WorldWideScience

Sample records for medium access control

  1. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  2. Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon

    Focusing on Wireless Sensor Networks (WSN) that are powered by energy harvesting, this dissertation focuses on energy-efficient communication links between senders and receivers that are alternating between active and sleeping states of operation. In particular, the focus lies on Medium Access......, collision avoidance, provision of Quality of Service (QoS) and security. Focusing on the particular requirements of an energy harvesting application, the dissertation continues with the presentation of a MAC protocol, named ODMAC, which extends the receiver-initiated paradigm with several energy......-efficient features that aim to adapt the consumed energy to match the harvested energy, distribute the load with respect to the harvested energy, decrease the overhead of the communication, address the requirements for collision avoidance, prioritize urgent traffic and secure the system against beacon replay attacks...

  3. C-DAM: CONTENTION BASED DISTRIBUTED RESERVATION PROTOCOL ALLOCATION ALGORITHM FOR WIMEDIA MEDIUM ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    UMADEVI K. S.

    2017-07-01

    Full Text Available WiMedia Medium Access Control (MAC provides high rate data transfer for wireless networking thereby enables construction of high speed home networks. It facilitates data communication between the nodes through two modes namely: i Distributed Reservation Protocol (DRP for isochronous traffic and ii Prioritized Contention Access (PCA for asynchronous traffic. PCA mode enables medium access using CSMA/CA similar to IEEE 802.11e. In the presence of DRP, the throughput of PCA saturates when there is an increase in the number of devices accessing PCA channel. Researchers suggest that the better utilization of medium resolves many issues in an effective way. To demonstrate the effective utilization of the medium, Contention Based Distributed Reservation Protocol Allocation Algorithm for WiMedia Medium Access Control is proposed for reserving Medium Access Slots under DRP in the presence of PCA. The proposed algorithm provides a better medium access, reduces energy consumption and enhances the throughput when compared to the existing methodologies.

  4. Distributed Medium Access Control with SDMA Support for WLANs

    Science.gov (United States)

    Zhou, Sheng; Niu, Zhisheng

    With simultaneous multi-user transmissions, spatial division multiple access (SDMA) provides substantial throughput gain over the single user transmission. However, its implementation in WLANs with contention-based IEEE 802.11 MAC remains challenging. Problems such as coordinating and synchronizing the multiple users need to be solved in a distributed way. In this paper, we propose a distributed MAC protocol for WLANs with SDMA support. A dual-mode CTS responding mechanism is designed to accomplish the channel estimation and user synchronization required for SDMA. We analytically study the throughput performance of the proposed MAC, and dynamic parameter adjustment is designed to enhance the protocol efficiency. In addition, the proposed MAC protocol does not rely on specific physical layer realizations, and can work on legacy IEEE 802.11 equipment with slight software updates. Simulation results show that the proposed MAC outperforms IEEE 802.11 significantly, and that the dynamic parameter adjustment can effectively track the load variation in the network.

  5. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  6. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2013-01-01

    to the incoming and outgoing packet ratio. We describe the new protocol as an extension to the CSMA/CA protocol and implement the protocol on our own hardware platform. By means of our own testbed, we investigate two basic network structures, namely, the two-way relay and the cross topology. It is well known...... that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over......This paper advocates for a new Medium Access Control (MAC) strategy for wireless meshed networks by identifying overload scenarios in order to provide additional channel access priority to the relay. The key behind our MAC protocol is that the relay will adjust its back off window size according...

  7. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...... such paradigm, the receiver is the one in charge of starting a direct communication with an eligible sender. This allows for new useful properties to be satisfied, novel schemes to be introduced and new challenges to be tackled. In this paper, we present a survey comprising of all the MAC protocols released...

  8. Distributed Fair Auto Rate Medium Access Control for IEEE 802.11 Based WLANs

    Science.gov (United States)

    Zhu, Yanfeng; Niu, Zhisheng

    Much research has shown that a carefully designed auto rate medium access control can utilize the underlying physical multi-rate capability to exploit the time-variation of the channel. In this paper, we develop a simple analytical model to elucidate the rule that maximizes the throughput of RTS/CTS based multi-rate wireless local area networks. Based on the discovered rule, we propose two distributed fair auto rate medium access control schemes called FARM and FARM+ from the view-point of throughput fairness and time-share fairness, respectively. With the proposed schemes, after receiving a RTS frame, the receiver selectively returns the CTS frame to inform the transmitter the maximum feasible rate probed by the signal-to-noise ratio of the received RTS frame. The key feature of the proposed schemes is that they are capable of maintaining throughput/time-share fairness in asymmetric situation where the distribution of SNR varies with stations. Extensive simulation results show that the proposed schemes outperform the existing throughput/time-share fair auto rate schemes in time-varying channel conditions.

  9. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  10. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey.

    Science.gov (United States)

    Zareei, Mahdi; Islam, A K M Muzahidul; Baharun, Sabariah; Vargas-Rosales, Cesar; Azpilicueta, Leyre; Mansoor, Nafees

    2017-09-16

    New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR) and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC) protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN). First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  11. A High Throughput Medium Access Control Implementation Based on IEEE 802.11e Standard

    Science.gov (United States)

    Huang, Min Li; Lee, Jin; Setiawan, Hendra; Ochi, Hiroshi; Park, Sin-Chong

    With the growing demand for high-performance multimedia applications over wireless channels, we need to develop a Medium Access Control (MAC) system that supports high throughput and quality of service enhancements. This paper presents the standard analysis, design architecture and design issues leading to the implementation of an IEEE 802.11e based MAC system that supports MAC throughput of over 100Mbps. In order to meet the MAC layer timing constraints, a hardware/software co-design approach is adopted. The proposed MAC architecture is implemented on the Xilinx Virtex-II Pro Field-Programmable Gate Array (FPGA) (XC2VP70-5FF1704C) prototype, and connected to a host computer through an external Universal Serial Bus (USB) interface. The total FPGA resource utilization is 11, 508 out of 33, 088 (34%) available slices. The measured MAC throughput is 100.7Mbps and 109.2Mbps for voice and video access categories, transmitted at a data rate of 260Mbps based on IEEE 802.11n Physical Layer (PHY), using the contention-based hybrid coordination function channel access mechanism.

  12. Medium Access Control for Thermal Energy Harvesting in Advanced Metering Infrastructures

    DEFF Research Database (Denmark)

    Vithanage, Madava D.; Fafoutis, Xenofon; Andersen, Claus Bo

    2013-01-01

    In this paper we investigate the feasibility of powering wireless metering devices, namely heat cost allocators, by thermal energy harvested from radiators. The goal is to take a first step toward the realization of Energy-Harvesting Advanced Metering Infrastructures (EH-AMIs). While traditional...... battery-powered devices have a limited amount of energy, energy harvesting can potentially provide an infinite amount of energy for continuous operating lifetimes, thus reducing the cost involved in installation and maintenance. The contribution of this work is twofold. First, we experimentally identify...... the potential energy that can be harvested from Low Surface Temperature (LST) radiators. The experiments are based on a developed Energy-Harvesting Heat Cost Allocator (EH-HCA) prototype. On the basis of this measured power budget, we model and analytically compare the currently used Medium Access Control (MAC...

  13. Spectrum sharing in cognitive radio networks medium access control protocol based approach

    CERN Document Server

    Pandit, Shweta

    2017-01-01

    This book discusses the use of the spectrum sharing techniques in cognitive radio technology, in order to address the problem of spectrum scarcity for future wireless communications. The authors describe a cognitive radio medium access control (MAC) protocol, with which throughput maximization has been achieved. The discussion also includes use of this MAC protocol for imperfect sensing scenarios and its effect on the performance of cognitive radio systems. The authors also discuss how energy efficiency has been maximized in this system, by applying a simple algorithm for optimizing the transmit power of the cognitive user. The study about the channel fading in the cognitive user and licensed user and power adaption policy in this scenario under peak transmit power and interference power constraint is also present in this book.

  14. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdul Razaque

    2014-03-01

    Full Text Available This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC for wireless sensor networks (WSNs, which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN, which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS, which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS, which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  15. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  16. Underwater acoustic sensor networks: Medium access control, routing and reliable transfer

    Science.gov (United States)

    Xie, Peng

    Recently there have been growing interests in monitoring aquatic environments for scientific exploration, commercial exploitation and coastline protection. The ideal vehicle for this type of extensive monitoring is a mobile underwater sensor network (M-UWSN), consisting of a large number of low cost underwater sensors that can move with water currents and dispersion. M-UWSNs are significantly different from terrestrial sensor networks: (1) Radio channels do not work well under water. They must be replaced by acoustic channels, which feature long propagation delays, low communication bandwidth and high channel error rates; (2) While most ground sensors are static, underwater sensor nodes may move with water currents (and other underwater activities), as introduces passive sensor mobility. Due to the very different environment properties and the unique characteristics of acoustic channels, the protocols developed for terrestrial sensor networks are not applicable to M-UWSNs, and new research at every level of the protocol suite is demanded. In this dissertation work, we investigate three fundamental networking problems in M-UWSN design: medium access control, multi-hop routing and reliable data transfer. (1) Medium access control (MAC): the long propagation delays and narrow communication bandwidth of acoustic channels pose the major challenges to the energy-efficient MAC design in M-UWSNs. For the first time, we formally investigate the random access and RTS/CTS techniques in networks with long propagation delays and low communication bandwidth (as in M-UWSNs). Based on this study, we propose a novel reservation-based MAC approach, called R-MAC, for dense underwater sensor networks with unevenly distributed (spatially and temporally) traffic. Simulation results show that R-MAC is not only energy efficient but also supports fairness. (2) Multi-hop routing: In M-UWSNs, energy efficiency and mobility handling are the two major concerns for multi-hop routing, which have

  17. Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications

    CERN Document Server

    International Organization for Standardization. Geneva

    1997-01-01

    Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications

  18. Dynamic Cognitive Self-Organized TDMA for Medium Access Control in Real-Time Vehicle to Vehicle Communications

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2013-01-01

    Full Text Available The emergence of intelligent transport systems has brought out a new set of requirements on wireless communication. To cope with these requirements, several proposals are currently under discussion. In this highly mobile environment, the design of a prompt, efficient, flexible, and reliable medium access control, able to cover the specific constraints of the named real-time communications applications, is still unsolved. This paper presents the original proposal integrating Non-Cooperative Cognitive Time Division Multiple Access (NCC-TDMA based on Cognitive Radio (CR techniques to obtain a mechanism which complies with the requirements of real-time communications. Though the proposed MAC uses a slotted channel, it can be adapted to operate on the physical layer of different standards. The authors’ analysis considers the IEEE WAVE and 802.11p as the standards of reference. The mechanism also offers other advantages, such as avoiding signalling and the adaptation capacity to channel conditions and interferences. The solution is applied to the problem of units merging a convoy. Comparison results between NCC-TDMA and Slotted-Aloha are included.

  19. DESIGN OF CAUCUS MEDIUM ACCESS CONTROL (C-MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS IN SMART GRIDS

    Directory of Open Access Journals (Sweden)

    JEETU SHARMA

    2017-10-01

    Full Text Available A Caucus-based medium access control protocol (C-MAC is proposed to reduce the end to end delay and battery consumption of the sensor nodes deployed in the monitoring of various smart grid regions, such as substation, pole and wires, perimeter security, real time and non-real-time monitoring using wireless sensor networks. The objective is to prolong the network lifetime and to reduce the end to end delay by mitigating the energy-hole problem and by eliminating bottlenecks significantly by using caucus based efficient synchronization techniques in multi-hop square grid topology of the wireless sensor networks (WSNs. The protocol self-reliantly and adaptively schedules node’s wake-up times, decreases idle listening and collisions, increases network throughput, and extends network lifetime. It induces a low duty cycle for adjusting wake-up times of sensor nodes. The appropriate selection of active and sleep time slots and next hop relay nodes are proposed to minimize the data transmission latency and to reduce battery consumption to increase the network lifetime. The uniform and synchronized transmission of the data packets is of prime importance to improve the network performance. Simulation results justify that the proposed C-MAC protocol increases the network lifetime, successful data transmission ratio along-with the reduction in end to end delay. The objective of this paper is to envisage benefits and utilization of C-MAC protocol for WSNs deployed in smart grids and to draw the attention of researchers in this area.

  20. Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 9: Integrated Services (IS) LAN Interface at the Medium Access Control (MAC) and Physical (PHY) Layers

    CERN Document Server

    International Organization for Standardization. Geneva

    1996-01-01

    Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 9: Integrated Services (IS) LAN Interface at the Medium Access Control (MAC) and Physical (PHY) Layers

  1. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  2. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    . Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...

  3. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  4. Enterprise Dynamic Access Control (EDAC)

    National Research Council Canada - National Science Library

    Fernandez, Richard

    2005-01-01

    .... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...

  5. A Low-Latency, Information-Centric Medium Access Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.; Chatterjea, Supriyo

    In this paper we present a novel TDMA-based medium access control (MAC) protocol for wireless sensor networks. Unlike conventional MAC protocols which function independently of the application, we introduce an Adaptive, Information-centric and Lightweight MAC(AI-LMAC) protocol that adapts its

  6. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  7. Access control Tutorial 5

    CERN Document Server

    CERN. Geneva; Oberknapp, Bernd

    2007-01-01

    This tutorial will review current access management technologies and invite participants to discuss use cases and requirements for access management, particularly with respect to scholarly archives and their users. The presenters will describe the concepts and architecture of Federated Access Management (FAM) with reference to some large-scale federation implementations, and discuss the challenges faced particularly in Identity Management by academic institutions. The tutorial will include a practical demonstration of how FAM can be applied to an Open Archive repository.

  8. Medium Access Control for XG Communications

    National Research Council Canada - National Science Library

    Ramanathan, Ram

    2004-01-01

    ... which are not in use on a non-interference basis. This report contains an overview of the project accomplishments, details can be found in a number of "sister" documents and Request for Comments (RFCs) distributions...

  9. Controlling Access to RDF Graphs

    Science.gov (United States)

    Flouris, Giorgos; Fundulaki, Irini; Michou, Maria; Antoniou, Grigoris

    One of the current barriers towards realizing the huge potential of Future Internet is the protection of sensitive information, i.e., the ability to selectively expose (or hide) information to (from) users depending on their access privileges. Given that RDF has established itself as the de facto standard for data representation over the Web, our work focuses on controlling access to RDF data. We present a high-level access control specification language that allows fine-grained specification of access control permissions (at triple level) and formally define its semantics. We adopt an annotation-based enforcement model, where a user can explicitly associate data items with annotations specifying whether the item is accessible or not. In addition, we discuss the implementation of our framework, propose a set of dimensions that should be considered when defining a benchmark to evaluate the different access control enforcement models and present the results of our experiments conducted on different Semantic Web platforms.

  10. Service-Oriented Access Control

    Science.gov (United States)

    2014-09-01

    backbone. A battalion may use this approach in conducting digital communications exercises , where the unit establishes this network test its digital...derivation, third scenario . . . . . . . . 60 ix THIS PAGE INTENTIONALLY LEFT BLANK x List of Acronyms and Abbreviations ACL access control list BGP...configuration, access control list ( ACL ) placement, or routing design). Changing the network’s logical organization affects how data flows in a

  11. Controlling Access to Suicide Means

    Science.gov (United States)

    Sarchiapone, Marco; Mandelli, Laura; Iosue, Miriam; Andrisano, Costanza; Roy, Alec

    2011-01-01

    Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs), as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies. PMID:22408588

  12. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  13. Controlling access to suicide means.

    Science.gov (United States)

    Sarchiapone, Marco; Mandelli, Laura; Iosue, Miriam; Andrisano, Costanza; Roy, Alec

    2011-12-01

    Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords "suicide means", "suicide method", "suicide prediction" or "suicide prevention" and other relevant keywords. A number of factors may influence an individual's decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing "safe rooms" in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs), as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  14. ACCESS: Detector Control and Performance

    Science.gov (United States)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  15. An Adaptive Medium Access Parameter Prediction Scheme for IEEE 802.11 Real-Time Applications

    Directory of Open Access Journals (Sweden)

    Estefanía Coronado

    2017-01-01

    Full Text Available Multimedia communications have experienced an unprecedented growth due mainly to the increase in the content quality and the emergence of smart devices. The demand for these contents is tending towards wireless technologies. However, these transmissions are quite sensitive to network delays. Therefore, ensuring an optimum QoS level becomes of great importance. The IEEE 802.11e amendment was released to address the lack of QoS capabilities in the original IEEE 802.11 standard. Accordingly, the Enhanced Distributed Channel Access (EDCA function was introduced, allowing it to differentiate traffic streams through a group of Medium Access Control (MAC parameters. Although EDCA recommends a default configuration for these parameters, it has been proved that it is not optimum in many scenarios. In this work a dynamic prediction scheme for these parameters is presented. This approach ensures an appropriate traffic differentiation while maintaining compatibility with the stations without QoS support. As the APs are the only devices that use this algorithm, no changes are required to current network cards. The results show improvements in both voice and video transmissions, as well as in the QoS level of the network that the proposal achieves with regard to EDCA.

  16. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  17. Review of SDDOT's highway access control process

    Science.gov (United States)

    2000-02-01

    This report presents the results and recommendations of a review of the South Dakota Department of Transportation's (SDDOT's) highway access control process. This document presents recommendations that improve South Dakota's access policy. The docume...

  18. Access to finance for micro, small and medium business units in Serbian agribusiness

    Directory of Open Access Journals (Sweden)

    Sedlak Otilija

    2016-01-01

    Full Text Available Micro, small and medium business units contribute to development of agribusiness only if adequate financial resources for founding and development are given. This paper analyzes the possibilities of financing micro, small and medium legal entities in agribusiness in Serbia, compared to large enterprises. Empirical research included a survey comprising 119 agribusiness units, grouped into three categories dependent on their size. The aim was to confirm that there are substantial differences between units of different sizes, concerning possibilities of accessing bank loans and concerning the process of evaluation of conditions for credit approval. Also, aim was to determine differences between the uses of necessary key economic measures in agribusiness. Results showed significant differences between each group of business units for the majority of the observed parameters. Consequently the small and medium-sized enterprises (SMEs sector and especially entrepreneurs and farmers (micro units only have limited access to financial resources and more financing costs compared to large enterprises.

  19. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    Potter, K.; Littenberg, L.

    1977-01-01

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  20. Access and control of information and intellectual property

    Science.gov (United States)

    Lang, Gerald S.

    1996-03-01

    This paper introduces the technology of two pioneering patents for the secure distribution of information and intellectual property. The seminal technology has been used in the control of sensitive material such as medical records and imagery in distributed networks. It lends itself to the implementation of an open architecture access control system that provides local or remote user selective access to digital information stored on any computer system or storage medium, down to the data element, pixel, and sub-pixel levels. Use of this technology is especially suited for electronic publishing, health care records, MIS, and auditing.

  1. Proximity Displays for Access Control

    Science.gov (United States)

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  2. Access control and service-oriented architectures

    NARCIS (Netherlands)

    Leune, C.J.

    2007-01-01

    Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the

  3. A Component-Based Access Control Monitor

    Science.gov (United States)

    Liu, Zhiming; Morisset, Charles; Stolz, Volker

    A control of access to information is increasingly becoming necessary as the systems managing this information is more and more open and available through non secure networks. Integrating an access control monitor within a large system is a complex task, since it has to be an "all or nothing" integration. The least error or mistake could lead to jeopardize the whole system. We present a formal specification of an access control monitor using the calculus of refinement of component and object systems (rCOS). We illustrate this implementation with the well known Role Based Access Control (RBAC) policy and we show how to integrate it within a larger system. Keywords: Component, Access Control, RBAC, Composition

  4. Stochastic Geometry based Medium Access Games in Mobile Ad hoc Networks

    OpenAIRE

    Hanawal, Manjesh Kumar; Altman, Eitan; Baccelli, Francois

    2011-01-01

    This paper studies the performance of Mobile Ad hoc Networks (MANETs) when the nodes, that form a Poisson point process, selfishly choose their Medium Access Probability (MAP). We consider goodput and delay as the performance metric that each node is interested in optimizing taking into account the transmission energy costs. We introduce a pricing scheme based on the transmission energy requirements and compute the symmetric Nash equilibria of the game in closed form. It is shown that by appr...

  5. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  6. Proximity Displays for Access Control

    Science.gov (United States)

    2012-09-01

    to evaluate the appropriateness of an ac- cess once all the facts are known. As Blakely suggests, “make users ask forgiveness, not permission” [18...control designed for individuals at the endpoints. 138 In Proceedings of the workshop on New security paradigms workshop, 2009. 2.3.1 [51] Sara Kaemer...factors in computing systems, 2010. 8.2 141 [89] Sara Sinclaire, Sean W. Smith, Stephanie Trudeau, M. Eric Johnson, and Anthony Portera. Information

  7. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  8. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  9. Time dependent policy-based access control

    DEFF Research Database (Denmark)

    Vasilikos, Panagiotis; Nielson, Flemming; Nielson, Hanne Riis

    2017-01-01

    Access control policies are essential to determine who is allowed to access data in a system without compromising the data's security. However, applications inside a distributed environment may require those policies to be dependent on the actual content of the data, the flow of information, while...... also on other attributes of the environment such as the time. In this paper, we use systems of Timed Automata to model distributed systems and we present a logic in which one can express time-dependent policies for access control. We show how a fragment of our logic can be reduced to a logic...... that current model checkers for Timed Automata such as UPPAAL can handle and we present a translator that performs this reduction. We then use our translator and UPPAAL to enforce time-dependent policy-based access control on an example application from the aerospace industry....

  10. Access Agent Improving The Performance Of Access Control Lists

    Directory of Open Access Journals (Sweden)

    Thelis R. S.

    2015-08-01

    Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

  11. Cryptographically Enforced Distributed Data Access Control

    NARCIS (Netherlands)

    Ibraimi, L.

    2011-01-01

    Outsourcing data storage reduces the cost of ownership. However, once data is stored on a remote server, users lose control over their sensitive data. There are two approaches to control the access to outsourced data. The first approach assumes that the outsourcee is fully trusted. This approach is

  12. f-MAC: A Deterministic Media Access Control Protocol Without Time Synchronization

    OpenAIRE

    Roedig, Utz; Barroso, Andre; Sreenan, Cormac J.

    2006-01-01

    Nodes in a wireless network transmit messages through a shared medium. Thus, a Media Access Control (MAC) protocol is necessary to regulate and coordinate medium access. For some application areas it is necessary to have a deterministic MAC protocol which can give guarantees on message delay and channel throughput. Schedule based MAC protocols, based on time synchronization among nodes, are currently used to implement deterministic MAC protocols. Time synchronization is difficult and costly, ...

  13. Performance estimates for personnel access control systems

    International Nuclear Information System (INIS)

    Bradley, R.G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  14. Sustainable medium access control: Implementation and evaluation of ODMAC

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Dragoni, Nicola

    2013-01-01

    Harvesting small-scale ambient energy constitutes a promising source of power for wireless embedded devices. Due to the unpredictable nature of the harvested energy, adaptive radio duty cycling can lead to a long-term sustainable operation. In energy constrained conditions, very low duty cycles a...

  15. Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels

    Directory of Open Access Journals (Sweden)

    Seung Min Hur

    2009-06-01

    Full Text Available We study the problem of how to alleviate the exposed terminal effect in multihop wireless networks in the presence of log-normal shadowing channels. Assuming node location information, we propose an extension of the IEEE 802.11 MAC protocol that schedules concurrent transmissions in the presence of log-normal shadowing, thus mitigating the exposed terminal problem and improving network throughput and delay performance. We observe considerable improvements in throughput and delay achieved over the IEEE 802.11 MAC under various network topologies and channel conditions in ns-2 simulations, which justify the importance of considering channel randomness in MAC protocol design for multihop wireless networks.

  16. Medium Access Control for Opportunistic Concurrent Transmissions under Shadowing Channels.

    Science.gov (United States)

    Son, In Keun; Mao, Shiwen; Hur, Seung Min

    2009-01-01

    We study the problem of how to alleviate the exposed terminal effect in multi-hop wireless networks in the presence of log-normal shadowing channels. Assuming node location information, we propose an extension of the IEEE 802.11 MAC protocol that sched-ules concurrent transmissions in the presence of log-normal shadowing, thus mitigating the exposed terminal problem and improving network throughput and delay performance. We observe considerable improvements in throughput and delay achieved over the IEEE 802.11 MAC under various network topologies and channel conditions in ns-2 simulations, which justify the importance of considering channel randomness in MAC protocol design for multi-hop wireless networks.

  17. Access control mechanism of wireless gateway based on open flow

    Science.gov (United States)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  18. Remote Access of Computer Controlled Experiments

    Directory of Open Access Journals (Sweden)

    Kristian Nilsson

    2008-11-01

    Full Text Available Abstract—in this paper, we present a way for students to access and operate laboratory equipment, controlled by a laboratory computer via a remote access program. In this way, the solution is not dependent on the specific laboratory equipment, as long as the equipment can be remotely controlled. The system can easily be altered to be used in another laboratory setup. Students are able to make reservations of experiment sessions through a web interface, which is administrated by the system administrator. The solution proposed in this paper is one way to speed up the development of remote accessible laboratories. Most of the proposed solution is based on open source software and the hardware is built on ordinary consumer parts, which makes the proposed remote laboratory architecture cost effective.

  19. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  20. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  1. Predictive access control for distributed computation

    DEFF Research Database (Denmark)

    Yang, Fan; Hankin, Chris; Nielson, Flemming

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future...

  2. Speed control system for an access gate

    Science.gov (United States)

    Bzorgi, Fariborz M [Knoxville, TN

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  3. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  4. An Attribute Based Access Control Framework for Healthcare System

    Science.gov (United States)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  5. Improving market access opportunities for urban small, medium and micro-enterprises in South Africa

    Directory of Open Access Journals (Sweden)

    Christian M. Rogerson

    2013-01-01

    Full Text Available Since the democratic transition of 1994, the promotion of the small, medium and micro-enterprise (SMME economy has been a core focus of South African government policy. With high levels of unemployment and poverty in urban areas, the impact of this policy intervention is most critical for city development. Given South Africa’s chequered history, the national government’s focus is on transforming the prospects for enterprises owned by black South Africans, who were disadvantaged under apartheid. This article examines the range of contemporary policy initiatives to address business constraints on market access and catalyse new market opportunities for black-owned enterprises in urban South Africa. The article concentrates on two themes: 1 building links into private sector supply chains, especially through supplier diversity, and 2 building links into public sector markets through public procurement. It is shown that current policy directions recognise that the national government has a limited capacity to implement SMME improvement and build competitive black-owned SMMEs by itself, which has prompted support for private sector initiatives. In addition, the government is struggling to practice what it preaches and use its own procurement capacity to assist black-owned SMMEs.

  6. A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2004-01-01

    In this paper, we present an energy-efficient medium access protocol designed for wireless sensor networks. Although the protocol uses TDMA to give nodes in the WSN the opportunity to communicate collision-free, the network is self-organizing in terms of time slot assignment and synchronization. The

  7. Using the Critical Incident Technique to Research Decision Making regarding Access to Training and Development in Medium-Sized Enterprises

    Science.gov (United States)

    Coetzer, Alan; Redmond, Janice; Sharafizad, Jalleh

    2012-01-01

    Employees in small and medium-sized enterprises (SMEs) form part of a "disadvantaged" group within the workforce that receives less access to training and development (T&D) than employees in large firms. Prior research into reasons for the relatively low levels of employee participation in training and development has typically…

  8. Cardea: Dynamic Access Control in Distributed Systems

    Science.gov (United States)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  9. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  10. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  11. A data acquisition controller for small to medium scale nuclear experiments

    International Nuclear Information System (INIS)

    Bohm, C.

    1986-01-01

    A data aquisition controller and related software for small to medium scaled nuclear experiments are described. The unit is designed to be connected (via a standard terminal connection) as a peripheral to a host computer (in our case a VAX). It is based on a standard eurobus Z-80 microprocessor to which specially designed multichannel analyzer subsystems are added for data aquisition. The multichannel analyzer, which consists of single width eurocard, uses the controller memory, via direct memory access, for data storage. To this it is possible to add standard eurobus interfaces for digital and analog supervision and for control of the experimental parameters. The unit uses the host computer to interpret a host command file defining the experimental procedure. It will log in to the host when it needs assistance, but stay logged out during periods of inactivity. (orig.)

  12. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    as an important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control...

  13. Integrating Attributes into Role-Based Access Control

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    of research recently. We propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that takes into account the current contextual information while making the access control decisions....

  14. Bioinspired Programmable Polymer Gel Controlled by Swellable Guest Medium.

    Science.gov (United States)

    Deng, Heng; Dong, Yuan; Su, Jheng-Wun; Zhang, Cheng; Xie, Yunchao; Zhang, Chi; Maschmann, Matthew R; Lin, Yuyi; Lin, Jian

    2017-09-13

    Responsive materials with functions of forming three-dimensional (3D) origami and/or kirigami structures have a broad range of applications in bioelectronics, metamaterials, microrobotics, and microelectromechanical (MEMS) systems. To realize such functions, building blocks of actuating components usually possess localized inhomogeneity so that they respond differently to external stimuli. Previous fabrication strategies lie in localizing nonswellable or less-swellable guest components in their swellable host polymers to reduce swelling ability. Herein, inspired by ice plant seed capsules, we report an opposite strategy of implanting swellable guest medium inside nonswellable host polymers to locally enhance the swelling inhomogeneity. Specifically, we adopted a skinning effect induced surface polymerization combined with direct laser writing to control gradient of swellable cyclopentanone (CP) in both vertical and lateral directions of the nonswellable SU-8. For the first time, the laser direct writing was used as a novel strategy for patterning programmable polymer gel films. Upon stimulation of organic solvents, the dual-gradient gel films designed by origami or kirigami principles exhibit reversible 3D shape transformation. Molecular dynamics (MD) simulation illustrates that CP greatly enhances diffusion rates of stimulus solvent molecules in the SU-8 matrix, which offers the driving force for the programmable response. Furthermore, this bioinspired strategy offers unique capabilities in fabricating responsive devices such as a soft gripper and a locomotive robot, paving new routes to many other responsive polymers.

  15. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  16. DC Voltage Balance Control Strategy for Medium Voltage Cascaded STATCOM Based on Distributed Control

    OpenAIRE

    Xuehua Zhao; Liping Shi

    2014-01-01

    DC bus capacitors of Medium Voltage Cascaded STATCOM are independent. DC side voltage balance control method is the key influencing factor of current control. The imbalance of DC bus voltage increases harmonic current and affects the safety of device. In this paper, the unbalance mechanism of DC side capacitor voltage is analyzed. Based on the unipolar dual frequency and carrier phase-shifted SPWM (CPS-SPWM) modulation algorithms, the distributed control algorithms, which need multi- FPGA str...

  17. Space Power Theory: Controlling the Medium Without Weapons in Space

    National Research Council Canada - National Science Library

    Wilkerson, Don L

    2008-01-01

    ...) Modern theorists suggest today's military is poised to develop a space power theory, similar to Gorbett's sea power theory, that is relevant in the exploitation of the space medium The challenges...

  18. Medium-dependent control of the bacterial growth rate.

    Science.gov (United States)

    Ehrenberg, Måns; Bremer, Hans; Dennis, Patrick P

    2013-04-01

    By combining results from previous studies of nutritional up-shifts we here re-investigate how bacteria adapt to different nutritional environments by adjusting their macromolecular composition for optimal growth. We demonstrate that, in contrast to a commonly held view the macromolecular composition of bacteria does not depend on the growth rate as an independent variable, but on three factors: (i) the genetic background (i.e. the strain used), (ii) the physiological history of the bacteria used for inoculation of a given growth medium, and (iii) the kind of nutrients in the growth medium. These factors determine the ribosome concentration and the average rate of protein synthesis per ribosome, and thus the growth rate. Immediately after a nutritional up-shift, the average number of ribosomes in the bacterial population increases exponentially with time at a rate which eventually is attained as the final post-shift growth rate of all cell components. After a nutritional up-shift from one minimal medium to another minimal medium of higher nutritional quality, ribosome and RNA polymerase syntheses are co-regulated and immediately increase by the same factor equal to the increase in the final growth rate. However, after an up-shift from a minimal medium to a medium containing all 20 amino acids, RNA polymerase and ribosome syntheses are no longer coregulated; a smaller rate of synthesis of RNA polymerase is compensated by a gradual increase in the fraction of free RNA polymerase, possibly due to a gradual saturation of mRNA promoters. We have also analyzed data from a recent publication, in which it was concluded that the macromolecular composition in terms of RNA/protein and RNA/DNA ratios is solely determined by the effector molecule ppGpp. Our analysis indicates that this is true only in special cases and that, in general, medium adaptation also depends on factors other than ppGpp. Copyright © 2012 Elsevier Masson SAS. All rights reserved.

  19. Towards Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC...... of complex access control decisions based on spatio-temporal relationships among subjects and objects. Furthermore, such relationships change frequently in dynamic environments, requiring efficient mechanisms to monitor and re-evaluate access control decisions. In this position paper, we present a healthcare...... emergency response scenario which highlights the novel challenges that arise when enforcing access control in an environment with moving subjects and objects. To address a realistic application scenario, we consider movement on road networks, and we identify complex access control decisions relevant...

  20. XACML to build access control policies for Internet of Things

    OpenAIRE

    Atlam, Hany F.; Alassafi, Madini, Obad; Alenezi, Ahmed; Walters, Robert; Wills, Gary

    2018-01-01

    Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an ef...

  1. Access control violation prevention by low-cost infrared detection

    Science.gov (United States)

    Rimmer, Andrew N.

    2004-09-01

    A low cost 16x16 un-cooled pyroelectric detector array, allied with advanced tracking and detection algorithms, has enabled the development of a universal detector with a wide range of applications in people monitoring and homeland security. Violation of access control systems, whether controlled by proximity card, biometrics, swipe card or similar, may occur by 'tailgating' or 'piggybacking' where an 'approved' entrant with a valid entry card is accompanied by a closely spaced 'non-approved' entrant. The violation may be under duress, where the accompanying person is attempting to enter a secure facility by force or threat. Alternatively, the violation may be benign where staff members collude either through habit or lassitude, either with each other or with third parties, without considering the security consequences. Examples of the latter could include schools, hospitals or maternity homes. The 16x16 pyroelectric array is integrated into a detector or imaging system which incorporates data processing, target extraction and decision making algorithms. The algorithms apply interpolation to the array output, allowing a higher level of resolution than might otherwise be expected from such a low resolution array. The pyroelectric detection principle means that the detection will work in variable light conditions and even in complete darkness, if required. The algorithms can monitor the shape, form, temperature and number of persons in the scene and utilise this information to determine whether a violation has occurred or not. As people are seen as 'hot blobs' and are not individually recognisable, civil liberties are not infringed in the detection process. The output from the detector is a simple alarm signal which may act as input to the access control system as an alert or to trigger CCTV image display and storage. The applications for a tailgate detector can be demonstrated across many medium security applications where there are no physical means to prevent this

  2. An Analytical Network Process on Financial Access of the Small and Medium Enterprise in Sharia Banking in Tasikmalaya City

    Directory of Open Access Journals (Sweden)

    Asep Suryanto

    2015-06-01

    Full Text Available Small and Medium Enterprise (SME is one of the significant roles in national economic development. It is seemly followed by the rise of employment absorbent and equity in income distribution. The capital constraint and the impedance of banking financial access have become the main problem to the Small and Medium entrepreneurs. The objectives of this research are to identify the main factors as problems of Small and Medium Enterprises in having access to the financial institutions, and also to find out the solutions of the research problems. This research uses qualitative approach i.e. Analytic Network Process (ANP. Through applying this method, it is expected to help the researchers in making measurement and synthesis of some factors regarding on the topic analyzed as well as finding the solution for problems faced by the SMEs. The resources of the data is derived from questionnaires and in-depth interview with experts, practitioners, SMEs and regulators which then analyzed by the structure and hierarchy into homogen clusters of the SMEs problems and solutions, measuring into ratio scale and building synthesis. As the result, it becomes clear what factors impeding the financial access of the SMEs to banks. The results of this research show that the difficulties of SMEs in accessing financial support in Islamic financial institutions are internal problems of Islamic banking i.e. lack of financial assistance given to the SMEs, the functions of Islamic banking as business partners for SMEs is not optimal. Whereas the external problems in the SMEs are the disability in meeting the financial requirements asked by Islamic banking that are collateral and business history. The internal solutions are Islamic banking must give business mentoring to SMEs that have received financial supports to minimalize the bad credits level. The external solution is the government must also socialize Islamic financial mechanism to SMEs as part of education efforts.

  3. Accessing English and Networks at an English-Medium Multicultural Church in East Canada: An Ethnography

    Science.gov (United States)

    Han, Huamei

    2014-01-01

    Drawing from a larger ethnography of skilled Chinese immigrants' language learning during settlement in Toronto, this article explores the role of informal interactions in facilitating immigrants learning English as a second language and settlement. Examining various activities and networks available at an English-medium multicultural church, this…

  4. Access Control based on Attribute Certificates for Medical Intranet Applications

    Science.gov (United States)

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  5. Medium-distance GPS ambiguity resolution with controlled failure rate

    NARCIS (Netherlands)

    Odijk, D.; Verhagen, S.; Teunissen, P.J.G.

    2009-01-01

    The goal of Network RTK is to provide users with precise ionospheric corrections in order to conduct fast GPS ambiguity resolution and to get cm-level positioning results over medium-distance baselines. In this paper it is shown that a Network RTK user should apply the ratio test with fixed failure

  6. Distributed Congestion Mitigation and Medium Access in Duty Cycling Wireless Sensor Networks

    OpenAIRE

    Liu, Hao; Liu, Ye

    2014-01-01

    Duty cycling is an efficient design approach to achieve energy efficiency in wireless sensor networks. However, it may aggravate congestion due to long access delay and amplified hidden/exposed terminal problems. This paper first investigates some key facts that impact congestion and deteriorate packet transmission. With above observations, we propose a queue length based contention window adjustment approach, which allows congested nodes having high priority to access the channel. Then, a ba...

  7. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  8. The CTA medium size telescope prototype, a test bench for the array control software

    Energy Technology Data Exchange (ETDEWEB)

    Birsin, Emrah; Oya, Igor; Schwanke, Ullrich [Institut fuer Physik, Humboldt-Universitaet zu Berlin (Germany); Behera, Bagmeet; Koeppel, Hendryk; Melkumyan, David; Schmidt, Torsten; Wegner, Peter; Wiesand, Stephan; Winde, Michael [Deutsches Elektronen-Synchrotron, DESY, Zeuthen (Germany)

    2012-07-01

    CTA (Cherenkov Telescope Array) will be the largest ground-based gamma-ray observatory ever built. Two arrays are foreseen to be build, one in the Southern and one in the Northern hemisphere. A prototype for the Medium Size Telescope (MST) type (diameter: 12 m) will be installed in Berlin in early 2012. This MST prototype will be composed of the mechanical structure, drive system and mirror facets with an active mirror control system. The stability of the mechanical structure will be investigated with CCD cameras and a weather station. Furthermore the ALMA Common Software (ACS) distributed control framework will used as readout and control system for the MST, allowing to evaluate the software with the future use for the whole CTA array in mind. The design of the control software is following the concepts and tools under evaluation within the CTA consortium, like the use of a UML based code generation framework for ACS component modeling, and the use of OPC Unified Architecture (OPC UA) for hardware access. In this contribution the progress in the implementation of the control system for this CTA prototype telescope is described.

  9. Access to Finance for Female-led Micro, Small and Medium-sized Enterprises in Bosnia and Herzegovina

    OpenAIRE

    Qasim, Qursum

    2018-01-01

    Female-led Micro, Small, and Medium-Sized Enterprises (MSMEs), play a vital role as job creators, driving female participation in the economy, and boosting inclusive GDP growth. In addition to the direct economic impact of MSMEs, research shows that female-led enterprises employ more women, and that increased control over resources by women leads to improved health and education outcomes f...

  10. Open versus Controlled-Access Data | Office of Cancer Genomics

    Science.gov (United States)

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  11. Efficiency optimized control of medium-size induction motor drives

    DEFF Research Database (Denmark)

    Abrahamsen, F.; Blaabjerg, Frede; Pedersen, John Kim

    2000-01-01

    The efficiency of a variable speed induction motor drive can be optimized by adaption of the motor flux level to the load torque. In small drives (<10 kW) this can be done without considering the relatively small converter losses, but for medium-size drives (10-1000 kW) the losses can not be disr......The efficiency of a variable speed induction motor drive can be optimized by adaption of the motor flux level to the load torque. In small drives (

  12. Low and medium level radioactive waste repository: the access to information

    International Nuclear Information System (INIS)

    Bueno, Lilian de Oliveira; Vieira, Martha Marques Ferreira; Aquino, Afonso Rodrigues de; Fonseca, Edvaldo Roberto Paiva da; Bellintani, Sandra Aparecida

    2009-01-01

    The technological option for the nuclear energy and the society welfare must be carried on together. Access to qualified information should be allowed to the ones responsible for the preparation of material related to the project as well as to all the interested parties involved. The aim of this paper is to give some guidelines to be followed during the project implementation to guarantee this access. Complete information should be available to those involved in the project in a common database, a virtual library, where every document might be obtained. Information should be updated continuously, allowing access, through reliable search and storage tools. Every step of the project development should be well documented containing data and any eventual modification. To guarantee an open and participative conduction of the Project, several tools might be employed, according to the development of the project. Some of the suggested strategies refer to: informative and educational materials production; public consulting; interaction groups; meetings with people - mainly residents or inhabitants and specialists and stakeholders. The criteria to identify information to be released should be: novelty, impact and public interest. The rule should be to give information to all interested ones, avoiding hidden intentions. The strategy should be elaborated according to the local inhabitant's profile. Communication should be mainly done in a personal way. The responsibility for providing the information should be under an Informative Committee created specifically for communication of the project, supervised by the General Coordination and the Technical Committees. (author)

  13. FACTORS AFFECTING ACCESS TO FINANCE OF SMALL AND MEDIUM ENTERPRISES (SMEs OF BANGLADESH

    Directory of Open Access Journals (Sweden)

    Mohammed CHOWDHURY

    2017-12-01

    Full Text Available This study addresses the issues that impede SMEs of Bangladesh in obtaining finance from the financial institutions. To accomplish our goals we collected data from a sample of 86 SMEs to investigate the problems and suggest policy recommendations. We collected data by directly interviewing the respondents with the help of a questionnaire for self-guidance. We also used secondary data for this purpose. Findings revealed that the size and age of the firms, education and skills of the owners, and unfavorable credit terms such as high interest rates, lack of collateral security, corruption by bank officials etc. are some of the biggest hurdles that SMEs in Bangladesh face in getting loans from financial institutions. The limitation is that the study has included one city in its sample population. A nationwide study where there are SMEs in large numbers could lead to better results for this kind of study. The implication is that small businesses, as opposed to the larger ones, face funding obstacles and are discriminated by the financial institutions in granting loans. Built on current literatures and research on SMEs, specially in regard to their ability to access finance, this study captures the information relating to problems identified by SMEs in having access to finance and suggesting the ways and means needed for strengthening the SMEs access to finance for their expansion and growth.

