WorldWideScience

Sample records for rapid access proposals

  1. Voluntary transmission access: The PSI proposal

    International Nuclear Information System (INIS)

    Norris, J.E.

    1990-01-01

    This article examines a proposal from PSI Energy, Inc. (formerly Public Service Company of Indiana) to allow open access to its power transmission facilities and the response of the Federal Energy Regulatory Commission's response to that proposal. The topics discussed include transmission tariffs, competition, market share, expansion of transmission capacity and its funding, and reciprocal agreements to provide similar service

  2. Optical code division multiple access secure communications systems with rapid reconfigurable polarization shift key user code

    Science.gov (United States)

    Gao, Kaiqiang; Wu, Chongqing; Sheng, Xinzhi; Shang, Chao; Liu, Lanlan; Wang, Jian

    2015-09-01

    An optical code division multiple access (OCDMA) secure communications system scheme with rapid reconfigurable polarization shift key (Pol-SK) bipolar user code is proposed and demonstrated. Compared to fix code OCDMA, by constantly changing the user code, the performance of anti-eavesdropping is greatly improved. The Pol-SK OCDMA experiment with a 10 Gchip/s user code and a 1.25 Gb/s user data of payload has been realized, which means this scheme has better tolerance and could be easily realized.

  3. A New Proposed Cost Model for List Accessing Problem using Buffering

    OpenAIRE

    Mohanty, Rakesh; Bhoi, Seetaya; Tripathy, Sasmita

    2011-01-01

    There are many existing well known cost models for the list accessing problem. The standard cost model developed by Sleator and Tarjan is most widely used. In this paper, we have made a comprehensive study of the existing cost models and proposed a new cost model for the list accessing problem. In our proposed cost model, for calculating the processing cost of request sequence using a singly linked list, we consider the access cost, matching cost and replacement cost. The cost of processing a...

  4. Patterns of Practice in Palliative Radiotherapy for Painful Bone Metastases: Impact of a Regional Rapid Access Clinic on Access to Care

    International Nuclear Information System (INIS)

    Wu, Jackson S.Y.; Kerba, Marc; Wong, Rebecca K.S.; Mckimmon, Erin; Eigl, Bernhard; Hagen, Neil A.

    2010-01-01

    Purpose: External beam radiotherapy (RT) is commonly indicated for the palliation of symptomatic bone metastases, but there is evidence of underutilization of this treatment modality in palliative care for cancer populations. This study was conducted to investigate factors that influenced the use of palliative RT services at a regional comprehensive cancer center. Methods and Materials: A cohort of patients with radiographically confirmed bone metastases and first-time users of palliative RT between 2003 and 2005 was retrospectively reviewed from the time of initial diagnosis of bone metastases to death or last follow-up. Type of radiation treatment service provider used (rapid access or routine access) and patient-, tumor-, and treatment-related factors were analyzed for their influences on the number of treatment courses given over the duration of disease. Results: A total of 887 patients received 1,354 courses of palliative RT for bone metastases at a median interval of 4.0 months between courses. Thirty-three percent of patients required more than one RT course. Increased age and travel distance reduced the likelihood and number of treatment courses, while service through a rapid access clinic was independently associated with an increase in subsequent use of palliative RT. Conclusions: A rapid access service model for palliative RT facilitated access to RT. Travel distance and other factors remained substantial barriers to use of palliative RT services. The pattern of practice suggests an unmet need for symptom control in patients with bone metastases.

  5. Regulatory assessment of proposed accessibility guidelines for pedestrians in the public right-of-way

    Science.gov (United States)

    2011-06-30

    This report assesses the potential costs and benefits of proposed accessibility guidelines issued by the Access Board for pedestrian facilities in the public right-of-way. The report also analyzes the potential impacts of the proposed guidelines on s...

  6. Assessing 15 proposals for promoting innovation and access to medicines globally.

    Science.gov (United States)

    Hoffman, Steven J; So, Karen

    2014-01-01

    There is widespread recognition that the existing global systems for innovation and access to medicines need reform. Billions of people do not have access to the medicines they need, and market failures prevent new drugs from being developed for diseases that primarily affect the global poor. The World Health Organization's Consultative Expert Working Group on Research and Development: Financing and Coordination (CEWG) analyzed numerous proposals for reform. The aim of this article is to build on these previous inquiries. We conducted a structured analysis that grouped proposals into five broad opportunities for global policy reform to help researchers and decision makers to meaningfully evaluate each proposal in comparison with similar proposals. Proposals were also analyzed along three important dimensions-potential health impact, financial implications, and political feasibility-further facilitating the comparison and application of this information. Upon analysis, no one solution was deemed a panacea, as many (often competing) considerations need to be taken into account. However, some proposals, particularly product development partnership and prizes, appeared more promising and feasible at this time and deserve further attention. More research is needed into the effectiveness of these mechanisms and their transferability across jurisdictions. Copyright © 2014 The Authors. Published by Elsevier Inc. All rights reserved.

  7. Consciousness: physiological dependence on rapid memory access.

    Science.gov (United States)

    Hudson, Arthur J

    2009-01-01

    Consciousness develops from birth during the early months as the senses and other nervous system functions mature sufficiently to receive, process and store information. Among these is the ascending reticular activating (arousal) system in the brain stem that is responsible for wakefulness and was proposed by Penfield and Jasper more than 50 years ago as the "controlling mechanism for states of consciousness". This concept has remained the most advanced physiological interpretation of consciousness although recent developments offer greater insights into its nature. The ascending arousal system is the source of activation of the thalamocortical and cortical mechanisms for sensory input and facilitates the rapid matching of sensory input and the binding of memory during cognitive processing. Nonetheless, it is proposed that memory is the critical element through which our connection with the world exists without which, despite a fully functional arousal system, consciousness as we know it could not exist. Evidence is presented in support of this concept in addition to the physiological difficulties that must be resolved if consciousness is to be understood.

  8. Modeling commuter preferences for the proposed bus rapid transit in Dar-es-Salaam

    NARCIS (Netherlands)

    Nkurunziza, A.; Zuidgeest, M.H.P.; Brussel, M.J.G.; van Maarseveen, M.F.A.M.

    2012-01-01

    The paper analyzes individual commuter preferences towards the proposed bus rapid transit (BRT) system in Dar-es-Salaam, Tanzania. The objective of the survey was to identify how commuters perceive and value the proposed BRT service quality attributes. A stated preference survey of potential users

  9. 77 FR 42556 - Proposed Information Collection (Access to Financial Records) Activity: Comment Request

    Science.gov (United States)

    2012-07-19

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0739] Proposed Information Collection (Access... of Veterans Affairs. ACTION: Notice. SUMMARY: The Veterans Benefits Administration (VBA), Department... collection of information, VBA invites comments on: (1) Whether the proposed collection of information is...

  10. A novel rapid access testicular cancer clinic: prospective evaluation after one year.

    Science.gov (United States)

    Carey, K; Davis, N F; Elamin, S; Ahern, P; Brady, C M; Sweeney, P

    2016-02-01

    Our institution has recently developed a rapid access outpatient clinic to investigate men with testicular lumps and/or pain suspicious for testicular cancer (TCa). To present our experience after 12 months. All referrals to the rapid access testicular clinic (RATC) clinic were prospectively analysed from 01/01/2013 to 01/01/2014. The primary outcome variable was incidence of TCa in the referred patient cohort. Secondary outcome variables were waiting times prior to clinical review and waiting times prior to radical orchidectomy in patients diagnosed with TCa. Seventy-four new patients were referred to the RATC during the 1-year period and the mean age was 34 (range 15-81 years). TCa was the most common diagnosis and was found in 18 (25 %) patients. Patients diagnosed with TCa underwent radical orchidectomy, a median of 3 (range 1-5) days after their initial GP referral. Patients requiring surgical intervention for benign scrotal pathology underwent their procedure a median of 32 (range 3-61) days after their initial referral. Of the 18 patients diagnosed with TCa, 9 (50 %) were diagnosed with a seminomatous germ cell tumour on histopathology. The RATC is a new initiative in Ireland that provides expedient and definitive treatment of patients with newly diagnosed TCa. Early treatment will ultimately improve long-term prognosis in this patient cohort.

  11. One goal, many paths: Policy proposals for universal access to broadband in Brazil

    OpenAIRE

    Gomes, André Moura; Cordeiro, Pedro Antero Braga; Araújo, Pedro Lucas da Cruz Pereira

    2014-01-01

    The purpose is to introduce policy proposals for universal access to broadband, assessing the hypothetical implementation of instruments suggested by the sectoral literature to Brazil. The methodology is based on the analysis of the literature on policies for universal access and broadband plans in the context of Latin America and the Organization for Economic Cooperation and Development (OECD) and the discussion of its effects on related sectoral indicators. Then, the impact of the applicati...

  12. Assessing health systems for type 1 diabetes in sub-Saharan Africa: developing a 'Rapid Assessment Protocol for Insulin Access'

    Directory of Open Access Journals (Sweden)

    de Courten Maximilian

    2006-02-01

    Full Text Available Abstract Background In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol for the gathering of other data through site visits, discussions, and document reviews. Methods The Rapid Assessment Protocol for Insulin Access draws on the principles of Rapid Assessment Protocols which have been developed and implemented in several different areas. This protocol was adapted through a thorough literature review on diabetes, chronic condition management and medicine supply in developing countries. A visit to three countries in sub-Saharan Africa and meetings with different experts in the field of diabetes helped refine the questionnaires. Following the development of the questionnaires these were tested with various people familiar with diabetes and/or healthcare in developing countries. The Protocol was piloted in Mozambique then refined and had two further iterations in Zambia and Mali. Translations of questionnaires were made into local languages when necessary, with back translation to ensure precision. Results In each country the protocol was implemented in 3 areas – the capital city, a large urban centre and a predominantly rural area and their respective surroundings. Interviews were carried out by local teams trained on how to use the tool. Data was then collected and entered into a database for analysis. Conclusion The Rapid Assessment Protocol for Insulin Access was developed to provide a situational analysis of Type 1 diabetes, in order to make recommendations to the national Ministries of Health and Diabetes Associations. It provided valuable information on patients' access to insulin, syringes, monitoring and care. It was thus able to sketch a picture of the health care system with regards to its ability to

  13. Agricultural market access proposals in the Doha round : Dutch agro-food interests

    NARCIS (Netherlands)

    Kuiper, M.H.; Banse, M.A.H.

    2007-01-01

    This report analyses the impact of market access proposals tabled in the current WTO Doha round. The first part of the study assesses the 'bite' of tariff reductions by comparing border prices of Dutch products with those of imports before and after implementing tariff reductions. The second part of

  14. Assessing health systems for type 1 diabetes in sub-Saharan Africa: developing a 'Rapid Assessment Protocol for Insulin Access'

    DEFF Research Database (Denmark)

    Beran, David; Yudkin, John S; de Courten, Maximilian

    2006-01-01

    In order to improve the health of people with Type 1 diabetes in developing countries, a clear analysis of the constraints to insulin access and diabetes care is needed. We developed a Rapid Assessment Protocol for Insulin Access, comprising a series of questionnaires as well as a protocol...... for the gathering of other data through site visits, discussions, and document reviews....

  15. Anemia management: development of a rapid-access anemia and intravenous iron service

    Directory of Open Access Journals (Sweden)

    Radia D

    2013-08-01

    Full Text Available Deepti Radia,1 Ibrahim Momoh,2 Richard Dillon,1 Yvonne Francis,1 Laura Cameron,1 Toni-Lee Fagg,1 Hannah Overland,1 Susan Robinson,1 Claire N Harrison11Haematology Department, Guy's and St Thomas' NHS Foundation Trust, London, UK; 2Bupa Home Healthcare, Harlow, UKAbstract: This article describes the initiation and evolution of the Rapid-Access Anemia Clinic (RAAC at Guy's and St Thomas' Hospitals, London, UK. This clinic was set up to provide diagnosis and treatment, and to coordinate investigative procedures, where necessary, into the underlying causes of anemia. Initially piloted with anemic preoperative orthopedic patients, the clinic now treats a wide range of conditions, deriving from both internal and external referrals. Treatment includes dietary advice, supplementation with iron, vitamin B12 and folate, and blood transfusion. Most patients at the RAAC need iron replacement, the majority of which require intravenous (IV iron. Therefore the first-line IV iron-administration protocol is carefully considered to ensure viability of the service and patient satisfaction. Four IV irons available in the UK are discussed, with explanation of the benefits and drawbacks of each product and the reasoning behind the IV iron choice at different stages of the RAAC's development. Costs to the service, affected by IV iron price and administration regimen, are considered, as well as the product's contraindications. Finally, the authors reflect on the success of the RAAC and how it has improved patients' quality-of-treatment experience, in addition to benefiting the hospital and National Health Service in achieving specific health-care mandates and directives. Drawing from the authors' experiences, recommendations are given to assist others in setting up and providing a successful rapid-access anemia service or similar facility.Keywords: hemoglobin, iron deficiency, ferric carboxymaltose, iron sucrose, iron dextran, iron isomaltoside

  16. An improved synthesis of pentacene: rapid access to a benchmark organic semiconductor.

    Science.gov (United States)

    Pramanik, Chandrani; Miller, Glen P

    2012-04-20

    Pentacene is an organic semiconductor used in a variety of thin-film organic electronic devices. Although at least six separate syntheses of pentacene are known (two from dihydropentacenes, two from 6,13-pentacenedione and two from 6,13-dihydro-6,13-dihydroxypentacene), none is ideal and several utilize elevated temperatures that may facilitate the oxidation of pentacene as it is produced. Here, we present a fast (-2 min of reaction time), simple, high-yielding (≥ 90%), low temperature synthesis of pentacene from readily available 6,13-dihydro-6,13-dihydroxypentacene. Further, we discuss the mechanism of this highly efficient reaction. With this improved synthesis, researchers gain rapid, affordable access to high purity pentacene in excellent yield and without the need for a time consuming sublimation.

  17. An Improved Synthesis of Pentacene: Rapid Access to a Benchmark Organic Semiconductor

    Directory of Open Access Journals (Sweden)

    Glen P. Miller

    2012-04-01

    Full Text Available Pentacene is an organic semiconductor used in a variety of thin-film organic electronic devices. Although at least six separate syntheses of pentacene are known (two from dihydropentacenes, two from 6,13-pentacenedione and two from 6,13-dihydro-6,13-dihydroxypentacene, none is ideal and several utilize elevated temperatures that may facilitate the oxidation of pentacene as it is produced. Here, we present a fast (~2 min of reaction time, simple, high-yielding (≥90%, low temperature synthesis of pentacene from readily available 6,13-dihydro-6,13-dihydroxypentacene. Further, we discuss the mechanism of this highly efficient reaction. With this improved synthesis, researchers gain rapid, affordable access to high purity pentacene in excellent yield and without the need for a time consuming sublimation.

  18. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKDS

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A novel Multiple Access Control(MAC) protocol-User-dependent Perfect-scheduling Multiple Access(UPMA) protocol,which supports joint transmission of voice and data packets,is proposed.By this protocol,the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals(MTs) can be perfectly scheduled by means of polling.Meanwhile.a unique frame stucture is designed to guarantee Quality of Service(QoS) in voice traffic supporting.An effective colision resolution algorthm is also proposed to guarantee rapid channel access for activated MTs.Finally,performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  19. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zhou Yajian; Li Jiandong; Liu Kai

    2002-01-01

    A novel Multiple Access Control (MAC) protocol - User-dependent Perfect-scheduling Multiple Access (UPMA) protocol, which supports joint transmission of voice and data packets,is proposed. By this protocol, the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals (MTs)can be perfectly scheduled by means of polling. Meanwhile, a unique frame structure is designed to guarantee Quality of Service (QoS) in voice traffic supporting. An effective collision resolution algorithm is also proposed to guarantee rapid channel access for activated MTs. Finally, performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  20. Rapid Access Ice Drill: A New Tool for Exploration of the Deep Antarctic Ice Sheets and Subglacial Geology

    Science.gov (United States)

    Goodge, J. W.; Severinghaus, J. P.

    2014-12-01

    The Rapid Access Ice Drill (RAID) will penetrate the Antarctic ice sheets in order to core through deep ice, the glacial bed, and into bedrock below. This new technology will provide a critical first look at the interface between major ice caps and their subglacial geology. Currently in construction, RAID is a mobile drilling system capable of making several long boreholes in a single field season in Antarctica. RAID is interdisciplinary and will allow access to polar paleoclimate records in ice >1 Ma, direct observation at the base of the ice sheets, and recovery of rock cores from the ice-covered East Antarctic craton. RAID uses a diamond rock-coring system as in mineral exploration. Threaded drill-pipe with hardened metal bits will cut through ice using reverse circulation of Estisol for pressure-compensation, maintenance of temperature, and removal of ice cuttings. Near the bottom of the ice sheet, a wireline bottom-hole assembly will enable diamond coring of ice, the glacial bed, and bedrock below. Once complete, boreholes will be kept open with fluid, capped, and made available for future down-hole measurement of thermal gradient, heat flow, ice chronology, and ice deformation. RAID will also sample for extremophile microorganisms. RAID is designed to penetrate up to 3,300 meters of ice and take sample cores in less than 200 hours. This rapid performance will allow completion of a borehole in about 10 days before moving to the next drilling site. RAID is unique because it can provide fast borehole access through thick ice; take short ice cores for paleoclimate study; sample the glacial bed to determine ice-flow conditions; take cores of subglacial bedrock for age dating and crustal history; and create boreholes for use as an observatory in the ice sheets. Together, the rapid drilling capability and mobility of the drilling system, along with ice-penetrating imaging methods, will provide a unique 3D picture of the interior Antarctic ice sheets.

  1. Cognitive Self-Scheduled Mechanism for Access Control in Noisy Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Mario Manzano

    2015-01-01

    Full Text Available Within the challenging environment of intelligent transportation systems (ITS, networked control systems such as platooning guidance of autonomous vehicles require innovative mechanisms to provide real-time communications. Although several proposals are currently under discussion, the design of a rapid, efficient, flexible, and reliable medium access control mechanism which meets the specific constraints of such real-time communications applications remains unsolved in this highly dynamic environment. However, cognitive radio (CR combines the capacity to sense the radio spectrum with the flexibility to adapt to transmission parameters in order to maximize system performance and has thus become an effective approach for the design of dynamic spectrum access (DSA mechanisms. This paper presents the enhanced noncooperative cognitive division multiple access (ENCCMA proposal combining time division multiple access (TDMA and frequency division multiple access (FDMA schemes with CR techniques to obtain a mechanism fulfilling the requirements of real-time communications. The analysis presented here considers the IEEE WAVE and 802.11p as reference standards; however, the proposed medium access control (MAC mechanism can be adapted to operate on the physical layer of different standards. The mechanism also offers the advantage of avoiding signaling, thus enhancing system autonomy as well as behavior in adverse scenarios.

  2. Outcomes of patients presenting to a dedicated rapid access lung cancer clinic.

    LENUS (Irish Health Repository)

    Dunican, E

    2012-02-01

    We examined the outcomes of the first 500 patients referred to a dedicated Rapid Access Lung Cancer Clinic. A total of 206 patients (41.2%) were diagnosed with a thoracic malignancy; 179 had primary lung cancer and 27 had secondary or other thoracic cancers. Pulmonary nodules requiring ongoing surveillance were found in a further 79 patients (15.8%). Of those patients found to have primary lung cancer, 24 (13.4%) had Small Cell and 145 (81%) had Non Small Cell Lung Cancer. In patients with Non small cell tumours, 26 (21.1%) were stage 1, 14 (11.4%) stage II, 37 (30.1%) stage III and 46 (37.4%) stage IV at diagnosis. For the 129 patients (72%) in whom the thoracic MDT recommended active treatment, primary therapy was surgical resection in 44 (24.6%), combined chemoradiation in 31 patients (17.3%), chemotherapy alone in 39 (21.8%) and radiation in 15 (8.4%).

  3. Pyrimidine dimers in Drosophila chromatin become increasingly accessible after irradiation

    International Nuclear Information System (INIS)

    Harris, P.V.; Boyd, J.B.

    1987-01-01

    A prokaryotic DNA-repair enzyme has been utilized as a probe for changes in the accessibility of pyrimidine dimers in Drosophila chromatin following UV irradiation. The results demonstrate a rapid cellular response to physiologically relevant doses of radiation which results in at least a 40% increase in accessible dimers. This increase occurs in two incision-deficient mutants which indicates that the excision-repair process, at or beyond the incision step, is not required or responsible for the increase. In the absence of excision the increase in accessibility persists for a least 2 days following irradiation. The observed increase in accessibility is inhibited by both novobiocin and coumermycin. These inhibitors do not inhibit the initial rate of incision, but do reduce dimer excision measured over more extended periods. A pre-incision process is proposed which actively exposes DNA lesions to excision repair. A fraction of the genome is postulated to be accessible without the intervention of that process. (Auth.)

  4. Learning from a Rapid Health Impact Assessment of a proposed maternity service reconfiguration in the English NHS.

    Science.gov (United States)

    Fell, Greg; Haroon, Sophie

    2008-04-25

    Within many parts of the country, the NHS is undertaking reconfiguration of services. Such proposals can prove a tipping point and provoke public protest, often with significant involvement of local and national politicians. We undertook a rapid Health Impact Assessment (HIA) of a proposed reconfiguration of maternity services in Huddersfield and Halifax in England. The aim of the HIA was to help the PCT Boards to assess the reconfiguration's possible consequences on access to maternity services, and maternal and infant health outcomes across different socio-economic groups in Kirklees. We report on the findings of the HIA and the usefulness of the process to decision making. This HIA used routine maternity data for 2004-2005 in Huddersfield, in addition to published evidence. Standard HIA techniques were used. We re-highlighted the socio economic differences in smoking status at booking and quitting during pregnancy. We focused on the key concerns of the public, that of adverse obstetric events on a Midwife Led Unit (MLU) with distant obstetric cover. We estimate that twenty percent of women giving birth in a MLU may require urgent transfer to obstetric care during labour. There were no significant socio economic differences. Much of the risk can be mitigated though robust risk management policies. Additional travelling distances and costs could affect lower socio-economic groups the greatest because of lower car ownership and geographical location in relation to the units. There is potential that with improved community antenatal and post natal care, population outcomes could improve significantly, the available evidence supports this view. Available evidence suggests that maternity reconfiguration towards enhanced community care could have many potential benefits but carries risk. Investment is needed to realise the former and mitigate the latter. The usefulness of this Health Impact Assessment may have been impeded by its timing, and the politically charged

  5. Learning from a Rapid Health Impact Assessment of a proposed maternity service reconfiguration in the English NHS

    Directory of Open Access Journals (Sweden)

    Haroon Sophie

    2008-04-01

    Full Text Available Abstract Background Within many parts of the country, the NHS is undertaking reconfiguration of services. Such proposals can prove a tipping point and provoke public protest, often with significant involvement of local and national politicians. We undertook a rapid Health Impact Assessment (HIA of a proposed reconfiguration of maternity services in Huddersfield and Halifax in England. The aim of the HIA was to help the PCT Boards to assess the reconfiguration's possible consequences on access to maternity services, and maternal and infant health outcomes across different socio-economic groups in Kirklees. We report on the findings of the HIA and the usefulness of the process to decision making. Methods This HIA used routine maternity data for 2004–2005 in Huddersfield, in addition to published evidence. Standard HIA techniques were used. Results We re-highlighted the socio economic differences in smoking status at booking and quitting during pregnancy. We focused on the key concerns of the public, that of adverse obstetric events on a Midwife Led Unit (MLU with distant obstetric cover. We estimate that twenty percent of women giving birth in a MLU may require urgent transfer to obstetric care during labour. There were no significant socio economic differences. Much of the risk can be mitigated though robust risk management policies. Additional travelling distances and costs could affect lower socio-economic groups the greatest because of lower car ownership and geographical location in relation to the units. There is potential that with improved community antenatal and post natal care, population outcomes could improve significantly, the available evidence supports this view. Conclusion Available evidence suggests that maternity reconfiguration towards enhanced community care could have many potential benefits but carries risk. Investment is needed to realise the former and mitigate the latter. The usefulness of this Health Impact Assessment

  6. Access Denied! Contrasting Data Access in the United States and Ireland

    Directory of Open Access Journals (Sweden)

    Grogan Samuel

    2016-07-01

    Full Text Available The ability of an Internet user to access data collected about himself as a result of his online activity is a key privacy safeguard. Online, data access has been overshadowed by other protections such as notice and choice. This paper describes attitudes about data access. 873 US and Irish Internet users participated in a survey designed to examine views on data access to information held by online companies and data brokers. We observed low levels of awareness of access mechanisms along with a high desire for access in both participant groups. We tested three proposed access systems in keeping with industry programs and regulatory proposals. User response was positive. We conclude that access remains an important privacy protection that is inadequately manifested in practice. Our study provides insight for lawmakers and policymakers, as well as computer scientists who implement these systems.

  7. Ensuring access to public information in Mexico: Proposal for treatment of the information portal of the Ministry of Federal Health

    Directory of Open Access Journals (Sweden)

    José Alfredo Hernández Landeros

    2011-03-01

    Full Text Available Reflect on the need to ensure access to information to everyone as the foundation of a information society. The case of Mexico and its public policy information from the Federal Institute of Access to Information. A proposal to adopt an information management system documentation for the Federal Ministry of Health of Mexico, based on international norms and standards in order to control, organize and retrieve information within your site.

  8. Web Accessibility and Guidelines

    Science.gov (United States)

    Harper, Simon; Yesilada, Yeliz

    Access to, and movement around, complex online environments, of which the World Wide Web (Web) is the most popular example, has long been considered an important and major issue in the Web design and usability field. The commonly used slang phrase ‘surfing the Web’ implies rapid and free access, pointing to its importance among designers and users alike. It has also been long established that this potentially complex and difficult access is further complicated, and becomes neither rapid nor free, if the user is disabled. There are millions of people who have disabilities that affect their use of the Web. Web accessibility aims to help these people to perceive, understand, navigate, and interact with, as well as contribute to, the Web, and thereby the society in general. This accessibility is, in part, facilitated by the Web Content Accessibility Guidelines (WCAG) currently moving from version one to two. These guidelines are intended to encourage designers to make sure their sites conform to specifications, and in that conformance enable the assistive technologies of disabled users to better interact with the page content. In this way, it was hoped that accessibility could be supported. While this is in part true, guidelines do not solve all problems and the new WCAG version two guidelines are surrounded by controversy and intrigue. This chapter aims to establish the published literature related to Web accessibility and Web accessibility guidelines, and discuss limitations of the current guidelines and future directions.

  9. Rapid forest clearing in a Myanmar proposed national park threatens two newly discovered species of geckos (Gekkonidae: Cyrtodactylus.

    Directory of Open Access Journals (Sweden)

    Grant M Connette

    Full Text Available Myanmar's recent transition from military rule towards a more democratic government has largely ended decades of political and economic isolation. Although Myanmar remains heavily forested, increased development in recent years has been accompanied by exceptionally high rates of forest loss. In this study, we document the rapid progression of deforestation in and around the proposed Lenya National Park, which includes some of the largest remaining areas of lowland evergreen rainforest in mainland Southeast Asia. The globally unique forests in this area are rich in biodiversity and remain a critical stronghold for many threatened and endangered species, including large charismatic fauna such as tiger and Asian elephant. We also conducted a rapid assessment survey of the herpetofauna of the proposed national park, which resulted in the discovery of two new species of bent-toed geckos, genus Cyrtodactylus. We describe these new species, C. lenya sp. nov. and C. payarhtanensis sp. nov., which were found in association with karst (i.e., limestone rock formations within mature lowland wet evergreen forest. The two species were discovered less than 35 km apart and are each known from only a single locality. Because of the isolated nature of the karst formations in the proposed Lenya National Park, these geckos likely have geographical ranges restricted to the proposed protected area and are threatened by approaching deforestation. Although lowland evergreen rainforest has vanished from most of continental Southeast Asia, Myanmar can still take decisive action to preserve one of the most biodiverse places on Earth.

  10. Rapid forest clearing in a Myanmar proposed national park threatens two newly discovered species of geckos (Gekkonidae: Cyrtodactylus).

    Science.gov (United States)

    Connette, Grant M; Oswald, Patrick; Thura, Myint Kyaw; LaJeunesse Connette, Katherine J; Grindley, Mark E; Songer, Melissa; Zug, George R; Mulcahy, Daniel G

    2017-01-01

    Myanmar's recent transition from military rule towards a more democratic government has largely ended decades of political and economic isolation. Although Myanmar remains heavily forested, increased development in recent years has been accompanied by exceptionally high rates of forest loss. In this study, we document the rapid progression of deforestation in and around the proposed Lenya National Park, which includes some of the largest remaining areas of lowland evergreen rainforest in mainland Southeast Asia. The globally unique forests in this area are rich in biodiversity and remain a critical stronghold for many threatened and endangered species, including large charismatic fauna such as tiger and Asian elephant. We also conducted a rapid assessment survey of the herpetofauna of the proposed national park, which resulted in the discovery of two new species of bent-toed geckos, genus Cyrtodactylus. We describe these new species, C. lenya sp. nov. and C. payarhtanensis sp. nov., which were found in association with karst (i.e., limestone) rock formations within mature lowland wet evergreen forest. The two species were discovered less than 35 km apart and are each known from only a single locality. Because of the isolated nature of the karst formations in the proposed Lenya National Park, these geckos likely have geographical ranges restricted to the proposed protected area and are threatened by approaching deforestation. Although lowland evergreen rainforest has vanished from most of continental Southeast Asia, Myanmar can still take decisive action to preserve one of the most biodiverse places on Earth.

  11. Email based remote access and surveillance system for smart home infrastructure

    Directory of Open Access Journals (Sweden)

    Pooshkar Rajiv

    2016-09-01

    Full Text Available With the rapid rise of Internet of Things in public domain, people expect fast, reliable and on-demand home security via the Internet. However, existing remote home surveillance systems place a very rigid constraint on authentication and require customized hardware and software. In this paper we have proposed an ingenious and reliable internet based, home access system for smart homes that can be easily deployed on generic hardware. The proposed architecture uses popular email service providers to notify and update the user about the home access. It sends an email to the owner with the attached picture of the person who is at the door. It also incorporates a protected mechanism to give access of the door to a remote user by responding to that email. It essentially means that we can view and give access to the person at our door via sending and receiving an email. Furthermore, an image processing based mechanism has also been incorporated to provide access without email, to few selected personnel who are trusted by the owner. It works by capturing and comparing the visitor's image with the stored images in the database. Perceptual hashing or fingerprint matching algorithm is used for comparison purposes. Similarity percentage based on hamming distance was evaluated, and the similarity threshold for providing access was set. The simulations were performed in rigorous environment. The efficiency of the hashing algorithm was found to be 97% at the similarity threshold of 95%. The results validate that the average latency is only 155 ms with low standard deviation. The CPU utilization remained quite low with a minimum value of 10 MHz and a maximum value of 30 MHz when the payload size of the sent mail was increased to 1500 kB. Thus, the proposed system can be used for developing a larger low power infrastructure.

  12. Lexical semantic access and letter access are involved in different aspects of reading

    DEFF Research Database (Denmark)

    Poulsen, Mads

    ). In this subset sample, both letter access and lexical access accounted for unique variance in reading fluency. The pattern of effects for lexical access did not change by controlling for serial rapid naming (RAN). Conclusions: The results suggest that letter access and lexical access are important for different......Purpose: This study investigated the effects of lexical access speed and letter access speed on reading fluency and reading comprehension. We hypothesized that 1) letter access speed would correlate with reading fluency but not comprehension, while 2) lexical access speed would influence reading...... comprehension. For readers who are struggling with recoding, most of the reading effort is probably tied up with recoding, leaving little to be explained by lexical access. Therefore we expected that 3) lexical access speed would primarily predict reading fluency for readers who were no longer struggling...

  13. Electric Energy Access in Bangladesh

    Directory of Open Access Journals (Sweden)

    Muhammad Taheruzzaman

    2016-07-01

    Full Text Available This paper represents the overall electrical energy profile and access in Bangladesh. In the recent past Bangladesh has been experiencing shortage of electricity, and about 42 % of population no access to the electricity. The electricity consumption has rapidly increased over last decade. The demand and consumption will intensify in the remote future as overall development and future growth. To set “vision 2021” of Bangladesh; government of Bangladesh has devoted to ensuring access of affordable and reliable electricity for all by 2021. In the modern time, energy is the vital ingredient for socioeconomic growth in the developing country i.e., alleviating poverty. Along with electricity access in Bangladesh strived to become middle income country by 2021. Bangladesh has experienced that energy consumption inclines to increase rapidly when per capita income researches between US$ 1,000 and US$ 10,000, and a country’s

  14. Passive Optical Access Networks: State of the Art and Future Evolution

    Directory of Open Access Journals (Sweden)

    Tommaso Muciaccia

    2014-10-01

    Full Text Available In the very last years, optical access networks are growing very rapidly, from both the network operators and the research interests points of view. Fiber To The Home (FTTH is already a reality in plenty of real contexts and there has been a further stimulus to the proposal of new solutions and the investigation of new possibilities, in order to optimize network performance and reduce capital and operational expenditure. A complete and systematic overview of passive optical access networks is presented in this paper, concerning both the hot research topics and the main operative issues about the design guidelines and the deployment of Passive Optical Networks (PON architectures, nowadays the most commonly implemented approach to realize optical fiber links in the access networks. A comparison of advantages and disadvantages of different multiplexing techniques is discussed, with specific reference to WDM-based networks, almost universally considered as the enabling technology for future proof bandwidth requirements. An exhaustive summary is also given about the-state-of-the-art of modulation and encoding techniques recently proposed by the scientific community, as well as the open challenges (such as colorless and coolerless ONUs for telecom companies and international standardization compliance.

  15. Rapid learning: a breakthrough agenda.

    Science.gov (United States)

    Etheredge, Lynn M

    2014-07-01

    A "rapid-learning health system" was proposed in a 2007 thematic issue of Health Affairs. The system was envisioned as one that uses evidence-based medicine to quickly determine the best possible treatments for patients. It does so by drawing on electronic health records and the power of big data to access large volumes of information from a variety of sources at high speed. The foundation for a rapid-learning health system was laid during 2007-13 by workshops, policy papers, large public investments in databases and research programs, and developing learning systems. Challenges now include implementing a new clinical research system with several hundred million patients, modernizing clinical trials and registries, devising and funding research on national priorities, and analyzing genetic and other factors that influence diseases and responses to treatment. Next steps also should aim to improve comparative effectiveness research; build on investments in health information technology to standardize handling of genetic information and support information exchange through apps and software modules; and develop new tools, data, and information for clinical decision support. Further advances will require commitment, leadership, and public-private and global collaboration. Project HOPE—The People-to-People Health Foundation, Inc.

  16. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang

    2017-06-20

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location information of the mobile devices is proposed to address this challenge. We consider an approach in which location-assisted channel state information (CSI) acquisition methods are introduced to complement conventional pilot-based CSI acquisition methods and avoid excessive overhead signaling. A low-complexity algorithm is designed to maximize the sum rate. An adaptive algorithm is also proposed to address the uncertainty issue in CSI acquisition. Both theoretical and numerical analyses show that location information provides a new dimension to improve throughput for next-generation massive cooperative networks.

  17. Rapid Access to β-Trifluoromethyl-Substituted Ketones: Harnessing Inductive Effects in Wacker-Type Oxidations of Internal Alkenes

    KAUST Repository

    Lerch, Michael M.; Morandi, Bill; Wickens, Zachary K.; Grubbs, Robert H.

    2014-01-01

    We present a practical trifluoromethyl-directed Wacker-type oxidation of internal alkenes that enables rapid access to β-trifluoromethyl-substituted ketones. Allylic trifluoromethyl-substituted alkenes bearing a wide range of functional groups can be oxidized in high yield and regioselectivity. The distance dependence of the regioselectivity was established by systematic variation of the number of methylene units between the double bond and the trifluoromethyl group. The regioselectivity enforced by traditional directing groups could even be reversed by introduction of a competing trifluoromethyl group. Besides being a new powerful synthetic method to prepare fluorinated molecules, this work directly probes the role of inductive effects on nucleopalladation events. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  18. Rapid Access to β-Trifluoromethyl-Substituted Ketones: Harnessing Inductive Effects in Wacker-Type Oxidations of Internal Alkenes

    KAUST Repository

    Lerch, Michael M.

    2014-07-18

    We present a practical trifluoromethyl-directed Wacker-type oxidation of internal alkenes that enables rapid access to β-trifluoromethyl-substituted ketones. Allylic trifluoromethyl-substituted alkenes bearing a wide range of functional groups can be oxidized in high yield and regioselectivity. The distance dependence of the regioselectivity was established by systematic variation of the number of methylene units between the double bond and the trifluoromethyl group. The regioselectivity enforced by traditional directing groups could even be reversed by introduction of a competing trifluoromethyl group. Besides being a new powerful synthetic method to prepare fluorinated molecules, this work directly probes the role of inductive effects on nucleopalladation events. © 2014 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. Performance analysis of quantum access network using code division multiple access model

    International Nuclear Information System (INIS)

    Hu Linxi; Yang Can; He Guangqiang

    2017-01-01

    A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of the code. Recently, the chaotic phase shifters were proposed to guarantee the orthogonality by different chaotic signals and spread the spectral content of the quantum states. In this letter, we propose to implement the code division multiple access quantum network by using chaotic phase shifters and synchronization. Due to the orthogonality of the different chaotic phase shifter, every pair of users can faithfully transmit quantum information through a common channel and have little crosstalk between different users. Meanwhile, the broadband spectra of chaotic signals efficiently help the quantum states to defend against channel loss and noise. (paper)

  20. A novel IPTV program multiplex access system to EPON

    Science.gov (United States)

    Xu, Xian; Liu, Deming; He, Wei; Lu, Xi

    2007-11-01

    With the rapid development of high speed networks, such as Ethernet Passive Optical Network (EPON), traffic patterns in access networks have evolved from traditional text-oriented service to the mixed text-, voice- and video- based services, leading to so called "Triple Play". For supporting IPTV service in EPON access network infrastructure, in this article we propose a novel IPTV program multiplex access system to EPON, which enables multiple IPTV program source servers to seamlessly access to IPTV service access port of optical line terminal (OLT) in EPON. There are two multiplex schemes, namely static multiplex scheme and dynamic multiplex scheme, in implementing the program multiplexing. Static multiplex scheme is to multiplex all the IPTV programs and forward them to the OLT, regardless of the need of end-users. While dynamic multiplex scheme can dynamically multiplex and forward IPTV programs according to what the end-users actually demand and those watched by no end-user would not be multiplexed. By comparing these two schemes, a reduced traffic of EPON can be achieved by using dynamic multiplex scheme, especially when most end-users are watching the same few IPTV programs. Both schemes are implemented in our system, with their hardware and software designs described.

  1. SalanderMaps: A rapid overview about felt earthquakes through data mining of web-accesses

    Science.gov (United States)

    Kradolfer, Urs

    2013-04-01

    While seismological observatories detect and locate earthquakes based on measurements of the ground motion, they neither know a priori whether an earthquake has been felt by the public nor is it known, where it has been felt. Such information is usually gathered by evaluating feedback reported by the public through on-line forms on the web. However, after a felt earthquake in Switzerland, many people visit the webpages of the Swiss Seismological Service (SED) at the ETH Zurich and each such visit leaves traces in the logfiles on our web-servers. Data mining techniques, applied to these logfiles and mining publicly available data bases on the internet open possibilities to obtain previously unknown information about our virtual visitors. In order to provide precise information to authorities and the media, it would be desirable to rapidly know from which locations these web-accesses origin. The method 'Salander' (Seismic Activitiy Linked to Area codes - Nimble Detection of Earthquake Rumbles) will be introduced and it will be explained, how the IP-addresses (each computer or router directly connected to the internet has a unique IP-address; an example would be 129.132.53.5) of a sufficient amount of our virtual visitors were linked to their geographical area. This allows us to unprecedentedly quickly know whether and where an earthquake was felt in Switzerland. It will also be explained, why the method Salander is superior to commercial so-called geolocation products. The corresponding products of the Salander method, animated SalanderMaps, which are routinely generated after each earthquake with a magnitude of M>2 in Switzerland (http://www.seismo.ethz.ch/prod/salandermaps/, available after March 2013), demonstrate how the wavefield of earthquakes propagates through Switzerland and where it was felt. Often, such information is available within less than 60 seconds after origin time, and we always get a clear picture within already five minutes after origin time

  2. Ranking of small scale proposals for water system repair using the Rapid Impact Assessment Matrix (RIAM)

    Energy Technology Data Exchange (ETDEWEB)

    Shakib-Manesh, T.E.; Hirvonen, K.O.; Jalava, K.J.; Ålander, T.; Kuitunen, M.T., E-mail: markku.kuitunen@jyu.fi

    2014-11-15

    Environmental impacts of small scale projects are often assessed poorly, or not assessed at all. This paper examines the usability of the Rapid Impact Assessment Matrix (RIAM) as a tool to prioritize project proposals for small scale water restoration projects in relation to proposals' potential to improve the environment. The RIAM scoring system was used to assess and rank the proposals based on their environmental impacts, the costs of the projects to repair the harmful impacts, and the size of human population living around the sites. A four-member assessment group (The expert panel) gave the RIAM-scores to the proposals. The assumed impacts of the studied projects at the Eastern Finland water systems were divided into the ecological and social impacts. The more detailed assessment categories of the ecological impacts in this study were impacts on landscape, natural state, and limnology. The social impact categories were impacts to recreational use of the area, fishing, industry, population, and economy. These impacts were scored according to their geographical and social significance, their magnitude of change, their character, permanence, reversibility, and cumulativeness. The RIAM method proved to be an appropriate and recommendable method for the small-scale assessment and prioritizing of project proposals. If the assessments are well documented, the RIAM can be a method for easy assessing and comparison of the various kinds of projects. In the studied project proposals there were no big surprises in the results: the best ranks were received by the projects, which were assumed to return watersheds toward their original state.

  3. Ranking of small scale proposals for water system repair using the Rapid Impact Assessment Matrix (RIAM)

    International Nuclear Information System (INIS)

    Shakib-Manesh, T.E.; Hirvonen, K.O.; Jalava, K.J.; Ålander, T.; Kuitunen, M.T.

    2014-01-01

    Environmental impacts of small scale projects are often assessed poorly, or not assessed at all. This paper examines the usability of the Rapid Impact Assessment Matrix (RIAM) as a tool to prioritize project proposals for small scale water restoration projects in relation to proposals' potential to improve the environment. The RIAM scoring system was used to assess and rank the proposals based on their environmental impacts, the costs of the projects to repair the harmful impacts, and the size of human population living around the sites. A four-member assessment group (The expert panel) gave the RIAM-scores to the proposals. The assumed impacts of the studied projects at the Eastern Finland water systems were divided into the ecological and social impacts. The more detailed assessment categories of the ecological impacts in this study were impacts on landscape, natural state, and limnology. The social impact categories were impacts to recreational use of the area, fishing, industry, population, and economy. These impacts were scored according to their geographical and social significance, their magnitude of change, their character, permanence, reversibility, and cumulativeness. The RIAM method proved to be an appropriate and recommendable method for the small-scale assessment and prioritizing of project proposals. If the assessments are well documented, the RIAM can be a method for easy assessing and comparison of the various kinds of projects. In the studied project proposals there were no big surprises in the results: the best ranks were received by the projects, which were assumed to return watersheds toward their original state

  4. Synthesis and use of 2-[18F]fluoromalondialdehyde, an accessible synthon for bioconjugation

    Energy Technology Data Exchange (ETDEWEB)

    Hooker, Jacob M. [Massachusetts General Hospital, Boston, MA (United States)

    2017-03-16

    We proposed methods for the synthesis and purification of 2-[18F]fluoromalondialdehyde, which will be a readily accessible synthon for bioconjugation. Our achievements in these areas will specifically address a stated goal of the DOE providing a transformational technology for macromolecule radiolabeling. Accomplishment of our aims will serve both DOE mission-related research as well as nuclear medicine research supported by the NIH and industry. At the heart of our proposal is the aim to “improve synthetic methodology for rapidly and efficiently incorporating radionuclides into a wide range of organic compounds.”

  5. Proposal to establish a Sponsoring Consortium for Open Access Publishing in Particle Physics

    CERN Document Server

    CERN. Geneva

    2007-01-01

    In the present proposal, the publishers' subscription income from multiple institutions is replaced by an "author-side" funding. Journals are paid through contracts between publishers and a single financial partner, the "Sponsoring Consortium for Open Access Publishing in Particle Physics" (SCOAP3). SCOAP3 is envisioned as a global network of funding agencies, research laboratories, and libraries that will contribute the necessary funding; each SCOAP3 partner will recover its contribution from the cancellation of journal subscriptions. This model avoids the obvious disadvantage of authors being directly charged for the OA publication of their articles, which is perceived as an even higher barrier than subscription charges, in particular for theoretical physicists from small institutions who account for the vast majority of HEP papers. The financing and governance of SCOAP3 will follow as much as possible the example of the memoranda of understanding governing large research collaborations. Its partners will c...

  6. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  7. RAPID TRANSFER ALIGNMENT USING FEDERATED KALMAN FILTER

    Institute of Scientific and Technical Information of China (English)

    GUDong-qing; QINYong-yuan; PENGRong; LIXin

    2005-01-01

    The dimension number of the centralized Kalman filter (CKF) for the rapid transfer alignment (TA) is as high as 21 if the aircraft wing flexure motion is considered in the rapid TA. The 21-dimensional CKF brings the calculation burden on the computer and the difficulty to meet a high filtering updating rate desired by rapid TA. The federated Kalman filter (FKF) for the rapid TA is proposed to solve the dilemma. The structure and the algorithm of the FKF, which can perform parallel computation and has less calculation burden, are designed.The wing flexure motion is modeled, and then the 12-order velocity matching local filter and the 15-order attitud ematching local filter are devised. Simulation results show that the proposed EKE for the rapid TA almost has the same performance as the CKF. Thus the calculation burden of the proposed FKF for the rapid TA is markedly decreased.

  8. The universal access handbook

    CERN Document Server

    Stephanidis, Constantine

    2009-01-01

    In recent years, the field of Universal Access has made significant progress in consolidating theoretical approaches, scientific methods and technologies, as well as in exploring new application domains. Increasingly, professionals in this rapidly maturing area require a comprehensive and multidisciplinary resource that addresses current principles, methods, and tools. Written by leading international authorities from academic, research, and industrial organizations and nonmarket institutions, The Universal Access Handbook covers the unfolding scientific, methodological, technological, and pol

  9. Artificial intelligence applications of fast optical memory access

    Science.gov (United States)

    Henshaw, P. D.; Todtenkopf, A. B.

    The operating principles and performance of rapid laser beam-steering (LBS) techniques are reviewed and illustrated with diagrams; their applicability to fast optical-memory (disk) access is evaluated; and the implications of fast access for the design of expert systems are discussed. LBS methods examined include analog deflection (source motion, wavefront tilt, and phased arrays), digital deflection (polarization modulation, reflectivity modulation, interferometric switching, and waveguide deflection), and photorefractive LBS. The disk-access problem is considered, and typical LBS requirements are listed as 38,000 beam positions, rotational latency 25 ms, one-sector rotation time 1.5 ms, and intersector space 87 microsec. The value of rapid access for increasing the power of expert systems (by permitting better organization of blocks of information) is illustrated by summarizing the learning process of the MVP-FORTH system (Park, 1983).

  10. A Flexible Visualization Tool for Rapid Access to EFIT Results

    International Nuclear Information System (INIS)

    Zhang Ruirui; Xiao Bingjia; Luo Zhengping

    2014-01-01

    This paper introduces the design and implementation of an interactive tool, the EASTViewer, for the visualization of plasma equilibrium reconstruction results for EAST (the Experimental Advanced Superconducting Tokamak). Aimed at the operating system independently, Python, when combined with the PyGTK toolkit, is used as the programming language. Using modular design, the EASTViewer provides a unified interface with great flexibility. It is easy to access numerous data sources either from local data files or an MDSplus tree, and with the pre-defined configuration files, it can be extended to other tokamaks. The EASTViewer has been used as the major tool to visualize equilibrium data since the second EAST campaign in 2008, and it has been verified that the EASTViewer features a user-friendly interface, and has easy access to numerous data sources and cross-platforms. (fusion engineering)

  11. Acceso y usabilidad de medicamentos: propuesta para una definición operacional Access and usability to medications: a proposal for an operational definition

    Directory of Open Access Journals (Sweden)

    Teodoro J. Oscanoa

    2012-03-01

    Full Text Available Las investigaciones sobre accesibilidad a medicamentos con encuestas a hogares, son de gran importancia para verificar la realidad y eficacia de las medidas de intervención para mejorar el acceso de medicamentos en la población. Desafortunadamente dichos estudios, además de ser escasos, presentan problemas metodológicos, que en su mayor parte son consecuencia de una ausencia de uniformidad en las definiciones operacionales de acceso y su diferenciación con las dimensiones de la accesibilidad. El objetivo de la propuesta es diferenciar ambos términos. Se propone definir operacionalmente acceso a medicamentos al proceso de verificación de la obtención de un fármaco por un paciente, independiente de diversos factores que pueden afectar el proceso. Se introduce el término "Usabilidad de fármacos", definiéndolo operacionalmente como los procesos destinados a medir las dimensiones de la accesibilidad de los medicamentos: disponibilidad física, asequibilidad, accesibilidad geográfica, aceptabilidad (o satisfacción.Research about accessibility to medicines through household surveys is very important in order to verify the reality and effectiveness of interventions done to increase the access of the population to the medications. Unfortunately, such studies, on top of being very few, have methodological problems, which mostly result from a lack of uniformity in the operational definitions of access and the differentiation with the dimensions of accessibility. The aim of this paper is to propose setting a difference between both terms. We propose an operational definition of access to medications as the process of verification of the purchase of a drug by a patient, independently from many factors that can affect this process. The term "usability of drugs" is introduced, defining it operationally as aimed at measuring the dimensions of the accessibility to the medications: physical availability, affordability, geographical accessibility

  12. Proposed second harmonic acceleration system for the intense pulsed neutron source rapid cycling synchrotron

    International Nuclear Information System (INIS)

    Norem, J.; Brandeberry, F.; Rauchas, A.

