832 resultados para role-based access control
Resumo:
This research describes the development of a groupware system which adds security services to a Computer Supported Cooperative Work system operating over the Internet. The security services use cryptographic techniques to provide a secure access control service and an information protection service. These security services are implemented as a protection layer for the groupware system. These layers are called External Security Layer (ESL) and Internal Security Layer (ISL) respectively. The security services are sufficiently flexible to allow the groupware system to operate in both synchronous and asynchronous modes. The groupware system developed - known as Secure Software Inspection Groupware (SecureSIG) - provides security for a distributed group performing software inspection. SecureSIG extends previous work on developing flexible software inspection groupware (FlexSIG) Sahibuddin, 1999). The SecureSIG model extends the FlexSIG model, and the prototype system was added to the FlexSIG prototype. The prototype was built by integrating existing software, communication and cryptography tools and technology. Java Cryptography Extension (JCE) and Internet technology were used to build the prototype. To test the suitability and transparency of the system, an evaluation was conducted. A questionnaire was used to assess user acceptability.
Resumo:
As a central integrator of basal ganglia function, the external segment of the globus pallidus (GP) plays a critical role in the control of voluntary movement. Driven by intrinsic mechanisms and excitatory glutamatergic inputs from the subthalamic nucleus, GP neurons receive GABAergic inhibitory input from the striatum (Str-GP) and from local collaterals of neighbouring pallidal neurons (GP-GP). Here we provide electrophysiological evidence for functional differences between these two inhibitory inputs. The basic synaptic characteristics of GP-GP and Str-GP GABAergic synapses were studied using whole-cell recordings with paired-pulse and train stimulation protocols and variance-mean (VM) analysis. We found (i) IPSC kinetics are consistent with local collaterals innervating the soma and proximal dendrites of GP neurons whereas striatal inputs innervate more distal regions. (ii) Compared to GP-GP synapses Str-GP synapses have a greater paired-pulse ratio, indicative of a lower probability of release. This was confirmed using VM analysis. (iii) In response to 20 and 50 Hz train stimulation, GP-GP synapses are weakly facilitatory in 1 mm external calcium and depressant in 2.4 mm calcium. This is in contrast to Str-GP synapses which display facilitation under both conditions. This is the first quantitative study comparing the properties of GP-GP and Str-GP synapses. The results are consistent with the differential location of these inhibitory synapses and subtle differences in their release probability which underpin stable GP-GP responses and robust short-term facilitation of Str-GP responses. These fundamental differences may provide the physiological basis for functional specialization.
Resumo:
As a central integrator of basal ganglia function, the external segment of the globus pallidus (GP) plays a critical role in the control of voluntary movement. The GP is composed of a network of inhibitory GABA-containing projection neurons which receive GABAergic input from axons of the striatum (Str) and local collaterals of GP neurons. Here, using electrophysiological techniques and immunofluorescent labeling we have investigated the differential cellular distribution of a1, a2 and a3 GABAA receptor subunits in relation to striatopallidal (Str-GP) and pallidopallidal (GP-GP) synapses. Electrophysiological investigations showed that zolpidem (100 nm; selective for the a1 subunit) increased the amplitude and the decay time of both Str-GP and GP-GP IPSCs, indicating the presence of the a1 subunits at both synapses. However, the application of drugs selective for the a2, a3 and a5 subunits (zolpidem at 400 nm, L-838,417 and TP003) revealed differential effects on amplitude and decay time of IPSCs, suggesting the nonuniform distribution of non-a1 subunits. Immunofluorescence revealed widespread distribution of the a1 subunit at both soma and dendrites, while double- and triple-immunofluorescent labeling for parvalbumin, enkephalin, gephyrin and the ?2 subunit indicated strong immunoreactivity for GABAAa3 subunits in perisomatic synapses, a region mainly targeted by local axon collaterals. In contrast, immunoreactivity for synaptic GABAAa2 subunits was observed in dendritic compartments where striatal synapses are preferentially located. Due to the kinetic properties which each GABAAa subunit confers, this distribution is likely to contribute differentially to both physiological and pathological patterns of activity.
