG Ming-hui

    2008-01-01

    XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT,UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application.

  4. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    Science.gov (United States)

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  5. Adaptive hierarchical multi-agent organizations

    NARCIS (Netherlands)

    Ghijsen, M.; Jansweijer, W.N.H.; Wielinga, B.J.; Babuška, R.; Groen, F.C.A.

    2010-01-01

    In this chapter, we discuss the design of adaptive hierarchical organizations for multi-agent systems (MAS). Hierarchical organizations have a number of advantages such as their ability to handle complex problems and their scalability to large organizations. By introducing adaptivity in the

  6. A Hierarchical Reliability Control Method for a Space Manipulator Based on the Strategy of Autonomous Decision-Making

    Directory of Open Access Journals (Sweden)

    Xin Gao

    2016-01-01

    Full Text Available In order to maintain and enhance the operational reliability of a robotic manipulator deployed in space, an operational reliability system control method is presented in this paper. First, a method to divide factors affecting the operational reliability is proposed, which divides the operational reliability factors into task-related factors and cost-related factors. Then the models describing the relationships between the two kinds of factors and control variables are established. Based on this, a multivariable and multiconstraint optimization model is constructed. Second, a hierarchical system control model which incorporates the operational reliability factors is constructed. The control process of the space manipulator is divided into three layers: task planning, path planning, and motion control. Operational reliability related performance parameters are measured and used as the system’s feedback. Taking the factors affecting the operational reliability into consideration, the system can autonomously decide which control layer of the system should be optimized and how to optimize it using a control level adjustment decision module. The operational reliability factors affect these three control levels in the form of control variable constraints. Simulation results demonstrate that the proposed method can achieve a greater probability of meeting the task accuracy requirements, while extending the expected lifetime of the space manipulator.

  7. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  8. Improving the Authentication Scheme and Access Control Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Wei-Chen Wu

    2014-11-01

    Full Text Available Privacy and security are very important in vehicular ad hoc networks (VANETs. VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs raise challenges, such as certificate distribution and reduction of the strong reliance on tamper-proof devices. In 2011, Yeh et al. proposed a PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s authorized credential (AC is not secure and private, even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that an improving authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.

  9. Hierarchically nested river landform sequences

    Science.gov (United States)

    Pasternack, G. B.; Weber, M. D.; Brown, R. A.; Baig, D.

    2017-12-01

    River corridors exhibit landforms nested within landforms repeatedly down spatial scales. In this study we developed, tested, and implemented a new way to create river classifications by mapping domains of fluvial processes with respect to the hierarchical organization of topographic complexity that drives fluvial dynamism. We tested this approach on flow convergence routing, a morphodynamic mechanism with different states depending on the structure of nondimensional topographic variability. Five nondimensional landform types with unique functionality (nozzle, wide bar, normal channel, constricted pool, and oversized) represent this process at any flow. When this typology is nested at base flow, bankfull, and floodprone scales it creates a system with up to 125 functional types. This shows how a single mechanism produces complex dynamism via nesting. Given the classification, we answered nine specific scientific questions to investigate the abundance, sequencing, and hierarchical nesting of these new landform types using a 35-km gravel/cobble river segment of the Yuba River in California. The nested structure of flow convergence routing landforms found in this study revealed that bankfull landforms are nested within specific floodprone valley landform types, and these types control bankfull morphodynamics during moderate to large floods. As a result, this study calls into question the prevailing theory that the bankfull channel of a gravel/cobble river is controlled by in-channel, bankfull, and/or small flood flows. Such flows are too small to initiate widespread sediment transport in a gravel/cobble river with topographic complexity.

  10. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  11. On Energy-Efficient Hierarchical Cross-Layer Design: Joint Power Control and Routing for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Poor HVincent

    2007-01-01

    Full Text Available A hierarchical cross-layer design approach is proposed to increase energy efficiency in ad hoc networks through joint adaptation of nodes' transmitting powers and route selection. The design maintains the advantages of the classic OSI model, while accounting for the cross-coupling between layers, through information sharing. The proposed joint power control and routing algorithm is shown to increase significantly the overall energy efficiency of the network, at the expense of a moderate increase in complexity. Performance enhancement of the joint design using multiuser detection is also investigated, and it is shown that the use of multiuser detection can increase the capacity of the ad hoc network significantly for a given level of energy consumption.

  12. On Energy-Efficient Hierarchical Cross-Layer Design: Joint Power Control and Routing for Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Cristina Comaniciu

    2007-03-01

    Full Text Available A hierarchical cross-layer design approach is proposed to increase energy efficiency in ad hoc networks through joint adaptation of nodes' transmitting powers and route selection. The design maintains the advantages of the classic OSI model, while accounting for the cross-coupling between layers, through information sharing. The proposed joint power control and routing algorithm is shown to increase significantly the overall energy efficiency of the network, at the expense of a moderate increase in complexity. Performance enhancement of the joint design using multiuser detection is also investigated, and it is shown that the use of multiuser detection can increase the capacity of the ad hoc network significantly for a given level of energy consumption.

  13. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  14. Growth Mechanism of Pumpkin-Shaped Vaterite Hierarchical Structures

    Science.gov (United States)

    Ma, Guobin; Xu, Yifei; Wang, Mu

    2015-03-01

    CaCO3-based biominerals possess sophisticated hierarchical structures and promising mechanical properties. Recent researches imply that vaterite may play an important role in formation of CaCO3-based biominerals. However, as a less common polymorph of CaCO3, the growth mechanism of vaterite remains not very clear. Here we report the growth of a pumpkin-shaped vaterite hierarchical structure with a six-fold symmetrical axis and lamellar microstructure. We demonstrate that the growth is controlled by supersaturation and the intrinsic crystallographic anisotropy of vaterite. For the scenario of high supersaturation, the nucleation rate is higher than the lateral extension rate, favoring the ``double-leaf'' spherulitic growth. Meanwhile, nucleation occurs preferentially in as determined by the crystalline structure of vaterite, modulating the grown products with a hexagonal symmetry. The results are beneficial for an in-depth understanding of the biomineralization of CaCO3. The growth mechanism may also be applicable to interpret the formation of similar hierarchical structures of other materials. The authors gratefully acknowledge the financial support from National Science Foundation of China (Grant Nos. 51172104 and 50972057) and National Key Basic Research Program of China (Grant No. 2010CB630705).

  15. The Processing of Causal and Hierarchical Relations in Semantic Memory as Revealed by N400 and Frontal Negativity.

    Directory of Open Access Journals (Sweden)

    Xiuling Liang

    Full Text Available Most current studies investigating semantic memory have focused on associative (ring-emerald or taxonomic relations (bird-sparrow. Little is known about the question of how causal relations (virus-epidemic are stored and accessed in semantic memory. The goal of this study was to examine the processing of causally related, general associatively related and hierarchically related word pairs when participants were required to evaluate whether pairs of words were related in any way. The ERP data showed that the N400 amplitude (200-500 ms elicited by unrelated related words was more negative than all related words. Furthermore, the late frontal distributed negativity (500-700 ms elicited by causally related words was smaller than hierarchically related words, but not for general associated words. These results suggested the processing of causal relations and hierarchical relations in semantic memory recruited different degrees of cognitive resources, especially for role binding.

  16. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  17. IAACaaS: IoT Application-Scoped Access Control as a Service

    Directory of Open Access Journals (Sweden)

    Álvaro Alonso

    2017-10-01

    Full Text Available access control is a key element when guaranteeing the security of online services. However, devices that make the Internet of Things have some special requirements that foster new approaches to access control mechanisms. Their low computing capabilities impose limitations that make traditional paradigms not directly applicable to sensors and actuators. In this paper, we propose a dynamic, scalable, IoT-ready model that is based on the OAuth 2.0 protocol and that allows the complete delegation of authorization, so that an as a service access control mechanism is provided. Multiple tenants are also supported by means of application-scoped authorization policies, whose roles and permissions are fine-grained enough to provide the desired flexibility of configuration. Besides, OAuth 2.0 ensures interoperability with the rest of the Internet, yet preserving the computing constraints of IoT devices, because its tokens provide all the necessary information to perform authorization. The proposed model has been fully implemented in an open-source solution and also deeply validated in the scope of FIWARE, a European project with thousands of users, the goal of which is to provide a framework for developing smart applications and services for the future Internet. We provide the details of the deployed infrastructure and offer the analysis of a sample smart city setup that takes advantage of the model. We conclude that the proposed solution enables a new access control as a service paradigm that satisfies the special requirements of IoT devices in terms of performance, scalability and interoperability.

  18. Information access for event-driven smart grid controllers

    DEFF Research Database (Denmark)

    Kristensen, Thomas Le Fevre; Olsen, Rasmus Løvenstein; Rasmussen, Jakob Gulddahl

    2018-01-01

    grids, which targets a reduction of over- and under voltage level situations by adjusting reactive power production of selected low voltage grid assets. The paper models different information access schemes between remote assets and controller, which is activated only when certain voltage thresholds...... stochastic models. We investigate in this paper the suitability for using these two metrics for optimization in a voltage grid control scenario. We conclude that, while the mismatch probability is very useful compared to the simpler information age metric from a network designers and operators point of view...

  19. Usage Control Enhanced Access Control Based on XACML%使用控制支持的基于XACML的访问控制

    Institute of Scientific and Technical Information of China (English)

    陶宇炜; 符彦惟

    2011-01-01

    针对网格环境下资源访问控制的特点,提出了一个基于使用控制模型UCON,结合XACML和SAML的访问控制模型.用可扩展访问标记语占XACML描述访问控制的授权策略,结合SAML声明和请求/响应机制,根据用户、资源、环境的属性进行访问控制决策,可动态地评估访问请求,提供细粒度的访问控制和良好的互操作性.%Combining the feature of resource access control in the grid environment, this paper presents an access control model based on UCON, combined with XACML and SAML. The paper describes authorization policy about access control by XACML, combines SAML statement and request/response mechanism, executes access control decision based on user, resource and environment attributes, evaluates access request dynamically, and provides fine-grained access control and good interoperability.

  20. A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure

    Institute of Scientific and Technical Information of China (English)

    ZHANG Shaomin; WANG Baoyi; ZHOU Lihua

    2006-01-01

    PMI(privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC(Role-based Access Control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is described in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.

