Academic literature on the topic 'Computers – Access control – United States'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computers – Access control – United States.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computers – Access control – United States"

1

Muellenbach, Joanne M. "Focused Bedside Education May Improve Engagement of Hospitalized Patients with Their Patient Portals." Evidence Based Library and Information Practice 15, no. 1 (2020): 251–53. http://dx.doi.org/10.18438/eblip29671.

Full text
Abstract:
A Review of:
 Greysen, S.R., Harrison, J.D., Rareshide, C., Magan, Y., Seghal, N., Rosenthal, J., Jacolbia, R., & Auerbach, A.D. (2018). A randomized controlled trial to improve engagement of hospitalized patients with their patient portals. Journal of the American Medical Informatics Association, 25(12), 1626-1633. https://doi.org/10.1093/jamia/ocy125
 Abstract
 Objectives – To study hospitalized patients who were provided with tablet computers and the extent to which having access to these computers increased their patient portal engagement during hospitalization and follo
APA, Harvard, Vancouver, ISO, and other styles
2

Rosenbaum, S., A. Somodevilla, and M. Casoni. "Will EMTALA Be There for People With Pregnancy-related Emergencies?" Obstetric Anesthesia Digest 43, no. 3 (2023): 113–14. http://dx.doi.org/10.1097/01.aoa.0000946244.38317.d1.

Full text
Abstract:
(N Engl J Med. 2022;387:863–865) The Emergency Medical Treatment and Labor Act (EMTALA), a statute established in 1986 to prevent hospitals from refusing to treat pregnancy-related emergencies, is important to health care in the United States. The EMTALA statute helps safeguard nondiscriminatory hospital emergency medical access to anyone in need. Following the June 24, 2022, decision in Dobbs v. Jackson Women’s Health Organization, the constitutional right to an abortion was returned to state control. This Supreme Court decision poses the questions as to whether EMTALA will continue to help b
APA, Harvard, Vancouver, ISO, and other styles
3

Shu, Yingli, Quande Yuan, Wende Ke, and Lei Kou. "Security Access Control Method for Wind-Power-Monitoring System Based on Agile Authentication Mechanism." Electronics 11, no. 23 (2022): 3938. http://dx.doi.org/10.3390/electronics11233938.

Full text
Abstract:
With the continuous increase in the proportion of wind power construction and grid connection, the deployment scale of state sensors in wind-power-monitoring systems has grown rapidly with an aim on the problems that the communication authentication process between the wind turbine status sensor and the monitoring gateway is complex and the adaptability of the massive sensors is insufficient. A security access control method for a wind-power-monitoring system based on agile authentication mechanism is proposed in this paper. First, a lightweight key generation algorithm based on one-way hash f
APA, Harvard, Vancouver, ISO, and other styles
4

Murthy, Uday S. "Tampa Electronics: An Instructional Case in Computer-Assisted Fraud Examination." Issues in Accounting Education 25, no. 3 (2010): 547–52. http://dx.doi.org/10.2308/iace.2010.25.3.547.

Full text
Abstract:
ABSTRACT: This case is designed to impart practical skills in data analysis techniques aimed at fraud examination. Instructors could employ any one of widely available tools such as ACL, IDEA, Microsoft Access, or Picalo, which is an open-source data analysis tool. Couched in the context of a manufacturer of electronic components in the southeastern United States, the case involves the identification of potentially fraudulent travel expense reimbursements. In the case scenario, traveling salespersons submit expense reimbursement claims, which are subject to a number of business rules. Using da
APA, Harvard, Vancouver, ISO, and other styles
5

Agarwal, Pranay, Mohammedhusen Manekiya, Tahir Ahmad, et al. "A Survey on Citizens Broadband Radio Service (CBRS)." Electronics 11, no. 23 (2022): 3985. http://dx.doi.org/10.3390/electronics11233985.