Resumo:
This thesis explores the interrelationships between the labour process, the development of technology and patterns of gender differentiation. The introduction of front office terminals into building society branches forms the focus of the research. Case studies were carried out in nine branches, three each from three building societies. Statistical data for the whole movement and a survey of ten of the top thirty societies provided the context for the studies. In the process of the research it became clear that it was not technology itself but the way that it was used, that was the main factor in determining outcomes. The introduction of new technologies is occurring at a rapid pace, facilitated by continuing high growth rates, although front office technology could seldom be cost justified. There was great variety between societies in their operating philosophies and their reasons for and approach to computerisation, but all societies foresaw an ultimate saving in staff. Computerisation has resulted in the deskilling of the cashiering role and increased control over work at all stages. Some branch managers experienced a decrease in autonomy and an increase in control over their work. Subsequent to this deskilling there has been a greatly increased use of part time staff which has enabled costs to be reduced. There has also been a polarisation between career and non-career staff which, like the use of part time staff, has occurred along gender lines. There is considerable evidence that societies' policies, structures and managerial attitudes continue to directly and indirectly discriminate against women. It is these practices which confine women to lower grades and ensure their dependence on the family and which create the pool of cheap skilled labour that societies so willingly exploit by increasing part time work. Gender strategies enter management strategies throughout the operations of the organisation.
Resumo:
This thesis examines young children's early collaborative development when engaged in joint tasks with both a peer and a parent. It begins by examining how the term "collaborative" has been applied and researched in previous literature. As collaboration is found to usually require dialogue, and intersubjectivity is seen as an important component in the construction of both collaboration and dialogue, the ability to construct intersubjectivity is the subject of the rest of the chapter. The chapter concludes by introducing the research questions that underpin the experiments that follow. A number of experiments are then described. Experiments 1 and 2 investigate age differences in interaction styles and the communication strategies used by similar aged dyads. Experiments 3 and 4 investigate differences due to the age of the child and/or the status of the information giver (either parent or child) in the styles of interaction and the communication strategies used by parent and child dyads. Experiment 5 investigates the benefits of collaborating with a parent, and finally, Experiment 6 examines the collaborative ability of pre-schools. The thesis identifies a series of skills required for successful collaboration. These include recognition of a joint goal and the need to suppress individual desires, the ability to structure joint interaction, moving from role-based to a negotiating style, and communicative skills, for example, asking for clarification. Other reasons for children's failure in collaborative tasks involve task-related skills, such as the development of spatial terms, and failure to recognise the need for accuracy. The findings support Vygotsky's theory that when working with an adult, children perform at a higher level than when working with a peer. Evidence was also found of parents scaffolding the interaction for their children. However, further research is necessary to establish that such scaffolding skills affect the child's development of collaborative interactive skills.
Resumo:
FULL TEXT: Like many people one of my favourite pastimes over the holiday season is to watch the great movies that are offered on the television channels and new releases in the movie theatres or catching up on those DVDs that you have been wanting to watch all year. Recently we had the new ‘Star Wars’ movie, ‘The Force Awakens’, which is reckoned to become the highest grossing movie of all time, and the latest offering from James Bond, ‘Spectre’ (which included, for the car aficionados amongst you, the gorgeous new Aston Martin DB10). It is always amusing to see how vision correction or eye injury is dealt with by movie makers. Spy movies and science fiction movies have a freehand to design aliens with multiples eyes on stalks or retina scanning door locks or goggles that can see through walls. Eye surgery is usually shown in some kind of day case simplified laser treatment that gives instant results, apart from the great scene in the original ‘Terminator’ movie where Arnold Schwarzenegger's android character encounters an injury to one eye and then proceeds to remove the humanoid covering to this mechanical eye over a bathroom sink. I suppose it is much more difficult to try and include contact lenses in such movies. Although you may recall the film ‘Charlie's Angels’, which did have a scene where one of the Angels wore a contact lens that had a retinal image imprinted on it so she could by-pass a retinal scan door lock and an Eddy Murphy spy movie ‘I-Spy’, where he wore contact lenses that had electronic gadgetry that allowed whatever he was looking at to be beamed back to someone else, a kind of remote video camera device. Maybe we aren’t quite there in terms of