    1983-01-01

    The Rapid Cycling Synchrotron (RCS) of the Intense Pulsed Neutron Source (IPNS) operating at Argonne National Laboratory is presently producing intensities of 2 to 2.5 x 10 12 protons per pulse (ppp) with the addition of a new ion source. This intensity is close to the space charge limit of the machine, estimated at approx.3 x 10 12 ppp, depending somewhat on the available aperture. With the present good performance in mind, accelerator improvements are being directed at: (1) increasing beam intensities for neutron science; (2) lowering acceleration losses to minimize activation; and (3) gaining better control of the beam so that losses can be made to occur when and where they can be most easily controlled. On the basis of preliminary measurements, we are now proposing a third cavity for the RF systems which would provide control of the longitudinal bunch shape during the cycle which would permit raising the effective space charge limit of the accelerator and reducing losses

  13. Market Access and Welfare

    DEFF Research Database (Denmark)

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    2015-01-01

    Well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. The present paper proposes a new set of tariff reforms that can achieve both...

  14. Rapid and accurate processing method for amide proton exchange rate measurement in proteins

    International Nuclear Information System (INIS)

    Koskela, Harri; Heikkinen, Outi; Kilpelaeinen, Ilkka; Heikkinen, Sami

    2007-01-01

    Exchange between protein backbone amide hydrogen and water gives relevant information about solvent accessibility and protein secondary structure stability. NMR spectroscopy provides a convenient tool to study these dynamic processes with saturation transfer experiments. Processing of this type of NMR spectra has traditionally required peak integration followed by exponential fitting, which can be tedious with large data sets. We propose here a computer-aided method that applies inverse Laplace transform in the exchange rate measurement. With this approach, the determination of exchange rates can be automated, and reliable results can be acquired rapidly without a need for manual processing

  15. Next generation sequencing provides rapid access to the genome of Puccinia striiformis f. sp. tritici, the causal agent of wheat stripe rust.

    Directory of Open Access Journals (Sweden)

    Dario Cantu

    Full Text Available BACKGROUND: The wheat stripe rust fungus (Puccinia striiformis f. sp. tritici, PST is responsible for significant yield losses in wheat production worldwide. In spite of its economic importance, the PST genomic sequence is not currently available. Fortunately Next Generation Sequencing (NGS has radically improved sequencing speed and efficiency with a great reduction in costs compared to traditional sequencing technologies. We used Illumina sequencing to rapidly access the genomic sequence of the highly virulent PST race 130 (PST-130. METHODOLOGY/PRINCIPAL FINDINGS: We obtained nearly 80 million high quality paired-end reads (>50x coverage that were assembled into 29,178 contigs (64.8 Mb, which provide an estimated coverage of at least 88% of the PST genes and are available through GenBank. Extensive micro-synteny with the Puccinia graminis f. sp. tritici (PGTG genome and high sequence similarity with annotated PGTG genes support the quality of the PST-130 contigs. We characterized the transposable elements present in the PST-130 contigs and using an ab initio gene prediction program we identified and tentatively annotated 22,815 putative coding sequences. We provide examples on the use of comparative approaches to improve gene annotation for both PST and PGTG and to identify candidate effectors. Finally, the assembled contigs provided an inventory of PST repetitive elements, which were annotated and deposited in Repbase. CONCLUSIONS/SIGNIFICANCE: The assembly of the PST-130 genome and the predicted proteins provide useful resources to rapidly identify and clone PST genes and their regulatory regions. Although the automatic gene prediction has limitations, we show that a comparative genomics approach using multiple rust species can greatly improve the quality of gene annotation in these species. The PST-130 sequence will also be useful for comparative studies within PST as more races are sequenced. This study illustrates the power of NGS for

  16. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment

    Science.gov (United States)

    Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda

    2017-01-01

    In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment. PMID:28629131

  17. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.

    Science.gov (United States)

    Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda

    2017-06-17

    In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment.

  18. “Basically... porn is everywhere”: a rapid evidence assessment on the effects that access and exposure to pornography has on children and young people

    OpenAIRE

    Horvath, M.; Alys, L.; Massey, K.; Pina, A.; Scally, M.; Adler, J.

    2013-01-01

    This Rapid Evidence Assessment (REA) was commissioned by the Office of the Children’s Commissioner (OCC) as part of its Inquiry into Child Sexual Exploitation in Gangs and Groups (CSEGG). It was conducted by a consortium led by Middlesex University, to explore the effects that exposure and access to pornography have on children and young people. The CSEGG Inquiry was launched in October 2011 to better understand the scale, scope, extent and nature of child sexual exploitation in gangs and gro...

  19. RAPID COMMUNICATION: Improving prediction accuracy of GPS satellite clocks with periodic variation behaviour

    Science.gov (United States)

    Heo, Youn Jeong; Cho, Jeongho; Heo, Moon Beom

    2010-07-01

    The broadcast ephemeris and IGS ultra-rapid predicted (IGU-P) products are primarily available for use in real-time GPS applications. The IGU orbit precision has been remarkably improved since late 2007, but its clock products have not shown acceptably high-quality prediction performance. One reason for this fact is that satellite atomic clocks in space can be easily influenced by various factors such as temperature and environment and this leads to complicated aspects like periodic variations, which are not sufficiently described by conventional models. A more reliable prediction model is thus proposed in this paper in order to be utilized particularly in describing the periodic variation behaviour satisfactorily. The proposed prediction model for satellite clocks adds cyclic terms to overcome the periodic effects and adopts delay coordinate embedding, which offers the possibility of accessing linear or nonlinear coupling characteristics like satellite behaviour. The simulation results have shown that the proposed prediction model outperforms the IGU-P solutions at least on a daily basis.

  20. Content sensitivity based access control framework for Hadoop

    Directory of Open Access Journals (Sweden)

    T.K. Ashwin Kumar

    2017-11-01

    Full Text Available Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misuse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attributes in a dataset or the user’s role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and information sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead.

  1. Empowering Learners with Mobile Open-Access Learning Initiatives

    Science.gov (United States)

    Mills, Michael, Ed.; Wake, Donna, Ed.

    2017-01-01

    Education has been progressing at a rapid pace ever since educators have been able to harness the power of mobile technology. Open-access learning techniques provide more students with the opportunity to engage in educational opportunities that may have been previously restricted. "Empowering Learners with Mobile Open-Access Learning…

  2. Open Access in Turkey and Comparison with Other Countries

    Directory of Open Access Journals (Sweden)

    Bülent Karasözen

    2010-06-01

    Full Text Available The number of open access journals and institutional repositories, as a product of open access movement has grown rapidly in recent years. Open access research articles remove the barriers in accessing scientific research results and accelerate the communication among the scientist worldwide. In many countries the number of institutional archives and open access journal are increasing. In this article, the recent developments in open access journals, institutional repositories and open courseware in Turkey are summarized and compared with some countries. A sample mandatory institutional repository policy document is given with some suggestion for establishing open access in Turkey.

  3. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  4. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  5. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  6. Tiber Personal Rapid Transit

    Directory of Open Access Journals (Sweden)

    Diego Carlo D'agostino

    2011-02-01

    Full Text Available The project “Tiber Personal Rapid Transit” have been presented by the author at the Rome City Vision Competition1 2010, an ideas competition, which challenges architects, engineers, designers, students and creatives individuals to develop visionary urban proposals with the intention of stimulating and supporting the contemporary city, in this case Rome. The Tiber PRT proposal tries to answer the competition questions with the definition of a provocative idea: a Personal Rapid transit System on the Tiber river banks. The project is located in the central section of the Tiber river and aims at the renewal of the river banks with the insertion of a Personal Rapid Transit infrastructure. The project area include the riverbank of Tiber from Rome Transtevere RFI station to Piazza del Popolo, an area where main touristic and leisure attractions are located. The intervention area is actually no used by the city users and residents and constitute itself a strong barrier in the heart of the historic city.

  7. Opportunistic spectrum access in cognitive radio based on channel switching

    KAUST Repository

    Gaaloul, Fakhreddine; Yang, Hongchuan; Radaydeh, Redha Mahmoud Mesleh; Alouini, Mohamed-Slim

    2012-01-01

    This paper investigates the performance of a cognitive radio transceiver that can monitor multiple channels and opportunistically use any one of them should it be available. In our work, we propose and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. Two switching strategies, namely the switch and examine and the switch and stay strategies, are proposed. For these proposed access schemes, we investigate their performance by deriving the analytical expression of the novel metric of the average access duration and the average waiting time and based on these two metrics a time average SU throughput formula is proposed to predict the performance of the secondary cognitive system. © 2012 ICST.

  8. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  9. Accessibility analysis in manufacturing processes using visibility cones

    Institute of Scientific and Technical Information of China (English)

    尹周平; 丁汉; 熊有伦

    2002-01-01

    Accessibility is a kind of important design feature of products,and accessibility analysis has been acknowledged as a powerful tool for solving computational manufacturing problems arising from different manufacturing processes.After exploring the relations among approachability,accessibility and visibility,a general method for accessibility analysis using visibility cones (VC) is proposed.With the definition of VC of a point,three kinds of visibility of a feature,namely complete visibility cone (CVC),partial visibility cone (PVC) and local visibility cone (LVC),are defined.A novel approach to computing VCs is formulated by identifying C-obstacles in the C-space,for which a general and efficient algorithm is proposed and implemented by making use of visibility culling.Lastly,we discuss briefly how to realize accessibility analysis in numerically controlled (NC) machining planning,coordinate measuring machines (CMMs) inspection planning and assembly sequence planning with the proposed methods.

  10. Perilous terra incognita--open-access journals.

    Science.gov (United States)

    Balon, Richard

    2014-04-01

    The author focuses on a new rapidly spreading practice of publication in open-access journals. The pros and cons of open-access journals are discussed. Publishing in these journals may be cost prohibitive for educators and junior faculty members. Some authors may be lured by the ease of publishing in open-access journals (and their, at times, inflated self-description, e.g., "international", "scientific"), and their possibly valuable contributions will escape the attention of Academic Psychiatry readership in the vast sea of open-access journals. The readership may be flooded with a large number of low-quality articles (maybe not even properly peer-reviewed) from open-access journals. It may take some time to sort out what is and what is not relevant and useful. Open-access publishing represents a problematic and controversial practice and may be associated with a conflict of interest for the editors and publishers of these journals.

  11. Toward a strategy of patient-centered access to primary care.

    Science.gov (United States)

    Berry, Leonard L; Beckham, Dan; Dettman, Amy; Mead, Robert

    2014-10-01

    Patient-centered access (PCA) to primary care services is rapidly becoming an imperative for efficiently delivering high-quality health care to patients. To enhance their PCA-related efforts, some medical practices and health systems have begun to use various tactics, including team-based care, satellite clinics, same-day and group appointments, greater use of physician assistants and nurse practitioners, and remote access to health services. However, few organizations are addressing the PCA imperative comprehensively by integrating these various tactics to develop an overall PCA management strategy. Successful integration means taking into account the changing competitive and reimbursement landscape in primary care, conducting an evidence-based assessment of the barriers and benefits of PCA implementation, and attending to the particular needs of the institution engaged in this important effort. This article provides a blueprint for creating a multifaceted but coordinated PCA strategy-one aimed squarely at making patient access a centerpiece of how health care is delivered. The case of a Wisconsin-based health system is used as an illustrative example of how other institutions might begin to conceive their fledgling PCA strategies without proposing it as a one-size-fits-all model. Copyright © 2014 Mayo Foundation for Medical Education and Research. Published by Elsevier Inc. All rights reserved.

  12. Guidelines for Outsourcing Remote Access.

    Science.gov (United States)

    Hassler, Ardoth; Neuman, Michael

    1996-01-01

    Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…

  13. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  14. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

    Science.gov (United States)

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-01-01

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733

  15. Hierarchical micro-mobility management in high-speed multihop access networks

    Institute of Scientific and Technical Information of China (English)

    TANG Bi-hua; MA Xiao-lei; LIU Yuan-an; GAO Jin-chun

    2006-01-01

    This article integrates the hierarchical micro-mobility management and the high-speed multihop access networks (HMAN), to accomplish the smooth handover between different access routers. The proposed soft handover scheme in the high-speed HMAN can solve the micro-mobility management problem in the access network. This article also proposes the hybrid access router (AR) advertisement scheme and AR selection algorithm, which uses the time delay and stable route to the AR as the gateway selection parameters. By simulation, the proposed micro-mobility management scheme can achieve high packet delivery fraction and improve the lifetime of network.

  16. 49 CFR 37.59 - Differences in accessibility completion dates.

    Science.gov (United States)

    2010-10-01

    ... accessible path from common elements of the station to portions of the facility directly serving the rail... both rapid and commuter rail systems), accessibility to the following elements of the station shall be achieved by the earlier of the completion dates involved: (a) Common elements of the station; (b) Portions...

  17. Technology for People, Not Disabilities: Ensuring Access and Inclusion

    Science.gov (United States)

    Foley, Alan; Ferri, Beth A.

    2012-01-01

    The potential of technology to connect people and provide access to education, commerce, employment and entertainment has never been greater or more rapidly changing. Communication technologies and new media promise to "revolutionize our lives" by breaking down barriers and expanding access for disabled people. Yet, it is also true that technology…

  18. Integrating Attributes into Role-Based Access Control

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    of research recently. We propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that takes into account the current contextual information while making the access control decisions....

  19. Rapid Prototyping in Orthopaedic Surgery: A User's Guide

    OpenAIRE

    Frame, Mark; Huntley, James S.

    2012-01-01

    Rapid prototyping (RP) is applicable to orthopaedic problems involving three dimensions, particularly fractures, deformities, and reconstruction. In the past, RP has been hampered by cost and difficulties accessing the appropriate expertise. Here we outline the history of rapid prototyping and furthermore a process using open-source software to produce a high fidelity physical model from CT data. This greatly mitigates the expense associated with the technique, allowing surgeons to produce pr...

  20. What Remains on Your Mind After You Are Done?: Flexible Regulation of Knowledge Accessibility

    Science.gov (United States)

    Hedberg, Per H.; Higgins, E. Tory

    2011-01-01

    The accessibility of stored knowledge has been found to decline over time after activation without further stimulation. A special case is goal pursuit; goal-related knowledge remains accessible until goal completion, and then its accessibility declines rapidly. We hypothesized that after goal completion the decline in accessibility of goal-related knowledge would be especially rapid for strong promotion-focused individuals because their motivation to eagerly advance beyond the status quo would make accessibility of this knowledge an irrelevant detriment. We hypothesized an opposite effect for strongly prevention-predominant individuals because their motivation to vigilantly maintain a satisfactory state would make accessibility of this knowledge continually relevant. The results of two studies supported both these predicted moderators of accessibility change. Indeed, we found that for strongly prevention-predominant participants, knowledge accessibility actually increased over time after goal completion. We discuss how even basic cognitive mechanisms, like changes in accessibility, can be affected by general motivational concerns. PMID:21765541

  1. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  2. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  3. Ad Hoc Access Gateway Selection Algorithm

    Science.gov (United States)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  4. A sustainable business model for Open-Access journal publishing a proposed plan for High-Energy Physics

    CERN Document Server

    Vigen, Jens

    2007-01-01

    The High Energy Physics community over the last 15 years has achieved so-called full green Open Access through the wide dissemination of preprints via arXiv, a central subject repository managed by Cornell University. However, green Open Access does not alleviate the economic difficulties of libraries as they are still expected to offer access to versions of record of the peer-reviewed literature. For this reason the particle physics community is now addressing the issue of gold Open Access by converting a set of the existing core journals to Open Access. A Working Party has been established to bring together funding agencies, laboratories and libraries into a single consortium, called SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). This consortium will engage with publishers to build a sustainable model for Open Access publishing. In this model, subscription fees from multiple institutions are replaced by contracts with publishers of Open Access journals, where the SCOAP3 conso...

  5. The challenges of rapid urbanization on sustainable development of ...

    African Journals Online (AJOL)

    The challenges of rapid urbanization on sustainable development of Nyanya, Federal Capital ... PROMOTING ACCESS TO AFRICAN RESEARCH ... unaffordable health care facilities, poor environmental health and traffic congestion on the ...

  6. A restricted access material for rapid analysis of [11C]-labeled radiopharmaceuticals and their metabolites in plasma

    International Nuclear Information System (INIS)

    Gillings, Nic

    2009-01-01

    Introduction: Analysis of the radioactive components in plasma taken during positron emission tomography (PET) measurements is often vital for the correct quantification of the PET data. The described high-performance liquid chromatography (HPLC) method has been developed to provide a fast, sensitive and robust method for the measurement of plasma samples from PET studies using [ 11 C]-labeled radiopharmaceuticals. Methods: Unadulterated plasma samples were analyzed directly, following a simple filtration, by the use of a small extraction column, containing a restricted access material, combined with a monolithic analysis column in a column-switching HPLC system. Results: Up to 4 ml of plasma was analyzed by this method within 4.5-7 min in a fully automated process. Because of the rapid analysis, a large number of samples could be analyzed during a 90-min PET scan. The extraction column could be used for analysis of up to 500 ml of plasma before replacement was required. Conclusions: The described method is fast and robust and the large sample volumes allow for accurate determination of the radioactive components in plasma even at 90 min after injection of a [ 11 C]-labeled radiopharmaceutical.

  7. Colour reconnections and rapidity gaps

    International Nuclear Information System (INIS)

    Loennblad, Leif

    1996-01-01

    I argue that the success of recently proposed models describing events with large rapidity gaps in DIS at HERA in terms of non-perturbative colour exchange is heavily reliant on suppression of perturbative gluon emission in the proton direction. There is little or no physical motivation for such suppression and I show that a model without this suppression cannot describe the rapidity gap events at HERA. (author)

  8. Planning Multitechnology Access Networks with Performance Constraints

    Science.gov (United States)

    Chamberland, Steven

    Considering the number of access network technologies and the investment needed for the “last mile” of a solution, in today’s highly competitive markets, planning tools are crucial for the service providers to optimize the network costs and accelerate the planning process. In this paper, we propose to tackle the problem of planning access networks composed of four technologies/architectures: the digital subscriber line (xDSL) technologies deployed directly from the central office (CO), the fiber-to-the-node (FTTN), the fiber-to-the-micro-node (FTTn) and the fiber-to-the-premises (FTTP). A mathematical programming model is proposed for this planning problem that is solved using a commercial implementation of the branch-and-bound algorithm. Next, a detailed access network planning example is presented followed by a systematic set of experiments designed to assess the performance of the proposed approach.

  9. Access Agent Improving The Performance Of Access Control Lists

    Directory of Open Access Journals (Sweden)

    Thelis R. S.

    2015-08-01

    Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

  10. A robust cloud access scheme with mutual authentication

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2016-01-01

    Full Text Available Due to the progress of network technology, we can access some information through remote servers, and we also can save and access lots of personal data in remote servers. Therefore, to protect these data and resist unauthorized access is an important issue. Some researchers proposed authentication scheme, but there still exist some security weaknesses. This article is based on the concept of HDFS (Hadoop Distributed File System, and offers a robust authentication scheme. The proposed scheme achieves mutual authentication, prevents re-play attack, solves asynchronous issue, and prevents offline password guessing attack.

  11. A randomized trial of motivational interviewing and facilitated contraceptive access to prevent rapid repeat pregnancy among adolescent mothers.

    Science.gov (United States)

    Stevens, Jack; Lutz, Robyn; Osuagwu, Ngozi; Rotz, Dana; Goesling, Brian

    2017-10-01

    Most interventions designed to reduce teen pregnancy rates have not focused on pregnant and/or parenting adolescents. Therefore, a large randomized controlled trial was conducted regarding a motivational interviewing program entitled Teen Options to Prevent Pregnancy in a low-income sample of adolescent mothers. This program recommended monthly sessions between a participant and a registered nurse over 18 months. This program also featured facilitated birth control access through transportation assistance and a part-time contraceptive clinic. The impact of this program on rapid repeat pregnancies at 18 months after enrollment was evaluated. Five hundred ninety-eight adolescent females were enrolled from 7 obstetrics-gynecology clinics and 5 postpartum units of a large hospital system in a Midwestern city. Each participant was enrolled at least 28 weeks pregnant or less than 9 weeks postpartum. Each participant was randomized to either the Teen Options to Prevent Pregnancy intervention or a usual-care control condition. Intervention participants averaged 4.5 hours of assistance. Participants were contacted by blinded research staff at 6 and 18 months to complete self-report surveys. Differences in outcomes between the intervention and control groups were assessed using ordinary least-squares regression. There was an 18.1% absolute reduction in self-reported repeat pregnancy in the intervention group relative to the control group (20.5% vs 38.6%%; P Teen Options to Prevent Pregnancy program represents one of the few evidence-based interventions to reduce rapid repeat teen pregnancy. This relatively brief intervention may be a viable alternative to more time-intensive programs that adolescent mothers may be unable or unwilling to receive. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Policy principles for expanding financial access: report of the CGD task force on access to financial services

    NARCIS (Netherlands)

    Claessens, S.; Honohan, P.; Rojas-Suarez, L.

    2009-01-01

    Despite the rapid growth in finance worldwide over the past quarter-century — now interrupted by the global financial crisis — many low-income households and small firms remain excluded from access to many financial services, especially in developing countries. While traditionally seen by many

  13. A sustainable business model for Open-Access journal publishing: a proposed plan for High-Energy Physics

    Directory of Open Access Journals (Sweden)

    Jens Vigen

    2008-01-01

    Full Text Available The High Energy Physics community over the last 15 years has achieved so-called full green Open Access through the wide dissemination of preprints via arXiv, a central subject repository managed by Cornell University. However, green Open Access does not alleviate the economic difficulties of libraries as they are still expected to offer access to versions of record of the peer-reviewed literature. For this reason the particle physics community is now addressing the issue of gold Open Access by converting a set of the existing core journals to Open Access. A Working Party has been established to bring together funding agencies, laboratories and libraries into a single consortium, called SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics. This consortium will engage with publishers to build a sustainable model for Open Access publishing. In this model, subscription fees from multiple institutions are replaced by contracts with publishers of Open Access journals, where the SCOAP3 consortium is a single financial partner.

  14. Efficient Streaming Mass Spatio-Temporal Vehicle Data Access in Urban Sensor Networks Based on Apache Storm.

    Science.gov (United States)

    Zhou, Lianjie; Chen, Nengcheng; Chen, Zeqiang

    2017-04-10

    The efficient data access of streaming vehicle data is the foundation of analyzing, using and mining vehicle data in smart cities, which is an approach to understand traffic environments. However, the number of vehicles in urban cities has grown rapidly, reaching hundreds of thousands in number. Accessing the mass streaming data of vehicles is hard and takes a long time due to limited computation capability and backward modes. We propose an efficient streaming spatio-temporal data access based on Apache Storm (ESDAS) to achieve real-time streaming data access and data cleaning. As a popular streaming data processing tool, Apache Storm can be applied to streaming mass data access and real time data cleaning. By designing the Spout/bolt workflow of topology in ESDAS and by developing the speeding bolt and other bolts, Apache Storm can achieve the prospective aim. In our experiments, Taiyuan BeiDou bus location data is selected as the mass spatio-temporal data source. In the experiments, the data access results with different bolts are shown in map form, and the filtered buses' aggregation forms are different. In terms of performance evaluation, the consumption time in ESDAS for ten thousand records per second for a speeding bolt is approximately 300 milliseconds, and that for MongoDB is approximately 1300 milliseconds. The efficiency of ESDAS is approximately three times higher than that of MongoDB.

  15. Efficient Streaming Mass Spatio-Temporal Vehicle Data Access in Urban Sensor Networks Based on Apache Storm

    Directory of Open Access Journals (Sweden)

    Lianjie Zhou

    2017-04-01

    Full Text Available The efficient data access of streaming vehicle data is the foundation of analyzing, using and mining vehicle data in smart cities, which is an approach to understand traffic environments. However, the number of vehicles in urban cities has grown rapidly, reaching hundreds of thousands in number. Accessing the mass streaming data of vehicles is hard and takes a long time due to limited computation capability and backward modes. We propose an efficient streaming spatio-temporal data access based on Apache Storm (ESDAS to achieve real-time streaming data access and data cleaning. As a popular streaming data processing tool, Apache Storm can be applied to streaming mass data access and real time data cleaning. By designing the Spout/bolt workflow of topology in ESDAS and by developing the speeding bolt and other bolts, Apache Storm can achieve the prospective aim. In our experiments, Taiyuan BeiDou bus location data is selected as the mass spatio-temporal data source. In the experiments, the data access results with different bolts are shown in map form, and the filtered buses’ aggregation forms are different. In terms of performance evaluation, the consumption time in ESDAS for ten thousand records per second for a speeding bolt is approximately 300 milliseconds, and that for MongoDB is approximately 1300 milliseconds. The efficiency of ESDAS is approximately three times higher than that of MongoDB.

  16. Designing a Secure E-commerce with Credential Purpose-based Access Control

    OpenAIRE

    Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek

    2014-01-01

    The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-commerce must establish a secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features. The e-commerce application must authorize access to only tho...

  17. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    as an important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control...... decisions but is also suitable for applications where access to resources is controlled by exploiting contents of the resources in the policy....

  18. Proposal for the award of a blanket contract for the supply, installation and maintenance of the LHC access control system

    CERN Document Server

    2004-01-01

    This document concerns the award of a blanket contract for the supply, installation and maintenance of the LHC access control system. Following a market survey carried out among 134 firms in fifteen Member States, a call for tenders (IT-3026/TS/LHC) was sent on 22 January 2004 to eight firms and eight consortia in six Member States. By the closing date, CERN had received nine tenders from two firms and seven consortia in five Member States. The Finance Committee is invited to agree to the negotiation of a blanket contract with the consortium CEGELEC CENTRE EST (FR) - CEGELEC (NL), the lowest technically compliant bidder, for the supply, installation and maintenance of the LHC access control system for a total amount not exceeding 4 600 000 euros (7 141 000 Swiss francs), subject to revision for inflation from 1 January 2007. The rate of exchange used is that stipulated in the tender. The firm has indicated the following distribution by country of the contract value covered by this adjudication proposal: FR - ...

  19. Optical Subsystems for Next Generation Access Networks

    DEFF Research Database (Denmark)

    Lazaro, J.A; Polo, V.; Schrenk, B.

    2011-01-01

    Recent optical technologies are providing higher flexibility to next generation access networks: on the one hand, providing progressive FTTx and specifically FTTH deployment, progressively shortening the copper access network; on the other hand, also opening fixed-mobile convergence solutions...... in next generation PON architectures. It is provided an overview of the optical subsystems developed for the implementation of the proposed NG-Access Networks....

  20. A Systematic Scheme for Multiple Access in Ethernet Passive Optical Access Networks

    Science.gov (United States)

    Ma, Maode; Zhu, Yongqing; Hiang Cheng, Tee

    2005-11-01

    While backbone networks have experienced substantial changes in the last decade, access networks have not changed much. Recently, passive optical networks (PONs) seem to be ready for commercial deployment as access networks, due to the maturity of a number of enabling technologies. Among the PON technologies, Ethernet PON (EPON) standardized by the IEEE 802.3ah Ethernet in the First Mile (EFM) Task Force is the most attractive one because of its high speed, low cost, familiarity, interoperability, and low overhead. In this paper, we consider the issue of upstream channel sharing in the EPONs. We propose a novel multiple-access control scheme to provide bandwidth-guaranteed service for high-demand customers, while providing best effort service to low-demand customers according to the service level agreement (SLA). The analytical and simulation results prove that the proposed scheme performs best in what it is designed to do compared to another well-known scheme that has not considered providing differentiated services. With business customers preferring premium services with guaranteed bandwidth and residential users preferring low-cost best effort services, our scheme could benefit both groups of subscribers, as well as the operators.

  1. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  2. The Mission Accessibility of Near-Earth Asteroids

    Science.gov (United States)

    Barbee, Brent W.; Abell, P. A.; Adamo, D. R.; Mazanek, D. D.; Johnson, L. N.; Yeomans, D. K.; Chodas, P. W.; Chamberlin, A. B.; Benner, L. A. M.; Taylor, P.; hide

    2015-01-01

    The population of near-Earth asteroids (NEAs) that may be accessible for human space flight missions is defined by the Near-Earth Object Human Space Flight Accessible Targets Study (NHATS). The NHATS is an automated system designed to monitor the accessibility of, and particular mission opportunities offered by, the NEA population. This is analogous to systems that automatically monitor the impact risk posed to Earth by the NEA population. The NHATS system identifies NEAs that are potentially accessible for future round-trip human space flight missions and provides rapid notification to asteroid observers so that crucial follow-up observations can be obtained following discovery of accessible NEAs. The NHATS was developed in 2010 and was automated by early 2012. NHATS data are provided via an interactive web-site, and daily NHATS notification emails are transmitted to a mailing list; both resources are available to the public.

  3. Wireless Multi Hop Access Networks and Protocols

    OpenAIRE

    Nilsson Plymoth, Anders

    2007-01-01

    As more and more applications and services in our society now depend on the Internet, it is important that dynamically deployed wireless multi hop networks are able to gain access to the Internet and other infrastructure networks and services. This thesis proposes and evaluates solutions for providing multi hop Internet Access. It investigates how ad hoc networks can be combined with wireless and mesh networks in order to create wireless multi hop access networks. When several access points t...

  4. Access control based on attribute certificates for medical intranet applications.

    Science.gov (United States)

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  5. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  6. Access to potable water and sanitation in Cameroon within the context of Millennium Development Goals (MDGS).

    Science.gov (United States)

    Ako, Andrew Ako; Shimada, Jun; Eyong, Gloria Eneke Takem; Fantong, Wilson Yetoh

    2010-01-01

    Cameroon has been fully engaged with the Millennium Development Goals (MDGs) since their inception in 2000. This paper examines the situation of access to potable water and sanitation in Cameroon within the context of the Millennium Development Goals (MDGs), establishes whether Cameroon is on the track of meeting the MDGs in these domains and proposes actions to be taken to bring it closer to these objectives. Based on analyzed data obtained from national surveys, government ministries, national statistical offices, bibliographic research, reports and interviews, it argues that Cameroon will not reach the water and sanitation MGDs. While Cameroon is not yet on track to meet the targets of the MDGs for water and sanitation, it has made notable progress since 1990, much more needs to be done to improve the situation, especially in rural areas. In 2006, 70% of the population had access to safe drinking water and the coverage in urban centres is 88%, significantly better than the 47% in rural areas. However, rapid urbanization has rendered existing infrastructure inadequate with periurban dwellers also lacking access to safe drinking water. Sanitation coverage is also poor. In urban areas only 58% of the population has access to improved sanitation facilities, and the rate in rural areas is 42%. Women and girls shoulder the largest burden in collecting water, 15% of urban and 18% rural populations use improved drinking water sources over 30 minutes away. Cameroon faces the following challenges in reaching the water and sanitation MDGs: poor management and development of the resources, coupled with inadequate political will and commitment for the long term; rapid urbanization; urban and rural poverty and regulation and legislative lapses. The authors propose that: bridging the gap between national water policies and water services; recognizing the role played by Civil Society Organizations (CSOs) in the attainment of MDGs; developing a Council Water Resource Management

  7. Identity based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing

    DEFF Research Database (Denmark)

    Cheng, Hongbing; Rong, Chunming; Tan, Zheng-Hua

    2012-01-01

    Cloud computing will be a main information infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data...... access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key...... distribution, feature template creation, cloud data processing and secure data access control. Finally, we compare the proposed scheme with other schemes through comprehensive analysis and simulation. The results show that the proposed data access scheme is feasible and secure for cloud computing....

  8. Task-role-based Access Control Model in Smart Health-care System

    Directory of Open Access Journals (Sweden)

    Wang Peng

    2015-01-01

    Full Text Available As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for the medical health-care environment, task-role-based access control model, which overcomes the disadvantages of traditional access control models. The task-role-based access control (T-RBAC model introduces a task concept, dividing tasks into four categories. It also supports supervision role hierarchy. T-RBAC is a proper access control model for Smart Health-care System, and it improves the management of access rights. This paper also proposes an implementation of T-RBAC, a binary two-key-lock pair access control scheme using prime factorization.

  9. Joint control algorithm in access network

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To deal with long probing delay and inaccurate probing results in the endpoint admission control method,a joint local and end-to-end admission control algorithm is proposed,which introduces local probing of access network besides end-to-end probing.Through local probing,the algorithm accurately estimated the resource status of the access network.Simulation shows that this algorithm can improve admission control performance and reduce users' average waiting time when the access network is heavily loaded.

  10. Cost- and reliability-oriented aggregation point association in long-term evolution and passive optical network hybrid access infrastructure for smart grid neighborhood area network

    Science.gov (United States)

    Cheng, Xiao; Feng, Lei; Zhou, Fanqin; Wei, Lei; Yu, Peng; Li, Wenjing

    2018-02-01

    With the rapid development of the smart grid, the data aggregation point (AP) in the neighborhood area network (NAN) is becoming increasingly important for forwarding the information between the home area network and wide area network. Due to limited budget, it is unable to use one-single access technology to meet the ongoing requirements on AP coverage. This paper first introduces the wired and wireless hybrid access network with the integration of long-term evolution (LTE) and passive optical network (PON) system for NAN, which allows a good trade-off among cost, flexibility, and reliability. Then, based on the already existing wireless LTE network, an AP association optimization model is proposed to make the PON serve as many APs as possible, considering both the economic efficiency and network reliability. Moreover, since the features of the constraints and variables of this NP-hard problem, a hybrid intelligent optimization algorithm is proposed, which is achieved by the mixture of the genetic, ant colony and dynamic greedy algorithm. By comparing with other published methods, simulation results verify the performance of the proposed method in improving the AP coverage and the performance of the proposed algorithm in terms of convergence.

  11. Rail Access to Yucca Mountain: Critical Issues

    International Nuclear Information System (INIS)

    Halstead, R. J.; Dilger, F.; Moore, R. C.

    2003-01-01

    The proposed Yucca Mountain repository site currently lacks rail access. The nearest mainline railroad is almost 100 miles away. Absence of rail access could result in many thousands of truck shipments of spent nuclear fuel and high-level radioactive waste. Direct rail access to the repository could significantly reduce the number of truck shipments and total shipments. The U.S. Department of Energy (DOE) identified five potential rail access corridors, ranging in length from 98 miles to 323 miles, in the Final Environmental Impact Statement (FEIS) for Yucca Mountain. The FEIS also considers an alternative to rail spur construction, heavy-haul truck (HHT) delivery of rail casks from one of three potential intermodal transfer stations. The authors examine the feasibility and cost of the five rail corridors, and DOE's alternative proposal for HHT transport. The authors also address the potential for rail shipments through the Las Vegas metropolitan area

  12. Random access with adaptive packet aggregation in LTE/LTE-A.

    Science.gov (United States)

    Zhou, Kaijie; Nikaein, Navid

    While random access presents a promising solution for efficient uplink channel access, the preamble collision rate can significantly increase when massive number of devices simultaneously access the channel. To address this issue and improve the reliability of the random access, an adaptive packet aggregation method is proposed. With the proposed method, a device does not trigger a random access for every single packet. Instead, it starts a random access when the number of aggregated packets reaches a given threshold. This method reduces the packet collision rate at the expense of an extra latency, which is used to accumulate multiple packets into a single transmission unit. Therefore, the tradeoff between packet loss rate and channel access latency has to be carefully selected. We use semi-Markov model to derive the packet loss rate and channel access latency as functions of packet aggregation number. Hence, the optimal amount of aggregated packets can be found, which keeps the loss rate below the desired value while minimizing the access latency. We also apply for the idea of packet aggregation for power saving, where a device aggregates as many packets as possible until the latency constraint is reached. Simulations are carried out to evaluate our methods. We find that the packet loss rate and/or power consumption are significantly reduced with the proposed method.

  13. Notified Access: Extending Remote Memory Access Programming Models for Producer-Consumer Synchronization

    KAUST Repository

    Belli, Roberto; Hoefler, Torsten

    2015-01-01

    Remote Memory Access (RMA) programming enables direct access to low-level hardware features to achieve high performance for distributed-memory programs. However, the design of RMA programming schemes focuses on the memory access and less on the synchronization. For example, in contemporary RMA programming systems, the widely used producer-consumer pattern can only be implemented inefficiently, incurring in an overhead of an additional round-trip message. We propose Notified Access, a scheme where the target process of an access can receive a completion notification. This scheme enables direct and efficient synchronization with a minimum number of messages. We implement our scheme in an open source MPI-3 RMA library and demonstrate lower overheads (two cache misses) than other point-to-point synchronization mechanisms for each notification. We also evaluate our implementation on three real-world benchmarks, a stencil computation, a tree computation, and a Colicky factorization implemented with tasks. Our scheme always performs better than traditional message passing and other existing RMA synchronization schemes, providing up to 50% speedup on small messages. Our analysis shows that Notified Access is a valuable primitive for any RMA system. Furthermore, we provide guidance for the design of low-level network interfaces to support Notified Access efficiently.

  14. Notified Access: Extending Remote Memory Access Programming Models for Producer-Consumer Synchronization

    KAUST Repository

    Belli, Roberto

    2015-05-01

    Remote Memory Access (RMA) programming enables direct access to low-level hardware features to achieve high performance for distributed-memory programs. However, the design of RMA programming schemes focuses on the memory access and less on the synchronization. For example, in contemporary RMA programming systems, the widely used producer-consumer pattern can only be implemented inefficiently, incurring in an overhead of an additional round-trip message. We propose Notified Access, a scheme where the target process of an access can receive a completion notification. This scheme enables direct and efficient synchronization with a minimum number of messages. We implement our scheme in an open source MPI-3 RMA library and demonstrate lower overheads (two cache misses) than other point-to-point synchronization mechanisms for each notification. We also evaluate our implementation on three real-world benchmarks, a stencil computation, a tree computation, and a Colicky factorization implemented with tasks. Our scheme always performs better than traditional message passing and other existing RMA synchronization schemes, providing up to 50% speedup on small messages. Our analysis shows that Notified Access is a valuable primitive for any RMA system. Furthermore, we provide guidance for the design of low-level network interfaces to support Notified Access efficiently.

  15. Optical label-controlled transparent metro-access network interface

    DEFF Research Database (Denmark)

    Osadchiy, Alexey Vladimirovich

    This thesis presents results obtained during the course of my PhD research on optical signal routing and interfacing between the metropolitan and access segments of optical networks. Due to both increasing capacity demands and variety of emerging services types, new technological challenges...... control. Highlights of my research include my proposal and experimental proof of principle of an optical coherent detection based optical access network architecture providing support for a large number of users over a single distribution fiber; a spectral amplitude encoded label detection technique...... are arising for seamlessly interfacing metropolitan and access networks. Therefore, in this PhD project, I have analyzed those technological challenges and identified the key aspects to be addressed. I have also proposed and experimentally verified a number of solutions to metropolitan and access networks...

  16. Preservation of and Permanent Access to Electronic Information Resources

    National Research Council Canada - National Science Library

    Hodge, Gail

    2004-01-01

    The rapid growth in the creation and dissemination of electronic information has emphasized the digital environment's speed and ease of dissemination with little regard for its long-term preservation and access...

  17. Collaborative Indoor Access Point Localization Using Autonomous Mobile Robot Swarm.

    Science.gov (United States)

    Awad, Fahed; Naserllah, Muhammad; Omar, Ammar; Abu-Hantash, Alaa; Al-Taj, Abrar

    2018-01-31

    Localization of access points has become an important research problem due to the wide range of applications it addresses such as dismantling critical security threats caused by rogue access points or optimizing wireless coverage of access points within a service area. Existing proposed solutions have mostly relied on theoretical hypotheses or computer simulation to demonstrate the efficiency of their methods. The techniques that rely on estimating the distance using samples of the received signal strength usually assume prior knowledge of the signal propagation characteristics of the indoor environment in hand and tend to take a relatively large number of uniformly distributed random samples. This paper presents an efficient and practical collaborative approach to detect the location of an access point in an indoor environment without any prior knowledge of the environment. The proposed approach comprises a swarm of wirelessly connected mobile robots that collaboratively and autonomously collect a relatively small number of non-uniformly distributed random samples of the access point's received signal strength. These samples are used to efficiently and accurately estimate the location of the access point. The experimental testing verified that the proposed approach can identify the location of the access point in an accurate and efficient manner.

  18. Collaborative Indoor Access Point Localization Using Autonomous Mobile Robot Swarm

    Directory of Open Access Journals (Sweden)

    Fahed Awad

    2018-01-01

    Full Text Available Localization of access points has become an important research problem due to the wide range of applications it addresses such as dismantling critical security threats caused by rogue access points or optimizing wireless coverage of access points within a service area. Existing proposed solutions have mostly relied on theoretical hypotheses or computer simulation to demonstrate the efficiency of their methods. The techniques that rely on estimating the distance using samples of the received signal strength usually assume prior knowledge of the signal propagation characteristics of the indoor environment in hand and tend to take a relatively large number of uniformly distributed random samples. This paper presents an efficient and practical collaborative approach to detect the location of an access point in an indoor environment without any prior knowledge of the environment. The proposed approach comprises a swarm of wirelessly connected mobile robots that collaboratively and autonomously collect a relatively small number of non-uniformly distributed random samples of the access point’s received signal strength. These samples are used to efficiently and accurately estimate the location of the access point. The experimental testing verified that the proposed approach can identify the location of the access point in an accurate and efficient manner.

  19. Rapid Multiplex Microbial Detector, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — ORBITEC, in collaboration with Lucigen, proposes a rapid nucleic acid-based detector for spaceflight water systems to enable simultaneous quantification of multiple...

  20. Rapid Prototyping in Orthopaedic Surgery: A User's Guide

    Science.gov (United States)

    Frame, Mark; Huntley, James S.

    2012-01-01

    Rapid prototyping (RP) is applicable to orthopaedic problems involving three dimensions, particularly fractures, deformities, and reconstruction. In the past, RP has been hampered by cost and difficulties accessing the appropriate expertise. Here we outline the history of rapid prototyping and furthermore a process using open-source software to produce a high fidelity physical model from CT data. This greatly mitigates the expense associated with the technique, allowing surgeons to produce precise models for preoperative planning and procedure rehearsal. We describe the method with an illustrative case. PMID:22666160

  1. Proposal for the award of a contract for the supply and installation of prefabricated reinforced-concrete modules for an LHC access shaft

    CERN Document Server

    2000-01-01

    This document concerns the award of a contract for the supply and installation of 33 prefabricated reinforced-concrete modules for the PX15 access shaft. Following a market survey carried out among 39 firms in fourteen Member States, a call for tenders (IT-2714/ST/LHC) was sent on 22 May 2000 to seven firms and one consortium consisting of four firms in seven Member States. By the closing date, CERN had received five tenders from four firms and one consortium in five Member States. The Finance Committee is invited to agree to the negotiation of a contract with the consortium JOINT VENTURE CCC (CH-DE-AT), the lowest bidder after realignment, for the supply and installation of prefabricated reinforced-concrete modules for the PX15 access shaft for a total amount of 988 915 Swiss francs, not subject to revision. The consortium has indicated the following distribution by country of the contract value covered by this adjudication proposal: DE-89%; CH-6%; AT-5%.

  2. Dynamic RACH Partition for Massive Access of Differentiated M2M Services

    Directory of Open Access Journals (Sweden)

    Qinghe Du

    2016-03-01

    Full Text Available In machine-to-machine (M2M networks, a key challenge is to overcome the overload problem caused by random access requests from massive machine-type communication (MTC devices. When differentiated services coexist, such as delay-sensitive and delay-tolerant services, the problem becomes more complicated and challenging. This is because delay-sensitive services often use more aggressive policies, and thus, delay-tolerant services get much fewer chances to access the network. To conquer the problem, we propose an efficient mechanism for massive access control over differentiated M2M services, including delay-sensitive and delay-tolerant services. Specifically, based on the traffic loads of the two types of services, the proposed scheme dynamically partitions and allocates the random access channel (RACH resource to each type of services. The RACH partition strategy is thoroughly optimized to increase the access performances of M2M networks. Analyses and simulation demonstrate the effectiveness of our design. The proposed scheme can outperform the baseline access class barring (ACB scheme, which ignores service types in access control, in terms of access success probability and the average access delay.

  3. Improving the Accessibility and Efficiency of Point-of-Care Diagnostics Services in Low- and Middle-Income Countries: Lean and Agile Supply Chain Management.

    Science.gov (United States)

    Kuupiel, Desmond; Bawontuo, Vitalis; Mashamba-Thompson, Tivani P

    2017-11-29

    Access to point-of-care (POC) diagnostics services is essential for ensuring rapid disease diagnosis, management, control, and surveillance. POC testing services can improve access to healthcare especially where healthcare infrastructure is weak and access to quality and timely medical care is a challenge. Improving the accessibility and efficiency of POC diagnostics services, particularly in resource-limited settings, may be a promising route to improving healthcare outcomes. In this review, the accessibility of POC testing is defined as the distance/proximity to the nearest healthcare facility for POC diagnostics service. This review provides an overview of the impact of POC diagnostics on healthcare outcomes in low- and middle-income countries (LMICs) and factors contributing to the accessibility of POC testing services in LMICs, focusing on characteristics of the supply chain management and quality systems management, characteristics of the geographical location, health infrastructure, and an enabling policy framework for POC diagnostics services. Barriers and challenges related to the accessibility of POC diagnostics in LMICs were also discussed. Bearing in mind the reported barriers and challenges as well as the disease epidemiology in LMICs, we propose a lean and agile supply chain management framework for improving the accessibility and efficiency of POC diagnostics services in these settings.

  4. Improving the Accessibility and Efficiency of Point-of-Care Diagnostics Services in Low- and Middle-Income Countries: Lean and Agile Supply Chain Management

    Directory of Open Access Journals (Sweden)

    Desmond Kuupiel

    2017-11-01

    Full Text Available Access to point-of-care (POC diagnostics services is essential for ensuring rapid disease diagnosis, management, control, and surveillance. POC testing services can improve access to healthcare especially where healthcare infrastructure is weak and access to quality and timely medical care is a challenge. Improving the accessibility and efficiency of POC diagnostics services, particularly in resource-limited settings, may be a promising route to improving healthcare outcomes. In this review, the accessibility of POC testing is defined as the distance/proximity to the nearest healthcare facility for POC diagnostics service. This review provides an overview of the impact of POC diagnostics on healthcare outcomes in low- and middle-income countries (LMICs and factors contributing to the accessibility of POC testing services in LMICs, focusing on characteristics of the supply chain management and quality systems management, characteristics of the geographical location, health infrastructure, and an enabling policy framework for POC diagnostics services. Barriers and challenges related to the accessibility of POC diagnostics in LMICs were also discussed. Bearing in mind the reported barriers and challenges as well as the disease epidemiology in LMICs, we propose a lean and agile supply chain management framework for improving the accessibility and efficiency of POC diagnostics services in these settings.

  5. Research of Ad Hoc Networks Access Algorithm

    Science.gov (United States)

    Xiang, Ma

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.

  6. 78 FR 51276 - Proposed Information Collection (Access to Care Dialysis Pilot Survey and Interview); Activity...

    Science.gov (United States)

    2013-08-20

    ... to Care Dialysis Pilot Survey and Interview); Activity: Comment Request AGENCY: Veterans Health... Care Dialysis Pilot Survey and Interview)'' in any correspondence. During the comment period, comments... and Interview, VA Form 10-10067. a. Access to Care Questionnaire, VA Form 10-10067. b. Access to Care...

  7. 76 FR 40454 - Proposed Information Collection (VSO Access to VHA Electronic Health Records) Activity; Comment...

    Science.gov (United States)

    2011-07-08

    ... Access to VHA Electronic Health Records) Activity; Comment Request AGENCY: Veterans Health Administration... Access to VHA Electronic Health Records, VA Form 10- 0400. OMB Control Number: 2900-0710. Type of Review... were granted power of attorney by veterans who have medical information recorded in VHA electronic...

  8. A Rapid Coliform Detector, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — ORBITEC, in collaboration with Lucigen, proposes a rapid genetic detector for spaceflight water systems to enable real-time detection of E-coli with minimal...

  9. Does the public deserve free access to climate system science?

    Science.gov (United States)

    Grigorov, Ivo

    2010-05-01

    Some time ago it was the lack of public access to medical research data that really stirred the issue and gave inertia for legislation and a new publishing model that puts tax payer-funded medical research in the hands of those who fund it. In today's age global climate change has become the biggest socio-economic challenge, and the same argument resonates: climate affects us all and the publicly-funded science quantifying it should be freely accessible to all stakeholders beyond academic research. Over the last few years the ‘Open Access' movement to remove as much as possible subscription, and other on-campus barriers to academic research has rapidly gathered pace, but despite significant progress, the climate system sciences are not among the leaders in providing full access to their publications and data. Beyond the ethical argument, there are proven and tangible benefits for the next generation of climate researchers to adapt the way their output is published. Through the means provided by ‘open access', both data and ideas can gain more visibility, use and citations for the authors, but also result in a more rapid exchange of knowledge and ideas, and ultimately progress towards a sought solution. The presentation will aim to stimulate discussion and seek progress on the following questions: Should free access to climate research (& data) be mandatory? What are the career benefits of using ‘open access' for young scientists? What means and methods should, or could, be incorporated into current European graduate training programmes in climate research, and possible ways forward?