  1. Controllable growth of polyaniline nanowire arrays on hierarchical macro/mesoporous graphene foams for high-performance flexible supercapacitors

    International Nuclear Information System (INIS)

    Yu, Pingping; Zhao, Xin; Li, Yingzhi; Zhang, Qinghua

    2017-01-01

    Highlights: • Hierarchical porous graphene foam prepared by templating and embossing method.. • Vertically PANI nanowires aligned on interconnected porous graphene sheets. • The fRGO-F/PANI device exhibited 939 F g"−"1 at 1 A g"−"1. • ED and PD of fRGO-F/PANI device was 20.9 Wh kg"−"1 and 103.2 kW kg"−"1. - Abstract: Free-standing hierarchical macro/mesoporous flexible graphene foam have been constructed by rational intergration ofwell dispersed graphene oxide sheets and amino-modified polystyrene (PS) spheres through a facile “templating and embossing” technique. The three dimensional (3D) macro/mesoporous flexible graphene foam not only inherits the uniform porous structures of graphene foam, but also contains hierarchical macro/mesopores on the struts by sacrificing PS spheres and the activation of KOH, which could providing rapid pathways for ionic and electronic transport to high specific capacitance. Vertically polyaniline (PANI) nanowire arrays are then uniformly deposited onto the hierarchical macro/mesoporous graphene foam(fRGO-F/PANI) by a simple in situ polymerization, which show a high specific capacitance of 939 F g"−"1. Thanks to the synergistic function of 3D bicontinuous hierarchical porous structure of graphene foam and effective immobilization of PANI nanowires on the struts, the assembled symmetric supercapctior with fRGO-F/PANI as electrodes exhibits a maximum energy density and power density of 20.9 Wh kg"−"1 and 103.2 kW kg"−"1, respectively. Moreover, it also displays an excellent cyclic stability with a 88.7% retention after 5000 cycles.

  2. Controllable growth of polyaniline nanowire arrays on hierarchical macro/mesoporous graphene foams for high-performance flexible supercapacitors

    Energy Technology Data Exchange (ETDEWEB)

    Yu, Pingping [State Key Laboratory for Modification of Chemical Fibers and Polymer Materials, College of Materials Science and Engineering, Donghua University, Shanghai 201620 (China); Department of Materials Science, Fudan University, Shanghai 200433 (China); Zhao, Xin, E-mail: xzhao@dhu.edu.cn [State Key Laboratory for Modification of Chemical Fibers and Polymer Materials, College of Materials Science and Engineering, Donghua University, Shanghai 201620 (China); Li, Yingzhi [State Key Laboratory for Modification of Chemical Fibers and Polymer Materials, College of Materials Science and Engineering, Donghua University, Shanghai 201620 (China); Zhang, Qinghua, E-mail: qhzhang@dhu.edu.cn [State Key Laboratory for Modification of Chemical Fibers and Polymer Materials, College of Materials Science and Engineering, Donghua University, Shanghai 201620 (China)

    2017-01-30

    Highlights: • Hierarchical porous graphene foam prepared by templating and embossing method.. • Vertically PANI nanowires aligned on interconnected porous graphene sheets. • The fRGO-F/PANI device exhibited 939 F g{sup −1} at 1 A g{sup −1}. • ED and PD of fRGO-F/PANI device was 20.9 Wh kg{sup −1} and 103.2 kW kg{sup −1}. - Abstract: Free-standing hierarchical macro/mesoporous flexible graphene foam have been constructed by rational intergration ofwell dispersed graphene oxide sheets and amino-modified polystyrene (PS) spheres through a facile “templating and embossing” technique. The three dimensional (3D) macro/mesoporous flexible graphene foam not only inherits the uniform porous structures of graphene foam, but also contains hierarchical macro/mesopores on the struts by sacrificing PS spheres and the activation of KOH, which could providing rapid pathways for ionic and electronic transport to high specific capacitance. Vertically polyaniline (PANI) nanowire arrays are then uniformly deposited onto the hierarchical macro/mesoporous graphene foam(fRGO-F/PANI) by a simple in situ polymerization, which show a high specific capacitance of 939 F g{sup −1}. Thanks to the synergistic function of 3D bicontinuous hierarchical porous structure of graphene foam and effective immobilization of PANI nanowires on the struts, the assembled symmetric supercapctior with fRGO-F/PANI as electrodes exhibits a maximum energy density and power density of 20.9 Wh kg{sup −1} and 103.2 kW kg{sup −1}, respectively. Moreover, it also displays an excellent cyclic stability with a 88.7% retention after 5000 cycles.

  3. Non-Markovianity in the optimal control of an open quantum system described by hierarchical equations of motion

    Science.gov (United States)

    Mangaud, E.; Puthumpally-Joseph, R.; Sugny, D.; Meier, C.; Atabek, O.; Desouter-Lecomte, M.

    2018-04-01

    Optimal control theory is implemented with fully converged hierarchical equations of motion (HEOM) describing the time evolution of an open system density matrix strongly coupled to the bath in a spin-boson model. The populations of the two-level sub-system are taken as control objectives; namely, their revivals or exchange when switching off the field. We, in parallel, analyze how the optimal electric field consequently modifies the information back flow from the environment through different non-Markovian witnesses. Although the control field has a dipole interaction with the central sub-system only, its indirect influence on the bath collective mode dynamics is probed through HEOM auxiliary matrices, revealing a strong correlation between control and dissipation during a non-Markovian process. A heterojunction is taken as an illustrative example for modeling in a realistic way the two-level sub-system parameters and its spectral density function leading to a non-perturbative strong coupling regime with the bath. Although, due to strong system-bath couplings, control performances remain rather modest, the most important result is a noticeable increase of the non-Markovian bath response induced by the optimally driven processes.

  4. C-DAM: CONTENTION BASED DISTRIBUTED RESERVATION PROTOCOL ALLOCATION ALGORITHM FOR WIMEDIA MEDIUM ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    UMADEVI K. S.

    2017-07-01

    Full Text Available WiMedia Medium Access Control (MAC provides high rate data transfer for wireless networking thereby enables construction of high speed home networks. It facilitates data communication between the nodes through two modes namely: i Distributed Reservation Protocol (DRP for isochronous traffic and ii Prioritized Contention Access (PCA for asynchronous traffic. PCA mode enables medium access using CSMA/CA similar to IEEE 802.11e. In the presence of DRP, the throughput of PCA saturates when there is an increase in the number of devices accessing PCA channel. Researchers suggest that the better utilization of medium resolves many issues in an effective way. To demonstrate the effective utilization of the medium, Contention Based Distributed Reservation Protocol Allocation Algorithm for WiMedia Medium Access Control is proposed for reserving Medium Access Slots under DRP in the presence of PCA. The proposed algorithm provides a better medium access, reduces energy consumption and enhances the throughput when compared to the existing methodologies.

  5. Biomimetic synthesis of hierarchical crystalline hydroxyapatite fibers in large-scale

    Energy Technology Data Exchange (ETDEWEB)

    Xing, Chaogang; Ge, Suxiang; Huang, Baojun; Bo, Yingying [Institute of Surface Micro and Nano Materials, Xuchang University, Xuchang, Henan Province 461000 (China); Zhang, Di [State Key Lab of Metal Matrix Composites, Shanghai Jiao Tong University, 1954 Huashan Road, Shanghai 200030 (China); Zheng, Zhi, E-mail: zhengzhi9999@yahoo.com.cn [Institute of Surface Micro and Nano Materials, Xuchang University, Xuchang, Henan Province 461000 (China)

    2012-06-15

    Highlights: ► Crystalline hierarchical hydroxyapatite (HAp) fibers are synthesized. ► We employ a biomimetic route by using cotton cloth as a natural bio-template. ► We study the effects of pH, ultrasonic cleaning time, and calcination temperature. ► We obtain an optimized reaction condition. ► This is a low cost method for production of hierarchical HAp fibers. -- Abstract: Crystalline hierarchical hydroxyapatite [Ca{sub 10}(PO{sub 4}){sub 6}(OH){sub 2}, HAp)] fibers were successfully synthesized via a biomimetic route by using cotton cloth as a natural bio-template. The effects of pH value, aging time, ultrasonic cleaning time, and calcination temperature on the purity and morphology of the resulting hydroxyapatite (HAp) were monitored by scanning election microscope (SEM), X-ray diffraction (XRD), and infrared spectrophotometer (IR) to obtain an optimized reaction condition, namely, pH 9, ultrasonic cleaning for 1 min, aging for 24 h, and calcination at 600 °C for 4 h. We found that the natural cellulose could not only control the morphology of HAp but also lower its phase transformation temperature. The impact of this method lies in its low cost and successful production of large-scale patterning of three-dimensional hierarchical HAp fibers.

  6. Biomimetic synthesis of hierarchical crystalline hydroxyapatite fibers in large-scale

    International Nuclear Information System (INIS)

    Xing, Chaogang; Ge, Suxiang; Huang, Baojun; Bo, Yingying; Zhang, Di; Zheng, Zhi

    2012-01-01

    Highlights: ► Crystalline hierarchical hydroxyapatite (HAp) fibers are synthesized. ► We employ a biomimetic route by using cotton cloth as a natural bio-template. ► We study the effects of pH, ultrasonic cleaning time, and calcination temperature. ► We obtain an optimized reaction condition. ► This is a low cost method for production of hierarchical HAp fibers. -- Abstract: Crystalline hierarchical hydroxyapatite [Ca 10 (PO 4 ) 6 (OH) 2 , HAp)] fibers were successfully synthesized via a biomimetic route by using cotton cloth as a natural bio-template. The effects of pH value, aging time, ultrasonic cleaning time, and calcination temperature on the purity and morphology of the resulting hydroxyapatite (HAp) were monitored by scanning election microscope (SEM), X-ray diffraction (XRD), and infrared spectrophotometer (IR) to obtain an optimized reaction condition, namely, pH 9, ultrasonic cleaning for 1 min, aging for 24 h, and calcination at 600 °C for 4 h. We found that the natural cellulose could not only control the morphology of HAp but also lower its phase transformation temperature. The impact of this method lies in its low cost and successful production of large-scale patterning of three-dimensional hierarchical HAp fibers.

  7. On the Impact of information access delays on remote control of a wind turbine

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Barradas Berglind, Jose de Jesus; Madsen, Tatiana Kozlova

    2015-01-01

    farm controller. The controller attempts to reduce fatigue on the wind turbine, which is used as a measure of the controller performance. Via simulation analysis, we show the degradation of the controller performance when subject to network delays. We analyse different access strategies useable...... by the controller to gather sensor information and and quantitatively characterize the impact of these access strategies on the controller performance......It is important to reduce the impact of renewable production in the power grid by means of control, due to increased frequency deviations and imbalances caused by these assets. Cost efficient deployment of asset control frequently results in a distributed control architecture where the controller...

  8. Anisotropic and Hierarchical Porosity in Multifunctional Ceramics

    Science.gov (United States)

    Lichtner, Aaron Zev

    The performance of multifunctional porous ceramics is often hindered by the seemingly contradictory effects of porosity on both mechanical and non-structural properties and yet a sufficient body of knowledge linking microstructure to these properties does not exist. Using a combination of tailored anisotropic and hierarchical materials, these disparate effects may be reconciled. In this project, a systematic investigation of the processing, characterization and properties of anisotropic and isotropic hierarchically porous ceramics was conducted. The system chosen was a composite ceramic intended as the cathode for a solid oxide fuel cell (SOFC). Comprehensive processing investigations led to the development of approaches to make hierarchical, anisotropic porous microstructures using directional freeze-casting of well dispersed slurries. The effect of all the important processing parameters was investigated. This resulted in an ability to tailor and control the important microstructural features including the scale of the microstructure, the macropore size and total porosity. Comparable isotropic porous ceramics were also processed using fugitive pore formers. A suite of characterization techniques including x-ray tomography and 3-D sectional scanning electron micrographs (FIB-SEM) was used to characterize and quantify the green and partially sintered microstructures. The effect of sintering temperature on the microstructure was quantified and discrete element simulations (DEM) were used to explain the experimental observations. Finally, the comprehensive mechanical properties, at room temperature, were investigated, experimentally and using DEM, for the different microstructures.