devices available but these things are probably not the behest of science fiction anymore as the technology does exist to put these things together. The technology to incorporate electronics into contact lenses is being developed and I am sure we will be reporting on it in the near future. In the meantime we can continue to enjoy the unrealistic scenes of eye swapping as in the film ‘Minority Report’ (with Tom Cruise). Much more closely to home, than in a galaxy far far away, in this issue you can find articles on topics much nearer to the closer future. More and more optometrists in the UK are becoming registered for therapeutic work as independent prescribers and the number is likely to rise in the near future. These practitioners will be interested in the review paper by Michael Doughty, who is a member of the CLAE editorial panel (soon to be renamed the Jedi Council!), on prescribing drugs as part of the management of chronic meibomian gland dysfunction. Contact lenses play an active role in myopia control and orthokeratology has been used not only to help provide refractive correction but also in the retardation of myopia. In this issue there are three articles related to this topic. Firstly, an excellent paper looking at the link between higher spherical equivalent refractive errors and the association with slower axial elongation. Secondly, a paper that discusses the effectiveness and safety of overnight orthokeratology with high-permeability lens material. Finally, a paper that looks at the stabilisation of early adult-onset myopia. Whilst we are always eager for new and exciting developments in contact lenses and related instrumentation in this issue of CLAE there is a demonstration of a novel and practical use of a smartphone to assisted anterior segment imaging and suggestions of this may be used in telemedicine. It is not hard to imagine someone taking an image remotely and transmitting that back to a central diagnostic centre with the relevant expertise housed in one place where the information can be interpreted and instruction given back to the remote site. Back to ‘Star Wars’ and you will recall in the film ‘The Phantom Menace’ when Qui-Gon Jinn first meets Anakin Skywalker on Tatooine he takes a sample of his blood and sends a scan of it back to Obi-Wan Kenobi to send for analysis and they find that the boy has the highest midichlorian count ever seen. On behalf of the CLAE Editorial board (or Jedi Council) and the BCLA Council (the Senate of the Republic) we wish for you a great 2016 and ‘may the contact lens force be with you’. Or let me put that another way ‘the CLAE Editorial Board and BCLA Council, on behalf of, a great 2016, we wish for you!’
Resumo:
This paper investigates a cross-layer design approach for minimizing energy consumption and maximizing network lifetime (NL) of a multiple-source and single-sink (MSSS) WSN with energy constraints. The optimization problem for MSSS WSN can be formulated as a mixed integer convex optimization problem with the adoption of time division multiple access (TDMA) in medium access control (MAC) layer, and it becomes a convex problem by relaxing the integer constraint on time slots. Impacts of data rate, link access and routing are jointly taken into account in the optimization problem formulation. Both linear and planar network topologies are considered for NL maximization (NLM). With linear MSSS and planar single-source and single-sink (SSSS) topologies, we successfully use Karush-Kuhn-Tucker (KKT) optimality conditions to derive analytical expressions of the optimal NL when all nodes are exhausted simultaneously. The problem for planar MSSS topology is more complicated, and a decomposition and combination (D&C) approach is proposed to compute suboptimal solutions. An analytical expression of the suboptimal NL is derived for a small scale planar network. To deal with larger scale planar network, an iterative algorithm is proposed for the D&C approach. Numerical results show that the upper-bounds of the network lifetime obtained by our proposed optimization models are tight. Important insights into the NL and benefits of cross-layer design for WSN NLM are obtained.
Resumo:
Recently underwater sensor networks (UWSN) attracted large research interests. Medium access control (MAC) is one of the major challenges faced by UWSN due to the large propagation delay and narrow channel bandwidth of acoustic communications used for UWSN. Widely used slotted aloha (S-Aloha) protocol suffers large performance loss in UWSNs, which can only achieve performance close to pure aloha (P-Aloha). In this paper we theoretically model the performances of S-Aloha and P-Aloha protocols and analyze the adverse impact of propagation delay. According to the observation on the performances of S-Aloha protocol we propose two enhanced S-Aloha protocols in order to minimize the adverse impact of propagation delay on S-Aloha protocol. The first enhancement is a synchronized arrival S-Aloha (SA-Aloha) protocol, in which frames are transmitted at carefully calculated time to align the frame arrival time with the start of time slots. Propagation delay is taken into consideration in the calculation of transmit time. As estimation error on propagation delay may exist and can affect network performance, an improved SA-Aloha (denoted by ISA-Aloha) is proposed, which adjusts the slot size according to the range of delay estimation errors. Simulation results show that both SA-Aloha and ISA-Aloha perform remarkably better than S-Aloha and P-Aloha for UWSN, and ISA-Aloha is more robust even when the propagation delay estimation error is large. © 2011 IEEE.