Full text
Abstract:
To leverage the existing spectrum and mitigate the global spectrum dearth, the Federal Communications Commission of the United States has recently opened the Citizens Broadband Radio Service (CBRS) spectrum, spanning 3550–3700 MHz, for commercial cognitive operations. The CBRS has a three-tier hierarchical architecture, wherein the incumbents, including military radars, occupy the topmost tier. The priority access licenses (PAL) and general authorized access (GAA) are second and third tier, respectively, facilitating licensed and unlicensed access to the spectrum. This combination of licensed
APA, Harvard, Vancouver, ISO, and other styles
6

Zelalem Jembre, Yalew, Woon-young Jung, Muhammad Attique, Rajib Paul, and Beomjoon Kim. "Mobile Broadband Performance Evaluation: Analysis of National Reports." Electronics 11, no. 3 (2022): 485. http://dx.doi.org/10.3390/electronics11030485.

Full text
Abstract:
Five decades have passed since the first bit was transmitted over the internet. Although the internet has improved our lives and led to the digital economy, currently only 51% of the world’s population have access to it. Currently, consumers mostly access the internet via mobile broadband, 2G, 3G, and 4G services. Regulatory bodies such as the Federal Communications Commission (FCC) of the US are responsible for ensuring that consumers receive an adequate service from Mobile Network Operators (MNOs). Usually, regulators evaluate the performance of each MNO in terms of service quality yearly an
APA, Harvard, Vancouver, ISO, and other styles
7

Fatin, Firman Adi Nur, Mukhamad Nurkamid, Rizkysari Meimaharani, and Ahmad Bagus Maskula. "Real-Time Monitoring of Gas Fields: Prototype at Pt Gamma Energi Pratama Bogor." JURNAL TEKNIK INFORMATIKA 16, no. 1 (2023): 89–99. http://dx.doi.org/10.15408/jti.v16i1.31832.

Full text
Abstract:
PT Gamma Energi Pratama is a company engaged in the instrumentation sector. One of the projects undertaken by PT Gamma Energi Pratama is on an oil and natural gas drilling site. The oil drilling process involves a tool called a Gas Jack Compressor originating from the United States. At first, the technician there used the local panel that came with the compressor. But procuring spare parts takes a long time. At the same time, the needs in the field demand to be met immediately. Therefore, the Programmable Logic Controller (PLC) was chosen as a special microcontroller device that can access the
APA, Harvard, Vancouver, ISO, and other styles
8

Ravnyushkin, A. V. "The Legal Issues of Firearms Trafficking in the United States of America." Siberian Law Review 19, no. 4 (2023): 356–73. http://dx.doi.org/10.19073/2658-7602-2022-19-4-356-373.

Full text
Abstract:
Relevance and subject of research. The circulation of firearms as a source of increased danger is subject to legal regulation and control in the Russian Federation. The use of weapons by police officers is no exception. The norms of the Federal Law of February 7, 2011 No. 3-FZ “About the Police” (hereinafter referred to as the Law “About the Police”) refer to the achievements of domestic administrative science as a result of the work of specialists. In systemic connection with the norms of criminal law, they regulate the conditions and limits for the use of coercive measures by police officers
APA, Harvard, Vancouver, ISO, and other styles
9

Mayans, Dámaris. "Lexical Frequency in Heritage Speakers of Spanish." Lenguaje 50, no. 2 (2022): 225–45. http://dx.doi.org/10.25100/lenguaje.v50i2.11628.

Full text
Abstract:
This study examines the impact of lexical frequency on grammatical agreement in heritage speakers of Spanish and a Spanish monolingual control group. Research has provided evidence of frequency effects when accessing nouns and this effect was proven to be more prominent in bilingual speakers. This investigation expands on the antecedent psycholinguistic research on lexical access through agreement operations carried out on monolingual speakers of Spanish by examining this effect in two populations of heritage speakers of Spanish that differ in relation to their dominance in Spanish. Experiment
APA, Harvard, Vancouver, ISO, and other styles
10

McHugh, Douglas, Richard Feinn, Jeff McIlvenna, and Matt Trevithick. "A Random Controlled Trial to Examine the Efficacy of Blank Slate: A Novel Spaced Retrieval Tool with Real-Time Learning Analytics." Education Sciences 11, no. 3 (2021): 90. http://dx.doi.org/10.3390/educsci11030090.

