Literatura científica selecionada sobre o tema "Computers – Access control – United States"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Consulte a lista de atuais artigos, livros, teses, anais de congressos e outras fontes científicas relevantes para o tema "Computers – Access control – United States".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Artigos de revistas sobre o assunto "Computers – Access control – United States"

1

Muellenbach, Joanne M. "Focused Bedside Education May Improve Engagement of Hospitalized Patients with Their Patient Portals". Evidence Based Library and Information Practice 15, n.º 1 (13 de março de 2020): 251–53. http://dx.doi.org/10.18438/eblip29671.

Texto completo da fonte
Resumo:
A Review of: Greysen, S.R., Harrison, J.D., Rareshide, C., Magan, Y., Seghal, N., Rosenthal, J., Jacolbia, R., & Auerbach, A.D. (2018). A randomized controlled trial to improve engagement of hospitalized patients with their patient portals. Journal of the American Medical Informatics Association, 25(12), 1626-1633. https://doi.org/10.1093/jamia/ocy125 Abstract Objectives – To study hospitalized patients who were provided with tablet computers and the extent to which having access to these computers increased their patient portal engagement during hospitalization and following their discharge. Design – Prospective, randomized controlled trial (RCT) within a larger, observational study of patient engagement in discharge planning. Setting – A large, academic medical centre in the Western United States of America. Subjects – Of a total of 250 potential subjects from a larger observational study, 137 declined to participate in this one; of the remaining 113 subjects, 16 were unable to access the patient portal, leaving 97 adult (18 years of age or older) patients in the final group. All subjects (50 intervention and 47 control) were randomized but not blinded, had been admitted to medical service, and spoke English. In addition, all participants were supplied with tablet computers for one day during their inpatient stay and were provided with limited assistance to the portal registration and login process as needed. They were also required to have access to a tablet or home computer when discharged. Methods – The intervention group participants received focused bedside structured education by trained research assistants (RAs) who demonstrated portal key functions and explained the importance of these functions for their upcoming transition to post-discharge care. Following enrolment and consent, RAs administered a brief pre-study survey to assess baseline technology use. Then, at the end of the observation day, the RAs performed a debrief interview in which participants were asked to demonstrate their ability to perform key portal tasks. The RAs recorded which tasks were accomplished or if the RAs had provided assistance. Patient demographics and clinical information were obtained from the Electronic Health Record (EHR). Main results – Of the 97 patients who were enrolled in the RCT, 57% logged into their portals at least once within seven days of their discharge. The mean number of logins and specific portal tasks performed was higher for the intervention group than for the control group. In addition, while in the hospital, the intervention group was better able to log in and navigate the portal. Only one specific portal task reached statistical significance—the use of the tab for viewing the messaging interaction with the provider. The time needed to deliver the intervention was brief—less than 15 minutes for 80% of participants. The intervention group’s overall satisfaction with the bedside tablet to access the portal was high. Conclusion – Data analysis revealed that the bedside tablet educational intervention succeeded in increasing patient engagement in the use of the patient portal, both during hospitalization and following discharge. As the interest and demand for patient access to EHRs increases among patients, caregivers, and healthcare providers, more rigorous studies will be needed to guide the implementation of patient portals during and after hospitalization.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Rosenbaum, S., A. Somodevilla e M. Casoni. "Will EMTALA Be There for People With Pregnancy-related Emergencies?" Obstetric Anesthesia Digest 43, n.º 3 (23 de agosto de 2023): 113–14. http://dx.doi.org/10.1097/01.aoa.0000946244.38317.d1.

Texto completo da fonte
Resumo:
(N Engl J Med. 2022;387:863–865) The Emergency Medical Treatment and Labor Act (EMTALA), a statute established in 1986 to prevent hospitals from refusing to treat pregnancy-related emergencies, is important to health care in the United States. The EMTALA statute helps safeguard nondiscriminatory hospital emergency medical access to anyone in need. Following the June 24, 2022, decision in Dobbs v. Jackson Women’s Health Organization, the constitutional right to an abortion was returned to state control. This Supreme Court decision poses the questions as to whether EMTALA will continue to help barricade against state laws that prevent emergent hospital care short of life-threatening situations.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Shu, Yingli, Quande Yuan, Wende Ke e Lei Kou. "Security Access Control Method for Wind-Power-Monitoring System Based on Agile Authentication Mechanism". Electronics 11, n.º 23 (28 de novembro de 2022): 3938. http://dx.doi.org/10.3390/electronics11233938.

Texto completo da fonte
Resumo:
With the continuous increase in the proportion of wind power construction and grid connection, the deployment scale of state sensors in wind-power-monitoring systems has grown rapidly with an aim on the problems that the communication authentication process between the wind turbine status sensor and the monitoring gateway is complex and the adaptability of the massive sensors is insufficient. A security access control method for a wind-power-monitoring system based on agile authentication mechanism is proposed in this paper. First, a lightweight key generation algorithm based on one-way hash function is designed. The algorithm realizes fixed-length compression and encryption of measurement data of any length. Under the condition of ensuring security, the calculation and communication cost in the later stage of authentication are effectively reduced. Second, to reduce the redundant process of wind turbine status sensor authentication, an agile authentication model of wind turbine status sensor based on a lightweight key is constructed. Constrained by the reverse order extraction of key information in the lightweight keychain, the model can realize lightweight communication between massive wind turbine status sensors and regional gateways. Finally, the proposed method is compared and verified using the wind turbine detection data set provided by the National New Energy Laboratory of the United States. The experimental results show that this method can effectively reduce the certification cost of a wind-power-monitoring system. Additionally, it can improve the efficiency of status sensor identity authentication and realize the agility and efficiency of the authentication process.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Murthy, Uday S. "Tampa Electronics: An Instructional Case in Computer-Assisted Fraud Examination". Issues in Accounting Education 25, n.º 3 (1 de agosto de 2010): 547–52. http://dx.doi.org/10.2308/iace.2010.25.3.547.

Texto completo da fonte
Resumo:
ABSTRACT: This case is designed to impart practical skills in data analysis techniques aimed at fraud examination. Instructors could employ any one of widely available tools such as ACL, IDEA, Microsoft Access, or Picalo, which is an open-source data analysis tool. Couched in the context of a manufacturer of electronic components in the southeastern United States, the case involves the identification of potentially fraudulent travel expense reimbursements. In the case scenario, traveling salespersons submit expense reimbursement claims, which are subject to a number of business rules. Using data analysis techniques, students are required to identify potentially fraudulent travel expense reimbursements. The data analysis techniques covered in the case include basic features such as identifying duplicates and gaps to more advanced features like joining tables, finding unmatched records, filtering data based on various criteria, and classifying and summarizing data. The degree of structure provided to students is within the control of the instructor, with less structure making for a more realistic and challenging assignment. Spreadsheet files containing the travel expense data are designed to facilitate easy changing of numbers between semesters.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Agarwal, Pranay, Mohammedhusen Manekiya, Tahir Ahmad, Ashish Yadav, Abhinav Kumar, Massimo Donelli e Saurabh Tarun Mishra. "A Survey on Citizens Broadband Radio Service (CBRS)". Electronics 11, n.º 23 (1 de dezembro de 2022): 3985. http://dx.doi.org/10.3390/electronics11233985.