  14. 49 CFR 1542.207 - Access control systems.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Access control systems. 1542.207 Section 1542.207..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY Operations § 1542.207 Access control systems. (a) Secured area. Except as provided in paragraph (b) of this section, the measures for...

  15. Analysis of Access Control Policies in Operating Systems

    Science.gov (United States)

    Chen, Hong

    2009-01-01

    Operating systems rely heavily on access control mechanisms to achieve security goals and defend against remote and local attacks. The complexities of modern access control mechanisms and the scale of policy configurations are often overwhelming to system administrators and software developers. Therefore, mis-configurations are common, and the…

  16. Current Decoupling Control Strategy of Medium Voltage Cascaded Multilevel STATCOM

    Directory of Open Access Journals (Sweden)

    Zhao Xuehua

    2014-10-01

    Full Text Available As one of effective regulation methods, static synchronous compensator (STATCOM has been widespread used to regulate dynamic reactive power and solve dynamic voltage stability problems into power-grid. Through the analysis of mathematical model, cascaded STATCOM, which is constructed by several cascaded H-bridges, is a nonlinear, multivariable, strongly coupled system. It will make difficulties in the design and practical application of controller. In this paper, mathematical models of cascaded STATCOM in a -b- c and d-q coordinates are deduced. Based on the theory of internal model control and PI control strategy, the internal decoupling control algorithm is introduced to realize independent control of active current and reactive current. At the same time, decoupling control algorithms are designed and decoupling control models are given and simulated. From the combined circuit topology and control with multi-FPGA, the simulation and experimental platform of cascaded SVG, which use the control algorithms of double-loop control with the current inner loop and capacitor voltage outer loop. Both in a-b-c coordinates and d-q-0 coordinates, experiment and simulation results show that three-phase current of STATCOM has good tracking performance and control precision, which show the regulator design method and parameters setting are feasible and effective.

  17. Control rod studies in small and medium sized fast reactors

    International Nuclear Information System (INIS)

    John, T.M.; Mohanakrishnan, P.; Mahalakshmi, B.; Singh, R.S.

    1988-01-01

    Control rods are the primary safety mechanism in the operation of fast reactors. Neutronic parameters associated with the control rods have to be evaluated precisely for studying the behaviour of the reactor under various operating conditions. Control rods are strong neutron absorbers discretely distributed in the reactor core. Accurate estimation of control rod parameters demand, in principle transport theory solutions in exact geometry. But computer codes for such evaluations usually consume exorbitantly large computer time and memory for even a single parameter evaluation. During the design of reactors, evaluation of these parameters will be required for many configurations of control rods. In this paper, the method used at Indira Gandhi Centre for Atomic Research for estimating the parameters associated with control rods is presented. Diffusion theory solutions were used for computations. A scheme using three dimensional geometry represented by triangular meshes and diffusion theory solutions in few energy groups for control rod parameter evaluation is presented. This scheme was employed in estimating the control rod parameters in a 500 Mw(e) fast reactor. Error due to group collapsing is estimated by comparing with 25 group calculations in three dimensions for typical cases. (author). 5 refs, 4 figs, 3 tabs

  18. Space Power Theory: Controlling the Medium Without Weapons in Space

    National Research Council Canada - National Science Library

    Wilkerson, Don L

    2008-01-01

    .... strategic space assets and the ability to negate enemy space systems is essential to U.S. space strategy in controlling the geographical environment of space, predominately in the Lower Earth Orbit (LEO...

  19. A new access control system by fingerprint for radioisotope facilities

    International Nuclear Information System (INIS)

    Kawamura, Hiroko; Hirata, Yasuki; Kondo, Takahiro; Takatsuki, Katsuhiro

    1998-01-01

    We applied a new fingerprint checker for complete access control to the radiation controlled area and to the radioisotope storage room, and prepared softwares for the best use of this checker. This system consists of a personal computer, access controllers, a fingerprint register, fingerprint checkers, a tenkey and mat sensors, permits ten thousand users to register their fingerprints and its hard disk to keep more than a million records of user's access. Only 1% of users could not register their fingerprints worn-out, registered four numbers for a fingerprint. The softwares automatically provide varieties of reports, caused a large reduction in manual works. (author)

  20. Content sensitivity based access control framework for Hadoop

    Directory of Open Access Journals (Sweden)

    T.K. Ashwin Kumar

    2017-11-01

    Full Text Available Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misuse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attributes in a dataset or the user’s role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and information sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead.

  1. Role Based Access Control system in the ATLAS experiment

    International Nuclear Information System (INIS)

    Valsan, M L; Dumitru, I; Darlea, G L; Bujor, F; Dobson, M; Miotto, G Lehmann; Schlenker, S; Avolio, G; Scannicchio, D A; Filimonov, V; Khomoutnikov, V; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Twomey, M

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  2. Urban Studies: A Study of Bibliographic Access and Control.

    Science.gov (United States)

    Anderson, Barbara E.

    This paper analyzes: (1) the bibliographic access to publications in urban studies via printed secondary sources; (2) development and scope of classification systems and of vocabulary control for urban studies; and (3) currently accessible automated collections of bibliographic citations. Urban studies is defined as "an agglomeration of…

  3. Access control within military C4ISR systems

    Science.gov (United States)

    Maschino, Mike

    2003-07-01

    Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) tactical battlefield systems must provide the right information and resources to the right individuals at the right time. At the same time, the C4ISR system must enforce access controls to prevent the wrong individuals from obtaining sensitive information, or consuming scarce resources. Because lives, missions and property depend upon them, these access control mechanisms must be effective, reliable, efficient and flexible. The mechanisms employed must suit the nature of the items that are to be protected, as well as the varieties of access policies that must be enforced, and the types of access that will be made to these items. Some access control technologies are inherently centralized, while others are suitable for distributed implementation. The C4ISR architect must select from among the available technologies a combination of mechanisms that eases the burden of policy administration, but is inherently survivable, accurate, resource efficient, and which provides low latency. This paper explores various alternative access enforcement mechanisms, and assesses their effectiveness in managing policy-driven access control within the battlespace.

  4. Regulatory accessibility and social influences on state self-control.

    Science.gov (United States)

    vanDellen, Michelle R; Hoyle, Rick H

    2010-02-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals' state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-control leads to increases in state self-control and thinking of others with bad trait or state self-control leads to decreases in state self-control. Study 5 provides evidence that the salience of significant others influences both regulatory accessibility and state self-control. Combined, these studies suggest that the effects of social influences on state self-control occur through multiple mechanisms.

  5. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  6. Experience with ActiveX control for simple channel access

    International Nuclear Information System (INIS)

    Timossi, C.; Nishimura, H.; McDonald, J.

    2003-01-01

    Accelerator control system applications at Berkeley Lab's Advanced Light Source (ALS) are typically deployed on operator consoles running Microsoft Windows 2000 and utilize EPICS[2]channel access for data access. In an effort to accommodate the wide variety of Windows based development tools and developers with little experience in network programming, ActiveX controls have been deployed on the operator stations. Use of ActiveX controls for use in the accelerator control environment has been presented previously[1]. Here we report on some of our experiences with the use and development of these controls

  7. Access Control to Information in Pervasive Computing Environments

    National Research Council Canada - National Science Library

    Hengartner, Urs

    2005-01-01

    ... feelings. Some of this information is confidential and should be released only to authorized entities. In this thesis, I show how existing solutions for controlling access to information are not sufficient for pervasive computing...

  8. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Science.gov (United States)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  9. A mobile console for local access to accelerator control systems.

    CERN Multimedia

    1981-01-01

    Microprocessors were installed as auxiliary crate controllers (ACCs) in the CAMAC interface of control systems for various accelerators. The same ACC was also at the hearth of a stand-alone system in the form of a mobile console. This was also used for local access to the control systems for tests and development work (Annual Report 1981, p. 80, Fig. 10).

  10. Energy efficient medium access protocol for wireless medical body area sensor networks.

    Science.gov (United States)

    Omeni, O; Wong, A; Burdett, A J; Toumazou, C

    2008-12-01

    This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process.

  11. Cyber Security Scenarios and Control for Small and Medium Enterprises

    Directory of Open Access Journals (Sweden)

    Nilaykumar Kiran SANGANI

    2012-01-01

    Full Text Available As the world advances towards the computing era, security threats keeps on increasing in the form of malware, viruses, internet attack, theft of IS assets / technology and a lot more. This is a major concern for any form of business. Loss in company’s status / liability / reputation is a huge downfall for a running business. We have witnessed the attacks getting carried out; large firm’s data getting breached / government bodies’ sites getting phished / attacked. These huge entities have technology expertise to safeguard their company’s interest against such attacks through investing huge amounts of capital in manpower and secure tools. But what about SMEs? SMEs enrich a huge part of the country’s economy. Big organizations have their own security measures policy which ideally is not applied when it comes to a SME. The aim of this paper is to come out with an Information Security Assurance Cyber Control for SMEs (ISACC against common cyber security threats implemented at a cost effective measure.

  12. Role Based Access Control system in the ATLAS experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F; Avolio, G

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  13. Role Based Access Control System in the ATLAS Experiment

    CERN Document Server

    Valsan, M L; The ATLAS collaboration; Lehmann Miotto, G; Scannicchio, D A; Schlenker, S; Filimonov, V; Khomoutnikov, V; Dumitru, I; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Avolio, G; Caramarcu, C; Ballestrero, S; Darlea, G L; Twomey, M; Bujor, F

    2010-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The paper continues with a detailed description of the integration across all areas of the system: local Linux and Windows nodes in the ATLAS Control Network (ATCN), the Linux application gateways offering remote access inside ATCN, the Windows Terminal Serv...

  14. A Service Access Security Control Model in Cyberspace

    Science.gov (United States)

    Qianmu, Li; Jie, Yin; Jun, Hou; Jian, Xu; Hong, Zhang; Yong, Qi

    A service access control model in cyberspace is proposed, which provides a generalized and effective mechanism of security management with some items constraint specifications. These constraint specifications are organized to form a construction, and an enact process is proposed to make it scalable and flexible to meet the need of diversified service application systems in cyberspace. The model of this paper erases the downward information flow by extended rules of read/write, which is the breakthrough of the limitations when applying the standard role-based access control in cyberspace.

  15. Guest Editorial: Flexible Operation and Control for Medium Voltage Direct-Current (MVDC) Grid

    DEFF Research Database (Denmark)

    Li, Yong; Guerrero, Josep M.; Siano, Pierluigi

    2017-01-01

    We appreciate very much the support from the IET Power Electronics editorial board for this Special Issue on ‘Flexible Operation and Control for Medium Voltage Direct-Current (MVDC) Grid’. In this final version for publication, 15 papers have been selected for this Special Issue. Three papers...... relate to the topology of MVDC converter, four papers relate to the control of MVDC converter, four papers relate to the introduction of application fields of MVDC grid, and four papers relate to the semiconductor power device and drives towards the application in the medium- and high-voltage DC grid....

  16. Controlling user access to electronic resources without password

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  17. Database design for Physical Access Control System for nuclear facilities

    International Nuclear Information System (INIS)

    Sathishkumar, T.; Rao, G. Prabhakara; Arumugam, P.

    2016-01-01

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  18. Database design for Physical Access Control System for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in

    2016-08-15

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  19. Top Management Control Functions for Information Systems in Small and Medium Enterprises

    OpenAIRE

    Uma VIJAYAKUMAR

    2009-01-01

    This paper analyzes the Top Management Control functions for Information Systems (IS) in Small and Medium Enterprises (SMEs). SMEs extensively rely on information technology resources to enhance their competence in today’s global economy. They should have adequate top management control mechanisms in place for their efficient functioning. Top Management Controls determine how effectively the senior management manages the IS functions in a SME. The major tasks at this level consist of Planni...

  20. Access Control of Web and Java Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  1. Controlling Access to Input/Output Peripheral Devices

    Directory of Open Access Journals (Sweden)

    E. Y. Rodionov

    2010-03-01

    Full Text Available In this paper the author proposes a system that manages information security policy on enterprise. Problems related to managing information security policy on enterprise and access to peripheral devices in computer systems functioning under control of Microsoft Windows NT operating systems are considered.

  2. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro; Gadducci, F.

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e.before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  3. Audit-Based Access Control for Electronic Health Records

    NARCIS (Netherlands)

    Dekker, M.A.C.; Etalle, Sandro

    2006-01-01

    Traditional access control mechanisms aim to prevent illegal actions a-priori occurrence, i.e. before granting a request for a document. There are scenarios however where the security decision can not be made on the fly. For these settings we developed a language and a framework for a-posteriori

  4. Assessment of Digital Access Control Methods Used by Selected ...

    African Journals Online (AJOL)

    Assessment of Digital Access Control Methods Used by Selected Academic Libraries in South-West Nigeria. ... information professionals with the knowledge that would enable them establish an effective strategy to protect e-resources from such abuses as plagiarism, piracy and infringement of intellectual property rights.

  5. Object oriented programming techniques applied to device access and control

    International Nuclear Information System (INIS)

    Goetz, A.; Klotz, W.D.; Meyer, J.

    1992-01-01

    In this paper a model, called the device server model, has been presented for solving the problem of device access and control faced by all control systems. Object Oriented Programming techniques were used to achieve a powerful yet flexible solution. The model provides a solution to the problem which hides device dependancies. It defines a software framework which has to be respected by implementors of device classes - this is very useful for developing groupware. The decision to implement remote access in the root class means that device servers can be easily integrated in a distributed control system. A lot of the advantages and features of the device server model are due to the adoption of OOP techniques. The main conclusion that can be drawn from this paper is that 1. the device access and control problem is adapted to being solved with OOP techniques, 2. OOP techniques offer a distinct advantage over traditional programming techniques for solving the device access problem. (J.P.N.)

  6. Access Control for Agent-based Computing: A Distributed Approach.

    Science.gov (United States)

    Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex

    2001-01-01

    Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…

  7. Compulsory licensing, price controls, and access to patented foreign products

    OpenAIRE

    Eric Saggi; Saggi Saggi

    2012-01-01

    Motivated by existing multilateral rules regarding intellectual property, we develop a North-South model to highlight the dual roles price controls and compulsory licensing play in determining Southern access to a patented Northern product. The Northern patent-holder chooses whether and how to work its patent in the South (either via entry or voluntarily licensing) while the South determines the price control and whether to issue a compulsory license. The threat of compulsory licensing benefi...

  8. Access control issues and solutions for large sites

    International Nuclear Information System (INIS)

    Warren, F.E.

    1992-07-01

    The Lawrence Livermore National Laboratory (LLNL) operates an automated access control system consisting of more than 100 portals. We have gained considerable practical experience in the issues involved in operating this large system, and have identified the central issues to include system reliability, the large user population, the need for central control, constant change, high visibility and the budget. This paper outlines these issues and draws from our experience to discuss some fruitful ways of addressing them

  9. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  10. Ubiquitous access control and policy management in personal networks

    DEFF Research Database (Denmark)

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    distributed master devices acting as access points- and also pure peer-to-peer interactions inside the PN. Taking benefit from the modularity and scalability of the design, this solution can be extended into supporting coalitions of different security domains, deriving from the creation of PNs federations.......In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case...

  11. Controlling user access to electronic resources without password

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  12. Improving the Authentication Scheme and Access Control Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Wei-Chen Wu

    2014-11-01

    Full Text Available Privacy and security are very important in vehicular ad hoc networks (VANETs. VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs raise challenges, such as certificate distribution and reduction of the strong reliance on tamper-proof devices. In 2011, Yeh et al. proposed a PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s authorized credential (AC is not secure and private, even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that an improving authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.

  13. Research on Manufacture and Quality Control of Medium Carbon Vessels for Resistance to Hydrogen Induced Cracking

    Science.gov (United States)

    Xinyu, Zhao; Yang, Zou; Yang, Liu; Nan, Zhao; Yanqiu, Fan; Liye, Qin; Yanchun, Lv

    With the exploitation of gas mixed with sulfur, the requirement of hydrogen induced cracking (HIC) resistance for medium carbon vessels serving at environmental with hydrogen sulfide solution become more rigorous. Through the research on HIC, the formation reasons of those are: MnS inclusions, Al2O3 inclusions, P segregation, Bainites and Macro segregation of slab. Thus if these parameters are controlled appropriately, the qualified medium carbon vessels for resistance to HIC steel will be produced. The conclusions are following: the controlled measurements to cleanliness on liquid steel, macro segregation controlled on slab, large reduction at rolling and normalizing are used to produce the HIC resistance vessels. The properties of tensile strength and low temperature impact meet the standard properly. Meanwhile there aren't hydrogen induced cracking found in any samples.

  14. Small- and Medium-Sized Commercial Building Monitoring and Controls Needs: A Scoping Study

    Energy Technology Data Exchange (ETDEWEB)

    Katipamula, Srinivas; Underhill, Ronald M.; Goddard, James K.; Taasevigen, Danny J.; Piette, M. A.; Granderson, J.; Brown, Rich E.; Lanzisera, Steven M.; Kuruganti, T.

    2012-10-31

    Buildings consume over 40% of the total energy consumption in the U.S. A significant portion of the energy consumed in buildings is wasted because of the lack of controls or the inability to use existing building automation systems (BASs) properly. Much of the waste occurs because of our inability to manage and controls buildings efficiently. Over 90% of the buildings are either small-size (<5,000 sf) or medium-size (between 5,000 sf and 50,000 sf); these buildings currently do not use BASs to monitor and control their building systems from a central location. According to Commercial Building Energy Consumption Survey (CBECS), about 10% of the buildings in the U.S. use BASs or central controls to manage their building system operations. Buildings that use BASs are typically large (>100,000 sf). Lawrence Berkeley National Laboratory (LBNL), Oak Ridge National Laboratory (ORNL) and Pacific Northwest National Laboratory (PNNL) were asked by the U.S. Department of Energy’s (DOE’s) Building Technologies Program (BTP) to identify monitoring and control needs for small- and medium-sized commercial buildings and recommend possible solutions. This study documents the needs and solutions for small- and medium-sized buildings.

  15. Controlling the wave propagation through the medium designed by linear coordinate transformation

    International Nuclear Information System (INIS)

    Wu, Yicheng; He, Chengdong; Wang, Yuzhuo; Liu, Xuan; Zhou, Jing

    2015-01-01

    Based on the principle of transformation optics, we propose to control the wave propagating direction through the homogenous anisotropic medium designed by linear coordinate transformation. The material parameters of the medium are derived from the linear coordinate transformation applied. Keeping the space area unchanged during the linear transformation, the polarization-dependent wave control through a non-magnetic homogeneous medium can be realized. Beam benders, polarization splitter, and object illusion devices are designed, which have application prospects in micro-optics and nano-optics. The simulation results demonstrate the feasibilities and the flexibilities of the method and the properties of these devices. Design details and full-wave simulation results are provided. The work in this paper comprehensively applies the fundamental theories of electromagnetism and mathematics. The method of obtaining a new solution of the Maxwell equations in a medium from a vacuum plane wave solution and a linear coordinate transformation is introduced. These have a pedagogical value and are methodologically and motivationally appropriate for physics students and teachers at the undergraduate and graduate levels. (paper)

  16. Controlling the wave propagation through the medium designed by linear coordinate transformation

    Science.gov (United States)

    Wu, Yicheng; He, Chengdong; Wang, Yuzhuo; Liu, Xuan; Zhou, Jing

    2015-01-01

    Based on the principle of transformation optics, we propose to control the wave propagating direction through the homogenous anisotropic medium designed by linear coordinate transformation. The material parameters of the medium are derived from the linear coordinate transformation applied. Keeping the space area unchanged during the linear transformation, the polarization-dependent wave control through a non-magnetic homogeneous medium can be realized. Beam benders, polarization splitter, and object illusion devices are designed, which have application prospects in micro-optics and nano-optics. The simulation results demonstrate the feasibilities and the flexibilities of the method and the properties of these devices. Design details and full-wave simulation results are provided. The work in this paper comprehensively applies the fundamental theories of electromagnetism and mathematics. The method of obtaining a new solution of the Maxwell equations in a medium from a vacuum plane wave solution and a linear coordinate transformation is introduced. These have a pedagogical value and are methodologically and motivationally appropriate for physics students and teachers at the undergraduate and graduate levels.

  17. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  18. Medium-Range Predictability of Contrail-Cirrus Demonstrated during Experiments Ml-Cirrus and Access-Ii

    Science.gov (United States)

    Schumann, U.

    2015-12-01

    The Contrail Cirrus Prediction model CoCiP (doi:10.5194/gmd-5-543-2012) has been applied quasi operationally to predict contrails for flight planning of ML-CIRRUS (C. Voigt, DLR, et al.) in Europe and for ACCESS II in California (B. Anderson, NASA, et al.) in March-May 2014. The model uses NWP data from ECMWF and past airtraffic data (actual traffic data are used for analysis). The forecasts provided a sequence of hourly forecast maps of contrail cirrus optical depth for 3.5 days, every 12 h. CoCiP has been compared to observations before, e.g. within a global climate-aerosol-contrail model (Schumann, Penner et al., ACPD, 2015, doi:10.5194/acpd-15-19553-2015). Good predictions would allow for climate optimal routing (see, e.g., US patent by Mannstein and Schumann, US 2012/0173147 A1). The predictions are tested by: 1) Local eyewitness reports and photos, 2) satellite observed cloudiness, 3) autocorrelation analysis of predictions for various forecast periods, 4) comparisons of computed with observed optical depth from COCS (doi:10.5194/amt-7-3233-2014, 2014) by IR METEOSAT-SEVIRI observations over Europe. The results demonstrate medium-range predictability of contrail cirrus to a useful degree for given traffic, soot emissions, and high-quality NWP data. A growing set of satellite, Lidar, and in-situ data from ML-CIRRUS and ACCENT are becoming available and will be used to further test the forecast quality. The autocorrelation of optical depth predictions is near 70% for 3-d forecasts for Europe (outside times with high Sahara dust loads), and only slightly smaller for continental USA. Contrail cirrus is abundant over Europe and USA. More than 1/3 of all cirrus measured with the research aircraft HALO during ML-CIRRUS was impacted by contrails. The radiative forcing (RF) is strongly daytime and ambience dependent. The net annual mean RF, based on our global studies, may reach up to 0.08 W/m2 globally, and may well exceed 1 W/m2 regionally, with maximum over Europe

  19. Safety of Mixed Model Access Control in a Multilevel System

    Science.gov (United States)

    2014-06-01

    Control Policies.” IEEE International Conference on System of Systems Engineering 2009, n.p. [16] C. R. McDaniel, and M. L . Tardy, Role-Based...read O (Object) if and only if lo ls ( l represents the security clearance) and S has discretionary read access to O [3]. The *-Property (Star...Fun 1546 uri=“dc:author”> 1547 <Ind>Randy Arvay</Ind> 1548 </Fun> 1549 </Expr> 1550

  20. An Access Control Model for the Uniframe Framework

    Science.gov (United States)

    2005-05-01

    is called active software capabilities framework ( ASCap ) that centers around the idea of a policy object, which instead of being embedded into the...access control component, is delivered by the client. The client firsts requests an ASCap (policy object) from the security server. Then the client...and the object server both must instantiate proxies. The client ASCap proxy may then request additional credentials from other servers which may

  1. Simplified Key Management for Digital Access Control of Information Objects

    Science.gov (United States)

    2016-07-02

    parties had an interest in controlling access and copying technologies. Examples include: player piano rolls early in the 20th century [1] and video tape...0001, Task BC-5-2283, “ Architecture , Design of Services for Air Force Wide Distributed Systems,” for USAF HQ USAF SAF/CIO A6. The views, opinions...an approach that relies on high-assurance architectures and the protection elements they provide through PKI. The distribution of private keys is a

  2. Rural providers' access to online resources: a randomized controlled trial

    Science.gov (United States)

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  3. Rural providers’ access to online resources: a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Jonathan D. Eldredge

    2016-01-01

    Full Text Available Objective: The research determined the usage and satisfaction levels with one of two point-of-care (PoC resources among health care providers in a rural state. Methods: In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants’ attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA, paired t tests, and Cohen’s d statistic to compare pre- and post-study effects sizes. Results: Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to ‘‘about right amounts of information’’ at the completion of the study. DynaMed users reported a Cohen’s d increase of þ1.50 compared to AccessMedicine users’ reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen’s d. Conclusion: Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine.

  4. Integration of access control and ancillary information systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Ahrens, J.S.

    1995-07-01

    The DOE has identified the Lawrence Livermore National Laboratory ARGUS system as the standard entry control system for the DOE Complex. ARGUS integrates several key functions, specifically, badging, entry control, and verification of clearance status. Not all sites need or can afford an ARGUS system. Such sites are therefore limited to commercial equipment which provide ARGUS like features. In this project an alternative way to integrate commercial equipment into an integrated system to include badging, access control, property control, and automated verification of clearance status has been investigated. Such a system would provide smaller sites the same functionality as is provided by ARGUS. Further, it would allow sites to fully participate in the DOE`s concept of Complex wide access control. This multi-year task is comprised of three phases. Phase 1, system requirements and definitions, and phase 2, software and hardware development, were completed during fiscal year 1994. This report covers these two phases and the demonstration system which resulted. Phase three would employ the demonstration system to evaluate system performance, identify operational limits and to integrate additional features. The demonstration system includes a badging station, a database server, a managers workstation, an entry control system, and a property protection system. The functions have been integrated through the use of custom interfaces and operator screens which greatly increase ease of use.

  5. Consistency Checking of Safety and Availability in Access Control

    Science.gov (United States)

    Li, Ruixuan; Lu, Jianfeng; Lu, Zhengding; Ma, Xiaopu

    The safety and availability policies are very important in an access control system for ensuring security and success when performing a certain task. However, conflicts may arise between safety and availability policies due to their opposite focuses. In this paper, we address the problem of consistency checking for safety and availability policies, especially for the co-existence of static separation-of-duty (SSoD) policies with availability policies, which determines whether there exists an access control state that satisfies all of these policies. We present criteria for determining consistency with a number of special cases, and show that the general case and partial subcases of the problem are intractable (NP-hard) and in the Polynomial Hierarchy NPNP. We design an algorithm to efficiently solve the nontrivial size instances for the intractable cases of the problem. The running example shows the validity of the proposed algorithm. The investigation will help the security officer to specify reasonable access control policies when both safety and availability policies coexist.

  6. A Robust Control Scheme for Medium-Voltage-Level DVR Implementation

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Loh, Poh Chiang; Li, Yun Wei

    2007-01-01

    of Hinfin controller weighting function selection, inner current loop tuning, and system disturbance rejection capability is presented. Finally, the designed control scheme is extensively tested on a laboratory 10-kV MV-level DVR system with varying voltage sag (balanced and unbalanced) and loading (linear......In this paper, a robust control scheme with an outer Hinfin voltage control loop and an inner current control loop is designed and implemented on a medium-voltage (MV)-level dynamic voltage restorer (DVR) system. Through a simple selection of weighting functions, the synthesized Hinfin controller....../nonlinear load and induction motor load) conditions. It is shown that the proposed control scheme is effective in both balanced and unbalanced sag compensation and load disturbance rejection, as its robustness is explicitly specified....

  7. State control, access to capital and firm performance

    Directory of Open Access Journals (Sweden)

    Oliver Zhen Li

    2012-06-01

    Full Text Available We study the effect of state control on capital allocation and investment in China, where the government screens prospective stock issuers. We find that state firms are more likely to obtain government approval to conduct seasoned equity offerings than non-state firms. Further, non-state firms exhibit greater sensitivities of subsequent investment and stock performance to regulatory decisions on stock issuances than state firms. Our work suggests that state control of capital access distorts resource allocation and impedes the growth of non-state firms. We also provide robust evidence that financial constraints cause underinvestment.

  8. Contribution of Co2+ in increasing chlorophyll a concentration of Nannochloropsis salina in controlled Conwy medium

    Science.gov (United States)

    Hala, Y.; Taba, P.; Suryati, E.; Kasih, P.; Firman, N. F.

    2018-03-01

    A research in determining the contribution of Co2+ on the increase of chlorophyll a concentration of Nannochloropsis salina has been caried out. The cultivation of N. salina was conducted in the Conwy medium with a salinity of 5%o and 25%o and various Co2+ concentration (2, 4, and 8 ppm). In this research, Co2+ was exposed early in the cultivation of N. salina. The growth of N. salina was observed daily by counting the number of populations using a haemocytometer while the chlorophyll a concentration was determined by a Uv-Vis spectrophotometer. The results showed that the growth of N. salina in the control was higher than that in the medium containing Co2+. The optimum growth time was achieved on 15th days (5%) and 8th days (25%). In the cultivation medium with a salinity of 5%, Co2+ with a concentration of 2 ppm increased the chlorophyll a level while Co2+ with concentrations of 4 and 8 ppm decreased it. In the medium of cultivation with a salinity of 25%, the increase in chlorophyll a level was observed at Co2+ concentrations of 2 and 4 ppm whereas the decrease in chlorophyl a level was given at a concentration of 8 ppm. It can be concluded that at low concentrations, Co2+ increased the concentration of chlorophyll a in N. salina.

  9. Smart Contract-Based Access Control for the Internet of Things

    OpenAIRE

    Zhang, Yuanyu; Kasahara, Shoji; Shen, Yulong; Jiang, Xiaohong; Wan, Jianxiong

    2018-01-01

    This paper investigates a critical access control issue in the Internet of Things (IoT). In particular, we propose a smart contract-based framework, which consists of multiple access control contracts (ACCs), one judge contract (JC) and one register contract (RC), to achieve distributed and trustworthy access control for IoT systems. Each ACC provides one access control method for a subject-object pair, and implements both static access right validation based on predefined policies and dynami...

  10. Active power filter for medium voltage networks with predictive current control

    Energy Technology Data Exchange (ETDEWEB)

    Verne, Santiago A.; Valla, Maria I. [Laboratorio de Electronica Industrial, Control e Instrumentacion (LEICI), Facultad de Ingenieria, Universidad Nacional de La Plata and CONICET, La Plata (Argentina)

    2010-12-15

    A transformer less Shunt Active Power Filter (SAPF) for medium voltage distribution networks based on Multilevel Diode Clamped Inverter is presented in this paper. Converter current control is based on a Model Predictive strategy, which gives very fast current response. Also, the algorithm includes voltage balancing capability which is essential for proper converter operation. The presented current control algorithm is naturally applicable to converters with an arbitrary number of levels with reduced computational effort by virtue of the incorporation of switching restrictions which are necessary for reliable converter operation. The performance of the proposed algorithm is evaluated by means of computer simulations. (author)

  11. Optimized Control Strategy for a Medium-Voltage DVR-Theoretical Investigations and Experimental Results

    DEFF Research Database (Denmark)

    Meyer, Christoph; De Doncker, Rik W.; Li, Yun Wei

    2008-01-01

    the needed voltage amplitude. To avoid this drawback, an optimized control strategy is presented in this paper, which is able to reduce the needed injection voltage of the DVR and concurrently to mitigate the transient distortions at the load side. In the following paper, a brief introduction of the basic...... a small fraction of the energy stored in the DC-link capacitor is used, which makes it impractical for DVRs to compensate relatively long voltage sags. Present control strategies are only able to minimize the distortions at the load or to allow a better utilization of the storage system by minimizing...... DVR principle will be given. Next, three standard control strategies will be compared and an optimized control strategy is developed in this paper. Finally, experimental results using a medium-voltage 10-kV DVR setup will be shown to verify and prove the functionality of the presented control strategy...

  12. Top Management Control Functions for Information Systems in Small and Medium Enterprises

    Directory of Open Access Journals (Sweden)

    Uma VIJAYAKUMAR

    2009-01-01

    Full Text Available This paper analyzes the Top Management Control functions for Information Systems (IS in Small and Medium Enterprises (SMEs. SMEs extensively rely on information technology resources to enhance their competence in today’s global economy. They should have adequate top management control mechanisms in place for their efficient functioning. Top Management Controls determine how effectively the senior management manages the IS functions in a SME. The major tasks at this level consist of Planning, Organizing, Leading and Controlling functions. A brief introduction to SMEs is given at the beginning followed by the different categories of Top Management Controls. The final section highlights on some good practices to be followed by Top Management to realize the vision for the IS project in SMEs.

  13. Development of the ACS+OPC UA based control system for a CTA medium size telescope prototype

    Science.gov (United States)

    Behera, Bagmeet; Oya, Igor; Birsin, Emrah; Köppel, Hendryk; Melkumyan, David; Schlenstedt, Stefan; Schmidt, Torsten; Schwanke, Ullrich; Wegner, Peter; Wiesand, Stephan; Winde, Michael

    2012-09-01

    The Cherenkov Telescope Array (CTA) is the next generation Very High Energy (VHE, defined as > 50GeV to several 100TeV) telescope facility, currently in the design and prototyping phase, and expected to come on-line around 2016. The array would have both a Northern and Southern hemisphere site, together delivering nearly complete sky coverage. The CTA array is planned to have ~100 telescopes of several different sizes to fulfill the sensitivity and energy coverage needs. Each telescope has a number of subsystems with varied hardware and control mechanisms; a drive system that gets commands and inputs via OPC UA (OPC Unified Architecture), mirror alignment systems based on XBee/ZigBee protocol and/or CAN bus, weather monitor accessed via serial/Ethernet ports, CCD cameras for calibration, Cherenkov camera, and the data read out electronics, etc. Integrating the control and data-acquisitions of such a distributed heterogeneous system calls for a framework that can handle such a multi-platform, multi-protocol scenario. The CORBA based ALMA Common software satisfies these needs very well and is currently being evaluated as the base software for developing the control system for CTA. A prototype for a Medium Size Telescope (MST, ~12m) is being developed and will be deployed in Berlin, by end of 2012. We present the development being carried out to integrate and control the various hardware subsystems of this MST prototype using ACS.

  14. Admission Control and Interference Management in Dynamic Spectrum Access Networks

    Directory of Open Access Journals (Sweden)

    Jorge Martinez-Bauset

    2010-01-01

    Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

  15. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever......-changing environmental energy sources. In this paper, we present an improved and extended version of ODMAC and we analyze it by means of an analytical model that can approximate several performance metrics in an arbitrary network topology. The simulations and the analytical experiments show ODMAC's ability to satisfy...

  16. Multiple-Time-Scales Hierarchical Frequency Stability Control Strategy of Medium-Voltage Isolated Microgrid

    DEFF Research Database (Denmark)

    Zhao, Zhuoli; Yang, Ping; Guerrero, Josep M.

    2016-01-01

    In this paper, an islanded medium-voltage (MV) microgrid placed in Dongao Island is presented, which integrates renewable-energy-based distributed generations (DGs), energy storage system (ESS), and local loads. In an isolated microgrid without connection to the main grid to support the frequency....... In this way, dynamic stability control that cope with disturbances in short-time scale is implemented by microgrid central controller (MGCC) within Zone B and Zone C. Meanwhile, steady-state stability control to solve the peaks and valleys problem of loads and DGs in long-time scale is executed by microgrid...... energy management system (MEMS) within Zone A. Furthermore, based on the developed complete small-signal state-space model, sensitivity analysis of the eigenvalues is conducted in order to reveal the dynamic stability margin of the MV microgrid, and to identify the proper range of the control parameters...

  17. Phase control of light transmission and reflection based biexciton coherence in a defect dielectric medium.

    Science.gov (United States)

    Asadpour, Seyyed Hossein; Soleimani, H Rahimpour

    2014-10-01

    Phase control of two weak probe lights' transmission and reflection based biexciton coherence in a defect dielectric medium doped by four-level GaAs/AlGaAs multiple quantum wells with 15 periods of 17.5 nm GaAs wells and 15 nm Al0.3Ga0.7As barriers is theoretically investigated. The biexciton coherence in this scheme is set up by two continuous wave control fields that couple to a resonance of biexcitons. It is shown that the transmission and reflection properties versus relative phase between applied fields can be controlled by the intensity of control fields and exciton spin relaxation between exciton states. Our studies show that many-particle interactions due to Coulomb correlations in semiconductors can be harnessed by quantum coherence in an interacting many-particle system.

  18. Spatial solitons in a three-level atomic medium supported by a Laguerre-Gaussian control beam

    International Nuclear Information System (INIS)

    Hang Chao; Konotop, V. V.

    2011-01-01

    We investigate the existence and stability of various types of spatial solitons in a three-level atomic medium with Laguerre-Gaussian control beam. Radial and azimuthal modulations of the medium properties, introduced by the control beam, provide possibilities for existence of diverse soliton patterns and dynamics. Beam diffraction provides additional soliton controllability. All types of solitons can be generated at very low input energy at a few-photon level.

  19. A Knowledge-Constrained Access Control Model for Protecting Patient Privacy in Hospital Information Systems.

    Science.gov (United States)

    Zhang, Runtong; Chen, Donghua; Shang, Xiaopu; Zhu, Xiaomin; Liu, Kecheng

    2017-04-24

    Current access control mechanisms of the hospital information system can hardly identify the real access intention of system users. A relaxed access control increases the risk of compromise of patient privacy. To reduce unnecessary access of patient information by hospital staff, this paper proposes a Knowledge-Constrained Role-Based Access Control (KC-RBAC) model in which a variety of medical domain knowledge is considered in access control. Based on the proposed Purpose Tree and knowledge-involved algorithms, the model can dynamically define the boundary of access to the patient information according to the context, which helps protect patient privacy by controlling access. Compared with the Role-Based Access Control model, KC-RBAC can effectively protect patient information according to the results of the experiments.

  20. Access control system in Hamaoka Nuclear Power Station

    International Nuclear Information System (INIS)

    Kaneda, Hisashi; Shimura, Shigetaka; Suzuki, Katsuhiko; Kitazawa, Toshiichi

    1983-01-01

    The new computerized system has introduced to improve function of radiation protection for those who enter the radiation control area, by dealing with measurement of radiation dose, check of personal qualification, resistration of working condition and statistical treatment of these data. This system uses combined TLD, ''TL BADGE'', as a radiation detection sensor, instead of conventional pocket dosimeter and film badge. TL BADGE reading instrument are installed at the entrance to the control area and at working areas. The data of radiation dose, personal qualification etc. read by the reading instrument are transmitted directly to the computer system, which compiles and transacts these data. This system is consisted of three minicomputers, double memory files, CRTs for effective data search and display and floppy disks as a medium for registration, etc. Thus the computer system improves its reliability and the maintenanceability of data, being capable of automatical transaction of a great amount of data quickly. This report describes: Concept of using computer system, System outline, Measurement of radiation dose and Operational functions. (author)

  1. The Methods and Mechanisms for Access Control of Encrypted Data in Clouds

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2013-09-01

    Full Text Available The paper is about the problem of data access control in clouds. The main mechanisms for access control of encrypted data in untrusted cloud environments are analyzed and described. The comparative analysis of access control algorithms and implementation issues are offered. The main practical result of research is a web-based (Wikipedia-like reference and information system devoted to the access control methods and mechanisms.

  2. CompactPCI/Linux platform for medium level control system on FTU

    International Nuclear Information System (INIS)

    Wang, L.; Centioli, C.; Iannone, F.; Panella, M.; Mazza, G.; Vitale, V.

    2004-01-01

    In large fusion experiments, such as tokamak devices, there are common trends for slow control systems. Because of complexity of the plants, several tokamaks adopt the so-called 'standard model' (SM) based on a three levels hierarchical control: (i) high level control (HLC) - the supervisor; (ii) medium level control (MLC) - I/O field equipments interface and concentration units and (iii) low level control (LLC) - the programmable logic controllers (PLC). FTU control system was designed with SM concepts and, in its 15 years life cycle, it underwent several developments. The latest evolution was mandatory, due to the obsolescence of the MLC CPUs, based on VME/Motorola 68030 with OS9 operating system. Therefore, we had to look for cost-effective solutions and we chose a CompactPCI-Intel x86 platform with Linux operating system. A software porting has been done taking into account the differences between OS9 and Linux operating system in terms of inter/network processes communications and I/O multi-ports serial driver. This paper describes the hardware/software architecture of the new MLC system emphasising the reliability and the low costs of the open source solutions. Moreover, the huge amount of software packages available in open source environment will assure a less painful maintenance, and will open the way to further improvements of the system itself

  3. 75 FR 80886 - Third Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-12-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held January 13, 2011...

  4. 77 FR 55894 - Fifteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-09-11

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the fifteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will...

  5. 76 FR 38742 - Seventh Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-07-01

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held July 15, 2011, from...

  6. 77 FR 71474 - Seventeenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-11-30

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the seventeenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  7. 77 FR 15448 - Twelfth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-03-15

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twelfth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  8. 76 FR 50811 - Eighth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-08-16

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...: Airport Security Access Control Systems. DATES: The meeting will be held September 15, 2011, from 10 a.m...