Resumo:
Microfluidics has recently emerged as a new method of manufacturing liposomes, which allows for reproducible mixing in miliseconds on the nanoliter scale. Here we investigate microfluidics-based manufacturing of liposomes. The aim of these studies was to assess the parameters in a microfluidic process by varying the total flow rate (TFR) and the flow rate ratio (FRR) of the solvent and aqueous phases. Design of experiment and multivariate data analysis were used for increased process understanding and development of predictive and correlative models. High FRR lead to the bottom-up synthesis of liposomes, with a strong correlation with vesicle size, demonstrating the ability to in-process control liposomes size; the resulting liposome size correlated with the FRR in the microfluidics process, with liposomes of 50 nm being reproducibly manufactured. Furthermore, we demonstrate the potential of a high throughput manufacturing of liposomes using microfluidics with a four-fold increase in the volumetric flow rate, maintaining liposome characteristics. The efficacy of these liposomes was demonstrated in transfection studies and was modelled using predictive modeling. Mathematical modelling identified FRR as the key variable in the microfluidic process, with the highest impact on liposome size, polydispersity and transfection efficiency. This study demonstrates microfluidics as a robust and high-throughput method for the scalable and highly reproducible manufacture of size-controlled liposomes. Furthermore, the application of statistically based process control increases understanding and allows for the generation of a design-space for controlled particle characteristics.
Resumo:
Background and Purpose The glucagon-like peptide 1 (GLP-1) receptor performs an important role in glycaemic control, stimulating the release of insulin. It is an attractive target for treating type 2 diabetes. Recently, several reports of adverse side effects following prolonged use of GLP-1 receptor therapies have emerged: most likely due to an incomplete understanding of signalling complexities. Experimental Approach We describe the expression of the GLP-1 receptor in a panel of modified yeast strains that couple receptor activation to cell growth via single Gα/yeast chimeras. This assay enables the study of individual ligand-receptor G protein coupling preferences and the quantification of the effect of GLP-1 receptor ligands on G protein selectivity. Key Results The GLP-1 receptor functionally coupled to the chimeras representing the human Gαs, Gαi and Gαq subunits. Calculation of the dissociation constant for a receptor antagonist, exendin-3 revealed no significant difference between the two systems. We obtained previously unobserved differences in G protein signalling bias for clinically relevant therapeutic agents, liraglutide and exenatide; the latter displaying significant bias for the Gαi pathway. We extended the use of the system to investigate small-molecule allosteric compounds and the closely related glucagon receptor. Conclusions and Implications These results provide a better understanding of the molecular events involved in GLP-1 receptor pleiotropic signalling and establish the yeast platform as a robust tool to screen for more selective, efficacious compounds acting at this important class of receptors in the future. © 2014 The Authors. British Journal of Pharmacology published by John Wiley & Sons Ltd on behalf of The British Pharmacological Society.
Resumo:
Because of attentional limitations, the human visual system can process for awareness and response only a fraction of the input received. Lesion and functional imaging studies have identified frontal, temporal, and parietal areas as playing a major role in the attentional control of visual processing, but very little is known about how these areas interact to form a dynamic attentional network. We hypothesized that the network communicates by means of neural phase synchronization, and we used magnetoencephalography to study transient long-range interarea phase coupling in a well studied attentionally taxing dual-target task (attentional blink). Our results reveal that communication within the fronto-parieto-temporal attentional network proceeds via transient long-range phase synchronization in the beta band. Changes in synchronization reflect changes in the attentional demands of the task and are directly related to behavioral performance. Thus, we show how attentional limitations arise from the way in which the subsystems of the attentional network interact. The human brain faces an inestimable task of reducing a potentially overloading amount of input into a manageable flow of information that reflects both the current needs of the organism and the external demands placed on it. This task is accomplished via a ubiquitous construct known as “attention,” whose mechanism, although well characterized behaviorally, is far from understood at the neurophysiological level. Whereas attempts to identify particular neural structures involved in the operation of attention have met with considerable success (1-5) and have resulted in the identification of frontal, parietal, and temporal regions, far less is known about the interaction among these structures in a way that can account for the task-dependent successes and failures of attention. The goal of the present research was, thus, to unravel the means by which the subsystems making up the human attentional network communicate and to relate the temporal dynamics of their communication to observed attentional limitations in humans. A prime candidate for communication among distributed systems in the human brain is neural synchronization (for review, see ref. 6). Indeed, a number of studies provide converging evidence that long-range interarea communication is related to synchronized oscillatory activity (refs. 7-14; for review, see ref. 15). To determine whether neural synchronization plays a role in attentional control, we placed humans in an attentionally demanding task and used magnetoencephalography (MEG) to track interarea communication by means of neural synchronization. In particular, we presented 10 healthy subjects with two visual target letters embedded in streams of 13 distractor letters, appearing at a rate of seven per second. The targets were separated in time by a single distractor. This