Full text
Abstract:
Learner-centered coaching and feedback are relevant to various educational contexts. Spaced retrieval enhances long-term knowledge retention. We examined the efficacy of Blank Slate, a novel spaced retrieval software application, to promote learning and prevent forgetting, while gathering and analyzing data in the background about learners’ performance. A total of 93 students from 6 universities in the United States were assigned randomly to control, sequential or algorithm conditions. Participants watched a video on the Republic of Georgia before taking a 60 multiple-choice-question assessmen
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computers – Access control – United States"

1

Dikmen, Iskender. "Border monitoring based on a novel PIR detection model." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FDikmen.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science and M.S. in Information Technology Management)--Naval Postgraduate School, March 2006.<br>Thesis Advisor(s): Geoffrey Xie "March 2006." Includes bibliographical references (p. 49-50). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

LaMore, Robert L. "CyberCIEGE scenario illustrating secrecy issues through mandatory and discretionary access control policies in a multi-level security network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FLaMore.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ling, Meng-Chun. "Senior health care system." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2785.

Full text
Abstract:
Senior Health Care System (SHCS) is created for users to enter participants' conditions and store information in a central database. When users are ready for quarterly assessments the system generates a simple summary that can be reviewed, modified, and saved as part of the summary assessments, which are required by Federal and California law.
APA, Harvard, Vancouver, ISO, and other styles
4

Hunt, Richard Reid. "Moving Beyond Regulatory Mechanisms| A Typology of Internet Control Regimes." Thesis, Portland State University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1560952.

Full text
Abstract:
<p> This paper examines national Internet control from a policy regime perspective. The mechanisms through which governments attempt to control the Internet may be developed and implemented by different institutions and agencies, or fall outside of a formal regulatory structure entirely. As such, the totality of the institutions and practices of national Internet control is better conceptualized not as a regulatory regime, but as a control regime. After a survey of the critical policy and control dimensions, a six-part typology of control regimes is proposed. The purpose of this study and typo
APA, Harvard, Vancouver, ISO, and other styles
5

Sparrow, Alice Pickett 1939. "THE SOCIOLOGICAL IMPACT OF THE FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT ON AN INSTITUTION OF HIGHER EDUCATION." Thesis, The University of Arizona, 1985. http://hdl.handle.net/10150/275273.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Berrios-Ayala, Mark. "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities." Honors in the Major Thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1547.

Full text
Abstract:
Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM and Xkeyscore so they can keep their tabs on issues that are none of their business; namely, the personal
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Computers – Access control – United States"

1

Brock, Jack L. Computer security: Hackers penetrate DOD computer systems : statement of Jack L. Brock, Jr., Director, Government Information and Financial Management, Information Management and Technology Division, before the Subcommittee on Government Information and Regulation, Committee on Governmental Affairs, United States Senate. U.S. General Accounting Office, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Office, General Accounting. Computer security: Identification of sensitive systems operated on behalf of ten agencies : congressional requesters. The Office, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information. Critical information infrastructure protection: The threat is real : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, first session, on examining the protection efforts being made against foreign-based threats to United States critical computer infrastructure, October 6, 1999. U.S. G.P.O., 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

United States. Department of Veterans Affairs. Office of Audits & Evaluations. Review of alleged unauthorized access to VA systems. Dept. of Veterans Affairs, Office of Inspector General, Office of Audits and Evaluations, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

United States. General Accounting Office, ed. FAA computer security: Actions needed to address critical weaknesses that jeopardize aviation operations : statement of Joel C. Willemssen, Director, Civil Agencies Information Systems, Accounting and Information Management Division, before the Committee on Science, House of Representatives. The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Office, General Accounting. Information systems: Veterans Administration information resources management is improving : report to congressional requesters. The Office, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Brock, Jack L. Information security: Computer hacker information available on the Internet : statement for the record of Jack L. Brock, Jr., Director, Defense Information and Financial Management Systems, and Keith A. Rhodes, Technical Assistant Director, Office of the Chief Scientist, Accounting and Information Management Division, before the Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate. The Office, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brock, Jack L. Information security: Computer attacks at Department of Defense pose increasing risks : statement of Jack L. Brock, Director, Defense Information and Financial Management Systems, Accounting and Information Management Division, before the Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate. The Office, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Brock, Jack L. Information security: Comments on the proposed Government Information Security Act of 1999 : statement of Jack L. Brock, Director, Governmentwide and Defense Information Systems, Accounting and Information Management Division, before the Committee on Governmental Affairs, U.S. Senate. The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