Texto completo da fonte
Resumo:
To leverage the existing spectrum and mitigate the global spectrum dearth, the Federal Communications Commission of the United States has recently opened the Citizens Broadband Radio Service (CBRS) spectrum, spanning 3550–3700 MHz, for commercial cognitive operations. The CBRS has a three-tier hierarchical architecture, wherein the incumbents, including military radars, occupy the topmost tier. The priority access licenses (PAL) and general authorized access (GAA) are second and third tier, respectively, facilitating licensed and unlicensed access to the spectrum. This combination of licensed and unlicensed access to the spectrum in a three-tier model has opened novel research directions in optimal spectrum sharing as well as privacy preservation, and hence, several schemes have been proposed for the same. This article provides a detailed survey of the existing literature on the CBRS. We provide an overview of the CBRS ecosystem and discuss the regulation and standardization process and industrial developments on the CBRS. The existing schemes for optimal spectrum sharing and resource allocation in CBRS are discussed in detail. Further, an in-depth study of the existing literature on the privacy of incumbents, PAL devices, and GAA devices in CBRS is presented. Finally, we discuss the open issues in CBRS, which demand more attention and effort.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Zelalem Jembre, Yalew, Woon-young Jung, Muhammad Attique, Rajib Paul e Beomjoon Kim. "Mobile Broadband Performance Evaluation: Analysis of National Reports". Electronics 11, n.º 3 (8 de fevereiro de 2022): 485. http://dx.doi.org/10.3390/electronics11030485.

Texto completo da fonte
Resumo:
Five decades have passed since the first bit was transmitted over the internet. Although the internet has improved our lives and led to the digital economy, currently only 51% of the world’s population have access to it. Currently, consumers mostly access the internet via mobile broadband, 2G, 3G, and 4G services. Regulatory bodies such as the Federal Communications Commission (FCC) of the US are responsible for ensuring that consumers receive an adequate service from Mobile Network Operators (MNOs). Usually, regulators evaluate the performance of each MNO in terms of service quality yearly and publish a report. To evaluate performance, metrics such as coverage, download/upload speed, and the number of subscribers can be used. However, the evaluation process and the metrics used by each regulatory body are inconsistent, and this makes it hard to determine which nations are providing adequate services to their citizens. Furthermore, it is not clear as to which performance evaluation is the right path. In this case study, we analyzed the reports released from eight nations (United States of America, United Kingdom, France, South Korea, Japan, Singapore, and Australia) as of the year 2020. We then point out the advantages and the drawbacks of the current evaluation process and metrics. Furthermore, a discussion on why the current methods are not sufficient to evaluate 5G services is presented. Our findings indicate that there is a great need for a unified metric and that this process becomes more complex with the rollout of 5G.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Ravnyushkin, A. V. "The Legal Issues of Firearms Trafficking in the United States of America". Siberian Law Review 19, n.º 4 (8 de janeiro de 2023): 356–73. http://dx.doi.org/10.19073/2658-7602-2022-19-4-356-373.

Texto completo da fonte
Resumo:
Relevance and subject of research. The circulation of firearms as a source of increased danger is subject to legal regulation and control in the Russian Federation. The use of weapons by police officers is no exception. The norms of the Federal Law of February 7, 2011 No. 3-FZ “About the Police” (hereinafter referred to as the Law “About the Police”) refer to the achievements of domestic administrative science as a result of the work of specialists. In systemic connection with the norms of criminal law, they regulate the conditions and limits for the use of coercive measures by police officers, including firearms. The fundamental ideas of the activities of the Russian police have successfully cooperated with the norms of international law. On the contrary, in the socalled “leading” democratic state – the United States of America, such cooperation does not look well-coordinated, which the Author substantiates when studying the origins of the right of citizens of this state to own firearms, the regulatory regulation of the circulation of weapons in the United States, the negative consequences of this regulation (based on research by American scientists and statistical data), the activities of the US police to counter armed attacks and its legal regulation. One of the US attempts to comply with international law in this area is analyzed, namely the adopted new policy of the US Customs and Border Protection on the use of force, including firearms.The purpose of the study is to determine the state of legal regulation of the circulation of civilian firearms in the United States, the use of these weapons as a coercive measure by police officers in order to identify its positive aspects, in the presence of which the decision on the possibility / impossibility of their introduction into Russian legislation. This led to the setting of the following tasks: to study the constitutional foundations of the right to own firearms by US citizens (historical aspect); to determine the current state of legal regulation of civilian circulation of firearms in the United States and its consequences; analyze the activities of the US police to counter armed attacks and its legal regulation, evaluate them and determine the prospects for their improvement; identify the provisions of American legislation that are of scientific interest, and the possibility / impossibility of their implementation in Russian legislation.The methodological basis of the study was a dialectical approach to the scientific knowledge of social relations associated with the circulation of firearms, the implementation of their state regulation, analysis and synthesis of the results obtained during the study, which made it possible to formulate and substantiate the conclusions. Among the special methods used in the study are the method of studying normative legal acts and documents, the empirical method, the method of processing and analyzing data, and their generalization. Findings. The study shows that the constitutional foundations for the right to own firearms by US citizens developed simultaneously with the emergence of statehood: first in individual states, and then in the very union of these states formed into a single US government. The existing multi-layered legal framework for regulating the circulation of firearms has created a wide range of owners with a relatively simple system of access, which negatively affects the criminal environment, in which armed attacks with mass casualties are of high importance. Cases of armed attacks and other negative illegal acts to a certain extent influenced the processes of militarization of the police, the creation and strengthening of special operations units, the adoption by the police of various types of military equipment, weapons and special means. Detailed legal regulation of the use of lethal force by the police is developing belatedly. The 2014 adoption of the U.S. Customs and Border Protection Manual did not prompt other law enforcement agencies to adopt similar rules, indicating the fragmentation of U.S. law enforcement. The U.S. Customs and Border Protection Guidelines on the use of force is of particular scientific interest, and after its careful analysis, it is possible to introduce certain provisions into the legal regulation of the activities of the Russian police, especially the use of lethal force. The fundamental ideas of police activity developed in Russia can be recognized as certain guidelines for the development of the American police. The relatively small number of firearm owners in Russia and the high requirements for the circulation of firearms are a deterrent to the negative developments taking place in the United States.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Fatin, Firman Adi Nur, Mukhamad Nurkamid, Rizkysari Meimaharani e Ahmad Bagus Maskula. "Real-Time Monitoring of Gas Fields: Prototype at Pt Gamma Energi Pratama Bogor". JURNAL TEKNIK INFORMATIKA 16, n.º 1 (28 de maio de 2023): 89–99. http://dx.doi.org/10.15408/jti.v16i1.31832.

Texto completo da fonte
Resumo:
PT Gamma Energi Pratama is a company engaged in the instrumentation sector. One of the projects undertaken by PT Gamma Energi Pratama is on an oil and natural gas drilling site. The oil drilling process involves a tool called a Gas Jack Compressor originating from the United States. At first, the technician there used the local panel that came with the compressor. But procuring spare parts takes a long time. At the same time, the needs in the field demand to be met immediately. Therefore, the Programmable Logic Controller (PLC) was chosen as a special microcontroller device that can access the compressor via the Modbus Protocol. PLCs can also be connected to Supervisory Control and Data Acquisition (SCADA) applications via Ethernet. This solution monitors data from sensor readings installed on the Gas Jack Compressor. The system is already running with its use only on the local scope. For the development of the system so that monitoring can be carried out in real-time and online, it needs to be linked to flow control devices, database systems, and interfaces for data visualization. Thus, monitoring gas fields can be done in real-time online.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Mayans, Dámaris. "Lexical Frequency in Heritage Speakers of Spanish". Lenguaje 50, n.º 2 (27 de julho de 2022): 225–45. http://dx.doi.org/10.25100/lenguaje.v50i2.11628.