condition leads to the “attentional blink” (AB), a well studied dual-task phenomenon showing the reduced ability to report the second of two targets when an interval <500 ms separates them (16-18). Importantly, the AB does not prevent perceptual processing of missed target stimuli but only their conscious report (19), demonstrating the attentional nature of this effect and making it a good candidate for the purpose of our investigation. Although numerous studies have investigated factors, e.g., stimulus and timing parameters, that manipulate the magnitude of a particular AB outcome, few have sought to characterize the neural state under which “standard” AB parameters produce an inability to report the second target on some trials but not others. We hypothesized that the different attentional states leading to different behavioral outcomes (second target reported correctly or not) are characterized by specific patterns of transient long-range synchronization between brain areas involved in target processing. Showing the hypothesized correspondence between states of neural synchronization and human behavior in an attentional task entails two demonstrations. First, it needs to be demonstrated that cortical areas that are suspected to be involved in visual-attention tasks, and the AB in particular, interact by means of neural synchronization. This demonstration is particularly important because previous brain-imaging studies (e.g., ref. 5) only showed that the respective areas are active within a rather large time window in the same task and not that they are concurrently active and actually create an interactive network. Second, it needs to be demonstrated that the pattern of neural synchronization is sensitive to the behavioral outcome; specifically, the ability to correctly identify the second of two rapidly succeeding visual targets
Resumo:
Medium access control (MAC) protocols have a large impact on the achievable system performance for wireless ad hoc networks. Because of the limitations of existing analytical models for ad hoc networks, many researchers have opted to study the impact of MAC protocols via discreteevent simulations. However, as the network scenarios, traffic patterns and physical layer techniques may change significantly, simulation alone is not efficient to get insights into the impacts of MAC protocols on system performance. In this paper, we analyze the performance of IEEE 802.11 distributed coordination function (DCF) in multihop network scenario. We are particularly interested in understanding how physical layer techniques may affect the MAC protocol performance. For this purpose, the features of interference range is studied and taken into account of the analytical model. Simulations with OPNET show the effectiveness of the proposed analytical approach. Copyright 2005 ACM.
Resumo:
Virus-specific CD8+ T cells are known to play an important role in the control of HIV infection. In this study we investigated whether there may be qualitative differences in the CD8+ T cell response in HIV-1- and HIV-2-infected individuals that contribute to the relatively efficient control of the latter infection. A molecular comparison of global TCR heterogeneity showed a more oligoclonal pattern of CD8 cells in HIV-1- than HIV-2-infected patients. This was reflected in restricted and conserved TCR usage by CD8+ T cells recognizing individual HLA-A2- and HLA-B57-restricted viral epitopes in HIV-1, with limited plasticity in their response to amino acid substitutions within these epitopes. The more diverse TCR usage observed for HIV-2-specific CD8 T cells was associated with an enhanced potential for CD8+ expansion and IFN- production on cross-recognition of variant epitopes. Our data suggest a mechanism that could account for any possible cross-protection that may be mediated by HIV-2-specific CD8+ T cells against HIV-1 infection. Furthermore, they have implications for HIV vaccine development, demonstrating an association between a polyclonal, virus-specific CD8+ T cell response and an enhanced capacity to tolerate substitutions within T cell epitopes.
Resumo:
Membrane systems are computational equivalent to Turing machines. However, its distributed and massively parallel nature obtain polynomial solutions opposite to traditional non-polynomial ones. Nowadays, developed investigation for implementing membrane systems has not yet reached the massively parallel character of this computational model. Better published approaches have achieved a distributed architecture denominated “partially parallel evolution with partially parallel communication” where several membranes are allocated at each processor, proxys are used to communicate with membranes allocated at different processors and a policy of access control to the communications is mandatory. With these approaches, it is obtained processors parallelism in the application of evolution rules and in the internal communication among membranes allocated inside each processor. Even though, external communications share a common communication line, needed for the communication among membranes arranged in different processors, are sequential. In this work, we present a new hierarchical architecture that reaches external communication parallelism among processors and substantially increases parallelization in the application of evolution rules and internal communications. Consequently, necessary time for each evolution step is reduced. With all of that, this new distributed hierarchical architecture is near to the massively parallel character required by the model.
Resumo:
IEEE 802.15.4 networks has the features of low data rate and low power consumption. It is a strong candidate technique for wireless sensor networks and can find many applications to smart grid. However, due to the low network and energy capacities it is critical to maximize the bandwidth and energy efficiencies of 802.15.4 networks. In this paper we propose an adaptive data transmission scheme with CSMA/CA access control, for applications which may have heavy traffic loads such as smart grids. The adaptive access control is simple to implement. Its compatibility with legacy 802.15.4 devices can be maintained. Simulation results demonstrate the effectiveness of the proposed scheme with largely improved bandwidth and power efficiency. © 2013 International Information Institute.