United States. Congress. Senate. Committee on Governmental Affairs. The Computer Matching and Privacy Protection Act of 1987: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 496 .... U.S. G.P.O., 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computers – Access control – United States"

1

Joque, Justin. "Cyber-Catastrophe." In Pedagogies of Disaster. punctum books, 2013. https://doi.org/10.21983/p3.0050.1.32.

Full text
Abstract:
One of the earliest glimpses of the possible impact of an all out cyberwar occurred in June of 1997. That month a small team of hackers using publicly available tools and programs was supposedly able to gain access to the power grid in nine United States cities, their emergency response systems and a number of critical Pentagon networks including those that managed military supply chains and the command-and-control structure. According to James Adams who has written at length about these attacks:The hackers also managed to infect the human command-and-control system with a paralyzing level of
APA, Harvard, Vancouver, ISO, and other styles
2

Kosseff, Jeff. "Anonymity as a Sword." In The United States of Anonymous. Cornell University Press, 2022. http://dx.doi.org/10.7591/cornell/9781501762383.003.0014.

Full text
Abstract:
This chapter elaborates on anonymity being used as a sword. It examines how malicious actors use their ability to control access to their identifying information when it comes to inflicting harm on other people. According to Saul Levmore, the Internet works as a far more effective medium for disseminating harmful speech. The chapter looks into the narrative of Ryan S. Lin and his cyberstalking campaign, citing the First Amendment's free speech protection did not directly hinder law enforcement's investigation against his roommate. Lin's case unveiled some harmful ways in which people can opera
APA, Harvard, Vancouver, ISO, and other styles
3

Clayton, John F. "Education, the Internet, and the World Wide Web." In Encyclopedia of Human Computer Interaction. IGI Global, 2006. http://dx.doi.org/10.4018/978-1-59140-562-7.ch028.

Full text
Abstract:
The development of the Internet has a relatively brief and well-documented history (Cerf, 2001; Griffiths, 2001; Leiner et al., 2000; Tyson, 2002). The initial concept was first mooted in the early 1960s. American computer specialists visualized the creation of a globally interconnected set of computers through which everyone quickly could access data and programs from any node, or place, in the world. In the early 1970s, a research project initiated by the United States Department of Defense investigated techniques and technologies to interlink packet networks of various kinds. This was calle
APA, Harvard, Vancouver, ISO, and other styles
4

Marcelle, Gillian M. "A Feminist Agenda for Reducing the Gender Digital Divide." In Global Information Technologies. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-939-7.ch221.

Full text
Abstract:
There is little shared understanding of the term “digital divide,” but this has not prevented the international community from investing a great deal of effort in projects that aim to reduce the digital divide by reducing disparities in access to information and communication technologies (ICT) (European Commission High Level Group, 1997; International Telecommunication Union [ITU], 1984, 2003; United Nations Economic and Social Commission [UN ECOSOC], 2000). The divergent rate at which ICT diffuses—the digital divide—is a reflection of broader socioeconomic divides, many of which exist within
APA, Harvard, Vancouver, ISO, and other styles
5

Ketzan, Erik, and Paweł Kamocki. "Digital Humanities Research under United States and European Copyright Laws." In Access and Control in Digital Humanities. Routledge, 2021. http://dx.doi.org/10.4324/9780429259616-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sundstrom, Beth, and Cara Delay. "How Do Attitudes and Policies Impact Access to Birth Control?" In Birth Control. Oxford University Press, 2020. http://dx.doi.org/10.1093/wentk/9780190069674.003.0006.