Texto completo da fonte
Resumo:
This study examines the impact of lexical frequency on grammatical agreement in heritage speakers of Spanish and a Spanish monolingual control group. Research has provided evidence of frequency effects when accessing nouns and this effect was proven to be more prominent in bilingual speakers. This investigation expands on the antecedent psycholinguistic research on lexical access through agreement operations carried out on monolingual speakers of Spanish by examining this effect in two populations of heritage speakers of Spanish that differ in relation to their dominance in Spanish. Experiment 1 was a Elicit Production Task and Experiment 2 was a Picture Description Task. Retrieval of grammatical gender features is needed in both tasks; therefore, lexical frequency plays a role in accessing this information. Reaction times analysis showed frequency effects in both bilingual populations and, as predicted by the Frequency-Lag Hypothesis, larger frequency effects in the less Spanish-dominant group. Results contribute to the understanding of processing mechanisms in adult bilingualism, particularly in heritage speakers of Spanish in the United States.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

McHugh, Douglas, Richard Feinn, Jeff McIlvenna e Matt Trevithick. "A Random Controlled Trial to Examine the Efficacy of Blank Slate: A Novel Spaced Retrieval Tool with Real-Time Learning Analytics". Education Sciences 11, n.º 3 (25 de fevereiro de 2021): 90. http://dx.doi.org/10.3390/educsci11030090.

Texto completo da fonte
Resumo:
Learner-centered coaching and feedback are relevant to various educational contexts. Spaced retrieval enhances long-term knowledge retention. We examined the efficacy of Blank Slate, a novel spaced retrieval software application, to promote learning and prevent forgetting, while gathering and analyzing data in the background about learners’ performance. A total of 93 students from 6 universities in the United States were assigned randomly to control, sequential or algorithm conditions. Participants watched a video on the Republic of Georgia before taking a 60 multiple-choice-question assessment. Sequential (non-spaced retrieval) and algorithm (spaced retrieval) groups had access to Blank Slate and 60 digital cards. The algorithm group reviewed subsets of cards daily based on previous individual performance. The sequential group reviewed all 60 cards daily. All 93 participants were re-assessed 4 weeks later. Sequential and algorithm groups were significantly different from the control group but not from each other with regard to after and delta scores. Blank Slate prevented anticipated forgetting; authentic learning improvement and retention happened instead, with spaced retrieval incurring one-third of the time investment experienced by non-spaced retrieval. Embedded analytics allowed for real-time monitoring of learning progress that could form the basis of helpful feedback to learners for self-directed learning and educators for coaching.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Teses / dissertações sobre o assunto "Computers – Access control – United States"

1

Dikmen, Iskender. "Border monitoring based on a novel PIR detection model". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FDikmen.pdf.

Texto completo da fonte
Resumo:
Thesis (M.S. in Computer Science and M.S. in Information Technology Management)--Naval Postgraduate School, March 2006.
Thesis Advisor(s): Geoffrey Xie "March 2006." Includes bibliographical references (p. 49-50). Also available online.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

LaMore, Robert L. "CyberCIEGE scenario illustrating secrecy issues through mandatory and discretionary access control policies in a multi-level security network". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FLaMore.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Ling, Meng-Chun. "Senior health care system". CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2785.

Texto completo da fonte
Resumo:
Senior Health Care System (SHCS) is created for users to enter participants' conditions and store information in a central database. When users are ready for quarterly assessments the system generates a simple summary that can be reviewed, modified, and saved as part of the summary assessments, which are required by Federal and California law.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Hunt, Richard Reid. "Moving Beyond Regulatory Mechanisms| A Typology of Internet Control Regimes". Thesis, Portland State University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1560952.

Texto completo da fonte
Resumo:

This paper examines national Internet control from a policy regime perspective. The mechanisms through which governments attempt to control the Internet may be developed and implemented by different institutions and agencies, or fall outside of a formal regulatory structure entirely. As such, the totality of the institutions and practices of national Internet control is better conceptualized not as a regulatory regime, but as a control regime. After a survey of the critical policy and control dimensions, a six-part typology of control regimes is proposed. The purpose of this study and typology is exploratory. With comparative research about Internet control regimes at a relatively early stage, this paper aims to enable the formation of concepts and hypotheses about the interrelationship, or co-presence, of key distinguishing variables in different Internet control regimes.

Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Sparrow, Alice Pickett 1939. "THE SOCIOLOGICAL IMPACT OF THE FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT ON AN INSTITUTION OF HIGHER EDUCATION". Thesis, The University of Arizona, 1985. http://hdl.handle.net/10150/275273.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Berrios-Ayala, Mark. "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities". Honors in the Major Thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1547.

Texto completo da fonte
Resumo:
Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM and Xkeyscore so they can keep their tabs on issues that are none of their business; namely, the personal lives of millions. Our allies are taking note; some are learning our bad habits, from Government Communications Headquarters’ (GCHQ) mass shadowing sharing plan to America’s Russian inspiration, SORM. Some countries are following the United States’ poster child pose of a Brave New World like order of global events. Others like Germany are showing their resolve in their disdain for the rise of tyranny. Soon, these new found surveillance troubles will test the resolve of the American Constitution and its nation’s strong love and tradition of liberty. Courts are currently at work to resolve how current concepts of liberty and privacy apply to the current conditions facing the privacy of society. It remains to be determined how liberty will be affected as well; liberty for the United States of America, for the European Union, the Russian Federation and for the people of the World in regards to the extent of privacy in today’s blurred privacy expectations.
B.S.
Bachelors
Health and Public Affairs
Legal Studies
Estilos ABNT, Harvard, Vancouver, APA, etc.

Livros sobre o assunto "Computers – Access control – United States"

1

Brock, Jack L. Computer security: Hackers penetrate DOD computer systems : statement of Jack L. Brock, Jr., Director, Government Information and Financial Management, Information Management and Technology Division, before the Subcommittee on Government Information and Regulation, Committee on Governmental Affairs, United States Senate. Washington, D.C: U.S. General Accounting Office, 1991.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Office, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. Washington, D.C: The Office, 1989.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Critical information infrastructure protection: The threat is real : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, first session, on examining the protection efforts being made against foreign-based threats to United States critical computer infrastructure, October 6, 1999. Washington: U.S. G.P.O., 2001.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

United States. Department of Veterans Affairs. Office of Audits & Evaluations. Review of alleged unauthorized access to VA systems. Washington, D.C: Dept. of Veterans Affairs, Office of Inspector General, Office of Audits and Evaluations, 2011.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

United States. General Accounting Office, ed. FAA computer security: Actions needed to address critical weaknesses that jeopardize aviation operations : statement of Joel C. Willemssen, Director, Civil Agencies Information Systems, Accounting and Information Management Division, before the Committee on Science, House of Representatives. Washington, D.C.]: The Office, 2000.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Office, General Accounting. Information systems: Veterans Administration information resources management is improving : report to congressional requesters. Washington, D.C: The Office, 1988.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Brock, Jack L. Information security: Computer hacker information available on the Internet : statement for the record of Jack L. Brock, Jr., Director, Defense Information and Financial Management Systems, and Keith A. Rhodes, Technical Assistant Director, Office of the Chief Scientist, Accounting and Information Management Division, before the Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 1996.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Brock, Jack L. Information security: Computer attacks at Department of Defense pose increasing risks : statement of Jack L. Brock, Director, Defense Information and Financial Management Systems, Accounting and Information Management Division, before the Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate. Washington, D.C: The Office, 1996.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Brock, Jack L. Information security: Comments on the proposed Government Information Security Act of 1999 : statement of Jack L. Brock, Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Committee on Governmental Affairs, U.S. Senate. [Washington, D.C.]: The Office, 2000.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

United States. Congress. Senate. Committee on Governmental Affairs. The Computer Matching and Privacy Protection Act of 1987: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 496 .... Washington: U.S. G.P.O., 1988.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.