  10. Holistic approaches to e-learning accessibility

    Directory of Open Access Journals (Sweden)

    Lawrie Phipps

    2006-12-01

    Full Text Available The importance of accessibility to digital e-learning resources is widely acknowledged. The World Wide Web Consortium Web Accessibility Initiative has played a leading role in promoting the importance of accessibility and developing guidelines that can help when developing accessible web resources. The accessibility of e-learning resources provides additional challenges. While it is important to consider the technical and resource related aspects of e-learning when designing and developing resources for students with disabilities, there is a need to consider pedagogic and contextual issues as well. A holistic framework is therefore proposed and described, which in addition to accessibility issues takes into account learner needs, learning outcomes, local factors, infrastructure, usability and quality assurance. The practical application and implementation of this framework is discussed and illustrated through the use of examples and case studies.

  11. An Introduction to Web Accessibility, Web Standards, and Web Standards Makers

    Science.gov (United States)

    McHale, Nina

    2011-01-01

    Librarians and libraries have long been committed to providing equitable access to information. In the past decade and a half, the growth of the Internet and the rapid increase in the number of online library resources and tools have added a new dimension to this core duty of the profession: ensuring accessibility of online resources to users with…

  12. Providing the Public with Online Access to Large Bibliographic Data Bases.

    Science.gov (United States)

    Firschein, Oscar; Summit, Roger K.

    DIALOG, an interactive, computer-based information retrieval language, consists of a series of computer programs designed to make use of direct access memory devices in order to provide the user with a rapid means of identifying records within a specific memory bank. Using the system, a library user can be provided access to sixteen distinct and…

  13. Effects of a proposed rural dental school on regional dental workforce and access to care.

    Science.gov (United States)

    Wanchek, Tanya N; Rephann, Terance J

    2013-01-01

    Southwest Virginia is a rural, low-income region with a relatively small dentist workforce and poor oral health outcomes. The opening of a dental school in the region has been proposed by policy-makers as one approach to improving the size of the dentist workforce and oral health outcomes. A policy simulation was conducted to assess how a hypothetical dental school in rural Southwest Virginia would affect the availability of dentists and utilization levels of dental services. The simulation focuses on two channels through which the dental school would most likely affect the region. First, the number of graduates who are expected to remain in the region was varied, based on the extensiveness of the education pipeline used to attract local students. Second, the number of patients treated in the dental school clinic under different dental school clinical models, including the traditional model, a patient-centered clinic model and a community-based clinic model, was varied in the simulation to obtain a range of additional dentists and utilization rates under differing dental school models. Under a set of plausible assumptions, the low yield scenario (ie private school with a traditional clinic) would result in three additional dentists residing in the region and a total of 8090 additional underserved patients receiving care. Under the high yield scenario (ie dental pipeline program with community based clinics) nine new dentists would reside in the region and as many as 18 054 underserved patients would receive care. Even with the high yield scenario and the strong assumption that these patients would not otherwise access care, the utilization rate increases to 68.9% from its current 60.1%. While the new dental school in Southwest Virginia would increase the dentist workforce and utilization rates, the high cost combined with the continued low rate of dental utilization suggests that there may be more effective alternatives to improving oral health in rural areas

  14. Efficient scheduling request algorithm for opportunistic wireless access

    KAUST Repository

    Nam, Haewoon; Alouini, Mohamed-Slim

    2011-01-01

    An efficient scheduling request algorithm for opportunistic wireless access based on user grouping is proposed in this paper. Similar to the well-known opportunistic splitting algorithm, the proposed algorithm initially adjusts (or lowers

  15. Ballistic representation for kinematic access

    Science.gov (United States)

    Alfano, Salvatore

    2011-01-01

    This work uses simple two-body orbital dynamics to initially determine the kinematic access for a ballistic vehicle. Primarily this analysis was developed to assess when a rocket body might conjunct with an orbiting satellite platform. A family of access opportunities can be represented as a volume for a specific rocket relative to its launch platform. Alternately, the opportunities can be represented as a geographical footprint relative to aircraft or satellite position that encompasses all possible launcher locations for a specific rocket. A thrusting rocket is treated as a ballistic vehicle that receives all its energy at launch and follows a coasting trajectory. To do so, the rocket's burnout energy is used to find its equivalent initial velocity for a given launcher's altitude. Three kinematic access solutions are then found that account for spherical Earth rotation. One solution finds the maximum range for an ascent-only trajectory while another solution accommodates a descending trajectory. In addition, the ascent engagement for the descending trajectory is used to depict a rapid access scenario. These preliminary solutions are formulated to address ground-, sea-, or air-launched vehicles.

  16. ALPHA: Proposal of Mapping QoS Parameters between UPnP Home Network and GMPLS Access

    DEFF Research Database (Denmark)

    Brewka, Lukasz Jerzy; Sköldström, Pontus; Gavler, Anders

    2011-01-01

    This paper is treating the interdomain QoS signaling between the home and access domains with a focus on applying it for providing QoS between a UPnP-QoS based home network and GMPLS based access network. The work presented here is defining a possible approach for an interface between UPn...

  17. Quantum internet using code division multiple access

    Science.gov (United States)

    Zhang, Jing; Liu, Yu-xi; Özdemir, Şahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-01-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels. PMID:23860488

  18. Developing a Holistic Approach for E-Learning Accessibility

    Directory of Open Access Journals (Sweden)

    Brian Kelly

    2004-10-01

    Full Text Available The importance of accessibility to digital resources is now widely acknowledged. The W3C WAI has played a significant role in promoting the importance of accessibility and developing a framework for accessible Web resources. The accessibility of e-learning provides additional challenges that may not be faced when providing access to other Web resources. The authors argue that there is a need for a more sophisticated model for addressing e-learning accessibility which takes into account the usability of e-learning, pedagogic issues and student learning styles in addition to technical and resource issues. The authors expand on these issues and propose a holistic model for the development of accessible e-learning resources.

  19. Semantically Enriched Data Access Policies in eHealth.

    Science.gov (United States)

    Drozdowicz, Michał; Ganzha, Maria; Paprzycki, Marcin

    2016-11-01

    Internet of Things (IoT) requires novel solutions to facilitate autonomous, though controlled, resource access. Access policies have to facilitate interactions between heterogeneous entities (devices and humans). Here, we focus our attention on access control in eHealth. We propose an approach based on enriching policies, based on well-known and widely-used eXtensible Access Control Markup Language, with semantics. In the paper we describe an implementation of a Policy Information Point integrated with the HL7 Security and Privacy Ontology.

  20. Code-Expanded Random Access for Machine-Type Communications

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Stefanovic, Cedomir

    2012-01-01

    Abstract—The random access methods used for support of machine-type communications (MTC) in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. Motivated by the random access method employed in LTE, we propose...

  1. Integrated Coherent Radio-over-Fiber Units for Millimeter-Wave Wireless Access

    DEFF Research Database (Denmark)

    Stöhr, A.; Babiel, S.; Chuenchom, M.

    2015-01-01

    For providing wireless access as a complementary access technology to direct optical access, supporting 1–10 Gb/s per client, we propose a novel scheme based upon the transparent integration of coherent Radio-over-Fiber (CRoF) units with next generation optical access (NGOA) networks using dense ...

  2. CSchema: A Downgrading Policy Language for XML Access Control

    Institute of Scientific and Technical Information of China (English)

    Dong-Xi Liu

    2007-01-01

    The problem of regulating access to XML documents has attracted much attention from both academic and industry communities.In existing approaches, the XML elements specified by access policies are either accessible or inac-cessible according to their sensitivity.However, in some cases, the original XML elements are sensitive and inaccessible, but after being processed in some appropriate ways, the results become insensitive and thus accessible.This paper proposes a policy language to accommodate such cases, which can express the downgrading operations on sensitive data in XML documents through explicit calculations on them.The proposed policy language is called calculation-embedded schema (CSchema), which extends the ordinary schema languages with protection type for protecting sensitive data and specifying downgrading operations.CSchema language has a type system to guarantee the type correctness of the embedded calcula-tion expressions and moreover this type system also generates a security view after type checking a CSchema policy.Access policies specified by CSchema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against CSchema policies.These released documents are then ready tobe accessed by, for instance, XML query engines.By incorporating this validation procedure, other XML processing technologies can use CSchema as the access control module.

  3. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang; Ruan, Liangzhong; Win, Moe Z.

    2017-01-01

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location

  4. Accessing diabetes care in rural Uganda

    DEFF Research Database (Denmark)

    Nielsen, Jannie; Bahendeka, Silver K.; Bygbjerg, Ib C.

    2017-01-01

    Non-communicable diseases including type 2 diabetes (T2D) are increasing rapidly in most Sub-Saharan African (SSA) countries like Uganda. Little attention has been given to how patients with T2D try to achieve treatment when the availability of public health care for their disease is limited......, as is the case in most SSA countries. In this paper we focus on the landscape of availability of care and the therapeutic journeys of patients within that landscape. Based on fieldwork in south-western Uganda including 10 case studies, we explore the diabetes treatment options in the area and what it takes...... to access the available treatment. We analyse the resources patients need to use the available treatment options, and demonstrate that the patients’ journeys to access and maintain treatment are facilitated by the knowledge and support of their therapy management groups. Patients access treatment more...

  5. Proposed changes to the reimbursement of pharmaceuticals and medical devices in Poland and their impact on market access and the pharmaceutical industry

    Science.gov (United States)

    Badora, Karolina; Caban, Aleksandra; Rémuzat, Cécile; Dussart, Claude; Toumi, Mondher

    2017-01-01

    ABSTRACT In Poland, two proposed amendments to the reimbursement act are currently in preparation; these are likely to substantially change the pricing and reimbursement landscape for both drugs and medical devices. Proposed changes include: alignment of medical device reimbursement with that of pharmaceuticals; relaxing the strict reimbursement criteria for ultra-orphan drugs; establishment of an additional funding category for vaccines; introduction of compassionate use, and a simplified reimbursement pathway for well-established off-label indications; appreciation of manufacturers’ innovation and research and development efforts by creating a dedicated innovation budget; introduction of a mechanism preventing excessive parallel import; prolonged duration of reimbursement decisions and reimbursement lists; and increased flexibility in defining drug programmes. Both amendments are still at a draft stage and many aspects of the new regulations remain unclear. Nonetheless, the overall direction of some of the changes is already evident and warrants discussion due to their high expected impact on pharmaceutical and device manufacturers. Here we evaluate the main changes proposed to the reimbursement of drugs, vaccines, and medical devices, and examine the impact they are likely to have on market access and pharmaceutical industry in Poland. PMID:29081924

  6. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Science.gov (United States)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  7. Dynamic Resource Allocation in Hybrid Access Femtocell Network

    Directory of Open Access Journals (Sweden)

    Afaz Uddin Ahmed

    2014-01-01

    Full Text Available Intercell interference is one of the most challenging issues in femtocell deployment under the coverage of existing macrocell. Allocation of resources between femtocell and macrocell is essential to counter the effects of interference in dense femtocell networks. Advances in resource management strategies have improved the control mechanism for interference reduction at lower node density, but most of them are ineffective at higher node density. In this paper, a dynamic resource allocation management algorithm (DRAMA for spectrum shared hybrid access OFDMA femtocell network is proposed. To reduce the macro-femto-tier interference and to improve the quality of service, the proposed algorithm features a dynamic resource allocation scheme by controlling them both centrally and locally. The proposed scheme focuses on Femtocell Access Point (FAP owners’ satisfaction and allows maximum utilization of available resources based on congestion in the network. A simulation environment is developed to study the quantitative performance of DRAMA in hybrid access-control femtocell network and compare it to closed and open access mechanisms. The performance analysis shows that higher number of random users gets connected to the FAP without compromising FAP owners’ satisfaction allowing the macrocell to offload a large number of users in a dense heterogeneous network.

  8. Access control mechanism of wireless gateway based on open flow

    Science.gov (United States)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  9. Policies to Spur Energy Access. Executive Summary; Volume 1, Engaging the Private Sector in Expanding Access to Electricity; Volume 2, Case Studies to Public-Private Models to Finance Decentralized Electricity Access

    Energy Technology Data Exchange (ETDEWEB)

    Walters, Terri [National Renewable Energy Lab. (NREL), Golden, CO (United States); Rai, Neha [International Institute for Environment and Development (IIED), London (England); Esterly, Sean [National Renewable Energy Lab. (NREL), Golden, CO (United States); Cox, Sadie [National Renewable Energy Lab. (NREL), Golden, CO (United States); Reber, Tim [National Renewable Energy Lab. (NREL), Golden, CO (United States); Muzammil, Maliha [Univ. of Oxford (United Kingdom); Mahmood, Tasfiq [International Center for Climate Change and Development, Baridhara (Bangladesh); Kaur, Nanki [International Institute for Environment and Development (IIED), London (England); Tesfaye, Lidya [Echnoserve Consulting (Ethiopia); Mamuye, Simret [Echnoserve Consulting (Ethiopia); Knuckles, James [Univ. of London (England). Cass Business School; Morris, Ellen [Columbia Univ., New York, NY (United States); de Been, Merijn [Delft Univ. of Technology (Netherlands); Steinbach, Dave [International Institute for Environment and Development (IIED), London (England); Acharya, Sunil [Digo Bikas Inst. (Nepal); Chhetri, Raju Pandit [National Renewable Energy Lab. (NREL), Golden, CO (United States); Bhushal, Ramesh [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-09-01

    Government policy is one of the most important factors in engaging the private sector in providing universal access to electricity. In particular, the private sector is well positioned to provide decentralized electricity products and services. While policy uncertainty and regulatory barriers can keep enterprises and investors from engaging in the market, targeted policies can create opportunities to leverage private investment and skills to expand electricity access. However, creating a sustainable market requires policies beyond traditional electricity regulation. The report reviews the range of policy issues that impact the development and expansion of a market for decentralized electricity services from establishing an enabling policy environment to catalyzing finance, building human capacity, and integrating energy access with development programs. The case studies in this report show that robust policy frameworks--addressing a wide range of market issues--can lead to rapid transformation in energy access. The report highlights examples of these policies in action Bangladesh, Ethiopia, Mali, Mexico, and Nepal.

  10. Hierarchy Bayesian model based services awareness of high-speed optical access networks

    Science.gov (United States)

    Bai, Hui-feng

    2018-03-01

    As the speed of optical access networks soars with ever increasing multiple services, the service-supporting ability of optical access networks suffers greatly from the shortage of service awareness. Aiming to solve this problem, a hierarchy Bayesian model based services awareness mechanism is proposed for high-speed optical access networks. This approach builds a so-called hierarchy Bayesian model, according to the structure of typical optical access networks. Moreover, the proposed scheme is able to conduct simple services awareness operation in each optical network unit (ONU) and to perform complex services awareness from the whole view of system in optical line terminal (OLT). Simulation results show that the proposed scheme is able to achieve better quality of services (QoS), in terms of packet loss rate and time delay.

  11. Multirate IP traffic transmission in flexible access networks based on optical FFH-CDMA

    DEFF Research Database (Denmark)

    Raddo, Thiago R.; Sanches, Anderson L.; Tafur Monroy, Idelfonso

    2016-01-01

    In this paper, we propose a new IP transmission architecture over optical fast frequency hopping code-division multiple-access (OFFH-CDMA) network capable of supporting multirate transmissions for applications in flexible optical access networks. The proposed network architecture is independent...

  12. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Directory of Open Access Journals (Sweden)

    Luis Cruz-Piris

    2018-03-01

    Full Text Available Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT. One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.. To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT. As an access control scheme, we have selected User-Managed Access (UMA, an existing Open Authorization (OAuth 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  13. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources.

    Science.gov (United States)

    Cruz-Piris, Luis; Rivera, Diego; Marsa-Maestre, Ivan; de la Hoz, Enrique; Velasco, Juan R

    2018-03-20

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal.

  14. Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources

    Science.gov (United States)

    2018-01-01

    Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices in an access control system designed for Web-based services by modelling certain IoT communication elements as resources. This would allow us to obtain a unified access control scheme between heterogeneous devices (IoT devices, Internet-based services, etc.). To achieve this, we have analysed the most relevant communication protocols for these kinds of environments and then we have proposed a methodology which allows the modelling of communication actions as resources. Then, we can protect these resources using access control mechanisms. The validation of our proposal has been carried out by selecting a communication protocol based on message exchange, specifically Message Queuing Telemetry Transport (MQTT). As an access control scheme, we have selected User-Managed Access (UMA), an existing Open Authorization (OAuth) 2.0 profile originally developed for the protection of Internet services. We have performed tests focused on validating the proposed solution in terms of the correctness of the access control system. Finally, we have evaluated the energy consumption overhead when using our proposal. PMID:29558406

  15. Rapid Automated Mission Planning System, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — The proposed innovation is an automated UAS mission planning system that will rapidly identify emergency (contingency) landing sites, manage contingency routing, and...

  16. Learning Automata Based Caching for Efficient Data Access in Delay Tolerant Networks

    Directory of Open Access Journals (Sweden)

    Zhenjie Ma

    2018-01-01

    Full Text Available Effective data access is one of the major challenges in Delay Tolerant Networks (DTNs that are characterized by intermittent network connectivity and unpredictable node mobility. Currently, different data caching schemes have been proposed to improve the performance of data access in DTNs. However, most existing data caching schemes perform poorly due to the lack of global network state information and the changing network topology in DTNs. In this paper, we propose a novel data caching scheme based on cooperative caching in DTNs, aiming at improving the successful rate of data access and reducing the data access delay. In the proposed scheme, learning automata are utilized to select a set of caching nodes as Caching Node Set (CNS in DTNs. Unlike the existing caching schemes failing to address the challenging characteristics of DTNs, our scheme is designed to automatically self-adjust to the changing network topology through the well-designed voting and updating processes. The proposed scheme improves the overall performance of data access in DTNs compared with the former caching schemes. The simulations verify the feasibility of our scheme and the improvements in performance.

  17. Integration of QoS provisioning in home and access networks

    DEFF Research Database (Denmark)

    Popov, Mikhail; Gavler, A.; Sköldström, P.

    2010-01-01

    Approaches for QoS provisioning using UPnP for home networks and GMPLS for access networks are described. A solution for interworking the UPnP and the GMPLS at the residential gateway is proposed.......Approaches for QoS provisioning using UPnP for home networks and GMPLS for access networks are described. A solution for interworking the UPnP and the GMPLS at the residential gateway is proposed....

  18. Traffic-Adaptive, Flow-Specific Medium Access for Wireless Networks

    Science.gov (United States)

    2009-09-01

    51 b. Carrier Sense Multiple Access (CSMA).................................52 c. MACA and MACAW...Figure 17. Comparison of collision avoidance techniques proposed in MACA , MACAW, and MACA -BI (From [132...low power listening lrd ......................long range dependent MAC .................medium access control MACA

  19. Due diligence in the open-access explosion era: choosing a reputable journal for publication.

    Science.gov (United States)

    Masten, Yondell; Ashcraft, Alyce

    2017-11-15

    Faculty are required to publish. Naïve and "in-a-hurry-to-publish" authors seek to publish in journals where manuscripts are rapidly accepted. Others may innocently submit to one of an increasing number of questionable/predatory journals, where predatory is defined as practices of publishing journals for exploitation of author-pays, open-access publication model by charging authors publication fees for publisher profit without provision of expected services (expert peer review, editing, archiving, and indexing published manuscripts) and promising almost instant publication. Authors may intentionally submit manuscripts to predatory journals for rapid publication without concern for journal quality. A brief summary of the open access "movement," suggestions for selecting reputable open access journals, and suggestion for avoiding predatory publishers/journals are described. The purpose is to alert junior and seasoned faculty about predatory publishers included among available open access journal listings. Brief review of open access publication, predatory/questionable journal characteristics, suggestions for selecting reputable open access journals and avoiding predatory publishers/journals are described. Time is required for intentionally performing due diligence in open access journal selection, based on publisher/journal quality, prior to manuscript submission or authors must be able to successfully withdraw manuscripts when submission to a questionable or predatory journal is discovered. © FEMS 2017.

  20. Random Access for Machine-Type Communication based on Bloom Filtering

    DEFF Research Database (Denmark)

    Pratas, Nuno; Stefanovic, Cedomir; Madueño, Germán Corrales

    2016-01-01

    utilizes the system resources more efficiently and achieves similar or lower latency of connection establishment in case of synchronous arrivals, compared to the variant of the LTE-A access protocol that is optimized for MTC traffic. A dividend of the proposed method is that allows the base station (BS......We present a random access method inspired on Bloom filters that is suited for Machine-Type Communications (MTC). Each accessing device sends a signature during the contention process. A signature is constructed using the Bloom filtering method and contains information on the device identity...... and the connection establishment cause. We instantiate the proposed method over the current LTE-A access protocol. However, the method is applicable to a more general class of random access protocols that use preambles or other reservation sequences, as expected to be the case in 5G systems. We show that our method...

  1. Task-role-based Access Control Model in Smart Health-care System

    OpenAIRE

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  2. Key issues of multiple access technique for LEO satellite communication systems

    Institute of Scientific and Technical Information of China (English)

    温萍萍; 顾学迈

    2004-01-01

    The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.

  3. Tariff-Tax Reforms and Market Access

    DEFF Research Database (Denmark)

    Kreickemeier, Udo; Raimondos-Møller, Pascalis

    2006-01-01

    Reducing tariffs and increasing consumption taxes is a standard IMF advice to countries that want to open up their economy without hurting government finances. Indeed, theoretical analysis of such a tariff-tax reform shows an unambiguous increase in welfare and government revenues. The present pa...... efficient proposal to follow both as far as it concerns market access and welfare.JEL code: F13, H20.Keywords: Market access; tariff reform, consumption tax reform....

  4. Spin-Label CW Microwave Power Saturation and Rapid Passage with Triangular Non-Adiabatic Rapid Sweep (NARS) and Adiabatic Rapid Passage (ARP) EPR Spectroscopy

    Science.gov (United States)

    Kittell, Aaron W.; Hyde, James S.

    2015-01-01

    Non-adiabatic rapid passage (NARS) electron paramagnetic resonance (EPR) spectroscopy was introduced by Kittell, A.W., Camenisch, T.G., Ratke, J.J. Sidabras, J.W., Hyde, J.S., 2011 as a general purpose technique to collect the pure absorption response. The technique has been used to improve sensitivity relative to sinusoidal magnetic field modulation, increase the range of inter-spin distances that can be measured under near physiological conditions, and enhance spectral resolution in copper (II) spectra. In the present work, the method is extended to CW microwave power saturation of spin-labeled T4 Lysozyme (T4L). As in the cited papers, rapid triangular sweep of the polarizing magnetic field was superimposed on slow sweep across the spectrum. Adiabatic rapid passage (ARP) effects were encountered in samples undergoing very slow rotational diffusion as the triangular magnetic field sweep rate was increased. The paper reports results of variation of experimental parameters at the interface of adiabatic and non-adiabatic rapid sweep conditions. Comparison of the forward (up) and reverse (down) triangular sweeps is shown to be a good indicator of the presence of rapid passage effects. Spectral turning points can be distinguished from spectral regions between turning points in two ways: differential microwave power saturation and differential passage effects. Oxygen accessibility data are shown under NARS conditions that appear similar to conventional field modulation data. However, the sensitivity is much higher, permitting, in principle, experiments at substantially lower protein concentrations. Spectral displays were obtained that appear sensitive to rotational diffusion in the range of rotational correlation times of 10−3 to 10−7 s in a manner that is analogous to saturation transfer spectroscopy. PMID:25917132

  5. Open Access and repositories beyond green and gold

    CERN Document Server

    2007-01-01

    Access to previous results and their reuse in new research are at the very basis of scientific progress. In the era of e-Science and when the Open Access paradigm is changing scholarly communication, there is an unprecedented need for rapid and effective online access to scientific information. High-Energy Physics (HEP) pioneered innovation in scholarly communication with the invention of the Web, originally a vehicle of scientific information, and with the inception of online preprint repositories, introducing Open Access to preliminary scientific results. With the imminent start-up of the CERN LHC accelerator, one of the flagships of European science, the HEP community urgently needs a new platform for scientific information. A multi-disciplinary collaboration of academies, research laboratories and industrial partners has developed a vision to build such an innovative e-infrastructure: HEPIS (High Energy Physics Information System). HEPIS will integrate present European and American databases and repositor...

  6. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  7. Rendering Intelligence at Physical Layer for Smart Addressing and Multiple Access

    DEFF Research Database (Denmark)

    Sanyal, Rajarshi; Prasad, Ramjee; Cianca, Ernestina

    2010-01-01

    addressing of a node. For a typical closed user group type of network, we propose a multiple access mechanism and network topology which will not only eliminate the need of intelligent core network equipments in the network area , but to use this intelligent physical layer to directly reach any node over......The primary objective of this work is to propose a technique of wireless communication, where we render intelligence to the physical layer. We aim to realize a physical layer that can take part in some processes which is otherwise confined to higher layer signalling activities, like for example...... the fundamentals behind the proposed multiple access scheme and draws out the benefits compared to the existing multiple access processes based on cellular approach....

  8. Accessibility on the agenda of social and educational inclusion

    Directory of Open Access Journals (Sweden)

    Tatiane Negrini

    2010-10-01

    Full Text Available The present paper aims at unveiling the route of the proposed legal accessibility, seeking to develop a reflection inside the devices that support the process of social inclusion and education. Thus, studies in the area were used, also making reference to policies oriented for accessibility. So the research does not aspire to the exhaustion of the subject, but rather, it provides clues to a discussion of both to include accessibility in the scope of Special Education. There is a rescue on the law of accessibility including the Law No. 7405 of November 12, 1985, Law No. 10,048 of November 8, 2000, Law No. 10,098 of December 19, 2000 and Decree No. 5296 of 2 December 2004. Moreover, the ideas are on discussion according the current proposal of inclusive education, which refers to the access of everyone into the educational environment. Note that there are consistent policies regarding accessibility, however, in regard to the school environment, the barriers are not restricted only to the architectural features, or communications infrastructure. It has to agree, too, curricular and attitudinal adaptations as well as an assessment about the training.

  9. Joint estimation and contention-resolution protocol for wireless random access

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Trillingsgaard, Kasper Fløe; Kiilerich Pratas, Nuno

    2013-01-01

    We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution of their transmissi......We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution...... successive interference cancellation which, coupled with the use of the optimized access probabilities, enables throughputs that are substantially higher than the traditional slotted ALOHA-like protocols. The key feature of the proposed protocol is that the round durations are not a priori set...

  10. Rapid application development by KEKB accelerator operators using EPICS/Python

    International Nuclear Information System (INIS)

    Tanaka, M.; Satoh, Y.; Kitabayashi, T.

    2004-01-01

    In the KEKB accelerator facility, the control system is constructed based on the framework of EPICS. By using EPICS/Python API, which is originated from KEK, we can develop an EPICS channel access application based on simple Python technology with only a few knowledge of EPICS channel access protocols. The operator's new tuning ideas are quickly implemented to the control system. In this paper, we introduce the EPICS/Python API and report the effectiveness of rapid application development by the KEKB operators using the API. (author)

  11. Glyphosate resistance in Ambrosia trifida: Part 1. Novel rapid cell death response to glyphosate.

    Science.gov (United States)

    Van Horn, Christopher R; Moretti, Marcelo L; Robertson, Renae R; Segobye, Kabelo; Weller, Stephen C; Young, Bryan G; Johnson, William G; Schulz, Burkhard; Green, Amanda C; Jeffery, Taylor; Lespérance, Mackenzie A; Tardif, François J; Sikkema, Peter H; Hall, J Christopher; McLean, Michael D; Lawton, Mark B; Sammons, R Douglas; Wang, Dafu; Westra, Philip; Gaines, Todd A

    2018-05-01

    Glyphosate-resistant (GR) Ambrosia trifida is now present in the midwestern United States and in southwestern Ontario, Canada. Two distinct GR phenotypes are known, including a rapid response (GR RR) phenotype, which exhibits cell death within hours after treatment, and a non-rapid response (GR NRR) phenotype. The mechanisms of resistance in both GR RR and GR NRR remain unknown. Here, we present a description of the RR phenotype and an investigation of target-site mechanisms on multiple A. trifida accessions. Glyphosate resistance was confirmed in several accessions, and whole-plant levels of resistance ranged from 2.3- to 7.5-fold compared with glyphosate-susceptible (GS) accessions. The two GR phenotypes displayed similar levels of resistance, despite having dramatically different phenotypic responses to glyphosate. Glyphosate resistance was not associated with mutations in EPSPS sequence, increased EPSPS copy number, EPSPS quantity, or EPSPS activity. These encompassing results suggest that resistance to glyphosate in these GR RR A. trifida accessions is not conferred by a target-site resistance mechanism. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  12. Sectoral Plan 'Deep Geological Disposal', Stage 2. Proposed site areas for the surface facilities of the deep geological repositories as well as for their access infrastructure. General report

    International Nuclear Information System (INIS)

    2011-12-01

    In line with the provisions of the nuclear energy legislation, the sites for deep geological disposal of Swiss radioactive waste are selected in a three-stage Sectoral Plan process (Sectoral Plan for Deep Geological Disposal). The disposal sites are specified in Stage 3 of the selection process with the granting of a general licence in accordance with the Nuclear Energy Act. The first stage of the process was completed on 30 th November 2011, with the decision of the Federal Council to incorporate the six geological siting regions proposed by the National Cooperative for the Disposal of Radioactive Waste (NAGRA) into the Sectoral Plan for Deep Geological Disposal, for further evaluation in Stage 2. The decision also specifies the planning perimeters within which the surface facilities and shaft locations for the repositories will be constructed. In the second stage of the process, at least two geological siting regions each will be specified for the repository for low- and intermediate-level waste (L/ILW) and for the high-level waste (HLW) repository and these will undergo detailed geological investigation in Stage 3. For each of these potential siting regions, at least one location for the surface facility and a corridor for the access infrastructure will also be specified. NAGRA is responsible, at the beginning of Stage 2, for submitting proposals for potential locations for the surface facilities and their access infrastructure to the Federal Office of Energy (SFOE); these are then considered by the regional participation bodies in the siting regions. The present report and its annexes volume document these proposals. In Stage 2, under the lead of the SFOE, socio-economic-ecological studies will also be carried out to investigate the impact of a repository project on the environment, economy and society. The present reports also contain the input data to be provided by NAGRA for the generic (site-independent) part of these impact studies. A meaningful discussion

  13. A Fiscal Analysis of Proposed Education Access Grants in Minneapolis. School Choice Issues in the State

    Science.gov (United States)

    Maas, Ericca

    2005-01-01

    This study examines the fiscal impact of model legislation that would create Education Access Grants in Minnesota. The legislation would provide grants for low-income students to attend private schools. Specifically, this study examines the effect of implementing Education Access Grants in Minneapolis, the state's largest metropolitan area. It…

  14. OPERATIONAL SAR DATA PROCESSING IN GIS ENVIRONMENTS FOR RAPID DISASTER MAPPING

    Directory of Open Access Journals (Sweden)

    A. Meroni

    2013-05-01

    Full Text Available Having access to SAR data can be highly important and critical especially for disaster mapping. Updating a GIS with contemporary information from SAR data allows to deliver a reliable set of geospatial information to advance civilian operations, e.g. search and rescue missions. Therefore, we present in this paper the operational processing of SAR data within a GIS environment for rapid disaster mapping. This is exemplified by the November 2010 flash flood in the Veneto region, Italy. A series of COSMO-SkyMed acquisitions was processed in ArcGIS® using a single-sensor, multi-mode, multi-temporal approach. The relevant processing steps were combined using the ArcGIS ModelBuilder to create a new model for rapid disaster mapping in ArcGIS, which can be accessed both via a desktop and a server environment.

  15. Guidelines for Accessibility to Microblogging: an Integral Approach

    OpenAIRE

    Martín García, Yod Samuel; Álvarez Alba, Laura; Yelmo Garcia, Juan Carlos

    2011-01-01

    Microblogging is one of the most popular user-generated media, hence its accessibility has a large impact for users. However, the accessibility of this medium is poor in practice, due to the combination of bad practices by different agents ranging from the providers that host microblogging services to prosumers that post contents to them. Here we present an accessibility-oriented model of microblogging services, analyze the impact of its components, and propose guidelines for each of them to ...

  16. Switched-based interference reduction scheme for open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2012-06-01

    Femtocells have been proposed to enhance the spatial coverage and system capacity of existing cellular networks. However, this technology may result in significant performance loss due to the increase in co-channel interference, particularly when coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently. It is also assumed that each end user (EU) can access one channel at a time, and transfer limited feedback. To reduce the effect of co-tier interference in the absence of the desired EU channel state information (CSI) at the serving access point as well as coordination between active access points, a switched scheme based on the interference levels associated with available channels is proposed. Through the analysis, the scheme modes of operation in under-loaded and over-loaded channels are studied, from which the statistics of the resulting interference power are quantified. The impact of the proposed scheme on the received desired power is thoroughly discussed. In addition, the effect of the switching threshold on the achieved performance of the desired EU is investigated. The results clarify that the proposed scheme can improve the performance while reducing the number of examined channels and feedback load. © 2012 IEEE.

  17. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    Science.gov (United States)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  18. Process-based project proposal risk management

    Directory of Open Access Journals (Sweden)

    Alok Kumar

    2016-12-01

    Full Text Available We all are aware of the organizational omnipresence. Projects within the organizations are ubiquitous too. Projects achieve their goals successfully if they are planned, scheduled, controlled and implemented well. The project lifecycle of initiating, planning, scheduling, controlling and implementing are very well-planned by project managers and the organizations. Successful projects have well-developed risk management plans to deal with situations impacting projects. Like any other organisation, a university does try to access funds for different purposes too. For such organisations, running a project is not the issue, rather getting a project proposal approved to fund a project is the key. Project proposal processing is done by the nodal office in every organisation. Usually, these nodal offices help in administration and submission of a project proposal for accessing funds. Seldom are these nodal project offices within the organizations facilitate a project proposal approval by proactively reaching out to the project managers. And as project managers prepare project proposals, little or no attention is made to prepare a project proposal risk plan so as to maximise project acquisition. Risk plans are submitted while preparing proposals but these risk plans cater to a requirement to address actual projects upon approval. Hence, a risk management plan for project proposal is either missing or very little effort is made to treat the risks inherent in project acquisition. This paper is an integral attempt to highlight the importance of risk treatment for project proposal stage as an extremely important step to preparing the risk management plan made for projects corresponding to their lifecycle phases. Several tools and techniques have been proposed in the paper to help and guide either the project owner (proposer or the main organisational unit responsible for project management. Development of tools and techniques to further enhance project

  19. A slotted access control protocol for metropolitan WDM ring networks

    Science.gov (United States)

    Baziana, P. A.; Pountourakis, I. E.

    2009-03-01

    In this study we focus on the serious scalability problems that many access protocols for WDM ring networks introduce due to the use of a dedicated wavelength per access node for either transmission or reception. We propose an efficient slotted MAC protocol suitable for WDM ring metropolitan area networks. The proposed network architecture employs a separate wavelength for control information exchange prior to the data packet transmission. Each access node is equipped with a pair of tunable transceivers for data communication and a pair of fixed tuned transceivers for control information exchange. Also, each access node includes a set of fixed delay lines for synchronization reasons; to keep the data packets, while the control information is processed. An efficient access algorithm is applied to avoid both the data wavelengths and the receiver collisions. In our protocol, each access node is capable of transmitting and receiving over any of the data wavelengths, facing the scalability issues. Two different slot reuse schemes are assumed: the source and the destination stripping schemes. For both schemes, performance measures evaluation is provided via an analytic model. The analytical results are validated by a discrete event simulation model that uses Poisson traffic sources. Simulation results show that the proposed protocol manages efficient bandwidth utilization, especially under high load. Also, comparative simulation results prove that our protocol achieves significant performance improvement as compared with other WDMA protocols which restrict transmission over a dedicated data wavelength. Finally, performance measures evaluation is explored for diverse numbers of buffer size, access nodes and data wavelengths.

  20. ACCESS Project: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Weller, Heiko [Robert Bosch, LLC, Farmington Hills, MI (United States)

    2015-04-01

    The ACCESS project addressed the development, testing, and demonstration of the proposed advanced technologies and the associated emission and fuel economy improvement at an engine dynamometer and on a full-scale vehicle. Improve fuel economy by 25% with minimum performance penalties Achieve SULEV level emissions with gasoline Demonstrate multi-mode combustion engine management system

  1. Distributed Role-based Access Control for Coaliagion Application

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; ZHU Xian; XING Guanglin

    2005-01-01

    Access control in multi-domain environments is one of the important questions of building coalition between domains.On the basis of RBAC access control model, the concepts of role delegation and role mapping are proposed, which support the third-party authorization.Then, a distributed RBAC model is presented.Finally the implementation issues are discussed.

  2. Open Access to essential health care information

    Directory of Open Access Journals (Sweden)

    Pandey Manoj

    2004-12-01

    Full Text Available Abstract Open Access publishing is a valuable resource for the synthesis and distribution of essential health care information. This article discusses the potential benefits of Open Access, specifically in terms of Low and Middle Income (LAMI countries in which there is currently a lack of informed health care providers – mainly a consequence of poor availability to information. We propose that without copyright restrictions, Open Access facilitates distribution of the most relevant research and health care information. Furthermore, we suggest that the technology and infrastructure that has been put in place for Open Access could be used to publish download-able manuals, guides or basic handbooks created by healthcare providers in LAMI countries.

  3. Sectoral Plan 'Deep Geological Disposal', Stage 2. Proposed site areas for the surface facilities of the deep geological repositories as well as for their access infrastructure. Annexes

    International Nuclear Information System (INIS)

    2011-12-01

    In line with the provisions of the nuclear energy legislation, the sites for deep geological disposal of Swiss radioactive waste are selected in a three-stage Sectoral Plan process (Sectoral Plan for Deep Geological Disposal). The disposal sites are specified in Stage 3 of the selection process with the granting of a general licence in accordance with the Nuclear Energy Act. The first stage of the process was completed on 30 th November 2011, with the decision of the Federal Council to incorporate the six geological siting regions proposed by the National Cooperative for the Disposal of Radioactive Waste (NAGRA) into the Sectoral Plan for Deep Geological Disposal, for further evaluation in Stage 2. The decision also specifies the planning perimeters within which the surface facilities and shaft locations for the repositories will be constructed. In the second stage of the process, at least two geological siting regions each will be specified for the repository for low- and intermediate-level waste (L/ILW) and for the high-level waste (HLW) repository and these will undergo detailed geological investigation in Stage 3. For each of these potential siting regions, at least one location for the surface facility and a corridor for the access infrastructure will also be specified. NAGRA is responsible, at the beginning of Stage 2, for submitting proposals for potential locations for the surface facilities and their access infrastructure to the Federal Office of Energy (SFOE); these are then considered by the regional participation bodies in the siting regions. The general report and the present annexes volume document these proposals. In Stage 2, under the lead of the SFOE, socio-economic-ecological studies will also be carried out to investigate the impact of a repository project on the environment, economy and society. The present reports also contain the input data to be provided by NAGRA for the generic (site-independent) part of these impact studies. A meaningful

  4. Hybrid Solution for Privacy-Preserving Access Control for Healthcare Data

    Directory of Open Access Journals (Sweden)

    SMITHAMOL, M. B.

    2017-05-01

    Full Text Available The booming in cloud and IoT technologies has accelerated the growth of healthcare system. The IoT devices monitor the patient's health, and upload collected data as Electronic Medical Records (EMRs to the cloud for storage and sharing. Outsourcing EMRs to the cloud introduce new security and privacy challenges. In this paper, we proposed a novel architecture ensuring security and privacy for the outsourced health records. The proposed model uses partially ordered set (POSET for constructing the group based access structure and Ciphertext-Policy Attribute-Based Encryption (CP-ABE to provide fine-grained EMR access control. The modified group based CP-ABE (G-CP-ABE minimizes the computational overhead by reducing the number of leaf nodes in the access tree. Also, the proposed G-CP-ABE framework merges symmetric encryption and CP-ABE scheme to minimize the overall encryption time. As a result, G-CP-ABE can be used to monitor health conditions even from a resource constrained IoT device. The performance analysis shows the efficiency of the proposed model, making it suitable for practical use.

  5. Trellis Tone Modulation Multiple-Access for Peer Discovery in D2D Networks

    Directory of Open Access Journals (Sweden)

    Chiwoo Lim

    2018-04-01

    Full Text Available In this paper, a new non-orthogonal multiple-access scheme, trellis tone modulation multiple-access (TTMMA, is proposed for peer discovery of distributed device-to-device (D2D communication. The range and capacity of discovery are important performance metrics in peer discovery. The proposed trellis tone modulation uses single-tone transmission and achieves a long discovery range due to its low Peak-to-Average Power Ratio (PAPR. The TTMMA also exploits non-orthogonal resource assignment to increase the discovery capacity. For the multi-user detection of superposed multiple-access signals, a message-passing algorithm with supplementary schemes are proposed. With TTMMA and its message-passing demodulation, approximately 1.5 times the number of devices are discovered compared to the conventional frequency division multiple-access (FDMA-based discovery.

  6. Implementing RapidArc into clinical routine

    DEFF Research Database (Denmark)

    Van Esch, Ann; Huyskens, Dominique P; Behrens, Claus F

    2011-01-01

    With the increased commercial availability of intensity modulated arc therapy (IMAT) comes the need for comprehensive QA programs, covering the different aspects of this newly available technology. This manuscript proposes such a program for the RapidArc (RA) (Varian Medical Systems, Palo Alto...

  7. Optical Access Multiservice Architecture with Support to Smart Grid

    DEFF Research Database (Denmark)

    Gómez-Martínez, Alejandro; Amaya-Fernández, Ferney; Hincapié, Roberto

    2013-01-01

    The increasing demand of fixed and mobile applications, and considering that smart grid imposes new requirements to the access networks, in this paper we present an optical access architecture to support home multiservice including smart grid applications. We propose a migration path based in a WDM...

  8. Assessment, authorization and access to medicaid managed mental health care.

    Science.gov (United States)

    Masland, Mary C; Snowden, Lonnie R; Wallace, Neal T

    2007-11-01

    Examined were effects on access of managed care assessment and authorization processes in California's 57 county mental health plans. Primary data on managed care implementation were collected from surveys of county plan administrators; secondary data were from Medicaid claims and enrollment files. Using multivariate fixed effects regression, we found that following implementation of managed care, greater access occurred in county plans where assessments and treatment were performed by the same clinician, and where service authorizations were made more rapidly. Lower access occurred in county plans where treating clinicians authorized services themselves. Results confirm the significant effects of managed care processes on outcomes and highlight the importance of system capacity.

  9. The right of public access to legal information : A proposal for its universal recognition as a human right

    NARCIS (Netherlands)

    Mitee, Leesi Ebenezer

    2017-01-01

    Abstract: This Article examines the desirability of the universal recognition of the right of public access to legal information as a human right and therefore as part of a legal framework for improving national and global access to legal information. It discusses the right of public access to legal

  10. Rapid mask prototyping for microfluidics.

    Science.gov (United States)

    Maisonneuve, B G C; Honegger, T; Cordeiro, J; Lecarme, O; Thiry, T; Fuard, D; Berton, K; Picard, E; Zelsmann, M; Peyrade, D

    2016-03-01

    With the rise of microfluidics for the past decade, there has come an ever more pressing need for a low-cost and rapid prototyping technology, especially for research and education purposes. In this article, we report a rapid prototyping process of chromed masks for various microfluidic applications. The process takes place out of a clean room, uses a commercially available video-projector, and can be completed in less than half an hour. We quantify the ranges of fields of view and of resolutions accessible through this video-projection system and report the fabrication of critical microfluidic components (junctions, straight channels, and curved channels). To exemplify the process, three common devices are produced using this method: a droplet generation device, a gradient generation device, and a neuro-engineering oriented device. The neuro-engineering oriented device is a compartmentalized microfluidic chip, and therefore, required the production and the precise alignment of two different masks.

  11. A novel root-index based prioritized random access scheme for 5G cellular networks

    Directory of Open Access Journals (Sweden)

    Taehoon Kim

    2015-12-01

    Full Text Available Cellular networks will play an important role in realizing the newly emerging Internet-of-Everything (IoE. One of the challenging issues is to support the quality of service (QoS during the access phase, while accommodating a massive number of machine nodes. In this paper, we show a new paradigm of multiple access priorities in random access (RA procedure and propose a novel root-index based prioritized random access (RIPRA scheme that implicitly embeds the access priority in the root index of the RA preambles. The performance evaluation shows that the proposed RIPRA scheme can successfully support differentiated performance for different access priority levels, even though there exist a massive number of machine nodes.

  12. A Multiple-Reception Access Protocol with Interruptions with Mixed Priorities in CDMA Networks

    Institute of Scientific and Technical Information of China (English)

    Lu Xiaowen; Zhu Jinkang

    2003-01-01

    A novel access protocol called Multiple-Reception Access Protocol (MRAP) and its modification MRAP/WI are proposed. In this protocol, all colliding users with a common code can be identified by the base station due to the offset of arrival time Thus they can retransmit access requests under the base station's control. Furthermore new arrivals with higher priority level can interrupt the lower retransmission in order to reduce its access delay although it increases the lower priority's delay. Simulation results of MRAP and MRAP/WI are given in order to highlight the superior performance of the proposed approach.

  13. Rrsm: The European Rapid Raw Strong-Motion Database

    Science.gov (United States)

    Cauzzi, C.; Clinton, J. F.; Sleeman, R.; Domingo Ballesta, J.; Kaestli, P.; Galanis, O.

    2014-12-01

    We introduce the European Rapid Raw Strong-Motion database (RRSM), a Europe-wide system that provides parameterised strong motion information, as well as access to waveform data, within minutes of the occurrence of strong earthquakes. The RRSM significantly differs from traditional earthquake strong motion dissemination in Europe, which has focused on providing reviewed, processed strong motion parameters, typically with significant delays. As the RRSM provides rapid open access to raw waveform data and metadata and does not rely on external manual waveform processing, RRSM information is tailored to seismologists and strong-motion data analysts, earthquake and geotechnical engineers, international earthquake response agencies and the educated general public. Access to the RRSM database is via a portal at http://www.orfeus-eu.org/rrsm/ that allows users to query earthquake information, peak ground motion parameters and amplitudes of spectral response; and to select and download earthquake waveforms. All information is available within minutes of any earthquake with magnitude ≥ 3.5 occurring in the Euro-Mediterranean region. Waveform processing and database population are performed using the waveform processing module scwfparam, which is integrated in SeisComP3 (SC3; http://www.seiscomp3.org/). Earthquake information is provided by the EMSC (http://www.emsc-csem.org/) and all the seismic waveform data is accessed at the European Integrated waveform Data Archive (EIDA) at ORFEUS (http://www.orfeus-eu.org/index.html), where all on-scale data is used in the fully automated processing. As the EIDA community is continually growing, the already significant number of strong motion stations is also increasing and the importance of this product is expected to also increase. Real-time RRSM processing started in June 2014, while past events have been processed in order to provide a complete database back to 2005.

  14. Detecting Inappropriate Access to Electronic Health Records Using Collaborative Filtering.

    Science.gov (United States)

    Menon, Aditya Krishna; Jiang, Xiaoqian; Kim, Jihoon; Vaidya, Jaideep; Ohno-Machado, Lucila

    2014-04-01

    Many healthcare facilities enforce security on their electronic health records (EHRs) through a corrective mechanism: some staff nominally have almost unrestricted access to the records, but there is a strict ex post facto audit process for inappropriate accesses, i.e., accesses that violate the facility's security and privacy policies. This process is inefficient, as each suspicious access has to be reviewed by a security expert, and is purely retrospective, as it occurs after damage may have been incurred. This motivates automated approaches based on machine learning using historical data. Previous attempts at such a system have successfully applied supervised learning models to this end, such as SVMs and logistic regression. While providing benefits over manual auditing, these approaches ignore the identity of the users and patients involved in a record access. Therefore, they cannot exploit the fact that a patient whose record was previously involved in a violation has an increased risk of being involved in a future violation. Motivated by this, in this paper, we propose a collaborative filtering inspired approach to predicting inappropriate accesses. Our solution integrates both explicit and latent features for staff and patients, the latter acting as a personalized "finger-print" based on historical access patterns. The proposed method, when applied to real EHR access data from two tertiary hospitals and a file-access dataset from Amazon, shows not only significantly improved performance compared to existing methods, but also provides insights as to what indicates an inappropriate access.