Full text
Abstract:
What attitudes and beliefs affect access to birth control in the United States? The vast majority of the American public believes birth control is a fundamental right that all people should have access to. This consensus has persisted for years: in 1937, 61%...
APA, Harvard, Vancouver, ISO, and other styles
7

Markowitz, Jonathan N. "The United States’ Arctic Foreign Policy." In Perils of Plenty. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190078249.003.0006.

Full text
Abstract:
Chapter 6 examines how the United States, the most powerful production-oriented Arctic state, responded to the revelation of Arctic resources. If capabilities drive intentions, then the United States should project the most power to the region. However, if economic structure influences states’ preferences, as this book argues, then Washington should be more interested in securing access to markets and less concerned with seeking control over Arctic resources. This chapter provides a detailed account of the impact the United States’ production-based economy and broad governing coalition had on
APA, Harvard, Vancouver, ISO, and other styles
8

Holden, Robert H. "Defining Collaboration: The United States and Central America." In Armies Without Nations. Oxford University PressNew York, NY, 2004. http://dx.doi.org/10.1093/oso/9780195161205.003.0010.

Full text
Abstract:
Abstract The onset of intense collaboration between the military and police authorities of the United States and the five Central American governments, starting in World War II, not only globalized but also transformed public violence on the isthmus. The military and police agencies of all the Central American states, whose national economies were incapable of supplying their enlisted men little but the sandals on their feet and the most miserly of food rations, eagerly integrated themselves into global networks that provided material, technical, managerial, and ideological resources on a scal
APA, Harvard, Vancouver, ISO, and other styles
9

deRosset, Leslie, Halle Neeley, and Aunchalee Palmquist. "Innovations in Virtual Care." In The Practical Playbook III. Oxford University PressNew York, 2024. http://dx.doi.org/10.1093/oso/9780197662984.003.0038.

Full text
Abstract:
Abstract Telemedicine has been used since the 1950s to provide specialized healthcare to patients who could not otherwise access needed services. However, it was not until the late 1980s and early 1990s that technological advancements allowed telemedicine to become more available to both patients and healthcare providers. Between 2016 and 2019, telemedicine utilization in the United States doubled, from 14% to 28%. Telemedicine and telehealth help patients and healthcare providers to communicate using electronic platforms that include audio and video that are either synchronous or asynchronous
APA, Harvard, Vancouver, ISO, and other styles
10

Partow-Navid, Parviz, and Ludwig Slusky. "IT Security Policy in Public Organizations." In Information Security and Ethics. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch183.

Full text
Abstract:
Today, information security is one of the highest priorities on the IT agenda. In 2003, Luftman and McLean (2004) conducted a survey of Society for Information Management members to identify the top 20 information technology (IT) issues for executives. Security and privacy issues were ranked third, after IT/ business alignment and IT strategic planning. Concept of information security applies to all the data stored in information systems or being communicated in information networks and encompasses measures applied on all layers of open system interconnect (OSI) model of international standard
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computers – Access control – United States"

1

Banerjee, Subharthi, Michael Hempel, Pejman Ghasemzadeh, Hamid Sharif, and Tarek Omar. "Wireless Communication for High-Speed Passenger Rail Services: A Study on the Design and Evaluation of a Unified Architecture." In 2020 Joint Rail Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/jrc2020-8068.

Full text
Abstract:
Abstract High-speed trains, though prevalent in Europe and Asia, are not yet a reality in the US. But interest and industry engagement are growing, especially around commercial hubs close to commuter homes for alleviating commute times. With support from the Federal Railroad Administration in the United States, the authors are exploring the design requirements, challenges, and technology capabilities for wireless communication between passenger cars, on-board systems and with trackside infrastructure, all using next-generation radio access technologies. Key aspects of this work focus on intero
APA, Harvard, Vancouver, ISO, and other styles
2

Carlson, Justin, Zachariah Tiberi, Mohsen Safaei, Robert I. Ponder, and Steven R. Anton. "Parametric Testing of Surrogate Knee Replacement Bearings With Embedded Piezoelectric Transducers." In ASME 2018 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/smasis2018-8037.