  9. 78 FR 51810 - Twenty-Fourth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-08-21

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-fourth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  10. 77 FR 25525 - Thirteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems.

    Science.gov (United States)

    2012-04-30

    ... Committee 224, Airport Security Access Control Systems. AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the thirteenth meeting of RTCA Special Committee 224, Airport Security Access Control Systems DATES: The meeting will be...

  11. 76 FR 59481 - Ninth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-09-26

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems. SUMMARY...: Airport Security Access Control Systems. DATES: The meeting will be held October 20, 2011, from 10 a.m. to...

  12. 78 FR 22025 - Twenty First Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-04-12

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty first meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  13. 78 FR 43963 - Twenty-Third Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-07-22

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-third meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  14. 75 FR 61819 - First Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-10-06

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held November 2, 2010...

  15. 78 FR 7850 - Nineteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-02-04

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the nineteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  16. 76 FR 9632 - Fifth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-02-18

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held March 10, 2011, from...

  17. 78 FR 16757 - Twentieth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-03-18

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twentieth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  18. 76 FR 16470 - Sixth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-03-23

    ... 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems DATES: The meeting will be held April 13, 2011, from...

  19. 77 FR 64838 - Sixteenth Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-10-23

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the sixteenth meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  20. 75 FR 71790 - Second Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2010-11-24

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held December 9, 2010...

  1. 78 FR 31627 - Twenty-Second Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2013-05-24

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Access Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the twenty-second meeting of the RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting...

  2. 76 FR 3931 - Fourth Meeting: RTCA Special Committee 224: Airport Security Access Control Systems

    Science.gov (United States)

    2011-01-21

    ... Committee 224: Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), DOT. ACTION: Notice of RTCA Special Committee 224 Meeting: Airport Security Access Control Systems (Update to... Committee 224: Airport Security Access Control Systems. DATES: The meeting will be held February 8, 2011...

  3. An Object-Oriented Approach to Security Policies and their Access Controls for Database Management

    Science.gov (United States)

    1991-09-01

    access control requiremnts is a messy task. It may result in a system less reliable and secure than building a new system from scratch. Further, we have...means to specify access control requirments for the need-to-know policy. B. Actions as Access Priviledges and Queries in an Object-Class Hierarchy The...database. Access priviledges include read. update. append, delete. etc. An access query is a logical expression of predicates defining the parn of a data

  4. First Experiences Using XACML for Access Control in Distributed Systems

    Science.gov (United States)

    Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit

    2003-01-01

    Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.

  5. Sensors on speaking terms: Schedule-based medium access control protocols for wireless sensor networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.

    2007-01-01

    Wireless sensor networks make the previously unobservable, observable. The basic idea behind these networks is straightforward: all wires are cut in traditional sensing systems and the sensors are equipped with batteries and radio's to virtually restore the cut wires. The resulting sensors can be

  6. Simulation and Modeling of a New Medium Access Control Scheme for Multi-Beam Directional Networking

    Science.gov (United States)

    2017-03-03

    mechanically steering an antenna. However, This work is sponsored by the Assistant Secretary of Defense Research and Engineering via Air Force contract...of directional networks . In this scenario, there can be very long distance links between nodes. Thus, propagation delay is usually far longer than the...the network . Another MAC feature is a simple neighbor dis- covery protocol to create new links in the network . Node location tracking, as precise

  7. Simulation and Modeling of a Novel Medium Access Control Scheme for Multi-Beam Directional Networking

    Science.gov (United States)

    2017-03-03

    generated by mechanically steering an antenna. However, This work is sponsored by the Assistant Secretary of Defense Research and Engineering via Air...capabilities of directional networks . In this scenario, there can be very long distance links between nodes. Thus, propagation delay is usually far...simple neighbor discovery protocol to create new links in the network . Node location tracking, as precise node positions are necessary for pointing a

  8. Medium access control and network layer design for 60 GHz wireless personal area networks

    NARCIS (Netherlands)

    An, X.

    2010-01-01

    The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks

  9. Accessibility

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2017-01-01

    This contribution is timely as it addresses accessibility in regards system hardware and software aligned with introduction of the Twenty-First Century Communications and Video Accessibility Act (CVAA) and adjoined game industry waiver that comes into force January 2017. This is an act created...... by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...... platforms; and games software. However, the CVAA has no legal status in the EU. This text succinctly introduces and questions implications, impact, and wider adoption. By presenting the full CVAA and game industry waiver the text targets to motivate discussions and further publications on the subject...

  10. 36 CFR 1256.70 - What controls access to national security-classified information?

    Science.gov (United States)

    2010-07-01

    ... HISTORICAL MATERIALS Access to Materials Containing National Security-Classified Information § 1256.70 What controls access to national security-classified information? (a) The declassification of and public access... Information Act (5 U.S.C. 552, as amended). (b) Public access to documents declassified in accordance with...

  11. TELICS—A Telescope Instrument Control System for Small/Medium Sized Astronomical Observatories

    Science.gov (United States)

    Srivastava, Mudit K.; Ramaprakash, A. N.; Burse, Mahesh P.; Chordia, Pravin A.; Chillal, Kalpesh S.; Mestry, Vilas B.; Das, Hillol K.; Kohok, Abhay A.

    2009-10-01

    For any modern astronomical observatory, it is essential to have an efficient interface between the telescope and its back-end instruments. However, for small and medium-sized observatories, this requirement is often limited by tight financial constraints. Therefore a simple yet versatile and low-cost control system is required for such observatories to minimize cost and effort. Here we report the development of a modern, multipurpose instrument control system TELICS (Telescope Instrument Control System) to integrate the controls of various instruments and devices mounted on the telescope. TELICS consists of an embedded hardware unit known as a common control unit (CCU) in combination with Linux-based data acquisition and user interface. The hardware of the CCU is built around the ATmega 128 microcontroller (Atmel Corp.) and is designed with a backplane, master-slave architecture. A Qt-based graphical user interface (GUI) has been developed and the back-end application software is based on C/C++. TELICS provides feedback mechanisms that give the operator good visibility and a quick-look display of the status and modes of instruments as well as data. TELICS has been used for regular science observations since 2008 March on the 2 m, f/10 IUCAA Telescope located at Girawali in Pune, India.

  12. The Current State of Sensing, Health Management, and Control for Small-To-Medium-Sized Manufacturers.

    Science.gov (United States)

    Helu, Moneer; Weiss, Brian

    2016-01-01

    The development of digital technologies for manufacturing has been challenged by the difficulty of navigating the breadth of new technologies available to industry. This difficulty is compounded by technologies developed without a good understanding of the capabilities and limitations of the manufacturing environment, especially within small-to-medium enterprises (SMEs). This paper describes industrial case studies conducted to identify the needs, priorities, and constraints of manufacturing SMEs in the areas of performance measurement, condition monitoring, diagnosis, and prognosis. These case studies focused on contract and original equipment manufacturers with less than 500 employees from several industrial sectors. Solution and equipment providers and National Institute of Standards and Technology (NIST) Hollings Manufacturing Extension Partnership (MEP) centers were also included. Each case study involved discussions with key shop-floor personnel as well as site visits with some participants. The case studies highlight SME's strong need for access to appropriate data to better understand and plan manufacturing operations. They also help define industrially-relevant use cases in several areas of manufacturing operations, including scheduling support, maintenance planning, resource budgeting, and workforce augmentation.

  13. Control and Testing of a Dynamic Voltage Restorer (DVR) at Medium Voltage Level

    DEFF Research Database (Denmark)

    Nielsen, John Godsk; Newman, Michael; Nielsen, Hans Ove

    2004-01-01

    The dynamic voltage restorer (DVR) has become popular as a cost effective solution for the protection of sensitive loads from voltage sags. Implementations of the DVR have been proposed at both a low voltage (LV) level, as well as a medium voltage (MV) level; and give an opportunity to protect high...... power sensitive loads from voltage sags. This paper reports practical test results obtained on a medium voltage (10 kV) level using a DVR at a Distribution test facility in Kyndby, Denmark. The DVR was designed to protect a 400-kVA load from a 0.5-p.u. maximum voltage sag. The reported DVR verifies...... duration voltage sags were created using a controllable LV breaker fed by a 630 kVA Distribution transformer placed upstream of the sensitive load. The fault currents in excess of 12 kA were designed and created to obtain the required voltage sags. It is concluded the DVR works well in all operating...

  14. Laser polarization dependent and magnetically control of group velocity in a dielectric medium doped with nanodiamond nitrogen vacancy centers

    Energy Technology Data Exchange (ETDEWEB)

    Asadpour, Seyyed Hossein; Rahimpour Soleimani, H., E-mail: Rahimpour@guilan.ac.ir

    2014-03-01

    In this paper, group velocity control of Gaussian beam in a dielectric medium doped with nanodiamond nitrogen vacancy (NV) centers under optical excitation is discussed. The shape of transmitted and reflected pulses from dielectric can be tuned by changing the intensity of magnetic field and polarization of the control beam. The effect of intensity of control beam on group velocity is also investigated.

  15. Adaptive Traffic Control Systems in a medium-sized Scandinavian city

    DEFF Research Database (Denmark)

    Agerholm, Niels; Olesen, Anne Vingaard

    2018-01-01

    Adaptive Traffic Control Systems (ATCS) are aimed at reducing congestion. ATCS adapt to approaching traffic to continuously optimise the traffic flows in question. ATCS have been implemented in many locations, including the Scandinavian countries, with various effects. Due to congestion problems......, ATCS were installed in the eight signalised intersections of a 1.7 km stretch of the ring road in the medium-sized Danish city of Aalborg. To measure the effect of ATCS a with/without study was carried out. GPS data from a car following the traffic, recorded transportation times for buses in service......, and GPS data from a range of cars driving on the ring road formed the basis for the study. The result of ATCS implementation was a significant 17% reduction in transportation time on the ring road in the most congested period, the afternoon peak. Less significant effects were found regarding the morning...

  16. METHOD AND ABSTRACT MODEL FOR CONTROL AND ACCESS RIGHTS BY REQUESTS REDIRECTION

    Directory of Open Access Journals (Sweden)

    K. A. Shcheglov

    2015-11-01

    Full Text Available We have researched implementation problems of control and access rights of subjects to objects in modern computer systems. We have suggested access control method based on objects access requests redirection. The method possesses a distinctive feature as compared to discretional access control. In case when a subject needs to deny writing (object modification, it is not denied but redirected (access rights are not changed, but operation is performed with another object. This gives the possibility to implement access policies to system objects without breaking the system and applications operability, and share correctly access objects between subjects. This important property of suggested access control method enables to solve fundamentally new system objects securing problems like system resources virtualization aimed to protect system objects from users’ and applications attacks. We have created an abstract model, and it shows that this method (access control from subjects to objects based on requests redirection can be used as self-sufficient access control method, implementing any access control policy (from subjects to objects, thus being an alternative to discretional access control method.

  17. Effects of feed access after hatch and inclusion of fish oil and medium chain fatty acids in a pre-starter diet on broiler chicken growth performance and humoral immunity.

    Science.gov (United States)

    Lamot, D M; van der Klein, S A S; van de Linde, I B; Wijtten, P J A; Kemp, B; van den Brand, H; Lammers, A

    2016-09-01

    Delayed feed and water access is known to impair growth performance of day old broiler chickens. Although effects of feed access on growth performance and immune function of broilers have been examined before, effects of dietary composition and its potential interaction with feed access are hardly investigated. This experiment aimed to determine whether moment of first feed and water access after hatch and pre-starter composition (0 to 7 days) affect growth rate and humoral immune function in broiler chickens. Direct fed chickens received feed and water directly after placement in the grow-out facility, whilst delayed fed chickens only after 48 h. Direct and delayed fed chickens received a control pre-starter diet, or a diet containing medium chain fatty acids (MCFA) or fish oil. At 21 days, chickens were immunized by injection of sheep red blood cells. The mortality rate depended on an interaction between feed access and pre-starter composition (P=0.014). Chickens with direct feed access fed the control pre-starter diet had a higher risk for mortality than chickens with delayed feed access fed the control pre-starter diet (16.4% v. 4.2%) whereas the other treatment groups were in-between. BW gain and feed intake till 25 days in direct fed chickens were higher compared with delayed fed chickens, whilst gain to feed ratio was lower. Within the direct fed chickens, the control pre-starter diet resulted in the highest BW at 28 days and the MCFA pre-starter diet the lowest (Δ=2.4%), whereas this was opposite for delayed fed chickens (Δ=3.0%; P=0.033). Provision of MCFA resulted in a 4.6% higher BW gain and a higher gain to feed ratio compared with other pre-starter diets, but only during the period it was provided (2 to 7 days). Minor treatment effects were found for humoral immune response by measuring immunoglobulins, agglutination titers, interferon gamma (IFN- γ ), and complement activity. Concluding, current inclusion levels of fish oil (5 g/kg) and MCFA (30 g

  18. Evaluation of secure capability-based access control in the M2M local cloud platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    delegation. Recently, the capability based access control has been considered as method to manage access in the Internet of Things (IoT) or M2M domain. In this paper, the implementation and evaluation of a proposed secure capability based access control in the M2M local cloud platform is presented......Managing access to and protecting resources is one of the important aspect in managing security, especially in a distributed computing system such as Machine-to-Machine (M2M). One such platform known as the M2M local cloud platform, referring to BETaaS architecture [1], which conceptually consists...... of multiple distributed M2M gateways, creating new challenges in the access control. Some existing access control systems lack in scalability and flexibility to manage access from users or entity that belong to different authorization domains, or fails to provide fine grained and flexible access right...

  19. Controlling the optical bistability and transmission coefficient in a four-level atomic medium

    International Nuclear Information System (INIS)

    Asadpour, Seyyed Hossein; Eslami-Majd, Abdullah

    2012-01-01

    A novel four level atomic configuration is proposed for controlling the optical bistability and transmission coefficient with application on all-optical switching. Two circularly polarized components from a weak linearly-polarized probe beam are interacted separately by two transitions of this medium. A coherent coupling field has derived another atomic transition. It is demonstrated that the transmission coefficient of two orthogonally polarized beams at different frequencies can be achieved by adjusting the magnitude of the external magnetic field. It is found that the threshold of the optical bistability can be controlled by magnitude of the external magnetic field. Also, it is shown that optical bistability can be converted to optical multistability by switching the two orthogonally polarized beams. - Highlights: ► An inverted Y-type four level atomic system is proposed. ► Transmission coefficient can be controlled by a novel interesting parameter. ► Optical bistability and multistability can be achieved via external magnetic field. ► It is shown that our proposed model is suitable for all optical switching application.

  20. Principles of Eliminating Access Control Lists within a Domain

    Directory of Open Access Journals (Sweden)

    Vic Grout

    2012-04-01

    Full Text Available The infrastructure of large networks is broken down into areas that have a common security policy called a domain. Security within a domain is commonly implemented at all nodes. However this can have a negative effect on performance since it introduces a delay associated with packet filtering. When Access Control Lists (ACLs are used within a router for this purpose then a significant overhead is introduced associated with this process. It is likely that identical checks are made at multiple points within a domain prior to a packet reaching its destination. Therefore by eliminating ACLs within a domain by modifying the ingress/egress points with equivalent functionality an improvement in the overall performance can be obtained. This paper considers the effect of the delays when using router operating systems offering different levels of functionality. It considers factors which contribute to the delay particularly due to ACLs and by using theoretical principles modified by practical calculation a model is created. Additionally this paper provides an example of an optimized solution which reduces the delay through network routers by distributing the security rules to the ingress/egress points of the domain without affecting the security policy.

  1. Concurrency control and recovery on lightweight directory access protocol

    Science.gov (United States)

    Potnis, Rohit R.; Sathaye, Archana S.

    2003-04-01

    In this paper we provide a concurrency control and recovery (CCR) mechanism over cached LDAP objects. An LDAP server can be directly queried using system calls to retrieve data. Existing LDAP implementations do not provide CCR mechanisms. In such cases, it is up to the application to verify that accesses remain serialized. Our mechanism provides an independent layer over an existing LDAP server (Sun One Directory Server), which handles all user requests, serializes them based on 2 Phase Locking and Timestamp Ordering mechanisms and provides XML-based logging for recovery management. Furthermore, while current LDAP servers only provide object-level locking, our scheme serializes transactions on individual attributes of LDAP objects (attribute-level locking). We have developed a Directory Enabled Network (DEN) Simulator that operates on a subset of directory objects on an existing LDAP server to test the proposed mechanism. We perform experiments to show that our mechanism can gracefully address concurrency and recovery related issues over and LDAP server.

  2. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  3. The control system of the 12-m medium-size telescope prototype: a test-ground for the CTA array control

    Science.gov (United States)

    Oya, I.; Anguner, E. A.; Behera, B.; Birsin, E.; Fuessling, M.; Lindemann, R.; Melkumyan, D.; Schlenstedt, S.; Schmidt, T.; Schwanke, U.; Sternberger, R.; Wegner, P.; Wiesand, S.

    2014-07-01

    The Cherenkov Telescope Array (CTA) will be the next generation ground-based very-high energy -ray observatory. CTA will consist of two arrays: one in the Northern hemisphere composed of about 20 telescopes, and the other one in the Southern hemisphere composed of about 100 telescopes, both arrays containing telescopes of different sizes and types and in addition numerous auxiliary devices. In order to provide a test-ground for the CTA array control, the steering software of the 12-m medium size telescope (MST) prototype deployed in Berlin has been implemented using the tools and design concepts under consideration to be used for the control of the CTA array. The prototype control system is implemented based on the Atacama Large Millimeter/submillimeter Array (ALMA) Common Software (ACS) control middleware, with components implemented in Java, C++ and Python. The interfacing to the hardware is standardized via the Object Linking and Embedding for Process Control Unified Architecture (OPC UA). In order to access the OPC UA servers from the ACS framework in a common way, a library has been developed that allows to tie the OPC UA server nodes, methods and events to the equivalents in ACS components. The front-end of the archive system is able to identify the deployed components and to perform the sampling of the monitoring points of each component following time and value change triggers according to the selected configurations. The back-end of the archive system of the prototype is composed by two different databases: MySQL and MongoDB. MySQL has been selected as storage of the system configurations, while MongoDB is used to have an efficient storage of device monitoring data, CCD images, logging and alarm information. In this contribution, the details and conclusions on the implementation of the control software of the MST prototype are presented.

  4. A TDMA based media access control protocol for wireless ad hoc networks

    Science.gov (United States)

    Yang, Qi; Tang, Biyu

    2013-03-01

    This paper presents a novel Time Division Multiplex Access (TDMA) based Media Access Control (MAC) protocol of wireless Ad Hoc network. To achieve collision free transmission, time slots in a MAC frame are cataloged into three types, that is access slot, control slot and traffic slot. Nodes in the network access to the network in the access slot, and an exclusive control is allocated subsequently. Data packets are transmission by dynamic schedule the traffic slots. Throughput and transmission delay are also analyzed by simulation experiment. The proposed protocol is capable of providing collision free transmission and achieves high throughput.

  5. 40 CFR 141.81 - Applicability of corrosion control treatment steps to small, medium-size and large water systems.

    Science.gov (United States)

    2010-07-01

    ... treatment steps to small, medium-size and large water systems. 141.81 Section 141.81 Protection of... WATER REGULATIONS Control of Lead and Copper § 141.81 Applicability of corrosion control treatment steps... review and approve the addition of a new source or long-term change in water treatment before it is...

  6. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...... interfacing and signal routing. Equipment and infrastructure simplification was recognized as the path towards more efficient metropolitan and access networks providing a spectrum of high-bandwidth services to large number of users. Several approaches have been proposed and developed in order to enable...

  7. An intelligent trust-based access control model for affective ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 22, No 1 (2015) >. Log in or Register to get access to full text downloads.

  8. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    OpenAIRE

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an active mobile device to enforce centralized ACL-based access control policies. Selective RFID Jamming also solves a Differential Signal Analysis attack to which the RFID Blocker Tag is susceptible.

  9. Problems and Concerns Regarding Access Control System Construction in Radiation Facilities Based on the NIFS Experience

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Motojima, O.

    2001-01-01

    Full text: In 1998, access control system for the large helical device (LHD) experimental hall was constructed and put into operation at the National Institute for Fusion Science (NIFS) in Toki, Japan. Since then, the system has been continuously improved. It now controls access into the LHD controlled area through four entrances. The system has five turnstile gates and enables control of access at the four entrances. The system is always checking whether the shielding doors are open or closed at eight positions. The details pertaining to the construction of the system were reported at IRPA-10 held in Hiroshima, Japan, in 2000. Based on our construction experience of the NIFS access control system, we will discuss problems related to software and operational design of the system. We will also discuss some concerns regarding the use of the system in radiation facilities. The problems we will present concern, among other thing, individual registration, time control, turnstile control, interlock signal control, data aggregation and transactions, automatic and manual control, and emergency procedures. For example, in relation to the time control and turnstile control functions, we will discuss the gate-opening time interval for an access event, the timing of access data recording, date changing, turn bar control, double access, and access error handling. (author)

  10. 77 FR 2343 - Eleventh Meeting: RTCA Special Committee 224, Airport Security Access Control Systems

    Science.gov (United States)

    2012-01-17

    ... Committee 224, Airport Security Access Control Systems AGENCY: Federal Aviation Administration (FAA), U.S... Control Systems. SUMMARY: The FAA is issuing this notice to advise the public of the eleventh meeting of RTCA Special Committee 224, Airport Security Access Control Systems. DATES: The meeting will be held...

  11. Satisfaction and gains perceived by nursing students with medium and high-fidelity simulation: A randomized controlled trial.

    Science.gov (United States)

    Baptista, Rui C N; Paiva, Luís A R; Gonçalves, Rui F L; Oliveira, Luís M N; Pereira, Maria de Fátima C R; Martins, José C A

    2016-11-01

    The use of simulation to reproduce the experience of health care settings and its use as a strategy in the teaching of nurses has grown at an unprecedented rate. There is little scientific evidence to examine the differences in satisfaction and gains perceived by the students with the use of medium and high fidelity. To analyse and benchmark gains and satisfaction perceived by nursing students, according to their participation in medium- and high-fidelity simulated practice. Randomized control trial post-test only design with control group. Students of the 4th year of the Bachelor's Degree in Nursing who performed medium and high-fidelity simulated practice in a Simulation Centre environment. A satisfaction scale and a scale of perceived gains from the simulation were applied to the students who underwent simulated practice in a medium-fidelity environment (control group) and high-fidelity environment (experimental group). Statistical analysis was performed and a significance level of pstudents who participated in the study, the majority were female (92.94%), with an average age of 21.89years (SD=2.81years). Satisfaction is statistically significant in the realism dimension and overall satisfaction. In the gains perceived with the simulation there is a statistically significant difference in the dimension recognition/decision. Students are very satisfied with the realism of high-fidelity simulated practice and consider that this helps them more with recognition and decision compared with the medium-fidelity simulation. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Designing a Secure E-commerce with Credential Purpose-based Access Control

    OpenAIRE

    Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek

    2014-01-01

    The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-commerce must establish a secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features. The e-commerce application must authorize access to only tho...

  13. On the Impact of information access delays on remote control of a wind turbine

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Barradas Berglind, Jose de Jesus; Madsen, Tatiana Kozlova

    2015-01-01

    It is important to reduce the impact of renewable production in the power grid by means of control, due to increased frequency deviations and imbalances caused by these assets. Cost efficient deployment of asset control frequently results in a distributed control architecture where the controller...... by the controller to gather sensor information and and quantitatively characterize the impact of these access strategies on the controller performance...... farm controller. The controller attempts to reduce fatigue on the wind turbine, which is used as a measure of the controller performance. Via simulation analysis, we show the degradation of the controller performance when subject to network delays. We analyse different access strategies useable...

  14. Somatic embryogenesis of carrot in hormone-free medium: external pH control over morphogenesis

    Science.gov (United States)

    Smith, D. L.; Krikorian, A. D.

    1990-01-01

    Cultures of preglobular stage proembryos (PGSPs) were initiated from mechanically wounded mature zygotic embryos of carrot, Daucus carota, on a hormone-free, semisolid medium. These PGSPs have been maintained and multiplied for extended periods without their progression into later embryo stages on the same hormone-free medium containing 1 mM NH4+ as the sole nitrogen source. Sustained maintenance of cultures comprised exclusively of PGSPs was dependent on medium pH throughout the culture period. Best growth and multiplication of PGSP cultures occurred when the pH of unbuffered, hormone-free medium fell from 4.5 to 4 over a 2-week period or when buffered medium was titrated to pH 4. If the hormone-free medium was buffered to sustain a pH at or above 4.5, PGSPs developed into later embryo stages. Maintenance with continuous multiplication of PGSPs occurred equally well on medium containing NH4+ or NH4+ and NO3-, but growth was poor with NO3- alone. Additional observations on the effects of medium components such as various nitrogen sources and levels, sucrose concentration, semisolid supports, type of buffer, borate concentration, activated charcoal, and initial pH that permit optimum maintenance of the PGSPs or foster their continued developmental progression into mature embryos and plantlets are reported. The influence of the pH of the hormone-free medium as a determinant in maintaining cultures as PGSPs or allowing their continued embryonic development are unequivocally demonstrated by gross morphology, scanning electron microscopy, and histological preparations.

  15. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  16. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class B...

  17. Implementing Mother Tongue Instruction in the Real World: Results from a Medium-Scale Randomized Controlled Trial in Kenya

    Science.gov (United States)

    Piper, Benjamin; Zuilkowski, Stephanie S.; Ong'ele, Salome

    2016-01-01

    Research in sub-Saharan Africa investigating the effect of mother tongue (MT) literacy instruction at medium scale is limited. A randomized controlled trial of MT literacy instruction was implemented in 2013 and 2014 as part of the Primary Math and Reading (PRIMR) Initiative in Kenya. We compare the effect of two treatment groups--the base PRIMR…

  18. Keep on Blockin' in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, M.R.; Crispo, B.; Tanenbaum, A.S.

    2005-01-01

    This paper introduces an off-tag RFID access control mechanism called "Selective RFID Jamming". Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  19. Owner-Based Role-Based Access Control OB-RBAC

    NARCIS (Netherlands)

    Saffarian, M.; Sadighi, Babak

    Administration of an access control model deals with the question of who is authorized to update policies defined on the basis of that model. One of the models whose administration has absorbed relatively large research is the Role-Based Access Control (RBAC) model. All the existing role-based

  20. Keep on Blockin’ in the Free World: Personal Access Control for Low-Cost RFID Tags

    NARCIS (Netherlands)

    Rieback, Melanie; Crispo, Bruno; Tanenbaum, Andrew

    2007-01-01

    This paper introduces an off-tag RFID access control mechanism called “Selective RFID Jamming”. Selective RFID Jamming protects low-cost RFID tags by enforcing access control on their behalf, in a similar manner to the RFID Blocker Tag. However, Selective RFID Jamming is novel because it uses an

  1. A SIMPLE METHOD TO CONTROL THE MOISTURE CONTENT OF THE FERMENTING MEDIUM DURING LABORATORY-SCALE SOLID-STATE FERMENTATION EXPERIMENTS

    Directory of Open Access Journals (Sweden)

    W. BORZANI

    1999-03-01

    Full Text Available When the moisture content of the fermenting medium significantly decreases during laboratory-scale solid-state fermentation tests, the quantity of water to be periodically added to the medium in order to control its moisture content may be evaluated from the water evaporation rate of the non-inoculated medium.

  2. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  3. Biochemical constitution of extracellular medium is critical for control of human breast cancer MDA-MB-231 cell motility.

    Science.gov (United States)

    Pan, Huiyan; Djamgoz, Mustafa B A

    2008-05-01

    Although voltage-gated sodium channel (VGSC) activity, upregulated significantly in strongly metastatic human breast cancer cells, has been found to potentiate a variety of in vitro metastatic cell behaviors, the mechanism(s) regulating channel expression/activity is not clear. As a step toward identifying possible serum factors that might be responsible for this, we tested whether medium in which fetal bovine serum (FBS) was substituted with a commercial serum replacement agent (SR-2), comprising insulin and bovine serum albumin, would influence the VGSC-dependent in vitro metastatic cell behaviors. Human breast cancer MDA-MB-231 cells were used as a model. Measurements of lateral motility, transverse migration and adhesion showed consistently that the channel's involvement in metastatic cell behaviors depended on the extracellular biochemical conditions. In normal medium (5% FBS), tetrodotoxin (TTX), a highly specific blocker of VGSCs, suppressed these cellular behaviors, as reported before. In contrast, in SR-2 medium, TTX had opposite effects. However, blocking endogenous insulin/insulin-like growth factor receptor signaling with AG1024 eliminated or reversed the anomalous effects of TTX. Insulin added to serum-free medium increased migration, and TTX increased it further. In conclusion, (1) the biochemical constitution of the extracellular medium had a significant impact upon breast cancer cells' in vitro metastatic behaviors and (2) insulin, in particular, controlled the mode of the functional association between cells' VGSC activity and metastatic machinery.

  4. Control and Testing of a Dynamic Voltage Restorer (DVR) at Medium Voltage Level

    DEFF Research Database (Denmark)

    Nielsen, John Godsk; Newman, Michael; Nielsen, Hans Ove

    2004-01-01

    power sensitive loads from voltage sags. This paper reports practical test results obtained on a medium voltage (10 kV) level using a DVR at a Distribution test facility in Kyndby, Denmark. The DVR was designed to protect a 400-kVA load from a 0.5-p.u. maximum voltage sag. The reported DVR verifies......The dynamic voltage restorer (DVR) has become popular as a cost effective solution for the protection of sensitive loads from voltage sags. Implementations of the DVR have been proposed at both a low voltage (LV) level, as well as a medium voltage (MV) level; and give an opportunity to protect high...

  5. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  6. Proximity-based access control for context-sensitive information provision in SOA-based systems

    Science.gov (United States)

    Rajappan, Gowri; Wang, Xiaofei; Grant, Robert; Paulini, Matthew

    2014-06-01

    Service Oriented Architecture (SOA) has enabled open-architecture integration of applications within an enterprise. For net-centric Command and Control (C2), this elucidates information sharing between applications and users, a critical requirement for mission success. The Information Technology (IT) access control schemes, which arbitrate who gets access to what information, do not yet have the contextual knowledge to dynamically allow this information sharing to happen dynamically. The access control might prevent legitimate users from accessing information relevant to the current mission context, since this context may be very different from the context for which the access privileges were configured. We evaluate a pair of data relevance measures - proximity and risk - and use these as the basis of dynamic access control. Proximity is a measure of the strength of connection between the user and the resource. However, proximity is not sufficient, since some data might have a negative impact, if leaked, which far outweighs importance to the subject's mission. For this, we use a risk measure to quantify the downside of data compromise. Given these contextual measures of proximity and risk, we investigate extending Attribute-Based Access Control (ABAC), which is used by the Department of Defense, and Role-Based Access Control (RBAC), which is widely used in the civilian market, so that these standards-based access control models are given contextual knowledge to enable dynamic information sharing. Furthermore, we consider the use of such a contextual access control scheme in a SOA-based environment, in particular for net-centric C2.

  7. Information access for event-driven smart grid controllers

    DEFF Research Database (Denmark)

    Kristensen, Thomas Le Fevre; Olsen, Rasmus Løvenstein; Rasmussen, Jakob Gulddahl

    2018-01-01

    Control of assets in electricity distribution grids is becoming an increasingly interesting solution to address challenges arising in the grid with an increasing penetration of distributed renewable energy generation. This paper looks at a voltage control scenario in low voltage (LV) distribution...

  8. Development of an access control system for the LHD experimental hall

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Uda, T.; Yamanishi, H.; Miyake, H.; Tanahashi, S.; Motozima, O.

    2000-01-01

    An access control system for the LHD (Large Helical Device) experimental hall had been constructed and its practical operation started in March 1998. Continuously, the system has been improved. The present system keeps watch on involved entrance and exit for the use of persons at four entrances by using five turnstile gates while watching on eight shielding doors at eight positions (four entrances, three carriage entrances and a hall overview) and a stairway connecting the LHD main hall with the LHD basement. Besides, for the security of safety operation of the LHD, fifteen kinds of interlock signals are exchanged between the access control system and the LHD control system. Seven of the interlock signals are properly sent as the occasional demands from the access control system to the LHD control system, in which three staple signals are B Personnel Access to Controlled Area, D Shielding Door Closed, and E No Entrance. It is important that any plasma experiments of the LHD are not permitted while the signal B being sent or D being not sent. The signal E is sent to inform the LHD control system that the turnstile gates are locked. All the plasma experiments should not be done unless the lock procedure of the turnstile is confirmed. When the turnstile gates are locked, any persons cannot enter into the LHD controlled area, but are permissible to exit only. Six of the interlock signals are used to send the information of the working at that time in the LHD controlled area to the access control system. When one signal of the operation mode is sent to the access control system from the LHD, the access control system sets the turnstile gate in situation corresponding to the operation mode, A Equipment Operation, B Vacuum Pumping, C Coil Cooling, D Coil Excitation, and E Plasma Experiment. If the access control system receives, for example, the signal B, this system sets the turnstile gate in the condition of control such that only persons assigned to the work of vacuum

  9. The Smart Card concept applied to access control

    International Nuclear Information System (INIS)

    Seidman, S.

    1986-01-01

    Passwords tend to be handled carelessly, and so are easily lost or stolen. Because they are intangible, their loss or theft generally goes unnoticed. Because they are constant, they may be used by anyone for as long as they remain in active use by a legitimate user. A step up in password security is offered by a new range of products which generate a new code each time the device is used. Devices are being produced in packages as small as a standard plastic credit card, including internal battery power, integral keyboard and LCD display. Security features of the Smart Card are reviewed, and several random access code generators currently available in the commercial marketplace are described

  10. Assessment of current practices in creating and using passwords as a control mechanism for information access

    Directory of Open Access Journals (Sweden)

    P. L. Wessels

    2007-11-01

    Full Text Available One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information.

  11. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  12. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Gonzalez, Javier; Granados, Joel Andres

    2014-01-01

    new insights, there are signicant barriers to the realization of this vision. One of the key challenge is to allow scientists to share their data widely while retaining some form of control over who accesses this data (access control) and more importantly how it is used (usage control). Access...... and usage control is necessary to enforce existing open data policies. We have proposed the vision of trusted cells: A decentralized infrastructure, based on secure hardware running on devices equipped with trusted execution environments at the edges of the Internet. We originally described the utilization...... data sets with access and usage control guarantees. We rely on examples from terrestrial research and monitoring in the arctic in the context of the INTERACT project....

  13. Formalization of the Access Control on ARM-Android Platform with the B Method

    Science.gov (United States)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  14. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Directory of Open Access Journals (Sweden)

    Luis Cruz-Piris

    2018-03-01

    Full Text Available Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT. One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.. To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT. As an access control scheme, we have selected User-Managed Access (UMA, an existing Open Authorization (OAuth 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  15. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    Science.gov (United States)

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  16. Increasing software testability with standard access and control interfaces

    Science.gov (United States)

    Nikora, Allen P; Some, Raphael R.; Tamir, Yuval

    2003-01-01

    We describe an approach to improving the testability of complex software systems with software constructs modeled after the hardware JTAG bus, used to provide visibility and controlability in testing digital circuits.

  17. 75 FR 43825 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-07-27

    ... types of access controls applied to video games: Macrovision's SafeDisc software and Sony's SecuRom... works such as video games and slide presentations). B. Computer programs that enable wireless telephone... claim of breach of contract, and not a claim under Section 1201(a)(1). D. Video games accessible on...

  18. WWW--Wealth, Weariness or Waste. Controlled Vocabulary and Thesauri in Support of Online Information Access.

    Science.gov (United States)

    Batty, David

    1998-01-01

    Discusses the problems of access to information in a machine-sensible environment, and the potential of modern library techniques to help in solving them. Explains how authors and publishers can make information more accessible by providing indexing information that uses controlled vocabulary, terms from a thesaurus, or other linguistic assistance…

  19. The empirical relationship between the managerial conduct and internal control activities in South African small, medium and micro enterprises

    OpenAIRE

    Juan-Pierre Bruwer; Philna Coetzee; Jacolize Meiring

    2017-01-01

    Background: Although South African small, medium and micro enterprises (SMMEs) play an imperative role in the stimulation of the national economy, previous research studies show that these business entities have severe sustainability problems as approximately 75% of them fail after being in operation for only 3 years. The latter dispensation is pinned on the belief that South African SMMEs make use of inadequate and ineffective internal control systems. Aim: Since a system of internal cont...

  20. Access Control in the ATLAS TDAQ Online Cluster

    CERN Document Server

    Leahu, Marius Constantin; Stoichescu, D A; Lehmann Miotto, G

    ATLAS (A Toroidal LHC Apparatus) is a general-purpose detector for studying high-energy particle interactions: it is the largest particle detector experiment at CERN and it is built around one of the interaction points of the proton beams accelerated by the Large Hadron Collider (LHC). The detector generates an impressive amount of raw data: 64 TB per second as a result of 40 MHz proton-proton collision rate with 1.6 MB data for each such event. The handling of such data rate is managed by a three levels Trigger and Data Acquisition (TDAQ) system, which filters out the events not relevant from physics research point of view and selects in the end in the order of 1000 events per second to be stored for offline analyses. This system comprises a significant number of hardware devices, software applications and human personnel to supervise the experiment operation. Their protection against damages as a result of misuse and their optimized exploitation by avoiding the conflicting accesses to resources are key requ...

  1. 77 FR 26789 - Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and...

    Science.gov (United States)

    2012-05-07

    ... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-661] Certain Semiconductor Chips Having Synchronous Dynamic Random Access Memory Controllers and Products Containing Same; Determination Rescinding the Exclusion Order and Cease and Desist Orders AGENCY: U.S. International Trade Commission. ACTION...

  2. A Linux-Based Approach to Low-Cost Support of Access Control Policies

    National Research Council Canada - National Science Library

    Clark, Paul

    1999-01-01

    .... Systems that enforce Mandatory Access Control (MAC) policies are known to reduce some known security weaknesses, but such systems have seen limited use within the United States Government, and they are rarely applied in the private sector...

  3. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-08-06

    ... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright... nonsubstantial correction to its regulation announcing the prohibition against circumvention of technological... the final rule governing exemption to prohibition on circumvention of copyright protection systems for...

  4. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  5. Role-Based Access Control for Coalition Partners in Maritime Domain Awareness

    National Research Council Canada - National Science Library

    McDaniel, Christopher R; Tardy, Matthew L

    2005-01-01

    The need for Shared Situational Awareness (SSA) in accomplishing joint missions by coalition militaries, law enforcement, the intelligence community, and the private sector creates a unique challenge to providing access control...

  6. 76 FR 38293 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2011-06-30

    ... 3235-AK53 Risk Management Controls for Brokers or Dealers With Market Access AGENCY: Securities and... of risk management controls and supervisory procedures that, among other things, is reasonably... relevant risk management controls and supervisory procedures required under the Rule. DATES: The effective...

  7. A scaleable integrated sensing and control system for NDE, monitoring, and control of medium to very large composite smart structures

    Science.gov (United States)

    Jones, Jerry; Rhoades, Valerie; Arner, Radford; Clem, Timothy; Cuneo, Adam

    2007-04-01

    NDE measurements, monitoring, and control of smart and adaptive composite structures requires that the central knowledge system have an awareness of the entire structure. Achieving this goal necessitates the implementation of an integrated network of significant numbers of sensors. Additionally, in order to temporally coordinate the data from specially distributed sensors, the data must be time relevant. Early adoption precludes development of sensor technology specifically for this application, instead it will depend on the ability to utilize legacy systems. Partially supported by the U.S. Department of Commerce, National Institute of Standards and Technology, Advanced Technology Development Program (NIST-ATP), a scalable integrated system has been developed to implement monitoring of structural integrity and the control of adaptive/intelligent structures. The project, called SHIELD (Structural Health Identification and Electronic Life Determination), was jointly undertaken by: Caterpillar, N.A. Tech., Motorola, and Microstrain. SHIELD is capable of operation with composite structures, metallic structures, or hybrid structures. SHIELD consists of a real-time processing core on a Motorola MPC5200 using a C language based real-time operating system (RTOS). The RTOS kernel was customized to include a virtual backplane which makes the system completely scalable. This architecture provides for multiple processes to be operating simultaneously. They may be embedded as multiple threads on the core hardware or as separate independent processors connected to the core using a software driver called a NAT-Network Integrator (NATNI). NATNI's can be created for any communications application. In it's current embodiment, NATNI's have been created for CAN bus, TCP/IP (Ethernet) - both wired and 802.11 b and g, and serial communications using RS485 and RS232. Since SHIELD uses standard C language, it is easy to port any monitoring or control algorithm, thus providing for legacy

  8. Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC......), are not sufficient to address the new challenges introduced by these location-based applications. Several recent research efforts have enhanced RBAC with spatio-temporal features. Nevertheless, the state-of-the-art does not deal with mobility of both subjects and objects and does not support the utilization...

  9. Database application research in real-time data access of accelerator control system

    International Nuclear Information System (INIS)

    Chen Guanghua; Chen Jianfeng; Wan Tianmin

    2012-01-01

    The control system of Shanghai Synchrotron Radiation Facility (SSRF) is a large-scale distributed real-time control system, It involves many types and large amounts of real-time data access during the operating. Database system has wide application prospects in the large-scale accelerator control system. It is the future development direction of the accelerator control system, to replace the differently dedicated data structures with the mature standardized database system. This article discusses the application feasibility of database system in accelerators based on the database interface technology, real-time data access testing, and system optimization research and to establish the foundation of the wide scale application of database system in the SSRF accelerator control system. Based on the database interface technology, real-time data access testing and system optimization research, this article will introduce the application feasibility of database system in accelerators, and lay the foundation of database system application in the SSRF accelerator control system. (authors)

  10. Crash problem definition and safety benefits methodology for stability control for single-unit medium and heavy trucks and large-platform buses

    Science.gov (United States)

    2009-10-01

    This report presents the findings of a comprehensive engineering analysis of electronic stability control (ESC) and roll stability control (RSC) systems for single-unit medium and heavy trucks and large-platform buses. This report details the applica...