Capítulos de livros sobre o assunto "Computers – Access control – United States"

1

Kosseff, Jeff. "Anonymity as a Sword". In The United States of Anonymous, 214–32. Cornell University Press, 2022. http://dx.doi.org/10.7591/cornell/9781501762383.003.0014.

Texto completo da fonte
Resumo:
This chapter elaborates on anonymity being used as a sword. It examines how malicious actors use their ability to control access to their identifying information when it comes to inflicting harm on other people. According to Saul Levmore, the Internet works as a far more effective medium for disseminating harmful speech. The chapter looks into the narrative of Ryan S. Lin and his cyberstalking campaign, citing the First Amendment's free speech protection did not directly hinder law enforcement's investigation against his roommate. Lin's case unveiled some harmful ways in which people can operate within the culture of anonymity empowerment. By 2018, Lin pleaded guilty to cyberstalking, distribution of child pornography, hoax bomb threats, computer fraud and abuse, and aggravated identity theft. The chapter also considers the implications of modern online anonymity by referencing QAnon.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Clayton, John F. "Education, the Internet, and the World Wide Web". In Encyclopedia of Human Computer Interaction, 175–78. IGI Global, 2006. http://dx.doi.org/10.4018/978-1-59140-562-7.ch028.

Texto completo da fonte
Resumo:
The development of the Internet has a relatively brief and well-documented history (Cerf, 2001; Griffiths, 2001; Leiner et al., 2000; Tyson, 2002). The initial concept was first mooted in the early 1960s. American computer specialists visualized the creation of a globally interconnected set of computers through which everyone quickly could access data and programs from any node, or place, in the world. In the early 1970s, a research project initiated by the United States Department of Defense investigated techniques and technologies to interlink packet networks of various kinds. This was called the Internetting project, and the system of connected networks that emerged from the project was known as the Internet. The initial networks created were purpose-built (i.e., they were intended for and largely restricted to closed specialist communities of research scholars). However, other scholars, other government departments, and the commercial sector realized the system of protocols developed during this research (Transmission Control Protocol [TCP] and Internet Protocol [IP], collectively known as the TCP/IP Protocol Suite) had the potential to revolutionize data and program sharing in all parts of the community. A flurry of activity, beginning with the National Science Foundation (NSF) network NSFNET in 1986, over the last two decades of the 20th century created the Internet as we know it today. In essence, the Internet is a collection of computers joined together with cables and connectors following standard communication protocols.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Ketzan, Erik, e Paweł Kamocki. "Digital Humanities Research under United States and European Copyright Laws". In Access and Control in Digital Humanities, 233–48. Routledge, 2021. http://dx.doi.org/10.4324/9780429259616-19.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Marcelle, Gillian M. "A Feminist Agenda for Reducing the Gender Digital Divide". In Global Information Technologies, 3126–48. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-939-7.ch221.

Texto completo da fonte
Resumo:
There is little shared understanding of the term “digital divide,” but this has not prevented the international community from investing a great deal of effort in projects that aim to reduce the digital divide by reducing disparities in access to information and communication technologies (ICT) (European Commission High Level Group, 1997; International Telecommunication Union [ITU], 1984, 2003; United Nations Economic and Social Commission [UN ECOSOC], 2000). The divergent rate at which ICT diffuses—the digital divide—is a reflection of broader socioeconomic divides, many of which exist within societies. The divide between men and women, rich and poor, young and old, urban and rural, literate and non-literate, also manifests itself in the digital world of media, computers, telecommunications, Internet, and jobs in software production. Information and communication flows carried by ICT are increasingly becoming an integral factor in international, institutional, and political processes. Lack of access to ICT therefore impacts on opportunities for developing countries’ economic growth, wealth distribution, social empowerment, and development. It is the digital divide which largely prevents the equal sharing of knowledge worldwide and leads to “information and knowledge poverty” among certain groups. If only a select number of countries, and within them certain groups, reap the benefits of ICT while others continue to lag behind, the digital divide will continue to grow and the virtuous cycle that ICT can create will not be enjoyed by many (Millward-Oliver, 2005). There is little acknowledgment and even less acceptance that gender constitutes an important influence in the structure of the “digital divide.” At first glance, this failure to admit context may seem strange and out of step with common sense. Why should gender relations, such an important and pivotal element of social structure, that is known to influence differentiated access to financial resources, employment opportunities, education and training, water and sanitation, health care, legal status, and enjoyment of human-rights not affect access to and control of ICT? This article will explore some of the key factors that lead to gender blindness in the digital divide debate and articulate a strategic response
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Sundstrom, Beth, e Cara Delay. "How Do Attitudes and Policies Impact Access to Birth Control?" In Birth Control. Oxford University Press, 2020. http://dx.doi.org/10.1093/wentk/9780190069674.003.0006.

Texto completo da fonte
Resumo:
What attitudes and beliefs affect access to birth control in the United States? The vast majority of the American public believes birth control is a fundamental right that all people should have access to. This consensus has persisted for years: in 1937, 61%...
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Markowitz, Jonathan N. "The United States’ Arctic Foreign Policy". In Perils of Plenty, 125–53. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190078249.003.0006.

Texto completo da fonte
Resumo:
Chapter 6 examines how the United States, the most powerful production-oriented Arctic state, responded to the revelation of Arctic resources. If capabilities drive intentions, then the United States should project the most power to the region. However, if economic structure influences states’ preferences, as this book argues, then Washington should be more interested in securing access to markets and less concerned with seeking control over Arctic resources. This chapter provides a detailed account of the impact the United States’ production-based economy and broad governing coalition had on its Arctic foreign policy. Compared with the other Arctic states, the United States invested far less in bolstering its existing Arctic bases and icebreakers. In line with the book’s core predictions, the United States’ domestic political economy best explains Washington’s reluctance to make greater Arctic commitments and a concomitant lack of substantial investment in increasing the United States’ Arctic military presence throughout multiple administrations.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Holden, Robert H. "Defining Collaboration: The United States and Central America". In Armies Without Nations, 119–33. Oxford University PressNew York, NY, 2004. http://dx.doi.org/10.1093/oso/9780195161205.003.0010.