  9. Benefits of Location-Based Access Control:A Literature Study

    NARCIS (Netherlands)

    van Cleeff, A.; Pieters, Wolter; Wieringa, Roelf J.

    2010-01-01

    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been

  10. Evaluating Hierarchical Structure in Music Annotations.

    Science.gov (United States)

    McFee, Brian; Nieto, Oriol; Farbood, Morwaread M; Bello, Juan Pablo

    2017-01-01

    Music exhibits structure at multiple scales, ranging from motifs to large-scale functional components. When inferring the structure of a piece, different listeners may attend to different temporal scales, which can result in disagreements when they describe the same piece. In the field of music informatics research (MIR), it is common to use corpora annotated with structural boundaries at different levels. By quantifying disagreements between multiple annotators, previous research has yielded several insights relevant to the study of music cognition. First, annotators tend to agree when structural boundaries are ambiguous. Second, this ambiguity seems to depend on musical features, time scale, and genre. Furthermore, it is possible to tune current annotation evaluation metrics to better align with these perceptual differences. However, previous work has not directly analyzed the effects of hierarchical structure because the existing methods for comparing structural annotations are designed for "flat" descriptions, and do not readily generalize to hierarchical annotations. In this paper, we extend and generalize previous work on the evaluation of hierarchical descriptions of musical structure. We derive an evaluation metric which can compare hierarchical annotations holistically across multiple levels. sing this metric, we investigate inter-annotator agreement on the multilevel annotations of two different music corpora, investigate the influence of acoustic properties on hierarchical annotations, and evaluate existing hierarchical segmentation algorithms against the distribution of inter-annotator agreement.

  11. Evaluating Hierarchical Structure in Music Annotations

    Directory of Open Access Journals (Sweden)

    Brian McFee

    2017-08-01

    Full Text Available Music exhibits structure at multiple scales, ranging from motifs to large-scale functional components. When inferring the structure of a piece, different listeners may attend to different temporal scales, which can result in disagreements when they describe the same piece. In the field of music informatics research (MIR, it is common to use corpora annotated with structural boundaries at different levels. By quantifying disagreements between multiple annotators, previous research has yielded several insights relevant to the study of music cognition. First, annotators tend to agree when structural boundaries are ambiguous. Second, this ambiguity seems to depend on musical features, time scale, and genre. Furthermore, it is possible to tune current annotation evaluation metrics to better align with these perceptual differences. However, previous work has not directly analyzed the effects of hierarchical structure because the existing methods for comparing structural annotations are designed for “flat” descriptions, and do not readily generalize to hierarchical annotations. In this paper, we extend and generalize previous work on the evaluation of hierarchical descriptions of musical structure. We derive an evaluation metric which can compare hierarchical annotations holistically across multiple levels. sing this metric, we investigate inter-annotator agreement on the multilevel annotations of two different music corpora, investigate the influence of acoustic properties on hierarchical annotations, and evaluate existing hierarchical segmentation algorithms against the distribution of inter-annotator agreement.

  12. Hierarchical Fiber Structures Made by Electrospinning Polymers

    Science.gov (United States)

    Reneker, Darrell H.

    2009-03-01

    A filter for water purification that is very thin, with small interstices and high surface area per unit mass, can be made with nanofibers. The mechanical strength of a very thin sheet of nanofibers is not great enough to withstand the pressure drop of the fluid flowing through. If the sheet of nanofibers is made thicker, the strength will increase, but the flow will be reduced to an impractical level. An optimized filter can be made with nanometer scale structures supported on micron scale structures, which are in turn supported on millimeter scale structures. This leads to a durable hierarchical structure to optimize the filtration efficiency with a minimum amount of material. Buckling coils,ootnotetextTao Han, Darrell H Reneker, Alexander L. Yarin, Polymer, Volume 48, issue 20 (September 21, 2007), p. 6064-6076. electrical bending coilsootnotetextDarrell H. Reneker and Alexander L. Yarin, Polymer, Volume 49, Issue 10 (2008) Pages 2387-2425, DOI:10.1016/j.polymer.2008.02.002. Feature Article. and pendulum coilsootnotetextT. Han, D.H. Reneker, A.L. Yarin, Polymer, Volume 49, (2008) Pages 2160-2169, doi:10.1016/jpolymer.2008.01.0487878. spanning dimensions from a few microns to a few centimeters can be collected from a single jet by controlling the position and motion of a collector. Attractive routes to the design and construction of hierarchical structures for filtration are based on nanofibers supported on small coils that are in turn supported on larger coils, which are supported on even larger overlapping coils. ``Such top-down'' hierarchical structures are easy to make by electrospinning. In one example, a thin hierarchical structure was made, with a high surface area and small interstices, having an open area of over 50%, with the thinnest fibers supported at least every 15 microns.

  13. A Logic for Reasoning About Time-Dependent Access Control Policies

    National Research Council Canada - National Science Library

    DeYoung, Henry

    2008-01-01

    .... Because of the number and complexity of authorization policies in access control systems, it is clear that ad hoc methods for specifying and enforcing policies cannot inspire a high degree of trust...

  14. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  15. Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System

    Institute of Scientific and Technical Information of China (English)

    Wen-Min Li; Xue-Lei Li; Qiao-Yan Wen; Shuo Zhang; Hua Zhang

    2017-01-01

    In hybrid cloud computing, encrypted data access control can provide a fine-grained access method for orga-nizations to enact policies closer to organizational policies. This paper presents an improved CP-ABE (ciphertext-policy attribute-based encryption) scheme to construct an encrypted data access control solution that is suitable for mobile users in hybrid cloud system. In our improvement, we split the original decryption keys into a control key, a secret key and a set of transformation keys. The private cloud managed by the organization administrator takes charge of updating the transformation keys using the control key. It helps to handle the situation of flexible access management and attribute alteration. Meanwhile, the mobile user's single secret key remains unchanged as well as the ciphertext even if the data user's attribute has been revoked. In addition, we modify the access control list through adding the attributes with corresponding control key and transformation keys so as to manage user privileges depending upon the system version. Finally, the analysis shows that our scheme is secure, flexible and efficient to be applied in mobile hybrid cloud computing.

  16. Hierarchical path planning and control of a small fixed-wing UAV: Theory and experimental validation

    Science.gov (United States)

    Jung, Dongwon

    2007-12-01

    problem is formulated by setting up geometric linear constraints as well as boundary conditions. Subsequently, we construct B-spline path templates by solving a set of distinct optimization problems. For application in UAV motion planning, the path templates are incorporated to replace parts of the entire path by the smooth B-spline paths. Each path segment is stitched together while preserving continuity to obtain a final smooth reference path to be used for path following control. The path following control for a small fixed-wing UAV to track the prescribed smooth reference path is also addressed. Assuming the UAV is equipped with an autopilot for low level control, we adopt a kinematic error model with respect to the moving Serret-Frenet frame attached to a path for tracking controller design. A kinematic path following control law that commands heading rate is presented. Backstepping is applied to derive the roll angle command by taking into account the approximate closed-loop roll dynamics. A parameter adaptation technique is employed to account for the inaccurate time constant of the closed-loop roll dynamics during actual implementation. Finally, we implement the proposed hierarchical path control of a small UAV on the actual hardware platform, which is based on an 1/5 scale R/C model airframe (Decathlon) and the autopilot hardware and software. Based on the hardware-in-the-loop (HIL) simulation environment, the proposed hierarchical path control algorithm has been validated through on-line, real-time implementation on a small micro-controller. By a seamless integration of the control algorithms for path planning, path smoothing, and path following, it has been demonstrated that the UAV equipped with a small autopilot having limited computational resources manages to accomplish the path control objective to reach the goal while avoiding obstacles with minimal human intervention.

  17. Hierarchically Nanostructured Materials for Sustainable Environmental Applications

    Directory of Open Access Journals (Sweden)

    Zheng eRen

    2013-11-01

    Full Text Available This article presents a comprehensive overview of the hierarchical nanostructured materials with either geometry or composition complexity in environmental applications. The hierarchical nanostructures offer advantages of high surface area, synergistic interactions and multiple functionalities towards water remediation, environmental gas sensing and monitoring as well as catalytic gas treatment. Recent advances in synthetic strategies for various hierarchical morphologies such as hollow spheres and urchin-shaped architectures have been reviewed. In addition to the chemical synthesis, the physical mechanisms associated with the materials design and device fabrication have been discussed for each specific application. The development and application of hierarchical complex perovskite oxide nanostructures have also been introduced in photocatalytic water remediation, gas sensing and catalytic converter. Hierarchical nanostructures will open up many possibilities for materials design and device fabrication in environmental chemistry and technology.

  18. Adaptive Hierarchical Control for the Muscle Strength Training of Stroke Survivors in Robot-Aided Upper-Limb Rehabilitation

    Directory of Open Access Journals (Sweden)

    Guozheng Xu

    2012-10-01

    Full Text Available Muscle strength training for stroke patients is of vital importance for helping survivors to progressively restore muscle strength and improve the performance of their activities in daily living (ADL. An adaptive hierarchical therapy control framework which integrates the patient's real biomechanical state estimation with task-performance quantitative evaluation is proposed. Firstly, a high-level progressive resistive supervisory controller is designed to determine the resistive force base for each training session based on the patient's online task-performance evaluation. Then, a low-level adaptive resistive force triggered controller is presented to further regulate the interactive resistive force corresponding to the patient's real-time biomechanical state – characterized by the patient's bio-damping and bio-stiffness in the course of one training session, so that the patient is challenged in a moderate but engaging and motivating way. Finally, a therapeutic robot system using a Barrett WAM™ compliant manipulator is set up. We recruited eighteen inpatient and outpatient stroke participants who were randomly allocated in experimental (robot-aided and control (conventional physical therapy groups and enrolled for sixteen weeks of progressive resistance training. The preliminary results show that the proposed therapy control strategies can enhance the recovery of strength and motor control ability.