  11. Effects of the pH/pCO2 control method in the growth medium of phytoplankton

    Science.gov (United States)

    Shi, D.; Xu, Y.; Morel, F. M. M.

    2009-02-01

    To study the effects of ocean acidification on the physiology of phytoplankton requires that the key chemical parameters of the growth medium, pCO2, pH and Ω (the saturation state of calcium carbonate) be carefully controlled. This is made difficult by the interdependence of these parameters. Moreover, in growing batch cultures of phytoplankton, the fixation of CO2, the uptake of nutrients and, for coccolithophores, the precipitation of calcite all change the inorganic carbon and acid-base chemistry of the medium. For example, absent pH-buffering or CO2 bubbling, a sizeable decrease in pCO2 occurs at a biomass concentration as low as 50 μM C in non-calcifying cultures. Even in cultures where pCO2 or pH is maintained constant, other chemical parameters change substantially at high cell densities. The quantification of these changes is facilitated by the use of buffer capacities. Experimentally we observe that all methods of adjustment of pCO2/pH can be used, the choice of one or the other depending on the specifics of the experiments. The mechanical effect of bubbling of cultures seems to induce more variable results than other methods of pCO2/pH control. While highly convenient, the addition of pH buffers to the medium induces changes in trace metal availability and cannot be used under trace metal-limiting conditions.

  12. Decentralized energy management strategy based on predictive controllers for a medium voltage direct current photovoltaic electric vehicle charging station

    International Nuclear Information System (INIS)

    Torreglosa, Juan P.; García-Triviño, Pablo; Fernández-Ramirez, Luis M.; Jurado, Francisco

    2016-01-01

    Highlights: • Electric vehicle charging station supplied by photovoltaic, batteries and grid connection is analyzed. • The bus voltage is the key parameter for controlling the system by decentralized approach. • Decentralized control approach facilities the enlargement of the system. • Photovoltaic and battery systems are controlled by model predictive controllers. • Response by model predictive controllers improves that by PI controllers. - Abstract: The use of distributed charging stations based on renewable energy sources for electric vehicles has increased in recent years. Combining photovoltaic solar energy and batteries as energy storage system, directly tied into a medium voltage direct current bus, and with the grid support, results to be an interesting option for improving the operation and efficiency of electric vehicle charging stations. In this paper, an electric vehicle charging station supplied by photovoltaic solar panels, batteries and with grid connection is analysed and evaluated. A decentralized energy management system is developed for regulating the energy flow among the photovoltaic system, the battery and the grid in order to achieve the efficient charging of electric vehicles. The medium voltage direct current bus voltage is the key parameter for controlling the system. The battery is controlled by a model predictive controller in order to keep the bus voltage at its reference value. Depending on the state-of-charge of the battery and the bus voltage, the photovoltaic system can work at maximum power point tracking mode or at bus voltage sustaining mode, or even the grid support can be needed. The results demonstrate the proper operation and energy management of the electric vehicle charging station under study.

  13. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  14. Social Contradictions and the Internal Control of Angolan Micro, Small and Medium Enterprises

    Directory of Open Access Journals (Sweden)

    Mendes Pedro-Ludi

    2017-06-01

    Full Text Available Traditionally, micro, small and medium-sized enterprises (MPYMEs have been the main means of sustaining modern economies, not only by their participation in reducing unemployment, but also by adjusting to the needs of the communities and contributing significantly to the decline of The informality of the economy and poverty. The Angolan government has implemented this instrument for the creation of business promotion programs and credit concessions essentially subsidized in the MSMEs, however in many cases unfortunately they have only been unsuccessful attempts. According to the above, the objective of this article is to analyze the contradictions between the government's policy of financing the MSMEs for the diversification of the national economy, reduction of unemployment, cultural development of the people and the fight against poverty, for which the methods of analysis_ synthesis, historical _logic and induction_ deduction were used.

  15. [Public control and equity of access to hospitals under non-State public administration].

    Science.gov (United States)

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  16. Steganography-based access control to medical data hidden in electrocardiogram.

    Science.gov (United States)

    Mai, Vu; Khalil, Ibrahim; Ibaida, Ayman

    2013-01-01

    Steganographic techniques allow secret data to be embedded inside another host data such as an image or a text file without significant changes to the quality of the host data. In this research, we demonstrate how steganography can be used as the main mechanism to build an access control model that gives data owners complete control to their sensitive cardiac health information hidden in their own Electrocardiograms. Our access control model is able to protect the privacy of users, the confidentiality of medical data, reduce storage space and make it more efficient to upload and download large amount of data.

  17. Access to the Birth Control Pill and the Career Plans of Young Men and Women

    DEFF Research Database (Denmark)

    Steingrimsdottir, Herdis

    The paper explores the effect of unrestricted access to the birth control pill on young people’s career plans, using annual surveys of college freshmen from 1968 to 1980. In particular it addresses the question of who was affected by the introduction of the birth control pill by looking at career...... access to the pill is found to be on non-white students, both among men and women. The paper uses Census Data to compare the changes in career plans to actual changes in labor market outcomes. When looking at the actual career outcomes, early access to the pill affects both men and women - shifting...... their careers towards traditionally male dominated occupations associated with higher wages. Early access to the pill is also associated with significantly higher actual income for men....

  18. Access to the Birth Control Pill and the Career Plans of Young Men and Women

    DEFF Research Database (Denmark)

    Steingrimsdottir, Herdis

    plans of both men and women, and by separating the effect by level of academic ability, race and family income. The results show that unrestricted access to the pill caused high ability women to move towards occupations with higher wages, higher occupational prestige scores and higher male ratios......The paper explores the effect of unrestricted access to the birth control pill on young people’s career plans, using annual surveys of college freshmen from 1968 to 1980. In particular it addresses the question of who was affected by the introduction of the birth control pill by looking at career...... access to the pill is found to be on non-white students, both among men and women. The paper uses Census Data to compare the changes in career plans to actual changes in labor market outcomes. When looking at the actual career outcomes, early access to the pill affects both men and women - shifting...

  19. Optimizing data access for wind farm control over hierarchical communication networks

    DEFF Research Database (Denmark)

    Madsen, Jacob Theilgaard; Findrik, Mislav; Madsen, Tatiana Kozlova

    2016-01-01

    In this paper we investigate a centralized wind farm controller which runs periodically. The controller attempts to reduce the damage a wind turbine sustains during operation by estimating fatigue based on the wind turbine state. The investigation focuses on the impact of information access...

  20. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  1. 3D controlled-source electromagnetic modeling in anisotropic medium using edge-based finite element method

    DEFF Research Database (Denmark)

    Cai, Hongzhu; Xiong, Bin; Han, Muran

    2014-01-01

    This paper presents a linear edge-based finite element method for numerical modeling of 3D controlled-source electromagnetic data in an anisotropic conductive medium. We use a nonuniform rectangular mesh in order to capture the rapid change of diffusive electromagnetic field within the regions...... of anomalous conductivity and close to the location of the source. In order to avoid the source singularity, we solve Maxwell's equation with respect to anomalous electric field. The nonuniform rectangular mesh can be transformed to hexahedral mesh in order to simulate the bathymetry effect. The sparse system...

  2. A Novel Approach for Controlling the Band Formation in Medium Mn Steels

    Science.gov (United States)

    Farahani, H.; Xu, W.; van der Zwaag, S.

    2018-03-01

    Formation of the microstructural ferrite/pearlite bands in medium Mn steels is an undesirable phenomenon commonly addressed through fast cooling treatments. In this study, a novel approach using the cyclic partial phase transformation concept is applied successfully to prevent microstructural band formation in a micro-chemically banded Fe-C-Mn-Si steel. The effectiveness of the new approach is assessed using the ASTM E1268-01 standard. The cyclic intercritical treatments lead to formation of isotropic microstructures even for cooling rates far below the critical one determined in conventional continuous cooling. In contrast, isothermal intercritical experiments have no effect on the critical cooling rate to suppress microstructural band formation. The origin of the suppression of band formation either by means of fast cooling or a cyclic partial phase transformation is investigated in detail. Theoretical modeling and microstructural observations confirm that band formation is suppressed only if the intercritical annealing treatment leads to partial reversion of the austenite-ferrite interfaces. The resulting interfacial Mn enrichment is responsible for suppression of the band formation upon final cooling at low cooling rates.

  3. A novel technique to extract events from access control system and locate persons

    International Nuclear Information System (INIS)

    Vincent, M.; Vaidyanathan, Mythili; Patidar, Suresh Chandra; Prabhakara Rao, G.

    2011-01-01

    Indira Gandhi Centre for Atomic Research houses many laboratories which handle radioactive materials and classified materials. Protection and accounting of men and material and critical facilities are important aspect of nuclear security. Access Control System (ACS) is used to enhance the protective measures against elevated threat environment. Access control system hardware consists of hand geometry readers, RFID readers, Controllers, Electromagnetic door locks, Turnstiles, fiber cable laying and termination etc. Access Control System controls and monitors the people accessing the secured facilities. Access Control System generates events on: 1. Showing of RFID card, 2. Rotation of turnstile, 3. Download of valid card numbers, 4. Generation of alarms etc. Access control system turnstiles are located in main entrance of a facility, entrance of inside laboratory and door locks are fixed on secured facilities. Events are stored in SQL server database. From the events stored in database a novel technique is developed to extract events and list the persons in a particular facility, list all entry/exit events on one day, list the first in and last out entries. This paper discusses the complex multi level group by queries and software developed to extract events from database, locate persons and generate reports. Software is developed as a web application in ASP.Net and query is written in SQL. User can select the doors, type of events and generate reports. Reports are generated using the master data stored about employees RFID cards and events data stored in tables. Four types of reports are generated 1. Plant Emergency Report, 2. Locate User Report, 3. Entry - Exit Report, 4. First in Last out Report. To generate plant emergency report for whole plant only events generated in outer gates have to be considered. To generate plant emergency report for inside laboratory, events generated in entrance gates have to be ignored. (author)

  4. Access control system for two person rule at Rokkasho Reprocessing Plant

    International Nuclear Information System (INIS)

    Yanagisawa, Sawako; Ino, Munekazu; Yamada, Noriyuki; Oota, Hiroto; Iwasaki, Mitsuaki; Kodani, Yoshiki; Iwamoto, Tomonori

    2014-01-01

    Following the amendment and enforcement of Regulation of Reprocessing Activity on March 29th 2012, two person rule has become compulsory for the specific rooms to counter and prevent the sabotage or theft of nuclear materials by the insiders at reprocessing plant in Japan. The rooms will include those which contains cooling systems for decay heat removal from spent fuels and so on, scavenging systems to prevent the hydrogen accumulation, and those which contains nuclear material. To ensure the two person rule at Rokkasho Reprocessing Plant, JNFL has recently, after comprehensive study, introduced efficient and effective access control system for the rooms mentioned above. The system is composed of bio-attestation devices, surveillance cameras and electronic locks to establish access control system. This report outlines the access control system for two person rule and introduces the operation. (author)

  5. A Generic Role Based Access Control Model for Wind Power Systems

    DEFF Research Database (Denmark)

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    The electrical power infrastructure is facing a transition from a largely centralised distribution infrastructure with a few large power plants to an increasingly distributed infrastructure that must incorporate privately owned and operated power generation units based on fuel cells or sustainable...... infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...... power systems, which is based on the widely used role-based access control model. The proposed model is tested using a prototype designed in conformance with the standards that are in use in modern wind power infrastructure and the results are presented to determine the overhead in communication caused...

  6. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

    Directory of Open Access Journals (Sweden)

    Mikel Uriarte Itzazelaia

    2018-02-01

    Full Text Available Upcoming smart scenarios enabled by the Internet of Things (IoT envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  7. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  8. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors.

    Science.gov (United States)

    Uriarte Itzazelaia, Mikel; Astorga, Jasone; Jacob, Eduardo; Huarte, Maider; Romaña, Pedro

    2018-02-13

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.

  9. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  10. JSON Schema for Attribute-based Access Control for Network Resource Security

    CSIR Research Space (South Africa)

    Linklater, G

    2017-09-01

    Full Text Available the features provided to XACML by XML Schema. Index Terms—JSON Schema; Access Control; Authorization; Security; Attribute-based Access Control; ABAC; Internet of Things; IoT; Server-to-Server; Machine-to-Machine; S2S; M2M; Network Security I. INTRODUCTION... with the requirements of ABAC. • Section V discusses the viability of JSON Schema as a replacement for XML Schema in the creation of a new JSON-based ABAC standard. This section also discusses possible future work that arose out of the conclusions drawn in this document...

  11. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    OpenAIRE

    Luis Cruz-Piris; Diego Rivera; Ivan Marsa-Maestre; Enrique de la Hoz; Juan R. Velasco

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to o...

  12. Control of a three-stage medium voltage solid-state transformer

    Directory of Open Access Journals (Sweden)

    Claudio Busada

    2017-12-01

    Full Text Available This paper proposes the modeling and control of a Solid-State Transformer using a three-stage conversion topology. First, a rectification stage is used, where a three-phase high-voltage AC signal is converted to a DC level; this stage is then followed by a DC-DC converter, and finally an inverter is used to convert the DC into a three-phase low-voltage AC signal. The adopted topology is modeled using a simplified model for each stage, useful to design their controllers. Based on these models, the controllers are tuned to obtain a good performance to sudden load changes. This performance is tested through simulations.

  13. Automated biometric access control system for two-man-rule enforcement

    International Nuclear Information System (INIS)

    Holmes, J.P.; Maxwell, R.L.; Henderson, R.W.

    1991-01-01

    This paper describes a limited access control system for nuclear facilities which makes use of the eye retinal identity verifier to control the passage of personnel into and out of one or a group of security controlled working areas. This access control system requires no keys, cards or credentials. The user simply enters his Personal Identification Number (PIN) and takes an eye reading to request passage. The PIN does not have to be kept secret. The system then relies on biometric identity verification of the user, along with other system information, to make the decision of whether or not to unlock the door. It also enforces multiple zones control with personnel tracking and the two-man-rule

  14. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    Science.gov (United States)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  15. A test bed for the future access control system the AD Project

    CERN Document Server

    Scibile, L

    1999-01-01

    This paper describes the design, management and development of the new access control system for the Antiproton Deceleration experimental area, called the AD Project. As this project includes all the elements for the industrial evolution of the present access control system it is an ideal test bed for future access systems. The adoption of new technologies and techniques are described, and the benefits and the shortfalls are highlighted. The open redundant architecture solution, based on a PROFIBUS network and standard industrial components (HP-UNIX, Siemens S7 PLC, Siemens Industrial PC, door locks), guarantees reliability, safety and optimal integration. The project team took advantage of the Goal Directed Project Management technique and managed to define a clear and effective strategy.

  16. An Influence of Strategic Awareness on Management Control: Evidence from Polish Micro, Small and Medium-sized Enterprises

    Directory of Open Access Journals (Sweden)

    Joanna Dyczkowska

    2015-03-01

    Full Text Available Purpose: The paper investigates whether employees’ strategic awareness influences the shape of management control systems (MCSs in Polish micro, small and medium-sized enterprises (mSMEs. Methodology: The study is based on data obtained from 223 companies between November 2010 and January 2012. The quantitative analysis used a set of variables which depicted MCSs: ‘goalsetting process’, ‘control framework’ and ‘organisation of control’. Strategic awareness was considered an independent variable. Findings: The results showed positive correlations between strategic awareness and considered variables. Regression models developed by the authors proved statistically valid. The study evidences, that increasing employees’ strategic awareness stimulates their participation in goal-setting, contributes to the development of more comprehensive MCSs, or may even imply formalisation of management control. Research limitations: The study does not include an analysis of the extent to which employees find MCSs useful in their work. This will be considered in future research. Another possible extension of the project is to identify factors which enable the capturing of the dynamic character of MCSs and their changes over time. Practical implications: The knowledge of MCSs does not explain whether or not the strategic orientation of a company stimulates a need for MCS. Such knowledge may be important to managers who have to face Polish employees’ general aversion to control. Originality: The study contributes to the limited body of knowledge in a scope of relations between employees’ strategic awareness and control mechanisms in Polish mSMEs.

  17. Enhancement of Bacillus subtilis Lipopeptide Biosurfactants Production through Optimization of Medium Composition and Adequate Control of Aeration.

    Science.gov (United States)

    Ghribi, Dhouha; Ellouze-Chaabouni, Semia

    2011-01-01

    Interest in biosurfactants has increased considerably in recent years, as they are potentially used in many commercial applications in petroleum, pharmaceuticals, biomedical, and food processing industries. Since improvement of their production was of great importance to reduce the final coast, cultural conditions were analyzed to optimize biosurfactants production from Bacillus subtilis SPB1 strain. A high yield of biosurfactants was obtained from a culture of B. subtilis using carbohydrate substrate as a carbon source; among carbohydrates, glucose enhanced the best surfactin production. The optimum glucose concentration was 40 g/L. Higher amount of biosurfactants was obtained using 5 g/L of urea as organic nitrogen source and applying C/N ratio of 7 with ammonium chloride as inorganic nitrogen source. The highest amount of biosurfactants was recorded with the addition of 2% kerosene. Moreover, it was shown, using an automated full-controlled 2.6 L fermenter, that aeration of the medium, which affected strongly the growth regulated biosurfactants synthesis by the producing cell. So that, low or high aerations lead to a decrease of biosurfactants synthesis yields. It was found that when using dissolved oxygen saturation of the medium at 30%, biosurfactants production reached 4.92 g/L.

  18. Enhancement of Bacillus subtilis Lipopeptide Biosurfactants Production through Optimization of Medium Composition and Adequate Control of Aeration

    Directory of Open Access Journals (Sweden)

    Dhouha Ghribi

    2011-01-01

    Full Text Available Interest in biosurfactants has increased considerably in recent years, as they are potentially used in many commercial applications in petroleum, pharmaceuticals, biomedical, and food processing industries. Since improvement of their production was of great importance to reduce the final coast, cultural conditions were analyzed to optimize biosurfactants production from Bacillus subtilis SPB1 strain. A high yield of biosurfactants was obtained from a culture of B. subtilis using carbohydrate substrate as a carbon source; among carbohydrates, glucose enhanced the best surfactin production. The optimum glucose concentration was 40 g/L. Higher amount of biosurfactants was obtained using 5 g/L of urea as organic nitrogen source and applying C/N ratio of 7 with ammonium chloride as inorganic nitrogen source. The highest amount of biosurfactants was recorded with the addition of 2% kerosene. Moreover, it was shown, using an automated full-controlled 2.6 L fermenter, that aeration of the medium, which affected strongly the growth regulated biosurfactants synthesis by the producing cell. So that, low or high aerations lead to a decrease of biosurfactants synthesis yields. It was found that when using dissolved oxygen saturation of the medium at 30%, biosurfactants production reached 4.92 g/L.

  19. Control of chemical chaos through medium viscosity in a batch ferroin-catalysed Belousov-Zhabotinsky reaction.

    Science.gov (United States)

    Budroni, Marcello A; Calabrese, Ilaria; Miele, Ylenia; Rustici, Mauro; Marchettini, Nadia; Rossi, Federico

    2017-12-13

    In this paper we show that the active interplay of nonlinear kinetics and transport phenomena in a chemical oscillator can be exploited to induce and control chaos. To this aim we use as a model system the ferroin-catalysed Belousov-Zhabotinsky (BZ) oscillating reaction, which is known to evolve to characteristic chaotic transient dynamics when carried out under batch and unstirred conditions. In particular, chemical chaos was found to appear and disappear by following a Ruelle-Takens-Newhouse (RTN) scenario. Here we use medium viscosity as a bifurcation parameter to tune the reaction-diffusion-convection (RDC) interplay and force the reaction in a specific sequence of dynamical regimes: either (i) periodic → quasi-periodic → chaotic or (ii) periodic → quasi-periodic or (iii) only periodic. The medium viscosity can be set by adding different amounts of surfactant (sodium dodecyl sulphate), known to have a little impact on the reaction mechanism, above its critical micelle concentration. Experimental results are supported by means of numerical simulations of a RDC model, which combines self-sustained oscillations to the related chemically-induced buoyancy convection.

  20. A case-control study of medium-term exposure to ambient nitrogen dioxide pollution and hospitalization for stroke.

    Science.gov (United States)

    Johnson, Julie Y M; Rowe, Brian H; Allen, Ryan W; Peters, Paul A; Villeneuve, Paul J

    2013-04-19

    There are several plausible mechanisms whereby either short or long term exposure to pollution can increase the risk of stroke. Over the last decade, several studies have reported associations between short-term (day-to-day) increases in ambient air pollution and stroke. The findings from a smaller number of studies that have looked at long-term exposure to air pollution and stroke have been mixed. Most of these epidemiological studies have assigned exposure to air pollution based on place of residence, but these assignments are typically based on relatively coarse spatial resolutions. To date, few studies have evaluated medium-term exposures (i.e, exposures over the past season or year). To address this research gap, we evaluated associations between highly spatially resolved estimates of ambient nitrogen dioxide (NO2), a marker of traffic pollution, and emergency department visits for stroke in Edmonton, Canada. This was a case-control study with cases defined as those who presented to an Edmonton area hospital emergency department between 2007 and 2009 with an acute ischemic stroke, hemorrhagic stroke, or transient ischemic attack. Controls were patients who presented to the same emergency departments for lacerations, sprains, or strains. A land-use regression model provided estimates of NO2 that were assigned to the place of residence. Logistic regression methods were used to estimate odds ratios for stroke in relation to an increase in the interquartile range of NO2 (5 ppb), adjusted for age, sex, meteorological variables, and neighborhood effects. The study included 4,696 stroke (cases) and 37,723 injury patients (controls). For all strokes combined, there was no association with NO2. Namely, the odds ratio associated with an interquartile increase in NO2 was 1.01 (95% confidence interval {CI}: 0.94-1.08). No associations were evident for any of the stroke subtypes examined. When combined with our earlier work in Edmonton, our findings suggest that day

  1. Benefits of Location-Based Access Control:A Literature Study

    NARCIS (Netherlands)

    van Cleeff, A.; Pieters, Wolter; Wieringa, Roelf J.

    2010-01-01

    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been

  2. Predicting Health Care Utilization among Latinos: Health Locus of Control Beliefs or Access Factors?

    Science.gov (United States)

    De Jesus, Maria; Xiao, Chenyang

    2014-01-01

    There are two competing research explanations to account for Latinos' underutilization of health services relative to non-Latino Whites in the United States. One hypothesis examines the impact of health locus of control (HLOC) beliefs, while the other focuses on the role of access factors on health care use. To date, the relative strength of…

  3. Prevention and Control of Dental Disease through Improved Access to Comprehensive Care.

    Science.gov (United States)

    American Dental Association, Chicago, IL.

    Prevention of dental disease is the key to improving the nation's oral health. The American Dental Association (ADA) program of prevention and control of dental disease through improved access to comprehensive care concentrates on those who have special difficulties in receiving care: the poor, the elderly, the handicapped, the institutionalized…

  4. Health Information System Role-Based Access Control Current Security Trends and Challenges.

    Science.gov (United States)

    de Carvalho Junior, Marcelo Antonio; Bandiera-Paiva, Paulo

    2018-01-01

    This article objective is to highlight implementation characteristics, concerns, or limitations over role-based access control (RBAC) use on health information system (HIS) using industry-focused literature review of current publishing for that purpose. Based on the findings, assessment for indication of RBAC is obsolete considering HIS authorization control needs. We have selected articles related to our investigation theme "RBAC trends and limitations" in 4 different sources related to health informatics or to the engineering technical field. To do so, we have applied the following search query string: "Role-Based Access Control" OR "RBAC" AND "Health information System" OR "EHR" AND "Trends" OR "Challenges" OR "Security" OR "Authorization" OR "Attacks" OR "Permission Assignment" OR "Permission Relation" OR "Permission Mapping" OR "Constraint". We followed PRISMA applicable flow and general methodology used on software engineering for systematic review. 20 articles were selected after applying inclusion and exclusion criteria resulting contributions from 10 different countries. 17 articles advocate RBAC adaptations. The main security trends and limitations mapped were related to emergency access, grant delegation, and interdomain access control. Several publishing proposed RBAC adaptations and enhancements in order to cope current HIS use characteristics. Most of the existent RBAC studies are not related to health informatics industry though. There is no clear indication of RBAC obsolescence for HIS use.

  5. Functional requirements with survey results for integrated intrusion detection and access control annunciator systems

    Energy Technology Data Exchange (ETDEWEB)

    Arakaki, L.H.; Monaco, F.M.

    1995-09-01

    This report contains the guidance Functional Requirements for an Integrated Intrusion Detection and Access Control Annunciator System, and survey results of selected commercial systems. The survey questions were based upon the functional requirements; therefore, the results reflect which and sometimes how the guidance recommendations were met.

  6. Gender Relations in Access to and Control over Resources in Awra ...

    African Journals Online (AJOL)

    This paper explores gender relations in access to and control over resources in Awra Amba Community of Amhara Region, Ethiopia. The study employed primary and secondary data sources. The primary data were gathered through semistructured interviews with selected community members and key informants, focus ...

  7. Toward an open-access global database for mapping, control, and surveillance of neglected tropical diseases

    DEFF Research Database (Denmark)

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina

    2011-01-01

    for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken...

  8. Access To and Control of Resources Among The Maasai Women of ...

    African Journals Online (AJOL)

    The study to assess access to and control of resources among the Maasai women was conducted at Monduli and Makuyuni towns in Monduli District in Arusha Region. Data were collected from a sample of 75 respondents using questionnaire, in-depth interviews and focus group discussions. The majority of the ...

  9. Policy Based Access Control in Dynamic Grid-based Collaborative Environment

    NARCIS (Netherlands)

    Demchenko, Y.; Gommans, L.; Tokmakoff, A.; van Buuren, R.

    2006-01-01

    This paper describes the design and development of a flexible, customer-driven, security infrastructure for Gridbased Collaborative Environments. The paper proposes further development of the access control model built around a service or resource provisioning agreement (e.g., an experiment or

  10. Access and control of agro-biotechnology : Bt cotton, ecological change and risk in China

    NARCIS (Netherlands)

    Ho, Peter; Zhao, Jennifer H.; Xue, Dayuan

    2009-01-01

    This article argues that if the introduction of genetically modified crops (GM crops) in developing countries is to be successful, we can and should not evade questions of access and control of technology. It implies probing into the experiences, perceptions and understanding of GM crops by the

  11. Multi-level access control in the data pipeline of the international supply chain system

    NARCIS (Netherlands)

    Pruksasri, P.; Berg, J. van den; Hofman, W.; Daskapan, S.

    2013-01-01

    The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to

  12. Federated Access Control in Heterogeneous Intercloud Environment: Basic Models and Architecture Patterns

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Lee, C.

    2014-01-01

    This paper presents on-going research to define the basic models and architecture patterns for federated access control in heterogeneous (multi-provider) multi-cloud and inter-cloud environment. The proposed research contributes to the further definition of Intercloud Federation Framework (ICFF)

  13. An Annotated and Cross-Referenced Bibliography on Computer Security and Access Control in Computer Systems.

    Science.gov (United States)

    Bergart, Jeffrey G.; And Others

    This paper represents a careful study of published works on computer security and access control in computer systems. The study includes a selective annotated bibliography of some eighty-five important published results in the field and, based on these papers, analyzes the state of the art. In annotating these works, the authors try to be…

  14. Using Face Recognition in the Automatic Door Access Control in a Secured Room

    Directory of Open Access Journals (Sweden)

    Gheorghe Gilca

    2017-06-01

    Full Text Available The aim of this paper is to help users improve the door security of sensitive locations by using face detection and recognition. This paper is comprised mainly of three subsystems: face detection, face recognition and automatic door access control. The door will open automatically for the known person due to the command of the microcontroller.

  15. Advanced Instrumentation and Control Methods for Small and Medium Reactors with IRIS Demonstration

    Energy Technology Data Exchange (ETDEWEB)

    J. Wesley Hines; Belle R. Upadhyaya; J. Michael Doster; Robert M. Edwards; Kenneth D. Lewis; Paul Turinsky; Jamie Coble

    2011-05-31

    Development and deployment of small-scale nuclear power reactors and their maintenance, monitoring, and control are part of the mission under the Small Modular Reactor (SMR) program. The objectives of this NERI-consortium research project are to investigate, develop, and validate advanced methods for sensing, controlling, monitoring, diagnosis, and prognosis of these reactors, and to demonstrate the methods with application to one of the proposed integral pressurized water reactors (IPWR). For this project, the IPWR design by Westinghouse, the International Reactor Secure and Innovative (IRIS), has been used to demonstrate the techniques developed under this project. The research focuses on three topical areas with the following objectives. Objective 1 - Develop and apply simulation capabilities and sensitivity/uncertainty analysis methods to address sensor deployment analysis and small grid stability issues. Objective 2 - Develop and test an autonomous and fault-tolerant control architecture and apply to the IRIS system and an experimental flow control loop, with extensions to multiple reactor modules, nuclear desalination, and optimal sensor placement strategy. Objective 3 - Develop and test an integrated monitoring, diagnosis, and prognosis system for SMRs using the IRIS as a test platform, and integrate process and equipment monitoring (PEM) and process and equipment prognostics (PEP) toolboxes. The research tasks are focused on meeting the unique needs of reactors that may be deployed to remote locations or to developing countries with limited support infrastructure. These applications will require smaller, robust reactor designs with advanced technologies for sensors, instrumentation, and control. An excellent overview of SMRs is described in an article by Ingersoll (2009). The article refers to these as deliberately small reactors. Most of these have modular characteristics, with multiple units deployed at the same plant site. Additionally, the topics focus

  16. RCT: Module 2.10, Access Control and Work Area Setup, Course 8776

    Energy Technology Data Exchange (ETDEWEB)

    Hillmer, Kurt T. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-08-11

    This course presents information on radiological work permits (RWPs), various types of postings used in radiological areas, radiological area setups, access controls, and releases of material from radiological areas. All of these are fundamental duties of RCTs. This course will prepare the student with the skills necessary for radiological control technician (RCT) qualification by passing quizzes, tests, and the RCT Comprehensive Phase 1, Unit 2 Examination (TEST 27566) and providing in-thefield skills.

  17. Towards a Uniform Framework for Dynamic Analysis of Access Control Models

    OpenAIRE

    Amthor, Peter

    2017-01-01

    Security-critical system requirements are increasingly enforced through mandatory access control systems. These systems are controlled by security policies, highly sensitive system components, which emphasizes the paramount importance of formally verified security properties regarding policy correctness. For the class of safety-properties, addressing potential dynamic right proliferation, a number of known and tested formal analysis methods and tools already exist. Unfortunately, these method...

  18. Is the Control Environment a Basis for Customised Risk Management Initiatives in South African Small, Medium and Micro Enterprises?

    Directory of Open Access Journals (Sweden)

    Juan-Pierré BRUWER

    2016-11-01

    Full Text Available Before the official recognition of Small, Medium and Micro Enterprises (SMMEs in South Africa during the mid-1990s, these business entities have been key players in the stimulation of the national economy. Albeit their socio-economic value added, prior research shows that the sustainability of these business are among the worst in the world, since approximately 70% of South African SMMEs fail within their first three years of existence. This dispensation is often blamed on inter alia, their inadequate management of economic factors which, in turn, cultivates risks. Notwithstanding the fact that most South African SMMEs make use of customised risk management initiatives, previous research shows that these initiatives are not deemed as adequate and/or effective to mitigate risks. Since the manner in which risks are managed are strongly dependent on the attitude and awareness of its management surrounding internal control (control environment, this study focused on investigating whether the control environment was used as foundation to implement their customised risk management initiatives. Empirical research was conducted whereby primary quantitative data were collected from respondents through the deployment of a questionnaire, through means of non-probability sampling methods. The results showed that though the control environments of South African SMMEs were regarded as good, they were not used as foundation by South African SMMEs to implement their customised risk management initiatives.

  19. Compact Electro-Permeabilization System for Controlled Treatment of Biological Cells and Cell Medium Conductivity Change Measurement

    Directory of Open Access Journals (Sweden)

    Novickij Vitalij

    2014-10-01

    Full Text Available Subjection of biological cells to high intensity pulsed electric field results in the permeabilization of the cell membrane. Measurement of the electrical conductivity change allows an analysis of the dynamics of the process, determination of the permeabilization thresholds, and ion efflux influence. In this work a compact electro-permeabilization system for controlled treatment of biological cells is presented. The system is capable of delivering 5 μs - 5 ms repetitive square wave electric field pulses with amplitude up to 1 kV. Evaluation of the cell medium conductivity change is implemented in the setup, allowing indirect measurement of the ion concentration changes occurring due to the cell membrane permeabilization. The simulation model using SPICE and the experimental data of the proposed system are presented in this work. Experimental data with biological cells is also overviewed

  20. Wine yeast sirtuins and Gcn5p control aging and metabolism in a natural growth medium.

    Science.gov (United States)

    Orozco, Helena; Matallana, Emilia; Aranda, Agustín

    2012-05-01

    Grape juice fermentation by wine yeast is an interesting model to understand aging under conditions closer to those in nature. Grape juice is rich in sugars and, unlike laboratory conditions, the limiting factor for yeast growth is nitrogen. We tested the effect of deleting sirtuins and several acetyltransferases to find that the role of many of these proteins during grape juice fermentation is the opposite to that under standard laboratory aging conditions using synthetic complete media. For instance, SIR2 deletion extends maximum chronological lifespan in wine yeasts grown under laboratory conditions, but shortens it in winemaking. Deletions of sirtuin HST2 and acetyltransferase GCN5 have the opposite effect to SIR2 mutation in both media. Acetic acid, a well known pro-aging compound in laboratory conditions, does not play a determinant role on aging during wine fermentation. We discovered that gcn5Δ mutant strain displays strongly increased aldehyde dehydrogenase Ald6p activity, caused by blocking of Ald6p degradation by autophagy under nitrogen limitation conditions, leading to acetic acid accumulation. We describe how nitrogen limitation and TOR inhibition extend the chronological lifespan under winemaking conditions and how the TOR-dependent control of aging partially depends on the Gcn5p function. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.

  1. Joint power and multiple access control for wireless mesh network with Rose projection method.

    Science.gov (United States)

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches.

  2. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    Science.gov (United States)

    Bögel, K; Joshi, D D

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessibility rate of 90-95% was determined using the first of these approaches, whereas 75-80% of the total dog population was reached in the vaccination campaign.

  3. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  4. DOE's nation-wide system for access control can solve problems for the federal government

    International Nuclear Information System (INIS)

    Callahan, S.; Tomes, D.; Davis, G.; Johnson, D.; Strait, S.

    1996-07-01

    The U.S. Department of Energy's (DOE's) ongoing efforts to improve its physical and personnel security systems while reducing its costs, provide a model for federal government visitor processing. Through the careful use of standardized badges, computer databases, and networks of automated access control systems, the DOE is increasing the security associated with travel throughout the DOE complex, and at the same time, eliminating paperwork, special badging, and visitor delays. The DOE is also improving badge accountability, personnel identification assurance, and access authorization timeliness and accuracy. Like the federal government, the DOE has dozens of geographically dispersed locations run by many different contractors operating a wide range of security systems. The DOE has overcome these obstacles by providing data format standards, a complex-wide virtual network for security, the adoption of a standard high security system, and an open-systems-compatible link for any automated access control system. If the location's level of security requires it, positive visitor identification is accomplished by personal identification number (PIN) and/or by biometrics. At sites with automated access control systems, this positive identification is integrated into the portals

  5. Design and implementation of fingerprint access control system based on ZigBee wireless network

    Directory of Open Access Journals (Sweden)

    Zhang Jin

    2017-01-01

    Full Text Available this paper mainly introduces a kind of fingerprint access control system based on ZigBee wireless network design and implementation method, specify when passengers should fingerprints collected and stored in the system at the information desk PC, and then assign rooms;Guests entered the room according to the fingerprint module, the system will be fingerprint information through ZigBee coordinator node module and network to transmit the fingerprint characteristic value to management system and the fingerprint information stored, if consistent with the electromagnetic lock open, allowed to enter the room, does not conform to the issued a warning sound.Additional access control system can control the corresponding fingerprint information storage room and remove, such as is required for a security incident broke in situation is special open mode can be set up.System software design consists of two aspects of the bottom and upper machine.

  6. Medium term effects of kinesio taping in patients with chronic non-specific low back pain: a randomized controlled trial.

    Science.gov (United States)

    Araujo, Amanda Costa; do Carmo Silva Parreira, Patrícia; Junior, Luiz Carlos Hespanhol; da Silva, Tatiane Mota; da Luz Junior, Maurício Antônio; da Cunha Menezes Costa, Lucíola; Pena Costa, Leonardo Oliveira

    2018-03-01

    Kinesio taping is a commonly used intervention for patients with chronic low back pain. However, the medium term effects of kinesio taping in these patients are unknown. To investigate the effectiveness of kinesio taping in patients with chronic low back pain after 6 months from randomization. This was a randomized controlled trial with a 6 months follow up. One hundred and forty eight participants were randomly assigned to the experimental (kinesio taping with skin convolutions) or control (kinesio taping without convolutions-Sham Taping) group. Participants from both groups had the tape reapplied twice a week for four weeks. The outcomes were pain, disability and global impression of recovery after 6 months. One participant was lost to follow up in the experimental group (n=73, response rate 99%) and two in the control group (n=72, response rate 97%). After 6 months there were no statistically significant between-group differences in pain intensity (between-group difference -0.8 points, 95% CI -1.7 to 0.2), global impression of recovery (0.4, -0.7 to 1.5), or disability (-1.1, -3.0 to 0.7). Four weeks of kinesio taping treatment was no better than sham taping for patients with chronic low back pain, at 6 months follow-up. Trial Registration Number (http://www.ensaiosclinicos.gov.br/): RBR-7ggfkv (Brazilian Registry of Clinical Trials). Copyright © 2017 Chartered Society of Physiotherapy. Published by Elsevier Ltd. All rights reserved.

  7. Access Control in IoT/M2M - Cloud Platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu

    Billions of devices are connected to the Internet nowadays, and the number will continue to grow in the future thanks to the advances in the electronics and telecommunication technology developments. Its application in broad aspects of human’s life brings a lot of benefits by improving productivity...... and quality of life. This paradigm, which is often called Internet of Things (IoT) or Machine-to-Machine (M2M), will provide an unprecedented opportunity to create applications and services that go far beyond the mere purpose of each participant. Many studies on the both technical and social aspects of Io...... of a system can be accessed by other parties by means of a set of access policies. For an IoT system such as Radio Frequency Identification (RFID) that collects huge amounts of RFID events data and may store it in the cloud storage for tracking purpose, access control to such data becomes a critical point...

  8. Decision Making Regarding Access to Training and Development in Medium-Sized Enterprises: An Exploratory Study Using the Critical Incident Technique

    Science.gov (United States)

    Coetzer, Alan; Redmond, Janice; Sharafizad, Jalleh

    2012-01-01

    Purpose: The purpose of this paper is to develop an understanding of factors that impinge on managerial decision-making processes regarding employee access to structured training and development (T&D) opportunities that are at least partially funded by the firm. Design/methodology/approach: Semi-structured interviews incorporating the Critical…

  9. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs

    Science.gov (United States)

    Frias-Martinez, Vanessa; Stolfo, Salvatore J.; Keromytis, Angelos D.

    Mobile Ad-hoc Networks (MANETs) are very dynamic networks with devices continuously entering and leaving the group. The highly dynamic nature of MANETs renders the manual creation and update of policies associated with the initial incorporation of devices to the MANET (admission control) as well as with anomaly detection during communications among members (access control) a very difficult task. In this paper, we present BARTER, a mechanism that automatically creates and updates admission and access control policies for MANETs based on behavior profiles. BARTER is an adaptation for fully distributed environments of our previously introduced BB-NAC mechanism for NAC technologies. Rather than relying on a centralized NAC enforcer, MANET members initially exchange their behavior profiles and compute individual local definitions of normal network behavior. During admission or access control, each member issues an individual decision based on its definition of normalcy. Individual decisions are then aggregated via a threshold cryptographic infrastructure that requires an agreement among a fixed amount of MANET members to change the status of the network. We present experimental results using content and volumetric behavior profiles computed from the ENRON dataset. In particular, we show that the mechanism achieves true rejection rates of 95% with false rejection rates of 9%.

  10. State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

    Directory of Open Access Journals (Sweden)

    Neetesh Saxena

    2015-10-01

    Full Text Available The smart grid (SG is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications in the smart grid network. Therefore, this paper addresses the required objectives of an authentication protocol in the smart grid network along with the focus on mutual authentication, access control, and secure integration among different SG components. We review the existing authentication protocols, and analyze mutual authentication, privacy, trust, integrity, and confidentiality of communicating information in the smart grid network. We review authentications between the communicated entities in the smart grid, such as smart appliance, smart meter, energy provider, control center (CC, and home/building/neighborhood area network gateways (GW. We also review the existing authentication schemes for the vehicle-to-grid (V2G communication network along with various available secure integration and access control schemes. We also discuss the importance of the mutual authentication among SG entities while providing confidentiality and privacy preservation, seamless integration, and required access control with lower overhead, cost, and delay. This paper will help to provide a better understanding of current authentication, authorization, and secure integration issues in the smart grid network and directions to create interest among researchers to further explore these promising areas.

  11. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

    Science.gov (United States)

    Huang, Qinlong; Yang, Yixian; Shi, Yuxiang

    2018-02-24

    With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.

  12. Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network

    Directory of Open Access Journals (Sweden)

    Wang Feng

    2017-01-01

    Full Text Available With the continuous development of wireless networks, the amount of privacy services in heterogeneous mobile networks is increasing, such as information storage, user access, and so on. Access control security issues for heterogeneous mobile radio network, this paper proposes a dynamic migration access control technology based on heterogeneous network. Through the system architecture of the mutual trust system, we can understand the real-time mobile node failure or abnormal state. To make the service can be terminated for the node. And adopt the 802.1X authentication way to improve the security of the system. Finally, it by combining the actual running test data, the trust update algorithm of the system is optimized to reduce the actual security threats in the environment. Experiments show that the system’s anti-attack, the success rate of access, bit error rate is in line with the expected results. This system can effectively reduce the system authentication information is illegally obtained after the network security protection mechanism failure and reduce the risk of user data leakage.