Texto completo da fonte
Resumo:
Abstract The onset of intense collaboration between the military and police authorities of the United States and the five Central American governments, starting in World War II, not only globalized but also transformed public violence on the isthmus. The military and police agencies of all the Central American states, whose national economies were incapable of supplying their enlisted men little but the sandals on their feet and the most miserly of food rations, eagerly integrated themselves into global networks that provided material, technical, managerial, and ideological resources on a scale unmatched in their histories. The global, unregulated character of the networks meant no single power could control or monopolize their operation. The United States clearly dominated the Central Americans’ access to and participation in those networks.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Partow-Navid, Parviz, e Ludwig Slusky. "IT Security Policy in Public Organizations". In Information Security and Ethics, 2745–54. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch183.

Texto completo da fonte
Resumo:
Today, information security is one of the highest priorities on the IT agenda. In 2003, Luftman and McLean (2004) conducted a survey of Society for Information Management members to identify the top 20 information technology (IT) issues for executives. Security and privacy issues were ranked third, after IT/ business alignment and IT strategic planning. Concept of information security applies to all the data stored in information systems or being communicated in information networks and encompasses measures applied on all layers of open system interconnect (OSI) model of international standards such as application, networking, and physical. Sophisticated technologies and methods have been developed to: • Control access to computer networks • Secure information systems with advanced cryptography and security models • Establish standards for operating systems with focus on confidentiality • Communication integrity and availability for securing different types of networks • Manage trustworthy networks and support business continuity planning, disaster recovery, and auditing The most widely recognized standards are: • In the United States: Trusted Computer System Evaluation Criteria (TCSEC). • In Canada: Canadian Trusted Computer Product Evaluation Criteria (CTCPEC). • In Europe: Information Technology Security Evaluation Criteria (ITSEC). All of theses standards have recently been aggregated into Common Criteria standards. And yet, the information systems continue to be penetrated internally and externally at a high rate by malicious code, attacks leading to loss of processing capability (like distributed denial-of-service attack), impersonation and session hijacking (like man-in-the-middle attack), sniffing, illegal data mining, spying, and others. The problem points to three areas: technology, law, and IT administration. Even prior to the drama of 9/11, several computer laws were enacted in the USA and yet more may come in the future. Still the fundamental threats to information security, whether they originated outside the network or by the company’s insiders, are based on fundamental vulnerabilities inherent to the most common communication protocols, operating systems, hardware, application systems, and operational procedures. Among all technologies, the Internet, which originally was created for communication where trust was not a characteristic, presents the greatest source of vulnerabilities for public information systems infrastructures. Here, a threat is a probable activity, which, if realized, can cause damage to a system or create a loss of confidentiality, integrity, or availability of data. Consequently, vulnerability is a weakness in a system that can be exploited by a threat. Although, some of these attacks may ultimately lead to an organization’s financial disaster, an all-out defense against these threats may not be economically feasible. The defense actions must be focused and measured to correspond to risk assessment analysis provided by the business and IT management. That puts IT management at the helm of the information security strategy in public organizations.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Pinnolis, Judith S. "Jewish Music Sound-Recording Collections in the United States". In The Oxford Handbook of Jewish Music Studies, 408–28. Oxford University Press, 2023. http://dx.doi.org/10.1093/oxfordhb/9780197528624.013.21.

Texto completo da fonte
Resumo:
Abstract This chapter examines several significant Jewish music sound-recording collections in the United States, most of which originated as private collections but are now housed at academic institutions. Their origins provide insight into individual agency tied to different understandings of Jewish music. A discussion of their complexities from a library-science perspective focuses on conservation and preservation as well as bibliographic control and other issues in which the complexities of Jewish music unfold more clearly. Authenticity, comprehensiveness, and other constructions demonstrate how sound-recording collections reflect the overall difficulties of defining and delimiting Jewish music. Subsequent discussions and observations on access and audiences inside and outside the academy ultimately reveal the fine line of individuality and collectivity that Jewish music sound recording collections navigate.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

deRosset, Leslie, Halle Neeley e Aunchalee Palmquist. "Innovations in Virtual Care". In The Practical Playbook III, 427–42. Oxford University PressNew York, 2024. http://dx.doi.org/10.1093/oso/9780197662984.003.0038.

Texto completo da fonte
Resumo:
Abstract Telemedicine has been used since the 1950s to provide specialized healthcare to patients who could not otherwise access needed services. However, it was not until the late 1980s and early 1990s that technological advancements allowed telemedicine to become more available to both patients and healthcare providers. Between 2016 and 2019, telemedicine utilization in the United States doubled, from 14% to 28%. Telemedicine and telehealth help patients and healthcare providers to communicate using electronic platforms that include audio and video that are either synchronous or asynchronous. Since its inception, telehealth has failed to address the structural inequities of access to healthcare. Access to telemedicine, telehealth, and remote services is not equitable in the United States. Telehealth is most challenging for people with low digital literacy, those who are non-English-speaking and need an interpreter, people living in rural areas (where broadband is insufficient or limited), and those without access to computers or devices (or who must share them with other family members).
Estilos ABNT, Harvard, Vancouver, APA, etc.

Trabalhos de conferências sobre o assunto "Computers – Access control – United States"

1

Banerjee, Subharthi, Michael Hempel, Pejman Ghasemzadeh, Hamid Sharif e Tarek Omar. "Wireless Communication for High-Speed Passenger Rail Services: A Study on the Design and Evaluation of a Unified Architecture". In 2020 Joint Rail Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/jrc2020-8068.

Texto completo da fonte
Resumo:
Abstract High-speed trains, though prevalent in Europe and Asia, are not yet a reality in the US. But interest and industry engagement are growing, especially around commercial hubs close to commuter homes for alleviating commute times. With support from the Federal Railroad Administration in the United States, the authors are exploring the design requirements, challenges, and technology capabilities for wireless communication between passenger cars, on-board systems and with trackside infrastructure, all using next-generation radio access technologies. Key aspects of this work focus on interoperability, modularity of the architecture to facilitate a future-proof design, high-performance operations for passenger services and ultra-low latency capabilities for train control operations. This paper presents the theoretical studies and computer simulations of the proposed network architectures, as well as the results of an LTE/5G field test framework using an OpenAir-Interface (OAI)-based software-defined radio (SDR) approach. Through various test scenarios the OAI LTE/5G implementation is first evaluated in a lab environment and through field tests. These tests provide ground-truth data that can be leveraged to refine the computer simulation model for evaluating large-scale environments with high fidelity and high accuracy. Of particular focus in this evaluation are performance aspects related to delay, handover, bit error rate, frequency offset and achievable uplink/downlink throughput.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Carlson, Justin, Zachariah Tiberi, Mohsen Safaei, Robert I. Ponder e Steven R. Anton. "Parametric Testing of Surrogate Knee Replacement Bearings With Embedded Piezoelectric Transducers". In ASME 2018 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/smasis2018-8037.