  19. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  20. Hierarchically structured, nitrogen-doped carbon membranes

    KAUST Repository

    Wang, Hong; Wu, Tao

    2017-01-01

    The present invention is a structure, method of making and method of use for a novel macroscopic hierarchically structured, nitrogen-doped, nano-porous carbon membrane (HNDCMs) with asymmetric and hierarchical pore architecture that can be produced

  1. Hierarchically organized layout for visualization of biochemical pathways.

    Science.gov (United States)

    Tsay, Jyh-Jong; Wu, Bo-Liang; Jeng, Yu-Sen

    2010-01-01

    Many complex pathways are described as hierarchical structures in which a pathway is recursively partitioned into several sub-pathways, and organized hierarchically as a tree. The hierarchical structure provides a natural way to visualize the global structure of a complex pathway. However, none of the previous research on pathway visualization explores the hierarchical structures provided by many complex pathways. In this paper, we aim to develop algorithms that can take advantages of hierarchical structures, and give layouts that explore the global structures as well as local structures of pathways. We present a new hierarchically organized layout algorithm to produce layouts for hierarchically organized pathways. Our algorithm first decomposes a complex pathway into sub-pathway groups along the hierarchical organization, and then partition each sub-pathway group into basic components. It then applies conventional layout algorithms, such as hierarchical layout and force-directed layout, to compute the layout of each basic component. Finally, component layouts are joined to form a final layout of the pathway. Our main contribution is the development of algorithms for decomposing pathways and joining layouts. Experiment shows that our algorithm is able to give comprehensible visualization for pathways with hierarchies, cycles as well as complex structures. It clearly renders the global component structures as well as the local structure in each component. In addition, it runs very fast, and gives better visualization for many examples from previous related research. 2009 Elsevier B.V. All rights reserved.

  2. An intelligent trust-based access control model for affective ...

    African Journals Online (AJOL)

    In this study, a fuzzy expert system Trust-Based Access Control (TBAC) model for improving the Quality of crowdsourcing using emotional affective computing is presented. This model takes into consideration a pre-processing module consisting of three inputs such as crowd-workers category, trust metric and emotional ...

  3. Integrating CERN e-groups into TWiki access control.

    CERN Document Server

    Jones, PL; Hoymr, N; CERN. Geneva. IT Department

    2010-01-01

    Wikis allow for easy collaborative editing of documents on the web for users located in different buildings, cities or even countries. TWiki culture lends to open free form editing and most pages are world readable and editable by CERN authenticated users, however access control is possible and is used to protect sensitive documents. This note discusses the integration of E-groups for authorisation purposes at CERN.

  4. Hierarchical screening for multiple mental disorders.

    Science.gov (United States)

    Batterham, Philip J; Calear, Alison L; Sunderland, Matthew; Carragher, Natacha; Christensen, Helen; Mackinnon, Andrew J

    2013-10-01

    There is a need for brief, accurate screening when assessing multiple mental disorders. Two-stage hierarchical screening, consisting of brief pre-screening followed by a battery of disorder-specific scales for those who meet diagnostic criteria, may increase the efficiency of screening without sacrificing precision. This study tested whether more efficient screening could be gained using two-stage hierarchical screening than by administering multiple separate tests. Two Australian adult samples (N=1990) with high rates of psychopathology were recruited using Facebook advertising to examine four methods of hierarchical screening for four mental disorders: major depressive disorder, generalised anxiety disorder, panic disorder and social phobia. Using K6 scores to determine whether full screening was required did not increase screening efficiency. However, pre-screening based on two decision tree approaches or item gating led to considerable reductions in the mean number of items presented per disorder screened, with estimated item reductions of up to 54%. The sensitivity of these hierarchical methods approached 100% relative to the full screening battery. Further testing of the hierarchical screening approach based on clinical criteria and in other samples is warranted. The results demonstrate that a two-phase hierarchical approach to screening multiple mental disorders leads to considerable increases efficiency gains without reducing accuracy. Screening programs should take advantage of prescreeners based on gating items or decision trees to reduce the burden on respondents. © 2013 Elsevier B.V. All rights reserved.

  5. Self-assembled biomimetic superhydrophobic hierarchical arrays.

    Science.gov (United States)

    Yang, Hongta; Dou, Xuan; Fang, Yin; Jiang, Peng

    2013-09-01

    Here, we report a simple and inexpensive bottom-up technology for fabricating superhydrophobic coatings with hierarchical micro-/nano-structures, which are inspired by the binary periodic structure found on the superhydrophobic compound eyes of some insects (e.g., mosquitoes and moths). Binary colloidal arrays consisting of exemplary large (4 and 30 μm) and small (300 nm) silica spheres are first assembled by a scalable Langmuir-Blodgett (LB) technology in a layer-by-layer manner. After surface modification with fluorosilanes, the self-assembled hierarchical particle arrays become superhydrophobic with an apparent water contact angle (CA) larger than 150°. The throughput of the resulting superhydrophobic coatings with hierarchical structures can be significantly improved by templating the binary periodic structures of the LB-assembled colloidal arrays into UV-curable fluoropolymers by a soft lithography approach. Superhydrophobic perfluoroether acrylate hierarchical arrays with large CAs and small CA hysteresis can be faithfully replicated onto various substrates. Both experiments and theoretical calculations based on the Cassie's dewetting model demonstrate the importance of the hierarchical structure in achieving the final superhydrophobic surface states. Copyright © 2013 Elsevier Inc. All rights reserved.

  6. Secure access control and large scale robust representation for online multimedia event detection.

    Science.gov (United States)

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  7. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    Directory of Open Access Journals (Sweden)

    Changyu Liu

    2014-01-01

    Full Text Available We developed an online multimedia event detection (MED system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  8. Virus spreading in wireless sensor networks with a medium access control mechanism

    International Nuclear Information System (INIS)

    Wang Ya-Qi; Yang Xiao-Yuan

    2013-01-01

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. (general)

  9. Cerberus, an Access Control Scheme for Enforcing Least Privilege in Patient Cohort Study Platforms : A Comprehensive Access Control Scheme Applied to the GENIDA Project - Study of Genetic Forms of Intellectual Disabilities and Autism Spectrum Disorders.

    Science.gov (United States)

    Parrend, Pierre; Mazzucotelli, Timothée; Colin, Florent; Collet, Pierre; Mandel, Jean-Louis

    2017-11-16

    Cohort Study Platforms (CSP) are emerging as a key tool for collecting patient information, providing new research data, and supporting family and patient associations. However they pose new ethics and regulatory challenges since they cross the gap between patients and medical practitioners. One of the critical issues for CSP is to enforce a strict control on access privileges whilst allowing the users to take advantage of the breadth of the available data. We propose Cerberus, a new access control scheme spanning the whole life-cycle of access right management: design, implementation, deployment and maintenance, operations. Cerberus enables switching from a dual world, where CSP data can be accessed either from the users who entered it or fully de-identified, to an access-when-required world, where patients, practitioners and researchers can access focused medical data through explicit authorisation by the data owner. Efficient access control requires application-specific access rights, as well as the ability to restrict these rights when they are not used. Cerberus is implemented and evaluated in the context of the GENIDA project, an international CSP for Genetically determined Intellectual Disabilities and Autism Spectrum Disorders. As a result of this study, the software is made available for the community, and validated specifications for CSPs are given.

  10. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S. Department of Transportation (DOT). ACTION: Meeting Notice of RTCA Special Committee 224, Airport Security... meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  11. Hierarchically structured, nitrogen-doped carbon membranes

    KAUST Repository

    Wang, Hong

    2017-08-03

    The present invention is a structure, method of making and method of use for a novel macroscopic hierarchically structured, nitrogen-doped, nano-porous carbon membrane (HNDCMs) with asymmetric and hierarchical pore architecture that can be produced on a large-scale approach. The unique HNDCM holds great promise as components in separation and advanced carbon devices because they could offer unconventional fluidic transport phenomena on the nanoscale. Overall, the invention set forth herein covers a hierarchically structured, nitrogen-doped carbon membranes and methods of making and using such a membranes.

  12. Hierarchical Rhetorical Sentence Categorization for Scientific Papers

    Science.gov (United States)

    Rachman, G. H.; Khodra, M. L.; Widyantoro, D. H.

    2018-03-01

    Important information in scientific papers can be composed of rhetorical sentences that is structured from certain categories. To get this information, text categorization should be conducted. Actually, some works in this task have been completed by employing word frequency, semantic similarity words, hierarchical classification, and the others. Therefore, this paper aims to present the rhetorical sentence categorization from scientific paper by employing TF-IDF and Word2Vec to capture word frequency and semantic similarity words and employing hierarchical classification. Every experiment is tested in two classifiers, namely Naïve Bayes and SVM Linear. This paper shows that hierarchical classifier is better than flat classifier employing either TF-IDF or Word2Vec, although it increases only almost 2% from 27.82% when using flat classifier until 29.61% when using hierarchical classifier. It shows also different learning model for child-category can be built by hierarchical classifier.

  13. Bio-derived three-dimensional hierarchical carbon-graphene-TiO2 as electrode for supercapacitors.

    Science.gov (United States)

    Jiang, Lili; Ren, Zhifeng; Chen, Shuo; Zhang, Qinyong; Lu, Xiong; Zhang, Hongping; Wan, Guojiang

    2018-03-13

    This paper reports a novel loofah-derived hierarchical scaffold to obtain three-dimensional biocarbon-graphene-TiO 2 (BC-G-TiO 2 ) composite materials as electrodes for supercapacitors. The loofah scaffold was first loaded with G and TiO 2 by immersing, squeezing, and loosening into the mixed solution of graphene oxide and titania, and then carbonized at 900 °C to form the BC-G-TiO 2 composite. The synergistic effects of the naturally hierarchical biocarbon structure, graphene, and TiO 2 nanoparticles on the electrochemical properties are analyzed. The biocarbon provides a high interconnection and an easy accessibility surface for the electrolyte. Graphene bridged the BC and TiO 2 nanoparticles, improved the conductivity of the BC-G-TiO 2 composite, and increased the electron transfer efficiency. TiO 2 nanoparticles also contributed to the pesudocapacitance and electrochemical stability.

  14. Hierarchical Recurrent Neural Hashing for Image Retrieval With Hierarchical Convolutional Features.

    Science.gov (United States)

    Lu, Xiaoqiang; Chen, Yaxiong; Li, Xuelong

    Hashing has been an important and effective technology in image retrieval due to its computational efficiency and fast search speed. The traditional hashing methods usually learn hash functions to obtain binary codes by exploiting hand-crafted features, which cannot optimally represent the information of the sample. Recently, deep learning methods can achieve better performance, since deep learning architectures can learn more effective image representation features. However, these methods only use semantic features to generate hash codes by shallow projection but ignore texture details. In this paper, we proposed a novel hashing method, namely hierarchical recurrent neural hashing (HRNH), to exploit hierarchical recurrent neural network to generate effective hash codes. There are three contributions of this paper. First, a deep hashing method is proposed to extensively exploit both spatial details and semantic information, in which, we leverage hierarchical convolutional features to construct image pyramid representation. Second, our proposed deep network can exploit directly convolutional feature maps as input to preserve the spatial structure of convolutional feature maps. Finally, we propose a new loss function that considers the quantization error of binarizing the continuous embeddings into the discrete binary codes, and simultaneously maintains the semantic similarity and balanceable property of hash codes. Experimental results on four widely used data sets demonstrate that the proposed HRNH can achieve superior performance over other state-of-the-art hashing methods.Hashing has been an important and effective technology in image retrieval due to its computational efficiency and fast search speed. The traditional hashing methods usually learn hash functions to obtain binary codes by exploiting hand-crafted features, which cannot optimally represent the information of the sample. Recently, deep learning methods can achieve better performance, since deep

  15. Conviviality-driven access control policy

    NARCIS (Netherlands)

    El Kateb, Donia; Zannone, N.; Moawad, Assaad; Caire, Patrice; Nain, Grégory; Mouelhi, Tejeddine; Le Traon, Yves

    2015-01-01

    Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights

  16. Materials Knowledge Systems in Python - A Data Science Framework for Accelerated Development of Hierarchical Materials.