  13. Effects of medium-chain triglycerides on weight loss and body composition: a meta-analysis of randomized controlled trials.

    Science.gov (United States)

    Mumme, Karen; Stonehouse, Welma

    2015-02-01

    Medium-chain triglycerides (MCTs) may result in negative energy balance and weight loss through increased energy expenditure and lipid oxidation. However, results from human intervention studies investigating the weight reducing potential of MCTs, have been mixed. To conduct a systematic review and meta-analysis of randomized controlled trials comparing the effects of MCTs, specifically C8:0 and C10:0, to long-chain triglycerides (LCTs) on weight loss and body composition in adults. Changes in blood lipid levels were secondary outcomes. Randomized controlled trials >3 weeks' duration conducted in healthy adults were identified searching Web of Knowledge, Discover, PubMed, Scopus, New Zealand Science, and Cochrane CENTRAL until March 2014 with no language restriction. Identified trials were assessed for bias. Mean differences were pooled and analyzed using inverse variance models with fixed effects. Heterogeneity between studies was calculated using I(2) statistic. An I(2)>50% or Pweight (-0.51 kg [95% CI-0.80 to -0.23 kg]; Preductions in body weight and composition without adversely affecting lipid profiles. However, further research is required by independent research groups using large, well-designed studies to confirm the efficacy of MCT and to determine the dosage needed for the management of a healthy body weight and composition. Copyright © 2015 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.

  14. Effects of the pH/pCO2 control method on medium chemistry and phytoplankton growth

    Directory of Open Access Journals (Sweden)

    F. M. M. Morel

    2009-07-01

    Full Text Available The control of key chemical parameters in phytoplankton cultures, such as pCO2, pH and Ω (the saturation state of calcium carbonate, is made difficult by the interdependence of these parameters and by the changes resulting from the growth of the organisms, such as CO2 fixation, nutrient uptake and, for coccolithophores, calcite precipitation. Even in cultures where pCO2 or pH is maintained constant, other chemical parameters change substantially at high cell densities. Experimentally we observed that various methods of adjustment of pCO2/pH – acid or base addition, use of buffers or pH-stats, or bubbling of CO2-enriched air – can be used, the choice of one or the other depending on the goals of the experiments. At seawater pH, we measured the same growth rates in cultures of the diatom Thalassiosira weissflogii where the pCO2/pH was controlled by these different methods. The pH/pCO2 control method also did not affect the rates of growth or calcification of the coccolithophore Emiliania huxleyi at seawater pH. At lower pH/higher pCO2, in the E. huxleyi strain PLY M219, we observed increases in rates of carbon fixation and calcification per cell, along with a slight increase in growth rate, except in bubbled cultures. In our hands, the bubbling of cultures seemed to induce more variable results than other methods of pCO2/pH control. While highly convenient, the addition of pH buffers to the medium apparently induces changes in trace metal availability and cannot be used under trace metal-limiting conditions.

  15. A Generic Role Based Access Control Model for Wind Power Systems

    DEFF Research Database (Denmark)

    Nagarajan, Anand; Jensen, Christian D.

    2010-01-01

    energy sources, such as wind turbines, solar energy or wave energy. This introduces important new security challenges that are not adequately addressed by existing approaches to security in the electrical power distribution infrastructure. In this paper we examine some of the security challenges that may...... arise in the emerging energy distribution infrastructure. In particular, we examine the security problems that arise in the area of wind power communication infrastructures based on the IEC 61400-25 and IEC 62351 standards. These standards define ways of representing elements of the wind power...... infrastructure in a software domain in a manufacturer independent manner as well as establishing secure communication and authenticating the other parties in electrical power infrastructures, but they do not address the problem of access control. We therefore propose a generic model for access control in wind...

  16. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  17. Modelling and Analysing Access Control Policies in XACML 3.0

    DEFF Research Database (Denmark)

    Ramli, Carroline Dewi Puspa Kencana

    and verification of properties of XACML policies. Overall, we focus into two different area. The first part focuses on the access control language. More specifically our focus is on the understanding XACML 3.0. The second part focuses on how we use Logic Programming (LP) to model access control policies. We show...... semantics is described normatively using natural language. The use of English text in standardisation leads to the risk of misinterpretation and ambiguity. In order to avoid this drawback, we define an abstract syntax of XACML 3.0 and a formal XACML semantics. Second, we propose a logic-based XACML analysis...... framework using Answer Set Programming (ASP). With ASP we model an XACML PDP that loads XACML policies and evaluates XACML requests against these policies. The expressivity of ASP and the existence of efficient implementations of the answer set semantics provide the means for declarative specification...

  18. An internet of things example: classrooms access control over near field communication.

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  19. RFID-Based Monitoring And Access Control System For Parliamentary Campus

    Directory of Open Access Journals (Sweden)

    Sai Thu Rein Htun

    2015-08-01

    Full Text Available This paper is to implement monitoring and access control system based on RFID and Zigbee technology which can be used at Parliamentary Campus. Nowadays RFID technology is widely used for access control system because it is cheap waterproof and easy to use as well as it contains unique EPC electronic protect code .In addition Zigbee wireless module is cost-effective and can be reliable for security. Sothis system consists of RFID tag RFID reader Arduino Uno and Zigbee. This system can also be used for industrial amp commercial and security HVAC closures. This paper describes the results of point-to-point connection and point-to-multipoint connection using Zigbee and RFID technology.

  20. A threat intelligence framework for access control security in the oil industry

    Science.gov (United States)

    Alaskandrani, Faisal T.

    The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.

  1. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Directory of Open Access Journals (Sweden)

    Daniel Palma

    2014-04-01

    Full Text Available The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  2. Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

    OpenAIRE

    Mikel Uriarte Itzazelaia; Jasone Astorga; Eduardo Jacob; Maider Huarte; Pedro Romaña

    2018-01-01

    Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control model...

  3. Accessibility of dog populations for rabies control in Kathmandu valley, Nepal.

    OpenAIRE

    Bögel, K.; Joshi, D. D.

    1990-01-01

    The accessibility of dogs in urban areas of Kathmandu valley was measured using the following approaches: determination of the proportion of dogs that bore signs of having been the objects of religious worship and other signs of household association, supplemented by information obtained by interviewing people in the neighbourhood; and the vaccination coverage attained in a rabies control campaign that was preceded by intensive activities to encourage the community to participate. An accessib...

  4. IAACaaS: IoT Application-Scoped Access Control as a Service

    Directory of Open Access Journals (Sweden)

    Álvaro Alonso

    2017-10-01

    Full Text Available access control is a key element when guaranteeing the security of online services. However, devices that make the Internet of Things have some special requirements that foster new approaches to access control mechanisms. Their low computing capabilities impose limitations that make traditional paradigms not directly applicable to sensors and actuators. In this paper, we propose a dynamic, scalable, IoT-ready model that is based on the OAuth 2.0 protocol and that allows the complete delegation of authorization, so that an as a service access control mechanism is provided. Multiple tenants are also supported by means of application-scoped authorization policies, whose roles and permissions are fine-grained enough to provide the desired flexibility of configuration. Besides, OAuth 2.0 ensures interoperability with the rest of the Internet, yet preserving the computing constraints of IoT devices, because its tokens provide all the necessary information to perform authorization. The proposed model has been fully implemented in an open-source solution and also deeply validated in the scope of FIWARE, a European project with thousands of users, the goal of which is to provide a framework for developing smart applications and services for the future Internet. We provide the details of the deployed infrastructure and offer the analysis of a sample smart city setup that takes advantage of the model. We conclude that the proposed solution enables a new access control as a service paradigm that satisfies the special requirements of IoT devices in terms of performance, scalability and interoperability.

  5. Embedded LLRF controller with channel access on MicroTCA back-plane interconnect

    International Nuclear Information System (INIS)

    Furukawa, K.; Akai, K.; Akiyama, A.; Kobayashi, T.; Michizono, S.; Miura, T.; Nakanishi, K.; Odagiri, J.; Deguchi, H.; Hayashi, K.; Ryoshi, M.

    2012-01-01

    A low-level RF controller has been developed for the accelerator controls for SuperKEKB, Super-conducting RF Test facility (STF) and Compact-ERL (cERL) at KEK. The feedback mechanism will be performed on Virtex-5 FPGA with 16-bit ADCs and DACs. The card was designed in the form-factor of an advanced mezzanine card (AMC) for a MicroTCA shelf. An embedded EPICS IOC on the Power-PC core in FPGA will provide the global controls through channel access (CA) protocol on the back-plane interconnect of the shelf. No other mechanisms are required for the external linkages. CA is exclusively employed in order not only to make the AMC cards to communicate with each other, but also to communicate with central controls and with an embedded IOC on a Linux-based PLC for slow controls. (authors)

  6. 48 CFR 1552.235-75 - Access to Toxic Substances Control Act Confidential Business Information (APR 1996).

    Science.gov (United States)

    2010-10-01

    ...: Access to Toxic Substances Control Act Confidential Business Information (APR 1996) In order to perform... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Access to Toxic Substances Control Act Confidential Business Information (APR 1996). 1552.235-75 Section 1552.235-75 Federal...

  7. Design of Novel Online Access and Control Interface for Remote Experiment on DC Drives

    Directory of Open Access Journals (Sweden)

    Jagadeesh Chandra A.P

    2009-05-01

    Full Text Available Internet has revolutionized the way in which the information is delivered. Laboratory based courses play an important role in technical education. Automation is changing the nature of these laboratories and the system designer’s focus on Internet accessed experiments owing to the availability of several tools to integrate electronic and mechanical hardware with the World Wide Web. Stand-alone approaches in remote learning have grown tremendously in the recent years. One of the important components in remote experimentation is the integration of Virtual Instruments to perform real hardware tasks in near real-time. The paper describes a web interface to the electrical hardware and integration of LabVIEW Virtual Instruments to the remote access and control of DC Drives. Customized electrical hardware serves as the web interface, supporting various features to remotely control and measure the parameters of the electrical machine. Novel techniques have been used to interface a low power data acquisition system with the DC machine driven by the AC power supply. The system uses the client-server architecture to access the web page of the Virtual Instruments through web browser. The developed system imitates the real control of experiment hardware, but being operated remotely through Internet.

  8. Medium-term effectiveness of online behavioral training in migraine self-management: A randomized trial controlled over 10 months.

    Science.gov (United States)

    Sorbi, M J; Kleiboer, A M; van Silfhout, H G; Vink, G; Passchier, J

    2015-06-01

    This randomized, controlled trial examined the medium-term effectiveness of online behavioral training in migraine self-management (oBT; N = 195) versus waitlist control (WLC; N = 173) on attack frequency, indicators of self-management (primary outcomes), headache top intensity, use of rescue medications, quality of life and disability (secondary outcomes). An online headache diary following the ICHD-II and questionnaires were completed at baseline (T0), post-training (T1) and six months later (T2). Missing data (T1: 24%; T2: 37%) were handled by multiple imputation. We established effect sizes (ES) and tested between-group differences over time with linear mixed modelling techniques based on the intention-to-treat principle. At T2, attack frequency had improved significantly in oBT (-23%, ES = 0.66) but also in WLC (-19%; ES = 0.52). Self-efficacy, internal and external control in migraine management--and triptan use--improved only in oBT, however. This indicates different processes in both groups and could signify (the start of) active self-management in oBT. Also, only oBT improved migraine-specific quality of life to a sizable extent. oBT produced self-management gains but could not account for improved attack frequency, because WLC improved as well. The perspective that BT effects develop gradually, and that online delivery will boost BT outreach, justifies further research. © International Headache Society 2014 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  9. Development of the exposure and access control dosimeter system for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Si Young; Lee, B. J.; Kim, B. H.; Kim, J. S.; Lee, K. C.; Kang, B. H.; Kim, C. K.; Ham, C. S.; Kwon, K. C.; Park, W. M.; Kim, C. H.; Kim, J. T.; Koo, C. H.; Park, S. J.; Kim, T. W

    1999-12-01

    In this paper an electronic personal dosimeter(EPD) adopt in a PIN type silicon semiconductor as a radiation detector has been developed, designed and a prototype dosimeter has been manufactured. A series of performance test of this EPD on reference radiation field has been carried out. A dosimeter reader which reads the radiation dose from EPD and make a real time access control in connection with the entrance door to radiation controlled area has been developed, designed and manufactured. S/W program supporting hangul (Korean language) has been developed to operate the EPD and reader system with a personal computer. (author)

  10. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks.

    Science.gov (United States)

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-02-01

    Hybrid mobile applications (apps) combine the features of Web applications and "native" mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources-file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies "bridges" that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources-the ability to read and write contacts list, local files, etc.-to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign-origin Web content

  11. Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks

    Science.gov (United States)

    Georgiev, Martin; Jana, Suman; Shmatikov, Vitaly

    2014-01-01

    Hybrid mobile applications (apps) combine the features of Web applications and “native” mobile apps. Like Web applications, they are implemented in portable, platform-independent languages such as HTML and JavaScript. Like native apps, they have direct access to local device resources—file system, location, camera, contacts, etc. Hybrid apps are typically developed using hybrid application frameworks such as PhoneGap. The purpose of the framework is twofold. First, it provides an embedded Web browser (for example, WebView on Android) that executes the app's Web code. Second, it supplies “bridges” that allow Web code to escape the browser and access local resources on the device. We analyze the software stack created by hybrid frameworks and demonstrate that it does not properly compose the access-control policies governing Web code and local code, respectively. Web code is governed by the same origin policy, whereas local code is governed by the access-control policy of the operating system (for example, user-granted permissions in Android). The bridges added by the framework to the browser have the same local access rights as the entire application, but are not correctly protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web content included into a hybrid app (e.g., ads confined in iframes) to drill through the layers and directly access device resources. Fracking vulnerabilities are generic: they affect all hybrid frameworks, all embedded Web browsers, all bridge mechanisms, and all platforms on which these frameworks are deployed. We study the prevalence of fracking vulnerabilities in free Android apps based on the PhoneGap framework. Each vulnerability exposes sensitive local resources—the ability to read and write contacts list, local files, etc.—to dozens of potentially malicious Web domains. We also analyze the defenses deployed by hybrid frameworks to prevent resource access by foreign

  12. Biomedical Big Data: New Models of Control Over Access, Use and Governance.

    Science.gov (United States)

    Vayena, Effy; Blasimme, Alessandro

    2017-12-01

    Empirical evidence suggests that while people hold the capacity to control their data in high regard, they increasingly experience a loss of control over their data in the online world. The capacity to exert control over the generation and flow of personal information is a fundamental premise to important values such as autonomy, privacy, and trust. In healthcare and clinical research this capacity is generally achieved indirectly, by agreeing to specific conditions of informational exposure. Such conditions can be openly stated in informed consent documents or be implicit in the norms of confidentiality that govern the relationships of patients and healthcare professionals. However, with medicine becoming a data-intense enterprise, informed consent and medical confidentiality, as mechanisms of control, are put under pressure. In this paper we explore emerging models of informational control in data-intense healthcare and clinical research, which can compensate for the limitations of currently available instruments. More specifically, we discuss three approaches that hold promise in increasing individual control: the emergence of data portability rights as means to control data access, new mechanisms of informed consent as tools to control data use, and finally, new participatory governance schemes that allow individuals to control their data through direct involvement in data governance. We conclude by suggesting that, despite the impression that biomedical big data diminish individual control, the synergistic effect of new data management models can in fact improve it.

  13. Adolescent suicide and household access to firearms in Colorado: results of a case-control study.

    Science.gov (United States)

    Shah, S; Hoffman, R E; Wake, L; Marine, W M

    2000-03-01

    To determine whether, compared with age- and sex-matched controls who did not commit suicide, adolescents who committed suicide by firearms were more likely to have had household access to firearms (after adjusting for significant risk factors for adolescent suicide). A case-control study design was used; case subjects were Colorado adolescents who committed suicide between 1991 and 1993; controls were sex- and age-matched adolescents who were randomly selected from the same school the subjects had attended. Interviews were conducted with the parent or guardian of cases and controls. Of the 36 case subjects in this study, 67% committed suicide using a gun obtained from their home. Adolescent suicide victims who committed suicide by firearms were significantly more likely to have a firearm in their home (72%) than age- and sex-matched community controls (50%), after adjusting for significant risk factors. Conduct disorder and previous mental health treatment were also found to be independent risk factors for adolescent firearm suicide. Two types of public health interventions to prevent adolescent firearm suicides are likely to be successful: (a) limiting household access to firearms, and (b) identifying adolescents at high risk of firearm suicide.

  14. An enhancement of the role-based access control model to facilitate information access management in context of team collaboration and workflow.

    Science.gov (United States)

    Le, Xuan Hung; Doll, Terry; Barbosu, Monica; Luque, Amneris; Wang, Dongwen

    2012-12-01

    Although information access control models have been developed and applied to various applications, few of the previous works have addressed the issue of managing information access in the combined context of team collaboration and workflow. To facilitate this requirement, we have enhanced the Role-Based Access Control (RBAC) model through formulating universal constraints, defining bridging entities and contributing attributes, extending access permissions to include workflow contexts, synthesizing a role-based access delegation model to target on specific objects, and developing domain ontologies as instantiations of the general model to particular applications. We have successfully applied this model to the New York State HIV Clinical Education Initiative (CEI) project to address the specific needs of information management in collaborative processes. An initial evaluation has shown this model achieved a high level of agreement with an existing system when applied to 4576 cases (kappa=0.801). Comparing to a reference standard, the sensitivity and specificity of the enhanced RBAC model were at the level of 97-100%. These results indicate that the enhanced RBAC model can be effectively used for information access management in context of team collaboration and workflow to coordinate clinical education programs. Future research is required to incrementally develop additional types of universal constraints, to further investigate how the workflow context and access delegation can be enriched to support the various needs on information access management in collaborative processes, and to examine the generalizability of the enhanced RBAC model for other applications in clinical education, biomedical research, and patient care. Copyright © 2012 Elsevier Inc. All rights reserved.

  15. Toward an Open-Access Global Database for Mapping, Control, and Surveillance of Neglected Tropical Diseases

    Science.gov (United States)

    Hürlimann, Eveline; Schur, Nadine; Boutsika, Konstantina; Stensgaard, Anna-Sofie; Laserna de Himpsl, Maiti; Ziegelbauer, Kathrin; Laizer, Nassor; Camenzind, Lukas; Di Pasquale, Aurelio; Ekpo, Uwem F.; Simoonga, Christopher; Mushinge, Gabriel; Saarnak, Christopher F. L.; Utzinger, Jürg; Kristensen, Thomas K.; Vounatsou, Penelope

    2011-01-01

    Background After many years of general neglect, interest has grown and efforts came under way for the mapping, control, surveillance, and eventual elimination of neglected tropical diseases (NTDs). Disease risk estimates are a key feature to target control interventions, and serve as a benchmark for monitoring and evaluation. What is currently missing is a georeferenced global database for NTDs providing open-access to the available survey data that is constantly updated and can be utilized by researchers and disease control managers to support other relevant stakeholders. We describe the steps taken toward the development of such a database that can be employed for spatial disease risk modeling and control of NTDs. Methodology With an emphasis on schistosomiasis in Africa, we systematically searched the literature (peer-reviewed journals and ‘grey literature’), contacted Ministries of Health and research institutions in schistosomiasis-endemic countries for location-specific prevalence data and survey details (e.g., study population, year of survey and diagnostic techniques). The data were extracted, georeferenced, and stored in a MySQL database with a web interface allowing free database access and data management. Principal Findings At the beginning of 2011, our database contained more than 12,000 georeferenced schistosomiasis survey locations from 35 African countries available under http://www.gntd.org. Currently, the database is expanded to a global repository, including a host of other NTDs, e.g. soil-transmitted helminthiasis and leishmaniasis. Conclusions An open-access, spatially explicit NTD database offers unique opportunities for disease risk modeling, targeting control interventions, disease monitoring, and surveillance. Moreover, it allows for detailed geostatistical analyses of disease distribution in space and time. With an initial focus on schistosomiasis in Africa, we demonstrate the proof-of-concept that the establishment and running of a

  16. An interaction-based access control model (IBAC) for collaborative services

    Energy Technology Data Exchange (ETDEWEB)

    Altunay, Mine; /Fermilab; Byrd, Gregory T.; Brown, Doug E.; Dean, Ralph A.; /North Carolina State U.

    2008-04-01

    A collaboration is a collection of services that work together to achieve a common goal. Although collaborations help when tackling difficult problems, they lead to security issues. First, a collaboration is often performed by services that are drawn from different security domains. Second, a service interacts with multiple peer services during the collaboration. These interactions are not isolated from one another--e.g., data may flow through a sequence of different services. As a result, a service is exposed to multiple peer services in varying degrees, leading to different security threats. We identify the types of interactions that can be present in collaborations, and discuss the security threats due to each type. We propose a model for representing the collaboration context so that a service can be made aware of the existing interactions. We provide an access control model for a service participating in a collaboration. We couple our access control model with a policy model, so that the access requirements from collaborations can be expressed and evaluated.

  17. The equipment access software for a distributed UNIX-based accelerator control system

    International Nuclear Information System (INIS)

    Trofimov, Nikolai; Zelepoukine, Serguei; Zharkov, Eugeny; Charrue, Pierre; Gareyte, Claire; Poirier, Herve

    1994-01-01

    This paper presents a generic equipment access software package for a distributed control system using computers with UNIX or UNIX-like operating systems. The package consists of three main components, an application Equipment Access Library, Message Handler and Equipment Data Base. An application task, which may run in any computer in the network, sends requests to access equipment through Equipment Library calls. The basic request is in the form Equipment-Action-Data and is routed via a remote procedure call to the computer to which the given equipment is connected. In this computer the request is received by the Message Handler. According to the type of the equipment connection, the Message Handler either passes the request to the specific process software in the same computer or forwards it to a lower level network of equipment controllers using MIL1553B, GPIB, RS232 or BITBUS communication. The answer is then returned to the calling application. Descriptive information required for request routing and processing is stored in the real-time Equipment Data Base. The package has been written to be portable and is currently available on DEC Ultrix, LynxOS, HPUX, XENIX, OS-9 and Apollo domain. ((orig.))

  18. Frequency-selective design of wireless power transfer systems for controlled access applications

    Science.gov (United States)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  19. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-08-01

    Full Text Available Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

  20. Growth medium-dependent regulation of Myxococcus xanthus fatty acid content is controlled by the esg locus.

    Science.gov (United States)

    Bartholomeusz, G; Zhu, Y; Downard, J

    1998-10-01

    We compared the cellular fatty acid profiles of Myxococcus xanthus cells grown in either a Casitone-based complex medium or a chemically defined medium. The cells grown in the complex medium had a much higher content of the abundant branched-chain fatty acid iso-15:0 and several other branched-chain species. The higher branched-chain fatty acid content of the cells grown in the complex medium was dependent on the esg locus, which encodes the E1alpha and E1beta components of a branched-chain keto acid dehydrogenase (BCKAD) multienzyme complex involved in branched-chain fatty acid biosynthesis. Cells grown in the complex medium were also found to have a higher level of esg transcription and more BCKAD enzyme activity than cells from the chemically defined medium. The level of esg transcription appears to be an important factor in the growth medium-dependent regulation of the M. xanthus branched-chain fatty acid content.

  1. A fuzzy expert system to Trust-Based Access Control in crowdsourcing environments

    Directory of Open Access Journals (Sweden)

    Olusegun Folorunso

    2015-07-01

    Full Text Available Crowdsourcing has been widely accepted across a broad range of application areas. In crowdsourcing environments, the possibility of performing human computation is characterized with risks due to the openness of their web-based platforms where each crowd worker joins and participates in the process at any time, causing serious effect on the quality of its computation. In this paper, a combination of Trust-Based Access Control (TBAC strategy and fuzzy-expert systems was used to enhance the quality of human computation in crowdsourcing environment. A TBAC-fuzzy algorithm was developed and implemented using MATLAB 7.6.0 to compute trust value (Tvalue, priority value as evaluated by fuzzy inference system (FIS and finally generate access decision to each crowd-worker. In conclusion, the use of TBAC is feasible in improving quality of human computation in crowdsourcing environments.

  2. On the designing of a tamper resistant prescription RFID access control system.

    Science.gov (United States)

    Safkhani, Masoumeh; Bagheri, Nasour; Naderi, Majid

    2012-12-01

    Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.

  3. Design of a control system for self-shielded irradiators with remote access capability

    International Nuclear Information System (INIS)

    Iyengar, R.D.; Verma, P.B.; Prasad, V.V.S.S.; George, Jain R.; Das, Tripti; Deshmukh, D.K.

    2001-01-01

    With self-shielded irradiators like Gamma chambers, and Blood irradiators are being sold by BRIT to customers both within and outside the country, it has become necessary to improve the quality of service without increasing the overheads. The recent advances in the field of communications and information technology can be exploited for improving the quality of service to the customers. A state of the art control system with remote accessibility has been designed for these irradiators enhancing their performance. This will provide an easy access to these units wherever they might be located, through the Internet. With this technology it will now be possible to attend to the needs of the customers, as regards fault rectification, error debugging, system software update, performance testing, data acquisition etc. This will not only reduce the downtime of these irradiators but also reduce the overheads. (author)

  4. Human Rights and Drug Control : Access to Controlled Essential Medicines in Resource-Constrained Countries

    NARCIS (Netherlands)

    Gispen, M.E.C.

    2017-01-01

    Millions of people worldwide suffer a range of health and socio-economic related problems because of inadequate availability and use of controlled essential medicines like morphine and codeine for pain treatment. As a result, millions of people, often living in lesser-advanced conditions, suffer in

  5. Minor access control of Hong Kong under the Framework Convention on Tobacco Control.

    Science.gov (United States)

    Kan, Ming-yue; Lau, Maggie

    2010-05-01

    Asia's tobacco control movement was strengthened owing to the need to fulfill the Framework Convention on Tobacco Control (FCTC). The present study aims to assess the compliance rates of tobacco retailers to the law forbidding the sales of tobacco to minors in Hong Kong before and after the growth of the tobacco control movement brought by the enactment of the newly amended tobacco control law with effect from 2007. The legislation was enacted to fulfill the FCTC. Two waves of territory-wide compliance checks conducted in 2006 and 2008 were compared. The compliance check was conducted using Standard Protocol. The overall compliance rate was still low though it increased from 18.9% in 2006 to 27.0% in 2008. The compliance rate of convenience stores and newspaper stands improved whereas the rate for restaurants, grocery stores and petrol stations worsened. Less tobacco retailing outlets displayed a specified warning sign required in 2008 (33.7%) comparing to 2006 (41.4%). The indoor smoking ban of the FCTC unintentionally changed the cigarette retailing landscape and finally improved the compliance rate. The case study also demonstrated that the Asia region still has much room for improvement in fulfilling the FCTC in term of effective implementation and enforcement. Copyright (c) 2009 Elsevier Ireland Ltd. All rights reserved.

  6. DoD Needs to Improve Screening and Access Controls for General Public Tenants Leasing Housing on Military Installations (REDACTED)

    Science.gov (United States)

    2016-04-01

    DEPARTMENT OF THE ARMY SUBJECT: DoD Needs to Improve Screening and Access Controls for General Public Tenants Leasing Housing on Military...public tenants who leased DoD privatized housing before granting those tenants unescorted access to military installations. In addition, DoD officials...issued access badges to general public tenants with expiration dates that exceeded the tenants’ lease terms. As a result, DoD assumed a higher and

  7. Design and power management of an offshore medium voltage DC microgrid realized through high voltage power electronics technologies and control

    Science.gov (United States)

    Grainger, Brandon Michael

    The growth in the electric power industry's portfolio of Direct Current (DC) based generation and loads have captured the attention of many leading research institutions. Opportunities for using DC based systems have been explored in electric ship design and have been a proven, reliable solution for transmitting bulk power onshore and offshore. To integrate many of the renewable resources into our existing AC grid, a number of power conversions through power electronics are required to condition the equipment for direct connection. Within the power conversion stages, there is always a requirement to convert to or from DC. The AC microgrid is a conceptual solution proposed for integrating various types of renewable generation resources. The fundamental microgrid requirements include the capability of operating in islanding mode and/or grid connected modes. The technical challenges associated with microgrids include (1) operation modes and transitions that comply with IEEE1547 without extensive custom engineering and (2) control architecture and communication. The Medium Voltage DC (MVDC) architecture, explored by the University of Pittsburgh, can be visualized as a special type of DC microgrid. This dissertation is multi-faceted, focused on many design aspects of an offshore DC microgrid. The focal points of the discussion are focused on optimized high power, high frequency magnetic material performance in electric machines, transformers, and DC/DC power converters---all components found within offshore, power system architectures. A new controller design based upon model reference control is proposed and shown to stabilize the electric motor drives (modeled as constant power loads), which serve as the largest power consuming entities in the microgrid. The design and simulation of a state-of-the-art multilevel converter for High Voltage DC (HVDC) is discussed and a component sensitivity analysis on fault current peaks is explored. A power management routine is

  8. The assessment of exploitation process of power for access control system

    Science.gov (United States)

    Wiśnios, Michał; Paś, Jacek

    2017-10-01

    The safety of public utility facilities is a function not only of effectiveness of the electronic safety systems, used for protection of property and persons, but it also depends on the proper functioning of their power supply systems. The authors of the research paper analysed the power supply systems, which are used in buildings for the access control system that is integrated with the closed-circuit TV. The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at identification of people, vehicles allowed to cross the boundary of the reserved area, to prevent from crossing the reserved area and to generate the alarm signal informing about the attempt of crossing by an unauthorised entity. The industrial electricity with appropriate technical parameters is a basis of proper functioning of safety systems. Only the electricity supply to the systems is not equivalent to the operation continuity provision. In practice, redundant power supply systems are used. In the carried out reliability analysis of the power supply system, various power circuits of the system were taken into account. The reliability and operation requirements for this type of system were also included.

  9. Hybrid Solution for Privacy-Preserving Access Control for Healthcare Data

    Directory of Open Access Journals (Sweden)

    SMITHAMOL, M. B.

    2017-05-01

    Full Text Available The booming in cloud and IoT technologies has accelerated the growth of healthcare system. The IoT devices monitor the patient's health, and upload collected data as Electronic Medical Records (EMRs to the cloud for storage and sharing. Outsourcing EMRs to the cloud introduce new security and privacy challenges. In this paper, we proposed a novel architecture ensuring security and privacy for the outsourced health records. The proposed model uses partially ordered set (POSET for constructing the group based access structure and Ciphertext-Policy Attribute-Based Encryption (CP-ABE to provide fine-grained EMR access control. The modified group based CP-ABE (G-CP-ABE minimizes the computational overhead by reducing the number of leaf nodes in the access tree. Also, the proposed G-CP-ABE framework merges symmetric encryption and CP-ABE scheme to minimize the overall encryption time. As a result, G-CP-ABE can be used to monitor health conditions even from a resource constrained IoT device. The performance analysis shows the efficiency of the proposed model, making it suitable for practical use.

  10. A Model-driven Role-based Access Control for SQL Databases

    Directory of Open Access Journals (Sweden)

    Raimundas Matulevičius

    2015-07-01

    Full Text Available Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC, which restricts system access to authorised users. While the benefits of RBAC are widely acknowledged, the implementation and administration of RBAC policies remains a human intensive activity, typically postponed until the implementation and maintenance phases of system development. This deferred security engineering approach makes it difficult for security requirements to be accurately captured and for the system’s implementation to be kept aligned with these requirements as the system evolves. In this paper we propose a model-driven approach to manage SQL database access under the RBAC paradigm. The starting point of the approach is an RBAC model captured in SecureUML. This model is automatically translated to Oracle Database views and instead-of triggers code, which implements the security constraints. The approach has been fully instrumented as a prototype and its effectiveness has been validated by means of a case study.

  11. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  12. Long-term flow/chemistry feedback in a porous medium with heterogenous permeability: Kinetic control of dissolution and precipitation

    International Nuclear Information System (INIS)

    Bolton, E.W.; Lasaga, A.C.; Rye, D.M.

    1999-01-01

    The kinetics of dissolution and precipitation is of central importance to understanding the long-term evolution of fluid flows in crustal environments, with implications for problems as diverse as nuclear waste disposal and crustal evolution. The authors examine the dynamics of such evolution for several geologically relevant permeability distributions (models for en-echelon cracks, an isolated sloping fractured zone, and two sloping high-permeability zones that are close enough together to interact). Although the focus is on a simple quartz matrix system, generic features emerge from this study that can aid in the broader goal of understanding the long-term feedback between flow and chemistry, where dissolution and precipitation is under kinetic control. Examples of thermal convection in a porous medium with spatially variable permeability reveal features of central importance to water-rock interaction. After a transient phase, an accelerated rate of change of porosity may be used with care to decrease computational time, as an alternative to the quasi-stationary state approximation (Lichtner, 1988). Kinetic effects produce features not expected by traditional assumptions made on the basis of equilibrium, for example, that cooling fluids are oversaturated and heating fluids are undersaturated with respect to silicic acid equilibrium. Indeed, the authors observe regions of downwelling oversaturated fluid experiencing heating and regions of upwelling, yet cooling, undersaturated fluid. When oscillatory convection is present, the amplitudes of oscillation generally increase with time in near-surface environments, whereas amplitudes tend to decrease over long times near the heated lower boundary. The authors examine the scaling behavior of characteristic length scales, of terms in the solute equation, and of the typical deviation from equilibrium, each as a function of the kinetic rate parameters

  13. Automatic Access Control Based on Face and Hand Biometrics in A Non-Cooperative Context

    DEFF Research Database (Denmark)

    Jahromi, Mohammad Naser Sabet; Bonderup, Morten Bojesen; Nasrollahi, Kamal

    2018-01-01

    Automatic access control systems (ACS) based on the human biometrics or physical tokens are widely employed in public and private areas. Yet these systems, in their conventional forms, are restricted to active interaction from the users. In scenarios where users are not cooperating with the system......, these systems are challenged. Failure in cooperation with the biometric systems might be intentional or because the users are incapable of handling the interaction procedure with the biometric system or simply forget to cooperate with it, due to for example, illness like dementia. This work introduces...

  14. Sub-Network Access Control Technology Demonstrator: Software Design of the Network Management System

    Science.gov (United States)

    2002-08-01

    dabut du projet pour le contr6le et la supervision de la performance de ces cartes ne permettaient pas d’en obtenir ais~ment une vue d’ensemble. Ceux...besoins sp~cifiques, la conception d’un outil de gestion de r~seaux informatiques est propos6e et sa mise en oeuvre entreprise dans un prototype. Les...Defence Research and Recherche et ddveloppement Development Canada pour la defense Canada DEFENCE • I7 DEFENSE Sub-Network Access Control

  15. Gain transient control for wavelength division multiplexed access networks using semiconductor optical amplifiers

    DEFF Research Database (Denmark)

    Gibbon, Timothy Braidwood; Osadchiy, Alexey Vladimirovich; Kjær, Rasmus

    2009-01-01

    measurements how a near-saturated semiconductor optical amplifier (SOA) can be used to control these gain transients. An SOA is shown to reduce the penalty of transients originating in an EDFA from 2.3 dB to 0.2 dB for 10 Gb/s transmission over standard single mode fiber using a 231-1 PRBS pattern. The results...... suggest that a single SOA integrated within a WDM receiver at the metro node could offer a convenient all-optical solution for upstream transient controlin WDM access networks....

  16. Socio-economic status influences blood pressure control despite equal access to care

    DEFF Research Database (Denmark)

    Paulsen, M S; Andersen, M; Munck, A P

    2012-01-01

    OBJECTIVE: Denmark has a health care system with free and equal access to care irrespective of age and socio-economic status (SES). We conducted a cross-sectional study to investigate a possible association between SES and blood pressure (BP) control of hypertensive patients treated in general...... practice. METHODS: We enrolled 184 general practices and 5260 hypertensive patients. The general practitioners reported information about BP and diagnosis of diabetes. Information about education, income, antihypertensive drug treatment and other co-morbidity was retrieved from relevant registers from...

  17. A Flexible Component based Access Control Architecture for OPeNDAP Services

    Science.gov (United States)

    Kershaw, Philip; Ananthakrishnan, Rachana; Cinquini, Luca; Lawrence, Bryan; Pascoe, Stephen; Siebenlist, Frank

    2010-05-01

    Network data access services such as OPeNDAP enable widespread access to data across user communities. However, without ready means to restrict access to data for such services, data providers and data owners are constrained from making their data more widely available. Even with such capability, the range of different security technologies available can make interoperability between services and user client tools a challenge. OPeNDAP is a key data access service in the infrastructure under development to support the CMIP5 (Couple Model Intercomparison Project Phase 5). The work is being carried out as part of an international collaboration including the US Earth System Grid and Curator projects and the EU funded IS-ENES and Metafor projects. This infrastructure will bring together Petabytes of climate model data and associated metadata from over twenty modelling centres around the world in a federation with a core archive mirrored at three data centres. A security system is needed to meet the requirements of organisations responsible for model data including the ability to restrict data access to registered users, keep them up to date with changes to data and services, audit access and protect finite computing resources. Individual organisations have existing tools and services such as OPeNDAP with which users in the climate research community are already familiar. The security system should overlay access control in a way which maintains the usability and ease of access to these services. The BADC (British Atmospheric Data Centre) has been working in collaboration with the Earth System Grid development team and partner organisations to develop the security architecture. OpenID and MyProxy were selected at an early stage in the ESG project to provide single sign-on capability across the federation of participating organisations. Building on the existing OPeNDAP specification an architecture based on pluggable server side components has been developed at the BADC

  18. Increasing access to care for sick newborns: evidence from the Ghana Newhints cluster-randomised controlled trial

    NARCIS (Netherlands)

    Manu, Alexander; Hill, Zelee; ten Asbroek, Augustinus Ha; Soremekun, Seyi; Weobong, Benedict; Gyan, Thomas; Tawiah-Agyemang, Charlotte; Danso, Samuel; Amenga-Etego, Seeba; Owusu-Agyei, Seth; Kirkwood, Betty R.

    2016-01-01

    To evaluate the impact of Newhints community-based surveillance volunteer (CBSV) assessments and referrals on access to care for sick newborns and on existing inequities in access. We evaluated a prospective cohort nested within the Newhints cluster-randomised controlled trial. Community-based

  19. Cerberus, an Access Control Scheme for Enforcing Least Privilege in Patient Cohort Study Platforms : A Comprehensive Access Control Scheme Applied to the GENIDA Project - Study of Genetic Forms of Intellectual Disabilities and Autism Spectrum Disorders.

    Science.gov (United States)

    Parrend, Pierre; Mazzucotelli, Timothée; Colin, Florent; Collet, Pierre; Mandel, Jean-Louis

    2017-11-16

    Cohort Study Platforms (CSP) are emerging as a key tool for collecting patient information, providing new research data, and supporting family and patient associations. However they pose new ethics and regulatory challenges since they cross the gap between patients and medical practitioners. One of the critical issues for CSP is to enforce a strict control on access privileges whilst allowing the users to take advantage of the breadth of the available data. We propose Cerberus, a new access control scheme spanning the whole life-cycle of access right management: design, implementation, deployment and maintenance, operations. Cerberus enables switching from a dual world, where CSP data can be accessed either from the users who entered it or fully de-identified, to an access-when-required world, where patients, practitioners and researchers can access focused medical data through explicit authorisation by the data owner. Efficient access control requires application-specific access rights, as well as the ability to restrict these rights when they are not used. Cerberus is implemented and evaluated in the context of the GENIDA project, an international CSP for Genetically determined Intellectual Disabilities and Autism Spectrum Disorders. As a result of this study, the software is made available for the community, and validated specifications for CSPs are given.

  20. Perfil do Controller em empresas de médio e grande porte da Grande Florianópolis = The controller profile in medium and big enterprises in Florianopolis and its surroundings

    Directory of Open Access Journals (Sweden)

    Lisa M. Seixas Ribeiro

    2008-07-01

    Full Text Available Há certa assimetria e fragilidade entre a literatura sobre controladoria e a prática atual das organizações. Para compreender as razões dessas divergências, este ensaio visa apresentar os resultados de uma pesquisa, na literatura, sobre as funções de um controller e confrontá-los com as constatações de uma pesquisa de campo em médias e grandes empresas da Grande Florianópolis. Nela busca-se diagnosticar pontos específicos como, posição hierárquica, subordinação, formação, funções e habilidades relacionadas ao controller. O delineamento metodológico adotado foi o descritivo, de caráter quantitativo, conduzido através do instrumento de levantamento (survey e amostragem por acessibilidade. Os resultados mostram que o controller possui, preponderantemete, formação em ciências contábeis (55,6%, ocupa posição de gerência (41,2%, e que as funções de controles internos, elaboração de relatórios locais e habilidades relacionadas ao conhecimento profundo de contabilidade, iniciativa, liderança, flexibilidade para mudanças, capacidade analítica e raciocínio lógico são as mais demandadas.The bibliography on business control shows much fragility and asymmetry in itstheoretical basis if compared to its practice. In order to better understand the reasonsfor such differences, the present essay aims at presenting the results of a bibliographicalresearch on the functions of a controller and later, through a survey, to show the profileof this professional in medium and big enterprises of Florianopolis and its surroundings.Questionnaires were applied in order to identify specific issues such as status,subordination, training, functions and abilities connected with controllers. Themethodology adopted was descriptive, both quantitative and qualitative, and the workwas conducted through data collection and sample according to accessibility. The resultsreveal that the controller is a manager (41,18% who has graduated on

  1. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  2. Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC

    Directory of Open Access Journals (Sweden)

    Jungho Kang

    2015-06-01

    Full Text Available At the center of core technologies for a future cyber world, such as Internet of Things (IoT or big data, is a context-rich system that offers services by using situational information. The field where context-rich systems were first introduced is near-field communication (NFC-based electronic payments. Near-field Communication (NFC integrated payment services collect the payment information of the credit card and the location information to generate patterns in the user’s consumption or movement through big data technology. Based on such pattern information, tailored services, such as advertisement, are offered to users. However, there is difficulty in controlling access to personal information, as there is a collaborative relationship focused on the trusted service manager (TSM that is close knit to shared personal information. Moreover, in the case of Hadoop, among the many big data analytical technologies, it offers access control functions, but not a way to authorize the processing of personal information, making it impossible to grant authority between service providers to process information. As such, this paper proposes a key generation and distribution method, as well as a secure communication protocol. The analysis has shown that the efficiency was greater for security and performance compared to relation works.