Texto completo da fonte
Resumo:
In the United States, Total Knee Replacement (TKR) is a surgery many people go through, but frequently, patients find that they are unhappy post-surgery due to misalignment and loosening of the knee. An estimated 20% of knee replacement recipients report discomfort or undesired functionality within their first few years after surgery. Surgical techniques currently rely heavily on experience and tactile feedback to correctly align the knee replacement. If surgical teams were to have access to data regarding compartmental forces within the knee over the life of the implant, then a more precise balancing procedure could be implemented. As it stands, the only way to obtain this in vivo data is for patients to undergo post-operative fluoroscopy procedures; unfortunately, patients have no incentive to undergo this process. This study tests the capabilities of knee bearings embedded with piezoelectric transducers to estimate the magnitude and location of loading given certain inputs. The prototype is fabricated from ultra high molecular weight (UHMW) polyethylene using Computer Numerical Control (CNC) machining. For this study, to simulate loads under both normal and irregular knee positions, a custom fixture is designed and fabricated for use in a uniaxial load frame. The problem at hand necessitates a more realistic knee testing environment that can simulate the loading types of both balanced and imbalanced knees. Thus, the fixture permits various degrees of internal and external rotation. Additionally, through use of an X-Y translational table, the setup allows for in-plane translation between the condyles of the femoral component and the bearing prototype. This study compares values of force location from the piezoelectric sensors to measurements from pressure sensitive film. The piezoelectric knee bearing is tested to lay the groundwork for in vivo testing. Future work expanding upon this research would include designing and optimizing an in vivo knee bearing replacement to facilitate force location and magnitude data collection in a system free from external power sources by utilizing the energy harvesting capabilities of piezoelectrics.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Anderson, Gary L., e Devendra P. Garg. "Damping and Vibration Control via Nanoscale Technologies for Defense Oriented Applications". In ASME 2003 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/detc2003/vib-48536.

Texto completo da fonte
Resumo:
This paper discusses the potential of nanoscale technologies with particular attention devoted to applications in the defense area. Innovative techniques for structural damping and vibration control are of much interest to the Structures and Dynamics Program at the United States Army Research Office (ARO). Since nanotechnology is a new and different way of thinking about the creation of devices and systems, it holds much promise for such applications. Nanotechnology can be gainfully employed to create and utilize materials, devices, and systems through the control of matter on the nanometer-length scale, i.e., to engineer matter at the level of atoms and molecules, leading to the generation of larger structures having fundamentally new molecular organizations exhibiting novel physical, chemical, and biological properties and phenomena. In addition to describing an overview of nanotechnology and its relevance to the defense needs, the paper describes a few of the currently ongoing projects under the ARO sponsorship.
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Zhao, Yixin, e Sara Behdad. "Electric Vehicle Battery Simulation: How Electrode Porosity and Thickness Impact Cost and Performance". In ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-71511.

Texto completo da fonte
Resumo:
Abstract Lithium-ion batteries almost exclusively power today’s electric vehicles (EVs). Cutting battery costs is crucial to the promotion of EVs. This paper aims to develop potential solutions to lower the cost and improve battery performance by investigating its design variables: positive electrode porosity and thickness. The open-access lithium-ion battery design and cost model (BatPac) from the Argonne National Laboratory of the United States Department of Energy, has been used for the analyses. Six pouch battery systems with different positive materials are compared in this study (LMO, LFP, NMC 532/LMO, NMC 622, NMC 811, and NCA). Despite their higher positive active material price, nickel-rich batteries (NMC 622, NMC 811, and NCA) present a cheaper total pack cost per kilowatt-hour than other batteries. The higher thickness and lower porosity can reduce the battery cost, enhance the specific energy, lower the battery mass but increase the performance instability. The reliability of the results in this study is proven by comparing estimated and actual commercial EV battery parameters. In addition to the positive electrode thickness and porosity, six other factors that affect the battery’s cost and performance have been discussed. They include energy storage, negative electrode porosity, separator thickness and porosity, and negative and positive current collector thickness.
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Song, Xubin, e Dongpu Cao. "Design of Semiactive Vehicle Suspension Controls in Frequency Domain". In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-86557.

Texto completo da fonte
Resumo:
Through the simulation study of a semiactive quarter car suspension, this paper is to expatiate on the control algorithm documented in the United States Patent 6,873,890 [1]. That patent presents a new method to design semiactive suspension controls in the frequency domain. As is well known, suspension related dynamics has two dominant modes in the working frequency range up to 25Hz. As such, the suspension dynamic system has three distinguishable frequency sections. In order to achieve better performance, different controls have to be applied to each frequency section, respectively. The significant core part of the patented algorithm is to provide an approach to identify the excited frequencies in real time that are transmitted through the vehicle suspension. Then different controls of such as skyhook, groundhook and other damping strategies are combined accordingly to accomplish the best performance overall. Thus through the suspension control the vehicle dynamics (such as ride and handling) is expected to be improved in the broad frequency range in comparison to passive suspensions with a trade-off design.
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Gray, Jeremy P., Vladimir V. Vantsevich e Jim L. Overholt. "Indices and Computational Strategy for Unmanned Ground Wheeled Vehicle Mobility Estimation and Enhancement". In ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12158.

Texto completo da fonte
Resumo:
The United States Army began developing Unmanned Ground Vehicles (UGV) in the early 1900’s. Concurrently, researchers developed and enhanced passenger and commercial ground vehicles. Although significant progress has been made for improving vehicle mobility for all ground vehicles throughout the past century, mobility has lacked a concise mutually agreed definition and analytical standardized criteria. The implementations of improved technologies, such as vehicle traction control, stability control, and torque vectoring systems require researchers to take a step back and reevaluate mobility criteria. UGVs require additional enhancement to include on-line mobility estimation since the vehicle cannot predict nor anticipate terrain conditions on their own prior to the vehicle traversing those conditions. This paper analyzes methodologies researchers have employed for defining and improving vehicle mobility of wheeled vehicles. The analysis is done from a view point of concurrent mobility methodologies’ enhancement and applicability to wheeled UGVs. This analysis is then used to develop off-line and on-line analytical criterion for mobility estimation, and to derive a strategy which can be applied to wheeled vehicles, both manned and unmanned. The on-line mobility estimation enables the UGV to make control changes as the events occur rather than after the event, causing the vehicle to then optimize its reaction to regain control.
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Hu, Yang, e Gaurav Ameta. "Life Cycle Assessment and Eco-Design of a Wireless TV/VCR Remote". In ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12484.

Texto completo da fonte
Resumo:
The focus of this paper is to present life-cycle assessment (LCA) of a TV/VCR remote, including alkaline batteries, and to compare the environmental impacts with a redesigned remote consisting of a solar cell. LCA is a very helpful tool in identifying the most important factors for improving product sustainability. The remote considered in this study can control both television and video cassette recorder. This remote is manufactured in Malaysia and exported to the United States. Its life-cycle system includes raw material, parts, shipment, use phase and waste treatment; its life-cycle impact assessment (LCIA) is performed using SimaPro 7.1 and employing the TRACI method. LCA uncertainty analyzing is performed for both remotes utilizing Monte Carlo simulation in SimaPro 7.1. LCA result shows use of alkaline battery affects most obviously in environmental impacts. In Eco-design remote model, both energy type and raw materials changed. Environmental impacts reduce in five categories in redesigned remote. This paper: 1) presents a prototype design for product using solar cell; 2) presents a novel method for designers to determine raw materials to improve product sustainability in designing stage; 3) provides suggestions for manufacturers to improve product sustainability through reuse of solar cell or a leasing strategy.
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Joshi, Rakesh, Nathan Bane, Justin Derickson, Mark E. Williams e Abhijit Nagchaudhuri. "Preliminary Trial Results for the Redesigned STRIDER Platform With Sampling Capability From Different Depths". In ASME 2017 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/detc2017-67385.