    Science.gov (United States)

    Brough, David B; Wheeler, Daniel; Kalidindi, Surya R

    2017-03-01

    There is a critical need for customized analytics that take into account the stochastic nature of the internal structure of materials at multiple length scales in order to extract relevant and transferable knowledge. Data driven Process-Structure-Property (PSP) linkages provide systemic, modular and hierarchical framework for community driven curation of materials knowledge, and its transference to design and manufacturing experts. The Materials Knowledge Systems in Python project (PyMKS) is the first open source materials data science framework that can be used to create high value PSP linkages for hierarchical materials that can be leveraged by experts in materials science and engineering, manufacturing, machine learning and data science communities. This paper describes the main functions available from this repository, along with illustrations of how these can be accessed, utilized, and potentially further refined by the broader community of researchers.

  17. The Pealization of the Most Economical and optimized Control System

    Institute of Scientific and Technical Information of China (English)

    WUBin

    2002-01-01

    In order to plow an access to low cost automation,the method to set up the most economical and optimized control system is studied.Such a system is achieved by adopting the field bus technologies based on net connection to form the hierarchical architecture and employing genetic algorithm to intelliently optimize the parameters of the topology structure at the field execution level and the parameters of a local controller,Praxios has proved that this realization can shorten the system development cycle,improve the systtem's reliability,and achieve conspicuous social economic benefits.

  18. Hierarchical CaCO3 chromatography: a stationary phase based on biominerals.

    Science.gov (United States)

    Sato, Kosuke; Oaki, Yuya; Takahashi, Daisuke; Toshima, Kazunobu; Imai, Hiroaki

    2015-03-23

    In biomineralization, acidic macromolecules play important roles for the growth control of crystals through a specific interaction. Inspired by this interaction, we report on an application of the hierarchical structures in CaCO3 biominerals to a stationary phase of chromatography. The separation and purification of acidic small organic molecules are achieved by thin-layer chromatography and flash chromatography using the powder of biominerals as the stationary phase. The unit nanocrystals and their oriented assembly, the hierarchical structure, are suitable for the adsorption site of the target organic molecules and the flow path of the elution solvents, respectively. The separation mode is ascribed to the specific adsorption of the acidic molecules on the crystal face and the coordination of the functional groups to the calcium ions. The results imply that a new family of stationary phase of chromatography can be developed by the fine tuning of hierarchical structures in CaCO3 materials. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. Zeolitic materials with hierarchical porous structures.

    Science.gov (United States)

    Lopez-Orozco, Sofia; Inayat, Amer; Schwab, Andreas; Selvam, Thangaraj; Schwieger, Wilhelm

    2011-06-17

    During the past several years, different kinds of hierarchical structured zeolitic materials have been synthesized due to their highly attractive properties, such as superior mass/heat transfer characteristics, lower restriction of the diffusion of reactants in the mesopores, and low pressure drop. Our contribution provides general information regarding types and preparation methods of hierarchical zeolitic materials and their relative advantages and disadvantages. Thereafter, recent advances in the preparation and characterization of hierarchical zeolitic structures within the crystallites by post-synthetic treatment methods, such as dealumination or desilication; and structured devices by in situ and ex situ zeolite coatings on open-cellular ceramic foams as (non-reactive as well as reactive) supports are highlighted. Specific advantages of using hierarchical zeolitic catalysts/structures in selected catalytic reactions, such as benzene to phenol (BTOP) and methanol to olefins (MTO) are presented. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. Processing of hierarchical syntactic structure in music.

    Science.gov (United States)

    Koelsch, Stefan; Rohrmeier, Martin; Torrecuso, Renzo; Jentschke, Sebastian

    2013-09-17

    Hierarchical structure with nested nonlocal dependencies is a key feature of human language and can be identified theoretically in most pieces of tonal music. However, previous studies have argued against the perception of such structures in music. Here, we show processing of nonlocal dependencies in music. We presented chorales by J. S. Bach and modified versions in which the hierarchical structure was rendered irregular whereas the local structure was kept intact. Brain electric responses differed between regular and irregular hierarchical structures, in both musicians and nonmusicians. This finding indicates that, when listening to music, humans apply cognitive processes that are capable of dealing with long-distance dependencies resulting from hierarchically organized syntactic structures. Our results reveal that a brain mechanism fundamental for syntactic processing is engaged during the perception of music, indicating that processing of hierarchical structure with nested nonlocal dependencies is not just a key component of human language, but a multidomain capacity of human cognition.

  1. The LHCb Run Control

    CERN Document Server

    Alessio, F; Callot, O; Duval, P-Y; Franek, B; Frank, M; Galli, D; Gaspar, C; v Herwijnen, E; Jacobsson, R; Jost, B; Neufeld, N; Sambade, A; Schwemmer, R; Somogyi, P

    2010-01-01

    LHCb has designed and implemented an integrated Experiment Control System. The Control System uses the same concepts and the same tools to control and monitor all parts of the experiment: the Data Acquisition System, the Timing and the Trigger Systems, the High Level Trigger Farm, the Detector Control System, the Experiment's Infrastructure and the interaction with the CERN Technical Services and the Accelerator. LHCb's Run Control, the main interface used by the experiment's operator, provides access in a hierarchical, coherent and homogeneous manner to all areas of the experiment and to all its sub-detectors. It allows for automated (or manual) configuration and control, including error recovery, of the full experiment in its different running modes. Different instances of the same Run Control interface are used by the various sub-detectors for their stand-alone activities: test runs, calibration runs, etc. The architecture and the tools used to build the control system, the guidelines and components provid...

  2. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    OpenAIRE

    Wen-Jye Shyr; Te-Jen Su; Chia-Ming Lin

    2013-01-01

    This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC) and WebAccess. A mechatronics module, a Web‐CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equ...

  3. Controllable synthesis of hierarchical strontium molybdate by sonochemical method

    Energy Technology Data Exchange (ETDEWEB)

    Jiang, Wanquan; Zhu, Wei [Department of Chemistry, University of Science and Technology of China (USTC), Hefei 230026 (China); Peng, Chao; Yang, Fan; Xuan, Shouhu; Gong, Xinglong [CAS Key Laboratory of Mechanical Behavior and Design of Materials, Department of Modern Mechanics, USTC, Hefei 230027 (China)

    2012-09-15

    Large-scale chrysanthemum-like strontium molybdate (SrMoO{sub 4}) with hierarchical structure has been successfully synthesized via a facile and fast ultrasound irradiation approach at room temperature. By varying the experimental conditions, SrMoO{sub 4} with different morphologies, such as spindles, peanuts, spheres, and rods, can be obtained. The products are characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), transmission electron microscopy (TEM), and selected-area electron diffraction (SAED). The influent parameters including concentration, pH value, and surfactants have been investigated. A possible growth mechanism is proposed and the shape evolution of the products is characterized. The as-prepared chrysanthemum-like SrMoO{sub 4} particles are used as the precursor for electrorheological fluid and their electrorheological property is investigated. (Copyright copyright 2012 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  4. Hierarchical tone mapping for high dynamic range image visualization

    Science.gov (United States)

    Qiu, Guoping; Duan, Jiang

    2005-07-01

    In this paper, we present a computationally efficient, practically easy to use tone mapping techniques for the visualization of high dynamic range (HDR) images in low dynamic range (LDR) reproduction devices. The new method, termed hierarchical nonlinear linear (HNL) tone-mapping operator maps the pixels in two hierarchical steps. The first step allocates appropriate numbers of LDR display levels to different HDR intensity intervals according to the pixel densities of the intervals. The second step linearly maps the HDR intensity intervals to theirs allocated LDR display levels. In the developed HNL scheme, the assignment of LDR display levels to HDR intensity intervals is controlled by a very simple and flexible formula with a single adjustable parameter. We also show that our new operators can be used for the effective enhancement of ordinary images.

  5. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.

    Science.gov (United States)

    Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro

    2018-02-13

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  6. The Case for a Hierarchical Cosmology

    Science.gov (United States)

    Vaucouleurs, G. de

    1970-01-01

    The development of modern theoretical cosmology is presented and some questionable assumptions of orthodox cosmology are pointed out. Suggests that recent observations indicate that hierarchical clustering is a basic factor in cosmology. The implications of hierarchical models of the universe are considered. Bibliography. (LC)

  7. Classification using Hierarchical Naive Bayes models

    DEFF Research Database (Denmark)

    Langseth, Helge; Dyhre Nielsen, Thomas

    2006-01-01

    Classification problems have a long history in the machine learning literature. One of the simplest, and yet most consistently well-performing set of classifiers is the Naïve Bayes models. However, an inherent problem with these classifiers is the assumption that all attributes used to describe......, termed Hierarchical Naïve Bayes models. Hierarchical Naïve Bayes models extend the modeling flexibility of Naïve Bayes models by introducing latent variables to relax some of the independence statements in these models. We propose a simple algorithm for learning Hierarchical Naïve Bayes models...

  8. A novel vehicle dynamics stability control algorithm based on the hierarchical strategy with constrain of nonlinear tyre forces

    Science.gov (United States)

    Li, Liang; Jia, Gang; Chen, Jie; Zhu, Hongjun; Cao, Dongpu; Song, Jian

    2015-08-01

    Direct yaw moment control (DYC), which differentially brakes the wheels to produce a yaw moment for the vehicle stability in a steering process, is an important part of electric stability control system. In this field, most control methods utilise the active brake pressure with a feedback controller to adjust the braked wheel. However, the method might lead to a control delay or overshoot because of the lack of a quantitative project relationship between target values from the upper stability controller to the lower pressure controller. Meanwhile, the stability controller usually ignores the implementing ability of the tyre forces, which might be restrained by the combined-slip dynamics of the tyre. Therefore, a novel control algorithm of DYC based on the hierarchical control strategy is brought forward in this paper. As for the upper controller, a correctional linear quadratic regulator, which not only contains feedback control but also contains feed forward control, is introduced to deduce the object of the stability yaw moment in order to guarantee the yaw rate and side-slip angle stability. As for the medium and lower controller, the quantitative relationship between the vehicle stability object and the target tyre forces of controlled wheels is proposed to achieve smooth control performance based on a combined-slip tyre model. The simulations with the hardware-in-the-loop platform validate that the proposed algorithm can improve the stability of the vehicle effectively.