Full text
Abstract:
In the United States, Total Knee Replacement (TKR) is a surgery many people go through, but frequently, patients find that they are unhappy post-surgery due to misalignment and loosening of the knee. An estimated 20% of knee replacement recipients report discomfort or undesired functionality within their first few years after surgery. Surgical techniques currently rely heavily on experience and tactile feedback to correctly align the knee replacement. If surgical teams were to have access to data regarding compartmental forces within the knee over the life of the implant, then a more precise b
APA, Harvard, Vancouver, ISO, and other styles
3

Anderson, Gary L., and Devendra P. Garg. "Damping and Vibration Control via Nanoscale Technologies for Defense Oriented Applications." In ASME 2003 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/detc2003/vib-48536.

Full text
Abstract:
This paper discusses the potential of nanoscale technologies with particular attention devoted to applications in the defense area. Innovative techniques for structural damping and vibration control are of much interest to the Structures and Dynamics Program at the United States Army Research Office (ARO). Since nanotechnology is a new and different way of thinking about the creation of devices and systems, it holds much promise for such applications. Nanotechnology can be gainfully employed to create and utilize materials, devices, and systems through the control of matter on the nanometer-le
APA, Harvard, Vancouver, ISO, and other styles
4

Zhao, Yixin, and Sara Behdad. "Electric Vehicle Battery Simulation: How Electrode Porosity and Thickness Impact Cost and Performance." In ASME 2021 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2021. http://dx.doi.org/10.1115/detc2021-71511.

Full text
Abstract:
Abstract Lithium-ion batteries almost exclusively power today’s electric vehicles (EVs). Cutting battery costs is crucial to the promotion of EVs. This paper aims to develop potential solutions to lower the cost and improve battery performance by investigating its design variables: positive electrode porosity and thickness. The open-access lithium-ion battery design and cost model (BatPac) from the Argonne National Laboratory of the United States Department of Energy, has been used for the analyses. Six pouch battery systems with different positive materials are compared in this study (LMO, LF
APA, Harvard, Vancouver, ISO, and other styles
5

Song, Xubin, and Dongpu Cao. "Design of Semiactive Vehicle Suspension Controls in Frequency Domain." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-86557.

Full text
Abstract:
Through the simulation study of a semiactive quarter car suspension, this paper is to expatiate on the control algorithm documented in the United States Patent 6,873,890 [1]. That patent presents a new method to design semiactive suspension controls in the frequency domain. As is well known, suspension related dynamics has two dominant modes in the working frequency range up to 25Hz. As such, the suspension dynamic system has three distinguishable frequency sections. In order to achieve better performance, different controls have to be applied to each frequency section, respectively. The signi
APA, Harvard, Vancouver, ISO, and other styles
6

Gray, Jeremy P., Vladimir V. Vantsevich, and Jim L. Overholt. "Indices and Computational Strategy for Unmanned Ground Wheeled Vehicle Mobility Estimation and Enhancement." In ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12158.

Full text
Abstract:
The United States Army began developing Unmanned Ground Vehicles (UGV) in the early 1900’s. Concurrently, researchers developed and enhanced passenger and commercial ground vehicles. Although significant progress has been made for improving vehicle mobility for all ground vehicles throughout the past century, mobility has lacked a concise mutually agreed definition and analytical standardized criteria. The implementations of improved technologies, such as vehicle traction control, stability control, and torque vectoring systems require researchers to take a step back and reevaluate mobility cr
APA, Harvard, Vancouver, ISO, and other styles
7

Hu, Yang, and Gaurav Ameta. "Life Cycle Assessment and Eco-Design of a Wireless TV/VCR Remote." In ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-12484.

Full text
Abstract:
The focus of this paper is to present life-cycle assessment (LCA) of a TV/VCR remote, including alkaline batteries, and to compare the environmental impacts with a redesigned remote consisting of a solar cell. LCA is a very helpful tool in identifying the most important factors for improving product sustainability. The remote considered in this study can control both television and video cassette recorder. This remote is manufactured in Malaysia and exported to the United States. Its life-cycle system includes raw material, parts, shipment, use phase and waste treatment; its life-cycle impact
APA, Harvard, Vancouver, ISO, and other styles
8

Joshi, Rakesh, Nathan Bane, Justin Derickson, Mark E. Williams, and Abhijit Nagchaudhuri. "Preliminary Trial Results for the Redesigned STRIDER Platform With Sampling Capability From Different Depths." In ASME 2017 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/detc2017-67385.