  15. An Attribute Based Access Control Framework for Healthcare System

    Science.gov (United States)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  16. Multiple Access Techniques for Next Generation Wireless: Recent Advances and Future Perspectives

    Directory of Open Access Journals (Sweden)

    Shree Krishna Sharma

    2016-01-01

    Full Text Available The advances in multiple access techniques has been one of the key drivers in moving from one cellular generation to another. Starting from the first generation, several multiple access techniques have been explored in different generations and various emerging multiplexing/multiple access techniques are being investigated for the next generation of cellular networks. In this context, this paper first provides a detailed review on the existing Space Division Multiple Access (SDMA related works. Subsequently, it highlights the main features and the drawbacks of various existing and emerging multiplexing/multiple access techniques. Finally, we propose a novel concept of clustered orthogonal signature division multiple access for the next generation of cellular networks. The proposed concept envisions to employ joint antenna coding in order to enhance the orthogonality of SDMA beams with the objective of enhancing the spectral efficiency of future cellular networks.

  17. 76 FR 11433 - Notice of Proposed Information Collection Requests

    Science.gov (United States)

    2011-03-02

    ... information technology. Dated: February 24, 2011. Darrin A. King, Director, Information Collection Clearance... school libraries. Copies of the proposed information collection request may be accessed from http... DEPARTMENT OF EDUCATION Notice of Proposed Information Collection Requests AGENCY: Department of...

  18. Improving governance, voice and access to justice in Ghana's ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    In Ghana, many urban residents have yet to reap the benefit of the country's democratic stability and recent economic growth. About 40% of the urban population is trapped in poorly planned, overcrowded informal settlements with unsanitary conditions and low access to basic services. Rapid population growth and ...

  19. The rapid access palliative radiotherapy program: blueprint for initiation of a one-stop multidisciplinary bone metastases clinic.

    Science.gov (United States)

    Fairchild, A; Pituskin, E; Rose, B; Ghosh, S; Dutka, J; Driga, A; Tachynski, P; Borschneck, J; Gagnon, L; Macdonnell, S; Middleton, J; Thavone, K; Carstairs, S; Brent, D; Severin, D

    2009-02-01

    Radiotherapy (RT) for palliation of pain due to bone metastases (BM) is effective but underutilized likely due to the traditional practice of separate clinic visits for consultation, treatment planning, and RT delivery. However, recent evidence proves one RT treatment is as effective as multiple for analgesia, enabling investigation of an alternative model of RT delivery, the rapid access palliative radiotherapy program (RAPRP). Prior to the start of the program, needs assessment was performed to determine the composition of the optimal team. Screening tools were implemented to streamline holistic, multidisciplinary assessment. An advertising strategy, treatment and research protocols, and mechanisms for patient feedback were established. After RAPRP implementation, patient outcomes such as symptom relief were tracked. Eighty-six patients with painful BM were referred over the 25-week pilot. Median age was 69.9 years; 64% had prostate cancer, and median performance status was 70. Patient-rated pain was on average 6.1/10 at baseline, improving to 2.6/10 by week 4 post-RT. On average, 6.2 symptoms were reported (baseline) compared to 5.2 (week 4). Team members assessed 10-100% of patients and were successful in stabilizing or improving all symptoms in >75% contacted at week 4. One hundred percent of patients surveyed were satisfied with their experience. Early needs assessment was advantageous in determining the optimal team and methods of assessment for our 'one-stop' BM clinic. This approach was successful in improving pain and other symptoms, and the convenience of seeing multiple providers on 1 day was appreciated by the patients.

  20. SCOAP3 and Open Access

    CERN Document Server

    Mele, Salvatore; D'Agostino, Dan; Dyas-Correia, Sharon

    2009-01-01

    SCOAP3 is an innovative Open Access initiative for publishing in high-energy physics. The model is viewed by many as a potential solution to multiple issues related to the financial crisis, the peer review system, scholarly communication, and the need to support institutional repositories. This installment of “The Balance Point” presents articles written by three Open Access advocates, outlining the SCOAP3 proposal, benefits of participation, and some of the roles libraries, publishers and scientists can play in making important changes to scholarly communication. Contributors discuss scalability and transferability issues of SCOAP3, as well as other matters of concern.

  1. Ukraine’s Accession to the WTO: Strategy and Impediments

    Directory of Open Access Journals (Sweden)

    Serhiy Lakhno

    2005-03-01

    Full Text Available This paper focuses on issues surrounding Ukraine’s internal efforts for WTO accession given the importance of completing the negotiation process prior to the December 2005 Hong Kong Ministerial Conference. The paper is divided into two sets of issues: first, Ukraine’s prospects of acquiring WTO membership, including procedural questions, in the near future, and second, the substantive conditions for completing the accession process and the associated problems that require immediate attention. Among other matters, the paper describes the current procedure for WTO accession and proposes an optimum scenario for Ukraine’s membership, identifying the necessary measures, timeframes and risks that threaten the prescribed tasks. It also highlights major institutional problems that are hindering the harmonization of Ukrainian laws with GATT/WTO rules and offers a WTO-consistent legislative and regulatory action plan with specific proposals on amending relevant laws. The paper also illustrates the major problematic aspects of multilateralism that are impeding the completion of the negotiations. Furthermore, the author offers several proposals concerning approaches to and techniques for addressing these challenging issues.

  2. Efficient Unsteady Flow Visualization with High-Order Access Dependencies

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Jiang; Guo, Hanqi; Yuan, Xiaoru

    2016-04-19

    We present a novel high-order access dependencies based model for efficient pathline computation in unsteady flow visualization. By taking longer access sequences into account to model more sophisticated data access patterns in particle tracing, our method greatly improves the accuracy and reliability in data access prediction. In our work, high-order access dependencies are calculated by tracing uniformly-seeded pathlines in both forward and backward directions in a preprocessing stage. The effectiveness of our proposed approach is demonstrated through a parallel particle tracing framework with high-order data prefetching. Results show that our method achieves higher data locality and hence improves the efficiency of pathline computation.

  3. Proposal of a simple screening method for a rapid preliminary evaluation of ''heavy metals'' mobility in soils of contaminated sites

    Energy Technology Data Exchange (ETDEWEB)

    Pinto, Valentina; Chiusolo, Francesca; Cremisini, Carlo [ENEA - Italian Agency for New Technologies, Energy and Environment, Rome (Italy). Section PROTCHIM

    2010-09-15

    Risks associated to ''heavy metals'' (HM) soil contamination depend not only on their total content but, mostly, on their mobility. Many extraction procedures have been developed to evaluate HM mobility in contaminated soils, but they are generally time consuming (especially the sequential extraction procedures (SEPs)) and consequently applicable on a limited number of samples. For this reason, a simple screening method, applicable even ''in field'', has been proposed in order to obtain a rapid evaluation of HM mobility in polluted soils, mainly focused on the fraction associated to Fe and Mn oxide/hydroxides. A buffer solution of trisodium citrate and hydroxylamine hydrochloride was used as extractant for a single-step leaching test. The choice of this buffered solution was strictly related to the possibility of directly determining, via titration with dithizone (DZ), the content of Zn, Cu, Pb and Cd, which are among the most representative contaminants in highly mineralised soils. Moreover, the extraction solution is similar, aside from for the pH value, which is the one used in the BCR SEP second step. The analysis of bivalents ions through DZ titration was exploited in order to further simplify and quicken the whole procedure. The proposed method generically measures, in few minutes, the concentration of total extractable ''heavy metals'' expressed as molL{sup -1} without distinguishing between elements. The proposed screening method has been developed and applied on soil samples collected from rural, urban and mining areas, representing different situation of soil contamination. Results were compared with data obtained from the BCR procedure. The screening method demonstrated to be a reliable tool for a rapid evaluation of metals mobility. Therefore, it could be very useful, even ''in field'', both to guide the sampling activity on site and to monitor the efficacy of the subsequent

  4. Checklist of accessibility in Web informational environments

    Directory of Open Access Journals (Sweden)

    Christiane Gomes dos Santos

    2017-01-01

    Full Text Available This research deals with the process of search, navigation and retrieval of information by the person with blindness in web environment, focusing on knowledge of the areas of information recovery and architecture, to understanding the strategies used by these people to access the information on the web. It aims to propose the construction of an accessibility verification instrument, checklist, to be used to analyze the behavior of people with blindness in search actions, navigation and recovery sites and pages. It a research exploratory and descriptive of qualitative nature, with the research methodology, case study - the research to establish a specific study with the simulation of search, navigation and information retrieval using speech synthesis system, NonVisual Desktop Access, in assistive technologies laboratory, to substantiate the construction of the checklist for accessibility verification. It is considered the reliability of performed research and its importance for the evaluation of accessibility in web environment to improve the access of information for people with limited reading in order to be used on websites and pages accessibility check analysis.

  5. Properties of the particles emitted at mid-rapidity

    International Nuclear Information System (INIS)

    Lefort, T.; Cussol, D; Peter, J.; Bocage, F.; Bougault, R.; Brou, R.; Colin, J; Durand, D.; Genouin-Duhamel, E.; Gulminelli, F.; Lecolley, J.F.; Le Neindre, N.; Lopez, O.; Louvel, M.; Nguyen, A.D.; Steckmeyer, J. C.; Tamain, B.; Vient, E.

    1997-01-01

    Mid-rapidity emission studies allow the access at the very first instances of collision between two nuclei. Its study as a function of the energy of incident projectile permits to follow the evolution of the phenomena in the entrance channel from the lowest energies where these phenomena are essentially collective up to high energies where they are essentially governed by nucleon-nucleon collisions. The first method called the 'method E' consists in evaluating first the contribution of the quasi-projectile to the rapidity distribution and then to subtract it from the total spectrum to obtain the contribution from the mid-rapidity particles. For light particles the mid-rapidity emissions have a spectrum extended up to rapidities close to that of the quasi-projectile. This method under-estimates the contribution due to mid-rapidity. The second method called the 'method M' consists in determining directly the contribution from the mid-rapidity particles supposing that their rapidity spectrum is homothetic to the triton spectrum. This method over-estimates the contribution of mid-rapidity particles to the measure where the rapidity spectrum of the evaporated particles may extend up to Y nn , the rapidity of the nucleon-nucleon frame. The relative proportion of the particles coming from mid-rapidity emissions as a function of the experimental impact parameter and incident energy for the system Ar+Ni is shown. Also, results concerning the energy spectrum of light particles emitted at mid-rapidity as a function of the excitation energy of quasi-projectile are shown for the same system. Conclusions concerning the mid-rapidity emission are the following: the amount of particles depends essentially on the geometric overlap between the projectile and the target; these particles are issued out of a zone richer in neutrons than the total system; the energy per nucleon stored in this zone is independent of the violence of collision what indicates a production process essentially

  6. A Novel Medium Access Control for Ad hoc Networks Based on OFDM System

    Institute of Scientific and Technical Information of China (English)

    YU Yi-fan; YIN Chang-chuan; YUE Guang-xin

    2005-01-01

    Recently, hosts of Medium Access Control (MAC) protocols for Ad hoc radio networks have been proposed to solve the hidden terminal problem and exposed terminal problem. However most of them take into no account the interactions between physical (PHY) system and MAC protocol. Therefore, the current MAC protocols are either inefficient in the networks with mobile nodes and fading channel or difficult in hardware implementation. In this paper, we present a novel media access control for Ad hoc networks that integrates a media access control protocol termed as Dual Busy Tone Multiple Access (DBTMA) into Orthogonal Frequency Division Multiplexing (OFDM) system proposed in IEEE 802.11a standard. The analysis presented in the paper indicates that the proposed MAC scheme achieves performance improvement over IEEE 802.11 protocol about 25%~80% especially in the environment with high mobility and deep fading. The complexity of the proposed scheme is also lower than other implementation of similar busy tone solution. Furthermore, it is compatible with IEEE 802.11a networks.

  7. Promoting consumer empowerment through entrepreneurship: a proposal.

    Science.gov (United States)

    Prince, Jonathan D

    2007-01-01

    In order to promote life control, this proposal suggests strategies to help people who use community mental health services to access small loans or "microcredit" for entrepreneurship in self-help groups.

  8. Anti-disturbance rapid vibration suppression of the flexible aerial refueling hose

    Science.gov (United States)

    Su, Zikang; Wang, Honglun; Li, Na

    2018-05-01

    As an extremely dangerous phenomenon in autonomous aerial refueling (AAR), the flexible refueling hose vibration caused by the receiver aircraft's excessive closure speed should be suppressed once it appears. This paper proposed a permanent magnet synchronous motor (PMSM) based refueling hose servo take-up system for the vibration suppression of the flexible refueling hose. A rapid back-stepping based anti-disturbance nonsingular fast terminal sliding mode (NFTSM) control scheme with a specially established finite-time convergence NFTSM observer is proposed for the PMSM based hose servo take-up system under uncertainties and disturbances. The unmeasured load torque and other disturbances in the PMSM system are reconstituted by the NFTSM observer and to be compensated during the controller design. Then, with the back-stepping technique, a rapid anti-disturbance NFTSM controller is proposed for the PMSM angular tracking to improve the tracking error convergence speed and tracking precision. The proposed vibration suppression scheme is then applied to PMSM based hose servo take-up system for the refueling hose vibration suppression in AAR. Simulation results show the proposed scheme can suppress the hose vibration rapidly and accurately even the system is exposed to strong uncertainties and probe position disturbances, it is more competitive in tracking accuracy, tracking error convergence speed and robustness.

  9. 75 FR 20737 - Proposed Amendments to Rule 610 of Regulation NMS

    Science.gov (United States)

    2010-04-20

    ... surcharge or ``royalty'' fee for executions in certain index option classes.\\31\\ Many exchanges also charge...'') relating to access to quotations in listed options as well as fees for such access. The proposed rule would... quotations in a listed option on its exchange and establish a limit on access fees that an exchange would be...

  10. Access to Parks for Youth as an Environmental Justice Issue: Access Inequalities and Possible Solutions

    Directory of Open Access Journals (Sweden)

    Alessandro Rigolon

    2014-04-01

    Full Text Available Although repeated contact with nature helps foster mental and physical health among young people, their contact with nature has been diminishing over the last few decades. Also, low-income and ethnic minority children have even less contact with nature than white middle-income children. In this study, we compared accessibility to play in parks for young people from different income and racial backgrounds in Denver, Colorado. Park access for children and youth was measured using a geographic information system (GIS. Each neighborhood was classified according to income level, residential density, and distance from downtown; and then each park was classified based on formal and informal play, and level of intimacy. Comparisons between neighborhoods show that that low-income neighborhoods have the lowest access and high-income neighborhoods have the highest access to parks, and that differences are even higher for parks with play amenities and high levels of intimacy. To overcome this issue, the paper proposes a framework for action to improve access to parks for low-income children and youth and to help planners, decision makers and advocacy groups prioritize park investments.

  11. Rapidity dependence of strangeness enhancement factor at FAIR energies

    International Nuclear Information System (INIS)

    Dey, Kalyan; Bhattacharjee, B.

    2014-01-01

    Strange particles are produced only at the time of collisions and thus expected to carry important information of collision dynamics. Strangeness enhancement is considered to be one of the traditional signatures of formation of Quark Gluon Plasma (QGP). Due to the limitation of the detector acceptance, the past and ongoing heavy ion experiments could measure the strangeness enhancement at midrapidity only. But the future heavy ion experiment CBM at FAIR will have the access to the entire forward rapidity hemisphere and thus the experimental determination of rapidity dependent strangeness enhancement is a possibility. In this work, an attempt has therefore been made to study the rapidity dependent strangeness enhancement at FAIR energies with the help of a string based hadronic model (UrQMD). A sum of 93 million minimum biased UrQMD events have been used for the present analysis

  12. File access prediction using neural networks.

    Science.gov (United States)

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.

  13. Interactive Rapid Dose Assessment Model (IRDAM): user's guide

    International Nuclear Information System (INIS)

    Poeton, R.W.; Moeller, M.P.; Laughlin, G.J.; Desrosiers, A.E.

    1983-05-01

    As part of the continuing emphasis on emergency preparedness the US Nuclear Regulatory Commission (NRC) sponsored the development of a rapid dose assessment system by Pacific Northwest Laboratory (PNL). This system, the Interactive Rapid Dose Assessment Model (IRDAM) is a micro-computer based program for rapidly assessing the radiological impact of accidents at nuclear power plants. This User's Guide provides instruction in the setup and operation of the equipment necessary to run IRDAM. Instructions are also given on how to load the magnetic disks and access the interactive part of the program. Two other companion volumes to this one provide additional information on IRDAM. Reactor Accident Assessment Methods (NUREG/CR-3012, Volume 2) describes the technical bases for IRDAM including methods, models and assumptions used in calculations. Scenarios for Comparing Dose Assessment Models (NUREG/CR-3012, Volume 3) provides the results of calculations made by IRDAM and other models for specific accident scenarios

  14. Coalition works to secure open access to published research

    CERN Multimedia

    Brown, Susan

    2006-01-01

    "Paying upfront: a group of particle physicists has proposed a new way to pay for immediate free access to journal articles in their field. They want to raise five million to six million euros (about US $7-million) a year to buy open access to peer-reviewed papers in top physics journals. (2 pages)

  15. 49 CFR 37.79 - Purchase or lease of new rail vehicles by public entities operating rapid or light rail systems.

    Science.gov (United States)

    2010-10-01

    ... entities operating rapid or light rail systems. 37.79 Section 37.79 Transportation Office of the Secretary... operating rapid or light rail systems. Each public entity operating a rapid or light rail system making a... system shall ensure that the vehicle is readily accessible to and usable by individuals with disabilities...

  16. Pen-on-paper strategy for point-of-care testing: Rapid prototyping of fully written microfluidic biosensor.

    Science.gov (United States)

    Li, Zedong; Li, Fei; Xing, Yue; Liu, Zhi; You, Minli; Li, Yingchun; Wen, Ting; Qu, Zhiguo; Ling Li, Xiao; Xu, Feng

    2017-12-15

    Paper-based microfluidic biosensors have recently attracted increasing attentions in point-of-care testing (POCT) territories benefiting from their affordable, accessible and eco-friendly features, where technologies for fabricating such biosensors are preferred to be equipment free, easy-to-operate and capable of rapid prototyping. In this work, we developed a pen-on-paper (PoP) strategy based on two custom-made pens, i.e., a wax pen and a conductive-ink pen, to fully write paper-based microfluidic biosensors through directly writing both microfluidic channels and electrodes. Particularly, the proposed wax pen is competent to realize one-step fabrication of wax channels on paper, as the melted wax penetrates into paper during writing process without any post-treatments. The practical applications of the fabricated paper-based microfluidic biosensors are demonstrated by both colorimetric detection of Salmonella typhimurium DNA with detection limit of 1nM and electrochemical measurement of glucose with detection limit of 1mM. The developed PoP strategy for making microfluidic biosensors on paper characterized by true simplicity, prominent portability and excellent capability for rapid prototyping shows promising prospect in POCT applications. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Mobile authentication and access: any time, any place, any device?

    Directory of Open Access Journals (Sweden)

    Mark Williams

    2012-11-01

    Full Text Available The move from IP-based authentication to that of federated access has seen the sector support single sign-on to web-based resources, but the simplified user experience is at risk due to the rapid growth of mobile platforms and increasing variety of accompanying access methods for such devices. The user authentication experience on mobile devices is often further complicated by the poor discovery and delivery design of websites. While the introduction of tools such as Raptor permit accurate tracking of usage statistics via the UK Access Management Federation, the variety of mobile authentication methods such as native apps on devices and device paring pose additional challenges to librarians trying to gather a complete picture of resource use within their institution. In this article we examine the access challenges posed by the explosion of mobile device use.

  18. Cognitive Access to TVWS in India

    DEFF Research Database (Denmark)

    Patil, Kishor P.; Skouby, Knud Erik; Prasad, Ramjee

    2013-01-01

    The digital transition of TV transmission will make available some TV frequencies which are to be geographically unused called as TV White Spaces. The important regulatory trend in the context of Dynamic Spectrum Access (DSA) is the Cognitive access of TV white Spaces. In this context, we have pe...... of India, we have proposed wireless broadband access to rural areas using TV White Spaces (TVWSs). This will help in bridging the digital divide by offering governance, banking, and health services online in the rural areas.......The digital transition of TV transmission will make available some TV frequencies which are to be geographically unused called as TV White Spaces. The important regulatory trend in the context of Dynamic Spectrum Access (DSA) is the Cognitive access of TV white Spaces. In this context, we have...... performed spectrum measurements of TV band in Pune, India. Our result shows poor spectrum utilization in TV band, and good potential for Cognitive radio operation. Digital switchover in India will generate golden opportunity for empowering rural India. As majority of India’s population lives in rural part...

  19. Multiple-Access Quantum-Classical Networks

    Science.gov (United States)

    Razavi, Mohsen

    2011-10-01

    A multi-user network that supports both classical and quantum communication is proposed. By relying on optical code-division multiple access techniques, this system offers simultaneous key exchange between multiple pairs of network users. A lower bound on the secure key generation rate will be derived for decoy-state quantum key distribution protocols.

  20. Sign Compute Resolve for Random Access

    DEFF Research Database (Denmark)

    Goseling, Jasper; Stefanovic, Cedomir; Popovski, Petar

    2014-01-01

    users collide. We measure the performance of the proposed method in terms of user resolution rate as well as overall throughput of the system. The results show that our approach significantly increases the performance of the system even compared to coded random access, where collisions are not wasted......We present an approach to random access that is based on three elements: physical-layer network coding, signature codes and tree splitting. Upon occurrence of a collision, physical-layer network coding enables the receiver to decode the sum of the information that was transmitted by the individual...

  1. Channel Access Algorithm Design for Automatic Identification System

    Institute of Scientific and Technical Information of China (English)

    Oh Sang-heon; Kim Seung-pum; Hwang Dong-hwan; Park Chan-sik; Lee Sang-jeong

    2003-01-01

    The Automatic Identification System (AIS) is a maritime equipment to allow an efficient exchange of the navigational data between ships and between ships and shore stations. It utilizes a channel access algorithm which can quickly resolve conflicts without any intervention from control stations. In this paper, a design of channel access algorithm for the AIS is presented. The input/output relationship of each access algorithm module is defined by drawing the state transition diagram, dataflow diagram and flowchart based on the technical standard, ITU-R M.1371. In order to verify the designed channel access algorithm, the simulator was developed using the C/C++ programming language. The results show that the proposed channel access algorithm can properly allocate transmission slots and meet the operational performance requirements specified by the technical standard.

  2. Access and quality in South African higher education: the twin ...

    African Journals Online (AJOL)

    with the transformation agenda in South Africa. It is proposed that a comprehensive quality assurance framework with embedded commitment to access is likely to respond appropriately to national development prerogatives of higher education access. South African Journal of Higher Education Vol. 21 (3) 2007: pp. 385-399.

  3. Low-cost access to development and manufacturing of photonic integrated circuits

    NARCIS (Netherlands)

    Smit, M.K.

    2014-01-01

    Generic photonic integration technology is rapidly gaining popularity. It applies the methodology that is so successful in microelectronics (CMOS technology) to the domain of photonics: providing lowcost access to highly standardized high-performance processes that support integration in a single

  4. Code-expanded radio access protocol for machine-to-machine communications

    DEFF Research Database (Denmark)

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2013-01-01

    The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated b...... subframes and orthogonal preambles, the amount of available contention resources is drastically increased, enabling the massive support of Machine-Type Communication users that is beyond the reach of current systems.......The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated...... by the random access method employed in LTE, which significantly increases the amount of contention resources without increasing the system resources, such as contention subframes and preambles. This is accomplished by a logical, rather than physical, extension of the access method in which the available system...

  5. An Intelligent System Proposal for Improving the Safety and Accessibility of Public Transit by Highway

    Directory of Open Access Journals (Sweden)

    Carmelo R. García

    2015-08-01

    Full Text Available The development of public transit systems that are accessible and safe for everyone, including people with special needs, is an objective that is justified from the civic and economic points of view. Unfortunately, public transit services are conceived for people who do not have reduced physical or cognitive abilities. In this paper, we present an intelligent public transit system by highway with the goal of facilitating access and improving the safety of public transit for persons with special needs. The system is deployed using components that are commonly available in transport infrastructure, e.g., sensors, mobile communications systems, and positioning systems. In addition, the system can operate in non-urban transport contexts, e.g., isolated rural areas, where the availability of basic infrastructure, such as electricity and communications infrastructures, is not always guaranteed. To construct the system, the principles and techniques of Ubiquitous Computing and Ambient Intelligence have been employed. To illustrate the utility of the system, two cases of services rendered by the system are described: the first case involves a surveillance system to guarantee accessibility at bus stops; the second case involves a route assistant for blind people.

  6. Rapid synthesis of polyprenylated acylphloroglucinol analogs via dearomative conjunctive allylic annulation.

    Science.gov (United States)

    Grenning, Alexander J; Boyce, Jonathan H; Porco, John A

    2014-08-20

    Polyprenylated acylphloroglucinols (PPAPs) are structurally complex natural products with promising biological activities. Herein, we present a biosynthesis-inspired, diversity-oriented synthesis approach for rapid construction of PPAP analogs via double decarboxylative allylation (DcA) of acylphloroglucinol scaffolds to access allyl-desoxyhumulones followed by dearomative conjunctive allylic alkylation (DCAA).

  7. Using Motion Planning to Determine the Existence of an Accessible Route in a CAD Environment

    Science.gov (United States)

    Pan, Xiaoshan; Han, Charles S.; Law, Kincho H.

    2010-01-01

    We describe an algorithm based on motion-planning techniques to determine the existence of an accessible route through a facility for a wheeled mobility device. The algorithm is based on LaValle's work on rapidly exploring random trees and is enhanced to take into consideration the particularities of the accessible route domain. Specifically, the…

  8. Transmission access issues: Present and future

    International Nuclear Information System (INIS)

    Bahl, P.K.; Gray, R.G.

    1992-01-01

    In recent years, the electric industry has undergone dramatic changes as the federal and state governments have encouraged bulk power production by Independent Power Producers (IPPS) and Qualified Facilities (QFs). With decentralization and the consequent competition in the field of bulk power production, there has emerged the problem of non-utility generators (NUGS) and of transmission dependent utilities accessing the existing transmission systems owned by electric utilities. This paper presents current and future issues related to transmission access by IPPS, QFs and transmission dependent utilities. These issues include: (a) impact on system reliability, (b) impact of pricing strategies, (c) changes in state and federal regulations, (d) transmission proposals by various entities, (e) present access arrangements, (f) formation of the Western Systems Power Pool (WSPP), and (g) siting difficulties. The transmission access problem warrants consideration of transmission services, coordination among electric utilities, joint planning on a regional basis, and accommodation of IPPs and NUGs

  9. Beyond access: a case study on the intersection between accessibility, sustainability, and universal design.

    Science.gov (United States)

    Gossett, Andrea; Mirza, Mansha; Barnds, Ann Kathleen; Feidt, Daisy

    2009-11-01

    A growing emphasis has been placed on providing equal opportunities for all people, particularly people with disabilities, to support participation. Barriers to participation are represented in part by physical space restrictions. This article explores the decision-making process during the construction of a new office building housing a disability-rights organization. The building project featured in this study was developed on the principles of universal design, maximal accessibility, and sustainability to support access and participation. A qualitative case study approach was used involving collection of data through in-depth interviews with key decision-makers; non-participant observations at design meetings; and on-site tours. Qualitative thematic analysis along with the development of a classification system was used to understand specific building elements and the relevant decision processes from which they resulted. Recording and analyzing the design process revealed several key issues including grassroots involvement of stakeholders; interaction between universal design and sustainable design; addressing diversity through flexibility and universality; and segregationist accessibility versus universal design. This case study revealed complex interactions between accessibility, universal design, and sustainability. Two visual models were proposed to understand and analyze these complexities.

  10. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  11. Benthic data from rapid assessment transects, 2001-2004, in the Hawaiian Islands (NODC Accession 0002464)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This dataset consists of CRAMP Rapid Assessment Transect surveys taken in 2001-2004 and includes quantitative estimates of substrate type and species. The types and...

  12. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed.......We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  13. Power Allocation and Outage Probability Analysis for SDN-based Radio Access Networks

    Science.gov (United States)

    Zhao, Yongxu; Chen, Yueyun; Mai, Zhiyuan

    2018-01-01

    In this paper, performance of Access network Architecture based SDN (Software Defined Network) is analyzed with respect to the power allocation issue. A power allocation scheme PSO-PA (Particle Swarm Optimization-power allocation) algorithm is proposed, the proposed scheme is subjected to constant total power with the objective of minimizing system outage probability. The entire access network resource configuration is controlled by the SDN controller, then it sends the optimized power distribution factor to the base station source node (SN) and the relay node (RN). Simulation results show that the proposed scheme reduces the system outage probability at a low complexity.

  14. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  15. Access to Investigational Drugs: FDA Expanded Access Programs or "Right-to-Try" Legislation?

    Science.gov (United States)

    Holbein, M E Blair; Berglund, Jelena P; Weatherwax, Kevin; Gerber, David E; Adamo, Joan E

    2015-10-01

    The Food and Drug Administration Expanded Access (EA) program and "Right-to-Try" legislation aim to provide seriously ill patients who have no other comparable treatment options to gain access to investigational drugs and biological agents. Physicians and institutions need to understand these programs to respond to questions and requests for access. FDA EA programs and state and federal legislative efforts to provide investigational products to patients by circumventing FDA regulations were summarized and compared. The FDA EA program includes Single Patient-Investigational New Drug (SP-IND), Emergency SP-IND, Intermediate Sized Population IND, and Treatment IND. Approval rates for all categories exceed 99%. Approval requires FDA and Institutional Review Board (IRB) approval, and cooperation of the pharmaceutical partner is essential. "Right-to-Try" legislation bypasses some of these steps, but provides no regulatory or safety oversight. The FDA EA program is a reasonable option for patients for whom all other therapeutic interventions have failed. The SP-IND not only provides patient access to new drugs, but also maintains a balance between immediacy and necessary patient protection. Rather than circumventing existing FDA regulations through proposed legislation, it seems more judicious to provide the knowledge and means to meet the EA requirements. © 2015 Wiley Periodicals, Inc.

  16. Database design for Physical Access Control System for nuclear facilities

    Energy Technology Data Exchange (ETDEWEB)

    Sathishkumar, T., E-mail: satishkumart@igcar.gov.in; Rao, G. Prabhakara, E-mail: prg@igcar.gov.in; Arumugam, P., E-mail: aarmu@igcar.gov.in

    2016-08-15

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  17. Database design for Physical Access Control System for nuclear facilities

    International Nuclear Information System (INIS)

    Sathishkumar, T.; Rao, G. Prabhakara; Arumugam, P.

    2016-01-01

    Highlights: • Database design needs to be optimized and highly efficient for real time operation. • It requires a many-to-many mapping between Employee table and Doors table. • This mapping typically contain thousands of records and redundant data. • Proposed novel database design reduces the redundancy and provides abstraction. • This design is incorporated with the access control system developed in-house. - Abstract: A (Radio Frequency IDentification) RFID cum Biometric based two level Access Control System (ACS) was designed and developed for providing access to vital areas of nuclear facilities. The system has got both hardware [Access controller] and software components [server application, the database and the web client software]. The database design proposed, enables grouping of the employees based on the hierarchy of the organization and the grouping of the doors based on Access Zones (AZ). This design also illustrates the mapping between the Employee Groups (EG) and AZ. By following this approach in database design, a higher level view can be presented to the system administrator abstracting the inner details of the individual entities and doors. This paper describes the novel approach carried out in designing the database of the ACS.

  18. Future Trends in Vascular Access Creation.

    Science.gov (United States)

    Shenoy, Surendra

    2017-01-01

    Delivery of a prescribed dialysis dose, which is critical for longevity on hemodialysis, is directly dependent on vascular access (VA). However, VA is fraught with high failure rates and has room for innovation. Arteriovenous fistula (AVF), considered the 'best choice', has a high 'failure to mature' rate. Arteriovenous grafts (AVGs) are considered when patients are poor candidates for or have failed AVF, but have a high incidence of infections and thrombosis. Due to associated morbidity and mortality from complications, central venous catheters are considered only as 'bridging short-term access' when there is an urgent need for dialysis. The observation from current data that there is a significant center effect in the rate of AVF maturation supports investigation to identify factors that contribute to success in high-performing centers that create AVF and establish 'best practice' approaches to improve outcomes. Biocompatible AVG constructs that promote rapid tissue incorporation withstand needle punctures due to better integrity and can improve current AVG outcomes. Stenosis in the 'access circuit' is a major cause for short- and long-term permanent access failure. While the pathology of stenosis development is well understood, factors responsible for this problem are poorly studied. Increased flow in the access circuit likely plays a major role in the development of such stenosis. Investigation into understanding the hemodynamics of this flow may help identify etiology and stenosis sites perhaps even prior to the event, thus providing potential targets to mitigate the stenotic response. In summary, this chapter reflects on the shortcomings of current access modalities and discusses potential avenues to improve VA outcomes in the future. © 2017 S. Karger AG, Basel.

  19. 76 FR 15028 - Airport Improvement Program (AIP): Interim Policy Regarding Access to Airports From Residential...

    Science.gov (United States)

    2011-03-18

    ... transparent. As a result of these efforts, the agency expects to have reliable information on the utilization... issued, most commenters supported FAA's proposal to allow existing residential through-the-fence access... commenters supported the FAA's proposal to allow through-the-fence access where it exists, if the airport can...

  20. Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

    Directory of Open Access Journals (Sweden)

    Yunchuan Guo

    2014-01-01

    Full Text Available Access control is a key technology in providing security in the Internet of Things (IoT. The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC. STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM and the election-based update mechanism (EUM. We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  1. Spatiotemporal access model based on reputation for the sensing layer of the IoT.

    Science.gov (United States)

    Guo, Yunchuan; Yin, Lihua; Li, Chao; Qian, Junyan

    2014-01-01

    Access control is a key technology in providing security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet the requirements of the sensing layer of the IoT. In this paper, we propose a model that combines space and time with reputation to control access to the information within the sensing layer of the IoT. This model is called spatiotemporal access control based on reputation (STRAC). STRAC uses a lattice-based approach to decrease the size of policy bases. To solve the problem caused by unreliable communications, we propose both nondeterministic authorizations and stochastic authorizations. To more precisely manage the reputation of nodes, we propose two new mechanisms to update the reputation of nodes. These new approaches are the authority-based update mechanism (AUM) and the election-based update mechanism (EUM). We show how the model checker UPPAAL can be used to analyze the spatiotemporal access control model of an application. Finally, we also implement a prototype system to demonstrate the efficiency of our model.

  2. The Motivation-Facilitation Theory of Prenatal Care Access.

    Science.gov (United States)

    Phillippi, Julia C; Roman, Marian W

    2013-01-01

    Despite the availability of services, accessing health care remains a problem in the United States and other developed countries. Prenatal care has the potential to improve perinatal outcomes and decrease health disparities, yet many women struggle with access to care. Current theories addressing access to prenatal care focus on barriers, although such knowledge is minimally useful for clinicians. We propose a middle-range theory, the motivation-facilitation theory of prenatal care access, which condenses the prenatal care access process into 2 interacting components: motivation and facilitation. Maternal motivation is the mother's desire to begin and maintain care. Facilitation represents the goal of the clinic to create easy, open access to person-centered beneficial care. This simple model directs the focus of research and change to the interface of the woman and the clinic and encourages practice-level interventions that facilitate women entering and maintaining prenatal care. © 2013 by the American College of Nurse‐Midwives.

  3. Multiagent Reinforcement Learning Dynamic Spectrum Access in Cognitive Radios

    Directory of Open Access Journals (Sweden)

    Wu Chun

    2014-02-01

    Full Text Available A multiuser independent Q-learning method which does not need information interaction is proposed for multiuser dynamic spectrum accessing in cognitive radios. The method adopts self-learning paradigm, in which each CR user performs reinforcement learning only through observing individual performance reward without spending communication resource on information interaction with others. The reward is defined suitably to present channel quality and channel conflict status. The learning strategy of sufficient exploration, preference for good channel, and punishment for channel conflict is designed to implement multiuser dynamic spectrum accessing. In two users two channels scenario, a fast learning algorithm is proposed and the convergence to maximal whole reward is proved. The simulation results show that, with the proposed method, the CR system can obtain convergence of Nash equilibrium with large probability and achieve great performance of whole reward.

  4. An investigation of an open-access model for scaling up methadone maintenance treatment.

    Science.gov (United States)

    Madden, Lynn M; Farnum, Scott O; Eggert, Kathryn F; Quanbeck, Andrew R; Freeman, Robert M; Ball, Samuel A; Schottenfeld, Richard S; Shi, Julia M; Savage, Mary Ellen; Barry, Declan T

    2018-02-17

    To examine retrospectively patient and programmatic outcomes following the development and implementation of an 'open-access' model in which prospective patients were enrolled rapidly in methadone maintenance treatment, irrespective of ability to pay, and provided real-time access to multiple voluntary treatment options. Medical and administrative records were abstracted to compare data for 1 year before and 9 years after initiating the implementation of an open-access treatment model in May 2007. Methadone maintenance treatment center in Connecticut, USA. Individuals with opioid use disorder entering treatment between July 2006 and June 2015. In June 2015, 64% (n = 2594) of the sample were men and 80% (n = 3133) reported that they were white. The Network for the Improvement of Addiction Treatment-informed open-access treatment model uses process improvement strategies to improve treatment access and capacity. Census, waiting time, retention, non-medical opioid use, patient mortality and financial sustainability (net income and state-block grants as proportions of revenue). In the 9 years following the initial implementation of the open-access model, patient census increased by 183% from 1431 to 4051, and average waiting-time days decreased from 21 to 0.3 (same day) without apparent deleterious effects on rates of retention, non-medical opioid use or mortality. Between fiscal years (FY) 06 and FY 15, net operating margin rose from 2 to 10%, while state-block grant revenues declined 14% and the proportion of total revenue from state-block grant revenue decreased from 49 to 24%. An open-access model for rapid enrolment of people with opioid use disorder in methadone treatment appears to improve treatment access, capacity, and financial sustainability without evidence of deleterious effects on treatment outcomes. © 2018 Society for the Study of Addiction.

  5. C-DAM: CONTENTION BASED DISTRIBUTED RESERVATION PROTOCOL ALLOCATION ALGORITHM FOR WIMEDIA MEDIUM ACCESS CONTROL

    Directory of Open Access Journals (Sweden)

    UMADEVI K. S.

    2017-07-01

    Full Text Available WiMedia Medium Access Control (MAC provides high rate data transfer for wireless networking thereby enables construction of high speed home networks. It facilitates data communication between the nodes through two modes namely: i Distributed Reservation Protocol (DRP for isochronous traffic and ii Prioritized Contention Access (PCA for asynchronous traffic. PCA mode enables medium access using CSMA/CA similar to IEEE 802.11e. In the presence of DRP, the throughput of PCA saturates when there is an increase in the number of devices accessing PCA channel. Researchers suggest that the better utilization of medium resolves many issues in an effective way. To demonstrate the effective utilization of the medium, Contention Based Distributed Reservation Protocol Allocation Algorithm for WiMedia Medium Access Control is proposed for reserving Medium Access Slots under DRP in the presence of PCA. The proposed algorithm provides a better medium access, reduces energy consumption and enhances the throughput when compared to the existing methodologies.

  6. Feasibility of Smartphone Based Photogrammetric Point Clouds for the Generation of Accessibility Maps

    Science.gov (United States)

    Angelats, E.; Parés, M. E.; Kumar, P.

    2018-05-01

    Accessible cities with accessible services are an old claim of people with reduced mobility. But this demand is still far away of becoming a reality as lot of work is required to be done yet. First step towards accessible cities is to know about real situation of the cities and its pavement infrastructure. Detailed maps or databases on street slopes, access to sidewalks, mobility in public parks and gardens, etc. are required. In this paper, we propose to use smartphone based photogrammetric point clouds, as a starting point to create accessible maps or databases. This paper analyses the performance of these point clouds and the complexity of the image acquisition procedure required to obtain them. The paper proves, through two test cases, that smartphone technology is an economical and feasible solution to get the required information, which is quite often seek by city planners to generate accessible maps. The proposed approach paves the way to generate, in a near term, accessibility maps through the use of point clouds derived from crowdsourced smartphone imagery.

  7. A Global Comparative Evaluation of Commercial Immunochromatographic Rapid Diagnostic Tests for Visceral Leishmaniasis

    NARCIS (Netherlands)

    Cunningham, Jane; Hasker, Epco; Das, Pradeep; El Safi, Sayda; Goto, Hiro; Mondal, Dinesh; Mbuchi, Margaret; Mukhtar, Maowia; Rabello, Ana; Rijal, Suman; Sundar, Shyam; Wasunna, Monique; Adams, Emily; Menten, Joris; Peeling, Rosanna; Boelaert, Marleen; Khanal, Basudha; Das, Murari; Oliveira, Edward; de Assis, Tália Machado; Costa, Dorcas Lamounier; Bhaskar, Khondaker Rifathassan; Huda, M. Mamun; Hassan, Mukidul; Abdoun, Asim Osman; Awad, Aymen; Osman, Mohamed; Prajapati, Dinesh Kumar; Gidwani, Kamlesh; Tiwary, Puja; Paniago, Anamaria Mello Miranda; Sanchez, Maria Carmen Arroyo; Celeste, Beatriz Julieta; Jacquet, Diane; Magiri, Charles; Muia, A.; Kesusu, J.; Ageed, Al Farazdag; Galal, Nuha; Osman, Osman Salih; Gupta, A. K.; Bimal, Afrad S.; Das, V. N. R.

    2012-01-01

    Background. Poor access to diagnosis stymies control of visceral leishmaniasis (VL). Antibody-detecting rapid diagnostic tests (RDTs) can be performed in peripheral health settings. However, there are many brands available and published reports of variable accuracy. Methods. Commercial VL RDTs

  8. AN AUTOMATIC AND METHODOLOGICAL APPROACH FOR ACCESSIBLE WEB APPLICATIONS

    Directory of Open Access Journals (Sweden)

    Lourdes Moreno

    2007-06-01

    Full Text Available Semantic Web approaches try to get the interoperability and communication among technologies and organizations. Nevertheless, sometimes it is forgotten that the Web must be useful for every user, consequently it is necessary to include tools and techniques doing Semantic Web be accessible. Accessibility and usability are two usually joined concepts widely used in web application development, however their meaning are different. Usability means the way to make easy the use but accessibility is referred to the access possibility. For the first one, there are many well proved approaches in real cases. However, accessibility field requires a deeper research that will make feasible the access to disable people and also the access to novel non-disable people due to the cost to automate and maintain accessible applications. In this paper, we propose one architecture to achieve the accessibility in web-environments dealing with the WAI accessibility standard and the Universal Design paradigm. This architecture tries to control the accessibility in web applications development life-cycle following a methodology starting from a semantic conceptual model and leans on description languages and controlled vocabularies.

  9. Channel access delay and buffer distribution of two-user opportunistic scheduling schemes in wireless networks

    KAUST Repository

    Hossain, Md Jahangir

    2010-07-01

    In our earlier works, we proposed rate adaptive hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) and hybrid two-user scheduling (HTS) schemes. The proposed schemes are innovative in the sense that they include a second user in the transmission opportunistically using hierarchical modulations. As such the frequency of information access of the users increases without any degradation of the system spectral efficiency (SSE) compared to the classical opportunistic scheduling scheme. In this paper, we analyze channel access delay of an incoming packet at the base station (BS) buffer when our proposed TBS and HTS schemes are employed at the BS. Specifically, using a queuing analytic model we derive channel access delay as well as buffer distribution of the packets that wait at BS buffer for down-link (DL) transmission. We compare performance of the TBS and HTS schemes with that of the classical single user opportunistic schemes namely, absolute carrier-to-noise ratio (CNR)-based single user scheduling (ASS) and normalized CNR-based single user scheduling (NSS). For an independent and identically distributed (i.i.d.) fading environment, our proposed scheme can improve packet\\'s access delay performance compared to the ASS. Selected numerical results in an independent but non-identically distributed (i.n.d.) fading environment show that our proposed HTS achieves overall good channel access delay performance. © 2010 IEEE.

  10. Rapid In-Place Composite Rotor Damage Detection, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Luna Innovations is proposing to further develop the Rapid In-Place Composite Rotor Damage Detection (RIPCoRDD) System for determining and tracking the structural...

  11. Rapid In-Place Composite Rotor Damage Detection, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Luna Innovations is proposing to develop the Rapid In-Place Composite Rotor Damage Detection (RIPCoRDD) for determining and tracking the structural health of...

  12. Open access for REF2020

    Directory of Open Access Journals (Sweden)

    Simon Kerridge

    2014-03-01

    Full Text Available Open access (OA may have been the ‘big thing’ in 2013 but the OA juggernaut is still rolling and plans are now afoot for the requirements for the ‘next REF’ (which from now on we will refer to as REF2020. In 2013, on behalf of the four UK Funding Councils, the Higher Education Funding Council for England (HEFCE undertook a two-stage consultation exercise on open access requirements for articles submitted to REF2020. There are a number of nuances and caveats to the current proposals. This article will reflect on what the probable rules might be, and their implications for research managers, administrators and institutional repository managers alike.

  13. Time division multiple access for vehicular communications

    CERN Document Server

    Omar, Hassan Aboubakr

    2014-01-01

    This brief focuses on medium access control (MAC) in vehicular ad hoc networks (VANETs), and presents VeMAC, a novel MAC scheme based on distributed time division multiple access (TDMA) for VANETs. The performance of VeMAC is evaluated via mathematical analysis and computer simulations in comparison with other existing MAC protocols, including the IEEE 802.11p standard. This brief aims at proposing TDMA as a suitable MAC scheme for VANETs, which can support the quality-of-service requirements of high priority VANET applications.

  14. Fine-Grained Access Control for Electronic Health Record Systems

    Science.gov (United States)

    Hue, Pham Thi Bach; Wohlgemuth, Sven; Echizen, Isao; Thuy, Dong Thi Bich; Thuc, Nguyen Dinh

    There needs to be a strategy for securing the privacy of patients when exchanging health records between various entities over the Internet. Despite the fact that health care providers such as Google Health and Microsoft Corp.'s Health Vault comply with the U.S Health Insurance Portability and Accountability Act (HIPAA), the privacy of patients is still at risk. Several encryption schemes and access control mechanisms have been suggested to protect the disclosure of a patient's health record especially from unauthorized entities. However, by implementing these approaches, data owners are not capable of controlling and protecting the disclosure of the individual sensitive attributes of their health records. This raises the need to adopt a secure mechanism to protect personal information against unauthorized disclosure. Therefore, we propose a new Fine-grained Access Control (FGAC) mechanism that is based on subkeys, which would allow a data owner to further control the access to his data at the column-level. We also propose a new mechanism to efficiently reduce the number of keys maintained by a data owner in cases when the users have different access privileges to different columns of the data being shared.

  15. Assessment of Farmers (Women)' Access to Agricultural Extension ...

    African Journals Online (AJOL)

    Available online at http://www.ajol.info/index.php/njbas/index. Nigerian Journal of ... Key words: Assessment, Farmers, Access, Agricultural Extension, Credit Facility. INTRODUCTION ..... Unpublished Project Proposal, The. Department of Agric ...

  16. Open Access Publishing with Drupal

    Directory of Open Access Journals (Sweden)

    Nina McHale

    2011-10-01

    Full Text Available In January 2009, the Colorado Association of Libraries (CAL suspended publication of its print quarterly journal, Colorado Libraries, as a cost-saving measure in a time of fiscal uncertainty. Printing and mailing the journal to its 1300 members cost CAL more than $26,000 per year. Publication of the journal was placed on an indefinite hiatus until the editorial staff proposed an online, open access format a year later. The benefits to migrating to open access included: significantly lower costs; a green platform; instant availability of content; a greater level of access to users with disabilities; and a higher level of visibility of the journal and the association. The editorial staff chose Drupal, including the E-journal module, and while Drupal is notorious for its steep learning curve—which exacerbated delays to content that had been created before the publishing hiatus—the fourth electronic issue was published recently at coloradolibrariesjournal.org. This article will discuss both the benefits and challenges of transitioning to an open access model and the choice Drupal as a platform over other more established journal software options.

  17. Sci-Hub provides access to nearly all scholarly literature.

    Science.gov (United States)

    Himmelstein, Daniel S; Romero, Ariel Rodriguez; Levernier, Jacob G; Munro, Thomas Anthony; McLaughlin, Stephen Reid; Greshake Tzovaras, Bastian; Greene, Casey S

    2018-03-01

    The website Sci-Hub enables users to download PDF versions of scholarly articles, including many articles that are paywalled at their journal's site. Sci-Hub has grown rapidly since its creation in 2011, but the extent of its coverage has been unclear. Here we report that, as of March 2017, Sci-Hub's database contains 68.9% of the 81.6 million scholarly articles registered with Crossref and 85.1% of articles published in toll access journals. We find that coverage varies by discipline and publisher, and that Sci-Hub preferentially covers popular, paywalled content. For toll access articles, we find that Sci-Hub provides greater coverage than the University of Pennsylvania, a major research university in the United States. Green open access to toll access articles via licit services, on the other hand, remains quite limited. Our interactive browser at https://greenelab.github.io/scihub allows users to explore these findings in more detail. For the first time, nearly all scholarly literature is available gratis to anyone with an Internet connection, suggesting the toll access business model may become unsustainable. © 2018, Himmelstein et al.