  9. Improved Adhesion and Compliancy of Hierarchical Fibrillar Adhesives.

    Science.gov (United States)

    Li, Yasong; Gates, Byron D; Menon, Carlo

    2015-08-05

    The gecko relies on van der Waals forces to cling onto surfaces with a variety of topography and composition. The hierarchical fibrillar structures on their climbing feet, ranging from mesoscale to nanoscale, are hypothesized to be key elements for the animal to conquer both smooth and rough surfaces. An epoxy-based artificial hierarchical fibrillar adhesive was prepared to study the influence of the hierarchical structures on the properties of a dry adhesive. The presented experiments highlight the advantages of a hierarchical structure despite a reduction of overall density and aspect ratio of nanofibrils. In contrast to an adhesive containing only nanometer-size fibrils, the hierarchical fibrillar adhesives exhibited a higher adhesion force and better compliancy when tested on an identical substrate.

  10. Implementation of Hierarchical Authorization For A Web-Based Digital Library

    Directory of Open Access Journals (Sweden)

    Andreas Geyer-Schulz

    2007-04-01

    Full Text Available Access control mechanisms are needed in almost every system nowadays to control what kind of access each user has to which resources and when. On the one hand access control systems need to be flexible to allow the definition of the access rules that are actually needed. But they must also be easy to administrate to prevent rules from being in place without the administrator realizing it. This is particularly difficult for systems such as a digital library that requires fine-grained access rules specifying access control at a document level. We present the implementation and architecture of a system that allows definition of access rights down to the single document and user level. We use hierarchies on users and roles, hierachies on access rights and hierarchies on documents and document groups. These hierarchies allow a maximum of flexibility and still keep the system easy enough to administrate. Our access control system supports positive as well as negative permissions.

  11. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    This paper introduces an off-tag RFID access control mechanism called "Selective RFID Jamming". Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  12. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  13. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    Potter, K.; Littenberg, L.

    1977-01-01

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  14. Intelligent Security Auditing Based on Access Control of Devices in Ad Hoc Network

    Institute of Scientific and Technical Information of China (English)

    XU Guang-wei; SHI You-qun; ZHU Ming; WU Guo-wen; CAO Qi-ying

    2006-01-01

    Security in Ad Hoc network is an important issue under the opening circumstance of application service. Some protocols and models of security auditing have been proposed to ensure rationality of contracting strategy and operating regulation and used to identify abnormal operation. Model of security auditing based on access control of devices will be advanced to register sign of devices and property of event of access control and to audit those actions. In the end, the model is analyzed and simulated.

  15. Problem of two-level hierarchical minimax program control the final state of regional social and economic system in the presence of risks

    International Nuclear Information System (INIS)

    Shorikov, A. F.

    2015-01-01

    This article discusses a discrete-time dynamical system consisting of a set a controllable objects (region and forming it municipalities). The dynamics each of these is described by the corresponding vector nonlinear discrete-time recurrent vector equations and its control system consist from two levels: basic (control level I) that is dominating and subordinate level (control level II). Both levels have different criterions of functioning and united a priori by determined informational and control connections defined in advance. In this paper we study the problem of optimization of guaranteed result for program control by the final state of regional social and economic system in the presence of risks. For this problem we proposed in this work an economical and mathematical model of two-level hierarchical minimax program control the final state of regional social and economic system in the presence of risks and the general scheme for its solving

  16. Problem of two-level hierarchical minimax program control the final state of regional social and economic system in the presence of risks

    Energy Technology Data Exchange (ETDEWEB)

    Shorikov, A. F., E-mail: afshorikov@mail.ru [Ural Federal University, 19 S. Mira, Ekaterinburg, 620002, Russia Institute of Mathematics and Mechanics, Ural Branch of Russian Academy of Sciences, 16 S. Kovalevskaya, Ekaterinburg, 620990 (Russian Federation)

    2015-11-30

    This article discusses a discrete-time dynamical system consisting of a set a controllable objects (region and forming it municipalities). The dynamics each of these is described by the corresponding vector nonlinear discrete-time recurrent vector equations and its control system consist from two levels: basic (control level I) that is dominating and subordinate level (control level II). Both levels have different criterions of functioning and united a priori by determined informational and control connections defined in advance. In this paper we study the problem of optimization of guaranteed result for program control by the final state of regional social and economic system in the presence of risks. For this problem we proposed in this work an economical and mathematical model of two-level hierarchical minimax program control the final state of regional social and economic system in the presence of risks and the general scheme for its solving.

  17. Morphology and crystallinity-controlled synthesis of manganese cobalt oxide/manganese dioxides hierarchical nanostructures for high-performance supercapacitors

    Science.gov (United States)

    Li, Fei; Li, Gang; Chen, Hao; Jia, Jia Qi; Dong, Fan; Hu, Yao Bo; Shang, Zheng Guo; Zhang, Yu Xin

    2015-11-01

    We demonstrate a novel preparative strategy for the well-controlled MnCo2O4.5@MnO2 hierarchical nanostructures. Both δ-MnO2 nanosheets and α-MnO2 nanorods can uniformly decorate the surface of MnCo2O4.5 nanowires to form core-shell heterostructures. Detailed electrochemical characterization reveals that MnCo2O4.5@δ-MnO2 pattern exhibits not only high specific capacitance of 357.5 F g-1 at a scan rate of 0.5 A g-1, but also good cycle stability (97% capacitance retention after 1000 cycles at a scan rate of 5 A g-1), which make it have a promising application as a supercapacitor electrode material.

  18. On the Protection of Personal Data in the Access Control System

    Directory of Open Access Journals (Sweden)

    A. P. Durakovskiy

    2012-03-01

    Full Text Available The aim is to prove the qualification system of access control systems (ACS as an information system for personal data (ISPDn. Applications: systems of physical protection of facilities.

  19. Role-Based Access Control for Coalition Partners in Maritime Domain Awareness

    National Research Council Canada - National Science Library

    McDaniel, Christopher R; Tardy, Matthew L

    2005-01-01

    The need for Shared Situational Awareness (SSA) in accomplishing joint missions by coalition militaries, law enforcement, the intelligence community, and the private sector creates a unique challenge to providing access control...

  20. Leadership styles across hierarchical levels in nursing departments.

    Science.gov (United States)

    Stordeur, S; Vandenberghe, C; D'hoore, W

    2000-01-01

    Some researchers have reported on the cascading effect of transformational leadership across hierarchical levels. One study examined this effect in nursing, but it was limited to a single hospital. To examine the cascading effect of leadership styles across hierarchical levels in a sample of nursing departments and to investigate the effect of hierarchical level on the relationships between leadership styles and various work outcomes. Based on a sample of eight hospitals, the cascading effect was tested using correlation analysis. The main sources of variation among leadership scores were determined with analyses of variance (ANOVA), and the interaction effect of hierarchical level and leadership styles on criterion variables was tested with moderated regression analysis. No support was found for a cascading effect of leadership across hierarchical levels. Rather, the variation of leadership scores was explained primarily by the organizational context. Transformational leadership had a stronger impact on criterion variables than transactional leadership. Interaction effects between leadership styles and hierarchical level were observed only for perceived unit effectiveness. The hospital's structure and culture are major determinants of leadership styles.

  1. Learning with hierarchical-deep models.

    Science.gov (United States)

    Salakhutdinov, Ruslan; Tenenbaum, Joshua B; Torralba, Antonio

    2013-08-01

    We introduce HD (or “Hierarchical-Deep”) models, a new compositional learning architecture that integrates deep learning models with structured hierarchical Bayesian (HB) models. Specifically, we show how we can learn a hierarchical Dirichlet process (HDP) prior over the activities of the top-level features in a deep Boltzmann machine (DBM). This compound HDP-DBM model learns to learn novel concepts from very few training example by learning low-level generic features, high-level features that capture correlations among low-level features, and a category hierarchy for sharing priors over the high-level features that are typical of different kinds of concepts. We present efficient learning and inference algorithms for the HDP-DBM model and show that it is able to learn new concepts from very few examples on CIFAR-100 object recognition, handwritten character recognition, and human motion capture datasets.

  2. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...

  3. Hierarchically porous composites fabricated by hydrogel templating and viscous trapping techniques

    NARCIS (Netherlands)

    Thompson, Benjamin R.; Horozov, Tommy S.; Stoyanov, Simeon D.; Paunov, Vesselin N.

    2018-01-01

    Two methods for the preparation of hierarchically porous composites have been developed and explored. The first involved templating mixed slurries of hydrogel beads with two different average bead size distributions with gypsum slurry which allows for precise control over the porosity, pore size

  4. Access control and interlock system at the Advanced Photon Source

    International Nuclear Information System (INIS)

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D.

    1997-01-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS's design philosophy, configuration, hardware, functionality, validation requirements, and operational experience

  5. Controlling macro- and mesostructures with hierarchical porosity through combined hard and soft templating.

    Science.gov (United States)

    Petkovich, Nicholas D; Stein, Andreas

    2013-05-07

    Rigid, porous objects and surfactants serve as powerful templates for the formation of mesoporous and macroporous materials. When both types of template are combined in a single synthesis, materials with intricate architectures and hierarchical porosity can be obtained. In this tutorial review, we explain how to conduct syntheses with both soft and hard templates; moreover, we describe methods to control the final structure present in the templated material. Much of the foundation for multiple templating lies in the study of materials made with only one type of template. To establish a foundation in this area, a description of hard and soft templating is given, delving into the templates available and the steps required for effective templating. This leads into an extended discussion about materials templated with both hard and soft templates. Through the use of recent examples in the literature, we aim to show the diversity of structures possible through multiple templating and the advantages these structures can provide for a wide range of applications. An emphasis is placed on how various factors-such as the type of template, type of precursor, heat-treatment temperature, confinement within a small space, and template-template interactions-impact morphology.

  6. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2011-06-30

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... of risk management controls and supervisory procedures that, among other things, is reasonably... relevant risk management controls and supervisory procedures required under the Rule. DATES: The effective...

  7. Synthesis of hierarchical porous materials with ZSM-5 structures via template-free sol–gel method

    Directory of Open Access Journals (Sweden)

    Wei Han et al

    2007-01-01

    Full Text Available Interests are focused on preparation of hierarchical porous materials with zeolite structures by using soft or rigid templates in order to solve diffusion and mass transfer limitations resulting from the small pore sizes of zeolites. Here we develop a convenient template-free sol–gel method to synthesize hierarchical porous materials with ZSM-5 structures. This method involves hydrothermal recrystallization of the xerogel converted from uniform ZSM-5 sol by a vacuum drying process. By utilizing this method we can manipulate the size of zeolite nanocrystals as building units of porous structures based on controlling temperature of recrystallization, consequently obtain hierarchical porous materials with different intercrystalline pore sizes and ZSM-5 structures.

  8. A method to implement fine-grained access control for personal health records through standard relational database queries.

