832 resultados para role-based access control


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Channel-aware assignment of sub-channels to users in the downlink of an OFDMA system demands extensive feedback of channel state information (CSI) to the base station. Since the feedback bandwidth is often very scarce, schemes that limit feedback are necessary. We develop a novel, low feedback splitting-based algorithm for assigning each sub-channel to its best user, i.e., the user with the highest gain for that sub-channel among all users. The key idea behind the algorithm is that, at any time, each user contends for the sub-channel on which it has the largest channel gain among the unallocated sub-channels. Unlike other existing schemes, the algorithm explicitly handles multiple access control aspects associated with the feedback of CSI. A tractable asymptotic analysis of a system with a large number of users helps design the algorithm. It yields 50% to 65% throughput gains compared to an asymptotically optimal one-bit feedback scheme, when the number of users is as small as 10 or as large as 1000. The algorithm is fast and distributed, and scales with the number of users.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A regenerative or circulating-power method is presented in this paper for heat run test on the legs of a three-level neutral point clamped (NPC) inverter. This test ensures that only losses are drawn from the dc supply, while rated power is circulated between the two legs, thus minimising wastage of energy. A proportional-resonant (PR) controller based current control scheme is proposed here for the circulating power test setup in NPC inverter. Simulation and experimental results are presented to validate the controller design at various operating conditions. Results of thermal test on the inverter legs are presented at two different operating conditions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this paper, we analyze the coexistence of a primary and a secondary (cognitive) network when both networks use the IEEE 802.11 based distributed coordination function for medium access control. Specifically, we consider the problem of channel capture by a secondary network that uses spectrum sensing to determine the availability of the channel, and its impact on the primary throughput. We integrate the notion of transmission slots in Bianchi's Markov model with the physical time slots, to derive the transmission probability of the secondary network as a function of its scan duration. This is used to obtain analytical expressions for the throughput achievable by the primary and secondary networks. Our analysis considers both saturated and unsaturated networks. By performing a numerical search, the secondary network parameters are selected to maximize its throughput for a given level of protection of the primary network throughput. The theoretical expressions are validated using extensive simulations carried out in the Network Simulator 2. Our results provide critical insights into the performance and robustness of different schemes for medium access by the secondary network. In particular, we find that the channel captures by the secondary network does not significantly impact the primary throughput, and that simply increasing the secondary contention window size is only marginally inferior to silent-period based methods in terms of its throughput performance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The rapid development of communication and networking has lessened geographical boundaries among actors in social networks. In social networks, actors often want to access databases depending upon their access rights, privacy, context, privileges, etc. Managing and handling knowledge based access of actors is complex and hard for which broad range of technologies need to be called. Access based on dynamic access rights and circumstances of actors impose major tasks on access systems. In this paper, we present an Access Mechanism for Social Networks (AMSN) to render access to actors over databases taking privacy and status of actors into consideration. The designed AMSN model is tested over an Agriculture Social Network (ASN) which utilises distinct access rights and privileges of actors related to the agriculture occupation, and provides access to actors over databases.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Multi-packet reception (MPR) promises significant throughput gains in wireless local area networks (WLANs) by allowing nodes to transmit even in the presence of ongoing transmissions in the medium. However, the medium access control (MAC) layer must now be redesigned to facilitate rather than discourage - these overlapping transmissions. We investigate asynchronous MPR MAC protocols, which successfully accomplish this by controlling the node behavior based on the number of ongoing transmissions in the channel. The protocols use the backoff timer mechanism of the distributed coordination function, which makes them practically appealing. We first highlight a unique problem of acknowledgment delays, which arises in asynchronous MPR, and investigate a solution that modifies the medium access rules to reduce these delays and increase system throughput in the single receiver scenario. We develop a general renewal-theoretic fixed-point analysis that leads to expressions for the saturation throughput, packet dropping probability, and average head-of-line packet delay. We also model and analyze the practical scenario in which nodes may incorrectly estimate the number of ongoing transmissions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tumor-suppressor protein p53, the `guardian of the genome', is critical in maintaining cellular homeostasis and genomic stability. Earlier, we have reported the discovery of internal ribosome entry sites (IRESs) within the p53 mRNA that regulate the translation of the full length and its N-terminal-truncated isoform, Delta N-p53. Polypyrimidine tract-binding protein (PTB) is an IRES trans-acting factor that positively regulates the IRES activities of both p53 isoforms by relocating from nucleus to the cytoplasm during stress conditions. Here we have demonstrated the putative contact points of PTB on the p53 IRES RNA. Studies on mutations that occur naturally in the 5' untranslated region (5' UTR) in p53 mRNA were lacking. We have investigated a naturally occurring C-to-T single-nucleotide polymorphism (SNP) first reported in human melanoma tumors. This SNP is at position 119 in the 5' UTR of p53 mRNA and we demonstrate that it has consequences on the translational control of p53. Introduction of this SNP has led to decrease in cap-independent translation from p53 5' UTR in bicistronic reporter assay. Further, the effects of this SNP on cap-independent translation have been studied in the context of p53 cDNA as well. Interestingly, the 5' UTR with this SNP has shown reduced binding to PTB that can be corroborated to its weaker IRES activity. Previously, it has been shown that G2-M checkpoint, DNA-damaging stress and oncogenic insult favor IRES-mediated translation. Under similar conditions, we demonstrate that this SNP interferes with the enhancement of the IRES activity of the 5' UTR. Taken together, the results demonstrate for the first time that SNP in the 5' UTR of the p53 mRNA might have a role in translational control of this critical tumor-suppressor gene.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A neural-network-aided nonlinear dynamic inversion-based hybrid technique of model reference adaptive control flight-control system design is presented in this paper. Here, the gains of the nonlinear dynamic inversion-based flight-control system are dynamically selected in such a manner that the resulting controller mimics a single network, adaptive control, optimal nonlinear controller for state regulation. Traditional model reference adaptive control methods use a linearized reference model, and the presented control design method employs a nonlinear reference model to compute the nonlinear dynamic inversion gains. This innovation of designing the gain elements after synthesizing the single network adaptive controller maintains the advantages that an optimal controller offers, yet it retains a simple closed-form control expression in state feedback form, which can easily be modified for tracking problems without demanding any a priori knowledge of the reference signals. The strength of the technique is demonstrated by considering the longitudinal motion of a nonlinear aircraft system. An extended single network adaptive control/nonlinear dynamic inversion adaptive control design architecture is also presented, which adapts online to three failure conditions, namely, a thrust failure, an elevator failure, and an inaccuracy in the estimation of C-M alpha. Simulation results demonstrate that the presented adaptive flight controller generates a near-optimal response when compared to a traditional nonlinear dynamic inversion controller.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The paper traces the different management practices adopted for Nigerian inland water bodies from the Colonial era to independence. It observes that the full potentials of these waters have never been realized over the years due to the absence of an effective management. The replacement of the traditional fisheries management by the centralized top-down approach by government after independence has not helped matters. Lately, the cooperative/community-based management approach has taken the centre stage worldwide. This has been identified to offer the most viable and equitable option towards the attainment of an optimum utilization of the fisheries resource. The entire community sensing security of tenure and enjoying some of the benefits from access control will actively take responsibility and enforcement. The paper drew experiences from some water bodies in Bangladesh, Philippines, Benin Republic and Malawi showing sound management strategy that, if adopted for our small and medium size reservoirs and other water bodies, would help optimize on an sustainable manner the benefits from those water bodies