  3. Security analysis and improvements of authentication and access control in the Internet of Things.

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  4. Improved efficiency access control equipment and explosive, weapons and drug abuse detection

    Energy Technology Data Exchange (ETDEWEB)

    Jenkins, A.; Milford, A.; Woollven, J.

    1985-01-01

    The second generation portal explosives detector has been designed with increased detection capability and convenience in service. The method of detection and performance relative to the first generation is described. A novel method of auto-calibration and self diagnosis is described and results are discussed. Improvements in convenience of operation have been achieved and operating space and costs reduced by combining metal detection capability, together with explosives detection. This allows both alarm signal and diagnostic outputs to be combined on a single remote panel in the guard room, and reduces the number of guards needed to man the access control. This type of access control is entirely a defensive measure against attack but a further additional feature is proposed which will also check the state of mind of all personnel passing through the check point. Any person suffering from the effect of narcotic or alcohol will be detected by their inability to reproduce their normal signature. A new method of signature analysis in five dimensions is described together with proposals for integrating the check without increasing the time in the test area. Some recent results on the effects of alcohol on signature reproduction is given.

  5. CONTEXT BASED ANDROID APPLICATIONADMINISTRATIVE ACCESS CONTROL (CBAA–AAC FOR SMART PHONES

    Directory of Open Access Journals (Sweden)

    S. Sharavanan

    2016-07-01

    Full Text Available Android applications in smart phones are generally towards provide greater flexibility and convince for users. Considering the fact that the Android applications are having privilege to access data and resources in mobile after it gets installed (one time permission provided by end user on the time installation, these application may also lead to issues in security for the user data as well as issues relate smart phone with peripheral environment. A practical example for an issue which relates smart phone with peripheral environment can be even an Android smart phone application of a college student use camera resource to capture photos of R&D cell and transfer without user or organization permission. The security of the organization and user should be prevented by providing an adoptable solution. The proposed concept of CBAA-AAC (Context Based Android Application Administrative Access Control is used to control the privileges of any Android application over a corresponding longitude and latitude by the organization administrator. In this way, administrator is able to block malicious application of every individual smart phone which can have activity towards utilizing services and resources that may affect the security of the organization, such an move is must for assuring security of any organization and educational institutions while they allow users to “bring their own smart phones/mobile devices” into the campus.

  6. The Arabidopsis SWI/SNF protein BAF60 mediates seedling growth control by modulating DNA accessibility

    KAUST Repository

    Jégu, Teddy

    2017-06-15

    Plant adaptive responses to changing environments involve complex molecular interplays between intrinsic and external signals. Whilst much is known on the signaling components mediating diurnal, light, and temperature controls on plant development, their influence on chromatin-based transcriptional controls remains poorly explored.In this study we show that a SWI/SNF chromatin remodeler subunit, BAF60, represses seedling growth by modulating DNA accessibility of hypocotyl cell size regulatory genes. BAF60 binds nucleosome-free regions of multiple G box-containing genes, opposing in cis the promoting effect of the photomorphogenic and thermomorphogenic regulator Phytochrome Interacting Factor 4 (PIF4) on hypocotyl elongation. Furthermore, BAF60 expression level is regulated in response to light and daily rhythms.These results unveil a short path between a chromatin remodeler and a signaling component to fine-tune plant morphogenesis in response to environmental conditions.

  7. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N.

    2016-01-01

    This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878

  8. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Meng Yi

    2016-11-01

    Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  9. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  10. Higher pharmaceutical public expenditure after direct price control: improved access or induced demand? The Colombian case.

    Science.gov (United States)

    Prada, Sergio I; Soto, Victoria E; Andia, Tatiana S; Vaca, Claudia P; Morales, Álvaro A; Márquez, Sergio R; Gaviria, Alejandro

    2018-01-01

    High pharmaceutical expenditure is one of the main concerns for policymakers worldwide. In Colombia, a middle-income country, outpatient prescription represents over 10% of total health expenditure in the mandatory benefits package (POS), and close to 90% in the complementary government fund (No POS). In order to control expenditure, since 2011, the Ministry of Health introduced price caps on inpatient drugs reimbursements by active ingredient. By 2013, more than 400 different products, covering 80% of public pharmaceutical expenditure were controlled. This paper investigates the effects of the Colombian policy efforts to control expenditure by controlling prices. Using SISMED data, the official database for prices and quantities sold in the domestic market, we estimate a Laspeyres price index for 90 relevant markets in the period 2011-2015, and, then, we estimate real pharmaceutical expenditure. Results show that, after direct price controls were enacted, price inflation decreased almost - 43%, but real pharmaceutical expenditure almost doubled due mainly to an increase in units sold. Such disproportionate increase in units sold maybe attributable to better access to drugs due to lower prices, and/or to an increase in marketing efforts by the pharmaceutical industry to maintain profits. We conclude that pricing interventions should be implemented along with a strong market monitoring to prevent market distortions such as inappropriate and unnecessary drug use.

  11. Infection control in hemodialysis units: A quick access to essential elements

    Directory of Open Access Journals (Sweden)

    Ayman Karkar

    2014-01-01

    Full Text Available Infection is the most common cause of hospitalization and the second most common cause of mortality among hemodialysis (HD patients, after cardiovascular disease. HD patients as well as the dialysis staff are vulnerable to contracting health-care-associated infections (HAIs due to frequent and prolonged exposure to many possible contaminants in the dialysis environment. The extracorporeal nature of the therapy, the associated common environmental conditions and the immune compromised status of HD patients are major predisposing factors. The evident increased potential for transmission of infections in the HD settings led to the creation and implementation of specific and stricter infection prevention and control measures in addition to the usual standard precautions. Different international organizations have generated guidelines and recommendations on infection prevention and control for implementation in the HD settings. These include the Centers for Disease Control and Prevention (CDC, the Association of Professionals in Infection Control (APIC, the Kidney Disease Outcomes Quality Initiative (K/DOQI, the European Best Practice Guidelines/European Renal Best Practice (EBPG/ERBP and the Kidney Disease: Improving Global Outcomes (KDIGO. However, these guidelines are extensive and sometimes vary among different guideline-producing bodies. Our aim in this review is to facilitate the access, increase the awareness and encourage implementation among dialysis providers by reviewing, extracting and comparing the essential elements of guidelines and recommendations on infection prevention and control in HD units.

  12. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...

  13. Transport Properties of Polymer Semiconductor Controlled by Ionic Liquid as a Gate Dielectric and a Pressure Medium

    NARCIS (Netherlands)

    Shi, Wu; Ye, Jianting; Checkelsky, Joseph G.; Terakura, Chieko; Iwasa, Yoshihiro

    An effective way of using ionic liquid as a gate dielectric as well as a pressure medium to tune the transport of an exemplary polymer semiconductor, poly(2,5-bis(3-tetradecyl-thiophene-2-yl)thieno[3,2-b]thiophene) (pBTTT-C14) is presented. Working as gate dielectrics, the ionic liquids exhibit the

  14. Utilization of Ceramic Inlays for Sealing Implant Prostheses Screw Access Holes: A Case-Control Study.

    Science.gov (United States)

    Mihali, Sorin; Canjau, Silvana; Bratu, Emanuel; Wang, Hom-Lay

    2016-01-01

    The aim of this study was to evaluate, in a case control study, the esthetic and functional clinical performance of ceramic inlays used for covering the screw access hole in single monolithic lithium disilicate full-contour crowns bonded on computer-aided design/computer-aided manufacturing (CAD/CAM) prefabricated titanium abutments in order to eliminate the drawbacks of alternative restorative methods. Twenty-eight patients with missing teeth in the lateral areas (premolars and molars) received screw-retained implant restorations. In half of the restorations (n = 14), composite fillings were used to seal the access hole (control group), while the other half was sealed with ceramic inlays (test group). To determine the restoration occlusal wear, impressions were obtained after the restorations were finalized, at 1 year, and at 2 years follow-up. The casts were scanned with a 3D Scanner Design System recording the anatomical surfaces of the white model replicates. Wear amounts (μm) were calculated as the maximum loss in height of the occlusal surface. The clinical evaluation was carried out using a kit specifically designed for assessing the FDI criteria. Statistics were performed using analysis of variance (ANOVA). A total of 58 restorations were delivered, and after 2 years of follow-up, the wear values were 228.20 ± 54.68 μm for the control group and 65.20 ± 7.24 μm for the ceramic inlay group. One-way ANOVA showed significant differences among the vertical loss between these two groups (P inlays appears to be a predictable, esthetic, and successful method of sealing the screw holes of the screw-retained implant restorations.

  15. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    Directory of Open Access Journals (Sweden)

    Antonio F. Gomez Skarmeta

    2013-11-01

    Full Text Available Internet of Things (IoT networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA has been standardized by the Internet engineering task force (IETF to carry the Extensible Authentication Protocol (EAP, which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1 to demonstrate the feasibility of EAP/PANA in IoT devices; (2 to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS, called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  16. Evaluation of an Enhanced Role-Based Access Control model to manage information access in collaborative processes for a statewide clinical education program.

    Science.gov (United States)

    Le, Xuan Hung; Doll, Terry; Barbosu, Monica; Luque, Amneris; Wang, Dongwen

    2014-08-01

    Managing information access in collaborative processes is a critical requirement to team-based biomedical research, clinical education, and patient care. We have previously developed a computation model, Enhanced Role-Based Access Control (EnhancedRBAC), and applied it to coordinate information access in the combined context of team collaboration and workflow for the New York State HIV Clinical Education Initiative (CEI) program. We report in this paper an evaluation study to assess the effectiveness of the EnhancedRBAC model for information access management in collaborative processes when applied to CEI. We designed a cross-sectional study and performed two sets of measurement: (1) degree of agreement between EnhancedRBAC and a control system CEIAdmin based on 9152 study cases, and (2) effectiveness of EnhancedRBAC in terms of sensitivity, specificity, and accuracy based on a gold-standard with 512 sample cases developed by a human expert panel. We applied stratified random sampling, partial factorial design, and blocked randomization to ensure a representative case sample and a high-quality gold-standard. With the kappa statistics of four comparisons in the range of 0.80-0.89, EnhancedRBAC has demonstrated a high level of agreement with CEIAdmin. When evaluated against the gold-standard, EnhancedRBAC has achieved sensitivities in the range of 97-100%, specificities at the level of 100%, and accuracies in the range of 98-100%. The initial results have shown that the EnhancedRBAC model can be effectively used to manage information access in the combined context of team collaboration and workflow for coordination of clinical education programs. Future research is required to perform longitudinal evaluation studies and to assess the effectiveness of EnhancedRBAC in other applications. Copyright © 2013 Elsevier Inc. All rights reserved.

  17. A highly efficient SDRAM controller supporting variable-length burst access and batch process for discrete reads

    Science.gov (United States)

    Li, Nan; Wang, Junzheng

    2016-03-01

    A highly efficient Synchronous Dynamic Random Access Memory (SDRAM) controller supporting variable-length burst access and batch process for discrete reads is proposed in this paper. Based on the Principle of Locality, command First In First Out (FIFO) and address range detector are designed within this controller to accelerate its responses to discrete read requests, which dramatically improves the average Effective Bus Utilization Ratio (EBUR) of SDRAM. Our controller is finally verified by driving the Micron 256-Mb SDRAM MT48LC16M16A2. Successful simulation and verification results show that our controller exhibits much higher EBUR than do most existing designs in case of discrete reads.

  18. Single-port Access Subtotal Laparoscopic Hysterectomy: A Prospective Case-Control Study.

    Science.gov (United States)

    Angioni, Stefano; Pontis, Alessandro; Pisanu, Adolfo; Mereu, Liliana; Roman, Horace

    2015-01-01

    The objective was to evaluate the perioperative outcomes, safety, and patient acceptance of single-port access laparoscopic subtotal hysterectomy (SPAL-SH) in comparison with conventional multiport access laparoscopic subtotal hysterectomy (MPAL-SH). Case-control study. Canadian Task Force Classification II-2. The study was conducted at university hospitals in Cagliari, Italy, and Rouen, France. Sixty-one women with metrorrhagia, abnormal uterine bleeding with uterine myomas, or symptomatic adenomyosis were included in the study. Thirty-one patients underwent SPAL-SH, and 30 patients underwent conventional MPAL-SH. We analyzed the data to compare the outcomes of SPAL-SH versus MPAL-SH. Patients in the SPAL-SH group had longer operative times than those in the MPAL-SH group (p < .001) but shorter hospital stays (p < .001). Postoperative pain immediately after surgery, after 6 hours, and after 24 hours were lower in the SPAL-SH group (p < .001). The SPAL-SH group reported significantly higher cosmetic satisfaction at 1, 4, and 24 weeks after surgery (p < .01). We conclude that SPAL-SH is a feasible and safe alternative to standard MPAL-SH in selected patients. Ongoing refinement of the surgical technique and instrumentation is likely to expand its role in gynecologic surgery in the future. In addition, SPAL-SH has a definite benefit in relation to body image and cosmesis. Copyright © 2015 AAGL. Published by Elsevier Inc. All rights reserved.

  19. Near infrared spectroscopy for controlling the quality of distal leg perfusion in remote access cardiopulmonary bypass.

    Science.gov (United States)

    Schachner, Thomas; Bonaros, Nikolaos; Bonatti, Johannes; Kolbitsch, Christian

    2008-12-01

    The prevention of leg ischemia is necessary in all patients undergoing femoral artery cannulation for extracorporeal circulation. Near infrared spectroscopy (NIRS) is an established non-invasive method for measuring tissue oxygen saturation. Ten patients underwent robotically assisted endoscopic coronary surgery or ASD repair on the arrested heart using aortic endo-occlusion catheters. They were monitored by transcutaneous NIRS (placed on both lower legs) for quality control of distal leg perfusion during femoral access cardiopulmonary bypass. The baseline NIRS values were 61 (52-80) on the cannulated side versus 70 (53-80) on the contralateral leg (p=n.s.). During clamping of the femoral artery for installation of the remote access perfusion system the tissue oxygen saturation dropped to 38 (18-58) (p=0.001 vs baseline) while it remained stable on the contralateral leg. After successful implantation of the distal leg perfusion the NIRS values normalized to similar amounts on both legs. We conclude that transcutaneous NIRS of the lower legs might be a useful non-invasive tool for monitoring leg perfusion in patients undergoing extracorporeal circulation via the femoral vessels.

  20. RFID card based access control system with counter for Indus Complex

    International Nuclear Information System (INIS)

    Jathar, M.R.; Vikas, Meshram; Patidar, S.C.

    2015-01-01

    As per norms of the Atomic energy regulatory board (AERB) to operate a facility in round the clock which has a potential of radiation exposure, radiation safety rules are to be followed. Indus -1 and Indus-2 are synchrotron radiation sources which are open for various users round the clock. To monitor the persons inside the defined zone at any given time, a system is setup consisting of RF ID cards and their readers along with dedicated software. Software is developed in Visual Basic and uses UDP network protocol for receiving data from readers installed at various locations and connected to local area network. The paper describes the access control scheme followed in Indus Accelerator Complex. (author)

  1. An Efficient Solution for Hierarchical Access Control Problem in Cloud Environment

    Directory of Open Access Journals (Sweden)

    Bing-Zhe He

    2014-01-01

    Full Text Available The time-bound hierarchical key assignment scheme provides a cryptographic solution for the access control problem in distributed systems (e.g., Pay-TV and cloud computing applications. Most time-bound hierarchical key assignment schemes can be divided into two types: adopting tamper-resistant devices and utilizing public values. Despite the fact that adopting tamper-resistant devices can easily resist to collusion attacks, utilizing public values is much cheaper and more suitable for cloud environment. In this paper, we proposed a new time-bound hierarchical key assignment scheme, which can effectively defeat the collusion attack. Besides, the proposed scheme utilizes public values instead of tamper-resistant devices, which will restrict user’s convenience. Compared with the previous works, our scheme requires fewer public values and has better performance.

  2. Characterization of coded random access with compressive sensing based multi user detection

    DEFF Research Database (Denmark)

    Ji, Yalei; Stefanovic, Cedomir; Bockelmann, Carsten

    2014-01-01

    The emergence of Machine-to-Machine (M2M) communication requires new Medium Access Control (MAC) schemes and physical (PHY) layer concepts to support a massive number of access requests. The concept of coded random access, introduced recently, greatly outperforms other random access methods...... coded random access with CS-MUD on the PHY layer and show very promising results for the resulting protocol....

  3. Coordinated Scheduling and Power Control in Cloud-Radio Access Networks

    KAUST Repository

    Douik, Ahmed

    2015-12-01

    This paper addresses the joint coordinated scheduling and power control problem in cloud-enabled networks. Consider the downlink of a cloud-radio access network (CRAN), where the cloud is only responsible for the scheduling policy, power control, and synchronization of the transmit frames across the single-antenna base-stations (BS). The transmit frame consists of several time/frequency blocks, called power-zones (PZ). The paper considers the problem of scheduling users to PZs and determining their power levels (PL), by maximizing the weighted sum-rate under the practical constraints that each user cannot be served by more than one base-station, but can be served by one or more power-zones within each base-station frame. The paper solves the problem using a graph theoretical approach by introducing the joint scheduling and power control graph formed by several clusters, where each is formed by a set of vertices, representing the possible association of users, BSs, and PLs for one specific PZ. The problem is, then, formulated as a maximumweight clique problem, in which the weight of each vertex is the sum of the benefits of the individual associations belonging to that vertex. Simulation results suggest that the proposed crosslayer scheme provides appreciable performance improvement as compared to schemes from recent literature.

  4. Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things

    Directory of Open Access Journals (Sweden)

    Zhen Qin

    2017-01-01

    Full Text Available Online healthcare social networks (OHSNs play an essential role in sharing information among medical experts and patients who are equipped with similar experiences. To access other patients’ data or experts’ diagnosis anywhere and anytime, it is necessary to integrate the OHSN into the Internet as part of the Internet of Things (IoT. Therefore, it is crucial to design an efficient and versatile access control scheme that can grant and revoke a user to access the OHSN. In this paper, we propose novel attribute-based encryption (ABE features with user revocation and verifiable decryption outsourcing to control the access privilege of the users. The security of the proposed ABE scheme is given in the well-studied random oracle model. With the proposed ABE scheme, the malicious users can be excluded from the system and the user can offload most of the overhead in the decryption to an untrusted cloud server in a verifiable manner. An access control scheme for the OHSN has been given in the context of the IoT based on the proposed ABE scheme. The simulation demonstrates that our access control mechanism is practical.

  5. Development of Decision-Making Automated System for Optimal Placement of Physical Access Control System’s Elements

    Science.gov (United States)

    Danilova, Olga; Semenova, Zinaida

    2018-04-01

    The objective of this study is a detailed analysis of physical protection systems development for information resources. The optimization theory and decision-making mathematical apparatus is used to formulate correctly and create an algorithm of selection procedure for security systems optimal configuration considering the location of the secured object’s access point and zones. The result of this study is a software implementation scheme of decision-making system for optimal placement of the physical access control system’s elements.

  6. Analyzing the effect of routing protocols on media access control protocols in radio networks

    Energy Technology Data Exchange (ETDEWEB)

    Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

    2002-01-01

    We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

  7. Development and characterization of 96 microsatellite markers suitable for QTL mapping and accession control in an Arabidopsis core collection.

    Science.gov (United States)

    Cosson, Patrick; Decroocq, Véronique; Revers, Frédéric

    2014-01-22

    To identify plant genes involved in various key traits, QTL mapping is a powerful approach. This approach is based on the use of mapped molecular markers to identify genomic regions controlling quantitative traits followed by a fine mapping and eventually positional cloning of candidate genes. Mapping technologies using SNP markers are still rather expensive and not feasible in every laboratory. In contrast, microsatellite (also called SSR for Simple Sequence Repeat) markers are technologically less demanding and less costly for any laboratory interested in genetic mapping. In this study, we present the development and the characterization of a panel of 96 highly polymorphic SSR markers along the Arabidopsis thaliana genome allowing QTL mapping among accessions of the Versailles 24 core collection that covers a high percentage of the A. thaliana genetic diversity. These markers can be used for any QTL mapping analysis involving any of these accessions. We optimized the use of these markers in order to reveal polymorphism using standard PCR conditions and agarose gel electrophoresis. In addition, we showed that the use of only three of these markers allows differentiating all 24 accessions which makes this set of markers a powerful tool to control accession identity or any cross between any of these accessions. The set of SSR markers developed in this study provides a simple and efficient tool for any laboratory focusing on QTL mapping in A. thaliana and a simple means to control seed stock or crosses between accessions.

  8. Consensus building on access to controlled medicines: a four-stage Delphi consensus procedure.

    Science.gov (United States)

    Jünger, Saskia; Brearley, Sarah; Payne, Sheila; Mantel-Teeuwisse, Aukje K; Lynch, Thomas; Scholten, Willem; Radbruch, Lukas

    2013-12-01

    In 2011, the World Health Organization (WHO) published the policy guidelines Ensuring Balance in National Controlled Substances Policies-Guidance for Availability and Accessibility of Controlled Medicines, presenting a revised version of the previous guidelines from 2000. To describe the consensus process that guided the revision of the guidelines. A four-stage revision process was undertaken with a panel of 29 international experts from palliative care, public health, and harm reduction: 1) a qualitative inventory of required changes by means of a structured checklist, 2) & 3) a two-round online consensus Delphi process about the draft revision of the guidelines, and 4) a WHO advisory meeting for the discussion of remaining controversies and final issues. The qualitative inventory resulted in a draft revision of the guidelines meeting requirements on different levels, such as a broader focus and more accurate evidence. Operationalization of the guidelines was improved by specifying measures, procedures, and responsibilities. The Delphi procedure provided concrete indications for the rewording of both the guidelines and the associated text. During the advisory meeting, any persistent disagreements were systematically discussed to achieve consensus on the new version of the guidelines. The four-stage multimethod consensus process resulted in a substantial revision to the WHO guidelines. This takes into account the increase in knowledge about opioid medication since the first edition of the guidelines. Disagreement emerging from the process underlines the complexity of preparing guidance because of the delicate balance between need and control. Copyright © 2013 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights reserved.

  9. Development of Remote Monitoring and a Control System Based on PLC and WebAccess for Learning Mechatronics

    Directory of Open Access Journals (Sweden)

    Wen-Jye Shyr

    2013-02-01

    Full Text Available This study develops a novel method for learning mechatronics using remote monitoring and control, based on a programmable logic controller (PLC and WebAccess. A mechatronics module, a Web-CAM and a PLC were integrated with WebAccess software to organize a remote laboratory. The proposed system enables users to access the Internet for remote monitoring and control of the mechatronics module via a web browser, thereby enhancing work flexibility by enabling personnel to control mechatronics equipment from a remote location. Mechatronics control and long-distance monitoring were realized by establishing communication between the PLC and WebAccess. Analytical results indicate that the proposed system is feasible. The suitability of this system is demonstrated in the department of industrial education and technology at National Changhua University of Education, Taiwan. Preliminary evaluation of the system was encouraging and has shown that it has achieved success in helping students understand concepts and master remote monitoring and control techniques.

  10. Presidential Management Fellows (PMF) Talent Acquisition System, PMF-TAS (ACCESS CONTROLLED)

    Data.gov (United States)

    Office of Personnel Management — Application and Assessment system for Presidential Management Fellows (PMF) and PMF Science, Technology, Engineering, and Math (STEM) programs. This sytem is access...

  11. Cultivation of spirulina platensis and its growth behavior controlling cultivation medium; Baiyoeki sosei no seigyo ni yoru spirulina platensis no baiyo oyobi sono zoshoku kyodo

    Energy Technology Data Exchange (ETDEWEB)

    Kobayashi, K.; Fujita, K. [Babcock-Hitachi K.K., Tokyo (Japan)

    1996-01-20

    Cultivation of Spirulina platensis while controlling pH and nitrate ion in the culture medium was investigated in order to obtain a high density culture. In the cultivation of Spirulina platensis using sodium bicarbonate as a carbon source, the pH value increased during growth of Spirulina, and then the growth stopped at a pH value of more than 12. The cell concentration reached 2.2g/l by maintaining a pH range of 8.5 to 10.0 using CO2 gas without controlling the nitrate ion concentration. By controlling the pH and adding nitrate to a concentration of 2.0g/l, the cell concentration reached 4.2g/l at 350 hours. It was found that the cell concentration was about four times that of the culture without controlling pH and nitrate. 4 refs., 6 figs.

  12. Ongoing spontaneous activity controls access to consciousness: a neuronal model for inattentional blindness.

    Directory of Open Access Journals (Sweden)

    Stanislas Dehaene

    2005-05-01

    Full Text Available Even in the absence of sensory inputs, cortical and thalamic neurons can show structured patterns of ongoing spontaneous activity, whose origins and functional significance are not well understood. We use computer simulations to explore the conditions under which spontaneous activity emerges from a simplified model of multiple interconnected thalamocortical columns linked by long-range, top-down excitatory axons, and to examine its interactions with stimulus-induced activation. Simulations help characterize two main states of activity. First, spontaneous gamma-band oscillations emerge at a precise threshold controlled by ascending neuromodulator systems. Second, within a spontaneously active network, we observe the sudden "ignition" of one out of many possible coherent states of high-level activity amidst cortical neurons with long-distance projections. During such an ignited state, spontaneous activity can block external sensory processing. We relate those properties to experimental observations on the neural bases of endogenous states of consciousness, and particularly the blocking of access to consciousness that occurs in the psychophysical phenomenon of "inattentional blindness," in which normal subjects intensely engaged in mental activity fail to notice salient but irrelevant sensory stimuli. Although highly simplified, the generic properties of a minimal network may help clarify some of the basic cerebral phenomena underlying the autonomy of consciousness.

  13. Ongoing spontaneous activity controls access to consciousness: a neuronal model for inattentional blindness.

    Science.gov (United States)

    Dehaene, Stanislas; Changeux, Jean-Pierre

    2005-05-01

    Even in the absence of sensory inputs, cortical and thalamic neurons can show structured patterns of ongoing spontaneous activity, whose origins and functional significance are not well understood. We use computer simulations to explore the conditions under which spontaneous activity emerges from a simplified model of multiple interconnected thalamocortical columns linked by long-range, top-down excitatory axons, and to examine its interactions with stimulus-induced activation. Simulations help characterize two main states of activity. First, spontaneous gamma-band oscillations emerge at a precise threshold controlled by ascending neuromodulator systems. Second, within a spontaneously active network, we observe the sudden "ignition" of one out of many possible coherent states of high-level activity amidst cortical neurons with long-distance projections. During such an ignited state, spontaneous activity can block external sensory processing. We relate those properties to experimental observations on the neural bases of endogenous states of consciousness, and particularly the blocking of access to consciousness that occurs in the psychophysical phenomenon of "inattentional blindness," in which normal subjects intensely engaged in mental activity fail to notice salient but irrelevant sensory stimuli. Although highly simplified, the generic properties of a minimal network may help clarify some of the basic cerebral phenomena underlying the autonomy of consciousness.

  14. Design of Active Queue Management for Robust Control on Access Router for Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Åhlund Christer

    2011-01-01

    Full Text Available The Internet architecture is a packet switching technology that allows dynamic sharing of bandwidth among different flows with in an IP network. Packets are stored and forwarded from one node to the next until reaching their destination. Major issues in this integration are congestion control and how to meet different quality of service requirements associated with various services. In other words streaming media quality degrades with increased packet delay and jitter caused by network congestion. To mitigate the impact of network congestion, various techniques have been used to improve multimedia quality and one of those techniques is Active Queue Management (AQM. Access routers require a buffer to hold packets during times of congestion. A large buffer can absorb the bursty arrivals, and this tends to increase the link utilizations but results in higher queuing delays. Traffic burstiness has a considerable negative impact on network performance. AQM is now considered an effective congestion control mechanism for enhancing transport protocol performance over wireless links. In order to have good link utilization, it is necessary for queues to adapt to varying traffic loads. This paper considers a particular scheme which is called Adaptive AQM (AAQM and studies its performance in the presence of feedback delays and its ability to maintain a small queue length as well as its robustness in the presence of traffic burstiness. The paper also presents a method based on the well-known Markov Modulated Poisson Process (MPP to capture traffic burstiness and buffer occupancy. To demonstrate the generality of the presented method, an analytic model is described and verified by extensive simulations of different adaptive AQM algorithms. The analysis and simulations show that AAQM outperforms the other AQMs with respect to responsiveness and robustness.

  15. Unified Information Access in Product Creation with an Integrated Control Desk

    Science.gov (United States)

    Wrasse, Kevin; Diener, Holger; Hayka, Haygazun; Stark, Rainer

    2017-06-01

    Customers demand for individualized products leads to a large variety of different products in small series and single-unit production. A high flexibility pressure in product creation is one result of this trend. In order to counteract the pressure, the information steadily increasing by Industry 4.0 must be made available at the workplace. Additionally, a better exchange of information between product development, production planning and production is necessary. The improvement of individual systems, like CAD, PDM, ERP and MES, can only achieve this to a limited extent. Since they mostly use systems from different manufacturers, the necessary deeper integration of information is only feasible for SMEs to a limited extend. The presented control desk helps to ensure a more flexible product creation as well as information exchange. It captures information from different IT systems in the production process and presents them integrated, task-oriented and oriented to the user’s mental model, e.g. information of the production combined with the 3D model of product parts, or information about product development on the 3D model of the production. The solution is a digital 3D model of the manufacturing environment, which is enriched by billboards for a quick information overview and web service windows to access detailed MES and PDM information. By this, the level of abstraction can be reduced and reacts to changed requirements in the short term, making informed decisions. The interaction with the control stands utilizes the touch skills of mobile and fixed systems such as smartphones, tablets and multitouch tables.

  16. Simple models of network access, with applications to the design of joint rate and admission control

    NARCIS (Netherlands)

    Mandjes, M.R.H.; Mitra, Debasis; Scheinhardt, Willem R.W.

    2002-01-01

    At the access to networks, in contrast to the core, distances and feedback delays, as well as link capacities are small, which has network engineering implications that are investigated in this paper. We consider a single point in the access network which multiplexes several bursty users. The users

  17. 75 FR 69791 - Risk Management Controls for Brokers or Dealers With Market Access

    Science.gov (United States)

    2010-11-15

    ... or Dealers With Market Access; Final Rule #0;#0;Federal Register / Vol. 75 , No. 219 / Monday... or Dealers With Market Access AGENCY: Securities and Exchange Commission. ACTION: Final rule. SUMMARY... the Securities Exchange Act of 1934 (``Exchange Act''). Rule 15c3-5 will require brokers or dealers...

  18. An Ounce of Prevention: Technologists Use Network-Access Control to Protect System Resources, Students

    Science.gov (United States)

    Bolch, Matt

    2009-01-01

    Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…

  19. Study protocol for a cluster-randomised controlled trial of an NCD access to medicines initiative: evaluation of Novartis Access in Kenya.

    Science.gov (United States)

    Rockers, Peter C; Wirtz, Veronika J; Vian, Taryn; Onyango, Monica A; Ashigbie, Paul G; Laing, Richard

    2016-11-25

    Novartis recently launched Novartis Access, an initiative to provide a basket of reduced price medicines for non-communicable diseases (NCDs) to be sold through the public and private non-profit sectors in programme countries. This study will evaluate the impact of Novartis Access on the availability and price of NCD medicines at health facilities and households in Kenya, the first country to receive the programme. This study will be a cluster-randomised controlled trial. 8 counties in Kenya will be randomly assigned to the intervention or control group using a covariate constrained randomisation method to maximise balance on demographic and health characteristics. In intervention counties, public and private non-profit health facilities will be able to order Novartis Access NCD medicines from the Mission for Essential Drugs and Supplies (MEDS). Data will be collected from a random sample of 384 health facilities and 800 households at baseline, midline after 1-year of intervention, and end-line after 2 years. Quarterly surveillance data will also be collected from health facilities and a subsample of households through phone-based interviews. Households will be eligible if at least one resident has been previously diagnosed and prescribed a medicine for an NCD addressed by Novartis Access, including hypertension and diabetes. The primary outcomes will be availability and price of NCD medicines at health facilities, and availability, price, and expenditures on NCD medicines at households. Impacts will be estimated using intention-to-treat analysis. This protocol was approved by the Institutional Review Boards at Strathmore University and at Boston University. Informed consent will be obtained from all participants at the start of the trial. The findings of the trial will be disseminated through peer-reviewed journals, international conferences, and meetings and events organised with local stakeholders. NCT02773095. Published by the BMJ Publishing Group Limited

  20. Formation of the active medium in high-power repetitively pulsed gas lasers pumped by an electron-beam-controlled discharge

    Science.gov (United States)

    Bulaev, V. D.; Lysenko, S. L.

    2015-07-01

    A high-power repetitively pulsed e-beam-controlled discharge CO2 laser is simulated numerically; the simulation results are compared with experimental data. Optimal sizes and design of electrodes and configuration of the external magnetic field are found, which allow one to introduce no less than 90% electric pump energy into a specified volume of the active medium, including the active volume of a laser with an aperture of 110 × 110 cm. The results obtained can also be used to design other types of highpower gas lasers.

  1. Worktime control access, need and use in relation to work-home interference, fatigue, and job motivation

    NARCIS (Netherlands)

    Nijp, H.H.; Beckers, D.G.J.; Kompier, M.A.J.; Bossche, S.N.J. van den; Geurts, S.A.E.

    2015-01-01

    OBJECTIVE: Worktime control (WTC) has been suggested as a tool to reduce employees' work-home interference and fatigue and improve job motivation. The purpose of this study was twofold: (i) to examine the prevalence of employees' need for, access to, and use of WTC, as well as the incongruence

  2. Thermal inactivation of Bacillus cereus spores affected by the solutes used to control water activity of the heating medium.

    Science.gov (United States)

    Mazas, M; Martínez, S; López, M; Alvarez, A B; Martin, R

    1999-12-01

    The heat resistance of B. cereus spores (ATCC 7004, 4342 and 9818) over a wide temperature range (92-125 degrees C) in aqueous solutions of NaCl, LiCl, sucrose and glycerol at different water activities (1.00-0.71) was investigated. Sodium chloride in the heating medium tended to protect the spores of B. cereus against heat. The z-values increased significantly (P 0.87 M), the D-values showed an increase, although only those obtained for strain 4342 in sucrose solutions 2.22 M were higher than those found in pure water. The z-values were significantly higher (P < 0.05) when sucrose was added at concentrations above 1.42 M, except for strain 4342. When a(w) was lowered from 0.96 to 0.71 with glycerol, D-values obtained gradually increased, about 30, 50 and 60 fold for 4342, 7004 and 9818 strains, respectively. No significant effect on z-values were detected.

  3. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  4. Coupling Spatial Segregation with Synthetic Circuits to Control Bacterial Survival (Open Access)

    Science.gov (United States)

    2016-02-29

    Subject Categories Synthetic Biology & Biotechnology ; Quantitative Biology & Dynamical Systems DOI 10.15252/msb.20156567 | Received 9 September 2015...critical for realizing the full potential of synthetic biology for diverse applications in medicine, environment, and biotechnology (Benner & Sismour...S7). Programming sustained safeguard using a pulsing condition Both limitations can be overcome by adopting periodic pulsing of a fresh medium (Fig 4A

  5. The empirical relationship between the managerial conduct and internal control activities in South African small, medium and micro enterprises

    Directory of Open Access Journals (Sweden)

    Juan-Pierre Bruwer

    2017-07-01

    Aim: Since a system of internal control comprises five inter-related elements, while also taking into consideration that management is ultimately responsible for the internal control in their respective business entities, which is greatly influenced by their managerial conduct, this research study placed focus on determining the relationship which exist between the managerial conduct and the internal control activities evident in South African SMMEs. Setting: This study was conducted in the Cape Metropole, South Africa by obtaining responses from 240 stakeholders of SMMEs: 120 members of management and 120 employees. Methods: In order to achieve the latter, quantitative data were collected through a questionnaire and analysed accordingly through both descriptive statistics and inferential statistics. Results: From the results, a very weak negative statistically significant relationship was identified between the managerial conduct and the internal control activities evident in South African SMMEs. Conclusion: Essentially, management and employees should revisit the internal control activities evident in their respective SMMEs through placing emphasis on those internal control activities which can be built on their control environment.

  6. The ribosome quality control pathway can access nascent polypeptides stalled at the Sec61 translocon.

    Science.gov (United States)

    von der Malsburg, Karina; Shao, Sichen; Hegde, Ramanujan S

    2015-06-15

    Cytosolic ribosomes that stall during translation are split into subunits, and nascent polypeptides trapped in the 60S subunit are ubiquitinated by the ribosome quality control (RQC) pathway. Whether the RQC pathway can also target stalls during cotranslational translocation into the ER is not known. Here we report that listerin and NEMF, core RQC components, are bound to translocon-engaged 60S subunits on native ER membranes. RQC recruitment to the ER in cultured cells is stimulated by translation stalling. Biochemical analyses demonstrated that translocon-targeted nascent polypeptides that subsequently stall are polyubiquitinated in 60S complexes. Ubiquitination at the translocon requires cytosolic exposure of the polypeptide at the ribosome-Sec61 junction. This exposure can result from either failed insertion into the Sec61 channel or partial backsliding of translocating nascent chains. Only Sec61-engaged nascent chains early in their biogenesis were relatively refractory to ubiquitination. Modeling based on recent 60S-RQC and 80S-Sec61 structures suggests that the E3 ligase listerin accesses nascent polypeptides via a gap in the ribosome-translocon junction near the Sec61 lateral gate. Thus the RQC pathway can target stalled translocation intermediates for degradation from the Sec61 channel. © 2015 von der Malsburg et al. This article is distributed by The American Society for Cell Biology under license from the author(s). Two months after publication it is available to the public under an Attribution–Noncommercial–Share Alike 3.0 Unported Creative Commons License (http://creativecommons.org/licenses/by-nc-sa/3.0).

  7. Evaluation of a flexible column-based access control security model ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 22, No 1 (2015) >. Log in or Register to get access to full text downloads.

  8. Report: EPA Could Improve Physical Access and Service Continuity/Contingency Controls for Financial and Mixed-Financial Systems Located at its Research Triangle Park Campus

    Science.gov (United States)

    Report #2006-P-00005, December 14, 2005. Controls needed to be improved in areas such as visitor access to facilities, use of contractor access badges, and general physical access to the NCC, computer rooms outside the NCC, and media storage rooms.

  9. New fuel air control strategy for reducing NOx emissions from corner-fired utility boilers at medium-low loads

    DEFF Research Database (Denmark)

    Zhao, Sinan; Fang, Qingyan; Yin, Chungen

    2017-01-01

    Due to the rapidly growing renewable power, the fossil fuel power plants have to be increasingly operated under large and rapid load change conditions, which can induce various challenges. This work aims to reduce NOx emissions of large-scale corner-fired boilers operated at medium–low loads....... The combustion characteristics and NOx emissions from a 1000 MWe corner-fired tower boiler under different loads are investigated experimentally and numerically. A new control strategy for the annular fuel air is proposed and implemented in the boiler, in which the secondary air admitted to the furnace through...... of the selective catalytic reduction (SCR) system by about 20% at medium–low loads, compared to those based on the original control. The new control strategy has also been successfully applied to two other corner-fired boilers to achieve a significant NOx emission reduction at partial loads. In all three...

  10. Dynamic Information Management and Exchange for Command and Control Applications, Modelling and Enforcing Category-Based Access Control via Term Rewriting

    Science.gov (United States)

    2015-03-01

    Workshop on Logical and Se- mantic Frameworks, with Applications, Brasilia , Brazil, September 2014. Electronic Notes in Theoretical Computer Science (to... Brasilia , Brazil, September 2014, 2015. [3] S. Barker. The next 700 access control models or a unifying meta-model? In SACMAT 2009, 14th ACM Symposium on

  11. Worktime control access, need and use in relation to work-home interference, fatigue, and job motivation.

    Science.gov (United States)

    Nijp, Hylco H; Beckers, Debby G J; Kompier, Michiel A J; van den Bossche, Seth N J; Geurts, Sabine A E

    2015-07-01

    Worktime control (WTC) has been suggested as a tool to reduce employees' work-home interference and fatigue and improve job motivation. The purpose of this study was twofold: (i) to examine the prevalence of employees' need for, access to, and use of WTC, as well as the incongruence between need for and access to WTC (ie, mismatch); and (ii) to examine the associations of this mismatch and the use of WTC with employees' work-home interference (WHI), fatigue and job motivation. Questionnaire data were collected among a large (N=2420) quasi-representative sample of Dutch employees. The prevalence of WTC need, access, use, and mismatch was assessed by means of descriptive statistics. Associations with employees' outcomes were assessed by analyses of covariance. The need for WTC was highly prevalent. For many employees, we observed a negative mismatch between access to and need for WTC (ie, accessmotivation. The use of WTC was also highly prevalent, but no meaningful associations were found with the outcome variables. It is relevant to examine WTC comprehensively, that is, to include measurements of employees' need for and access to WTC and assess employees' (mis)match between components of WTC. For practice, we recommend to introduce WTC on an organizational level and assess employees' need for WTC on an individual basis.