    Science.gov (United States)

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  9. Development of a wireless protection against imitation system for identification and control of vehicle access

    Directory of Open Access Journals (Sweden)

    Aleksei A. Gavrishev

    2018-03-01

    Full Text Available This article deals with wireless systems for identification and control of vehicle access to protected objects. Known systems are considered. As a result, it has been established that one of the most promising approaches to identifying and controlling vehicle access to protected objects is the use of systems based on the "friend or foe" principle. Among these systems, there are "one-directional" and "bedirectional" identification and access control systems. "Bidirectional" systems are more preferable for questions of identification and access control. However, at present, these systems should have a reduced probability of recognizing the structure of the request and response signals because the potential attacker can easily perform unauthorized access to the radio channel of the system. On this basis, developed a wireless system identification and control vehicle access to protected objects based on the principle of "friend or foe", featuring increased protection from unauthorized access and jamming through the use of rewritable drives chaotic sequences. In addition, it’s proposed to use to identify the vehicle's RFID tag containing additional information about it. Are some specifications of the developed system (the possible frequency range of the request-response signals, the communication range, data rate, the size of the transmitted data, guidelines for choosing RFID. Also, with the help of fuzzy logic, was made the security assessment from unauthorized access request-response signals based on the system of "friend or foe", which are transferred via radio channel, developed systems and analogues. The security assessment of the developed system shows an adequate degree of protection against complex threats (view, spoofing, interception and jamming of traffic in comparison with known systems of this class. Among the main advantages of the developed system it’s necessary to mention increased security from unauthorized access and jamming

  10. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  11. Stress generation and hierarchical fracturing in reactive systems

    Science.gov (United States)

    Jamtveit, B.; Iyer, K.; Royne, A.; Malthe-Sorenssen, A.; Mathiesen, J.; Feder, J.

    2007-12-01

    continuous domain division that effectively regenerates fresh surfaces. This process produces the characteristic weathering patterns seen both in Karoo and a wide-range of other geological environments. In summary, hierarchical fracturing leads to a continuous production of fresh reactive surface area during hydration processes such as serpentinization and weathering, and provides first-order rate control during both serptinization and weathering. It thus has wide ranging implications for global geochemical budgets, landscape evolution, and a number of other important geological features.

  12. Applying macromolecular crowding to 3D bioprinting: fabrication of 3D hierarchical porous collagen-based hydrogel constructs.

    Science.gov (United States)

    Ng, Wei Long; Goh, Min Hao; Yeong, Wai Yee; Naing, May Win

    2018-02-27

    Native tissues and/or organs possess complex hierarchical porous structures that confer highly-specific cellular functions. Despite advances in fabrication processes, it is still very challenging to emulate the hierarchical porous collagen architecture found in most native tissues. Hence, the ability to recreate such hierarchical porous structures would result in biomimetic tissue-engineered constructs. Here, a single-step drop-on-demand (DOD) bioprinting strategy is proposed to fabricate hierarchical porous collagen-based hydrogels. Printable macromolecule-based bio-inks (polyvinylpyrrolidone, PVP) have been developed and printed in a DOD manner to manipulate the porosity within the multi-layered collagen-based hydrogels by altering the collagen fibrillogenesis process. The experimental results have indicated that hierarchical porous collagen structures could be achieved by controlling the number of macromolecule-based bio-ink droplets printed on each printed collagen layer. This facile single-step bioprinting process could be useful for the structural design of collagen-based hydrogels for various tissue engineering applications.

  13. Gender Relations in Access to and Control over Resources in Awra ...

    African Journals Online (AJOL)

    Administrator

    participant observation of gender roles and relations in the study community. ..... in domestic and public spheres, access to and control over locally available ...... Proposal on Leadership Initiatives in Awra Amba Community Case Study on.

  14. A Hierarchical Security Architecture for Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Quanyan Zhu; Tamer Basar

    2011-08-01

    Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.

  15. A Hierarchical Modeling for Reactive Power Optimization With Joint Transmission and Distribution Networks by Curve Fitting

    DEFF Research Database (Denmark)

    Ding, Tao; Li, Cheng; Huang, Can

    2018-01-01

    –slave structure and improves traditional centralized modeling methods by alleviating the big data problem in a control center. Specifically, the transmission-distribution-network coordination issue of the hierarchical modeling method is investigated. First, a curve-fitting approach is developed to provide a cost......In order to solve the reactive power optimization with joint transmission and distribution networks, a hierarchical modeling method is proposed in this paper. It allows the reactive power optimization of transmission and distribution networks to be performed separately, leading to a master...... optimality. Numerical results on two test systems verify the effectiveness of the proposed hierarchical modeling and curve-fitting methods....

  16. Modelling and Analysing Access Control Policies in XACML 3.0

    DEFF Research Database (Denmark)

    Ramli, Carroline Dewi Puspa Kencana

    (c.f. GM03,Mos05,Ris13) and manual analysis of the overall effect and consequences of a large XACML policy set is a very daunting and time-consuming task. In this thesis we address the problem of understanding the semantics of access control policy language XACML, in particular XACML version 3.0....... The main focus of this thesis is modelling and analysing access control policies in XACML 3.0. There are two main contributions in this thesis. First, we study and formalise XACML 3.0, in particular the Policy Decision Point (PDP). The concrete syntax of XACML is based on the XML format, while its standard...... semantics is described normatively using natural language. The use of English text in standardisation leads to the risk of misinterpretation and ambiguity. In order to avoid this drawback, we define an abstract syntax of XACML 3.0 and a formal XACML semantics. Second, we propose a logic-based XACML analysis...

  17. Hierarchical analysis of acceptable use policies

    Directory of Open Access Journals (Sweden)

    P. A. Laughton

    2008-01-01

    Full Text Available Acceptable use policies (AUPs are vital tools for organizations to protect themselves and their employees from misuse of computer facilities provided. A well structured, thorough AUP is essential for any organization. It is impossible for an effective AUP to deal with every clause and remain readable. For this reason, some sections of an AUP carry more weight than others, denoting importance. The methodology used to develop the hierarchical analysis is a literature review, where various sources were consulted. This hierarchical approach to AUP analysis attempts to highlight important sections and clauses dealt with in an AUP. The emphasis of the hierarchal analysis is to prioritize the objectives of an AUP.

  18. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    Directory of Open Access Journals (Sweden)

    Wen-Jye Shyr

    2013-02-01

    Full Text Available This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC and WebAccess. A mechatronics module, a Web-CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equipment from a remote location. Mechatronics control and long-distance monitoring were realized by establishing communication between the PLC and WebAccess. Analytical results indicate that the proposed system is feasible. The suitability of this system is demonstrated in the department of industrial education and technology at National Changhua University of Education, Taiwan. Preliminary evaluation of the system was encouraging and has shown that it has achieved success in helping students understand concepts and master remote monitoring and control techniques.

  19. Research on the Legal Regulation of Market Access for Agricultural Products in China

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    On the basis of defining the concept of market access for agricultural products,this paper analyzes the necessity of establishing market access system of agricultural products,proposes the conception of establishing market access system of agricultural products in China;sets up the frame of market access system of agricultural products;analyzes the rationality of the frame of market access system of agricultural products;poses the consideration of economic law regarding setup of market access system of agricultural products.This paper also puts forward the legislative suggestions for establishing market access system of agricultural products as follows:establish the frame of market access system of agricultural products taking quality access as core;establish and perfect the compensation and relief system of guaranteeing benefit of manager and producers;establish the market access system of agricultural products with hierarchical structure;sort out existing laws and form the sound the legal frame of market access system of agricultural products.

  20. Hierarchical zeolites: Enhanced utilisation of microporous crystals in catalysis by advances in materials design

    DEFF Research Database (Denmark)

    Perez-Ramirez, Javier; Christensen, Claus H.; Egeblad, Kresten

    2008-01-01

    The introduction of synthetic zeolites has led to a paradigm shift in catalysis, separations, and adsorption processes, due to their unique properties such as crystallinity, high-surface area, acidity, ion-exchange capacity, and shape-selective character. However, the sole presence of micropores...... the properties of the resulting materials and the catalytic function. We particularly dwell on the exciting field of hierarchical zeolites, which couple in a single material the catalytic power of micropores and the facilitated access and improved transport consequence of a complementary mesopore network...

  1. Virtual timers in hierarchical real-time systems

    NARCIS (Netherlands)

    Heuvel, van den M.M.H.P.; Holenderski, M.J.; Cools, W.A.; Bril, R.J.; Lukkien, J.J.; Zhu, D.

    2009-01-01

    Hierarchical scheduling frameworks (HSFs) provide means for composing complex real-time systems from welldefined subsystems. This paper describes an approach to provide hierarchically scheduled real-time applications with virtual event timers, motivated by the need for integrating priority

  2. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever-ch...

  3. Renewable Wood Pulp Paper Reactor with Hierarchical Micro/Nanopores for Continuous-Flow Nanocatalysis.

    Science.gov (United States)

    Koga, Hirotaka; Namba, Naoko; Takahashi, Tsukasa; Nogi, Masaya; Nishina, Yuta

    2017-06-22

    Continuous-flow nanocatalysis based on metal nanoparticle catalyst-anchored flow reactors has recently provided an excellent platform for effective chemical manufacturing. However, there has been limited progress in porous structure design and recycling systems for metal nanoparticle-anchored flow reactors to create more efficient and sustainable catalytic processes. In this study, traditional paper is used for a highly efficient, recyclable, and even renewable flow reactor by tailoring the ultrastructures of wood pulp. The "paper reactor" offers hierarchically interconnected micro- and nanoscale pores, which can act as convective-flow and rapid-diffusion channels, respectively, for efficient access of reactants to metal nanoparticle catalysts. In continuous-flow, aqueous, room-temperature catalytic reduction of 4-nitrophenol to 4-aminophenol, a gold nanoparticle (AuNP)-anchored paper reactor with hierarchical micro/nanopores provided higher reaction efficiency than state-of-the-art AuNP-anchored flow reactors. Inspired by traditional paper materials, successful recycling and renewal of AuNP-anchored paper reactors were also demonstrated while high reaction efficiency was maintained. © 2017 The Authors. Published by Wiley-VCH Verlag GmbH & Co. KGaA.

  4. TECHNOLOGY FOR ADMINISTERING OF THE ACCESS TO INFORMATION RESOURCES IN MANAGEMENT SYSTEM ON THE AVIATION ENTERPRISE

    Directory of Open Access Journals (Sweden)

    Andrey V. Degtyarev

    2015-01-01

    Full Text Available The task of administering software-information complex occurs duringthe development of application systems for managing business-processes and is connected with the organization of access forusers to information resources in conditions of multi-user information systems for management. For solution of this problem proposed theapproach, which is based on a hierarchical system of access rightsto information resources on the levels: tool, object and procedural.Keywords: software-information complex, information resources,administering, permissions, separation of powers, access model.

  5. Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network

    Directory of Open Access Journals (Sweden)

    Wang Feng

    2017-01-01

    Full Text Available With the continuous development of wireless networks, the amount of privacy services in heterogeneous mobile networks is increasing, such as information storage, user access, and so on. Access control security issues for heterogeneous mobile radio network, this paper proposes a dynamic migration access control technology based on heterogeneous network. Through the system architecture of the mutual trust system, we can understand the real-time mobile node failure or abnormal state. To make the service can be terminated for the node. And adopt the 802.1X authentication way to improve the security of the system. Finally, it by combining the actual running test data, the trust update algorithm of the system is optimized to reduce the actual security threats in the environment. Experiments show that the system’s anti-attack, the success rate of access, bit error rate is in line with the expected results. This system can effectively reduce the system authentication information is illegally obtained after the network security protection mechanism failure and reduce the risk of user data leakage.