Full text
Abstract:
STRIDER: Semi-Autonomous Tracking Robot with Instrumentation for Data-Acquisition and Environmental Research, a semi-autonomous aquatic vessel, was envisioned for automated water sampling, data collection, and depth profiling to document water quality variables related to agricultural run-offs. Phase-I of the STRIDER project included the capability for STRIDER to collect water samples and water quality data on the surface of water bodies. This paper discusses the Phase-II efforts of the project, in which the previous design of STRIDER was adapted to extend its capabilities to include monitorin
APA, Harvard, Vancouver, ISO, and other styles
9

Ward, Jeffrey A., Joseph Hitt, Thomas Sugar, and Kartik Bharadwaj. "Dynamic Pace Controller for the Robotic Gait Trainer." In ASME 2006 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2006. http://dx.doi.org/10.1115/detc2006-99733.

Full text
Abstract:
With over 600, 000 people each year surviving a stroke, it has become the leading cause of serious long-term disability in the United States [1,2,3]. Studies have proven that through repetitive task training, neural networks can be re-mapped thus increasing the mobility of the patient [4–8]. This paper is a continuation of Kartik Bharadwaj’s and Arizona State University’s research on the Robotic Gait Trainer [9]. This work is funded in part by the National Institutes of Health (NIH), grant number - 1 R43 HD04067 01. Previously the gait cycle was fixed at two seconds. For a smooth gait the pati
APA, Harvard, Vancouver, ISO, and other styles
10

Shao, Guodong, Alexander Brodsky, Jorge Arinez, Daniel Menasce, and Paul Ammann. "A Decision-Guided Energy Management Framework for Sustainable Manufacturing." In ASME 2011 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2011. http://dx.doi.org/10.1115/detc2011-47454.

Full text
Abstract:
A growing number of manufacturing industries are initiating efforts to address sustainability issues. According to the National Association of Manufacturers, the manufacturing sector currently accounts for about one third of all energy consumed in the United States [1]. Reducing energy costs and pollution emissions involves many areas within an industrial facility. Peak electric demands are a significant component in the cost of electricity. Electric demand management relates to electric tariff rates, new power generation, and incentives to curtail peak usages. Shifting some equipment/machine
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computers – Access control – United States"

1

Gindi, Renee. Health, United States, 2019. Centers for Disease Control and Prevention (U.S.), 2021. http://dx.doi.org/10.15620/cdc:100685.

Full text
Abstract:
Health, United States, 2019 is the 43rd report on the health status of the nation and is submitted by the Secretary of the Department of Health and Human Services to the President and the Congress of the United States in compliance with Section 308 of the Public Health Service Act. This report was compiled by the National Center for Health Statistics (NCHS) of the Centers for Disease Control and Prevention (CDC). The Health, United States series presents an annual overview of national trends in key health indicators. The 2019 report presents trends and current information on selected measures
APA, Harvard, Vancouver, ISO, and other styles
2

Yagci, Mustafa. Global Chip Shortage and Implications for Developing Countries. Islamic Development Bank Institute, 2022. http://dx.doi.org/10.55780/re24021.

Full text
Abstract:
Semiconductors, commonly known as chips, are crucial parts of our daily lives. In every electronic device we use, from smartphones to computers and automobiles to coffee machines, chips constitute one of the most critical components. Chips are packed with thousands or billions of transistors on a piece of small, coin-sized silicon or germanium. They function as the brains of electronic devices by storing, moving, and processing data. With the onset of the Covid-19 pandemic, the surge in demand for electronic devices and the shock in the global supply of chips have resulted in a global chip sho
APA, Harvard, Vancouver, ISO, and other styles
3

Minkanic, Michelle, and Emily Tran. Socioeconomic and Cultural Factors Influencing Type of Hormonal Contraceptive Use in Women in Developed vs Under-Developed Geographic Areas. Science Repository, 2024. http://dx.doi.org/10.31487/j.cei.2024.01.01.