  18. Area-Based Partnerships in Rural Poland: The Post-Accession Experience

    Science.gov (United States)

    Furmankiewicz, Marek; Thompson, Nicola; Zielinska, Marta

    2010-01-01

    The paper examines the characteristics of area-based partnerships in rural Poland. It is based on the study of partnerships created after the accession to the European Union in 2004. Partnership structures have been rapidly adopted in rural Poland due to opportunities provided by the LEADER+ Pilot Programme. However, the research showed that…

  19. Rapid prototyping model for percutaneous nephrolithotomy training.

    Science.gov (United States)

    Bruyère, Franck; Leroux, Cecile; Brunereau, Laurent; Lermusiaux, Patrick

    2008-01-01

    Rapid prototyping is a technique used for creating computer images in three dimensions more efficiently than classic techniques. Percutaneous nephrolithotomy (PCNL) is a popular method to remove kidney stones; however, broader use by the urologic community has been hampered by the morbidity associated with needle puncture to gain access to the renal calix (bleeding, pneumothorax, hydrothorax, inadvertent colon injury). A training model to improve technique and understanding of renal anatomy could improve complications related to renal puncture; however, no model currently exists for resident training. We created a training model using the rapid prototyping technique based on abdominal CT images of a patient scheduled to undergo PCNL. This allowed our staff and residents to train on the model before performing the operation. This model allowed anticipation of particular difficulties inherent to the patient's anatomy. After training, the procedure proceeded without complication, and the patient was discharged at postoperative day 1 without problems. We hypothesize that rapid prototyping could be useful for resident education, allowing the creation of numerous models for research and surgical training. In addition, we anticipate that experienced urologists could find this technique helpful in preparation for difficult PCNL operations.

  20. Observing proposals on the Web at the National Optical Astronomy Observatories

    Science.gov (United States)

    Pilachowski, Catherine A.; Barnes, Jeannette; Bell, David J.

    1998-07-01

    Proposals for telescope time at facilities available through the National Optical Astronomy Observatories can now be prepared and submitted via the WWW. Investigators submit proposal information through a series of HTML forms to the NOAO server, where the information is processed by Perl CGI scripts. PostScript figures and ASCII files may be attached by investigators for inclusion in their proposals using their browser's upload feature. Proposal information is saved on the server so that investigators can return in later sessions to continue work on a proposal and so that collaborators can participate in writing the proposal if they have access to the proposal account name and password. The system provides on-line verification of LATEX syntax and a spellchecker, and confirms that all sections of the proposal are filled out. Users can request a LATEX or PostScript copy of their proposal by e-mail, or view the proposal on line. The advantages of the Web-based process for our users are convenience, access to on-line documentation, and the simple interface which avoids direct confrontation with LATEX. From the NOAO point of view, the advantage is the use of standardized formats and syntax, particularly as we begin to receive proposals for the Gemini telescopes and some independent observatories.

  1. A proposal for the inclusion of accessibility criteria in the authoring workflow of images for scientific articles

    OpenAIRE

    Splendiani, Bruno

    2015-01-01

    This thesis investigates the problem of how to provide accessible images in academic articles in the research fields of Science, Technology, Engineering and Mathematics (STEM) and in particular in biomedicine. Currently, graphics in scientific articles are a critical information source and often provide essential information for a thorough understanding of scientific articles. People with visual and other impairments experience specific barriers that prevent them from accessing the informatio...

  2. A global workspace model for phenomenal and access consciousness.

    Science.gov (United States)

    Raffone, Antonino; Pantani, Martina

    2010-06-01

    Both the global workspace theory and Block's distinction between phenomenal and access consciousness, are central in the current debates about consciousness and the neural correlates of consciousness. In this article, a unifying global workspace model for phenomenal and access consciousness is proposed. In the model, recurrent neural interactions take place in distinct yet interacting access and phenomenal brain loops. The effectiveness of feedback signaling onto sensory cortical maps is emphasized for the neural correlates of phenomenal consciousness. Two forms of top-down attention, attention for perception and attention for access, play differential roles for phenomenal and access consciousness. The model is implemented in a neural network form, with the simulation of single and multiple visual object processing, and of the attentional blink. 2010 Elsevier Inc. All rights reserved.

  3. Redefining nondiscriminatory access to remote sensing imagery and its impact on global transparency

    Science.gov (United States)

    Aten, Michelle L.

    2003-04-01

    Global transparency is founded on the Open Skies philosophy and its precept of non-discriminatory access. Global transparency implies that anyone can have anytime, anyplace access to a wide-array of remotely sensed imagery. The custom of non-discriminatory access requires that datasets of interest must be affordable, usable, and obtainable in a timely fashion devoid of political, economic or technical obstacles. Thus, an assessment of the correlation between the availability of satellite imagery and changes in governmental policies, pricing fluctuations of data, and advances in technology is critical to assessing the viability of global transparency. The Open Skies philosophy was originally proposed at the 1955 Geneva Summit to advocate mutually beneficial aerial reconnaissance missions over the USSR and the US as a verification tool for arms control and non-proliferation agreements. However, due to Cold War tensions, this philosophy and the custom of non-discriminatory were not widely adopted in the civilian remote sensing community until the commissioning of the Landsat Program in 1972. Since this time, commercial high-resolution satellites have drastically changed the circumstances on which the fundamental tenets of this philosophy are based. Since the successful launch of the first of this satellite class, the IKONOS satellite, high-resolution imagery is now available to non-US governments and an unlimited set of non-state actors. As more advanced capabilities are added to the growing assortment of remote sensing satellites, the reality of global transparency will rapidly evolve. This assessment includes an overview of historical precedents and a brief explanation of relevant US policy decisions that define non-discriminatory access with respect to US government and US based corporate assets. It also presents the dynamics of the political, economic, and technical barriers that may dictate or influence the remote sensing community's access to satellite data. In

  4. Achieving Access to the General Curriculum for Students with Mental Retardation.

    Science.gov (United States)

    Wehmeyer, Michael L.; Lattin, Dana; Agran, Martin

    2001-01-01

    This article reviews requirements in the Individuals with Disabilities Education Act for providing access to the general education curriculum, examines the intent of the language, and proposes a decision-making model to enable Individualized Education Program teams to reach curriculum decisions that provide such access for students with mental…

  5. An application-layer based centralized information access control for VPN

    Institute of Scientific and Technical Information of China (English)

    OUYANG Kai; ZHOU Jing-li; XIA Tao; YU Sheng-sheng

    2006-01-01

    With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the internal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that ifone vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem.To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC-the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC's constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.

  6. To Internationalize Rapidly from Inception: Crowdsource

    Directory of Open Access Journals (Sweden)

    Nirosh Kannangara

    2012-10-01

    Full Text Available Technology entrepreneurs continuously search for tools to accelerate the internationalization of their startups. For the purpose of internationalizing rapidly from inception, we propose that technology startups use crowdsourcing to internalize the tacit knowledge embodied in members of a crowd distributed across various geographies. For example, a technology startup can outsource to a large crowd the definition of a customer problem that occurs across various geographies, the development of the best solution to the problem, and the identification of attractive business expansion opportunities. In this article, we analyze how three small firms use crowdsourcing, discuss the benefits of crowdsourcing, and offer six recommendations to technology entrepreneurs interested in using crowdsourcing to rapidly internationalize their startups from inception.

  7. Access to Investigational Drugs: FDA Expanded Access Programs or “Right‐to‐Try” Legislation?

    Science.gov (United States)

    Berglund, Jelena P.; Weatherwax, Kevin; Gerber, David E.; Adamo, Joan E.

    2015-01-01

    Abstract Purpose The Food and Drug Administration Expanded Access (EA) program and “Right‐to‐Try” legislation aim to provide seriously ill patients who have no other comparable treatment options to gain access to investigational drugs and biological agents. Physicians and institutions need to understand these programs to respond to questions and requests for access. Methods FDA EA programs and state and federal legislative efforts to provide investigational products to patients by circumventing FDA regulations were summarized and compared. Results The FDA EA program includes Single Patient‐Investigational New Drug (SP‐IND), Emergency SP‐IND, Intermediate Sized Population IND, and Treatment IND. Approval rates for all categories exceed 99%. Approval requires FDA and Institutional Review Board (IRB) approval, and cooperation of the pharmaceutical partner is essential. “Right‐to‐Try” legislation bypasses some of these steps, but provides no regulatory or safety oversight. Conclusion The FDA EA program is a reasonable option for patients for whom all other therapeutic interventions have failed. The SP‐IND not only provides patient access to new drugs, but also maintains a balance between immediacy and necessary patient protection. Rather than circumventing existing FDA regulations through proposed legislation, it seems more judicious to provide the knowledge and means to meet the EA requirements. PMID:25588691

  8. Memory accessibility shapes explanation: Testing key claims of the inherence heuristic account.

    Science.gov (United States)

    Hussak, Larisa J; Cimpian, Andrei

    2018-01-01

    People understand the world by constructing explanations for what they observe. It is thus important to identify the cognitive processes underlying these judgments. According to a recent proposal, everyday explanations are often constructed heuristically: Because people need to generate explanations on a moment-by-moment basis, they cannot perform an exhaustive search through the space of possible reasons, but may instead use the information that is most easily accessible in memory (Cimpian & Salomon 2014a, b). In the present research, we tested two key claims of this proposal that have so far not been investigated. First, we tested whether-as previously hypothesized-the information about an entity that is most accessible in memory tends to consist of inherent or intrinsic facts about that entity, rather than extrinsic (contextual, historical, etc.) facts about it (Studies 1 and 2). Second, we tested the implications of this difference in the memory accessibility of inherent versus extrinsic facts for the process of generating explanations: Does the fact that inherent facts are more accessible than relevant extrinsic facts give rise to an inherence bias in the content of the explanations generated (Studies 3 and 4)? The findings supported the proposal that everyday explanations are generated in part via a heuristic process that relies on easily accessible-and often inherent-information from memory.

  9. Rapid assessment of disability in the Philippines: understanding prevalence, well-being, and access to the community for people with disabilities to inform the W-DARE project.

    Science.gov (United States)

    Marella, Manjula; Devine, Alexandra; Armecin, Graeme Ferdinand; Zayas, Jerome; Marco, Ma Jesusa; Vaughan, Cathy

    2016-01-01

    International recognition that people with disabilities were excluded from the Millennium Development Goals has led to better inclusion of people with disabilities in the recently agreed Global Goals for Sustainable Development (SDGs) 2015-2030. Given the current global agenda for disability inclusion, it is crucial to increase the understanding of the situation of people with disabilities in the Philippines. The aim of this study was to estimate the prevalence of disability and compare the well-being and access to the community between people with and without disabilities. A population-based survey was undertaken in District 2 of Quezon City and in Ligao City. 60 clusters of 50 people aged 18 years and older were selected with probability proportion to size sampling from both locations. The Rapid Assessment of Disability (RAD) survey was used to identify people with disabilities based on their responses to activity limitations. The levels of well-being and access to the community for people with disabilities were compared with controls matched by age, gender, and cluster. Information on barriers to accessing the community was also collected. The prevalence of disability was 6.8 (95 % CI: 5.9, 7.9) and 13.6 % (95 % CI: 11.4, 16.2) in Quezon City and Ligao City respectively. Psychological distress was the most commonly reported condition in both locations, although it was often reported with a co-morbid condition related to sensory, physical, cognitive, and communication difficulties. The prevalence of disability was associated with age and no schooling, but not associated with poverty. People with disabilities had significantly lower well-being scores and reduced access to health services, work, rehabilitation, education, government social welfare, and disaster management than people without disability. Having a disability and negative family attitudes were reported as barriers for people with disabilities participating in work, community meetings, religious

  10. Proposed regulations could limit access to affordable health coverage for workers' children and family members.

    Science.gov (United States)

    Jacobs, Ken; Graham-Squire, Dave; Roby, Dylan H; Kominski, Gerald F; Kinane, Christina M; Needleman, Jack; Watson, Greg; Gans, Daphna

    2011-12-01

    Key Findings. The Patient Protection and Affordable Care Act (ACA) is designed to offer premium subsidies to help eligible individuals and their families purchase insurance coverage when affordable job-based coverage is not available. However, the law is unclear on how this affordability protection is applied in those instances where self-only coverage offered by an employer is affordable but family coverage is not. Regulations recently proposed by the Department of the Treasury would make family members ineligible for subsidized coverage in the exchange if an employee is offered affordable self-only coverage by an employer, even if family coverage is unaffordable. This could have significant financial consequences for low- and moderate-income families that fall in this gap. Using an alternative interpretation of the law could allow the entire family to enter the exchange when family coverage is unaffordable, which would broaden access to coverage. However, this option has been cited as cost prohibitive. In this brief we consider a middle ground alternative that would base eligibility for the individual worker on the cost of self-only coverage, but would use the additional cost to the employee for family coverage as the basis for determining affordability and eligibility for subsidies for the remaining family members. We find that: Under the middle ground alternative scenario an additional 144,000 Californians would qualify for and use premium subsidies in the California Health Benefit Exchange, half of whom are children. Less than 1 percent of those with employer-based coverage would move to subsidized coverage in the California Health Benefit Exchange as a result of having unaffordable coverage on the job.

  11. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  12. Open access to scientific articles: a review of benefits and challenges.

    Science.gov (United States)

    Björk, Bo-Christer

    2017-03-01

    The Internet has fundamentally changed the publishing of scholarly peer reviewed journals, and the way readers find and access articles. Digital access is nowadays the norm, in particular for researchers. The Internet has enabled a totally new business model, Open Access (OA), in which an article is openly available in full text for anyone with Internet access. This article reviews the different options to achieve this, whether by journals changing their revenue structures from subscription to publishing charges, or authors utilizing a number of options for posting OA versions of article manuscripts in repositories. It also discusses the regrettable emergence of "predatory" publishers, who spam academics, and make money by promising them rapid publication with only the semblance of peer review. The situation is further discussed from the viewpoints of different stakeholders, including academics as authors and readers, practicing physicians and the general public.

  13. Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things

    Directory of Open Access Journals (Sweden)

    Zhen Qin

    2017-01-01

    Full Text Available Online healthcare social networks (OHSNs play an essential role in sharing information among medical experts and patients who are equipped with similar experiences. To access other patients’ data or experts’ diagnosis anywhere and anytime, it is necessary to integrate the OHSN into the Internet as part of the Internet of Things (IoT. Therefore, it is crucial to design an efficient and versatile access control scheme that can grant and revoke a user to access the OHSN. In this paper, we propose novel attribute-based encryption (ABE features with user revocation and verifiable decryption outsourcing to control the access privilege of the users. The security of the proposed ABE scheme is given in the well-studied random oracle model. With the proposed ABE scheme, the malicious users can be excluded from the system and the user can offload most of the overhead in the decryption to an untrusted cloud server in a verifiable manner. An access control scheme for the OHSN has been given in the context of the IoT based on the proposed ABE scheme. The simulation demonstrates that our access control mechanism is practical.

  14. Asymptotic performance modelling of DCF protocol with prioritized channel access

    Science.gov (United States)

    Choi, Woo-Yong

    2017-11-01

    Recently, the modification of the DCF (Distributed Coordination Function) protocol by the prioritized channel access was proposed to resolve the problem that the DCF performance worsens exponentially as more nodes exist in IEEE 802.11 wireless LANs. In this paper, an asymptotic analytical performance model is presented to analyze the MAC performance of the DCF protocol with the prioritized channel access.

  15. Bus Access Optimisation for FlexRay-based Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Pop, Traian; Pop, Paul; Eles, Petru

    2007-01-01

    -real time communication in a deterministic manner. In this paper, we propose techniques for optimising the FlexRay bus access mechanism of a distributed system, so that the hard real-time deadlines are met for all the tasks and messages in the system. We have evaluated the proposed techniques using...

  16. Barriers and facilitators to intraosseous access in adult resuscitations when peripheral intravenous access is not achievable.

    Science.gov (United States)

    James Cheung, Warren; Rosenberg, Hans; Vaillancourt, Christian

    2014-03-01

    Studies suggest that intraosseous (IO) access is underutilized in adult resuscitations, despite recommendations from advanced trauma and cardiac life support guidelines. The objective was to determine factors associated with IO access use by physicians during adult resuscitations when intravenous (IV) access is not immediately achievable. This study was an online survey among physicians purposefully recruited from various clinical care areas at three teaching hospitals. Questions were generated from the qualitative results of 20 iterative interviews, verified for internal validity, and piloted. The interview guide was based on the constructs of the Theory of Planned Behavior (TPB), which elicits salient attitudes, social influences, and control beliefs that potentially influence intention to use IO access. Recruitment took place in September 2012 until reaching more than 100% of the required sample size (n = 200). Internal consistency was measured using Cronbach's alpha, and the effect of TPB constructs and specific beliefs were assessed with regression analyses. For the 205 respondents, the mean age was 35 years (range = 20 to 66 years), and 53.3% were male. Participants' departmental affiliations were 50.3% emergency medicine (EM), 16.9% internal medicine, 14.9% anesthesia, 10.8% general surgery, and 7.2% critical care. Residents comprised 60.7% of the sample, and 39.3% were attending physicians. Median intention to use IO access when IV is not immediately achievable was 4.67 (interquartile range [IQR] = 4 to 5) out of 5 (5 highest) and predicted by the following TPB constructs: attitudes (AdjCoefficients = 0.504; 95% confidence interval [CI] = 0.334 to 0.673), social influences (AdjCoefficients = 0.285; 95% CI = 0.172 to 0.398), and control beliefs (AdjCoefficients 0.217; 95% CI = 0.113 to 0.320). Physicians were more likely to use IO access if they believed that it provided rapid vascular access for delivering large volumes of fluids, could prevent delays in

  17. Dynamically Authorized Role-Based Access Control for Grid Applications

    Institute of Scientific and Technical Information of China (English)

    YAO Hanbing; HU Heping; LU Zhengding; LI Ruixuan

    2006-01-01

    Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations". The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user's environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.

  18. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  19. Statement of Basis/Proposed Plan for the Gunsite 113 Access Road Unit (631-24G)

    International Nuclear Information System (INIS)

    Palmer, E.

    1997-01-01

    The purpose of this plan is to describe the preferred remedial alternative for addressing the Gunsite 113 Access Road Unit located at SRS in Aiken, SC, and to provide an opportunity for public input into the remedial action selection process

  20. An overview of the access issue

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Transmission access if a term used to describe the concept of making a utility's transmission lines available to other utilities and non-utilities for buying and selling electricity. Interest in the issue has increased recently because of current industry conditions. Marketing excess capacity, exploiting cost differences between utilities, and the growth of non-utility capacity have made transmission important to many of the traditional and non-traditional industry participants. Although, transmission service has increased substantially faster than retail sales, there is some concern the present supply and access conditions are inadequate. Moreover, many believe there remains significant potential for broad economic benefits from power transfers which are precluded by current institutional constraints. Proposals for greater access are usually justified on the basis of competition. A main benefit of wheeling is that customers are no longer limited to a single supplier for their electric needs

  1. Controlling Access to Input/Output Peripheral Devices

    Directory of Open Access Journals (Sweden)

    E. Y. Rodionov

    2010-03-01

    Full Text Available In this paper the author proposes a system that manages information security policy on enterprise. Problems related to managing information security policy on enterprise and access to peripheral devices in computer systems functioning under control of Microsoft Windows NT operating systems are considered.

  2. An end-to-end secure patient information access card system.

    Science.gov (United States)

    Alkhateeb, A; Singer, H; Yakami, M; Takahashi, T

    2000-03-01

    The rapid development of the Internet and the increasing interest in Internet-based solutions has promoted the idea of creating Internet-based health information applications. This will force a change in the role of IC cards in healthcare card systems from a data carrier to an access key medium. At the Medical Informatics Department of Kyoto University Hospital we are developing a smart card patient information project where patient databases are accessed via the Internet. Strong end-to-end data encryption is performed via Secure Socket Layers, transparent to transmit patient information. The smart card is playing the crucial role of access key to the database: user authentication is performed internally without ever revealing the actual key. For easy acceptance by healthcare professionals, the user interface is integrated as a plug-in for two familiar Web browsers, Netscape Navigator and MS Internet Explorer.

  3. 75 FR 11634 - Proposed Collection; Comment Request

    Science.gov (United States)

    2010-03-11

    ... financial services to the applicant's Target Markets or an expansion into new Investment Areas, Low-Income... development and capital access needs of their existing or proposed Target Markets and/or to become certified... TA funds, namely Statements of Work for professional services, and resumes and/or position...

  4. An Extended Role Based Access Control Method for XML Documents

    Institute of Scientific and Technical Information of China (English)

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  5. Marginalized Student Access to Technology Education

    Science.gov (United States)

    Kurtcu, Wanda M.

    The purpose of this paper is to investigate how a teacher can disrupt an established curriculum that continues the cycle of inequity of access to science, technology, engineering, and math (STEM) curriculum by students in alternative education. For this paper, I will focus on the technology components of the STEM curriculum. Technology in the United States, if not the world economy, is developing at a rapid pace. Many areas of day to day living, from applying for a job to checking one's bank account online, involve a component of science and technology. The 'gap' in technology education is emphasized between the 'haves and have-nots', which is delineated along socio-economic lines. Marginalized students in alternative education programs use this equipment for little else than remedial programs and credit recovery. This level of inequity further widens in alternative education programs and affects the achievement of marginalized students in credit recovery or alternative education classes instead of participation technology classes. For the purposes of this paper I focus on how can I decrease the inequity of student access to 21st century technology education in an alternative education program by addressing the established curriculum of the program and modifying structural barriers of marginalized student access to a technology focused curriculum.

  6. Single wafer rapid thermal multiprocessing

    International Nuclear Information System (INIS)

    Saraswat, K.C.; Moslehi, M.M.; Grossman, D.D.; Wood, S.; Wright, P.; Booth, L.

    1989-01-01

    Future success in microelectronics will demand rapid innovation, rapid product introduction and ability to react to a change in technological and business climate quickly. These technological advances in integrated electronics will require development of flexible manufacturing technology for VLSI systems. However, the current approach of establishing factories for mass manufacturing of chips at a cost of more than 200 million dollars is detrimental to flexible manufacturing. The authors propose concepts of a micro factory which may be characterized by more economical small scale production, higher flexibility to accommodate many products on several processes, and faster turnaround and learning. In-situ multiprocessing equipment where several process steps can be done in sequence may be a key ingredient in this approach. For this environment to be flexible, the equipment must have ability to change processing environment, requiring extensive in-situ measurements and real time control. This paper describes the development of a novel single wafer rapid thermal multiprocessing (RTM) reactor for next generation flexible VLSI manufacturing. This reactor will combine lamp heating, remote microwave plasma and photo processing in a single cold-wall chamber, with applications for multilayer in-situ growth and deposition of dielectrics, semiconductors and metals

  7. [Vascular access guidelines for hemodialysis].

    Science.gov (United States)

    Rodríguez Hernández, J A; González Parra, E; Julián Gutiérrez, J M; Segarra Medrano, A; Almirante, B; Martínez, M T; Arrieta, J; Fernández Rivera, C; Galera, A; Gallego Beuter, J; Górriz, J L; Herrero, J A; López Menchero, R; Ochando, A; Pérez Bañasco, V; Polo, J R; Pueyo, J; Ruiz, Camps I; Segura Iglesias, R

    2005-01-01

    Quality of vascular access (VA) has a remarkable influence in hemodialysis patients outcomes. Dysfunction of VA represents a capital cause of morbi-mortality of these patients as well an increase in economical. Spanish Society of Neprhology, aware of the problem, has decided to carry out a revision of the issue with the aim of providing help in comprehensión and treatment related with VA problems, and achieving an homogenization of practices in three mayor aspects: to increase arteriovenous fistula utilization as first vascular access, to increment vascular access monitoring practice and rationalise central catheters use. We present a consensus document elaborated by a multidisciplinar group composed by nephrologists, vascular surgeons, interventional radiologysts, infectious diseases specialists and nephrological nurses. Along six chapters that cover patient education, creation of VA, care, monitoring, complications and central catheters, we present the state of the art and propose guidelines for the best practice, according different evidence based degrees, with the intention to provide help at the professionals in order to make aproppiate decissions. Several quality standars are also included.

  8. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    Science.gov (United States)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  9. Common data model access; a unified layer to access data from data analysis point of view

    International Nuclear Information System (INIS)

    Poirier, S.; Buteau, A.; Ounsy, M.; Rodriguez, C.; Hauser, N.; Lam, T.; Xiong, N.

    2012-01-01

    For almost 20 years, the scientific community of neutron and synchrotron institutes have been dreaming of a common data format for exchanging experimental results and applications for reducing and analyzing the data. Using HDF5 as a data container has become the standard in many facilities. The big issue is the standardization of the data organization (schema) within the HDF5 container. By introducing a new level of indirection for data access, the Common-Data-Model-Access (CDMA) framework proposes a solution and allows separation of responsibilities between data reduction developers and the institute. Data reduction developers are responsible for data reduction code; the institute provides a plug-in to access the data. The CDMA is a core API that accesses data through a data format plug-in mechanism and scientific application definitions (sets of keywords) coming from a consensus between scientists and institutes. Using a innovative 'mapping' system between application definitions and physical data organizations, the CDMA allows data reduction application development independent of the data file container AND schema. Each institute develops a data access plug-in for its own data file formats along with the mapping between application definitions and its data files. Thus data reduction applications can be developed from a strictly scientific point of view and are immediately able to process data acquired from several institutes. (authors)

  10. Rapidity distributions of hadrons in the HydHSD hybrid model

    Energy Technology Data Exchange (ETDEWEB)

    Khvorostukhin, A. S., E-mail: hvorost@theor.jinr.ru; Toneev, V. D. [Joint Institute for Nuclear Research (Russian Federation)

    2017-03-15

    A multistage hybrid model intended for describing heavy-ion interactions in the energy region of the NICA collider under construction in Dubna is proposed. The model combines the initial, fast, interaction stage described by the model of hadron string dynamics (HSD) and the subsequent evolution that the expanding system formed at the first stage experiences at the second stage and which one treats on the basis of ideal hydrodynamics; after the completion of the second stage, the particles involved may still undergo rescattering (third interaction stage). The model admits three freeze-out scenarios: isochronous, isothermal, and isoenergetic. Generally, the HydHSD hybrid model developed in the present study provides fairly good agreement with available experimental data on proton rapidity spectra. It is shown that, within this hybrid model, the two-humped structure of proton rapidity distributions can be obtained either by increasing the freeze-out temperature and energy density or by more lately going over to the hydrodynamic stage. Although the proposed hybrid model reproduces rapidity spectra of protons, it is unable to describe rapidity distributions of pions, systematically underestimating their yield. It is necessary to refine the model by including viscosity effects at the hydrodynamic stage of evolution of the system and by considering in more detail the third interaction stage.

  11. TCP Performance Enhancement for UMTS Access Network

    DEFF Research Database (Denmark)

    Hu, Liang

    2008-01-01

    is between UMTS access network and Internet. The split proxy divides the bandwidth delay product into two parts, resulting in two TCP connections with smaller bandwidth delay products. Simulation results show, the split TCP proxy can significantly improve the TCP performance under high bit rate DCH channel......We aim at optimize the TCP performance over UMTS access network challenged by the large delay bandwidth product that is mainly caused by the latency from the link layer ARQ retransmissions and diversity technique at physical layer. We propose to place a split TCP proxy at GGSN nodes which...

  12. Scalable Lunar Surface Networks and Adaptive Orbit Access, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Innovative network architecture, protocols, and algorithms are proposed for both lunar surface networks and orbit access networks. Firstly, an overlaying...

  13. Access control and confidentiality in radiology

    Science.gov (United States)

    Noumeir, Rita; Chafik, Adil

    2005-04-01

    A medical record contains a large amount of data about the patient such as height, weight and blood pressure. It also contains sensitive information such as fertility, abortion, psychiatric data, sexually transmitted diseases and diagnostic results. Access to this information must be carefully controlled. Information technology has greatly improved patient care. The recent extensive deployment of digital medical images made diagnostic images promptly available to healthcare decision makers, regardless of their geographic location. Medical images are digitally archived, transferred on telecommunication networks, and visualized on computer screens. However, with the widespread use of computing and communication technologies in healthcare, the issue of data security has become increasingly important. Most of the work until now has focused on the security of data communication to ensure its integrity, authentication, confidentiality and user accountability. The mechanisms that have been proposed to achieve the security of data communication are not specific to healthcare. Data integrity can be achieved with data signature. Data authentication can be achieved with certificate exchange. Data confidentiality can be achieved with encryption. User accountability can be achieved with audits. Although these mechanisms are essential to ensure data security during its transfer on the network, access control is needed in order to ensure data confidentiality and privacy within the information system application. In this paper, we present and discuss an access control mechanism that takes into account the notion of a care process. Radiology information is categorized and a model to enforce data privacy is proposed.

  14. Fast Magnetoresistive Random-Access Memory

    Science.gov (United States)

    Wu, Jiin-Chuan; Stadler, Henry L.; Katti, Romney R.

    1991-01-01

    Magnetoresistive binary digital memories of proposed new type expected to feature high speed, nonvolatility, ability to withstand ionizing radiation, high density, and low power. In memory cell, magnetoresistive effect exploited more efficiently by use of ferromagnetic material to store datum and adjacent magnetoresistive material to sense datum for readout. Because relative change in sensed resistance between "zero" and "one" states greater, shorter sampling and readout access times achievable.

  15. An API-based search system for one click access to information

    NARCIS (Netherlands)

    Ionita, Dan; Tax, Niek; Hiemstra, Djoerd

    This paper proposes a prototype One Click access system, based on previous work in the field and the related 1CLICK-2@NTCIR10 task. The proposed solution integrates methods from into a three tier algorithm: query categorization, information extraction and output generation and offers suggestions on

  16. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... and indigenous knowledge using information and communication technologies (ICTs) ... for research proposals on the aforementioned topics, action-research projects, ... Evaluating knowledge-sharing methods to improve land utilization and ...

  17. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  18. An examination of within-session responding following access to reinforcing stimuli.

    Science.gov (United States)

    Rispoli, Mandy; O'Reilly, Mark; Lang, Russell; Machalicek, Wendy; Kang, Soyeon; Davis, Tonya; Neely, Leslie

    2016-01-01

    Previous research has shown tangibly maintained challenging behavior can be temporarily decreased by providing presession access to the relevant tangible. However, the duration of this beneficial effect is unknown. We measured the subsequent duration of behavior reduction effects following presession access during extended classroom observation sessions by analyzing within-session patterns of responding in three children with autism. An alternating treatments design was used to analyze within- and across-session responding following presession access and presession restriction conditions. The cumulative frequency of challenging behavior was higher following the presession restriction condition for all participants and lower following presession access. Within-session analysis revealed the same basic pattern of responding across participants. Specifically, the first half of the sessions contained very little, if any, challenging behavior; however, after 60 min, the rate of challenging behavior began to increase rapidly for two of the three participants. Results are discussed in terms of implications for practitioners, satiation, habituation, and behavioral contrast. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Control protocol: the proposed new CERN standard access procedure to accelerator equipment

    International Nuclear Information System (INIS)

    Baribaud, G.; Barnett, I.; Benincasa, G.

    1992-01-01

    Control protocol provides a normalized access procedure for equipment of the same kind from a control system. Modelisation and the subsequent identification of functionalities with their parameters, variables and attributes have now been carried out at CERN for representative families of devices. ISO specifications, such as the ASN.1 metalanguage for data structure representation and MMS definitions and services have, to some extent, been introduced in the design for generality and compatibility with external world. The final product of this design is totally independent of the control systems and permits object oriented implementations in any controls frame. The present paper describes the different phases of the project with a short overview of the various implementations under development at CERN. (author)

  20. Moving towards tangible decision-making tools for policy makers: Measuring and monitoring energy access provision

    International Nuclear Information System (INIS)

    Bhanot, Jaya; Jha, Vivek

    2012-01-01

    Access to energy services has been recognised as central to achieving economic growth and sustainable development. However, almost 1.3 billion people in the world still lack access to electricity and 2.7 billion lack access to clean cooking facilities. In this backdrop, the issue of energy access is receiving more interest than ever before and this has brought to the fore, the need for a robust decision support tool for policy makers to measure the progress of energy access provision and also to provide direction for future policy making. The paper studies existing definitions of energy access and identifies the key requirements for an appropriate decision-making tool to measure and monitor energy access provision. In this context the paper assesses the strengths and weaknesses of the metrics currently being used to measure energy access in policy, as well as of contemporary monitoring and evaluation frameworks being used in other sectors. Based on these insights, a dashboard of indicators is proposed as an alternate decision support tool for policy makers to measure energy access. The paper concludes with a discussion on what is needed to operationalise this proposed framework. - Highlights: ► No one indicator or metric can successfully capture progress on energy access. ► A service oriented approach is necessary to measure energy access. ► Socio-economic and political contexts influence success of energy access policies.

  1. Food (In)Security in Rapidly Urbanising, Low-Income Contexts

    OpenAIRE

    Cecilia Tacoli

    2017-01-01

    Urbanisation in low and middle-income nations presents both opportunities and immense challenges. As urban centres grow rapidly, inadequate housing and the lack of basic infrastructure and services affect a large and growing proportion of their population. There is also a growing body of evidence on urban poverty and its links with environmental hazards. There is, however, limited knowledge of how these challenges affect the ways in which poor urban residents gain access to food and secure he...

  2. Photolithography-free laser-patterned HF acid-resistant chromium-polyimide mask for rapid fabrication of microfluidic systems in glass

    International Nuclear Information System (INIS)

    Zamuruyev, Konstantin O; Zrodnikov, Yuriy; Davis, Cristina E

    2017-01-01

    Excellent chemical and physical properties of glass, over a range of operating conditions, make it a preferred material for chemical detection systems in analytical chemistry, biology, and the environmental sciences. However, it is often compromised with SU8, PDMS, or Parylene materials due to the sophisticated mask preparation requirements for wet etching of glass. Here, we report our efforts toward developing a photolithography-free laser-patterned hydrofluoric acid-resistant chromium-polyimide tape mask for rapid prototyping of microfluidic systems in glass. The patterns are defined in masking layer with a diode-pumped solid-state laser. Minimum feature size is limited to the diameter of the laser beam, 30 µ m; minimum spacing between features is limited by the thermal shrinkage and adhesive contact of the polyimide tape to 40 µ m. The patterned glass substrates are etched in 49% hydrofluoric acid at ambient temperature with soft agitation (in time increments, up to 60 min duration). In spite of the simplicity, our method demonstrates comparable results to the other current more sophisticated masking methods in terms of the etched depth (up to 300 µ m in borosilicate glass), feature under etch ratio in isotropic etch (∼1.36), and low mask hole density. The method demonstrates high yield and reliability. To our knowledge, this method is the first proposed technique for rapid prototyping of microfluidic systems in glass with such high performance parameters. The proposed method of fabrication can potentially be implemented in research institutions without access to a standard clean-room facility. (paper)

  3. LINQ The Future of Data Access in C# 30

    CERN Document Server

    Hummel, Joe

    2006-01-01

    Language Integrated Query (LINQ) is Microsoft's new technology for powerful, general purpose data access. This technology provides a fully-integrated query language, available in both C# 3.0 and VB 9.0, for high-level data access against objects, relational databases, and XML documents. In this Short Cut you'll learn about LINQ and the proposed C# 3.0 extensions that support it. You'll also see how you can use LINQ and C# to accomplish a variety of tasks, from querying objects to accessing relational data and XML. Best of all, you'll be able to test the examples and run your own code using t

  4. Modern energy access to all in rural India: An integrated implementation strategy

    International Nuclear Information System (INIS)

    Balachandra, P.

    2011-01-01

    Expanding energy access to the rural population of India presents a critical challenge for its government. The presence of 364 million people without access to electricity and 726 million who rely on biomass for cooking indicate both the failure of past policies and programs, and the need for a radical redesign of the current system. We propose an integrated implementation framework with recommendations for adopting business principles with innovative institutional, regulatory, financing and delivery mechanisms. The framework entails establishment of rural energy access authorities and energy access funds, both at the national and regional levels, to be empowered with enabling regulatory policies, capital resources and the support of multi-stakeholder partnership. These institutions are expected to design, lead, manage and monitor the rural energy interventions. At the other end, trained entrepreneurs would be expected to establish bioenergy-based micro-enterprises that will produce and distribute energy carriers to rural households at an affordable cost. The ESCOs will function as intermediaries between these enterprises and the international carbon market both in aggregating carbon credits and in trading them under CDM. If implemented, such a program could address the challenges of rural energy empowerment by creating access to modern energy carriers and climate change mitigation. - Highlights: ► Expanding rural energy access in India is critical with majority lacking access to modern energy. ► Innovative and integrated implementation strategy for achieving universal rural energy access. ► Design of an integrated rural energy policy and proposal for new institutional mechanism. ► Establishing rural energy access authorities and energy access funds as supporting mechanisms. ► Bioenergy-based micro-enterprises for delivering energy services at an affordable cost.

  5. Admission Control and Interference Management in Dynamic Spectrum Access Networks

    Directory of Open Access Journals (Sweden)

    Jorge Martinez-Bauset

    2010-01-01

    Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

  6. Multiple access chaotic digital communication based on generalized synchronization

    International Nuclear Information System (INIS)

    Lu Junguo

    2005-01-01

    A novel method for multiple access chaotic digital communication based on the concept of chaos generalized synchronization and the on-line least square method is proposed. This method can be used for transmitting multiple digital information signals concurrently. We illustrate the method using a Lorenz system driving a Chua's circuit and then examine the robustness of the proposed method with respect to noise in communication channel

  7. 76 FR 41242 - Agency Information Collection Activities: Proposed Collection; Comment Request; Application for...

    Science.gov (United States)

    2011-07-13

    ... Activities: Proposed Collection; Comment Request; Application for Reimbursement to Local Governments for... view public comments, access the index listing of the contents of the docket, and to access those..., mechanical, or other technological collection techniques or other forms of information technology, e.g...

  8. Eight new genomes and synthetic controls increase the accessibility of rapid melt-MAMA SNP typing of Coxiella burnetii.

    Directory of Open Access Journals (Sweden)

    Edvin Karlsson

    Full Text Available The case rate of Q fever in Europe has increased dramatically in recent years, mainly because of an epidemic in the Netherlands in 2009. Consequently, there is a need for more extensive genetic characterization of the disease agent Coxiella burnetii in order to better understand the epidemiology and spread of this disease. Genome reference data are essential for this purpose, but only thirteen genome sequences are currently available. Current methods for typing C. burnetii are criticized for having problems in comparing results across laboratories, require the use of genomic control DNA, and/or rely on markers in highly variable regions. We developed in this work a method for single nucleotide polymorphism (SNP typing of C. burnetii isolates and tissue samples based on new assays targeting ten phylogenetically stable synonymous canonical SNPs (canSNPs. These canSNPs represent previously known phylogenetic branches and were here identified from sequence comparisons of twenty-one C. burnetii genomes, eight of which were sequenced in this work. Importantly, synthetic control templates were developed, to make the method useful to laboratories lacking genomic control DNA. An analysis of twenty-one C. burnetii genomes confirmed that the species exhibits high sequence identity. Most of its SNPs (7,493/7,559 shared by >1 genome follow a clonal inheritance pattern and are therefore stable phylogenetic typing markers. The assays were validated using twenty-six genetically diverse C. burnetii isolates and three tissue samples from small ruminants infected during the epidemic in the Netherlands. Each sample was assigned to a clade. Synthetic controls (vector and PCR amplified gave identical results compared to the corresponding genomic controls and are viable alternatives to genomic DNA. The results from the described method indicate that it could be useful for cheap and rapid disease source tracking at non-specialized laboratories, which requires accurate

  9. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  10. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  11. HC-IPSAG and GC-IPSAG algorithm proposals

    DEFF Research Database (Denmark)

    Bǎdoi, C.-I.; Croitoru, V.; Prasad, N.

    2010-01-01

    The cognitive radio (CR) technology was proposed as a solution for the lack of wireless resources in an environment with a rapidly growing number of users. The CR advances the dynamic utilization of the licensed users' unused spectrum channels by secondary users. The paper looks into large CR...

  12. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...

  13. An integrated micro-chip for rapid detection of magnetic particles

    KAUST Repository

    Gooneratne, Chinthaka P.; Liang, Cai; Giouroudi, Ioanna; Kosel, Jü rgen

    2012-01-01

    This paper proposes an integrated micro-chip for the manipulation and detection of magnetic particles (MPs). A conducting ring structure is used to manipulate MPs toward giant magnetoresistance(GMR) sensing elements for rapid detection

  14. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  15. Designing Broadband Access Networks with Triple Redundancy

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Riaz, Muhammad Tahir; Knudsen, Thomas Phillip

    2005-01-01

    An architecture is proposed for designing broadband access networks, which offer triple redundancy to the end users, resulting in networks providing connectivity even in case of any two independent node or line failures. Two physically independent connections are offered by fiber, and the last...... provided by some wireless solution. Based on experience with planning Fiber To The Home, the architecture is designed to meet a number of demands, making it practicable and useful in realworld network planning. The proposed wired topology is planar, and suitable for being fitted onto the road network...

  16. Variable disparity estimation based intermediate view reconstruction in dynamic flow allocation over EPON-based access networks

    Science.gov (United States)

    Bae, Kyung-Hoon; Lee, Jungjoon; Kim, Eun-Soo

    2008-06-01

    In this paper, a variable disparity estimation (VDE)-based intermediate view reconstruction (IVR) in dynamic flow allocation (DFA) over an Ethernet passive optical network (EPON)-based access network is proposed. In the proposed system, the stereoscopic images are estimated by a variable block-matching algorithm (VBMA), and they are transmitted to the receiver through DFA over EPON. This scheme improves a priority-based access network by converting it to a flow-based access network with a new access mechanism and scheduling algorithm, and then 16-view images are synthesized by the IVR using VDE. Some experimental results indicate that the proposed system improves the peak-signal-to-noise ratio (PSNR) to as high as 4.86 dB and reduces the processing time to 3.52 s. Additionally, the network service provider can provide upper limits of transmission delays by the flow. The modeling and simulation results, including mathematical analyses, from this scheme are also provided.

  17. The Daemon as Educator: Ubiquitous Access to A Personal Mentor

    Directory of Open Access Journals (Sweden)

    Bernard Rosell

    2011-08-01

    Full Text Available In Socratic philosophy, human beings had access to an inner voice that could be counted on to provide guidance and assistance when needed. This inner voice or daemon was always available and had access to realms of knowledge that mortal consciousness did not have. We propose that the field of Machine Learning has reached the level of maturity where the construction of a personal daemon is now feasible. The ubiquity of broadband access to the internet can guarantee that this personal daemon is always available. Such a construct can greatly increase the efficacy and availability of education for all citizens.

  18. Role based access control design using Triadic concept analysis

    Institute of Scientific and Technical Information of China (English)

    Ch Aswani Kumar; S Chandra Mouliswaran; LI Jin-hai; C Chandrasekar

    2016-01-01

    Role based access control is one of the widely used access control models. There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis (FCA), description logics, and Ontology for representing access control mechanism. However, while using FCA, investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts. This transformation is mainly to derive the formal concepts, lattice structure and implications to represent role hierarchy and constraints of RBAC. In this work, we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts. Our discussion is on two lines of inquiry. We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature.

  19. [The Open Access Initiative (OAI) in the scientific literature].

    Science.gov (United States)

    Sánchez-Martín, Francisco M; Millán Rodríguez, Félix; Villavicencio Mavrich, Humberto

    2009-01-01

    According to the declaration of the Budapest Open Access Initiative (OAI) is defined as a editorial model in which access to scientific journal literature and his use are free. Free flow of information allowed by Internet has been the basis of this initiative. The Bethesda and the Berlin declarations, supported by some international agencies, proposes to require researchers to deposit copies of all articles published in a self-archive or an Open Access repository, and encourage researchers to publish their research papers in journals Open Access. This paper reviews the keys of the OAI, with their strengths and controversial aspects; and it discusses the position of databases, search engines and repositories of biomedical information, as well as the attitude of the scientists, publishers and journals. So far the journal Actas Urológicas Españolas (Act Urol Esp) offer their contents on Open Access as On Line in Spanish and English.

  20. Theory of perceived access to breast health care in African American women.

    Science.gov (United States)

    Garmon, Sandra C

    2012-01-01

    The theory presented in this article proposes an alternative view of access to care on the basis of an African American woman's perception of the necessity, availability, and appropriateness of breast health care. The theory of perceived access to breast health care in African American women may also be useful in framing future research studies exploring the relationship between access to care and utilization of primary, secondary, and tertiary clinical preventive services related to breast health care.

  1. IP access networks with QoS support

    Science.gov (United States)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  2. Evaluation of ultrasound-guided vascular access in dogs.

    Science.gov (United States)

    Chamberlin, Scott C; Sullivan, Lauren A; Morley, Paul S; Boscan, Pedro

    2013-01-01

    To describe the technique and determine the feasibility, success rate, perceived difficulty, and time to vascular access using ultrasound guidance for jugular vein catheterization in a cardiac arrest dog model. Prospective descriptive study. University teaching hospital. Nine Walker hounds. A total of 27 jugular catheterizations were performed postcardiac arrest using ultrasound guidance. Catheterizations were recorded based on the order in which they were performed and presence/absence of a hematoma around the vein. Time (minutes) until successful vascular access and perceived difficulty in achieving vascular access (scale of 1 = easy to 10 = difficult) were recorded for each catheterization. Mean time to vascular access was 1.9 minutes (95% confidence interval, 1.1-3.4 min) for catheterizations without hematoma, versus 4.3 minutes (1.8-10.1 min) for catheterizations with hematoma (P = 0.1). Median perceived difficulty was 2 of 10 (range 1-7) for catheterizations without hematoma, versus 2 of 10 (range 1-8) for catheterizations with hematoma (P = 0.3). A learning curve was evaluated by comparing mean time to vascular access and perceived difficulty in initial versus subsequent catheterizations. Mean time to vascular access was 2.5 minutes (1.0-6.4 min) in the initial 13 catheterizations versus 3.3 minutes (1.5-7.5 min) in the subsequent 14 catheterizations (P = 0.6). Median perceived difficulty in the first 13 catheterizations (3, range 1-8) was significantly greater (P = 0.049) than median perceived difficulty in the subsequent 14 catheterizations (2, range 1-6). Ultrasound-guided jugular catheterization is associated with a learning curve but is successful in obtaining rapid vascular access in dogs. Further prospective studies are warranted to confirm the utility of this technique in a clinical setting. © Veterinary Emergency and Critical Care Society 2013.

  3. Optical code-division multiple-access protocol with selective retransmission

    Science.gov (United States)

    Mohamed, Mohamed A. A.; Shalaby, Hossam M. H.; El-Badawy, El-Sayed A.

    2006-05-01

    An optical code-division multiple-access (OCDMA) protocol based on selective retransmission technique is proposed. The protocol is modeled using a detailed state diagram and is analyzed using equilibrium point analysis (EPA). Both traditional throughput and average delay are used to examine its performance for several network parameters. In addition, the performance of the proposed protocol is compared to that of the R3T protocol, which is based on a go-back-n technique. Our results show that a higher performance is achieved by the proposed protocol at the expense of system complexity.

  4. Frequent inaccuracies in ABCD(2) scoring in non-stroke specialists' referrals to a daily Rapid Access Stroke Prevention service.

    LENUS (Irish Health Repository)

    Bradley, David

    2013-09-15

    The \\'accuracy\\' of age, blood pressure, clinical features, duration and diabetes (ABCD(2)) scoring by non-stroke specialists referring patients to a daily Rapid Access Stroke Prevention (RASP) service is unclear, as is the accuracy of ABCD(2) scoring by trainee residents. In this prospective study, referrals were classified as \\'confirmed TIAs\\' if the stroke specialist confirmed a clinical diagnosis of possible, probable or definite TIA, and \\'non-TIAs\\' if patients had a TIA mimic or completed stroke. ABCD(2) scores from referring physicians were compared with scores by experienced stroke specialists and neurology\\/geriatric medicine residents at a daily RASP clinic; inter-observer agreement was examined. Data from 101 referrals were analysed (mean age=60.0years, 58% male). The median interval between referral and clinic assessment was 1day. Of 101 referrals, 52 (52%) were \\'non-TIAs\\': 45 (86%) of 52 were \\'TIA mimics\\' and 7 (14%) of 52 were completed strokes. There was only \\'fair\\' agreement in total ABCD(2) scoring between referring physicians and stroke specialists (κ=0.37). Agreement was \\'excellent\\' between residents and stroke specialists (κ=0.91). Twenty of 29 patients scored as \\'moderate to high risk\\' (score 4-6) by stroke specialists were scored \\'low risk\\' (score 0-3) by referring physicians. ABCD(2) scoring by referring doctors is frequently inaccurate, with a tendency to underestimate stroke risk. These findings emphasise the importance of urgent specialist assessment of suspected TIA patients, and that ABCD(2) scores by non-stroke specialists cannot be relied upon in isolation to risk-stratify patients. Inter-observer agreement in ABCD(2) scoring was \\'excellent\\' between residents and stroke specialists, indicating short-term training may improve accuracy.

  5. Improving the Authentication Scheme and Access Control Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Wei-Chen Wu

    2014-11-01

    Full Text Available Privacy and security are very important in vehicular ad hoc networks (VANETs. VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs raise challenges, such as certificate distribution and reduction of the strong reliance on tamper-proof devices. In 2011, Yeh et al. proposed a PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s authorized credential (AC is not secure and private, even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that an improving authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.

  6. Index of Access: a new innovative and dynamic tool for rural health service and workforce planning.

    Science.gov (United States)

    McGrail, Matthew R; Russell, Deborah J; Humphreys, John S

    2017-10-01

    Objective Improving access to primary health care (PHC) remains a key issue for rural residents and health service planners. This study aims to show that how access to PHC services is measured has important implications for rural health service and workforce planning. Methods A more sophisticated tool to measure access to PHC services is proposed, which can help health service planners overcome the shortcomings of existing measures and long-standing access barriers to PHC. Critically, the proposed Index of Access captures key components of access and uses a floating catchment approach to better define service areas and population accessibility levels. Moreover, as demonstrated through a case study, the Index of Access enables modelling of the effects of workforce supply variations. Results Hypothetical increases in supply are modelled for a range of regional centres, medium and small rural towns, with resulting changes of access scores valuable to informing health service and workforce planning decisions. Conclusions The availability and application of a specific 'fit-for-purpose' access measure enables a more accurate empirical basis for service planning and allocation of health resources. This measure has great potential for improved identification of PHC access inequities and guiding redistribution of PHC services to correct such inequities. What is known about the topic? Resource allocation and health service planning decisions for rural and remote health settings are currently based on either simple measures of access (e.g. provider-to-population ratios) or proxy measures of access (e.g. standard geographical classifications). Both approaches have substantial limitations for informing rural health service planning and decision making. What does this paper add? The adoption of a new improved tool to measure access to PHC services, the Index of Access, is proposed to assist health service and workforce planning. Its usefulness for health service planning is

  7. Reasoning with alternative explanations in physics: The cognitive accessibility rule

    Science.gov (United States)

    Heckler, Andrew F.; Bogdan, Abigail M.

    2018-06-01

    A critical component of scientific reasoning is the consideration of alternative explanations. Recognizing that decades of cognitive psychology research have demonstrated that relative cognitive accessibility, or "what comes to mind," strongly affects how people reason in a given context, we articulate a simple "cognitive accessibility rule", namely that alternative explanations are considered less frequently when an explanation with relatively high accessibility is offered first. In a series of four experiments, we test the cognitive accessibility rule in the context of consideration of alternative explanations for six physical scenarios commonly found in introductory physics curricula. First, we administer free recall and recognition tasks to operationally establish and distinguish between the relative accessibility and availability of common explanations for the physical scenarios. Then, we offer either high or low accessibility explanations for the physical scenarios and determine the extent to which students consider alternatives to the given explanations. We find two main results consistent across algebra- and calculus-based university level introductory physics students for multiple answer formats. First, we find evidence that, at least for some contexts, most explanatory factors are cognitively available to students but not cognitively accessible. Second, we empirically verify the cognitive accessibility rule and demonstrate that the rule is strongly predictive, accounting for up to 70% of the variance of the average student consideration of alternative explanations across scenarios. Overall, we find that cognitive accessibility can help to explain biases in the consideration of alternatives in reasoning about simple physical scenarios, and these findings lend support to the growing number of science education studies demonstrating that tasks relevant to science education curricula often involve rapid, automatic, and potentially predictable processes and

  8. Disruption of Conscious Access in Schizophrenia.

    Science.gov (United States)

    Berkovitch, Lucie; Dehaene, Stanislas; Gaillard, Raphaël

    2017-11-01

    Schizophrenia is a severe and complex psychiatric disorder resulting in delusions, hallucinations, and cognitive impairments. Across a variety of paradigms, an elevated threshold for conscious perception has been repeatedly observed in persons with schizophrenia. Remarkably, even subtle measures of subliminal processing appear to be preserved. We argue here that the dissociation between impaired conscious access and intact unconscious processing may be due to a specific disruption of top-down attentional amplification. This proposal is compatible with the neurophysiological disturbances observed in schizophrenia, including dysconnectivity, abnormal neural oscillations, and glutamatergic and cholinergic dysregulation. Therefore, placing impaired conscious access as a central feature of schizophrenia can help researchers develop a coherent and parsimonious pathophysiological framework of the disease. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Tactile band : accessing gaze signals from the sighted in face-to-face communication

    NARCIS (Netherlands)

    Qiu, S.; Rauterberg, G.W.M.; Hu, J.

    2016-01-01

    Gaze signals, frequently used by the sighted in social interactions as visual cues, are hardly accessible for low-vision and blind people. A concept is proposed to help the blind people access and react to gaze signals in face-to-face communication. 20 blind and low-vision participants were

  10. Rapid Prototyping Modules for Remote Engineering Applications

    Directory of Open Access Journals (Sweden)

    Karsten Henke

    2008-07-01

    Full Text Available This contribution describes the concept and implementation for an integration of microcontroller and FPGA based Rapid Prototyping modules into a Remote Lab system. This implementation enables a Web-based access to electro-mechanical models. A student uploads a source file implementation to the Remote Lab server in order to test an implementation directly within a hardware environment. The Remote Lab server offers the interfaces to integrate specific project and hardware plug-ins. These plug-ins access a hardware specific software environment to automatically compile and program the resulting firmware. To stimulate this design, the Remote Lab server exchanges digital signals via a serial interface. To allow the student to compare architectures of different designs using the same hardware model, a specific controller (using the Remote Lab interface can be selected. For this, an IP-based multiplexer provides the control connection between the respective controller and the hardware model. In our contribution we would like to give examples of such a complex design task and how the students can use different tools during several design steps.

  11. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Science.gov (United States)

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  12. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Directory of Open Access Journals (Sweden)

    Seungsoo Baek

    2014-01-01

    Full Text Available There has been an explosive increase in the population of the OSN (online social network in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  13. A New Hybrid Channel Access Scheme for Ad Hoc Networks

    National Research Council Canada - National Science Library

    Wang, Yu; Garcia-Luna-Aceves, J. J

    2002-01-01

    Many contention-based channel access schemes have been proposed for multi-hop ad hoc networks in the recent past, and they can be divided into two categories, sender-initiated and receiver-initiated...

  14. Transportation Accessibility and Location Choice of Japanese-Funded Electronic Information Manufacturing Firms in Shanghai

    Directory of Open Access Journals (Sweden)

    Haining Jiang

    2018-02-01

    Full Text Available With the rapid development of globalization, information communication and transportation, it is argued that the effect of transportation accessibility in the location choice of manufacturing firms has diminished. However, comprehensive and systematic research on the impact of transportation accessibility on firm location choice in cities remains scarce. Taking Shanghai as the research area, this paper uses a catalog of Japanese-funded electronic information manufacturing firms to explore the influence of transportation accessibility on their location choice. The paper first describes firm distribution using the nuclear density estimation method. The Poisson regression model is then used to estimate the significance of transportation accessibility in influencing firm location. The empirical results show that most of the firms are concentrated in the inner suburbs of Shanghai, with only a small number in the outer suburban areas. The spatial coupling relationship between firm distribution and transportation accessibility is significant. These firms tend to choose areas with good accessibility to transportation infrastructure, and, in particular, the effect of airport accessibility is significant. Compared with the joint venture enterprises, wholly-owned Japanese enterprises are more inclined to be in areas with better transportation accessibility.

  15. Research on the Legal Regulation of Market Access for Agricultural Products in China

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    On the basis of defining the concept of market access for agricultural products,this paper analyzes the necessity of establishing market access system of agricultural products,proposes the conception of establishing market access system of agricultural products in China;sets up the frame of market access system of agricultural products;analyzes the rationality of the frame of market access system of agricultural products;poses the consideration of economic law regarding setup of market access system of agricultural products.This paper also puts forward the legislative suggestions for establishing market access system of agricultural products as follows:establish the frame of market access system of agricultural products taking quality access as core;establish and perfect the compensation and relief system of guaranteeing benefit of manager and producers;establish the market access system of agricultural products with hierarchical structure;sort out existing laws and form the sound the legal frame of market access system of agricultural products.

  16. Two schemes for rapid generation of digital video holograms using PC cluster

    Science.gov (United States)

    Park, Hanhoon; Song, Joongseok; Kim, Changseob; Park, Jong-Il

    2017-12-01

    Computer-generated holography (CGH), which is a process of generating digital holograms, is computationally expensive. Recently, several methods/systems of parallelizing the process using graphic processing units (GPUs) have been proposed. Indeed, use of multiple GPUs or a personal computer (PC) cluster (each PC with GPUs) enabled great improvements in the process speed. However, extant literature has less often explored systems involving rapid generation of multiple digital holograms and specialized systems for rapid generation of a digital video hologram. This study proposes a system that uses a PC cluster and is able to more efficiently generate a video hologram. The proposed system is designed to simultaneously generate multiple frames and accelerate the generation by parallelizing the CGH computations across a number of frames, as opposed to separately generating each individual frame while parallelizing the CGH computations within each frame. The proposed system also enables the subprocesses for generating each frame to execute in parallel through multithreading. With these two schemes, the proposed system significantly reduced the data communication time for generating a digital hologram when compared with that of the state-of-the-art system.

  17. Pacific Islands Coral Reef Ecosystems Division (CRED) Rapid Ecological Assessment (REA) algae species lists (NODC Accession 0010352)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Quadrats were sampled along consecutively placed transect lines as part of Rapid Ecological Assessments conducted at sites in American Pacific Islands: CRED REA...

  18. The welfare effects of restricting off-highway vehicle access to public lands

    Science.gov (United States)

    Paul M. Jakus; John E. Keith; Lu Liu; Dale Blahna

    2010-01-01

    Off-highway vehicle (OHV) use is a rapidly growing outdoor activity that results in a host of environmental and management problems. Federal agencies have been directed to develop travel management plans to improve recreation experiences, reduce social conflicts, and diminish environmental impacts of OHVs. We examine the effect of land access restrictions on the...

  19. Energy Efficiency in TDMA-Based Next-Generation Passive Optical Access Networks

    KAUST Repository

    Dhaini, Ahmad R.; Ho, Pin-Han; Shen, Gangxiang; Shihada, Basem

    2014-01-01

    Next-generation passive optical network (PON) has been considered in the past few years as a cost-effective broadband access technology. With the ever-increasing power saving concern, energy efficiency has been an important issue in its operations. In this paper, we propose a novel sleep-time sizing and scheduling framework for the implementation of green bandwidth allocation (GBA) in TDMA-PONs. The proposed framework leverages the batch-mode transmission feature of GBA to minimize the overhead due to frequent ONU on-off transitions. The optimal sleeping time sequence of each ONU is determined in every cycle without violating the maximum delay requirement. With multiple ONUs possibly accessing the shared media simultaneously, a collision may occur. To address this problem, we propose a new sleep-time sizing mechanism, namely Sort-And-Shift (SAS), in which the ONUs are sorted according to their expected transmission start times, and their sleep times are shifted to resolve any possible collision while ensuring maximum energy saving. Results show the effectiveness of the proposed framework and highlight the merits of our solutions.

  20. Energy Efficiency in TDMA-Based Next-Generation Passive Optical Access Networks

    KAUST Repository

    Dhaini, Ahmad R.

    2014-06-01

    Next-generation passive optical network (PON) has been considered in the past few years as a cost-effective broadband access technology. With the ever-increasing power saving concern, energy efficiency has been an important issue in its operations. In this paper, we propose a novel sleep-time sizing and scheduling framework for the implementation of green bandwidth allocation (GBA) in TDMA-PONs. The proposed framework leverages the batch-mode transmission feature of GBA to minimize the overhead due to frequent ONU on-off transitions. The optimal sleeping time sequence of each ONU is determined in every cycle without violating the maximum delay requirement. With multiple ONUs possibly accessing the shared media simultaneously, a collision may occur. To address this problem, we propose a new sleep-time sizing mechanism, namely Sort-And-Shift (SAS), in which the ONUs are sorted according to their expected transmission start times, and their sleep times are shifted to resolve any possible collision while ensuring maximum energy saving. Results show the effectiveness of the proposed framework and highlight the merits of our solutions.

  1. An Efficient Role and Object Based Access Control Model Implemented in a PDM System

    Institute of Scientific and Technical Information of China (English)

    HUANG Xiaowen; TAN Jian; HUANG Xiangguo

    2006-01-01

    An effective and reliable access control is crucial to a PDM system. This article has discussed the commonly used access control models, analyzed their advantages and disadvantages, and proposed a new Role and Object based access control model that suits the particular needs of a PDM system. The new model has been implemented in a commercial PDM system, which has demonstrated enhanced flexibility and convenience.

  2. Future Scenarios for Software-Defined Metro and Access Networks and Software-Defined Photonics

    Directory of Open Access Journals (Sweden)

    Tommaso Muciaccia

    2017-01-01

    Full Text Available In recent years, architectures, devices, and components in telecommunication networks have been challenged by evolutionary and revolutionary factors which are drastically changing the traffic features. Most of these changes imply the need for major re-configurability and programmability not only in data-centers and core networks, but also in the metro-access segment. In a wide variety of contexts, this necessity has been addressed by the proposed introduction of the innovative paradigm of software-defined networks (SDNs. Several solutions inspired by the SDN model have been recently proposed also for metro and access networks, where the adoption of a new generation of software-defined reconfigurable integrated photonic devices is highly desirable. In this paper, we review the possible future application scenarios for software-defined metro and access networks and software-defined photonics (SDP, on the base of analytics, statistics, and surveys. This work describes the reasons underpinning the presented radical change of paradigm and summarizes the most significant solutions proposed in literature, with a specific emphasis to physical-layer reconfigurable networks and a focus on both architectures and devices.

  3. 78 FR 4586 - Environmental Impact Statement: Kake Access, AK

    Science.gov (United States)

    2013-01-22

    ... DEPARTMENT OF TRANSPORTATION Federal Highway Administration Environmental Impact Statement: Kake... Environmental Impact Statement (EIS) for a proposed transportation project to improve access to and from the... written comments on environmental concerns that should be addressed in the EIS. The public scoping...

  4. Polarization division multiple access with polarization modulation for LOS wireless communications

    Directory of Open Access Journals (Sweden)

    Cao Bin

    2011-01-01

    Full Text Available Abstract In this paper, we discuss a potential multiple access and modulation scheme based on polarized states (PS of electromagnetic (EM waves for line-of-sight (LOS communications. The proposed scheme is theoretic different from the existing polar modulation for EDGE and WCDMA systems. We propose the detailed bit representation (modulation and multiple access scheme using PS. Because of the inflexibility of polarization information in the time and frequency domains, as well as independence of frequency and space, the polarization information can be used independently for wireless communications, i.e., another independent resource domain that can be utilized. Due to the independence between the PS and the specific features of signals (such as waveform, bandwidth and data rate, the discussed polarization division multiple access (PDMA and polarization modulation (PM are expected to improve the spectrum utilization effectively. It is proved that the polarization filtering technique can be adopted in the PDMA-PM wireless communications to separate the multiuser signals and demodulate the bit information representing by PS for desired user. Some theoretical analysis is done to demonstrate the feasibility of the proposed scheme, and the simulation results are made to evaluate the performance of the suggested system.

  5. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  6. A federated capability-based access control mechanism for internet of things (IoTs)

    Science.gov (United States)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  7. Multiple Access Interference Reduction Using Received Response Code Sequence for DS-CDMA UWB System

    Science.gov (United States)

    Toh, Keat Beng; Tachikawa, Shin'ichi

    This paper proposes a combination of novel Received Response (RR) sequence at the transmitter and a Matched Filter-RAKE (MF-RAKE) combining scheme receiver system for the Direct Sequence-Code Division Multiple Access Ultra Wideband (DS-CDMA UWB) multipath channel model. This paper also demonstrates the effectiveness of the RR sequence in Multiple Access Interference (MAI) reduction for the DS-CDMA UWB system. It suggests that by using conventional binary code sequence such as the M sequence or the Gold sequence, there is a possibility of generating extra MAI in the UWB system. Therefore, it is quite difficult to collect the energy efficiently although the RAKE reception method is applied at the receiver. The main purpose of the proposed system is to overcome the performance degradation for UWB transmission due to the occurrence of MAI during multiple accessing in the DS-CDMA UWB system. The proposed system improves the system performance by improving the RAKE reception performance using the RR sequence which can reduce the MAI effect significantly. Simulation results verify that significant improvement can be obtained by the proposed system in the UWB multipath channel models.

  8. Rapid earthquake magnitude determination for Vrancea early warning system

    International Nuclear Information System (INIS)

    Marmureanu, Alexandru

    2009-01-01

    Due to the huge amount of recorded data, an automatic procedure was developed and used to test different methods to rapidly evaluate earthquake magnitude from the first seconds of the P wave. In order to test all the algorithms involved in detection and rapid earthquake magnitude estimation, several tests were performed, in order to avoid false alarms. A special detection algorithm was developed, that is based on the classical STA/LTA algorithm and tuned for early warning purpose. A method to rapidly estimate magnitude in 4 seconds from detection of P wave in the epicenter is proposed. The method was tested on al recorded data, and the magnitude error determination is acceptable taking into account that it is computed from only 3 stations in a very short time interval. (author)

  9. Considering User's Access Pattern in Multimedia File Systems

    Science.gov (United States)

    Cho, KyoungWoon; Ryu, YeonSeung; Won, Youjip; Koh, Kern

    2002-12-01

    Legacy buffer cache management schemes for multimedia server are grounded at the assumption that the application sequentially accesses the multimedia file. However, user access pattern may not be sequential in some circumstances, for example, in distance learning application, where the user may exploit the VCR-like function(rewind and play) of the system and accesses the particular segments of video repeatedly in the middle of sequential playback. Such a looping reference can cause a significant performance degradation of interval-based caching algorithms. And thus an appropriate buffer cache management scheme is required in order to deliver desirable performance even under the workload that exhibits looping reference behavior. We propose Adaptive Buffer cache Management(ABM) scheme which intelligently adapts to the file access characteristics. For each opened file, ABM applies either the LRU replacement or the interval-based caching depending on the Looping Reference Indicator, which indicates that how strong temporally localized access pattern is. According to our experiment, ABM exhibits better buffer cache miss ratio than interval-based caching or LRU, especially when the workload exhibits not only sequential but also looping reference property.

  10. Privacy and Access Control for IHE-Based Systems

    Science.gov (United States)

    Katt, Basel; Breu, Ruth; Hafner, Micahel; Schabetsberger, Thomas; Mair, Richard; Wozak, Florian

    Electronic Health Record (EHR) is the heart element of any e-health system, which aims at improving the quality and efficiency of healthcare through the use of information and communication technologies. The sensitivity of the data contained in the health record poses a great challenge to security. In this paper we propose a security architecture for EHR systems that are conform with IHE profiles. In this architecture we are tackling the problems of access control and privacy. Furthermore, a prototypical implementation of the proposed model is presented.

  11. A Method for Automated Planning of FTTH Access Network Infrastructures

    DEFF Research Database (Denmark)

    Riaz, Muhammad Tahir; Pedersen, Jens Myrup; Madsen, Ole Brun

    2005-01-01

    In this paper a method for automated planning of Fiber to the Home (FTTH) access networks is proposed. We introduced a systematic approach for planning access network infrastructure. The GIS data and a set of algorithms were employed to make the planning process more automatic. The method explains...... method. The method, however, does not fully automate the planning but make the planning process significantly fast. The results and discussion are presented and conclusion is given in the end....

  12. Providing Data Access for Interdisciplinary Research

    Science.gov (United States)

    Hooper, R. P.; Couch, A.

    2012-12-01

    Developing an interdisciplinary understanding of human and environmental interactions with water requires access to a variety of data kinds collected by various organizations. The CUAHSI Hydrologic Information System (HIS) is a standards-based, services-oriented architecture designed for time-series data. Such data represents an important type of data in water studies. Through the efforts of HIS, a standard transmission language, WaterML2, has been adopted by the Open Geospatial Consortium and is under consideration by the World Meteorologic Organization as an international standards. Web services have also been developed to retrieve data and metadata. HIS is completed with a metadata catalog, hosted by San Diego Supercomputing Center, which indexes more than 20 million time series provided from over 90 different services. This catalog is supported through a hierarchically organized controlled vocabulary that is open for community input and mediation. Data publishers include federal agencies, universities, state agencies, and non-profit organizations such as watershed associations. Accessing data from such a broad spectrum of sources through a uniform service standard promises to truly transform the way in which hydrologic research is done. CUAHSI HIS is a large-scale prototype at this time, but a proposal is under consideration by the National Science Foundation to operationalize HIS through a data facility, tentatively called the CUAHSI Water Data Center. Establishing HIS is an important step to enable research into human-environment interactions with water, but it is only one step. Other data structures will need to be made accessible and interoperable to support this research. Some data—such as two-dimensional GIS coverages—already have widely used standards for transmission and sharing. The US Federal government has long operated a clearinghouse for federal geographic data that is now being augmented with other services such as ArcGIS OnLine. Other data

  13. Open-access databases as unprecedented resources and drivers of cultural change in fisheries science

    Energy Technology Data Exchange (ETDEWEB)

    McManamay, Ryan A [ORNL; Utz, Ryan [National Ecological Observatory Network

    2014-01-01

    Open-access databases with utility in fisheries science have grown exponentially in quantity and scope over the past decade, with profound impacts to our discipline. The management, distillation, and sharing of an exponentially growing stream of open-access data represents several fundamental challenges in fisheries science. Many of the currently available open-access resources may not be universally known among fisheries scientists. We therefore introduce many national- and global-scale open-access databases with applications in fisheries science and provide an example of how they can be harnessed to perform valuable analyses without additional field efforts. We also discuss how the development, maintenance, and utilization of open-access data are likely to pose technical, financial, and educational challenges to fisheries scientists. Such cultural implications that will coincide with the rapidly increasing availability of free data should compel the American Fisheries Society to actively address these problems now to help ease the forthcoming cultural transition.

  14. IAACaaS: IoT Application-Scoped Access Control as a Service

    Directory of Open Access Journals (Sweden)

    Álvaro Alonso

    2017-10-01

    Full Text Available access control is a key element when guaranteeing the security of online services. However, devices that make the Internet of Things have some special requirements that foster new approaches to access control mechanisms. Their low computing capabilities impose limitations that make traditional paradigms not directly applicable to sensors and actuators. In this paper, we propose a dynamic, scalable, IoT-ready model that is based on the OAuth 2.0 protocol and that allows the complete delegation of authorization, so that an as a service access control mechanism is provided. Multiple tenants are also supported by means of application-scoped authorization policies, whose roles and permissions are fine-grained enough to provide the desired flexibility of configuration. Besides, OAuth 2.0 ensures interoperability with the rest of the Internet, yet preserving the computing constraints of IoT devices, because its tokens provide all the necessary information to perform authorization. The proposed model has been fully implemented in an open-source solution and also deeply validated in the scope of FIWARE, a European project with thousands of users, the goal of which is to provide a framework for developing smart applications and services for the future Internet. We provide the details of the deployed infrastructure and offer the analysis of a sample smart city setup that takes advantage of the model. We conclude that the proposed solution enables a new access control as a service paradigm that satisfies the special requirements of IoT devices in terms of performance, scalability and interoperability.

  15. Explanatory memorandum on European Community Document 6323/87: proposal for a Council decision on a Community system of rapid exchange of information in cases of abnormal levels of radioactivity or of a nuclear accident

    International Nuclear Information System (INIS)

    1987-01-01

    The Council of the European Commnity proposes a system of rapid exchange of information in cases of abnormal radioactivity or a nuclear accident. In addition to the existing procedures of early notification drawn up by the International Atomic Energy Authority this proposes a further notification system between member states of the European Community. Under this there would be notification, not only of accidents with possible transboundary effects, but of any accident for which emergency measures are taken to protect the public. However, the United Kingdom would prefer the trigger of these procedures to be abnormally high radiation levels rather than the introduction of emergency measures. (U.K.)

  16. Self-Testing Static Random-Access Memory

    Science.gov (United States)

    Chau, Savio; Rennels, David

    1991-01-01

    Proposed static random-access memory for computer features improved error-detecting and -correcting capabilities. New self-testing scheme provides for detection and correction of errors at any time during normal operation - even while data being written into memory. Faults in equipment causing errors in output data detected by repeatedly testing every memory cell to determine whether it can still store both "one" and "zero", without destroying data stored in memory.

  17. A Rapid Prototyping Environment for Wireless Communication Embedded Systems

    Directory of Open Access Journals (Sweden)

    Bryan A. Jones

    2003-05-01

    Full Text Available This paper introduces a rapid prototyping methodology which overcomes important barriers in the design and implementation of digital signal processing (DSP algorithms and systems on embedded hardware platforms, such as cellular phones. This paper describes rapid prototyping in terms of a simulation/prototype bridge and in terms of appropriate language design. The simulation/prototype bridge combines the strengths of simulation and of prototyping, allowing the designer to develop and evaluate next-generation communications systems, partly in simulation on a host computer and partly as a prototype on embedded hardware. Appropriate language design allows designers to express a communications system as a block diagram, in which each block represents an algorithm specified by a set of equations. Software tools developed for this paper implement both concepts, and have been successfully used in the development of a next-generation code division multiple access (CDMA cellular wireless communications system.

  18. Channel Access and Power Control for Mobile Crowdsourcing in Device-to-Device Underlaid Cellular Networks

    Directory of Open Access Journals (Sweden)

    Yue Ma

    2018-01-01

    Full Text Available With the access of a myriad of smart handheld devices in cellular networks, mobile crowdsourcing becomes increasingly popular, which can leverage omnipresent mobile devices to promote the complicated crowdsourcing tasks. Device-to-device (D2D communication is highly desired in mobile crowdsourcing when cellular communications are costly. The D2D cellular network is more preferable for mobile crowdsourcing than conventional cellular network. Therefore, this paper addresses the channel access and power control problem in the D2D underlaid cellular networks. We propose a novel semidistributed network-assisted power and a channel access control scheme for D2D user equipment (DUE pieces. It can control the interference from DUE pieces to the cellular user accurately and has low information feedback overhead. For the proposed scheme, the stochastic geometry tool is employed and analytic expressions are derived for the coverage probabilities of both the cellular link and D2D links. We analyze the impact of key system parameters on the proposed scheme. The Pareto optimal access threshold maximizing the total area spectral efficiency is obtained. Unlike the existing works, the performances of the cellular link and D2D links are both considered. Simulation results show that the proposed method can improve the total area spectral efficiency significantly compared to existing schemes.

  19. Open Access Publishing in High-Energy Physics

    CERN Document Server

    Mele, S

    2007-01-01

    The goal of Open Access (OA) is to grant anyone, anywhere and anytime free access to the results of scientific research. The High- Energy Physics (HEP) community has pioneered OA with its "pre-print culture": the mass mailing, first, and the online posting, later, of preliminary versions of its articles. After almost half a century of widespread dissemination of pre-prints, the time is ripe for the HEP community to explore OA publishing. Among other possible models, a sponsoring consortium appears as the most viable option for a transition of HEP peer-reviewed literature to OA. A Sponsoring Consortium for Open Access Publishing in Particle Physics (SCOAP3) is proposed as a central body which would remunerate publishers for the peer-review service, effectively replacing the "reader-pays" model of traditional subscriptions with an "author-side" funding. Funding to SCOAP3 would come from HEP funding agencies and library consortia through a re-direction of subscriptions. This model is discussed in details togethe...

  20. Metro-access integrated network based on optical OFDMA with dynamic sub-carrier allocation and power distribution.

    Science.gov (United States)

    Zhang, Chongfu; Zhang, Qiongli; Chen, Chen; Jiang, Ning; Liu, Deming; Qiu, Kun; Liu, Shuang; Wu, Baojian

    2013-01-28

    We propose and demonstrate a novel optical orthogonal frequency-division multiple access (OFDMA)-based metro-access integrated network with dynamic resource allocation. It consists of a single fiber OFDMA ring and many single fiber OFDMA trees, which transparently integrates metropolitan area networks with optical access networks. The single fiber OFDMA ring connects the core network and the central nodes (CNs), the CNs are on demand reconfigurable and use multiple orthogonal sub-carriers to realize parallel data transmission and dynamic resource allocation, meanwhile, they can also implement flexible power distribution. The remote nodes (RNs) distributed in the user side are connected by the single fiber OFDMA trees with the corresponding CN. The obtained results indicate that our proposed metro-access integrated network is feasible and the power distribution is agile.

  1. 77 FR 28655 - Notice of Order Soliciting Community Proposals

    Science.gov (United States)

    2012-05-15

    ..., including business, educational institutions, and other enterprises, whose access to the national air... tourism); whether the proposed project, if successfully implemented, could serve as a working model for... responsible for developing, implementing, and managing activities related to the air service development zone...

  2. Channel Access Client Toolbox for Matlab

    International Nuclear Information System (INIS)

    2002-01-01

    This paper reports on MATLAB Channel Access (MCA) Toolbox--MATLAB [1] interface to EPICS Channel Access (CA) client library. We are developing the toolbox for SPEAR3 accelerator controls, but it is of general use for accelerator and experimental physics applications programming. It is packaged as a MATLAB toolbox to allow easy development of complex CA client applications entirely in MATLAB. The benefits include: the ability to calculate and display parameters that use EPICS process variables as inputs, availability of MATLAB graphics tools for user interface design, and integration with the MATLABbased accelerator modeling software - Accelerator Toolbox [2-4]. Another purpose of this paper is to propose a feasible path to a synergy between accelerator control systems and accelerator simulation codes, the idea known as on-line accelerator model

  3. Accessibility of GI for Public Participation

    DEFF Research Database (Denmark)

    Arleth, Mette; Campagna, Michele

    2005-01-01

    The paper reports an ongoing comparative study on the accessibility of Geographic Information at public authorities’ websites in Denmark and Italy. The purpose of the study is twofold; to give an idea of the latest development and diffusion of GI on public authorities websites, and to identify...... critical factors for success or failure of the applications. First part of the study therefore consists of a mapping of the level of accessibility of GI in the two countries as a comparative analysis. The focus of the mapping is mainly on the use of geographic information as support to citizens......’ involvement in spatial e-government and planning processes. Then, in the reminder of the paper, a comparative analysis is proposed outlining similarities and divergences in critical success factors in the two examined domains....

  4. Accessible engineering drawings for visually impaired machine operators.

    Science.gov (United States)

    Ramteke, Deepak; Kansal, Gayatri; Madhab, Benu

    2014-01-01

    An engineering drawing provides manufacturing information to a machine operator. An operator plans and executes machining operations based on this information. A visually impaired (VI) operator does not have direct access to the drawings. Drawing information is provided to them verbally or by using sample parts. Both methods have limitations that affect the quality of output. Use of engineering drawings is a standard practice for every industry; this hampers employment of a VI operator. Accessible engineering drawings are required to increase both independence, as well as, employability of VI operators. Today, Computer Aided Design (CAD) software is used for making engineering drawings, which are saved in CAD files. Required information is extracted from the CAD files and converted into Braille or voice. The authors of this article propose a method to make engineering drawings information directly accessible to a VI operator.

  5. Joint Hybrid Backhaul and Access Links Design in Cloud-Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb

    2015-09-06

    The cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio systems. In this paper, we consider the downlink of a CRAN formed of one central processor (the cloud) and several base station (BS), where each BS is connected to the cloud via either a wireless or capacity-limited wireline backhaul link. The paper addresses the joint design of the hybrid backhaul links (i.e., designing the wireline and wireless backhaul connections from the cloud to the BSs) and the access links (i.e., determining the sparse beamforming solution from the BSs to the users). The paper formulates the hybrid backhaul and access link design problem by minimizing the total network power consumption. The paper solves the problem using a two-stage heuristic algorithm. At one stage, the sparse beamforming solution is found using a weighted mixed 11/12 norm minimization approach; the correlation matrix of the quantization noise of the wireline backhaul links is computed using the classical rate-distortion theory. At the second stage, the transmit powers of the wireless backhaul links are found by solving a power minimization problem subject to quality-of-service constraints, based on the principle of conservation of rate by utilizing the rates found in the first stage. Simulation results suggest that the performance of the proposed algorithm approaches the global optimum solution, especially at high signal-to-interference-plus-noise ratio (SINR).

  6. Audiovisual Simultaneity Judgment and Rapid Recalibration throughout the Lifespan.

    Science.gov (United States)

    Noel, Jean-Paul; De Niear, Matthew; Van der Burg, Erik; Wallace, Mark T

    2016-01-01

    Multisensory interactions are well established to convey an array of perceptual and behavioral benefits. One of the key features of multisensory interactions is the temporal structure of the stimuli combined. In an effort to better characterize how temporal factors influence multisensory interactions across the lifespan, we examined audiovisual simultaneity judgment and the degree of rapid recalibration to paired audiovisual stimuli (Flash-Beep and Speech) in a sample of 220 participants ranging from 7 to 86 years of age. Results demonstrate a surprisingly protracted developmental time-course for both audiovisual simultaneity judgment and rapid recalibration, with neither reaching maturity until well into adolescence. Interestingly, correlational analyses revealed that audiovisual simultaneity judgments (i.e., the size of the audiovisual temporal window of simultaneity) and rapid recalibration significantly co-varied as a function of age. Together, our results represent the most complete description of age-related changes in audiovisual simultaneity judgments to date, as well as being the first to describe changes in the degree of rapid recalibration as a function of age. We propose that the developmental time-course of rapid recalibration scaffolds the maturation of more durable audiovisual temporal representations.

  7. Accessible Knowledge - Knowledge on Accessibility

    DEFF Research Database (Denmark)

    Kirkeby, Inge Mette

    2015-01-01

    Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...

  8. Development of rail access to the proposed repository site at Yucca Mountain

    International Nuclear Information System (INIS)

    Standish, P.N.; Seidler, P.E.; Andrews, W.B.; Shearin, G.

    1991-01-01

    In accordance with the Nuclear Waste Policy Amendment Act of 1987, Yucca Mountain was designated as the initial site to be investigated as a potential repository for the disposal of high-level radioactive waste. The Yucca Mountain site is an undeveloped area located on the southwestern edge of the Nevada Test Site (NTS), about 100 miles northwest of Las Vegas. The site currently lacks rail service or an existing right-of-way. If the Yucca Mountain site is found suitable for the repository, rail service is considered desirable by the Office of Civilian Radioactive Waste Management (OCRWM) program because of the potential of rail transportation to reduce (1) costs and (2) number of shipments, relative to highway transportation. Therefore, it is necessary to conduct a study to determine (1) that there are alignments for a potential rail line from existing mainline railroads to Yucca Mountain and (2) that these are consistent with present rail design standards and are acceptable relative to environmental and land access considerations

  9. Evaluating accessibility to Bangkok Metro Systems using multi-dimensional criteria across user groups

    Directory of Open Access Journals (Sweden)

    Duangporn Prasertsubpakij

    2012-07-01

    Full Text Available Metro systems act as fast and efficient transport systems for many modern metropolises; however, enhancing higher usage of such systems often conflicts with providing suitable accessibility options. The traditional approach of metro accessibility studies seems to be an ineffective measure to gage sustainable access in which the equal rights of all users are taken into account. Bangkok Metropolitan Region (BMR transportation has increasingly relied on the role of two mass rapid transport systems publicly called “BTS Skytrain” and “MRT Subway”, due to limited availability of land and massive road congestion; however, access to such transit arguably treats some vulnerable groups, especially women, the elderly and disabled people unfairly. This study constructs a multi-dimensional assessment of accessibility considerations to scrutinize how user groups access metro services based on BMR empirical case. 600 individual passengers at various stations were asked to rate the questionnaire that simultaneously considers accessibility aspects of spatial, feeder connectivity, temporal, comfort/safety, psychosocial and other dimensions. It was interestingly found by user disaggregated accessibility model that the lower the accessibility perceptions—related uncomfortable and unsafe environment conditions, the greater the equitable access to services, as illustrated by MRT — Hua Lumphong and MRT — Petchaburi stations. The study suggests that, to balance the access priorities of groups on services, policy actions should emphasize acceptably safe access for individuals, cost efficient feeder services connecting the metro lines, socioeconomic influences and time allocation. Insightful discussions on integrated approach balancing different dimensions of accessibility and recommendations would contribute to accessibility-based knowledge and potential propensity to use the public transits towards transport sustainability.

  10. Growth rate correlates negatively with protein turnover in Arabidopsis accessions.

    Science.gov (United States)

    Ishihara, Hirofumi; Moraes, Thiago Alexandre; Pyl, Eva-Theresa; Schulze, Waltraud X; Obata, Toshihiro; Scheffel, André; Fernie, Alisdair R; Sulpice, Ronan; Stitt, Mark

    2017-08-01

    Previous studies with Arabidopsis accessions revealed that biomass correlates negatively to dusk starch content and total protein, and positively to the maximum activities of enzymes in photosynthesis. We hypothesized that large accessions have lower ribosome abundance and lower rates of protein synthesis, and that this is compensated by lower rates of protein degradation. This would increase growth efficiency and allow more investment in photosynthetic machinery. We analysed ribosome abundance and polysome loading in 19 accessions, modelled the rates of protein synthesis and compared them with the observed rate of growth. Large accessions contained less ribosomes than small accessions, due mainly to cytosolic ribosome abundance falling at night in large accessions. The modelled rates of protein synthesis resembled those required for growth in large accessions, but were up to 30% in excess in small accessions. We then employed 13 CO 2 pulse-chase labelling to measure the rates of protein synthesis and degradation in 13 accessions. Small accessions had a slightly higher rate of protein synthesis and much higher rates of protein degradation than large accessions. Protein turnover was negligible in large accessions but equivalent to up to 30% of synthesised protein day -1 in small accessions. We discuss to what extent the decrease in growth in small accessions can be quantitatively explained by known costs of protein turnover and what factors may lead to the altered diurnal dynamics and increase of ribosome abundance in small accessions, and propose that there is a trade-off between protein turnover and maximisation of growth rate. © 2017 The Authors The Plant Journal © 2017 John Wiley & Sons Ltd.

  11. Approximate Networking for Universal Internet Access

    Directory of Open Access Journals (Sweden)

    Junaid Qadir

    2017-12-01

    Full Text Available Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, global Internet. In this paper, we argue that instead of an exclusive focus on a utopian goal of universally accessible “ideal networking” (in which we have a high throughput and quality of service as well as low latency and congestion, we should consider providing “approximate networking” through the adoption of context-appropriate trade-offs. In this regard, we propose to leverage the advances in the emerging trend of “approximate computing” that rely on relaxing the bounds of precise/exact computing to provide new opportunities for improving the area, power, and performance efficiency of systems by orders of magnitude by embracing output errors in resilient applications. Furthermore, we propose to extend the dimensions of approximate computing towards various knobs available at network layers. Approximate networking can be used to provision “Global Access to the Internet for All” (GAIA in a pragmatically tiered fashion, in which different users around the world are provided a different context-appropriate (but still contextually functional Internet experience.

  12. Regional Disparities in Online Map User Access Volume and Determining Factors

    Science.gov (United States)

    Li, R.; Yang, N.; Li, R.; Huang, W.; Wu, H.

    2017-09-01

    The regional disparities of online map user access volume (use `user access volume' in this paper to indicate briefly) is a topic of growing interest with the increment of popularity in public users, which helps to target the construction of geographic information services for different areas. At first place we statistically analysed the online map user access logs and quantified these regional access disparities on different scales. The results show that the volume of user access is decreasing from east to the west in China as a whole, while East China produces the most access volume; these cities are also the crucial economic and transport centres. Then Principal Component Regression (PCR) is applied to explore the regional disparities of user access volume. A determining model for Online Map access volume is proposed afterwards, which indicates that area scale is the primary determining factor for regional disparities, followed by public transport development level and public service development level. Other factors like user quality index and financial index have very limited influence on the user access volume. According to the study of regional disparities in user access volume, map providers can reasonably dispatch and allocate the data resources and service resources in each area and improve the operational efficiency of the Online Map server cluster.

  13. Enhancing Access to Scientific Models through Standard Web Services, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — We propose to investigate the feasibility and value of the "Software as a Service" paradigm in facilitating access to Earth Science numerical models. We envision...

  14. A novel asynchronous access method with binary interfaces

    Directory of Open Access Journals (Sweden)

    Torres-Solis Jorge

    2008-10-01

    Full Text Available Abstract Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches. Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation.

  15. Delay-aware adaptive sleep mechanism for green wireless-optical broadband access networks

    Science.gov (United States)

    Wang, Ruyan; Liang, Alei; Wu, Dapeng; Wu, Dalei

    2017-07-01

    Wireless-Optical Broadband Access Network (WOBAN) is capacity-high, reliable, flexible, and ubiquitous, as it takes full advantage of the merits from both optical communication and wireless communication technologies. Similar to other access networks, the high energy consumption poses a great challenge for building up WOBANs. To shot this problem, we can make some load-light Optical Network Units (ONUs) sleep to reduce the energy consumption. Such operation, however, causes the increased packet delay. Jointly considering the energy consumption and transmission delay, we propose a delay-aware adaptive sleep mechanism. Specifically, we develop a new analytical method to evaluate the transmission delay and queuing delay over the optical part, instead of adopting M/M/1 queuing model. Meanwhile, we also analyze the access delay and queuing delay of the wireless part. Based on such developed delay models, we mathematically derive ONU's optimal sleep time. In addition, we provide numerous simulation results to show the effectiveness of the proposed mechanism.

  16. Using QR codes to enable quick access to information in acute cancer care.

    Science.gov (United States)

    Upton, Joanne; Olsson-Brown, Anna; Marshall, Ernie; Sacco, Joseph

    2017-05-25

    Quick access to toxicity management information ensures timely access to steroids/immunosuppressive treatment for cancer patients experiencing immune-related adverse events, thus reducing length of hospital stays or avoiding hospital admission entirely. This article discusses a project to add a QR (quick response) code to a patient-held immunotherapy alert card. As QR code generation is free and the immunotherapy clinical management algorithms were already publicly available through the trust's clinical network website, the costs of integrating a QR code into the alert card, after printing, were low, while the potential benefits are numerous. Patient-held alert cards are widely used for patients receiving anti-cancer treatment, and this established standard of care has been modified to enable rapid access of information through the incorporation of a QR code.

  17. Image transmission in multicore-fiber code-division multiple access network

    Science.gov (United States)

    Yang, Guu-Chang; Kwong, Wing C.

    1997-01-01

    Recently, two-dimensional (2-D) signature patterns were proposed to encode binary digitized image pixels in optical code-division multiple-access (CDMA) networks with 'multicore' fiber. The new technology enables parallel transmission and simultaneous access of 2-D images in multiple-access environment, where these signature patterns are defined as optical orthogonal signature pattern codes (OOSPCs). However, previous work on OOSPCs assumed that the weight of each signature pattern was the same. In this paper, we construct a new family of OOSPCs with the removal of this assumption. Since varying the weight of a user's signature pattern affects that user's performance, this approach is useful for CDMA optical systems with multiple performance requirements.

  18. Gardening in the desert: a spatial optimization approach to locating gardens in rapidly expanding urban environments.

    Science.gov (United States)

    Mack, Elizabeth A; Tong, Daoqin; Credit, Kevin

    2017-10-16

    Food access is a global issue, and for this reason, a wealth of studies are dedicated to understanding the location of food deserts and the benefits of urban gardens. However, few studies have linked these two strands of research together to analyze whether urban gardening activity may be a step forward in addressing issues of access for food desert residents. The Phoenix, Arizona metropolitan area is used as a case to demonstrate the utility of spatial optimization models for siting urban gardens near food deserts and on vacant land. The locations of urban gardens are derived from a list obtained from the Maricopa County Cooperative Extension office at the University of Arizona which were geo located and aggregated to Census tracts. Census tracts were then assigned to one of three categories: tracts that contain a garden, tracts that are immediately adjacent to a tract with a garden, and all other non-garden/non-adjacent census tracts. Analysis of variance is first used to ascertain whether there are statistical differences in the demographic, socio-economic, and land use profiles of these three categories of tracts. A maximal covering spatial optimization model is then used to identify potential locations for future gardening activities. A constraint of these models is that gardens be located on vacant land, which is a growing problem in rapidly urbanizing environments worldwide. The spatial analysis of garden locations reveals that they are centrally located in tracts with good food access. Thus, the current distribution of gardens does not provide an alternative food source to occupants of food deserts. The maximal covering spatial optimization model reveals that gardens could be sited in alternative locations to better serve food desert residents. In fact, 53 gardens may be located to cover 96.4% of all food deserts. This is an improvement over the current distribution of gardens where 68 active garden sites provide coverage to a scant 8.4% of food desert

  19. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  20. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  1. The “jaundice hotline” for the rapid assessment of patients with jaundice

    Science.gov (United States)

    Mitchell, Jonathan; Hussaini, Hyder; McGovern, Dermot; Farrow, Richard; Maskell, Giles; Dalton, Harry

    2002-01-01

    Problem Patients with jaundice require rapid diagnosis and treatment, yet such patients are often subject to delay. Design An open referral, rapid access jaundice clinic was established by reorganisation of existing services and without the need for significant extra resources. Background and setting A large general hospital in a largely rural and geographically isolated area. Key measures for improvement Waiting times for referral, consultation, diagnosis, and treatment, length of stay in hospital, and general practitioners' and patients' satisfaction with the service. Strategies for change Referrals were made through a 24 hour telephone answering machine and fax line. Initial assessment of patients was carried out by junior staff as part of their working week. Dedicated ultrasonography appointments were made available. Effects of change Of 107 patients seen in the first year of the service, 62 had biliary obstruction. The mean time between referral and consultation was 2.5 days. Patients who went on to endoscopic retrograde cholangiopancreatography waited 5.7 days on average. The mean length of stay in hospital in the 69 patients who were admitted was 6.1 days, compared with 11.5 days in 1996, as shown by audit data. Nearly all the 36 general practices (95%) and the 30 consecutive patients (97%) that were surveyed rated the service as above average or excellent. Lessons learnt An open referral, rapid access service for patients with jaundice can shorten time to diagnosis and treatment and length of stay in hospital. These improvements can occur through the reorganisation of existing services and with minimal extra cost. PMID:12142314

  2. A novel method of rapidly modeling optical properties of actual photonic crystal fibres

    International Nuclear Information System (INIS)

    Li-Wen, Wang; Shu-Qin, Lou; Wei-Guo, Chen; Hong-Lei, Li

    2010-01-01

    The flexible structure of photonic crystal fibre not only offers novel optical properties but also brings some difficulties in keeping the fibre structure in the fabrication process which inevitably cause the optical properties of the resulting fibre to deviate from the designed properties. Therefore, a method of evaluating the optical properties of the actual fibre is necessary for the purpose of application. Up to now, the methods employed to measure the properties of the actual photonic crystal fibre often require long fibre samples or complex expensive equipments. To our knowledge, there are few studies of modeling an actual photonic crystal fibre and evaluating its properties rapidly. In this paper, a novel method, based on the combination model of digital image processing and the finite element method, is proposed to rapidly model the optical properties of the actual photonic crystal fibre. Two kinds of photonic crystal fibres made by Crystal Fiber A/S are modeled. It is confirmed from numerical results that the proposed method is simple, rapid and accurate for evaluating the optical properties of the actual photonic crystal fibre without requiring complex equipment. (rapid communication)

  3. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  4. Enabling Access to Digital Media for the Profoundly Disabled, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — The system proposed in this effort will allow the handicapped individual with hand/arm motor impairment to use the computer and access digital libraries on the...

  5. 75 FR 43747 - Americans With Disabilities Act (ADA) Accessibility Guidelines for Transportation Vehicles

    Science.gov (United States)

    2010-07-26

    ... intercity rail) will be revised and updated at a future date. DATES: Comments must be received by November... systems (e.g., rapid rail, light rail, commuter rail, and intercity rail) will be revised and updated at a... traveling in large accessible transit vehicles,'' 32 Medical Engineering & Physics 230-236 (2010). T303.8.1...

  6. Combined single-mode/multimode fiber link supporting simplified in-building 60-GHz gigabit wireless access

    DEFF Research Database (Denmark)

    Pham, Tien Thang; Lebedev, Alexander; Beltrán, Marta

    2012-01-01

    In this paper, we propose and experimentally demonstrate a simple, cost-effective hybrid gigabit fiber-wireless system for in-building wireless access. Simplicity and cost-effectiveness are achieved in all parts of the system by utilizing direct laser modulation, optical frequency up-conversion, ......In this paper, we propose and experimentally demonstrate a simple, cost-effective hybrid gigabit fiber-wireless system for in-building wireless access. Simplicity and cost-effectiveness are achieved in all parts of the system by utilizing direct laser modulation, optical frequency up...

  7. A rapid reliability estimation method for directed acyclic lifeline networks with statistically dependent components

    International Nuclear Information System (INIS)

    Kang, Won-Hee; Kliese, Alyce

    2014-01-01

    Lifeline networks, such as transportation, water supply, sewers, telecommunications, and electrical and gas networks, are essential elements for the economic and societal functions of urban areas, but their components are highly susceptible to natural or man-made hazards. In this context, it is essential to provide effective pre-disaster hazard mitigation strategies and prompt post-disaster risk management efforts based on rapid system reliability assessment. This paper proposes a rapid reliability estimation method for node-pair connectivity analysis of lifeline networks especially when the network components are statistically correlated. Recursive procedures are proposed to compound all network nodes until they become a single super node representing the connectivity between the origin and destination nodes. The proposed method is applied to numerical network examples and benchmark interconnected power and water networks in Memphis, Shelby County. The connectivity analysis results show the proposed method's reasonable accuracy and remarkable efficiency as compared to the Monte Carlo simulations

  8. F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2016-01-01

    Full Text Available Current file storage service models for cloud servers assume that users either belong to single layer with different privileges or cannot authorize privileges iteratively. Thus, the access control is not fine-grained and flexible. Besides, most access control methods at cloud servers mainly rely on computationally intensive cryptographic algorithms and, especially, may not be able to support highly dynamic ad hoc groups with addition and removal of group members. In this paper, we propose a scheme called F2AC, which is a lightweight, fine-grained, and flexible access control scheme for file storage in mobile cloud computing. F2AC can not only achieve iterative authorization, authentication with tailored policies, and access control for dynamically changing accessing groups, but also provide access privilege transition and revocation. A new access control model called directed tree with linked leaf model is proposed for further implementations in data structures and algorithms. The extensive analysis is given for justifying the soundness and completeness of F2AC.