  6. Perti Net-Based Workflow Access Control Model%基于Perti网的工作流访问控制模型研究

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems.This paper shows how to make access control in workflow system.We give a workflow access control model (WACM) based on several current access control models.The model supports roles assignment and dynamic authorization.The paper defines the workflow using Petri net.It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM).Finally, an example of an e-commerce workflow access control model is discussed in detail.

  7. Channel access delay and buffer distribution of two-user opportunistic scheduling schemes in wireless networks

    KAUST Repository

    Hossain, Md Jahangir

    2010-07-01

    In our earlier works, we proposed rate adaptive hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) and hybrid two-user scheduling (HTS) schemes. The proposed schemes are innovative in the sense that they include a second user in the transmission opportunistically using hierarchical modulations. As such the frequency of information access of the users increases without any degradation of the system spectral efficiency (SSE) compared to the classical opportunistic scheduling scheme. In this paper, we analyze channel access delay of an incoming packet at the base station (BS) buffer when our proposed TBS and HTS schemes are employed at the BS. Specifically, using a queuing analytic model we derive channel access delay as well as buffer distribution of the packets that wait at BS buffer for down-link (DL) transmission. We compare performance of the TBS and HTS schemes with that of the classical single user opportunistic schemes namely, absolute carrier-to-noise ratio (CNR)-based single user scheduling (ASS) and normalized CNR-based single user scheduling (NSS). For an independent and identically distributed (i.i.d.) fading environment, our proposed scheme can improve packet\\'s access delay performance compared to the ASS. Selected numerical results in an independent but non-identically distributed (i.n.d.) fading environment show that our proposed HTS achieves overall good channel access delay performance. © 2010 IEEE.

  8. The VMC Survey. XXIX. Turbulence-controlled Hierarchical Star Formation in the Small Magellanic Cloud

    Science.gov (United States)

    Sun, Ning-Chen; de Grijs, Richard; Cioni, Maria-Rosa L.; Rubele, Stefano; Subramanian, Smitha; van Loon, Jacco Th.; Bekki, Kenji; Bell, Cameron P. M.; Ivanov, Valentin D.; Marconi, Marcella; Muraveva, Tatiana; Oliveira, Joana M.; Ripepi, Vincenzo

    2018-05-01

    In this paper we report a clustering analysis of upper main-sequence stars in the Small Magellanic Cloud, using data from the VMC survey (the VISTA near-infrared YJK s survey of the Magellanic system). Young stellar structures are identified as surface overdensities on a range of significance levels. They are found to be organized in a hierarchical pattern, such that larger structures at lower significance levels contain smaller ones at higher significance levels. They have very irregular morphologies, with a perimeter–area dimension of 1.44 ± 0.02 for their projected boundaries. They have a power-law mass–size relation, power-law size/mass distributions, and a log-normal surface density distribution. We derive a projected fractal dimension of 1.48 ± 0.03 from the mass–size relation, or of 1.4 ± 0.1 from the size distribution, reflecting significant lumpiness of the young stellar structures. These properties are remarkably similar to those of a turbulent interstellar medium, supporting a scenario of hierarchical star formation regulated by supersonic turbulence.

  9. Hierarchical organization versus self-organization

    OpenAIRE

    Busseniers, Evo

    2014-01-01

    In this paper we try to define the difference between hierarchical organization and self-organization. Organization is defined as a structure with a function. So we can define the difference between hierarchical organization and self-organization both on the structure as on the function. In the next two chapters these two definitions are given. For the structure we will use some existing definitions in graph theory, for the function we will use existing theory on (self-)organization. In the t...

  10. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    Science.gov (United States)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  11. DOE's nation-wide system for access control can solve problems for the federal government

    International Nuclear Information System (INIS)

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy's (DOE's) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location's level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals

  12. Hierarchically structured transparent hybrid membranes by in situ growth of mesostructured organosilica in host polymer

    Science.gov (United States)

    Vallé, Karine; Belleville, Philippe; Pereira, Franck; Sanchez, Clément

    2006-02-01

    The elaborate performances characterizing natural materials result from functional hierarchical constructions at scales ranging from nanometres to millimetres, each construction allowing the material to fit the physical or chemical demands occurring at these different levels. Hierarchically structured materials start to demonstrate a high input in numerous promising applied domains such as sensors, catalysis, optics, fuel cells, smart biologic and cosmetic vectors. In particular, hierarchical hybrid materials permit the accommodation of a maximum of elementary functions in a small volume, thereby optimizing complementary possibilities and properties between inorganic and organic components. The reported strategies combine sol-gel chemistry, self-assembly routes using templates that tune the material's architecture and texture with the use of larger inorganic, organic or biological templates such as latex, organogelator-derived fibres, nanolithographic techniques or controlled phase separation. We propose an approach to forming transparent hierarchical hybrid functionalized membranes using in situ generation of mesostructured hybrid phases inside a non-porogenic hydrophobic polymeric host matrix. We demonstrate that the control of the multiple affinities existing between organic and inorganic components allows us to design the length-scale partitioning of hybrid nanomaterials with tuned functionalities and desirable size organization from ångström to centimetre. After functionalization of the mesoporous hybrid silica component, the resulting membranes have good ionic conductivity offering interesting perspectives for the design of solid electrolytes, fuel cells and other ion-transport microdevices.

  13. The LHCb Run Control

    Energy Technology Data Exchange (ETDEWEB)

    Alessio, F; Barandela, M C; Frank, M; Gaspar, C; Herwijnen, E v; Jacobsson, R; Jost, B; Neufeld, N; Sambade, A; Schwemmer, R; Somogyi, P [CERN, 1211 Geneva 23 (Switzerland); Callot, O [LAL, IN2P3/CNRS and Universite Paris 11, Orsay (France); Duval, P-Y [Centre de Physique des Particules de Marseille, Aix-Marseille Universite, CNRS/IN2P3, Marseille (France); Franek, B [Rutherford Appleton Laboratory, Chilton, Didcot, OX11 0QX (United Kingdom); Galli, D, E-mail: Clara.Gaspar@cern.c [Universita di Bologna and INFN, Bologna (Italy)

    2010-04-01

    LHCb has designed and implemented an integrated Experiment Control System. The Control System uses the same concepts and the same tools to control and monitor all parts of the experiment: the Data Acquisition System, the Timing and the Trigger Systems, the High Level Trigger Farm, the Detector Control System, the Experiment's Infrastructure and the interaction with the CERN Technical Services and the Accelerator. LHCb's Run Control, the main interface used by the experiment's operator, provides access in a hierarchical, coherent and homogeneous manner to all areas of the experiment and to all its sub-detectors. It allows for automated (or manual) configuration and control, including error recovery, of the full experiment in its different running modes. Different instances of the same Run Control interface are used by the various sub-detectors for their stand-alone activities: test runs, calibration runs, etc. The architecture and the tools used to build the control system, the guidelines and components provided to the developers, as well as the first experience with the usage of the Run Control will be presented

  14. Hetero- and homogeneous three-dimensional hierarchical tungsten oxide nanostructures by hot-wire chemical vapor deposition

    Energy Technology Data Exchange (ETDEWEB)

    Houweling, Z.S., E-mail: Silvester.Houweling@asml.com [Utrecht University, Debye Institute for Nanomaterials Science, Nanophotonics—Physics of Devices, Princetonlaan 4, 3584 CB Utrecht (Netherlands); Harks, P.-P.R.M.L.; Kuang, Y.; Werf, C.H.M. van der [Utrecht University, Debye Institute for Nanomaterials Science, Nanophotonics—Physics of Devices, Princetonlaan 4, 3584 CB Utrecht (Netherlands); Geus, J.W. [Utrecht University, Inorganic Chemistry and Catalysis, Padualaan 8, 3584 CH Utrecht (Netherlands); Schropp, R.E.I. [Utrecht University, Debye Institute for Nanomaterials Science, Nanophotonics—Physics of Devices, Princetonlaan 4, 3584 CB Utrecht (Netherlands)

    2015-01-30

    We present the synthesis of three-dimensional tungsten oxide (WO{sub 3−x}) nanostructures, called nanocacti, using hot-wire chemical vapor deposition. The growth of the nanocacti is controlled through a succession of oxidation, reduction and re-oxidation processes. By using only a resistively heated W filament, a flow of ambient air and hydrogen at subatmospheric pressure, and a substrate heated to about 700 °C, branched nanostructures are deposited. We report three varieties of simple synthesis approaches to obtain hierarchical homo- and heterogeneous nanocacti. Furthermore, by using catalyst nanoparticles site-selection for the growth is demonstrated. The atomic, morphological and crystallographic compositions of the nanocacti are determined using a combination of electron microscopy techniques, energy-dispersive X-ray spectroscopy and electron diffraction. - Highlights: • Continuous upscalable hot-wire CVD of 3D hierarchical nanocacti • Controllable deposition of homo- and heterogeneous WO{sub 3−x}/WO{sub 3−y} nanocacti • Introduction of three synthesis routes comprising oxidation, reduction and re-oxidation processes • Growth of periodic arrays of hetero- and homogeneous hierarchical 3D nanocacti.

  15. Privacy and Access Control for IHE-Based Systems

    Science.gov (United States)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  16. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    Science.gov (United States)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  17. Deliberate change without hierarchical influence?

    DEFF Research Database (Denmark)

    Nørskov, Sladjana; Kesting, Peter; Ulhøi, John Parm

    2017-01-01

    reveals that deliberate change is indeed achievable in a non-hierarchical collaborative OSS community context. However, it presupposes the presence and active involvement of informal change agents. The paper identifies and specifies four key drivers for change agents’ influence. Originality....../value The findings contribute to organisational analysis by providing a deeper understanding of the importance of leadership in making deliberate change possible in non-hierarchical settings. It points to the importance of “change-by-conviction”, essentially based on voluntary behaviour. This can open the door...

  18. Multiparty hierarchical quantum-information splitting

    International Nuclear Information System (INIS)

    Wang Xinwen; Zhang Dengyu; Tang Shiqing; Xie Lijun

    2011-01-01

    We propose a scheme for multiparty hierarchical quantum-information splitting (QIS) with a multipartite entangled state, where a boss distributes a secret quantum state to two grades of agents asymmetrically. The agents who belong to different grades have different authorities for recovering the boss's secret. Except for the boss's Bell-state measurement, no nonlocal operation is involved. The presented scheme is also shown to be secure against eavesdropping. Such a hierarchical QIS is expected to find useful applications in the field of modern multipartite quantum cryptography.

  19. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  20. Biased trapping issue on weighted hierarchical networks

    Indian Academy of Sciences (India)

    archical networks which are based on the classic scale-free hierarchical networks. ... Weighted hierarchical networks; weight-dependent walks; mean first passage ..... The weighted networks can mimic some real-world natural and social systems to ... the Priority Academic Program Development of Jiangsu Higher Education ...