Full text
Abstract:
The intent of this study is to identify and compare sociocultural barriers in various geographic regions that impede access, type and use of hormonal contraception, and methods to improve restrictions in access. Understanding and addressing sociocultural barriers to hormonal contraception on a larger intercontinental scale can create a more effective and inclusive healthcare system. A search using PubMed, Cochrane, and Embase was conducted on current and past literature performed in various developmental countries. Terms such as “birth control access AND developed nations”, “barriers of hormon
APA, Harvard, Vancouver, ISO, and other styles
4

Burniske, Jessica, Dustin Lewis, and Naz Modirzadeh. Suppressing Foreign Terrorist Fighters and Supporting Principled Humanitarian Action: A Provisional Framework for Analyzing State Practice. Harvard Law School Program on International Law and Armed Conflict, 2015. http://dx.doi.org/10.54813/nrmd2833.

Full text
Abstract:
In 2014, reports suggested that a surge of foreign jihadists were participating in armed conflicts in Syria, Iraq, and elsewhere. The United Nations Security Council responded by imposing in Resolution 2178 (2014) an array of obligations on member states to counter the threat posed by “foreign terrorist fighters” (FTFs). In the intervening year, those states have taken a range of actions — though at various speeds and with varying levels of commitment — to implement the FTF obligations imposed by the Council. Meanwhile, many states continue to fund and otherwise throw their support behind life
APA, Harvard, Vancouver, ISO, and other styles
5

Bourrier, Mathilde, Michael Deml, and Farnaz Mahdavian. Comparative report of the COVID-19 Pandemic Responses in Norway, Sweden, Germany, Switzerland and the United Kingdom. University of Stavanger, 2022. http://dx.doi.org/10.31265/usps.254.

Full text
Abstract:
The purpose of this report is to compare the risk communication strategies and public health mitigation measures implemented by Germany, Norway, Sweden, Switzerland, and the United Kingdom (UK) in 2020 in response to the COVID-19 pandemic based on publicly available documents. The report compares the country responses both in relation to one another and to the recommendations and guidance of the World Health Organization where available. The comparative report is an output of Work Package 1 from the research project PAN-FIGHT (Fighting pandemics with enhanced risk communication: Messages, comp
APA, Harvard, Vancouver, ISO, and other styles
6

Whelan, Kevin, and Wendy Wright. Protocol implementation plan for monitoring mangrove soil surface elevation tables in South Florida / Caribbean Network parks. National Park Service, 2016. https://doi.org/10.36967/2230638.

Full text
Abstract:
The mangrove forest ecosystem is a critical coastal resource in South Florida’s Biscayne National Park (BISC); Salt River Bay National Historical Site and Ecological Preserve (SARI) in St. Croix, U.S. Virgin Islands; and the Virgin Islands National Park (VIIS) in St John, U.S. Virgin Islands. Mangrove wetlands provide flood control, storm protection, shore stabilization, water filtration (capturing soil runoff), carbon sequestration, and habitat for fish and wildlife communities. The economic value of the services derived from mangroves has been estimated as high as $200,000–$900,000 ha-1 (Uni
APA, Harvard, Vancouver, ISO, and other styles
7

Strengthening recovery actions for Southern Resident killer whales. Raincoast Conservation Foundation, 2025. https://doi.org/10.70766/32.7300.

Full text
Abstract:
An ad hoc science panel was convened in Vancouver, Canada from March 4-6, 2025, to address the conservation and recovery of the endangered Southern Resident killer whale (SRKW) population – which, as of the July 2024 census, numbered only 73 individuals. The panel assembled 31 international experts from universities, government agencies, and NGOs across Canada, the United States, and the European Union to assess the efficacy and limitations of existing threat-reduction strategies, and propose new or revised measures. Their expertise covered a range of disciplines, including killer whale biolog
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!