Texto completo da fonte
Resumo:
STRIDER: Semi-Autonomous Tracking Robot with Instrumentation for Data-Acquisition and Environmental Research, a semi-autonomous aquatic vessel, was envisioned for automated water sampling, data collection, and depth profiling to document water quality variables related to agricultural run-offs. Phase-I of the STRIDER project included the capability for STRIDER to collect water samples and water quality data on the surface of water bodies. This paper discusses the Phase-II efforts of the project, in which the previous design of STRIDER was adapted to extend its capabilities to include monitoring, depth profiling, and visualization of in-situ water quality data at various depths as well as collect water samples at each depth for bacterial analysis. At present, the vessel has been utilized for navigation to specified locations using remote control for collecting water quality data and water samples from the surface, as well as 2 feet and 4 feet below the surface at multiple UMES ponds. In a series of preliminary trial runs with the supervision of UMES faculty members and collaborators from the United States Department of Agriculture (USDA), STRIDER successfully collected 48 water samples for bacterial analysis at different locations and depths of ponds on the UMES campus. Design alternatives are being explored for more efficient water sampling capabilities.
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Ward, Jeffrey A., Joseph Hitt, Thomas Sugar e Kartik Bharadwaj. "Dynamic Pace Controller for the Robotic Gait Trainer". In ASME 2006 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/detc2006-99733.

Texto completo da fonte
Resumo:
With over 600, 000 people each year surviving a stroke, it has become the leading cause of serious long-term disability in the United States [1,2,3]. Studies have proven that through repetitive task training, neural networks can be re-mapped thus increasing the mobility of the patient [4–8]. This paper is a continuation of Kartik Bharadwaj’s and Arizona State University’s research on the Robotic Gait Trainer [9]. This work is funded in part by the National Institutes of Health (NIH), grant number - 1 R43 HD04067 01. Previously the gait cycle was fixed at two seconds. For a smooth gait the patient had to be trained to follow the frequency of the robot. Audible cues were sounded to help the patient keep rhythm with the robot. This device now has an updated control methodology based on a Matlab and Simulink platform that allows the robot to dynamically adjust to the patient’s pace of gait. Data collected from an able-bodied person walking with the new device showed that the device dynamically adjusted to any normal range of walking gait. This more flexible design will allow the patient to focus more on the therapy and walk at his/her natural pace.
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Shao, Guodong, Alexander Brodsky, Jorge Arinez, Daniel Menasce e Paul Ammann. "A Decision-Guided Energy Management Framework for Sustainable Manufacturing". In ASME 2011 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2011. http://dx.doi.org/10.1115/detc2011-47454.

Texto completo da fonte
Resumo:
A growing number of manufacturing industries are initiating efforts to address sustainability issues. According to the National Association of Manufacturers, the manufacturing sector currently accounts for about one third of all energy consumed in the United States [1]. Reducing energy costs and pollution emissions involves many areas within an industrial facility. Peak electric demands are a significant component in the cost of electricity. Electric demand management relates to electric tariff rates, new power generation, and incentives to curtail peak usages. Shifting some equipment/machine usage to the periods of lower cost or using stand-by local generators during the peak demand period can yield important savings. Analysis of these options is important to decision makers to avoid unnecessary high cost of energy and equipment. This paper proposes a Decision-Guided energy management in manufacturing (DG-EMM) framework to perform what-if analysis and make optimal actionable recommendations for a manufacturing facility both on (1) operational energy management including load shedding, curtailment, and local generation and (2) planning and investment decisions for introducing renewable technologies. The DG-EMM is based on the novel technology of the Decision-Guidance Query Language (DGQL), which is a tool for fast development and iterative extension of decision-guidance and optimization solutions. The proposed DG-EMM will support user-defined objectives for optimal recommendations, such as minimizing emissions and energy costs and maximizing Return on Investment (ROI). A case study of the peak demand control for an example manufacturing facility is discussed.
Estilos ABNT, Harvard, Vancouver, APA, etc.

Relatórios de organizações sobre o assunto "Computers – Access control – United States"

1

Gindi, Renee. Health, United States, 2019. Centers for Disease Control and Prevention (U.S.), 2021. http://dx.doi.org/10.15620/cdc:100685.

Texto completo da fonte
Resumo:
Health, United States, 2019 is the 43rd report on the health status of the nation and is submitted by the Secretary of the Department of Health and Human Services to the President and the Congress of the United States in compliance with Section 308 of the Public Health Service Act. This report was compiled by the National Center for Health Statistics (NCHS) of the Centers for Disease Control and Prevention (CDC). The Health, United States series presents an annual overview of national trends in key health indicators. The 2019 report presents trends and current information on selected measures of morbidity, mortality, health care utilization and access, health risk factors, prevention, health insurance, and personal health care expenditures in a 20-figure chartbook. The Health, United States, 2019 Chartbook is supplemented by several other products including Trend Tables, an At-a-Glance table, and Appendixes available for download on the Health, United States website at: https://www.cdc.gov/nchs/hus/ index.htm. The Health, United States, 2019 Chartbook contains 20 figures and 20 tables on health and health care in the United States. Examining trends in health informs the development, implementation, and evaluation of health policies and programs. The first section (Figures 1–13) focuses on health status and determinants: life expectancy, infant mortality, selected causes of death, overdose deaths, suicide, maternal mortality, teen births, preterm births, use of tobacco products, asthma, hypertension, heart disease and cancer, and functional limitations. The second section (Figures 14–15) presents trends in health care utilization: use of mammography and colorectal tests and unmet medical needs. The third section (Figures 16–17) focuses on health care resources: availability of physicians and dentists. The fourth section (Figures 18–20) describes trends in personal health care expenditures, health insurance coverage, and supplemental insurance coverage among Medicare beneficiaries. The Highlights section summarizes major findings from the Chartbook. Suggested citation: National Center for Health Statistics. Health, United States, 2019. Hyattsville, MD. 2021.
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Minkanic, Michelle, e Emily Tran. Socioeconomic and Cultural Factors Influencing Type of Hormonal Contraceptive Use in Women in Developed vs Under-Developed Geographic Areas. Science Repository, abril de 2024. http://dx.doi.org/10.31487/j.cei.2024.01.01.

Texto completo da fonte
Resumo:
The intent of this study is to identify and compare sociocultural barriers in various geographic regions that impede access, type and use of hormonal contraception, and methods to improve restrictions in access. Understanding and addressing sociocultural barriers to hormonal contraception on a larger intercontinental scale can create a more effective and inclusive healthcare system. A search using PubMed, Cochrane, and Embase was conducted on current and past literature performed in various developmental countries. Terms such as “birth control access AND developed nations”, “barriers of hormonal contraception AND low-income countries” were used. Studies included ranged from RCTs, cross-sectional studies, literature reviews, and meta-analyses. Countries reviewed with lower levels of development in Africa, the Middle East, Southeast Asia, and Latin America have demonstrated a rise in long-acting hormonal contraception (LARCs) after injectables. Barriers in these regions include misconceptions fertility and contraception use, access to modern contraceptives (these include oral and emergency contraceptive pills, implants, injectables, contraceptive patches and rings, intrauterine devices, female and male sterilization, vaginal barrier methods and female condoms), stigma and patriarchal settings that result in male influence on women’s reproductive choices. More developed regions of the world like the United States and Europe demonstrated a range of contraceptive options with the most compliance for intrauterine implants (IUDs) in younger reproductive women. The greatest hindrances for developed regions were cost, difficulty obtaining appointments, and fallacies for future fertility. Contraceptive education and culturally sensitive counseling should be emphasized for healthcare employees serving women with ease of access, and to strengthen reproductive support services. Advocating to provide underdeveloped regions with better contraceptive resources highlights an importance to give women globally the empowerment to choose the direction of their own reproductive journey.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Burniske, Jessica, Dustin Lewis e Naz Modirzadeh. Suppressing Foreign Terrorist Fighters and Supporting Principled Humanitarian Action: A Provisional Framework for Analyzing State Practice. Harvard Law School Program on International Law and Armed Conflict, outubro de 2015. http://dx.doi.org/10.54813/nrmd2833.