  9. Food (In)Security in Rapidly Urbanising, Low-Income Contexts.

    Science.gov (United States)

    Tacoli, Cecilia

    2017-12-11

    Urbanisation in low and middle-income nations presents both opportunities and immense challenges. As urban centres grow rapidly, inadequate housing and the lack of basic infrastructure and services affect a large and growing proportion of their population. There is also a growing body of evidence on urban poverty and its links with environmental hazards. There is, however, limited knowledge of how these challenges affect the ways in which poor urban residents gain access to food and secure healthy and nutritious diets. With some important exceptions, current discussions on food security continue to focus on production, with limited attention to consumption. Moreover, urban consumers are typically treated as a homogenous group and access to food markets is assumed to be sufficient. This paper describes how, for the urban poor in low and middle-income countries, food affordability and utilisation are shaped by the income and non-income dimensions of poverty that include the urban space.

  10. Food (InSecurity in Rapidly Urbanising, Low-Income Contexts

    Directory of Open Access Journals (Sweden)

    Cecilia Tacoli

    2017-12-01

    Full Text Available Urbanisation in low and middle-income nations presents both opportunities and immense challenges. As urban centres grow rapidly, inadequate housing and the lack of basic infrastructure and services affect a large and growing proportion of their population. There is also a growing body of evidence on urban poverty and its links with environmental hazards. There is, however, limited knowledge of how these challenges affect the ways in which poor urban residents gain access to food and secure healthy and nutritious diets. With some important exceptions, current discussions on food security continue to focus on production, with limited attention to consumption. Moreover, urban consumers are typically treated as a homogenous group and access to food markets is assumed to be sufficient. This paper describes how, for the urban poor in low and middle-income countries, food affordability and utilisation are shaped by the income and non-income dimensions of poverty that include the urban space.

  11. Strict optical orthogonal codes for purely asynchronous code-division multiple-access applications

    Science.gov (United States)

    Zhang, Jian-Guo

    1996-12-01

    Strict optical orthogonal codes are presented for purely asynchronous optical code-division multiple-access (CDMA) applications. The proposed code can strictly guarantee the peaks of its cross-correlation functions and the sidelobes of any of its autocorrelation functions to have a value of 1 in purely asynchronous data communications. The basic theory of the proposed codes is given. An experiment on optical CDMA systems is also demonstrated to verify the characteristics of the proposed code.

  12. Cloud-based Web Services for Near-Real-Time Web access to NPP Satellite Imagery and other Data

    Science.gov (United States)

    Evans, J. D.; Valente, E. G.

    2010-12-01

    We are building a scalable, cloud computing-based infrastructure for Web access to near-real-time data products synthesized from the U.S. National Polar-Orbiting Environmental Satellite System (NPOESS) Preparatory Project (NPP) and other geospatial and meteorological data. Given recent and ongoing changes in the the NPP and NPOESS programs (now Joint Polar Satellite System), the need for timely delivery of NPP data is urgent. We propose an alternative to a traditional, centralized ground segment, using distributed Direct Broadcast facilities linked to industry-standard Web services by a streamlined processing chain running in a scalable cloud computing environment. Our processing chain, currently implemented on Amazon.com's Elastic Compute Cloud (EC2), retrieves raw data from NASA's Moderate Resolution Imaging Spectroradiometer (MODIS) and synthesizes data products such as Sea-Surface Temperature, Vegetation Indices, etc. The cloud computing approach lets us grow and shrink computing resources to meet large and rapid fluctuations (twice daily) in both end-user demand and data availability from polar-orbiting sensors. Early prototypes have delivered various data products to end-users with latencies between 6 and 32 minutes. We have begun to replicate machine instances in the cloud, so as to reduce latency and maintain near-real time data access regardless of increased data input rates or user demand -- all at quite moderate monthly costs. Our service-based approach (in which users invoke software processes on a Web-accessible server) facilitates access into datasets of arbitrary size and resolution, and allows users to request and receive tailored and composite (e.g., false-color multiband) products on demand. To facilitate broad impact and adoption of our technology, we have emphasized open, industry-standard software interfaces and open source software. Through our work, we envision the widespread establishment of similar, derived, or interoperable systems for

  13. Capability-based Access Control Delegation Model on the Federated IoT Network

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2012-01-01

    Flexibility is an important property for general access control system and especially in the Internet of Things (IoT), which can be achieved by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has...... no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. To this end, this paper presents an access delegation method with security considerations based on Capability-based Context Aware Access Control (CCAAC) model intended for federated...... machine-to-machine communication or IoT networks. The main idea of our proposed model is that the access delegation is realized by means of a capability propagation mechanism, and incorporating the context information as well as secure capability propagation under federated IoT environments. By using...

  14. Rapid determination of benzene derivatives in water samples by trace volume solvent DLLME prior to GC-FID

    Energy Technology Data Exchange (ETDEWEB)

    Diao, Chun Peng; Wei, Chao Hai; Feng, Chun Hua [South China Univ. of Technology, Guangzhou Higher Education Mega Center (China). College of Environmental Science and Engineering; Guangdong Regular Higher Education Institutions, Guangzhou (China). Key Lab. of Environmental Protection and Eco-Remediation

    2012-05-15

    An inexpensive, simple and environmentally friendly method based on dispersive liquid liquid microextraction (DLLME) for rapid determination of benzene derivatives in water samples was proposed. A significant improvement of DLLME procedure was achieved. Trace volume ethyl acetate (60 {mu}L) was exploited as dispersion solvent instead of common ones such as methanol and acetone, the volume of which was more than 0.5 mL, and the organic solvent required in DLLME was reduced to a great extent. Only 83-{mu}L organic solvent was consumed in the whole analytic process and the preconcentration procedure was less than 10 min. The advantageous approach coupled with gas chromatograph-flame ionization detector was proposed for the rapid determination of benzene, toluene, ethylbenzene and xylene isomers in water samples. Results showed that the proposed approach was an efficient method for rapid determination of benzene derivatives in aqueous samples. (orig.)

  15. MacroEvoLution: A New Method for the Rapid Generation of Novel Scaffold-Diverse Macrocyclic Libraries.

    Science.gov (United States)

    Saupe, Jörn; Kunz, Oliver; Haustedt, Lars Ole; Jakupovic, Sven; Mang, Christian

    2017-09-04

    Macrocycles are a structural class bearing great promise for future challenges in medicinal chemistry. Nevertheless, there are few flexible approaches for the rapid generation of structurally diverse macrocyclic compound collections. Here, an efficient method for the generation of novel macrocyclic peptide-based scaffolds is reported. The process, named here as "MacroEvoLution", is based on a cyclization screening approach that gives reliable access to novel macrocyclic architectures. Classification of building blocks into specific pools ensures that scaffolds with orthogonally addressable functionalities are generated, which can easily be used for the generation of structurally diverse compound libraries. The method grants rapid access to novel scaffolds with scalable synthesis (multi gram scale) and the introduction of further diversity at a late stage. Despite being developed for peptidic systems, the approach can easily be extended for the synthesis of systems with a decreased peptidic character. © 2017 The Authors. Published by Wiley-VCH Verlag GmbH & Co. KGaA.

  16. Evidence supporting broader access to safe legal abortion.

    Science.gov (United States)

    Faúndes, Anibal; Shah, Iqbal H

    2015-10-01

    Unsafe abortion continues to be a major cause of maternal death; it accounts for 14.5% of all maternal deaths globally and almost all of these deaths occur in countries with restrictive abortion laws. A strong body of accumulated evidence shows that the simple means to drastically reduce unsafe abortion-related maternal deaths and morbidity is to make abortion legal and institutional termination of pregnancy broadly accessible. Despite this evidence, abortion is denied even when the legal condition for abortion is met. The present article aims to contribute to a better understanding that one can be in favor of greater access to safe abortion services, while at the same time not be "in favor of abortion," by reviewing the evidence that indicates that criminalization of abortion only increases mortality and morbidity without decreasing the incidence of induced abortion, and that decriminalization rapidly reduces abortion-related mortality and does not increase abortion rates. Copyright © 2015. Published by Elsevier Ireland Ltd.

  17. A DNA 'barcode blitz': rapid digitization and sequencing of a natural history collection.

    Science.gov (United States)

    Hebert, Paul D N; Dewaard, Jeremy R; Zakharov, Evgeny V; Prosser, Sean W J; Sones, Jayme E; McKeown, Jaclyn T A; Mantle, Beth; La Salle, John

    2013-01-01

    DNA barcoding protocols require the linkage of each sequence record to a voucher specimen that has, whenever possible, been authoritatively identified. Natural history collections would seem an ideal resource for barcode library construction, but they have never seen large-scale analysis because of concerns linked to DNA degradation. The present study examines the strength of this barrier, carrying out a comprehensive analysis of moth and butterfly (Lepidoptera) species in the Australian National Insect Collection. Protocols were developed that enabled tissue samples, specimen data, and images to be assembled rapidly. Using these methods, a five-person team processed 41,650 specimens representing 12,699 species in 14 weeks. Subsequent molecular analysis took about six months, reflecting the need for multiple rounds of PCR as sequence recovery was impacted by age, body size, and collection protocols. Despite these variables and the fact that specimens averaged 30.4 years old, barcode records were obtained from 86% of the species. In fact, one or more barcode compliant sequences (>487 bp) were recovered from virtually all species represented by five or more individuals, even when the youngest was 50 years old. By assembling specimen images, distributional data, and DNA barcode sequences on a web-accessible informatics platform, this study has greatly advanced accessibility to information on thousands of species. Moreover, much of the specimen data became publically accessible within days of its acquisition, while most sequence results saw release within three months. As such, this study reveals the speed with which DNA barcode workflows can mobilize biodiversity data, often providing the first web-accessible information for a species. These results further suggest that existing collections can enable the rapid development of a comprehensive DNA barcode library for the most diverse compartment of terrestrial biodiversity - insects.

  18. Rapid Alterations in Perirenal Adipose Tissue Transcriptomic Networks with Cessation of Voluntary Running.

    Directory of Open Access Journals (Sweden)

    Gregory N Ruegsegger

    Full Text Available In maturing rats, the growth of abdominal fat is attenuated by voluntary wheel running. After the cessation of running by wheel locking, a rapid increase in adipose tissue growth to a size that is similar to rats that have never run (i.e. catch-up growth has been previously reported by our lab. In contrast, diet-induced increases in adiposity have a slower onset with relatively delayed transcriptomic responses. The purpose of the present study was to identify molecular pathways associated with the rapid increase in adipose tissue after ending 6 wks of voluntary running at the time of puberty. Age-matched, male Wistar rats were given access to running wheels from 4 to 10 weeks of age. From the 10th to 11th week of age, one group of rats had continued wheel access, while the other group had one week of wheel locking. Perirenal adipose tissue was extracted, RNA sequencing was performed, and bioinformatics analyses were executed using Ingenuity Pathway Analysis (IPA. IPA was chosen to assist in the understanding of complex 'omics data by integrating data into networks and pathways. Wheel locked rats gained significantly more fat mass and significantly increased body fat percentage between weeks 10-11 despite having decreased food intake, as compared to rats with continued wheel access. IPA identified 646 known transcripts differentially expressed (p < 0.05 between continued wheel access and wheel locking. In wheel locked rats, IPA revealed enrichment of transcripts for the following functions: extracellular matrix, macrophage infiltration, immunity, and pro-inflammatory. These findings suggest that increases in visceral adipose tissue that accompanies the cessation of pubertal physical activity are associated with the alteration of multiple pathways, some of which may potentiate the development of pubertal obesity and obesity-associated systemic low-grade inflammation that occurs later in life.

  19. 'Predatory' open access: a longitudinal study of article volumes and market characteristics.

    Science.gov (United States)

    Shen, Cenyu; Björk, Bo-Christer

    2015-10-01

    A negative consequence of the rapid growth of scholarly open access publishing funded by article processing charges is the emergence of publishers and journals with highly questionable marketing and peer review practices. These so-called predatory publishers are causing unfounded negative publicity for open access publishing in general. Reports about this branch of e-business have so far mainly concentrated on exposing lacking peer review and scandals involving publishers and journals. There is a lack of comprehensive studies about several aspects of this phenomenon, including extent and regional distribution. After an initial scan of all predatory publishers and journals included in the so-called Beall's list, a sample of 613 journals was constructed using a stratified sampling method from the total of over 11,000 journals identified. Information about the subject field, country of publisher, article processing charge and article volumes published between 2010 and 2014 were manually collected from the journal websites. For a subset of journals, individual articles were sampled in order to study the country affiliation of authors and the publication delays. Over the studied period, predatory journals have rapidly increased their publication volumes from 53,000 in 2010 to an estimated 420,000 articles in 2014, published by around 8,000 active journals. Early on, publishers with more than 100 journals dominated the market, but since 2012 publishers in the 10-99 journal size category have captured the largest market share. The regional distribution of both the publisher's country and authorship is highly skewed, in particular Asia and Africa contributed three quarters of authors. Authors paid an average article processing charge of 178 USD per article for articles typically published within 2 to 3 months of submission. Despite a total number of journals and publishing volumes comparable to respectable (indexed by the Directory of Open Access Journals) open access

  20. The Increasing Incidence of Thyroid Cancer: The Influence of Access to Care

    Science.gov (United States)

    Sikora, Andrew G.; Tosteson, Tor D.

    2013-01-01

    Background The rapidly rising incidence of papillary thyroid cancer may be due to overdiagnosis of a reservoir of subclinical disease. To conclude that overdiagnosis is occurring, evidence for an association between access to health care and the incidence of cancer is necessary. Methods We used Surveillance, Epidemiology, and End Results (SEER) data to examine U.S. papillary thyroid cancer incidence trends in Medicare-age and non–Medicare-age cohorts over three decades. We performed an ecologic analysis across 497 U.S. counties, examining the association of nine county-level socioeconomic markers of health care access and the incidence of papillary thyroid cancer. Results Papillary thyroid cancer incidence is rising most rapidly in Americans over age 65 years (annual percentage change, 8.8%), who have broad health insurance coverage through Medicare. Among those under 65, in whom health insurance coverage is not universal, the rate of increase has been slower (annual percentage change, 6.4%). Over three decades, the mortality rate from thyroid cancer has not changed. Across U.S. counties, incidence ranged widely, from 0 to 29.7 per 100,000. County papillary thyroid cancer incidence was significantly correlated with all nine sociodemographic markers of health care access: it was positively correlated with rates of college education, white-collar employment, and family income; and negatively correlated with the percentage of residents who were uninsured, in poverty, unemployed, of nonwhite ethnicity, non-English speaking, and lacking high school education. Conclusion Markers for higher levels of health care access, both sociodemographic and age-based, are associated with higher papillary thyroid cancer incidence rates. More papillary thyroid cancers are diagnosed among populations with wider access to healthcare. Despite the threefold increase in incidence over three decades, the mortality rate remains unchanged. Together with the large subclinical reservoir of

  1. Estimating spatial accessibility to facilities on the regional scale: an extended commuting-based interaction potential model

    Directory of Open Access Journals (Sweden)

    Charreire Hélène

    2011-01-01

    Full Text Available Abstract Background There is growing interest in the study of the relationships between individual health-related behaviours (e.g. food intake and physical activity and measurements of spatial accessibility to the associated facilities (e.g. food outlets and sport facilities. The aim of this study is to propose measurements of spatial accessibility to facilities on the regional scale, using aggregated data. We first used a potential accessibility model that partly makes it possible to overcome the limitations of the most frequently used indices such as the count of opportunities within a given neighbourhood. We then propose an extended model in order to take into account both home and work-based accessibility for a commuting population. Results Potential accessibility estimation provides a very different picture of the accessibility levels experienced by the population than the more classical "number of opportunities per census tract" index. The extended model for commuters increases the overall accessibility levels but this increase differs according to the urbanisation level. Strongest increases are observed in some rural municipalities with initial low accessibility levels. Distance to major urban poles seems to play an essential role. Conclusions Accessibility is a multi-dimensional concept that should integrate some aspects of travel behaviour. Our work supports the evidence that the choice of appropriate accessibility indices including both residential and non-residential environmental features is necessary. Such models have potential implications for providing relevant information to policy-makers in the field of public health.

  2. Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information

    Directory of Open Access Journals (Sweden)

    Raik Kuhlisch

    2017-07-01

    Full Text Available This article discusses potential clashes between different types of security policies that regulate resource access requests on clinical patient data in hospitals by employees. Attribute-based Access Control (ABAC is proposed as a proper means for such regulation. A proper representation of ABAC policies must include a handling of policy attributes among different policy types. In this article, we propose a semantic policy model with predefined policy conflict categories. A conformance verification function detects erroneous, clashing or mutually susceptible rules early during the policy planning phase. The model and conflicts are used in a conceptual application environment and evaluated in a technical experiment during an interoperability test event.

  3. Discovery of accessible locations using region-based geo-social data

    KAUST Repository

    Wang, Yan; Li, Jianmin; Zhong, Ying; Zhu, Shunzhi; Guo, Danhuai; Shang, Shuo

    2018-01-01

    Geo-social data plays a significant role in location discovery and recommendation. In this light, we propose and study a novel problem of discovering accessible locations in spatial networks using region-based geo-social data. Given a set Q of query

  4. MPTCP Tunnel: An Architecture for Aggregating Bandwidth of Heterogeneous Access Networks

    Directory of Open Access Journals (Sweden)

    Xiaolan Liu

    2018-01-01

    Full Text Available Fixed and cellular networks are two typical access networks provided by operators. Fixed access network is widely employed; nevertheless, its bandwidth is sometimes not sufficient enough to meet user bandwidth requirements. Meanwhile, cellular access network owns unique advantages of wider coverage, faster increasing link speed, more flexible deployment, and so forth. Therefore, it is attractive for operators to mitigate the bandwidth shortage by bundling these two. Actually, there have been existing schemes proposed to aggregate the bandwidth of two access networks, whereas they all have their own problems, like packet reordering or extra latency overhead. To address this problem, we design new architecture, MPTCP Tunnel, to aggregate the bandwidth of multiple heterogeneous access networks from the perspective of operators. MPTCP Tunnel uses MPTCP, which solves the reordering problem essentially, to bundle multiple access networks. Besides, MPTCP Tunnel sets up only one MPTCP connection at play which adapts itself to multiple traffic types and TCP flows. Furthermore, MPTCP Tunnel forwards intact IP packets through access networks, maintaining the end-to-end TCP semantics. Experimental results manifest that MPTCP Tunnel can efficiently aggregate the bandwidth of multiple access networks and is more adaptable to the increasing heterogeneity of access networks than existing mechanisms.

  5. Health care access for rural youth on equal terms? A mixed methods study protocol in northern Sweden.

    Science.gov (United States)

    Goicolea, Isabel; Carson, Dean; San Sebastian, Miguel; Christianson, Monica; Wiklund, Maria; Hurtig, Anna-Karin

    2018-01-11

    The purpose of this paper is to propose a protocol for researching the impact of rural youth health service strategies on health care access. There has been no published comprehensive assessment of the effectiveness of youth health strategies in rural areas, and there is no clearly articulated model of how such assessments might be conducted. The protocol described here aims to gather information to; i) Assess rural youth access to health care according to their needs, ii) Identify and understand the strategies developed in rural areas to promote youth access to health care, and iii) Propose actions for further improvement. The protocol is described with particular reference to research being undertaken in the four northernmost counties of Sweden, which contain a widely dispersed and diverse youth population. The protocol proposes qualitative and quantitative methodologies sequentially in four phases. First, to map youth access to health care according to their health care needs, including assessing horizontal equity (equal use of health care for equivalent health needs,) and vertical equity (people with greater health needs should receive more health care than those with lesser needs). Second, a multiple case study design investigates strategies developed across the region (youth clinics, internet applications, public health programs) to improve youth access to health care. Third, qualitative comparative analysis of the 24 rural municipalities in the region identifies the best combination of conditions leading to high youth access to health care. Fourth, a concept mapping study involving rural stakeholders, care providers and youth provides recommended actions to improve rural youth access to health care. The implementation of this research protocol will contribute to 1) generating knowledge that could contribute to strengthening rural youth access to health care, as well as to 2) advancing the application of mixed methods to explore access to health care.

  6. Reducing the MAC Latency for IEEE 802.11 Vehicular Internet Access

    Directory of Open Access Journals (Sweden)

    Kang Moonsoo

    2010-01-01

    Full Text Available In an intermittently connected environment, access points are sparsely distributed throughout an area. As mobile users travel along the roadway, they can opportunistically connect, albeit temporarily, to roadside 802.11 (Wi-Fi APs for Internet access. Net-working characteristics of vehicular Internet access in an intermittently connected envi ronment face numerous challenges, such as short periods of connectivity and unpredictable connection times. To meet these challenges, we propose an Access Point Report (APR protocol where mobile stations opportunistically collaborate by broadcasting an APR to other mobile stations to fully utilize the short-lived connection periods. APR can optimize the use of short connection periods by minimizing the scanning delay and also act as a hint that enables mobile users to predict when connection can be established.

  7. Gender Relations in Access to and Control over Resources in Awra ...

    African Journals Online (AJOL)

    Administrator

    participant observation of gender roles and relations in the study community. ..... in domestic and public spheres, access to and control over locally available ...... Proposal on Leadership Initiatives in Awra Amba Community Case Study on.

  8. An IEEE 802.3 Compatible Real Time Medium Access Control with Length-based Priority

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A new medium access control method is proposed over the predominant Ethernet broadcast channel. Taking advantages of intrinsic variable length characteristic of standard Ethernet frame, message-oriented dynamic priority mechanism is established. Prioritized medium access control operates under a so-called block mode in event of collisions.High priority messages have a chance to preempt block status incurred by low priority ones. By this means, the new MAC provides a conditional deterministic real time performance beyond a statistical one. Experiments demonstrate effectiveness and attractiveness of the proposed scheme. Moreover, this new MAC is completely compatible with IEEE802.3.

  9. On the Performance of One Stage Massive Random Access Protocols in 5G Systems

    DEFF Research Database (Denmark)

    Mahmood, Nurul Huda; Pratas, Nuno; Jacobsen, Thomas

    2016-01-01

    use case. Smart utility meters, automated sensors in farms, and vehicle tracking nodes for logistics monitoring are all examples of emerging mMTC devices. Ensuring efficient mechanisms to access the wireless channel for such a massive number of densely deployed devices is a key challenge posed by m......MTC applications. A framework for the comparative analysis of the one-stage massive access protocol with respect to important performance metrics for mMTC services is proposed in this paper. The proposed framework allows us to determine the scenarios where the relative simple one-stage protocol can sufficiently...

  10. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    OpenAIRE

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X aut...

  11. 76 FR 5614 - Applications and Amendments to Facility Operating Licenses Involving Proposed No Significant...

    Science.gov (United States)

    2011-02-01

    ... against cyber attacks up to and including the design basis threat. Part one of the proposed change is... of adequate protection against cyber attacks, up to and including the design basis threat. The... you do not have access to ADAMS or if there are problems in accessing the documents located in ADAMS...

  12. Rapid determination of Faraday rotation in optical glasses by means of secondary Faraday modulator.

    Science.gov (United States)

    Sofronie, M; Elisa, M; Sava, B A; Boroica, L; Valeanu, M; Kuncser, V

    2015-05-01

    A rapid high sensitive method for determining the Faraday rotation of optical glasses is proposed. Starting from an experimental setup based on a Faraday rod coupled to a lock-in amplifier in the detection chain, two methodologies were developed for providing reliable results on samples presenting low and large Faraday rotations. The proposed methodologies were critically discussed and compared, via results obtained in transmission geometry, on a new series of aluminophosphate glasses with or without rare-earth doping ions. An example on how the method can be used for a rapid examination of the optical homogeneity of the sample with respect to magneto-optical effects is also provided.

  13. A Simple and Rapid Complexometric Determination of Thallium(III ...

    African Journals Online (AJOL)

    A simple, rapid and selective complexometric method is proposed for the determination of thallium(III), using mercaptoethane(EtSH) as demasking agent. The sample solution containing Tl(III) is first complexed with excess EDTA and the surplus EDTA is removed by titration at pH 5–6 with zinc sulphate solution using ...

  14. Pathways to achieve universal household access to modern energy by 2030

    Science.gov (United States)

    Pachauri, Shonali; van Ruijven, Bas J.; Nagai, Yu; Riahi, Keywan; van Vuuren, Detlef P.; Brew-Hammond, Abeeku; Nakicenovic, Nebojsa

    2013-06-01

    A lack of access to modern energy impacts health and welfare and impedes development for billions of people. Growing concern about these impacts has mobilized the international community to set new targets for universal modern energy access. However, analyses exploring pathways to achieve these targets and quantifying the potential costs and benefits are limited. Here, we use two modelling frameworks to analyse investments and consequences of achieving total rural electrification and universal access to clean-combusting cooking fuels and stoves by 2030. Our analysis indicates that these targets can be achieved with additional investment of US200565-86 billion per year until 2030 combined with dedicated policies. Only a combination of policies that lowers costs for modern cooking fuels and stoves, along with more rapid electrification, can enable the realization of these goals. Our results demonstrate the critical importance of accounting for varying demands and affordability across heterogeneous household groups in both analysis and policy setting. While the investments required are significant, improved access to modern cooking fuels alone can avert between 0.6 and 1.8 million premature deaths annually in 2030 and enhance wellbeing substantially.

  15. Pathways to achieve universal household access to modern energy by 2030

    International Nuclear Information System (INIS)

    Pachauri, Shonali; Nagai, Yu; Riahi, Keywan; Nakicenovic, Nebojsa; Van Ruijven, Bas J; Van Vuuren, Detlef P; Brew-Hammond, Abeeku

    2013-01-01

    A lack of access to modern energy impacts health and welfare and impedes development for billions of people. Growing concern about these impacts has mobilized the international community to set new targets for universal modern energy access. However, analyses exploring pathways to achieve these targets and quantifying the potential costs and benefits are limited. Here, we use two modelling frameworks to analyse investments and consequences of achieving total rural electrification and universal access to clean-combusting cooking fuels and stoves by 2030. Our analysis indicates that these targets can be achieved with additional investment of US$ 2005 65–86 billion per year until 2030 combined with dedicated policies. Only a combination of policies that lowers costs for modern cooking fuels and stoves, along with more rapid electrification, can enable the realization of these goals. Our results demonstrate the critical importance of accounting for varying demands and affordability across heterogeneous household groups in both analysis and policy setting. While the investments required are significant, improved access to modern cooking fuels alone can avert between 0.6 and 1.8 million premature deaths annually in 2030 and enhance wellbeing substantially. (letter)

  16. Physiological genomics of response to soil drying in diverse Arabidopsis accessions.

    Science.gov (United States)

    Des Marais, David L; McKay, John K; Richards, James H; Sen, Saunak; Wayne, Tierney; Juenger, Thomas E

    2012-03-01

    Arabidopsis thaliana, like many species, is characterized by abundant genetic variation. This variation is rapidly being cataloged at the sequence level, but careful dissection of genetic variation in whole-organism responses to stresses encountered in the natural environment are lacking; this functional variation can be exploited as a natural mutant screen to determine gene function. Here, we document physiological and transcriptomic response to soil drying in 17 natural accessions of Arabidopsis. By imposing ecologically realistic stress conditions, we found that acclimation in Arabidopsis involved a strong signature of increased investment in photosynthesis, carbohydrate turnover, and root growth. Our results extend previous work in the Columbia accession suggesting that abscisic acid signaling pathways play an important role in drought stress response. We also identified several mechanisms, including an increase in leaf nitrogen concentration and upregulation of two-component signaling relays, that were common to most natural accessions but had not been identified in studies using only the Columbia accession. Principal component analysis reveals strong correlations between suites of genes and specific physiological responses to stress. The functional variants we identified may represent adaptive mutations in natural habitats and useful variants for agronomic improvement of crop species.

  17. Efficient scheduling request algorithm for opportunistic wireless access

    KAUST Repository

    Nam, Haewoon

    2011-08-01

    An efficient scheduling request algorithm for opportunistic wireless access based on user grouping is proposed in this paper. Similar to the well-known opportunistic splitting algorithm, the proposed algorithm initially adjusts (or lowers) the threshold during a guard period if no user sends a scheduling request. However, if multiple users make requests simultaneously and therefore a collision occurs, the proposed algorithm no longer updates the threshold but narrows down the user search space by splitting the users into multiple groups iteratively, whereas the opportunistic splitting algorithm keeps adjusting the threshold until a single user is found. Since the threshold is only updated when no user sends a request, it is shown that the proposed algorithm significantly alleviates the burden of the signaling for the threshold distribution to the users by the scheduler. More importantly, the proposed algorithm requires a less number of mini-slots to make a user selection given a certain scheduling outage probability. © 2011 IEEE.

  18. 78 FR 17938 - Notice of Proposed Information; Collection for Public Comment; Recordkeeping for HUD's Continuum...

    Science.gov (United States)

    2013-03-25

    ... speech impairments may access this number through TTY by calling the toll-free Federal Information Relay... information: Title of Proposal: Recordkeeping for HUD's Continuum of Care Program. Description of the need for... access to and effective utilization of mainstream programs by homeless individuals and families; and...

  19. SWS: accessing SRS sites contents through Web Services.

    Science.gov (United States)

    Romano, Paolo; Marra, Domenico

    2008-03-26

    Web Services and Workflow Management Systems can support creation and deployment of network systems, able to automate data analysis and retrieval processes in biomedical research. Web Services have been implemented at bioinformatics centres and workflow systems have been proposed for biological data analysis. New databanks are often developed by taking into account these technologies, but many existing databases do not allow a programmatic access. Only a fraction of available databanks can thus be queried through programmatic interfaces. SRS is a well know indexing and search engine for biomedical databanks offering public access to many databanks and analysis tools. Unfortunately, these data are not easily and efficiently accessible through Web Services. We have developed 'SRS by WS' (SWS), a tool that makes information available in SRS sites accessible through Web Services. Information on known sites is maintained in a database, srsdb. SWS consists in a suite of WS that can query both srsdb, for information on sites and databases, and SRS sites. SWS returns results in a text-only format and can be accessed through a WSDL compliant client. SWS enables interoperability between workflow systems and SRS implementations, by also managing access to alternative sites, in order to cope with network and maintenance problems, and selecting the most up-to-date among available systems. Development and implementation of Web Services, allowing to make a programmatic access to an exhaustive set of biomedical databases can significantly improve automation of in-silico analysis. SWS supports this activity by making biological databanks that are managed in public SRS sites available through a programmatic interface.

  20. Imaging findings and referral outcomes of rapid assessment stroke clinics

    International Nuclear Information System (INIS)

    Widjaja, E.; Manuel, D.; Hodgson, T.J.; Connolly, D.J.A.; Coley, S.C.; Romanowski, C.A.J.; Gaines, P.; Cleveland, T.; Thomas, S.; Griffiths, P.D.; Doyle, C.; Venables, G.S.

    2005-01-01

    AIM: A rapid assessment stroke clinic (RASC) was established to provide a rapid diagnostic service to individuals with suspected transient cerebral or ocular ischaemia or recovered non-hospitalized strokes. In this report we review imaging findings and clinical outcomes of patients proceeding to the carotid surgery programme. METHODS: Between October 2000 and December 2002, 1339 people attended the RASC. The findings of head CT and carotid Doppler ultrasound of the 1320 patients who underwent brain and carotid imaging were reviewed, and the number subsequently proceeding to carotid angiography and intervention was reported. RESULTS: CT head scans were normal in 57% of cases; 38% demonstrated ischaemia or infarction; and 3% yielded incidental or other significant findings not related to ischaemia. On screening with carotid Doppler ultrasound, 7.5% showed greater than 50% stenosis on the symptomatic side. A total of 83 patients (6.2%) proceeded to cerebral angiography and 65 (4.8%) underwent carotid endarterectomy or endovascular repair. CONCLUSION: Rapid-access neurovascular clinics are efficient in selecting patients for carotid intervention, but this is at a cost and the number of potential strokes prevented is small. Alternative management pathways based on immediate medical treatment need to be evaluated

  1. Hopping control channel MAC protocol for opportunistic spectrum access networks

    Institute of Scientific and Technical Information of China (English)

    FU Jing-tuan; JI Hong; MAO Xu

    2010-01-01

    Opportunistic spectrum access (OSA) is considered as a promising approach to mitigate spectrum scarcity by allowing unlicensed users to exploit spectrum opportunities in licensed frequency bands. Derived from the existing channel-hopping multiple access (CHMA) protocol,we introduce a hopping control channel medium access control (MAC) protocol in the context of OSA networks. In our proposed protocol,all nodes in the network follow a common channel-hopping sequence; every frequency channel can be used as control channel and data channel. Considering primary users' occupancy of the channel,we use a primary user (PU) detection model to calculate the channel availability for unlicensed users' access. Then,a discrete Markov chain analytical model is applied to describe the channel states and deduce the system throughput. Through simulation,we present numerical results to demonstrate the throughput performance of our protocol and thus validate our work.

  2. 78 FR 58264 - Servicemembers' Group Life Insurance and Veterans' Group Life Insurance Information Access

    Science.gov (United States)

    2013-09-23

    ... DEPARTMENT OF VETERANS AFFAIRS 38 CFR Part 9 RIN 2900-AO42 Servicemembers' Group Life Insurance and Veterans' Group Life Insurance Information Access AGENCY: Department of Veterans Affairs. ACTION: Proposed rule. SUMMARY: The Department of Veterans Affairs (VA) proposes to amend its regulations governing...

  3. Average opportunity-based accessibility of public transit systems to grocery stores in small urban areas

    Directory of Open Access Journals (Sweden)

    Nimish Dharmadhikari

    2015-12-01

    Full Text Available This research studies the accessibility of grocery stores to university students using the public transportation system, drawing from a case study of Fargo, North Dakota. Taking into consideration the combined travel time components of walking, riding, and waiting, this study measures two types of accessibilities: accessibility to reach a particular place and accessibility to reach the bus stop to ride the public transit system. These two accessibilities are interdependent and cannot perform without each other. A new method to calculate the average accessibility measure for the transit routes is proposed. A step-wise case study analysis indicates that one route provides accessibility to a grocery store in eight minutes. This also suggests that the North Dakota State University area has moderate accessibility to grocery stores.

  4. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  5. 75 FR 61249 - Proposed Information Collection (Annual Certification of Veteran Status and Veteran-Relatives...

    Science.gov (United States)

    2010-10-04

    ..., non-VBA employees in VBA space and Veteran Service Organization employees who have access to VA's... (VBA) is announcing an opportunity for public comment on the proposed collection of certain information... the following collection of information, VBA invites comments on: (1) Whether the proposed collection...

  6. 75 FR 61858 - Proposed Information Collection (Annual Certification of Veteran Status and Veteran-Relatives...

    Science.gov (United States)

    2010-10-06

    ..., non-VBA employees in VBA space and Veteran Service Organization employees who have access to VA's... (VBA) is announcing an opportunity for public comment on the proposed collection of certain information... the following collection of information, VBA invites comments on: (1) Whether the proposed collection...

  7. Dealing with the Empty Vehicle Movements in Personal Rapid Transit System with Batteries Constraints in a Dynamic Context

    Directory of Open Access Journals (Sweden)

    Ezzeddine Fatnassi

    2017-01-01

    Full Text Available The Personal Rapid Transit is a new emergent transportation tool. It relies on using a set of small driverless electric vehicles to transport people on demand. Because of the specific on-demand characteristic of the Personal Rapid Transit system, many Personal Rapid Transit vehicles would move empty which results in a high level of wasted transportation capacity. This is enhanced while using Personal Rapid Transit vehicles with limited electric battery capacity. This paper deals with this problem in a real time context while minimizing the set of empty vehicle movements. First, a mathematical formulation to benchmark waiting time of passengers in Personal Rapid Transit systems is proposed. Then, a simulation model that captures the main features of the Personal Rapid Transit system is developed. A decision support system which integrates several real time solution strategies as well as a simulation module is proposed. Our dispatching strategies are evaluated and compared based on our simulation model. The efficiency of our method is tested through extensive test studies.

  8. Rapid access to information resources in clinical biochemistry: medical applications of Personal Digital Assistants (PDA).

    Science.gov (United States)

    Serdar, Muhittin A; Turan, Mustafa; Cihan, Murat

    2008-06-01

    Laboratory specialists currently need to access scientific-based information at anytime and anywhere. A considerable period of time and too much effort are required to access this information through existing accumulated data. Personal digital assistants (PDA) are supposed to provide an effective solution with commercial software for this problem. In this study, 11 commercial software products (UpToDate, ePocrates, Inforetrive, Pepid, eMedicine, FIRST Consult, and 5 laboratory e-books released by Skyscape and/or Isilo) were selected and the benefits of their use were evaluated by seven laboratory specialists. The assessment of the software was performed based on the number of the tests included, the software content of detailed information for each test-like process, method, interpretation of results, reference ranges, critical values, interferences, equations, pathophysiology, supplementary technical details such as sample collection principles, and additional information such as linked references, evidence-based data, test cost, etc. In terms of technique, the following items are considered: the amount of memory required to run the software, the graphical user interface, which is a user-friendly instrument, and the frequency of new and/or up-date releases. There is still no perfect program, as we have anticipated. Interpretation of laboratory results may require software with an integrated program. However, methodological data are mostly not included in the software evaluated. It seems that these shortcomings will be fixed in the near future, and PDAs and relevant medical applications will also become indispensable for all physicians including laboratory specialists in the field of training/education and in patient care.

  9. Local charge nonequilibrium and anomalous energy dependence of normalized moments in narrow rapidity windows

    International Nuclear Information System (INIS)

    Wu Yuanfang; Liu Lianshou

    1990-01-01

    From the study of even and odd multiplicity distributions for hadron-hadron collision in different rapidity windows, we propose a simple picture for charge correlation with nonzero correlation length and calculate the multiplicity distributions and the normalized moments in different rapidity windows at different energies. The results explain the experimentally observed coincidence and separation of even and odd distributions and also the anomalous energy dependence of normalized moments in narrow rapidity windows. The reason for the separation of even-odd distributions, appearing first at large multiplicities, is shown to be energy conservation. The special role of no-particle events in narrow rapidity windows is pointed out

  10. Open Access Publishing from the Legal Point of View. Why Freedom of Information Rules and Other Legal Principles Matter. Towards A New Fair Open Access Model.

    Directory of Open Access Journals (Sweden)

    Jiří Kolman

    2013-10-01

    Full Text Available This article focuses on aspects that, as far as we know, have never been discussed in previous debates dealing with open access. The EU and national competition legal rules ensuring fair competition are a rather neglected aspect of open access. Another crucial topic is the unfairness of the current publication system. Why should commercial publishers be paid by publicly supported research such as EU or national research programmes? In the article a new publication model is suggested. The proposed model is trying to keep high research standards, to be fair to researchers and the public and to take into account the actual costs of the new open access model.

  11. Space-Time Trellis Coded 8PSK Schemes for Rapid Rayleigh Fading Channels

    Directory of Open Access Journals (Sweden)

    Salam A. Zummo

    2002-05-01

    Full Text Available This paper presents the design of 8PSK space-time (ST trellis codes suitable for rapid fading channels. The proposed codes utilize the design criteria of ST codes over rapid fading channels. Two different approaches have been used. The first approach maximizes the symbol-wise Hamming distance (HD between signals leaving from or entering to the same encoder′s state. In the second approach, set partitioning based on maximizing the sum of squared Euclidean distances (SSED between the ST signals is performed; then, the branch-wise HD is maximized. The proposed codes were simulated over independent and correlated Rayleigh fading channels. Coding gains up to 4 dB have been observed over other ST trellis codes of the same complexity.

  12. Pulse patterning effect in optical pulse division multiplexing for flexible single wavelength multiple access optical network

    Science.gov (United States)

    Jung, Sun-Young; Kim, Chang-Hun; Han, Sang-Kook

    2018-05-01

    A demand for high spectral efficiency requires multiple access within a single wavelength, but the uplink signals are significantly degraded because of optical beat interference (OBI) in intensity modulation/direct detection system. An optical pulse division multiplexing (OPDM) technique was proposed that could effectively reduce the OBI via a simple method as long as near-orthogonality is satisfied, but the condition was strict, and thus, the number of multiplexing units was very limited. We propose pulse pattern enhanced OPDM (e-OPDM) to reduce the OBI and improve the flexibility in multiple access within a single wavelength. The performance of the e-OPDM and patterning effect are experimentally verified after 23-km single mode fiber transmission. By employing pulse patterning in OPDM, the tight requirement was relaxed by extending the optical delay dynamic range. This could support more number of access with reduced OBI, which could eventually enhance a multiple access function.

  13. Shared access protocol (SAP) in femtocell channel resources for cellular coverage enhancement

    KAUST Repository

    Magableh, Amer M.

    2012-12-01

    Femtocells are promising techniques employed in cellular systems to enhance the indoor coverage, especially in areas with high density and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named shared access protocol (SAP), that enables the unlicensed macro-cell user equipments (MC-UE) to communicate with partially closed access femtocell base stations and hence, improves and enhances the overall system performance in closed environments. For the proposed system model, we obtain, in closed-form, the main signal-to-interference plus noise ratio (SINR) characteristics, including the probability density function (PDF) and the cumulative distribution function (CDF). In addition, these expressions are further used to derive several performance metrics in closed-form, such as, the average bit error rate (BER), outage probability, and the average channel capacity for the proposed SAP herein. Furthermore, Monte-carlo simulations as well as numerical results are provided showing a good match that ensures and confirms the correctness of the derived expressions. © 2012 IEEE.

  14. Partitioning and Scheduling DSP Applications with Maximal Memory Access Hiding

    Directory of Open Access Journals (Sweden)

    Sha Edwin Hsing-Mean

    2002-01-01

    Full Text Available This paper presents an iteration space partitioning scheme to reduce the CPU idle time due to the long memory access latency. We take into consideration both the data accesses of intermediate and initial data. An algorithm is proposed to find the largest overlap for initial data to reduce the entire memory traffic. In order to efficiently hide the memory latency, another algorithm is developed to balance the ALU and memory schedules. The experiments on DSP benchmarks show that the algorithms significantly outperform the known existing methods.

  15. A General Attribute and Rule Based Role-Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.

  16. The Restoration Rapid Assessment Tool: An Access/Visual Basic application

    Science.gov (United States)

    Hiebert, Ron; Larson, D.L.; Thomas, K.; Tancreto, N.; Haines, D.; Richey, A.; Dow, T.; Drees, L.

    2009-01-01

    Managers of parks and natural areas are increasingly faced with difficult decisions concerning restoration of disturbed lands. Financial and workforce resources often limit these restoration efforts, and rarely can a manager afford to address all concerns within the region of interest. With limited resources, managers and scientists have to decide which areas will be targeted for restoration and the restoration treatments to use in these areas. A broad range of approaches are used to make such decisions, from well-researched expert opinions (Cipollini et al. 2005) to gut feeling, with variable degrees of input from site visits, data collection, and data analysis used to support the decision. A standardized approach including an analytical assessment of site characteristics based on the best information available, with a written or electronic record of all the steps taken along the way, would make comparisons among a group of sites easier and lend credibility through use of common, documented criteria at all sites. In response to these concerns, we have developed the Restoration Rapid Assessment Tool (RRAT). RRAT is based on field observations of key indicators of site degradation, stressors influencing the site, value of the site with respect to larger management objectives, likelihood of achieving the management goals, and logistical constraints to restoration. The purpose of RRAT is not to make restoration decisions or prescribe methods, but rather to ensure that a basic set of pertinent issues are considered for each site and to facilitate comparisons among sites. Several concepts have been central to the development of RRAT. First, the management goal (also known as desired future condition) of any site under evaluation should be defined before the field evaluation begins. Second, the evaluation should be based upon readily observable indicators so as to avoid cumbersome field methods. Third, the ease with which site stressors can be ameliorated must be

  17. FODA: a novel efficient multiple access protocol for highly dynamic self-organizing networks

    Science.gov (United States)

    Li, Hantao; Liu, Kai; Zhang, Jun

    2005-11-01

    Based on the concept of contention reservation for polling transmission and collision prevention strategy for collision resolution, a fair on-demand access (FODA) protocol for supporting node mobility and multihop architecture in highly dynamic self-organizing networks is proposed. In the protocol, a distributed clustering network architecture formed by self-organizing algorithm and a main idea of reserving channel resources to get polling service are adopted, so that the hidden terminal (HT) and exposed terminal (ET) problems existed in traffic transmission due to multihop architecture and wireless transmission can be eliminated completely. In addition, an improved collision prevention scheme based on binary countdown algorithm (BCA), called fair collision prevention (FCP) algorithm, is proposed to greatly eliminate unfair phenomena existed in contention access of newly active ordinary nodes and completely resolve access collisions. Finally, the performance comparison of the FODA protocol with carrier sense multiple access with collision avoidance (CSMA/CA) and polling protocols by OPNET simulation are presented. Simulation results show that the FODA protocol can overcome the disadvantages of CSMA/CA and polling protocols, and achieve higher throughput, lower average message delay and less average message dropping rate.

  18. Motion-insensitive rapid configuration relaxometry.

    Science.gov (United States)

    Nguyen, Damien; Bieri, Oliver

    2017-08-01

    Triple echo steady state (TESS) uses the lowest steady state configuration modes for rapid relaxometry. Due to its unbalanced gradient scheme, however, TESS is inherently motion-sensitive. The purpose of this work is to merge TESS with a balanced acquisition scheme for motion-insensitive rapid configuration relaxometry, termed MIRACLE. The lowest order steady state free precession (SSFP) configurations are retrieved by Fourier transformation of the frequency response of N frequency-shifted balanced SSFP (bSSFP) scans and subsequently processed for relaxometry, as proposed with TESS. Accuracy of MIRACLE is evaluated from simulations, phantom studies as well as in vivo brain and cartilage imaging at 3T. Simulations and phantom results revealed no conceptual flaw, and artifact-free configuration imaging was achieved in vivo. Overall, relaxometry results were accurate in phantoms and in good agreement for cartilage and for T2 in the brain, but apparent low T1 values were observed for brain white matter; reflecting asymmetries in the bSSFP profile. Rapid T1 and T2 mapping with MIRACLE offers analogous properties as TESS while successfully mitigating its motion-sensitivity. As a result of the Fourier transformation, relaxometry becomes sensitive to the voxel frequency distribution, which may contain useful physiologic information, such as structural brain integrity. © 2016 International Society for Magnetic Resonance in Medicine. Magn Reson Med 78:518-526, 2017. © 2016 International Society for Magnetic Resonance in Medicine. © 2016 International Society for Magnetic Resonance in Medicine.

  19. 47 CFR 76.975 - Commercial leased access dispute resolution.

    Science.gov (United States)

    2010-10-01

    ... declaration and the party submitting the protected material. The Commission has full authority to fashion... leased access complaint within 90 days of the close of the pleading cycle. (2) The Media Bureau, after... the proposals or choose to fashion its own remedy. (i) During the pendency of a dispute, a party...

  20. Rapid deuterium exchange-in time for probing conformational change

    International Nuclear Information System (INIS)

    Dharmasiri, K.; Smith, D.L.

    1995-01-01

    Isotopic exchange of protein backbone amide hydrogens has been used extensively as a sensitive probe of protein structure. One of the salient features of hydrogen exchange is the vast range of exchange rates in one protein. Isotopic exchange methods have been used to study the structural features including protein folding and unfolding (1), functionally different forms of proteins (2), protein-protein complexation (3), and protein stability parameter. Many backbone amide protons that are surface accessible and are not involved in hydrogen bonding undergo rapid deuterium exchange. In order to study, fast exchanging amide protons, fast exchange-in times are necessary

  1. Rapidity dependence of thermal dileptons resulting from hadronizing quark-gluon matter with finite baryon charge

    International Nuclear Information System (INIS)

    Kaempfer, B.; Technische Univ. Dresden; Pavlenko, O.P.; AN Ukrainskoj SSR, Kiev; Gorenstein, M.I.; Peshier, A.; Soff, G.

    1994-07-01

    The influence of a non-vanishing baryon charge on the rapidity distribution of dileptons produced in ultrarelativistic heavy-ion collisions is studied. We employ a frozen motion model with scaling invariant expansion of the hadronizing quark-gluon plasma as well as a realistic rapidity distribution of secondary particles (i.e., pions and baryons) expected for RHIC energies. We find a considerable suppression of the dilepton production yield at large rapidities due to the finite baryon density. To discriminate the thermal dileptons from Drell-Yan background we propose to utilize the dilepton yield scaled suitably by the pion multiplicity as function of rapidity. (orig.)

  2. A hybrid medium access control for convergence of broadband wireless and wireline ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    2000-01-01

    In this paper, we propose a hybrid medium access control protocol for supporting broadband integrated services in the wireless ATM networks. The integrated services include CBR, VBR and ABR traffic varying from low bit-rate to very high bit-rate. The proposed protocol is an excellent compromise...

  3. Factors that influence the way communities respond to proposals for major changes to local emergency services: a qualitative study.