Relevância:

100.00% 100.00%

Publicador:

Resumo:

[ES]En este documento se realiza el diseño de un procedimiento para la validación de los equipos necesarios a la hora de implantar un sistema de control de acceso mediante RFID pasivo. Para ello, se analizarán los distintos tipos de sistemas RFID y se elige uno para la posterior adquisición de los dispositivos necesarios. Se comprobará la normativa vigente ETSI, que regula las emisiones de potencia de los equipos de identificación por radiofrecuencia, y se verificará que se cumplen los requisitos necesarios para implantar el sistema de control de acceso realizando un análisis funcional en situaciones reales.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

[ES]El proyecto está orientado a conseguir una comunicación inalámbrica y segura de una red de sensores IP. Por un lado, mediante el protocolo 6LoWPAN se consigue que los datos se transmitan mediante IPv6 y, por otro lado, gracias al protocolo LADON se establecen los servicios de seguridad de autenticación, integridad de datos, autorización y control de acceso.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A Constituição Federal de 1988 (CF/88) dotou os governos brasileiros de instrumentos refinados para sua atuação, associando orçamentos anuais a planejamentos plurianuais, tendo como elemento central o programa de governo. Desde então, a gestão por programas vem aprimorando-se, especialmente no período 2004-2007, com a consideração do programa como elemento organizativo central do Plano Plurianual (PPA), mediante processos estruturados de elaboração, monitoramento, avaliação e revisão. Nesse contexto, insere-se o Controle Interno do Poder Executivo Federal, na figura da Controladoria-Geral da União (CGU), órgão central de um sistema que sofreu mudanças a fim de atender a finalidade insculpida no Art. 74, I, da CF/88, de avaliar o cumprimento das metas do PPA, a execução dos programas de governo e dos orçamentos da União. Esta pesquisa teve como objetivo verificar a aderência das ações de aprimoramento do Programa Bolsa-Família (PBF) às ressalvas decorrentes dos trabalhos de avaliação da execução do PBF, provenientes de auditorias e fiscalizações efetuadas pela CGU no período de 2004 a 2007. Para tanto, mediante a técnica documental e bibliográfica, a pesquisa efetuou uma análise qualitativa dos dados coletados, que contemplaram os normativos editados e os relatórios dos gestores do programa, bem como os trabalhos de avaliação da CGU no período, na forma de 04 relatórios de auditorias de gestão na secretaria responsável pelo PBF e uma parcela (32%) dos relatórios de fiscalização em municípios, cujo resultado demonstra que houve uma convergência entre o componente do PBF mais ressalvado pela CGU e a área do programa com o maior número de medidas de aprimoramento por parte dos gestores no âmbito do Ministério do Desenvolvimento Social e Combate à Fome (a gestão do Cadastro Único de programas sociais), dando a entender que a CGU atuou tempestivamente e produziu insumos valiosos sobre a execução do programa, consolidando-se como uma importante fonte de subsídios para a tomada de decisão dos gestores federais, corroborando a revisão da literatura sobre o papel do controle interno na administração pública.