  12. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...... and enable wider areas' energy efficiency networking. The energy related information of the networks and the types of the traffic flows are collected and utilized for the end-to-end QoS provision. Dynamic network simulation results show that by applying different routing algorithms according to the type...

  13. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    Science.gov (United States)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  14. VT Limited Access Highways

    Data.gov (United States)

    Vermont Center for Geographic Information — A limited-access road, known by various terms worldwide, including limited-access highway, dual carriageway, expressway, and partial controlled access highway, is a...

  15. Methods for calculation of undelivered electricity in medium voltage network that is not integrated into the remote control system

    Directory of Open Access Journals (Sweden)

    Vrcelj Nada

    2013-01-01

    Full Text Available The method is based on data obtained from the so-called. hand-held measuring current at 10 kV voltage level and from reports of outages at reclosers that are installed in a part of network that is observed. At first, is calculates the electrical load of the main distribution power lines, and then simulates the corresponding power flow and calculates the undelivered electricity. The method was applied to parts of the network PD ED Belgrade that are not in the remote control system and is developed for the purpose of considering the effects of automation in the 10 kV PD ED Belgrade.

  16. RESEARCH Improving access and quality of care in a TB control ...

    African Journals Online (AJOL)

    use a quality improvement approach to improve access to and quality of TB diagnosis and care. Integrated HIV/TB/STI audit tools were developed between 2003 and 20066 and routinely implemented in all. 146 public primary care facilities in Cape Town in 2007. The clinical audit emphasised reflective practice and using ...

  17. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered...

  18. Transcriptomic variation among six Arabidopsis thaliana accessions identified several novel genes controlling aluminium tolerance.

    Science.gov (United States)

    Kusunoki, Kazutaka; Nakano, Yuki; Tanaka, Keisuke; Sakata, Yoichi; Koyama, Hiroyuki; Kobayashi, Yuriko

    2017-02-01

    Differences in the expression levels of aluminium (Al) tolerance genes are a known determinant of Al tolerance among plant varieties. We combined transcriptomic analysis of six Arabidopsis thaliana accessions with contrasting Al tolerance and a reverse genetic approach to identify Al-tolerance genes responsible for differences in Al tolerance between accession groups. Gene expression variation increased in the signal transduction process under Al stress and in growth-related processes in the absence of stress. Co-expression analysis and promoter single nucleotide polymorphism searching suggested that both trans-acting polymorphisms of Al signal transduction pathway and cis-acting polymorphisms in the promoter sequences caused the variations in gene expression associated with Al tolerance. Compared with the wild type, Al sensitivity increased in T-DNA knockout (KO) lines for five genes, including TARGET OF AVRB OPERATION1 (TAO1) and an unannotated gene (At5g22530). These were identified from 53 Al-inducible genes showing significantly higher expression in tolerant accessions than in sensitive accessions. These results indicate that the difference in transcriptional signalling is partly associated with the natural variation in Al tolerance in Arabidopsis. Our study also demonstrates the feasibility of comparative transcriptome analysis by using natural genetic variation for the identification of genes responsible for Al stress tolerance. © 2016 John Wiley & Sons Ltd.

  19. Effects of feed access after hatch and inclusion of fish oil and medium chain fatty acids in a pre-starter diet on broiler chicken growth performance and humoral immunity

    NARCIS (Netherlands)

    Lamot, D.M.; Klein, van der S.A.S.; Linde, van de I.B.; Wijtten, P.J.A.; Kemp, B.; Brand, van den H.; Lammers, A.

    2016-01-01

    Delayed feed and water access is known to impair growth performance of day old broiler chickens. Although effects of feed access on growth performance and immune function of broilers have been examined before, effects of dietary composition and its potential interaction with feed access are

  20. Advanced Instrumentation and Control Methods for Small and Medium Reactors with IRIS Demonstration. Final Report. Volume 1

    International Nuclear Information System (INIS)

    Hines, J. Wesley; Upadhyaya, Belle R.; Doster, J. Michael; Edwards, Robert M.; Lewis, Kenneth D.; Turinsky, Paul; Coble, Jamie

    2011-01-01

    Development and deployment of small-scale nuclear power reactors and their maintenance, monitoring, and control are part of the mission under the Small Modular Reactor (SMR) program. The objectives of this NERI-consortium research project are to investigate, develop, and validate advanced methods for sensing, controlling, monitoring, diagnosis, and prognosis of these reactors, and to demonstrate the methods with application to one of the proposed integral pressurized water reactors (IPWR). For this project, the IPWR design by Westinghouse, the International Reactor Secure and Innovative (IRIS), has been used to demonstrate the techniques developed under this project. The research focuses on three topical areas with the following objectives. Objective 1 - Develop and apply simulation capabilities and sensitivity/uncertainty analysis methods to address sensor deployment analysis and small grid stability issues. Objective 2 - Develop and test an autonomous and fault-tolerant control architecture and apply to the IRIS system and an experimental flow control loop, with extensions to multiple reactor modules, nuclear desalination, and optimal sensor placement strategy. Objective 3 - Develop and test an integrated monitoring, diagnosis, and prognosis system for SMRs using the IRIS as a test platform, and integrate process and equipment monitoring (PEM) and process and equipment prognostics (PEP) toolboxes. The research tasks are focused on meeting the unique needs of reactors that may be deployed to remote locations or to developing countries with limited support infrastructure. These applications will require smaller, robust reactor designs with advanced technologies for sensors, instrumentation, and control. An excellent overview of SMRs is described in an article by Ingersoll (2009). The article refers to these as deliberately small reactors. Most of these have modular characteristics, with multiple units deployed at the same plant site. Additionally, the topics focus

  1. An effective and secure key-management scheme for hierarchical access control in E-medicine system.

    Science.gov (United States)

    Odelu, Vanga; Das, Ashok Kumar; Goswami, Adrijit

    2013-04-01

    Recently several hierarchical access control schemes are proposed in the literature to provide security of e-medicine systems. However, most of them are either insecure against 'man-in-the-middle attack' or they require high storage and computational overheads. Wu and Chen proposed a key management method to solve dynamic access control problems in a user hierarchy based on hybrid cryptosystem. Though their scheme improves computational efficiency over Nikooghadam et al.'s approach, it suffers from large storage space for public parameters in public domain and computational inefficiency due to costly elliptic curve point multiplication. Recently, Nikooghadam and Zakerolhosseini showed that Wu-Chen's scheme is vulnerable to man-in-the-middle attack. In order to remedy this security weakness in Wu-Chen's scheme, they proposed a secure scheme which is again based on ECC (elliptic curve cryptography) and efficient one-way hash function. However, their scheme incurs huge computational cost for providing verification of public information in the public domain as their scheme uses ECC digital signature which is costly when compared to symmetric-key cryptosystem. In this paper, we propose an effective access control scheme in user hierarchy which is only based on symmetric-key cryptosystem and efficient one-way hash function. We show that our scheme reduces significantly the storage space for both public and private domains, and computational complexity when compared to Wu-Chen's scheme, Nikooghadam-Zakerolhosseini's scheme, and other related schemes. Through the informal and formal security analysis, we further show that our scheme is secure against different attacks and also man-in-the-middle attack. Moreover, dynamic access control problems in our scheme are also solved efficiently compared to other related schemes, making our scheme is much suitable for practical applications of e-medicine systems.

  2. A Novel Architecture for Adaptive Traffic Control in Network on Chip using Code Division Multiple Access Technique

    OpenAIRE

    Fatemeh. Dehghani; Shahram. Darooei

    2016-01-01

    Network on chip has emerged as a long-term and effective method in Multiprocessor System-on-Chip communications in order to overcome the bottleneck in bus based communication architectures. Efficiency and performance of network on chip is so dependent on the architecture and structure of the network. In this paper a new structure and architecture for adaptive traffic control in network on chip using Code Division Multiple Access technique is presented. To solve the problem of synchronous acce...

  3. Using Ring Strain to Control 4π-Electrocyclization Reactions: Torquoselectivity in Ring Closing of Medium-Ring Dienes and Ring Opening of Bicyclic Cyclobutenes.

    Science.gov (United States)

    Boon, Byron A; Green, Aaron G; Liu, Peng; Houk, K N; Merlic, Craig A

    2017-05-05

    Syntheses of strained cyclic dienes were accomplished via palladium(II)-catalyzed oxidative cyclizations of terminal bis(vinylboronate esters). The reactions generate strained (E,E)-1,3-dienes that undergo spontaneous 4π-electrocyclizations to form bicyclic cyclobutenes. Formation of the cyclobutenes is driven by the strain in the medium-ring (E,E)-1,3-diene intermediate. Thermal ring openings of the cyclobutenes give (Z,Z)-1,3-diene products, again for thermodynamic reasons. DFT calculations verified the thermodynamic versus kinetic control of the reactions, and kinetic studies are in excellent agreement with the calculated energy changes. An extension of the tandem coupling/4π-electrocyclization pathway was demonstrated by a palladium(II)-catalyzed oxidative homocoupling/8π-electrocyclization cascade.

  4. Comparative in vitro antimicrobial activity of tigecycline, a new glycylcycline compound, in freshly prepared medium and quality control.

    Science.gov (United States)

    Brown, Steven D; Traczewski, Maria M

    2007-07-01

    The in vitro spectra of activity of tigecycline and tetracycline were determined for 2,490 bacterial isolates representing 50 different species or phenotypic groups. All isolates were tested simultaneously by broth microdilution using freshly prepared Mueller-Hinton broth and by disk diffusion. Portions of these data were submitted to the Food and Drug Administration (FDA) in support of the sponsor's application for new drug approval. In a separate study, MIC and disk diffusion quality control ranges were determined. The tigecycline MICs at which 50%/90% of bacteria were inhibited were (in microg/ml) as follows: for Streptococcus spp., 0.06/0.12; for Moraxella catarrhalis, 0.06/0.12; for Staphylococcus spp., 0.12/0.25; for Enterococcus spp., 0.12/0.25; for Listeria monocytogenes, 0.12/0.12; for Neisseria meningitidis, 0.12/0.25; for Haemophilus spp., 0.25/0.5; for Enterobacteriaceae, 0.05/2.0; for non-Enterobacteriaceae, 0.5/8.0. Tigecycline was consistently more potent than tetracycline against all species studied. The data from this study confirm the FDA-approved MIC and disk diffusion breakpoints for tigecycline for Streptococcus spp. other than Streptococcus pneumoniae, enterococci, and Enterobacteriaceae. Provisional breakpoints for Haemophilus spp. and S. pneumoniae are proposed based on the data from this study. The following MIC and/or disk diffusion quality control ranges are proposed: Staphylococcus aureus ATCC 29213, 0.03 to 0.25 microg/ml; S. aureus ATCC 25923, 20 to 25 mm; Escherichia coli ATCC 25922, 0.03 to 0.25 microg/ml and 20 to 27 mm; Pseudomonas aeruginosa ATCC 27853, 9 to 13 mm, Enterococcus faecalis ATCC 29212, 0.03 to 0.12 microg/ml; S. pneumoniae ATCC 49619, 0.015 to 0.12 microg/ml and 23 to 29 mm; Haemophilus influenzae ATCC 49247, 0.06 to 0.5 microg/ml and 23 to 31 mm; and Neisseria gonorrhoeae ATCC 49226, 30 to 40 mm.

  5. The dynamic mechanism of presenilin-function: Sensitive gate dynamics and loop unplugging control protein access

    DEFF Research Database (Denmark)

    Somavarapu, Arun Kumar; Kepp, Kasper Planeta

    2016-01-01

    . Dynamically, these features seem linked. The long-range sensitivity of this gate-plug system to subtle conformational changes can explain why so many PSEN1 mutants cause disease. Reduced access and imprecise substrate cleavage associated with impaired gate-plug dynamics is directly illustrated by the effect......-plug mechanism is relevant for designing PSEN1 modulating therapies for treatment of Alzheimer's disease within both the amyloid/γ-secretase hypothesis and within the PSEN1 loss of function paradigm....

  6. Self-optimized admission control for multi-tenant radio access networks

    OpenAIRE

    Pérez Romero, Jordi; Sallent Roig, José Oriol; Ferrús Ferré, Ramón Antonio; Agustí Comes, Ramon

    2018-01-01

    © 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes,creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Multi-tenant Radio Access Networks (RANs) are envisaged to play a key role in highly dense scenarios for fulfil...

  7. Proposing hierarchy-similarity based access control framework: A multilevel Electronic Health Record data sharing approach for interoperable environment

    Directory of Open Access Journals (Sweden)

    Shalini Bhartiya

    2017-10-01

    Full Text Available Interoperability in healthcare environment deals with sharing of patient’s Electronic Health Records (EHR with fellow professionals in inter as well as intra departments or organizations. Healthcare environment experiences frequent shifting of doctors, paramedical staff in inter as well as intra departments or hospitals. The system exhibits dynamic attributes of users and resources managed through access control policies defined for that environment. Rules obtained on merging of such policies often generate policy-conflicts thereby resulting in undue data leakages to unintended users. This paper proposes an access control framework that applies a Hierarchy Similarity Analyzer (HSA on the policies need to be merged. It calculates a Security_Level (SL and assigns it to the users sharing data. The SL determines the authorized amount of data that can be shared on successful collaboration of two policies. The proposed framework allows integration of independent policies and identifies the possible policy-conflicts arising due to attribute disparities in defined rules. The framework is implemented on XACML policies and compared with other access models designed using centralized and decentralized approaches. Conditional constraints and properties are defined that generate policy-conflicts as prevalent in the policies.

  8. Advance reservation access control using software-defined networking and tokens

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Joaquin; Jung, Eun-Sung; Kettimuthu, Rajkumar; Rao, Nageswara S. V.; Foster, Ian T.; Clark, Russ; Owen, Henry

    2018-02-01

    Advance reservation systems allow users to reserve dedicated bandwidth connection resources from advanced high-speed networks. A common use case for such systems is data transfers in distributed science environments in which a user wants exclusive access to the reservation. However, current advance network reservation methods cannot ensure exclusive access of a network reservation to the specific flow for which the user made the reservation. We present here a novel network architecture that addresses this limitation and ensures that a reservation is used only by the intended flow. We achieve this by leveraging software-defined networking (SDN) and token-based authorization. We use SDN to orchestrate and automate the reservation of networking resources, end-to-end and across multiple administrative domains, and tokens to create a strong binding between the user or application that requested the reservation and the flows provisioned by SDN. We conducted experiments on the ESNet 100G SDN testbed, and demonstrated that our system effectively protects authorized flows from competing traffic in the network. (C) 2017 Elsevier B.V. All rights reserved.

  9. Accessing memory

    Science.gov (United States)

    Yoon, Doe Hyun; Muralimanohar, Naveen; Chang, Jichuan; Ranganthan, Parthasarathy

    2017-09-26

    A disclosed example method involves performing simultaneous data accesses on at least first and second independently selectable logical sub-ranks to access first data via a wide internal data bus in a memory device. The memory device includes a translation buffer chip, memory chips in independently selectable logical sub-ranks, a narrow external data bus to connect the translation buffer chip to a memory controller, and the wide internal data bus between the translation buffer chip and the memory chips. A data access is performed on only the first independently selectable logical sub-rank to access second data via the wide internal data bus. The example method also involves locating a first portion of the first data, a second portion of the first data, and the second data on the narrow external data bus during separate data transfers.

  10. Controlled Growth and the Maintenance of Human Pluripotent Stem Cells by Cultivation with Defined Medium on Extracellular Matrix-Coated Micropatterned Dishes.

    Science.gov (United States)

    Takenaka, Chiemi; Miyajima, Hiroshi; Yoda, Yusuke; Imazato, Hideo; Yamamoto, Takako; Gomi, Shinichi; Ohshima, Yasuhiro; Kagawa, Kenichi; Sasaki, Tetsuji; Kawamata, Shin

    2015-01-01

    Here, we introduce a new serum-free defined medium (SPM) that supports the cultivation of human pluripotent stem cells (hPSCs) on recombinant human vitronectin-N (rhVNT-N)-coated dishes after seeding with either cell clumps or single cells. With this system, there was no need for an intervening sequential adaptation process after moving hPSCs from feeder layer-dependent conditions. We also introduce a micropatterned dish that was coated with extracellular matrix by photolithographic technology. This procedure allowed the cultivation of hPSCs on 199 individual rhVNT-N-coated small round spots (1 mm in diameter) on each 35-mm polystyrene dish (termed "patterned culture"), permitting the simultaneous formation of 199 uniform high-density small-sized colonies. This culture system supported controlled cell growth and maintenance of undifferentiated hPSCs better than dishes in which the entire surface was coated with rhVNT-N (termed "non-patterned cultures"). Non-patterned cultures produced variable, unrestricted cell proliferation with non-uniform cell growth and uneven densities in which we observed downregulated expression of some self-renewal-related markers. Comparative flow cytometric studies of the expression of pluripotency-related molecules SSEA-3 and TRA-1-60 in hPSCs from non-patterned cultures and patterned cultures supported this concept. Patterned cultures of hPSCs allowed sequential visual inspection of every hPSC colony, giving an address and number in patterned culture dishes. Several spots could be sampled for quality control tests of production batches, thereby permitting the monitoring of hPSCs in a single culture dish. Our new patterned culture system utilizing photolithography provides a robust, reproducible and controllable cell culture system and demonstrates technological advantages for the mass production of hPSCs with process quality control.

  11. An Open-Access Educational Tool for Teaching Motion Dynamics in Multi-Axis Servomotor Control

    Science.gov (United States)

    Rivera-Guillen, J. R.; de Jesus Rangel-Magdaleno, J.; de Jesus Romero-Troncoso, R.; Osornio-Rios, R. A.; Guevara-Gonzalez, R. G.

    2012-01-01

    Servomotors are widely used in computerized numerically controlled (CNC) machines, hence motion control is a major topic covered in undergraduate/graduate engineering courses. Despite the fact that several syllabi include the motion dynamics topic in their courses, there are neither suitable tools available for designing and simulating multi-axis…

  12. Enhancing Security and Privacy in Video Surveillance through Role-Oriented Access Control Mechanism

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim

    sensitive regions, e.g. faces, from the videos. However, very few research efforts have focused on addressing the security aspects of video surveillance data and on authorizing access to this data. Interestingly, while PETs help protect the privacy of individuals, they may also hinder the usefulness...... of video surveillance systems resulting in compromising the very purpose of such systems, i.e. public safety. Thus the challenge is to provide sufficient need-specific data to those monitoring the surveillance systems yet preserving the privacy of people as much as possible. This can be achieved through...... security and privacy requirements in a video surveillance system. We study existing solutions against these requirements and point out practical challenges in ensuring the security of video surveillance data in all stages (in transit and at storage). Our study shows a gap, between the security requirements...

  13. Utilizing SELinux to mandate ultra-secure access control of medical records.

    Science.gov (United States)

    Croll, Peter R; Henricksen, Matt; Caelli, Bill; Liu, Vicky

    2007-01-01

    Ongoing concerns have been raised over the effectiveness of information technology products and systems in maintaining privacy protection for sensitive data. The aim is to ensure that sensitive health information can be adequately protected yet still be accessible only to those that "need-to-know". To achieve this and ensure sustainability over the longer term, it is advocated that an alternative, stable and secure system architecture is required. This paper considers the adoption of a model targeted at health information that provides much higher degrees of protection. A purpose built demonstrator that was developed based on enterprise-level systems software products is detailed. The long term aim is to provide a viable solution by utilizing contemporary, commercially supported operating system and allied software. The advantages and limitations in its application with a medical database are discussed. The future needs in terms of research, software development and changes in organizational policy for healthcare providers, are outlined.

  14. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    Science.gov (United States)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are

  15. Oversight Review: Quality Control Review of Army Audit Agency's Special Access Program Audits

    National Research Council Canada - National Science Library

    2005-01-01

    .... The Government Auditing Standards (GAS) require that an audit organization performing audits and/or attestation engagements in accordance with GAS should have an appropriate internal quality control system in place and undergo an external...

  16. Oversight Review: Quality Control Review of Air Force Audit Agency's Special Access Program Audits

    National Research Council Canada - National Science Library

    2005-01-01

    .... The Government Auditing Standards (GAS) require that an audit organization performing audits and/or attestation engagements in accordance with GAS should have an appropriate internal quality control system in place and undergo an external...

  17. Oversight Review: Quality Control Review of Naval Audit Service's Special Access Program Audits

    National Research Council Canada - National Science Library

    2005-01-01

    .... The Government Auditing Standards (GAS) require that an audit organization performing audits and/or attestation engagements in accordance with GAS should have an appropriate internal quality control system in place and undergo an external...

  18. Time division multiple access for vehicular communications

    CERN Document Server

    Omar, Hassan Aboubakr

    2014-01-01

    This brief focuses on medium access control (MAC) in vehicular ad hoc networks (VANETs), and presents VeMAC, a novel MAC scheme based on distributed time division multiple access (TDMA) for VANETs. The performance of VeMAC is evaluated via mathematical analysis and computer simulations in comparison with other existing MAC protocols, including the IEEE 802.11p standard. This brief aims at proposing TDMA as a suitable MAC scheme for VANETs, which can support the quality-of-service requirements of high priority VANET applications.

  19. Wake-up radio systems : design, development, performance evaluation and comparison to conventional medium access control protocols for wireless sensor networks

    OpenAIRE

    Oller i Bosch, Joaquim

    2015-01-01

    During the recent years, the research related to Wake-up Radio (WuR) systems has gained noticeable interest. In WuR systems, a node initiating a communication first sends a Wake-up Call (WuC) by means of its Wake-up Transmitter (WuTx), to the Wake-up Receiver (WuRx) of a remote node to activate it in an on-demand manner. Until the reception of the WuC, the node's MCU and main data transceiver are in sleep mode. Hence, WuR drastically reduce the power required by wireless nodes. This thesis...

  20. EPA GHG Certification of Medium- and Heavy-Duty Vehicles: Development of Road Grade Profiles Representative of US Controlled Access Highways

    Energy Technology Data Exchange (ETDEWEB)

    Wood, Eric [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Duran, Adam [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Burton, Evan [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Gonder, Jeffrey [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Kelly, Kenneth [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2015-05-12

    This report includes a detailed comparison of the TomTom national road grade database relative to a local road grade dataset generated by Southwest Research Institute and a national elevation dataset publically available from the U.S. Geological Survey. This analysis concluded that the TomTom national road grade database was a suitable source of road grade data for purposes of this study.

  1. Bathymetric control of warm ocean water access along the East Antarctic Margin

    Science.gov (United States)

    Nitsche, F. O.; Porter, D.; Williams, G.; Cougnon, E. A.; Fraser, A. D.; Correia, R.; Guerrero, R.

    2017-09-01

    Observed thinning of the Totten Glacier in East Antarctica has cast doubt upon the stability of the East Antarctic Ice Sheet. Recent oceanographic observations at the front of the Totten Ice Shelf have confirmed the presence of modified Circumpolar Deep Water (mCDW), which likely promotes enhanced melting. Details of how this water accesses the shelf remain uncertain. Here we present new bathymetry and autumnal oceanographic data from the outer continental shelf, north of the Totten Glacier, that show up to 0.7°C mCDW in a >100 km wide and >500 m deep depression within the shelf break. In other parts of East Antarctica, a shelf break bathymetry shallower than 400 m prevents these warmer waters from entering the shelf environment. Our observations demonstrate that detailed knowledge of the bathymetry is critical to correctly model the across-shelf exchange of warm water to the various glaciers/ice shelves of Antarctica for future sea level prediction.

  2. Embedded System for Prosthetic Control Using Implanted Neuromuscular Interfaces Accessed Via an Osseointegrated Implant.

    Science.gov (United States)

    Mastinu, Enzo; Doguet, Pascal; Botquin, Yohan; Hakansson, Bo; Ortiz-Catalan, Max

    2017-08-01

    Despite the technological progress in robotics achieved in the last decades, prosthetic limbs still lack functionality, reliability, and comfort. Recently, an implanted neuromusculoskeletal interface built upon osseointegration was developed and tested in humans, namely the Osseointegrated Human-Machine Gateway. Here, we present an embedded system to exploit the advantages of this technology. Our artificial limb controller allows for bioelectric signals acquisition, processing, decoding of motor intent, prosthetic control, and sensory feedback. It includes a neurostimulator to provide direct neural feedback based on sensory information. The system was validated using real-time tasks characterization, power consumption evaluation, and myoelectric pattern recognition performance. Functionality was proven in a first pilot patient from whom results of daily usage were obtained. The system was designed to be reliably used in activities of daily living, as well as a research platform to monitor prosthesis usage and training, machine-learning-based control algorithms, and neural stimulation paradigms.

  3. Economic Efficiency of small and Medium Scale Cassava ...

    African Journals Online (AJOL)

    ... medium scale enterprises. Small and medium scale cassava processor should therefore focus more on ways of accessing credit while government should ensure more extension visits to the processors. Key words; Economic Efficiency, Small and Medium Enterprise, Cassava Processing Enterprise, Nigeria, Agribusiness ...

  4. Proposal for the award of a contract for the supply, installation and maintenance of access control systems

    CERN Document Server

    2000-01-01

    This document concerns the award of a contract for the supply, installation and maintenance of access control systems. Following a market survey carried out among 93 firms in fifteen Member States, a call for tenders (IT-2681/ST) was sent on 23 June 2000 to two firms, nine consortia each consisting of two firms and one consortium consisting of three firms, in nine Member States. By the closing date, CERN had received three tenders from three consortia in five Member States. The Finance Committee is invited to agree to the negotiation of a contract with the consortium GTD (ES) - ALSTOM (FR), the lowest bidder, for the supply, installation and maintenance of access control systems for a total amount of 4 305 892 euros (6 581 987 Swiss francs), not subject to revision. The above amount in Swiss francs has been calculated using the rate of exchange indicated in the tender. The firm has indicated the following distribution by country of the contract value covered by this adjudication proposal: ES-36%, FR-36%, GB-1...

  5. Proposal for a Change of Contractor for Facilities Management and to Negotiate a Contract for Access Control Activities at CERN

    CERN Document Server

    2003-01-01

    This document concerns the change of contractor for the facilities management and the negotiation, without competitive tendering, of a contract for the security and access control activities at CERN. In March 2002, the Finance Committee agreed to the negotiation of a contract with the consortium M+W ZANDER (DE) - AVIREAL (CH) for the execution of facilities management (CERN/FC/4550). For the reasons set out in this document, the Finance Committee is invited to agree to the negotiation of a contract with the firm INGEST FACILITY (IT), the second lowest bidder, for the execution of the contract for facilities management, not including the security and access control activities, for an initial period of three years and for an amount not exceeding 24 396 000 euros (35 772 000 Swiss francs), not subject to revision. The contract will include options for two further one-year extensions beyond the initial three-year period. The rate of exchange used is that stipulated in the tender. The firm has indicated the follow...

  6. Reputation-based ontology alignment for autonomy and interoperability in distributed access control

    NARCIS (Netherlands)

    Trivellato, Daniel; Spiessens, Fred; Zannone, Nicola; Etalle, Sandro

    2009-01-01

    Vocabulary alignment is a main challenge in distributedaccess control as peers should understand each other’spolicies unambiguously. Ontologies enable mutual understanding among peers by providing a precise semantics to concepts and relationships in a domain. However, due to the distributed nature

  7. Nectar accessibility determines fitness, flower choice and abundance of hoverflies that provide natural pest control

    NARCIS (Netherlands)

    van Rijn, P.C.J.; Wäckers, F.L.

    2016-01-01

    1. In modern agricultural landscapes, many organisms providing ecosystem services such as pollination and natural pest control are likely constrained by shortage of nectar and/or pollen required for adult nutrition. More and more flower-rich field margin strips and other habitats are created to

  8. Suicidal Behavior and Firearm Access: Results from the Second Injury Control and Risk Survey

    Science.gov (United States)

    Betz, Marian E.; Barber, Catherine; Miller, Matthew

    2011-01-01

    The association between home firearms and the likelihood and nature of suicidal thoughts and plans was examined using the Second Injury Control and Risk Survey, a 2001-2003 representative telephone survey of U.S. households. Of 9,483 respondents, 7.4% reported past-year suicidal thoughts, 21.3% with a plan. Similar proportions of those with and…

  9. Design and Implementation of a Multi-Modal Biometric System for Company Access Control

    Directory of Open Access Journals (Sweden)

    Elisabetta Stefani

    2017-05-01

    Full Text Available This paper is about the design, implementation, and deployment of a multi-modal biometric system to grant access to a company structure and to internal zones in the company itself. Face and iris have been chosen as biometric traits. Face is feasible for non-intrusive checking with a minimum cooperation from the subject, while iris supports very accurate recognition procedure at a higher grade of invasivity. The recognition of the face trait is based on the Local Binary Patterns histograms, and the Daughman’s method is implemented for the analysis of the iris data. The recognition process may require either the acquisition of the user’s face only or the serial acquisition of both the user’s face and iris, depending on the confidence level of the decision with respect to the set of security levels and requirements, stated in a formal way in the Service Level Agreement at a negotiation phase. The quality of the decision depends on the setting of proper different thresholds in the decision modules for the two biometric traits. Any time the quality of the decision is not good enough, the system activates proper rules, which ask for new acquisitions (and decisions, possibly with different threshold values, resulting in a system not with a fixed and predefined behaviour, but one which complies with the actual acquisition context. Rules are formalized as deduction rules and grouped together to represent “response behaviors” according to the previous analysis. Therefore, there are different possible working flows, since the actual response of the recognition process depends on the output of the decision making modules that compose the system. Finally, the deployment phase is described, together with the results from the testing, based on the AT&T Face Database and the UBIRIS database.

  10. Proactive behavior, but not inhibitory control, predicts repeated innovation by spotted hyenas tested with a multi-access box.

    Science.gov (United States)

    Johnson-Ulrich, Lily; Johnson-Ulrich, Zoe; Holekamp, Kay

    2018-03-06

    Innovation is widely linked to cognitive ability, brain size, and adaptation to novel conditions. However, successful innovation appears to be influenced by both cognitive factors, such as inhibitory control, and non-cognitive behavioral traits. We used a multi-access box (MAB) paradigm to measure repeated innovation, the number of unique innovations learned across trials, by 10 captive spotted hyenas (Crocuta crocuta). Spotted hyenas are highly innovative in captivity and also display striking variation in behavioral traits, making them good model organisms for examining the relationship between innovation and other behavioral traits. We measured persistence, motor diversity, motivation, activity, efficiency, inhibitory control, and neophobia demonstrated by hyenas while interacting with the MAB. We also independently assessed inhibitory control with a detour cylinder task. Most hyenas were able to solve the MAB at least once, but only four hyenas satisfied learning criteria for all four possible solutions. Interestingly, neither measure of inhibitory control predicted repeated innovation. Instead, repeated innovation was predicted by a proactive syndrome of behavioral traits that included high persistence, high motor diversity, high activity and low neophobia. Our results suggest that this proactive behavioral syndrome may be more important than inhibitory control for successful innovation with the MAB by members of this species.

  11. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

    OpenAIRE

    Luo, Ming; Luo, Yi; Wan, Yuwei; Wang, Ze

    2018-01-01

    Nowadays wireless sensor network (WSN) is increasingly being used in the Internet of Things (IoT) for data collection, and design of an access control scheme that allows an Internet user as part of IoT to access the WSN becomes a hot topic. A lot of access control schemes have been proposed for the WSNs in the context of the IoT. Nevertheless, almost all of these schemes assume that communication nodes in different network domains share common system parameters, which is not suitable for cros...

  12. Towards a quality-controlled and accessible Pitzer model for seawater and related systems

    Directory of Open Access Journals (Sweden)

    David Turner

    2016-09-01

    Full Text Available We elaborate the need for a quality-controlled chemical speciation model for seawater and related natural waters, work which forms the major focus of SCOR Working Group 145. Model development is based on Pitzer equations for the seawater electrolyte and trace components. These equations can be used to calculate activities of dissolved ions and molecules and, in combination with thermodynamic equilibrium constants, chemical speciation. The major tasks to be addressed are ensuring internal consistency of the Pitzer model parameters (expressing the interactions between pairs and triplets of species, which ultimately determines the calculated activities, assessing uncertainties, and identifying important data gaps that should be addressed by new measurements. It is recognised that natural organic matter plays an important role in many aquatic ecosystems, and options for including this material in a Pitzer-based model are discussed. The process of model development begins with the core components which include the seawater electrolyte and the weak acids controlling pH. This core model can then be expanded by incorporating additional chemical components, changing the standard seawater composition and/or broadening the range of temperature and pressure, without compromising its validity. Seven important areas of application are identified: open ocean acidification; micro-nutrient biogeochemistry and geochemical tracers; micro-nutrient behaviour in laboratory studies; water quality in coastal and estuarine waters; cycling of nutrients and trace metals in pore waters; chemical equilibria in hydrothermal systems; brines and salt lakes.

  13. Integrating end-user feedback in the concept stage of development of a novel sensor access system for environmental control.

    Science.gov (United States)

    Fager, Susan Koch; Sorenson, Tabatha; Butte, Susanne; Nelson, Alexander; Banerjee, Nilanjan; Robucci, Ryan

    2018-05-01

    This article illustrates user-centred design of a novel sensor access system for environmental control in the concept stage of development. Focus groups of individuals with disabilities and rehabilitation healthcare professionals were provided with video illustration of the technology and asked to provide quantitative and qualitative feedback through a semistructured interview process. Qualitative methods were employed to analyse transcribed comments to develop themes supporting ongoing development of the technology. Both end-user streams rated the original design features of the sensor access system (alternative interface to assistive technologies, having wireless capabilities and not requiring batteries) as having high potential value. Both groups identified a need for the future design of the sensor technology to be able to capture minimal/reduced movements for those with severe physical impairments. Themes included (1) the sensor technology could be individualized/customized to accommodate the user, (2) minimal positioning and set-up requirement and (3) technology that alleviated problems encountered with touch-based solutions. Inclusion of end-user feedback provided the research team with valuable information that supported the initial conceptualization of the design features of the technology and provided valuable data to support development of a new prototype that can capture more reduced/minimal movements. Implication for Rehabilitation User-centered design of assistive technology is essential to the development of technology that can meet the unique needs of those with the most severe physical impairments. New sensor technology may alleviate some of the access challenges faced by individuals with severe physical impairments. Collaboration between all key stakeholders (individuals with disabilities, rehabilitation professionals, researchers, and developers) is an essential component in the iterative assistive technology design process.

  14. Family Access to a Dentist Study (FADS): A Multi-Center Randomized Controlled Trial

    Science.gov (United States)

    Nelson, Suchitra; Riedy, Christine; Albert, Jeffrey M; Lee, Wonik; Slusar, Mary Beth; Curtan, Shelley; Ferretti, Gerald; Cunha-Cruz, Joana; Milgrom, Peter

    2015-01-01

    Introduction Many low-income parent/caregivers do not understand the importance of cavity-free primary (baby) teeth and the chronic nature of dental caries (tooth decay). As a consequence, dental preventive and treatment utilization is low even when children are screened in schools and referred for care. This study aims to test a referral letter and Dental Information Guide (DIG) designed using the Common-Sense Model of Self-Regulation (CSM) framework to improve caregivers’ illness perception of dental caries and increase utilization of care by children with restorative dental needs. Methods A multi-site randomized controlled trial with caregivers of Kindergarten to 4th grade children in urban Ohio and rural Washington State will compare five arms: (1) CSM referral letter alone; (2) CSM referral letter + DIG; (3) reduced CSM referral letter alone; (4) reduced CSM referral letter + DIG; (5) standard (control) referral. At baseline, children will be screened at school to determine restorative dental needs. If in need of treatment, caregivers will be randomized to study arms and an intervention packet will be sent home. The primary outcome will be dental care based on a change in oral health status by clinical examination 7 months post-screening (ICDAS sealant codes 1 and 2; restoration codes 3–8; extraction). Enrollment commenced summer 2015 with results in summer 2016. Conclusion This study uses the CSM framework to develop and test behavioral interventions to increase dental utilization among low-income caregivers. If effective this simple intervention has broad applicability in clinical and community-based settings. PMID:26500170

  15. Clinical Effectiveness, Access to, and Satisfaction with Care Using a Telehomecare Substitution Intervention: A Randomized Controlled Trial

    Directory of Open Access Journals (Sweden)

    Kathryn H. Bowles

    2011-01-01

    Full Text Available Background. Hospitalization accounts for 70% of heart failure (HF costs; readmission rates at 30 days are 24% and rise to 50% by 90 days. Agencies anticipate that telehomecare will provide the close monitoring necessary to prevent HF readmissions. Methods and Results. Randomized controlled trial to compare a telehomecare intervention for patients 55 and older following hospital discharge for HF to usual skilled home care. Primary endpoints were 30- and 60-day all-cause and HF readmission, hospital days, and time to readmission or death. Secondary outcomes were access to care, emergency department (ED use, and satisfaction with care. All-cause readmissions at 30 days (16% versus 19% and over six months (46% versus 52% were lower in the telehomecare group but were not statistically significant. Access to care and satisfaction were significantly higher for the telehomecare patients, including the number of in-person visits and days in home care. Conclusions. Patient acceptance of the technology and current home care policies and processes of care were barriers to gaining clinical effectiveness and efficiency.

  16. Short- and medium-term efficacy of a Web-based computer-tailored nutrition education intervention for adults including cognitive and environmental feedback: randomized controlled trial.

    Science.gov (United States)

    Springvloet, Linda; Lechner, Lilian; de Vries, Hein; Candel, Math J J M; Oenema, Anke

    2015-01-19

    Web-based, computer-tailored nutrition education interventions can be effective in modifying self-reported dietary behaviors. Traditional computer-tailored programs primarily targeted individual cognitions (knowledge, awareness, attitude, self-efficacy). Tailoring on additional variables such as self-regulation processes and environmental-level factors (the home food environment arrangement and perception of availability and prices of healthy food products in supermarkets) may improve efficacy and effect sizes (ES) of Web-based computer-tailored nutrition education interventions. This study evaluated the short- and medium-term efficacy and educational differences in efficacy of a cognitive and environmental feedback version of a Web-based computer-tailored nutrition education intervention on self-reported fruit, vegetable, high-energy snack, and saturated fat intake compared to generic nutrition information in the total sample and among participants who did not comply with dietary guidelines (the risk groups). A randomized controlled trial was conducted with a basic (tailored intervention targeting individual cognition and self-regulation processes; n=456), plus (basic intervention additionally targeting environmental-level factors; n=459), and control (generic nutrition information; n=434) group. Participants were recruited from the general population and randomly assigned to a study group. Self-reported fruit, vegetable, high-energy snack, and saturated fat intake were assessed at baseline and at 1- (T1) and 4-months (T2) postintervention using online questionnaires. Linear mixed model analyses examined group differences in change over time. Educational differences were examined with group×time×education interaction terms. In the total sample, the basic (T1: ES=-0.30; T2: ES=-0.18) and plus intervention groups (T1: ES=-0.29; T2: ES=-0.27) had larger decreases in high-energy snack intake than the control group. The basic version resulted in a larger decrease in

  17. Rat Strain Ontology: structured controlled vocabulary designed to facilitate access to strain data at RGD.

    Science.gov (United States)

    Nigam, Rajni; Munzenmaier, Diane H; Worthey, Elizabeth A; Dwinell, Melinda R; Shimoyama, Mary; Jacob, Howard J

    2013-11-22

    The Rat Genome Database (RGD) ( http://rgd.mcw.edu/) is the premier site for comprehensive data on the different strains of the laboratory rat (Rattus norvegicus). The strain data are collected from various publications, direct submissions from individual researchers, and rat providers worldwide. Rat strain, substrain designation and nomenclature follow the Guidelines for Nomenclature of Mouse and Rat Strains, instituted by the International Committee on Standardized Genetic Nomenclature for Mice. While symbols and names aid in identifying strains correctly, the flat nature of this information prohibits easy search and retrieval, as well as other data mining functions. In order to improve these functionalities, particularly in ontology-based tools, the Rat Strain Ontology (RS) was developed. The Rat Strain Ontology (RS) reflects the breeding history, parental background, and genetic manipulation of rat strains. This controlled vocabulary organizes strains by type: inbred, outbred, chromosome altered, congenic, mutant and so on. In addition, under the chromosome altered category, strains are organized by chromosome, and further by type of manipulations, such as mutant or congenic. This allows users to easily retrieve strains of interest with modifications in specific genomic regions. The ontology was developed using the Open Biological and Biomedical Ontology (OBO) file format, and is organized on the Directed Acyclic Graph (DAG) structure. Rat Strain Ontology IDs are included as part of the strain report (RS: ######). As rat researchers are often unaware of the number of substrains or altered strains within a breeding line, this vocabulary now provides an easy way to retrieve all substrains and accompanying information. Its usefulness is particularly evident in tools such as the PhenoMiner at RGD, where users can now easily retrieve phenotype measurement data for related strains, strains with similar backgrounds or those with similar introgressed regions. This

  18. Whistler mode waves from lightning on Venus: Magnetic control of ionospheric access

    Science.gov (United States)

    Russell, C. T.; Zhang, T. L.; Wei, H. Y.

    2008-09-01

    The fluxgate magnetometer on Venus Express samples the magnetic field near periapsis at 128 Hz. Bursts of plane-polarized magnetic waves in the vicinity of 100 Hz are observed propagating at small angles to the magnetic field. The magnetic field is generally horizontal in the region around periapsis, located at high northern latitudes. When the magnetic field remains within 15° of horizontal during the 2-min periapsis pass, no such waves are observed; but when there are brief periods during which the local magnetic field dips into the atmosphere by more than 15°, the bursts begin to appear. Such radial excursions of the magnetic field occur 25% of the time in the region around periapsis. The bursts are seen only on passes with these excursions. We interpret this magnetic control in terms of the coupling between the electromagnetic wave from lightning discharges refracted vertically by the increasing electron density and the nearly horizontal ionospheric magnetic field along which the energy is guided to the spacecraft. The inferred rate of electric discharges in the Venus atmosphere is about 20% of that seen in the Earth's atmosphere.

  19. Women with learning disabilities and access to cervical screening: retrospective cohort study using case control methods

    Science.gov (United States)

    Reynolds, Fiona; Stanistreet, Debbi; Elton, Peter

    2008-01-01

    Background Several studies in the UK have suggested that women with learning disabilities may be less likely to receive cervical screening tests and a previous local study in had found that GPs considered screening unnecessary for women with learning disabilities. This study set out to ascertain whether women with learning disabilities are more likely to be ceased from a cervical screening programme than women without; and to examine the reasons given for ceasing women with learning disabilities. It was carried out in Bury, Heywood-and-Middleton and Rochdale. Methods Carried out using retrospective cohort study methods, women with learning disabilities were identified by Read code; and their cervical screening records were compared with the Call-and-Recall records of women without learning disabilities in order to examine their screening histories. Analysis was carried out using case-control methods – 1:2 (women with learning disabilities: women without learning disabilities), calculating odds ratios. Results 267 women's records were compared with the records of 534 women without learning disabilities. Women with learning disabilities had an odds ratio (OR) of 0.48 (Confidence Interval (CI) 0.38 – 0.58; X2: 72.227; p.value learning disabilities. Conclusion The reasons given for ceasing and/or not screening suggest that merely being coded as having a learning disability is not the sole reason for these actions. There are training needs among smear takers regarding appropriate reasons not to screen and providing screening for women with learning disabilities. PMID:18218106

  20. A Fairness-Based Access Control Scheme to Optimize IPTV Fast Channel Changing

    Directory of Open Access Journals (Sweden)

    Junyu Lai

    2014-01-01

    Full Text Available IPTV services are typically featured with a longer channel changing delay compared to the conventional TV systems. The major contributor to this lies in the time spent on intraframe (I-frame acquisition during channel changing. Currently, most widely adopted fast channel changing (FCC methods rely on promptly transmitting to the client (conducting the channel changing a retained I-frame of the targeted channel as a separate unicasting stream. However, this I-frame acceleration mechanism has an inherent scalability problem due to the explosions of channel changing requests during commercial breaks. In this paper, we propose a fairness-based admission control (FAC scheme for the original I-frame acceleration mechanism to enhance its scalability by decreasing the bandwidth demands. Based on the channel changing history of every client, the FAC scheme can intelligently decide whether or not to conduct the I-frame acceleration for each channel change request. Comprehensive simulation experiments demonstrate the potential of our proposed FAC scheme to effectively optimize the scalability of the I-frame acceleration mechanism, particularly in commercial breaks. Meanwhile, the FAC scheme only slightly increases the average channel changing delay by temporarily disabling FCC (i.e., I-frame acceleration for the clients who are addicted to frequent channel zapping.

  1. TRMM On-Orbit Performance Re-Accessed After Control Change

    Science.gov (United States)

    Bilanow, Steve

    2006-01-01

    The Tropical Rainfall Measuring Mission (TRMM) spacecraft, a joint mission between the U.S. and Japan, launched onboard an HI1 rocket on November 27,1997 and transitioned in August, 2001 from an average operating altitude of 350 kilometers to 402.5 kilometers. Due to problems using the Earth Sensor Assembly (ESA) at the higher altitude, TRMM switched to a backup attitude control mode. Prior to the orbit boost TRMM controlled pitch and roll to the local vertical using ESA measurements while using gyro data to propagate yaw attitude between yaw updates from the Sun sensors. After the orbit boost, a Kalman filter used 3-axis gyro data with Sun sensor and magnetometers to estimate onboard attitude. While originally intended to meet a degraded attitude accuracy of 0.7 degrees, the new control mode met the original 0.2 degree attitude accuracy requirement after improving onboard ephemeris prediction and adjusting the magnetometer calibration onboard. Independent roll attitude checks using a science instrument, the Precipitation Radar (PR) which was built in Japan, provided a novel insight into the pointing performance. The PR data helped identify the pointing errors after the orbit boost, track the performance improvements, and show subtle effects from ephemeris errors and gyro bias errors. It also helped identify average bias trends throughout the mission. Roll errors tracked by the PR from sample orbits pre-boost and post-boost are shown in Figure 1. Prior to the orbit boost the largest attitude errors were due to occasional interference in the ESA. These errors were sometime larger than 0.2 degrees in pitch and roll, but usually less, as estimated from a comprehensive review of the attitude excursions using gyro data. Sudden jumps in the onboard roll show up as spikes in the reported attitude since the control responds within tens of seconds to null the pointing error. The PR estimated roll tracks well with an estimate of the roll history propagated using gyro data

  2. Scalable Lunar Surface Networks and Adaptive Orbit Access

    Science.gov (United States)

    Wang, Xudong

    2015-01-01

    Teranovi Technologies, Inc., has developed innovative network architecture, protocols, and algorithms for both lunar surface and orbit access networks. A key component of the overall architecture is a medium access control (MAC) protocol that includes a novel mechanism of overlaying time division multiple access (TDMA) and carrier sense multiple access with collision avoidance (CSMA/CA), ensuring scalable throughput and quality of service. The new MAC protocol is compatible with legacy Institute of Electrical and Electronics Engineers (IEEE) 802.11 networks. Advanced features include efficiency power management, adaptive channel width adjustment, and error control capability. A hybrid routing protocol combines the advantages of ad hoc on-demand distance vector (AODV) routing and disruption/delay-tolerant network (DTN) routing. Performance is significantly better than AODV or DTN and will be particularly effective for wireless networks with intermittent links, such as lunar and planetary surface networks and orbit access networks.

  3. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    Directory of Open Access Journals (Sweden)

    José L. Hernández-Ramos

    2015-07-01

    Full Text Available As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  4. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

    Science.gov (United States)

    Hernández-Ramos, José L; Bernabe, Jorge Bernal; Moreno, M Victoria; Skarmeta, Antonio F

    2015-07-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  5. Human umbilical cord stem cell conditioned medium versus serum-free culture medium in the treatment of cryopreserved human ovarian tissues in in-vitro culture: a randomized controlled trial.

    Science.gov (United States)

    Jia, Yingxian; Shi, Xiaohan; Xie, Yidong; Xie, Xiaochuan; Wang, Yan; Li, Shangwei

    2017-06-24

    To reduce young female fertility loss, the in-vitro culture of cryopreserved ovarian cortical tissues (OCTs) is considered an effective approach without delaying treatment and undergoing stimulation medicine. However, ischemic damage and follicular loss during the in-vitro culture of OCTs are major technical challenges. Human umbilical cord stem cells (HUMSCs) and their conditioned medium (HUMSC-CM) have been considered to be potential resources for regeneration medicine because they secrete cytokines and enhance cell survival and function. The aim of this study was to determine whether HUMSC-CM improves the development of frozen-thawed in-vitro cultured ovarian tissues compared with a serum-free culture medium (SF-CM). The thawed OCTs (n = 68) were cultivated in HUMSC-CM and SF-CM in vitro for 8 days, and the ovarian tissues were processed and analyzed by a classical histological evaluation. The microvessel density (MVD) and apotosis detection during in-vitro culture of OCTs were also performed. A significant difference in the rate of morphologically normal primordial follicles in the HUMSC-CM group was observed compared to that in the SF-CM group (group C) from days 2 to 4 (day 2: group B 58.0 ± 2.45% vs group C 32.0 ± 5.83%, p = 0.002; day 3: group B 55.5 ± 4.20% vs group C 21.0 ± 9.80%, p = 0.048; day 4: group B 52.0 ± 4.08% vs group C 21.5 ± 8.19%, p = 0.019). The microvessel density (MVD) detection showed a time-dependent increase and peaked on day 4. There was a significant difference between groups B (49.33 ± 0.58) and C (24.33 ± 3.79) (p = 0.036). The percentage of apoptotic follicles in group B was lower than that in group C on day 1 (13.75 ± 2.50% vs 27.0 ± 10.10%, p = 0.003), day 5 (11.75 ± 1.50% vs 51.0 ± 10.5%, p = 0.019) and day 7 (15.0 ± 5.10% vs 46.5 ± 21.75%, p = 0.018). These data have provided the first experimental evidence of the effect of

  6. Vascular access and infection prevention and control: a national survey of routine practices in Irish haemodialysis units.

    Science.gov (United States)

    McCann, Margaret; Clarke, Michael; Mellotte, George; Plant, Liam; Fitzpatrick, Fidelma

    2013-04-01

    National and international guidelines recommend the use of effective vascular access (VA) and infection prevention and control practices within the haemodialysis environment. Establishing an arterio-venous fistula (AVF) and preventing central venous catheter (CVC)-related infections are ongoing challenges for all dialysis settings. We surveyed VA and routine infection prevention and control practices in dialysis units, to provide national data on these practices in Ireland. A descriptive survey was emailed to nurse managers at all adult (n = 19) and children (n = 1) outpatient haemodialysis units in the Republic of Ireland. Data collected included AVF formation, CVC insertion and maintenance practices, VA use and surveillance of infection and screening protocols. Nineteen of the 20 units responded to the survey. The AVF prevalence was 49% for 1370 patients in 17 units who provided these data [mean prevalence per unit: 45.7% (SD 16.2)]; the CVC mean prevalence per unit was 52.5% (SD 16.0). Fourteen dialysis units experienced inadequate access to vascular surgical procedures either due to a lack of dedicated theatre time or hospital beds. Six units administered intravenous prophylactic antimicrobials prior to CVC insertion with only two units using a CVC insertion checklist at the time of catheter insertion. In general, dialysis units in Ireland show a strong adherence to national guidelines. Compared with the 12 countries participating in the Dialysis Outcomes Practice Patterns Study (DOPPS 4), in 2010, AVF prevalence in Irish dialysis units is the second lowest. Recommendations include establishing an AVF national prevalence target rate, discontinuing the administration of intravenous prophylactic antimicrobials prior to CVC insertion and promoting the use of CVC insertion checklists.

  7. Internet-accessed sexually transmitted infection (e-STI testing and results service: A randomised, single-blind, controlled trial.

    Directory of Open Access Journals (Sweden)

    Emma Wilson

    2017-12-01

    Full Text Available Internet-accessed sexually transmitted infection testing (e-STI testing is increasingly available as an alternative to testing in clinics. Typically this testing modality enables users to order a test kit from a virtual service (via a website or app, collect their own samples, return test samples to a laboratory, and be notified of their results by short message service (SMS or telephone. e-STI testing is assumed to increase access to testing in comparison with face-to-face services, but the evidence is unclear. We conducted a randomised controlled trial to assess the effectiveness of an e-STI testing and results service (chlamydia, gonorrhoea, HIV, and syphilis on STI testing uptake and STI cases diagnosed.The study took place in the London boroughs of Lambeth and Southwark. Between 24 November 2014 and 31 August 2015, we recruited 2,072 participants, aged 16-30 years, who were resident in these boroughs, had at least 1 sexual partner in the last 12 months, stated willingness to take an STI test, and had access to the internet. Those unable to provide consent and unable to read English were excluded. Participants were randomly allocated to receive 1 text message with the web link of an e-STI testing and results service (intervention group or to receive 1 text message with the web link of a bespoke website listing the locations, contact details, and websites of 7 local sexual health clinics (control group. Participants were free to use any other services or interventions during the study period. The primary outcomes were self-reported STI testing at 6 weeks, verified by patient record checks, and self-reported STI diagnosis at 6 weeks, verified by patient record checks. Secondary outcomes were the proportion of participants prescribed treatment for an STI, time from randomisation to completion of an STI test, and time from randomisation to treatment of an STI. Participants were sent a £10 cash incentive on submission of self-reported data. We

  8. Transporte de oócitos bovinos em meio de maturação sem controle de atmosfera gasosa Transport of bovine oocytes in maturation medium without a controlled gaseous atmosphere

    Directory of Open Access Journals (Sweden)

    Fábio Gallas Leivas

    2004-02-01

    aspirated from 2 to 8mm follicles obtained from bovine slaughterhouse ovaries (11 replications were randomly distributed in four treatments. Oocytes were matured for 24h with modified TCM-199 Earle salts, plus 25mM bicarbonate, 25 mM HEPES, rFSH-h, Estrus Cow Serum (ECS, and piruvate at 39ºC, in incubator with 5% CO2 and saturated humidity (Control Group, n=296 or exposed to a simulated transport for 6 (T6, n=286, 12 (T12, n=294 or 18h (T18, n=301 in maturation medium containing TCM + HEPES, in a 39ºC water bath, with the same components used in the Control Group, but with 1mM bicarbonate. At the conclusion of each transport period, oocytes were transferred to dishes with maturation medium to reach 24h in incubator, under the same conditions described for the Control group. Fertilization was accomplished during 18h, with the same temperature and gaseous atmosphere, in FERT-TALP plus heparin. The insemination dose was 1x106 spermatozoa/mL, sorted by swim-up. Presumptive zygotes were cultured in SOF medium + 5% ECS for 8 days, in incubator at 39ºC using gasified bags with 5% CO2, 5% O2 and 90% N2. Cleavage rates did not differ between treatments. Embryonic development rates at D7 were similar for Control (20.9%, T6 (19.2% and T12 (21.4% groups, with a reduction (P0.05 in hatched blastocyst rate. The average number of cells of hatched blastocysts was similar (P>0.05 in Control (136, T6 (125.5 and T12 (126.8 groups. These results indicate the possibility of transporting bovine oocytes in maturation medium containing TCM + HEPES, without controlled gaseous atmosphere environment, at 39ºC, for up to 12 hours. This technique offers a practical and efficient alternative for the transport of bovine oocytes for in vitro production of bovine embryos (IVP.

  9. Fine Mapping and Characterization of Candidate Genes that Control Resistance to Cercospora sojina K. Hara in Two Soybean Germplasm Accessions.

    Directory of Open Access Journals (Sweden)

    Anh-Tung Pham

    Full Text Available Frogeye leaf spot (FLS, caused by the fungus Cercospora sojina K. Hara, may cause a significant yield loss to soybean growers in regions with a warm and humid climate. Two soybean accessions, PI 594891 and PI 594774, were identified to carry a high level of resistance similar to that conditioned by the Rcs3 gene in 'Davis'. Previously, we reported that the resistance to FLS in these two plant introductions (PIs was controlled by a novel gene (s on chromosome 13 that is different from Rcs3. To fine-map the novel FLS resistance gene(s in these two PIs, F2: 3 seeds from the crosses between PI 594891 and PI 594774, and the FLS susceptible genotype 'Blackhawk' were genotyped with SNP markers that were designed based on the SoySNP50k iSelect BeadChip data to identify recombinant events and locate candidate genes. Analysis of lines possessing key recombination events helped narrow down the FLS-resistance genomic region in PI 594891 from 3.3 Mb to a 72.6 kb region with five annotated genes. The resistance gene in PI 594774 was fine-mapped into a 540 kb region that encompasses the 72.6 kb region found in PI 594891. Sequencing five candidate genes in PI 594891 identified three genes that have several mutations in the promoter, intron, 5', and 3' UTR regions. qPCR analysis showed a difference in expression levels of these genes in both lines compared to Blackhawk in the presence of C. sojina. Based on phenotype, genotype and haplotype analysis results, these two soybean accessions might carry different resistance alleles of the same gene or two different gene(s. The identified SNPs were used to develop Kompetitive Allele Specific PCR (KASP assays to detect the resistance alleles on chromosome 13 from the two PIs for marker-assisted selection.

  10. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

    Directory of Open Access Journals (Sweden)

    Ming Luo

    2018-01-01

    Full Text Available Nowadays wireless sensor network (WSN is increasingly being used in the Internet of Things (IoT for data collection, and design of an access control scheme that allows an Internet user as part of IoT to access the WSN becomes a hot topic. A lot of access control schemes have been proposed for the WSNs in the context of the IoT. Nevertheless, almost all of these schemes assume that communication nodes in different network domains share common system parameters, which is not suitable for cross-domain IoT environment in practical situations. To solve this shortcoming, we propose a more secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the Internet of Things, which allows an Internet user in a certificateless cryptography (CLC environment to communicate with a sensor node in an identity-based cryptography (IBC environment with different system parameters. Moreover, our proposed scheme achieves known session-specific temporary information security (KSSTIS that most of access control schemes cannot satisfy. Performance analysis is given to show that our scheme is well suited for wireless sensor networks in the cross-domain context of the IoT.

  11. Hadrons in medium

    Indian Academy of Sciences (India)

    medium properties of hadrons. I discuss the relevant symmetries of QCD and how they might affect the observed hadron properties. I then discuss at length the observable consequences of in-medium changes of hadronic properties in reactions with ...

  12. Medium is the message

    NARCIS (Netherlands)

    Kuipers, G.; Ritzer, G.

    2012-01-01

    "The medium is the message" is a phrase coined by Canadian media theorist Marshall McLuhan (1911-1980), in his book Understanding Media: The Extensions of Man (1964). In this book, McLuhan examines the impact of media on societies and human relations, arguing for the primacy of the medium -

  13. Automatización del manejo de los archivos LOG del NAC (Network Access Control) en el Banco Agrario de Colombia

    OpenAIRE

    2011-01-01

    NacLogAnalizer es un sistema diseñado para el manejo de los archivos LOG que arroja el agente NAC (Network Access Control) en el Banco Agrario de Colombia, permitiendo a diferentes áreas, diferentes a las de tecnología, realizar busquedas de vulnerabilidades existentes. El presente proyecto busca desarrollar un software para el manejo de los archivos LOG que arroja un agente NAC (Network Access Control) en el Banco Agrario de Colombia; esta idea surge de la necesidad de acceso a las redes ...

  14. Internet-accessed sexually transmitted infection (e-STI) testing and results service: A randomised, single-blind, controlled trial.

    Science.gov (United States)

    Wilson, Emma; Free, Caroline; Morris, Tim P; Syred, Jonathan; Ahamed, Irrfan; Menon-Johansson, Anatole S; Palmer, Melissa J; Barnard, Sharmani; Rezel, Emma; Baraitser, Paula

    2017-12-01

    Internet-accessed sexually transmitted infection testing (e-STI testing) is increasingly available as an alternative to testing in clinics. Typically this testing modality enables users to order a test kit from a virtual service (via a website or app), collect their own samples, return test samples to a laboratory, and be notified of their results by short message service (SMS) or telephone. e-STI testing is assumed to increase access to testing in comparison with face-to-face services, but the evidence is unclear. We conducted a randomised controlled trial to assess the effectiveness of an e-STI testing and results service (chlamydia, gonorrhoea, HIV, and syphilis) on STI testing uptake and STI cases diagnosed. The study took place in the London boroughs of Lambeth and Southwark. Between 24 November 2014 and 31 August 2015, we recruited 2,072 participants, aged 16-30 years, who were resident in these boroughs, had at least 1 sexual partner in the last 12 months, stated willingness to take an STI test, and had access to the internet. Those unable to provide consent and unable to read English were excluded. Participants were randomly allocated to receive 1 text message with the web link of an e-STI testing and results service (intervention group) or to receive 1 text message with the web link of a bespoke website listing the locations, contact details, and websites of 7 local sexual health clinics (control group). Participants were free to use any other services or interventions during the study period. The primary outcomes were self-reported STI testing at 6 weeks, verified by patient record checks, and self-reported STI diagnosis at 6 weeks, verified by patient record checks. Secondary outcomes were the proportion of participants prescribed treatment for an STI, time from randomisation to completion of an STI test, and time from randomisation to treatment of an STI. Participants were sent a £10 cash incentive on submission of self-reported data. We completed all

  15. Giving High School Students a Research Grade Radio Telescope to Control; Motivational Results from Access to Real Scientific Tools

    Science.gov (United States)

    Kohrs, Russell; Langston, G.; Heatherly, S.

    2013-01-01

    Have you ever wondered what it might be like to place control of a six-story building in the hands of eager high school students? This past summer, the USNO 20m telescope at the National Radio Astronomy Observatory, Green Bank, WV was brought back online for just such a purpose. This telescope is equipped with an X-band receiver, capable of observing center frequencies from 8-10 GHz and is the first radio telescope accessible by students and observers through the SKYNET telescope network. Operated remotely with a queue-based system, students can now collect real radio data for any range of projects. This past summer, five lessons were written that were tailor-made for student exploration of radio astronomy. Each lesson explores various radio objects in the context of an action-packed sci-fi adventure. Some of the work required to bring the 20m online for student use will be discussed here, but the main focus of this presentation will be how this work has been received by the author’s own students in its first classroom application. Topics that are normally difficult to discuss with students in an inquiry-based classroom setting, such as HII regions, synchrotron radiation, lunar temperature profiles, and galactic supermassive black holes were addressed in the classroom using the lessons developed by the author for the 20m as well as data collected by students using the telescope via SKYNET.

  16. Device for Controlled Distribution of FePt Nanoparticles Formations in a Stream of Liquid Medium under Influence of Magnetic Field

    Directory of Open Access Journals (Sweden)

    Karolis ŠILEIKA

    2014-04-01

    Full Text Available In this research paper a design of magnetic device comprising Halbach arrays which maximizes the magnetic forces acting on magnetic nanoparticles and which can be used for successful steering of said particles to a zone of interest and captured thereat while exhibiting a certain flow and accumulation pattern after injection into a stream of a liquid medium is presented. The aim was to investigate efficiency of such design of a magnetic device for application in magnetic targeting techniques. The presented construction was assembled from 10 magnetic elements having the same dimensions and residual magnetic field, and casing of Plexiglas material. Aggregating of clusters of FePt nanoparticles was evidently successful at preferable region located between two opposing parts of a magnetic device, which was tested for flow rates of (1 – 10 mL/min of main stream medium. To simulate the viscosity of blood a 1.5 % PVP 90 solution was used as the flowing medium. The shallow depth of targeting was chosen for practical reason: to ensure a maximum visibility of particle "steering" pattern obtainable by the magnetic device consisting of two adjacent parts comprising Halbach arrays. DOI: http://dx.doi.org/10.5755/j01.ms.20.1.3371

  17. Sustained attention in mice: expanding the translational utility of the SAT by incorporating the Michigan Controlled Access Response Port (MICARP).

    Science.gov (United States)

    St Peters, Megan; Cherian, Ajeesh Koshy; Bradshaw, Marc; Sarter, Martin

    2011-12-01

    Advances in mouse genetic technology have spurred increasing interest in the development of cognitive tasks for mice. Here, we describe and discuss the modifications necessary to adapt a task for the assessment of sustained attention performance for use in mice, including for taxing the top-down control of such performance. The validity of the Sustained Attention Task (SAT), including the distractor version (dSAT), has previously been demonstrated in rats and humans. This task requires moveable or retractable operanda; insertion of operanda into the operant chambers cues animals to respond to a prior signal or non-signal event, reporting either a hit or a miss, or a correct rejection or false alarm, respectively. Retractable levers did not support sufficiently high and stable levels of performance in mice. Given the widespread use of static nose-poke devices for testing operant performance in mice, we therefore designed and fabricated a retractable nose-poke device. As this device extends into chambers, a hole for nose-poking is slowly opened and closed again as the device retracts (termed the "Michigan Controlled Access Response Port", MICARP). Results describe the effects of variation of signal duration and event rate, trial outcome and trial type probability, effects of mice deprivation levels, and the reliability of SAT and dSAT performance. Mice perform the SAT and dSAT at levels comparable to those observed in rats. This task will be of assistance in expanding the translational usefulness of the SAT and dSAT. Copyright © 2011 Elsevier B.V. All rights reserved.

  18. Local interstellar medium

    International Nuclear Information System (INIS)

    Crutcher, R.M.; and Radio Astronomy Laboratory, University of California, Berkeley)

    1982-01-01

    Analysis of the velocities of optical interstellar lines shows that the Sun is immersed in a coherently moving local interstellar medium whose velocity vector agrees with that of the interstellar wind observed through backscatter of solar H Lyα and He lambda584 photons. The local interstellar medium consists of both cool clouds and warm intercloud medium gas, has a mass of perhaps approx.30 M/sub sun/, does not have severe depletion of trace elements from the gas phase, and appears to be material which has been shocked and accelerated by stellar winds and supernovae associated with the Sco-Oph OB association

  19. Broadband Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Broadband Access. Worldwide market for broadband access $30 Billion! Over 200 million broadband subscribers worldwide! Various Competing Broadband access. Digital Subscriber line; Wireless; Optical Fiber.

  20. HIRENASD medium unstructured

    Data.gov (United States)

    National Aeronautics and Space Administration — Unstructured HIRENASD mesh: - medium size (16 million nodes, 39 million elements) - for node centered solvers - 31.05.2011 - caution: dimensions in mm

  1. Concept medium programme

    DEFF Research Database (Denmark)

    Bjerrum, Peter

    2005-01-01

    The present essay is an attempt to determine the architectural project of the 21st century in relation to a modern conception of space as the medium of architecture, and of sociality as its program...

  2. Concept medium programme

    DEFF Research Database (Denmark)

    Bjerrum, Peter

    2005-01-01

    The present essay is an attempt to determine the architectural project of the 21st century in relation to a modern conception of space as the medium of architecture, and of sociality as its program......The present essay is an attempt to determine the architectural project of the 21st century in relation to a modern conception of space as the medium of architecture, and of sociality as its program...

  3. Thermal energy storage apparatus, controllers and thermal energy storage control methods

    Science.gov (United States)

    Hammerstrom, Donald J.

    2016-05-03

    Thermal energy storage apparatus, controllers and thermal energy storage control methods are described. According to one aspect, a thermal energy storage apparatus controller includes processing circuitry configured to access first information which is indicative of surpluses and deficiencies of electrical energy upon an electrical power system at a plurality of moments in time, access second information which is indicative of temperature of a thermal energy storage medium at a plurality of moments in time, and use the first and second information to control an amount of electrical energy which is utilized by a heating element to heat the thermal energy storage medium at a plurality of moments in time.

  4. Effective medium theory for anisotropic metamaterials

    KAUST Repository

    Zhang, Xiujuan

    2015-01-20

    Materials with anisotropic material parameters can be utilized to fabricate many fascinating devices, such as hyperlenses, metasolids, and one-way waveguides. In this study, we analyze the effects of geometric anisotropy on a two-dimensional metamaterial composed of a rectangular array of elliptic cylinders and derive an effective medium theory for such a metamaterial. We find that it is possible to obtain a closed-form analytical solution for the anisotropic effective medium parameters, provided the aspect ratio of the lattice and the eccentricity of the elliptic cylinder satisfy certain conditions. The derived effective medium theory not only recovers the well-known Maxwell-Garnett results in the quasi-static regime, but is also valid beyond the long-wavelength limit, where the wavelength in the host medium is comparable to the size of the lattice so that previous anisotropic effective medium theories fail. Such an advance greatly broadens the applicable realm of the effective medium theory and introduces many possibilities in the design of structures with desired anisotropic material characteristics. A real sample of a recently theoretically proposed anisotropic medium, with a near-zero index to control the flux, is achieved using the derived effective medium theory, and control of the electromagnetic waves in the sample is clearly demonstrated.

  5. Health Access Livelihood Framework Reveals Potential Barriers in the Control of Schistosomiasis in the Dongting Lake Area of Hunan Province, China

    Science.gov (United States)

    McManus, Donald P.; Raso, Giovanna; Utzinger, Jürg; Xiao, Shui-Yuan; Yu, Dong-Bao; Zhao, Zheng-Yuan; Li, Yue-Sheng

    2013-01-01

    Background Access to health care is a major requirement in improving health and fostering socioeconomic development. In the People's Republic of China (P.R. China), considerable changes have occurred in the social, economic, and health systems with a shift from a centrally planned to a socialist market economy. This brought about great benefits and new challenges, particularly for vertical disease control programs, including schistosomiasis. We explored systemic barriers in access to equitable and effective control of schistosomiasis. Methodology Between August 2002 and February 2003, 66 interviews with staff from anti-schistosomiasis control stations and six focus group discussions with health personnel were conducted in the Dongting Lake area, Hunan Province. Additionally, 79 patients with advanced schistosomiasis japonica were interviewed. The health access livelihood framework was utilized to examine availability, accessibility, affordability, adequacy, and acceptability of schistosomiasis-related health care. Principal Findings We found sufficient availability of infrastructure and human resources at most control stations. Many patients with advanced schistosomiasis resided in non-endemic or moderately endemic areas, however, with poor accessibility to disease-specific knowledge and specialized health services. Moreover, none of the patients interviewed had any form of health insurance, resulting in high out-of-pocket expenditure or unaffordable care. Reports on the adequacy and acceptability of care were mixed. Conclusions/Significance There is a need to strengthen health awareness and schistosomiasis surveillance in post-transmission control settings, as well as to reduce diagnostic and treatment costs. Further studies are needed to gain a multi-layered, in-depth understanding of remaining barriers, so that the ultimate goal of schistosomiasis elimination in P.R. China can be reached. PMID:23936580

  6. Health access livelihood framework reveals potential barriers in the control of schistosomiasis in the Dongting Lake area of Hunan Province, China.

    Directory of Open Access Journals (Sweden)

    Julie Balen

    Full Text Available Access to health care is a major requirement in improving health and fostering socioeconomic development. In the People's Republic of China (P.R. China, considerable changes have occurred in the social, economic, and health systems with a shift from a centrally planned to a socialist market economy. This brought about great benefits and new challenges, particularly for vertical disease control programs, including schistosomiasis. We explored systemic barriers in access to equitable and effective control of schistosomiasis.Between August 2002 and February 2003, 66 interviews with staff from anti-schistosomiasis control stations and six focus group discussions with health personnel were conducted in the Dongting Lake area, Hunan Province. Additionally, 79 patients with advanced schistosomiasis japonica were interviewed. The health access livelihood framework was utilized to examine availability, accessibility, affordability, adequacy, and acceptability of schistosomiasis-related health care.We found sufficient availability of infrastructure and human resources at most control stations. Many patients with advanced schistosomiasis resided in non-endemic or moderately endemic areas, however, with poor accessibility to disease-specific knowledge and specialized health services. Moreover, none of the patients interviewed had any form of health insurance, resulting in high out-of-pocket expenditure or unaffordable care. Reports on the adequacy and acceptability of care were mixed.There is a need to strengthen health awareness and schistosomiasis surveillance in post-transmission control settings, as well as to reduce diagnostic and treatment costs. Further studies are needed to gain a multi-layered, in-depth understanding of remaining barriers, so that the ultimate goal of schistosomiasis elimination in P.R. China can be reached.

  7. Throughput-Delay Trade-Off for Slotted Aloha Multiple Access with Capture Effect

    OpenAIRE

    A. Chehri; P. Fortier; P. M. Tardif

    2009-01-01

    Problem statement: Medium Access Control (MAC) protocols are one of most important research issues in communication and networking. There have been proposed several MAC protocols in wireless as well in wired networks. Approach: ALOHA-based protocol is the simplest one, being able to provide prompt access, reliable channels and support for quality of service. However its limited capacity, low throughput and excessive delays make it not suitable for several applications. Results: So there had b...

  8. The effect of cold priming on the fitness of Arabidopsis thaliana accessions under natural and controlled conditions

    DEFF Research Database (Denmark)

    Cvetkovic, Jelena; Müller, Klaus; Baier, Margarete

    2017-01-01

    Priming improves an organism's performance upon a future stress. To test whether cold priming supports protection in spring and how it is affected by cold acclimation, we compared seven Arabidopsis accessions with different cold acclimation potentials in the field and in the greenhouse for growth...... that cold priming stronger impacts on plant fitness than cold acclimation in spring in accessions with intermediate and low cold acclimation potential....

  9. The acceptability and impact of a randomised controlled trial of welfare rights advice accessed via primary health care: qualitative study

    Directory of Open Access Journals (Sweden)

    Howel Denise

    2006-06-01

    Full Text Available Abstract Background Qualitative research is increasingly used alongside randomised controlled trials (RCTs to study a range of factors including participants' experiences of a trial. The need for a sound evidence base within public health will increase the need for RCTs of non-clinical interventions. Welfare rights advice has been proposed as an intervention with potential to reduce health inequalities. This qualitative study, nested within an RCT of the impact of welfare rights advice, examined the acceptability of the intervention, the acceptability of the research process and the perceived impact of the intervention. Methods 25 men and women aged 60 years or over were recruited from four general practices in Newcastle upon Tyne (UK, a sub-sample of those who consented to be contacted (n = 96 during the RCT baseline interview. Semi-structured interviews were undertaken and analysed using the Framework Method. Results Participants viewed the trial positively although, despite agreeing that the information leaflet was clear, some had agreed to participate without being fully aware of what was involved. Some participants were unaware of the implications of randomisation. Most thought it fair, but a few concerns were raised about the control condition. The intervention was acceptable and made participants feel confident about applying for benefit entitlements. 14 out of 25 participants received some financial award; median weekly income gain was £57 (€84, $101. The perceived impact of additional finances was considerable and included: increased affordability of necessities and occasional expenses; increased capacity to deal with emergencies; and a reduction in stress related to financial worries. Overall, perceived independence and ability to participate in society increased. Most participants perceived benefits to their mental well-being, but no-one reported an improvement in physical health. The RCT showed little or no effect on a wide range

  10. Defined medium for Moraxella bovis.

    OpenAIRE

    Juni, E; Heym, G A

    1986-01-01

    A defined medium (medium MB) for Moraxella bovis was formulated. Nineteen strains grew well on medium MB. One strain was auxotrophic for asparagine, and another was auxotrophic for methionine. Strains of M. equi and M. lacunata also grew on medium MB. All strains had an absolute requirement for thiamine and were stimulated by or actually required the other growth factors in the medium.

  11. Spiegel. Medium. Kunst

    DEFF Research Database (Denmark)

    Kacunko, Slavko

    and cultural perspective. From 1800 on, the great incentive was to push forward the material-physical and optical-mechanical and especially the media ‘exploitation’ of the mirror. The significance of the mirror as a central meta-medium of the visual emerged in a particularly striking way in the late 1830s....... That ricochets through media theory, theories of art and culture and through cultural historiography. A repository is one thing, a transmitter another: the distinction will act crucially on the quest for appropriate perspectives and classifications of what in terms of disciplines would rather appear...... or as synaesthesia gone mute. It stands in contrast with the mirror, which assumes the status of a medium facility or meta-medium of visual transference, encountering its only medial and operative limitation within the analogue or digital repository media. The present proposal for an artistic and cultural history...

  12. Social Determinants of Equity in Access to Healthcare for Tuberculosis Patients in Republic of Macedonia – Results from a Case-Control Study

    Directory of Open Access Journals (Sweden)

    Dance Gudeva Nikovska

    2014-09-01

    Full Text Available Background Health is a complex phenomenon and equity as a basic human right an integral part of constitutions in almost all countries in the world. In Republic of Macedonia (RM, Tuberculosis (TB is clustered regionally and in certain ethnic groups. The main objective of this study was to analyze Social Determinants of Health (SDH and equity in access to healthcare services for TB patients in RM, aimed at complex analysis of factors that cause inequities. Methods Case-control study was conducted in the period March–December, 2013; “cases” are households of TB patients registered in the period July, 2012–June, 2013 and controls are households with no TB patients in their immediate vicinity. World Health Organization (WHO World Health Survey questionnaire was used to collect data. Results Analysis of SDH of TB patients shows that patients are mostly males, of lower socio-economic status, are less educated, unemployed and TB is clustered in certain ethnic groups. Analysis of access has identified these determinants as important barriers in access to health services. Conclusion The study has documented the basic SDH of TB patients in RM, as well as barriers in access to healthcare, providing useful baseline information to facilitate determination where to concentrate future efforts.

  13. Concept medium program

    DEFF Research Database (Denmark)

    Bjerrum, Peter

    2003-01-01

    The present essays is an attempt to dertermine the architecural project of the 21st century in realation to a modern conception of space as the medium of architecture, and of society as its program. This attempt adopts the internal point of view of an architect in describing a modern architectura...

  14. Radon in geological medium

    International Nuclear Information System (INIS)

    Hricko, J.

    1995-01-01

    The paper presented deals with behavior of the radon in geological medium and with some results of the radon survey in Bratislava and Kosice regions. 1) The a v has been detected in the holes 0.80 m deep. The density of observations - 3 reference areas (one represents 20 stations) per 1 km 2 . The radon risk maps in 1:25000 and 1:50000 scales have been compiled. The 56.8% of the project area lies in low radon risk, 37.6% in medium radon risk and 5.6% in high radon risk. Follow-up monitoring of the equivalent volume radon activity (EVRA) at the flats, located in the areas with high radon risk of the surface layer, has showed values several times higher than Slovak limits (Marianka, Raca, Vajnory). The evidence that neotectonic is excellent medium for rising up emanation to the subsurface layer, is shown on the map. The tectonic zone of Liscie udolie in Bratislava-Karlova Ves area has been clearly detected by profile radon survey (a v > 50 kBq/m 3 ). 2) At present, northern half of the area of Kosice in question was covered by radon survey. The low and medium radon risks have been observed here, while localities with high radon risk are small in extent. The part of radon risk and soil permeability map from northern Kosice area is shown. (J.K.) 3 figs., 2 refs

  15. A Randomized Controlled Trial of a Mobile Clinical Decision Aid to Improve Access to Kidney Transplantation: iChoose Kidney

    Directory of Open Access Journals (Sweden)

    Rachel E. Patzer

    2016-05-01

    Discussion: Engaging patients in health care choices can increase patient empowerment and improve knowledge and understanding of treatment choices. If the effectiveness of iChoose Kidney has a greater impact on patients with low health literacy, lower socioeconomic status, and minority race, this decision aid could help reduce disparities in access to kidney transplantation.

  16. The Hewlett-Packard HP-41CV Hand-Held Computer as a Medium for Teaching Mathematics to Fire Control Systems Repairers. Research Report 1408.

    Science.gov (United States)

    Boldovici, John A.; Scott, Thomas D.

    A study compared the benefits of using the Hewlett-Packard HP-41CV hand-held computer, as opposed to conventional training without computers, in teaching mathematics to fire control systems repairers. Thirty soldiers in a course to train fire control systems repairers received training in technical mathematics using the hand-held computer, whereas…

  17. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  18. Switching power converters medium and high power

    CERN Document Server

    Neacsu, Dorin O

    2013-01-01

    An examination of all of the multidisciplinary aspects of medium- and high-power converter systems, including basic power electronics, digital control and hardware, sensors, analog preprocessing of signals, protection devices and fault management, and pulse-width-modulation (PWM) algorithms, Switching Power Converters: Medium and High Power, Second Edition discusses the actual use of industrial technology and its related subassemblies and components, covering facets of implementation otherwise overlooked by theoretical textbooks. The updated Second Edition contains many new figures, as well as

  19. Spatial accessibility of drug treatment facilities and the effects on locus of control, drug use, and service use among heroin-injecting Mexican American men.

    Science.gov (United States)

    Kao, Dennis; Torres, Luis R; Guerrero, Erick G; Mauldin, Rebecca L; Bordnick, Patrick S

    2014-05-01

    This study explores the spatial accessibility of outpatient drug treatment facilities and the potential relationship with drug use-related outcomes among Mexican American heroin users. Secondary data on 219 current and former heroin-injecting Mexican American men aged 45 and older were drawn from a research study in Houston, Texas. We used geographic information systems (GIS) to derive two spatial accessibility measures: distance from one's place of residence to the closest drug treatment facility (in minutes); and the number of facilities within a 10-minute driving distance from one's place of residence. Exploratory logistic regression analyses examined the association between the spatial accessibility of drug treatment facilities and several drug use-related outcomes: internal locus of control (LOC); perceived chances and worries of injecting in the next six months; treatment utilization; and location of last heroin purchase. Participants with greater spatial access to treatment programs were more likely to report a higher chance of injecting in the near future. However, while current heroin users were more worried about injecting in the next six months, greater spatial access to treatment programs seemed to have a buffering effect. Finally, those who lived closer to a treatment programs were more likely to have last purchased heroin inside the neighborhood versus outside the neighborhood. Spatial accessibility was not associated with internal LOC or treatment utilization. The findings showed that the presence of outpatient treatment facilities-particularly services in Spanish-may influence perceived risk of future heroin use and purchasing behaviors among Mexican American men. Implications for future spatially-informed drug use research and the planning of culturally and linguistically responsive drug treatment programs are discussed. Copyright © 2014 Elsevier B.V. All rights reserved.

  20. Controlled synthesis of La1−xSrxCrO3 nanoparticles by hydrothermal method with nonionic surfactant and their ORR activity in alkaline medium

    International Nuclear Information System (INIS)

    Choi, Bo Hyun; Park, Shin-Ae; Park, Bong Kyu; Chun, Ho Hwan; Kim, Yong-Tae

    2013-01-01

    Graphical abstract: We demonstrate that Sr-doped LaCrO 3 nanoparticles were successfully prepared by the hydrothermal synthesis method using the nonionic surfactant Triton X-100 and the applicability of La 1−x Sr x CrO 3 to oxygen reduction reaction (ORR) electrocatalysis in an alkaline medium. Compared with the nanoparticles synthesized by the coprecipitation method, they showed enhanced ORR activity. - Highlights: • Sr-doped LaCrO 3 nanoparticles were successfully prepared by the hydrothermal method using the nonionic surfactant. • Homogeneously shaped and sized Sr-doped LaCrO 3 nanoparticles were readily obtained. • Compared with the nanoparticles synthesized by the coprecipitation method, they showed an enhanced ORR activity. • The main origin was revealed to be the decreased particle size due to the nonionic surfactant. - Abstract: Sr-doped LaCrO 3 nanoparticles were prepared by the hydrothermal method with the nonionic surfactant Triton X-100 followed by heat treatment at 1000 °C for 10 h. The obtained perovskite nanoparticles had smaller particle size (about 100 nm) and more uniform size distribution than those synthesized by the conventional coprecipitation method. On the other hand, it was identified with the material simulation that the electronic structure change by Sr doping was negligible, because the initially unfilled e g -band was not affected by the p-type doping. Finally, the perovskite nanoparticles synthesized by hydrothermal method showed much higher ORR activity by over 200% at 0.8 V vs. RHE than those by coprecipitation method