    Science.gov (United States)

    Barratt, Helen; Harrison, David A; Fulop, Naomi J; Raine, Rosalind

    2015-01-01

    According to policy commentators, decisions about how best to organise care involve trade-offs between factors relating to care quality, workforce, cost, and patient access. In England, proposed changes such as Emergency Department closures often face public opposition. This study examined the way communities respond to plans aimed at reorganising emergency services, including the trade-offs inherent in such decisions. Cross-sectional study involving in-depth interviews. Participants selected their priorities for emergency care, including aspects they might be prepared to have 'less' of (e.g. rapid access) if it meant having 'more' of another (e.g. consultant-delivered care). A thematic analysis was carried out, combining inductive and deductive approaches, drawing on theories about risk perception. Two urban areas of England; one where changes to emergency services were under consideration ('Greenville'), and one where they were not ('Hilltown'). 28 participants in total. Greenville interviewees included more common emergency service users - parents of young children (n=5) and older people (n=6) - plus patient representatives and individuals campaigning against service closures (n=9). Hilltown interviewees (n=8) received outpatient care for Chronic Obstructive Pulmonary Disease, an important cause of emergency admission. Most participants, in both areas, were not willing to accommodate the trade-offs involved in consolidating emergency services, principally because of the belief that timely access is associated with better outcomes. Participants did not consider the proposed improvements as gains worth having; interviewees believed care quality would be adversely impact, partly because increased patient numbers would place staff under greater pressure and result in longer waiting times. Visible clinical leadership and detailed explanation of the case for change were insufficient to overcome opposition to the reconfiguration in Greenville, challenging the

  4. Factors that influence the way communities respond to proposals for major changes to local emergency services: a qualitative study.

    Directory of Open Access Journals (Sweden)

    Helen Barratt

    Full Text Available According to policy commentators, decisions about how best to organise care involve trade-offs between factors relating to care quality, workforce, cost, and patient access. In England, proposed changes such as Emergency Department closures often face public opposition. This study examined the way communities respond to plans aimed at reorganising emergency services, including the trade-offs inherent in such decisions.Cross-sectional study involving in-depth interviews. Participants selected their priorities for emergency care, including aspects they might be prepared to have 'less' of (e.g. rapid access if it meant having 'more' of another (e.g. consultant-delivered care. A thematic analysis was carried out, combining inductive and deductive approaches, drawing on theories about risk perception.Two urban areas of England; one where changes to emergency services were under consideration ('Greenville', and one where they were not ('Hilltown'.28 participants in total. Greenville interviewees included more common emergency service users - parents of young children (n=5 and older people (n=6 - plus patient representatives and individuals campaigning against service closures (n=9. Hilltown interviewees (n=8 received outpatient care for Chronic Obstructive Pulmonary Disease, an important cause of emergency admission.Most participants, in both areas, were not willing to accommodate the trade-offs involved in consolidating emergency services, principally because of the belief that timely access is associated with better outcomes. Participants did not consider the proposed improvements as gains worth having; interviewees believed care quality would be adversely impact, partly because increased patient numbers would place staff under greater pressure and result in longer waiting times.Visible clinical leadership and detailed explanation of the case for change were insufficient to overcome opposition to the reconfiguration in Greenville, challenging the

  5. Models of the solvent-accessible surface of biopolymers

    Energy Technology Data Exchange (ETDEWEB)

    Smith, R.E.

    1996-09-01

    Many biopolymers such as proteins, DNA, and RNA have been studied because they have important biomedical roles and may be good targets for therapeutic action in treating diseases. This report describes how plastic models of the solvent-accessible surface of biopolymers were made. Computer files containing sets of triangles were calculated, then used on a stereolithography machine to make the models. Small (2 in.) models were made to test whether the computer calculations were done correctly. Also, files of the type (.stl) required by any ISO 9001 rapid prototyping machine were written onto a CD-ROM for distribution to American companies.

  6. Enforcing access control in virtual organizations using hierarchical attribute-based encryption

    NARCIS (Netherlands)

    Asim, M.; Ignatenko, T.; Petkovic, M.; Trivellato, D.; Zannone, N.

    2012-01-01

    Virtual organizations are dynamic, interorganizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforcement of the access control policies protecting the information exchanged in a distributed

  7. A Novel Dynamic Spectrum Access Framework Based on Reinforcement Learning for Cognitive Radio Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yun Lin

    2016-10-01

    Full Text Available Cognitive radio sensor networks are one of the kinds of application where cognitive techniques can be adopted and have many potential applications, challenges and future research trends. According to the research surveys, dynamic spectrum access is an important and necessary technology for future cognitive sensor networks. Traditional methods of dynamic spectrum access are based on spectrum holes and they have some drawbacks, such as low accessibility and high interruptibility, which negatively affect the transmission performance of the sensor networks. To address this problem, in this paper a new initialization mechanism is proposed to establish a communication link and set up a sensor network without adopting spectrum holes to convey control information. Specifically, firstly a transmission channel model for analyzing the maximum accessible capacity for three different polices in a fading environment is discussed. Secondly, a hybrid spectrum access algorithm based on a reinforcement learning model is proposed for the power allocation problem of both the transmission channel and the control channel. Finally, extensive simulations have been conducted and simulation results show that this new algorithm provides a significant improvement in terms of the tradeoff between the control channel reliability and the efficiency of the transmission channel.

  8. Household electricity access, availability and human well-being: Evidence from India

    International Nuclear Information System (INIS)

    Ahmad, Sohail; Mathai, Manu V.; Parayil, Govindan

    2014-01-01

    According to the 2011 Census of India, over 31% of India's 1.2 billion people lived in nearly 8000 towns and cities; the remaining 830 million people lived in over 638,000 villages. About 55% of rural households and 93% of urban households had access to electricity. The 2005 Indian Human Development Survey showed that on average, electricity availability (hours of supply per day) in rural and urban households were 14 and 19 h, respectively (Desai et al., 2007). Using nationally representative data from Indian Human Development Survey, this study estimated the impact of electricity access and availability on two attributes of human well-being, viz. education and health attainment. It found a significant positive relationship between electricity availability and well-being in rural and urban households. Electricity accessibility, revealed a significant positive relationship only for rural households. The paper concludes with implications for electricity policy and infrastructure choices. - Graphical abstract: Impact of electricity security on the attributes of human well-being. - Highlights: • Nexus between well-being, and electricity access and availability is quantified. • Electricity access is positively associated with well-being in rural but not urban. • Electricity availability negatively associates with morbidity and absenteeism. • Electricity security as human well-being enabler seeks nuanced policy attention. • Decentralized rapidly deployable modular technologies and microgrids are advocated

  9. Propostas de acessibilidade para a inclusão de pessoas com deficiências no ensino superior Accessibility proposals for the inclusion of people with disabilities in higher education

    Directory of Open Access Journals (Sweden)

    Inajara Mills Siqueira

    2010-04-01

    Full Text Available foi objetivo do estudo conhecer e descrever as ações contidas nas propostas contempladas pelo "Projeto Incluir/MEC-Acessibilidade na Educação Superior" nos anos 2005-2008. Trata-se de um estudo descritivo do tipo documental. Contou com as seguintes etapas de revisão de literatura, levantamento das propostas de acessibilidade submetidas por Instituições Federais de Ensino Superior-IFES, contato com os coordenadores dos programas e busca sistemática para acesso aos projetos na íntegra, leitura dos projetos obtidos, organização dos dados em categorias previamente estabelecidas a partir dos Fatores Contextuais da Classificação Internacional de Funcionalidade, Incapacidade e Saúde-CIF. Identificou-se 115 projetos envolvendo 58 IFES, porém apenas 11 projetos foram acessados na íntegra, constituindo a amostra deste estudo. As ações se enquadravam na Parte 2 da CIF - Fatores Contextuais Pessoais/ambientais, e descrevem ações voltadas à aquisição e desenvolvimento de produtos, incluídos no componente "Produtos e Tecnologias", ações no componente "Atitudes" visando conscientizar a comunidade acadêmica/não-acadêmica, e ações voltadas aos "Serviços, Sistemas e Políticas", objetivando a adequação do processo seletivo/vestibular, contratação de intérpretes, capacitação de funcionários/docentes, articulação com outras instâncias da comunidade. Conclui-se que as ações propostas mostram que a inclusão de pessoas com deficiência no ES diz respeito a tudo que envolve o sujeito em suas relações cotidianas e devem estar voltadas para as atitudes frente à pessoa com deficiência, às políticas de inclusão e aquisição de produtos e tecnologias assistivas.To research and describe the actions contained in the proposals offered by the "Project Include / MEC-Accessibility in Higher Education" in the years 2005-2008. This is a descriptive documentary study. It includes the following stages of literature review, survey

  10. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

    Directory of Open Access Journals (Sweden)

    Ming Luo

    2018-01-01

    Full Text Available Nowadays wireless sensor network (WSN is increasingly being used in the Internet of Things (IoT for data collection, and design of an access control scheme that allows an Internet user as part of IoT to access the WSN becomes a hot topic. A lot of access control schemes have been proposed for the WSNs in the context of the IoT. Nevertheless, almost all of these schemes assume that communication nodes in different network domains share common system parameters, which is not suitable for cross-domain IoT environment in practical situations. To solve this shortcoming, we propose a more secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the Internet of Things, which allows an Internet user in a certificateless cryptography (CLC environment to communicate with a sensor node in an identity-based cryptography (IBC environment with different system parameters. Moreover, our proposed scheme achieves known session-specific temporary information security (KSSTIS that most of access control schemes cannot satisfy. Performance analysis is given to show that our scheme is well suited for wireless sensor networks in the cross-domain context of the IoT.

  11. Supporting open access to clinical trial data for researchers: The Duke Clinical Research Institute-Bristol-Myers Squibb Supporting Open Access to Researchers Initiative.

    Science.gov (United States)

    Pencina, Michael J; Louzao, Darcy M; McCourt, Brian J; Adams, Monique R; Tayyabkhan, Rehbar H; Ronco, Peter; Peterson, Eric D

    2016-02-01

    There are growing calls for sponsors to increase transparency by providing access to clinical trial data. In response, Bristol-Myers Squibb and the Duke Clinical Research Institute have collaborated on a new initiative, Supporting Open Access to Researchers. The aim is to facilitate open sharing of Bristol-Myers Squibb trial data with interested researchers. Key features of the Supporting Open Access to Researchers data sharing model include an independent review committee that ensures expert consideration of each proposal, stringent data deidentification/anonymization and protection of patient privacy, requirement of prespecified statistical analysis plans, and independent review of manuscripts before submission for publication. We believe that these approaches will promote open science by allowing investigators to verify trial results as well as to pursue interesting secondary uses of trial data without compromising scientific integrity. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  13. A novel decentralized hierarchical access control scheme for the medical scenario

    DEFF Research Database (Denmark)

    Eskeland, Sigurd; Prasad, Neeli R.

    2006-01-01

    Electronic patient records contains highly personal and confidential information that it is essential to keep private. Thus, only the medical professionals providing care to a patient should access the patient record of the concerning patient. As personal medical data can be considered...... to be the property of the corresponding patient, it is justified that patients should have the opportunity to exert control over their own data. In this paper, we propose a cryptographic access control scheme allowing patients to grant medical teams authorizations to access their medical data. Moreover......, the hierarchical aspects of teams are taken into account so that the modules of the patient record are to be accessed according to the individual privileges of the medical professionals of the team. Thus, more privileged users obtain larger portions of the data than less privileged users....

  14. Mandatory and Location-Aware Access Control for Relational Databases

    Science.gov (United States)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  15. Distributed Fair Auto Rate Medium Access Control for IEEE 802.11 Based WLANs

    Science.gov (United States)

    Zhu, Yanfeng; Niu, Zhisheng

    Much research has shown that a carefully designed auto rate medium access control can utilize the underlying physical multi-rate capability to exploit the time-variation of the channel. In this paper, we develop a simple analytical model to elucidate the rule that maximizes the throughput of RTS/CTS based multi-rate wireless local area networks. Based on the discovered rule, we propose two distributed fair auto rate medium access control schemes called FARM and FARM+ from the view-point of throughput fairness and time-share fairness, respectively. With the proposed schemes, after receiving a RTS frame, the receiver selectively returns the CTS frame to inform the transmitter the maximum feasible rate probed by the signal-to-noise ratio of the received RTS frame. The key feature of the proposed schemes is that they are capable of maintaining throughput/time-share fairness in asymmetric situation where the distribution of SNR varies with stations. Extensive simulation results show that the proposed schemes outperform the existing throughput/time-share fair auto rate schemes in time-varying channel conditions.

  16. Enforcing access control in virtual organizations using hierarchical attribute-based encryption

    NARCIS (Netherlands)

    Asim, M.; Ignatenko, T.; Petkovic, M.; Trivellato, D.; Zannone, N.

    2012-01-01

    Virtual organizations are dynamic, inter-organizational collaborations that involve systems and services belonging to different security domains. Several solutions have been proposed to guarantee the enforcement of the access control policies protecting the information exchanged in a distributed

  17. An accessibility solution of cloud computing by solar energy

    Directory of Open Access Journals (Sweden)

    Zuzana Priščáková

    2013-01-01

    Full Text Available Cloud computing is a modern innovative technology of solution of a problem with data storage, data processing, company infrastructure building and so on. Many companies worry over the changes by the implementation of this solution because these changes could have a negative impact on the company, or, in the case of establishment of new companies, this worry results from an unfamiliar environment. Data accessibility, integrity and security belong among basic problems of cloud computing. The aim of this paper is to offer and scientifically confirm a proposal of an accessibility solution of cloud by implementing of solar energy as a primary source. Problems with accessibility rise from power failures when data may be stolen or lost. Since cloud is often started from a server, the server dependence on power is strong. Modern conditions offer us a new, more innovative solution regarding the ecological as well as an economical company solution. The Sun as a steady source of energy offers us a possibility to produce necessary energy by a solar technique – solar panels. The connection of a solar panel as a primary source of energy for a server would remove its power dependence as well as possible failures. The power dependence would stay as a secondary source. Such an ecological solution would influence the economical side of company because the energy consumption would be lower. Besides a proposal of an accessibility solution, this paper involves a physical and mathematical solution to a calculation of solar energy showered on the Earth, a calculation of the panel size by cosines method and a simulation of these calculations in MATLAB conditions.

  18. Rapidly Moving Divertor Plates In A Tokamak

    International Nuclear Information System (INIS)

    Zweben, S.

    2011-01-01

    It may be possible to replace conventional actively cooled tokamak divertor plates with a set of rapidly moving, passively cooled divertor plates on rails. These plates would absorb the plasma heat flux with their thermal inertia for ∼10-30 sec, and would then be removed from the vessel for processing. When outside the tokamak, these plates could be cooled, cleaned, recoated, inspected, and then returned to the vessel in an automated loop. This scheme could provide nearoptimal divertor surfaces at all times, and avoid the need to stop machine operation for repair of damaged or eroded plates. We describe various possible divertor plate designs and access geometries, and discuss an initial design for a movable and removable divertor module for NSTX-U.

  19. The challenges and possibilities of public access defibrillation.

    Science.gov (United States)

    Ringh, M; Hollenberg, J; Palsgaard-Moeller, T; Svensson, L; Rosenqvist, M; Lippert, F K; Wissenberg, M; Malta Hansen, C; Claesson, A; Viereck, S; Zijlstra, J A; Koster, R W; Herlitz, J; Blom, M T; Kramer-Johansen, J; Tan, H L; Beesems, S G; Hulleman, M; Olasveengen, T M; Folke, F

    2018-03-01

    Out-of-hospital cardiac arrest (OHCA) is a major health problem that affects approximately four hundred and thousand patients annually in the United States alone. It is a major challenge for the emergency medical system as decreased survival rates are directly proportional to the time delay from collapse to defibrillation. Historically, defibrillation has only been performed by physicians and in-hospital. With the development of automated external defibrillators (AEDs), rapid defibrillation by nonmedical professionals and subsequently by trained or untrained lay bystanders has become possible. Much hope has been put to the concept of Public Access Defibrillation with a massive dissemination of public available AEDs throughout most Western countries. Accordingly, current guidelines recommend that AEDs should be deployed in places with a high likelihood of OHCA. Despite these efforts, AED use is in most settings anecdotal with little effect on overall OHCA survival. The major reasons for low use of public AEDs are that most OHCAs take place outside high incidence sites of cardiac arrest and that most OHCAs take place in residential settings, currently defined as not suitable for Public Access Defibrillation. However, the use of new technology for identification and recruitment of lay bystanders and nearby AEDs to the scene of the cardiac arrest as well as new methods for strategic AED placement redefines and challenges the current concept and definitions of Public Access Defibrillation. Existing evidence of Public Access Defibrillation and knowledge gaps and future directions to improve outcomes for OHCA are discussed. In addition, a new definition of the different levels of Public Access Defibrillation is offered as well as new strategies for increasing AED use in the society. © 2018 The Association for the Publication of the Journal of Internal Medicine.

  20. Trends in Access to Israeli Higher Education 1981-96: From a Privilege to a Right.

    Science.gov (United States)

    Guri-Rosenblit, Sarah

    1996-01-01

    Discusses trends in Israeli higher education over the last 15 years, focusing on the interrelations between secondary and higher education, access to universities, the rapid growth of the Open University of Israel, the upgrading of non-university postsecondary education, the under-representation of Sephardic Jewish and non-Jewish students, and…

  1. Low Access Delay Anti-Collision Algorithm for Reader in RFID systems

    DEFF Research Database (Denmark)

    Galiotto, Carlo; Marchetti, Nicola; Prasad, Neeli R.

    2010-01-01

    Radio Frequency Identification (RFID) is a technology which is spreading more and more as a medium to identify, locate and track assets through the productive chain. As all the wireless communication devices sharing the same transmission channel, RFID readers and tags experience collisions whenever...... deployed over the same area. In this work, the RFID reader collision problem is studied and a centralized scheduling-based algorithm is proposed as possible candidate solution, especially for those scenarios involving static or low mobility readers. Taking into account the circuitry limitations of the tags......, which do not allow to use frequency or code division multiple access schemes in the RFID systems, this paper proposes an algorithm aiming to prevent the readers collisions, while keeping the access delay of the readers to the channel possibly low. The simulation results show that this algorithm performs...

  2. Web accessibility standards and disability: developing critical perspectives on accessibility.

    Science.gov (United States)

    Lewthwaite, Sarah

    2014-01-01

    Currently, dominant web accessibility standards do not respect disability as a complex and culturally contingent interaction; recognizing that disability is a variable, contrary and political power relation, rather than a biological limit. Against this background there is clear scope to broaden the ways in which accessibility standards are understood, developed and applied. Commentary. The values that shape and are shaped by legislation promote universal, statistical and automated approaches to web accessibility. This results in web accessibility standards conveying powerful norms fixing the relationship between technology and disability, irrespective of geographical, social, technological or cultural diversity. Web accessibility standards are designed to enact universal principles; however, they express partial and biopolitical understandings of the relation between disability and technology. These values can be limiting, and potentially counter-productive, for example, for the majority of disabled people in the "Global South" where different contexts constitute different disabilities and different experiences of web access. To create more robust, accessible outcomes for disabled people, research and standards practice should diversify to embrace more interactional accounts of disability in different settings. Implications for Rehabilitation Creating accessible experiences is an essential aspect of rehabilitation. Web standards promote universal accessibility as a property of an online resource or service. This undervalues the importance of the user's intentions, expertize, their context, and the complex social and cultural nature of disability. Standardized, universal approaches to web accessibility may lead to counterproductive outcomes for disabled people whose impairments and circumstances do not meet Western disability and accessibility norms. Accessible experiences for rehabilitation can be enhanced through an additional focus on holistic approaches to

  3. Customer-experienced rapid prototyping

    Science.gov (United States)

    Zhang, Lijuan; Zhang, Fu; Li, Anbo

    2008-12-01

    In order to describe accurately and comprehend quickly the perfect GIS requirements, this article will integrate the ideas of QFD (Quality Function Deployment) and UML (Unified Modeling Language), and analyze the deficiency of prototype development model, and will propose the idea of the Customer-Experienced Rapid Prototyping (CE-RP) and describe in detail the process and framework of the CE-RP, from the angle of the characteristics of Modern-GIS. The CE-RP is mainly composed of Customer Tool-Sets (CTS), Developer Tool-Sets (DTS) and Barrier-Free Semantic Interpreter (BF-SI) and performed by two roles of customer and developer. The main purpose of the CE-RP is to produce the unified and authorized requirements data models between customer and software developer.

  4. 76 FR 51345 - On Behalf of the Accessibility Committee of the Federal Chief Information Officers Council...

    Science.gov (United States)

    2011-08-18

    ... Web site to participate and express concerns and propose ideas. DATES: The listening session will be... engage citizens and federal employees and hear their concerns and ideas. Transcripts from the previous... accessibility provisions? What support do newly emerging technology companies need to build in accessibility in...

  5. Comparison of Radial Access, Guided Femoral Access, and Non-Guided Femoral Access Among Women Undergoing Percutaneous Coronary Intervention.

    Science.gov (United States)

    Koshy, Linda M; Aberle, Laura H; Krucoff, Mitchell W; Hess, Connie N; Mazzaferri, Ernest; Jolly, Sanjit S; Jacobs, Alice; Gibson, C Michael; Mehran, Roxana; Gilchrist, Ian C; Rao, Sunil V

    2018-01-01

    This study was conducted to determine the association between radial access, guided femoral access, and non-guided femoral access on postprocedural bleeding and vascular complications after percutaneous coronary intervention (PCI). Bleeding events and major vascular complications after PCI are associated with increased morbidity, mortality, and cost. While the radial approach has been shown to be superior to the femoral approach in reducing bleeding and vascular complications, whether the use of micropuncture, fluoroscopy, or ultrasound mitigates these differences is unknown. We conducted a post hoc analysis of women in the SAFE-PCI for Women trial who underwent PCI and had the access method identified (n = 643). The primary endpoint of postprocedure bleeding or vascular complications occurring within 72 hours or at discharge was adjudicated by an independent clinical events committee and was compared based on three categories of access technique: radial, guided femoral (fluoroscopy, micropuncture, ultrasound), or non-guided femoral (none of the aforementioned). Differences between the groups were determined using multivariate logistic regression using radial access as the reference. Of the PCI population, 330 underwent radial access, 228 underwent guided femoral access, and 85 underwent non-guided femoral access. There was a statistically significant lower incidence of the primary endpoint with radial access vs non-guided femoral access; however, there was no significant difference between radial approach and femoral access guided by fluoroscopy, micropuncture, or ultrasound. This post hoc analysis demonstrates that while radial access is safer than non-guided femoral access, guided femoral access appears to be associated with similar bleeding events or vascular complications as radial access.

  6. Around the laboratories: Dubna: Physics results and progress on bubble chamber techniques; Stanford (SLAC): Operation of a very rapid cycling bubble chamber; Daresbury: Photographs of visitors to the Laboratory; Argonne: Charge exchange injection tests into the ZGS in preparation for a proposed Booster

    CERN Multimedia

    1969-01-01

    Around the laboratories: Dubna: Physics results and progress on bubble chamber techniques; Stanford (SLAC): Operation of a very rapid cycling bubble chamber; Daresbury: Photographs of visitors to the Laboratory; Argonne: Charge exchange injection tests into the ZGS in preparation for a proposed Booster

  7. A restricted access material for rapid analysis of [(11)C]-labeled radiopharmaceuticals and their metabolites in plasma

    DEFF Research Database (Denmark)

    Gillings, N.

    2009-01-01

    , combined with a monolithic analysis column in a column-switching HPLC system. RESULTS: Up to 4 ml of plasma was analyzed by this method within 4.5-7 min in a fully automated process. Because of the rapid analysis, a large number of samples could be analyzed during a 90-min PET scan. The extraction column...

  8. SCOAP3 where libraries, scientists and publishers meet repositories, peer-reviewed journals and Open Access

    CERN Document Server

    Mele, Salvatore

    2009-01-01

    The inexorable growth of both Open Access and library budgetary concerns are calling for innovation in scholarly communication. The field of High-Energy Physics has decades of tradition in cross-border collaboration and Open Access and is now proposing an innovative model for scientific publishing: SCOAP3. This article presents a synopsis of this opportunity for libraries, scientists and publishers to invent a new future at the interface of Open Access, peer-reviewed journals and repositories.

  9. Patient specific ankle-foot orthoses using rapid prototyping.

    Science.gov (United States)

    Mavroidis, Constantinos; Ranky, Richard G; Sivak, Mark L; Patritti, Benjamin L; DiPisa, Joseph; Caddle, Alyssa; Gilhooly, Kara; Govoni, Lauren; Sivak, Seth; Lancia, Michael; Drillio, Robert; Bonato, Paolo

    2011-01-12

    Prefabricated orthotic devices are currently designed to fit a range of patients and therefore they do not provide individualized comfort and function. Custom-fit orthoses are superior to prefabricated orthotic devices from both of the above-mentioned standpoints. However, creating a custom-fit orthosis is a laborious and time-intensive manual process performed by skilled orthotists. Besides, adjustments made to both prefabricated and custom-fit orthoses are carried out in a qualitative manner. So both comfort and function can potentially suffer considerably. A computerized technique for fabricating patient-specific orthotic devices has the potential to provide excellent comfort and allow for changes in the standard design to meet the specific needs of each patient. In this paper, 3D laser scanning is combined with rapid prototyping to create patient-specific orthoses. A novel process was engineered to utilize patient-specific surface data of the patient anatomy as a digital input, manipulate the surface data to an optimal form using Computer Aided Design (CAD) software, and then download the digital output from the CAD software to a rapid prototyping machine for fabrication. Two AFOs were rapidly prototyped to demonstrate the proposed process. Gait analysis data of a subject wearing the AFOs indicated that the rapid prototyped AFOs performed comparably to the prefabricated polypropylene design. The rapidly prototyped orthoses fabricated in this study provided good fit of the subject's anatomy compared to a prefabricated AFO while delivering comparable function (i.e. mechanical effect on the biomechanics of gait). The rapid fabrication capability is of interest because it has potential for decreasing fabrication time and cost especially when a replacement of the orthosis is required.

  10. Systems and Services for Real-Time Web Access to NPP Data, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Global Science & Technology, Inc. (GST) proposes to investigate information processing and delivery technologies to provide near-real-time Web-based access to...

  11. Enterprise wide transparent information access

    International Nuclear Information System (INIS)

    Brown, J.

    1995-05-01

    The information management needs of the Department of Energy (DOE) represents a fertile domain for the development of highly sophisticated yet intuitive enterprise-wide computing solutions. These solutions must support business operations, research agendas, technology development efforts, decision support, and other application areas with a user base ranging from technical staff to the highest levels of management. One area of primary interest is in the Environmental Restoration and Waste Management Branch of DOE. In this arena, the issue of tracking and managing nuclear waste related to the long legacy of prior defense production and research programs is one of high visibility and great concern. The Tank Waste Information Network System (TWINS) application has been created by the Pacific Northwest Laboratory (PNL) for the DOE to assist in managing and accessing the information related to this mission. The TWINS solution addresses many of the technical issues faced by other efforts to provide integrated information access to a wide variety of stakeholders. TWINS provides secure transparent access to distributed heterogeneous multimedia information sources from around the DOE complex. The users interact with the information through a consistent user interface that presents the desired data in a common format regardless of the structure of the source information. The solutions developed by the TWINS project represent an integration of several technologies and products that can be applied to other mission areas within DOE and other government agencies. These solutions are now being applied to public and private sector problem domains as well. The successful integration and inter-operation of both commercial and custom modules into a flexible and extensible information architecture will help ensure that new problems facing DOE and other clients can be addressed more rapidly in the future by re-use of existing tools and techniques proven viable through the TWINS efforts

  12. Histogram analysis for smartphone-based rapid hematocrit determination

    Science.gov (United States)

    Jalal, Uddin M.; Kim, Sang C.; Shim, Joon S.

    2017-01-01

    A novel and rapid analysis technique using histogram has been proposed for the colorimetric quantification of blood hematocrits. A smartphone-based “Histogram” app for the detection of hematocrits has been developed integrating the smartphone embedded camera with a microfluidic chip via a custom-made optical platform. The developed histogram analysis shows its effectiveness in the automatic detection of sample channel including auto-calibration and can analyze the single-channel as well as multi-channel images. Furthermore, the analyzing method is advantageous to the quantification of blood-hematocrit both in the equal and varying optical conditions. The rapid determination of blood hematocrits carries enormous information regarding physiological disorders, and the use of such reproducible, cost-effective, and standard techniques may effectively help with the diagnosis and prevention of a number of human diseases. PMID:28717569

  13. A Review of Open Access Self-Archiving Mandate Policies

    Science.gov (United States)

    Xia, Jingfeng; Gilchrist, Sarah B.; Smith, Nathaniel X. P.; Kingery, Justin A.; Radecki, Jennifer R.; Wilhelm, Marcia L.; Harrison, Keith C.; Ashby, Michael L.; Mahn, Alyson J.

    2012-01-01

    This article reviews the history of open access (OA) policies and examines the current status of mandate policy implementations. It finds that hundreds of policies have been proposed and adopted at various organizational levels and many of them have shown a positive effect on the rate of repository content accumulation. However, it also detects…

  14. A Novel Method for Intraoral Access to the Superior Head of the Human Lateral Pterygoid Muscle

    Directory of Open Access Journals (Sweden)

    Aleli Tôrres Oliveira

    2014-01-01

    Full Text Available Background. The uncoordinated activity of the superior and inferior parts of the lateral pterygoid muscle (LPM has been suggested to be one of the causes of temporomandibular joint (TMJ disc displacement. A therapy for this muscle disorder is the injection of botulinum toxin (BTX, of the LPM. However, there is a potential risk of side effects with the injection guide methods currently available. In addition, they do not permit appropriate differentiation between the two bellies of the muscle. Herein, a novel method is presented to provide intraoral access to the superior head of the human LPM with maximal control and minimal hazards. Methods. Computational tomography along with digital imaging software programs and rapid prototyping techniques were used to create a rapid prototyped guide to orient BTX injections in the superior LPM. Results. The method proved to be feasible and reliable. Furthermore, when tested in one volunteer it allowed precise access to the upper head of LPM, without producing side effects. Conclusions. The prototyped guide presented in this paper is a novel tool that provides intraoral access to the superior head of the LPM. Further studies will be necessary to test the efficacy and validate this method in a larger cohort of subjects.

  15. Hypersensitivity to local anaesthetics--update and proposal of evaluation algorithm

    DEFF Research Database (Denmark)

    Thyssen, Jacob Pontoppidan; Menné, Torkil; Elberling, Jesper

    2008-01-01

    of patients suspected with immediate- and delayed-type immune reactions. Literature was examined using PubMed-Medline, EMBASE, Biosis and Science Citation Index. Based on the literature, the proposed algorithm may safely and rapidly distinguish between immediate-type and delayed-type allergic immune reactions....

  16. Testing the priority-of-access model in a seasonally breeding primate species

    OpenAIRE

    Dubuc, Constance; Muniz, Laura; Heistermann, Michael; Engelhardt, Antje; Widdig, Anja

    2011-01-01

    In mammals, when females are clumped in space, male access to receptive females is usually determined by a dominance hierarchy based on fighting ability. In polygynandrous primates, as opposed to most mammalian species, the strength of the relationship between male social status and reproductive success varies greatly. It has been proposed that the degree to which paternity is determined by male rank decreases with increasing female reproductive synchrony. The priority-of-access model (PoA) p...

  17. Broadband Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Broadband Access. Worldwide market for broadband access $30 Billion! Over 200 million broadband subscribers worldwide! Various Competing Broadband access. Digital Subscriber line; Wireless; Optical Fiber.

  18. 77 FR 32127 - Agency Information Collection Activities: Proposed Collection: Comment Request

    Science.gov (United States)

    2012-05-31

    ... technology. Proposed Project: Sickle Cell Disease Treatment Demonstration Program-- Quality Improvement Data Collection for the Hemoglobinopathy Learning Collaborative (OMB No. 0915-xxxx)--[New] Background: In response... is designed to improve access to services for individuals with sickle cell disease, improve and...

  19. Smooth and Controlled Recovery Planning of Disruptions in Rapid Transit Networks

    NARCIS (Netherlands)

    Cadarso, L.; Marin, A.; Maroti, G.

    2015-01-01

    This paper studies the disruption management problem of rapid transit rail networks. We consider an integrated model for the recovery of the timetable and the rolling stock schedules. We propose a new approach to deal with large-scale disruptions: we limit the number of simultaneous schedule changes

  20. Mental health in the island nations of the Western Pacific: a rapid review of the literature.

    Science.gov (United States)

    Hunter, Ernest; Thusanth, Sneha; McCalman, Janya; Gopalkrishnan, Narayan

    2015-12-01

    The aim of the study was to identify mental-health-relevant literature accessible to policy makers and healthcare workers in the island nations of the Western Pacific. Material collated to support the inaugural Leadership in Mental Health: Island Nations course held in Cairns in May 2015 was used as the basis of a "rapid review". The rapid review considered 303 documents identified by a search carried out using James Cook University's OneSearch, Google Scholar, and the authors' knowledge. Search terms included mental health and the like, and terms with Pacific and current Pacific island country names. Findings were classified by region/country, year of release/publication, mental health issue addressed, peer-reviewed or grey literature, and type of study. Almost half of the findings had been released in the previous five years. However, only 36% were peer-reviewed publications and only 3.6% of the findings were intervention studies. There is limited easily accessible documentation to confidently direct practice or policies regarding which strategies are likely to be effective in responding to the high rates of mental ill-health experienced in the Pacific island nations, or to plan for increases as a consequence of rapid social and demographic changes that are transforming Pacific island societies. © The Royal Australian and New Zealand College of Psychiatrists 2015.

  1. 78 FR 79328 - Amendments to Material Control and Accounting Regulations and Proposed Guidance for Fuel Cycle...

    Science.gov (United States)

    2013-12-30

    ..., 72, 74, and 150 [NRC-2009-0096 and NRC-2013-0195] RIN 3150-AI61 Amendments to Material Control and Accounting Regulations and Proposed Guidance for Fuel Cycle Facility Material Control and Accounting Plans... of this document. NRC's Agencywide Documents Access and Management System (ADAMS): You may access...

  2. Preferensi Konsumen Terhadap Transportasi Publik (Studi Kasus Bus Rapid Transit (BRT Kota Semarang

    Directory of Open Access Journals (Sweden)

    Ichwinsyah Azali

    2018-01-01

    Abstract Semarang as the capital city of Central Java Province has a population density of 4.269 per square kilometer in 2015. Due to high population density, communities’ mobility will also be increasing. Government arranged the policy related to traffic and public transportation in the Law Number 22 Year 2009 article 158 paragraph 1, the government of Semarang City has guaranteed the availability of road-based transportation in Urban Areas by providing public transportation namely Bus Rapid Transit (BRT Trans Semarang. This research aims to analyze communities’ preference in terms of price, convenience, reliability, accessibility, and safety toward the possibility of BRT and Non BRT transportation modes selection. This research uses 100 respondents by Purposive Sampling. Binary Logistic Regression model is applied to determine the effect of independent variable towards dependent variable of BRT and Non BRT transportation modes selection. The result of this research indicated that BRT and Non BRT transportation modes selection in Semarang City are dominated by 82 respondents of BRT users and 18 respondents of Non BRT users. BRT and Non BRT transportation modes selection are affected by the factor of price, convenience, reliability, accessibility, and safety. Keywords: Modes selection, Bus Rapid Transit (BRT Trans Semarang, Principal Component Analysis, Binary Logistic Regression.

  3. Evaluation of secure capability-based access control in the M2M local cloud platform

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Prasad, Neeli R.; Prasad, Ramjee

    2016-01-01

    delegation. Recently, the capability based access control has been considered as method to manage access in the Internet of Things (IoT) or M2M domain. In this paper, the implementation and evaluation of a proposed secure capability based access control in the M2M local cloud platform is presented......Managing access to and protecting resources is one of the important aspect in managing security, especially in a distributed computing system such as Machine-to-Machine (M2M). One such platform known as the M2M local cloud platform, referring to BETaaS architecture [1], which conceptually consists...... of multiple distributed M2M gateways, creating new challenges in the access control. Some existing access control systems lack in scalability and flexibility to manage access from users or entity that belong to different authorization domains, or fails to provide fine grained and flexible access right...

  4. Accessing the SEED genome databases via Web services API: tools for programmers.

    Science.gov (United States)

    Disz, Terry; Akhter, Sajia; Cuevas, Daniel; Olson, Robert; Overbeek, Ross; Vonstein, Veronika; Stevens, Rick; Edwards, Robert A

    2010-06-14

    The SEED integrates many publicly available genome sequences into a single resource. The database contains accurate and up-to-date annotations based on the subsystems concept that leverages clustering between genomes and other clues to accurately and efficiently annotate microbial genomes. The backend is used as the foundation for many genome annotation tools, such as the Rapid Annotation using Subsystems Technology (RAST) server for whole genome annotation, the metagenomics RAST server for random community genome annotations, and the annotation clearinghouse for exchanging annotations from different resources. In addition to a web user interface, the SEED also provides Web services based API for programmatic access to the data in the SEED, allowing the development of third-party tools and mash-ups. The currently exposed Web services encompass over forty different methods for accessing data related to microbial genome annotations. The Web services provide comprehensive access to the database back end, allowing any programmer access to the most consistent and accurate genome annotations available. The Web services are deployed using a platform independent service-oriented approach that allows the user to choose the most suitable programming platform for their application. Example code demonstrate that Web services can be used to access the SEED using common bioinformatics programming languages such as Perl, Python, and Java. We present a novel approach to access the SEED database. Using Web services, a robust API for access to genomics data is provided, without requiring large volume downloads all at once. The API ensures timely access to the most current datasets available, including the new genomes as soon as they come online.

  5. Rapid visualization of latent fingermarks using gold seed-mediated enhancement

    Directory of Open Access Journals (Sweden)

    Chia-Hao Su

    2016-11-01

    Full Text Available Abstract Background Fingermarks are one of the most important and useful forms of physical evidence in forensic investigations. However, latent fingermarks are not directly visible, but can be visualized due to the presence of other residues (such as inorganic salts, proteins, polypeptides, enzymes and human metabolites which can be detected or recognized through various strategies. Convenient and rapid techniques are still needed to provide obvious contrast between the background and the fingermark ridges and to then visualize latent fingermark with a high degree of selectivity and sensitivity. Results In this work, lysozyme-binding aptamer-conjugated Au nanoparticles (NPs are used to recognize and target lysozyme in the fingermark ridges, and Au+-complex solution is used as a growth agent to reduce Au+ from Au+ to Au0 on the surface of the Au NPs. Distinct fingermark patterns were visualized on a range of professional forensic within 3 min; the resulting images could be observed by the naked eye without background interference. The entire processes from fingermark collection to visualization only entails two steps and can be completed in less than 10 min. The proposed method provides cost and time savings over current fingermark visualization methods. Conclusions We report a simple, inexpensive, and fast method for the rapid visualization of latent fingermarks on the non-porous substrates using Au seed-mediated enhancement. Au seed-mediated enhancement is used to achieve the rapid visualization of latent fingermarks on non-porous substrates by the naked eye without the use of expensive or sophisticated instruments. The proposed approach offers faster detection and visualization of latent fingermarks than existing methods. The proposed method is expected to increase detection efficiency for latent fingermarks and reduce time requirements and costs for forensic investigations.

  6. Enhancing Sensing and Channel Access in Cognitive Radio Networks

    KAUST Repository

    Hamza, Doha R.

    2014-06-18

    Cognitive radio technology is a promising technology to solve the wireless spectrum scarcity problem by intelligently allowing secondary, or unlicensed, users access to the primary, licensed, users\\' frequency bands. Cognitive technology involves two main tasks: 1) sensing the wireless medium to assess the presence of the primary users and 2) designing secondary spectrum access techniques that maximize the secondary users\\' benefits while maintaining the primary users\\' privileged status. On the spectrum sensing side, we make two contributions. First, we maximize a utility function representing the secondary throughput while constraining the collision probability with the primary below a certain value. We optimize therein the channel sensing time, the sensing decision threshold, the channel probing time, together with the channel sensing order for wideband primary channels. Second, we design a cooperative spectrum sensing technique termed sensing with equal gain combining whereby cognitive radios simultaneously transmit their sensing results to the fusion center over multipath fading reporting channels. The proposed scheme is shown to outperform orthogonal reporting systems in terms of achievable secondary throughput and to be robust against phase and synchronization errors. On the spectrum access side, we make four contributions. First, we design a secondary scheduling scheme with the goal of minimizing the secondary queueing delay under constraints on the average secondary transmit power and the maximum tolerable primary outage probability. Second, we design another secondary scheduling scheme based on the spectrum sensing results and the primary automatic repeat request feedback. The optimal medium access probabilities are obtained via maximizing the secondary throughput subject to constraints that guarantee quality of service parameters for the primary. Third, we propose a three-message superposition coding scheme to maximize the secondary throughput without

  7. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever-ch...

  8. Cross-layer design for radio resource allocation based on priority scheduling in OFDMA wireless access network

    Directory of Open Access Journals (Sweden)

    Chen Yen-Wen

    2011-01-01

    Full Text Available Abstract The orthogonal frequency-division multiple access (OFDMA system has the advantages of flexible subcarrier allocation and adaptive modulation with respect to channel conditions. However, transmission overhead is required in each frame to broadcast the arrangement of radio resources to all mobile stations within the coverage of the same base station. This overhead greatly affects the utilization of valuable radio resources. In this paper, a cross layer scheme is proposed to reduce the number of traffic bursts at the downlink of an OFDMA wireless access network so that the overhead of the media access protocol (MAP field can be minimized. The proposed scheme considers the priorities and the channel conditions of quality of service (QoS traffic streams to arrange for them to be sent with minimum bursts in a heuristic manner. In addition, the trade-off between the degradation of the modulation level and the reduction of traffic bursts is investigated. Simulation results show that the proposed scheme can effectively reduce the traffic bursts and, therefore, increase resource utilization.

  9. Safety testing for LHC access system

    CERN Document Server

    Valentini, F; Ninin, P; Scibile, S

    2008-01-01

    In the domain of Safety Real-Time Systems the problem of testing represents always a big effort in terms of time, costs and efficiency to guarantee an adequate coverage degree. Exhaustive tests may, in fact, not be practicable for large and distributed systems. This paper describes the testing process followed during the validation of the CERN's LHC Access System [1], responsible for monitoring and preventing physical risks for the personnel accessing the underground areas. In the paper we also present a novel strategy for the testing problem, intended to drastically reduce the time for the test patterns generation and execution. In particular, we propose a methodology for blackbox testing that relies on the application of Model Checking techniques. Model Checking is a formal method from computer science, commonly adopted to prove correctness of system’s models through an automatic system’s state space exploration against some property formulas.

  10. Structural violence and simplified paternalistic ideas of patient empowerment decreases health care access, quality & outcome for ethnic minority patients

    DEFF Research Database (Denmark)

    Sodemann, Morten

    Increasing complexity of health care organization, rapid hyperspecialization of medical care, lack of ’patient literacy’ and pressure on patients to take over responsibility, challenges political dreams of equal access to patient centered high quality secure care....

  11. Reduced-complexity adaptive multi-channel assignment for shared access points in over-loaded small-cell networks

    KAUST Repository

    Radaydeh, Redha Mahmoud

    2013-06-01

    This paper proposes a reduced-complexity downlink multi-channel assignment scheme when feedback links are capacity-limited. The system model treats the case when multiple access points are allocated to serve scheduled users in over-loaded (i.e. dense) pico/femtocell networks. It assumes that the deployed access points can be shared simultaneously and employ isotropic antenna arrays of arbitrary sizes. Moreover, they transmit their data on a common physical channel and can not coordinate their transmissions. On the other hand, each scheduled user can be served by single transmit channel from each active access point at a time, and it lacks coordination with concurrent active users. The scheme operates according to the occupancy of available transmit channels, wherein extensively occupied access points are avoided adaptively, while reducing the load of processing. The operation is linked to a target performance via controlling the observed aggregate interference from the projected set of serving points. Through the analysis, results for the scheduled user outage performance, and the average number of active access points are presented. Numerical and simulations studies clarify the gains of the proposed scheme for different operating conditions. © 2013 IEEE.

  12. Reduced-complexity adaptive multi-channel assignment for shared access points in over-loaded small-cell networks

    KAUST Repository

    Radaydeh, Redha Mahmoud; Qaraqe, Khalid A.; Alouini, Mohamed-Slim

    2013-01-01

    This paper proposes a reduced-complexity downlink multi-channel assignment scheme when feedback links are capacity-limited. The system model treats the case when multiple access points are allocated to serve scheduled users in over-loaded (i.e. dense) pico/femtocell networks. It assumes that the deployed access points can be shared simultaneously and employ isotropic antenna arrays of arbitrary sizes. Moreover, they transmit their data on a common physical channel and can not coordinate their transmissions. On the other hand, each scheduled user can be served by single transmit channel from each active access point at a time, and it lacks coordination with concurrent active users. The scheme operates according to the occupancy of available transmit channels, wherein extensively occupied access points are avoided adaptively, while reducing the load of processing. The operation is linked to a target performance via controlling the observed aggregate interference from the projected set of serving points. Through the analysis, results for the scheduled user outage performance, and the average number of active access points are presented. Numerical and simulations studies clarify the gains of the proposed scheme for different operating conditions. © 2013 IEEE.

  13. Secure access control and large scale robust representation for online multimedia event detection.

    Science.gov (United States)

    Liu, Changyu; Lu, Bin; Li, Huiling

    2014-01-01

    We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  14. Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection

    Directory of Open Access Journals (Sweden)

    Changyu Liu

    2014-01-01

    Full Text Available We developed an online multimedia event detection (MED system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.

  15. Shared access protocol (SAP) in femtocell channel resources for cellular coverage enhancement

    KAUST Repository

    Magableh, Amer M.; Radaydeh, Redha Mahmoud Mesleh; Alouini, Mohamed-Slim

    2012-01-01

    protocol (SAP), that enables the unlicensed macro-cell user equipments (MC-UE) to communicate with partially closed access femtocell base stations and hence, improves and enhances the overall system performance in closed environments. For the proposed

  16. Technical Training: New Course on Microsoft Access 2003 - ECDL Module 5

    CERN Multimedia

    Monique Duval

    2005-01-01

    CERN Technical Training 2005: Learning for the LHC! The CERN Technical Training programme is now proposing a new course on Microsoft Access 2003, designed for people using Access to work with databases. The course programme will include the description of the objects of an Access database, and how to work with Access, creating and using queries, tables, forms and reports. After this course, participants will be at the level of the ECDL Certificate, Database Module 5. Optionally, it will be possible to stand the ECDL examination at the CERN Training Centre. The first scheduled session of this two-day course on Microsoft Access 2003 will take place on March 15-16, 2005. The number of participants to each session is limited to 12. The course will be in English, with an English-French bilingual instructor. The course fee is 400.- CHF per person, scaling down in case of a class of more than 4 participants. The cost of the optional ECDL certification, that will take place at a subsequent date, is 112.- CHF for t...

  17. Technical Training: New Course on Microsoft Access 2003 - ECDL Module 5

    CERN Multimedia

    Monique Duval

    2005-01-01

    CERN Technical Training 2005: Learning for the LHC! The CERN Technical Training programme is now proposing a new course on Microsoft Access 2003, designed for people using Access to work with databases. The course programme will include the description of the objects of an Access database, and how to work with Access, creating and using queries, tables, forms and reports. After this course, participants will be at the level of the ECDL Certificate, Database Module 5. Optionally, it will be possible to stand the ECDL examination at the CERN Training Centre. The first scheduled session of this two-day course on Microsoft Access 2003 will take place on March 15-16, 2005. The number of participants to each session is limited to 12. The course will be in English, with an English-French bilingual instructor. The course fee is 400.- CHF per person, scaling down in case of a class of more than 4 participants. The cost of the optional ECDL certification, that will take place at a subsequent date, is 112.- CHF for ...

  18. Reliable and Efficient Access for Alarm-initiated and Regular M2M Traffic in IEEE 802.11ah Systems

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Stefanovic, Cedomir; Popovski, Petar

    2016-01-01

    IEEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M...... reporting regimes, which are periodic, on-demand and alarm reporting. The proposed access method is based a periodically re- occurring pool of time slots, whose size is proactively determined on the basis of the reporting activity in the cell. We show that it is possible to both efficiently and reliably...

  19. Meth mouth severity in response to drug-use patterns and dental access in methamphetamine users.

    Science.gov (United States)

    Brown, Ronni E; Morisky, Donald E; Silverstein, Steven J

    2013-06-01

    Meth mouth is the rapid development of tooth decay in methamphetamine users. Our study questioned whether drug-use patterns and dental care access are risk factors affecting the severity of meth mouth. Participants received dental examinations, and the number of decayed, missing and filled teeth (DMFT) were counted and used to measure meth mouth severity.

  20. Trump proposes initial healthcare agenda

    Directory of Open Access Journals (Sweden)

    Robbins RA

    2016-11-01

    Full Text Available No abstract available. Article truncated at 150 words. On Friday, November 11, President-elect Trump proposed a healthcare agenda on his website greatagain.gov (1. Yesterday, November 12, he gave an interview on 60 Minutes clarifying his positions (2. Trump said that he wanted to focus on healthcare and has proposed to: •Repeal all of the Affordable Care Act; •Allow the sale of health insurance across state lines; •Make the purchase of health insurance fully tax deductible; •Expand access to the health savings accounts;•Increase price transparency; •Block grant Medicaid; •Lower entrance barriers to new producers of drugs. In his 60 Minutes interview Trump reiterated that two provisions of the ACA – prohibition of pre-existing conditions exclusion and ability for adult children to stay on parents insurance plans until age 26 – have his support (2. Other aspects of the ACA that might receive his support were not discussed. On the Department of Veterans’ Affairs ...