Texto completo da fonte
Resumo:
In 2014, reports suggested that a surge of foreign jihadists were participating in armed conflicts in Syria, Iraq, and elsewhere. The United Nations Security Council responded by imposing in Resolution 2178 (2014) an array of obligations on member states to counter the threat posed by “foreign terrorist fighters” (FTFs). In the intervening year, those states have taken a range of actions — though at various speeds and with varying levels of commitment — to implement the FTF obligations imposed by the Council. Meanwhile, many states continue to fund and otherwise throw their support behind life-saving humanitarian relief for civilians in armed conflicts around the world — including conflicts involving terrorists. Yet, in recent years, members of the humanitarian community have been increasingly aware of the real, perceived, and potential impacts of counterterrorism laws on humanitarian action. Part of their interest stems from the fact that certain counterterrorism laws may, intentionally or unintentionally, adversely affect principled humanitarian action, especially in regions where terrorist groups control territory (and thus access to civilians, too). The effects of these laws may be widespread — ranging from heightened due diligence requirements on humanitarian organizations to restrictions on travel, from greater government scrutiny of national and regional staff of humanitarian organizations to decreased access to financial services and funding. Against that backdrop, this briefing report has two aims: first, to provide a primer on the most salient issues at the intersection of counterterrorism measures and humanitarian aid and assistance, with a focus on the ascendant FTF framing. And second, to put forward, for critical feedback and assessment, a provisional methodology for evaluating the following question: is it feasible to subject two key contemporary wartime concerns — the fight against FTFs and supporting humanitarian aid and assistance for civilians in terrorist-controlled territories — to meaningful empirical analysis?
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Bourrier, Mathilde, Michael Deml e Farnaz Mahdavian. Comparative report of the COVID-19 Pandemic Responses in Norway, Sweden, Germany, Switzerland and the United Kingdom. University of Stavanger, novembro de 2022. http://dx.doi.org/10.31265/usps.254.

Texto completo da fonte
Resumo:
The purpose of this report is to compare the risk communication strategies and public health mitigation measures implemented by Germany, Norway, Sweden, Switzerland, and the United Kingdom (UK) in 2020 in response to the COVID-19 pandemic based on publicly available documents. The report compares the country responses both in relation to one another and to the recommendations and guidance of the World Health Organization where available. The comparative report is an output of Work Package 1 from the research project PAN-FIGHT (Fighting pandemics with enhanced risk communication: Messages, compliance and vulnerability during the COVID-19 outbreak), which is financially supported by the Norwegian Research Council's extraordinary programme for corona research. PAN-FIGHT adopts a comparative approach which follows a “most different systems” variation as a logic of comparison guiding the research (Przeworski & Teune, 1970). The countries in this study include two EU member States (Sweden, Germany), one which was engaged in an exit process from the EU membership (the UK), and two non-European Union states, but both members of the European Free Trade Association (EFTA): Norway and Switzerland. Furthermore, Germany and Switzerland govern by the Continental European Federal administrative model, with a relatively weak central bureaucracy and strong subnational, decentralised institutions. Norway and Sweden adhere to the Scandinavian model—a unitary but fairly decentralised system with power bestowed to the local authorities. The United Kingdom applies the Anglo-Saxon model, characterized by New Public Management (NPM) and decentralised managerial practices (Einhorn & Logue, 2003; Kuhlmann & Wollmann, 2014; Petridou et al., 2019). In total, PAN-FIGHT is comprised of 5 Work Packages (WPs), which are research-, recommendation-, and practice-oriented. The WPs seek to respond to the following research questions and accomplish the following: WP1: What are the characteristics of governmental and public health authorities’ risk communication strategies in five European countries, both in comparison to each other and in relation to the official strategies proposed by WHO? WP2: To what extent and how does the general public’s understanding, induced by national risk communication, vary across five countries, in relation to factors such as social capital, age, gender, socio-economic status and household composition? WP3: Based on data generated in WP1 and WP2, what is the significance of being male or female in terms of individual susceptibility to risk communication and subsequent vulnerability during the COVID-19 outbreak? WP4: Based on insight and knowledge generated in WPs 1 and 2, what recommendations can we offer national and local governments and health institutions on enhancing their risk communication strategies to curb pandemic outbreaks? WP5: Enhance health risk communication strategies across five European countries based upon the knowledge and recommendations generated by WPs 1-4. Pre-pandemic preparedness characteristics All five countries had pandemic plans developed prior to 2020, which generally were specific to influenza pandemics but not to coronaviruses. All plans had been updated following the H1N1 pandemic (2009-2010). During the SARS (2003) and MERS (2012) outbreaks, both of which are coronaviruses, all five countries experienced few cases, with notably smaller impacts than the H1N1 epidemic (2009-2010). The UK had conducted several exercises (Exercise Cygnet in 2016, Exercise Cygnus in 2016, and Exercise Iris in 2018) to check their preparedness plans; the reports from these exercises concluded that there were gaps in preparedness for epidemic outbreaks. Germany also simulated an influenza pandemic exercise in 2007 called LÜKEX 07, to train cross-state and cross-department crisis management (Bundesanstalt Technisches Hilfswerk, 2007). In 2017 within the context of the G20, Germany ran a health emergency simulation exercise with WHO and World Bank representatives to prepare for potential future pandemics (Federal Ministry of Health et al., 2017). Prior to COVID-19, only the UK had expert groups, notably the Scientific Advisory Group for Emergencies (SAGE), that was tasked with providing advice during emergencies. It had been used in previous emergency events (not exclusively limited to health). In contrast, none of the other countries had a similar expert advisory group in place prior to the pandemic. COVID-19 waves in 2020 All five countries experienced two waves of infection in 2020. The first wave occurred during the first half of the year and peaked after March 2020. The second wave arrived during the final quarter. Norway consistently had the lowest number of SARS-CoV-2 infections per million. Germany’s counts were neither the lowest nor the highest. Sweden, Switzerland and the UK alternated in having the highest numbers per million throughout 2020. Implementation of measures to control the spread of infection In Germany, Switzerland and the UK, health policy is the responsibility of regional states, (Länders, cantons and nations, respectively). However, there was a strong initial centralized response in all five countries to mitigate the spread of infection. Later on, country responses varied in the degree to which they were centralized or decentralized. Risk communication In all countries, a large variety of communication channels were used (press briefings, websites, social media, interviews). Digital communication channels were used extensively. Artificial intelligence was used, for example chatbots and decision support systems. Dashboards were used to provide access to and communicate data.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia