WorldWideScience

Sample records for accessibility

  1. Open access

    Dorch, Bertil Fabricius; Demaio, Alessandro; Hersch, Fred

    2012-01-01

    This week, we celebrate open access week – an event aimed at bringing attention to this rapidly emerging form of scientific publication and its ethical imperatives. Traditionally, knowledge breakthroughs and scientific discoveries are shared through publication in academic journals. Peer...... ideas, break down barriers to science and make knowledge accessible to the masses – but this is not actually the case....

  2. Open Access

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  3. Accessible Knowledge - Knowledge on Accessibility

    Kirkeby, Inge Mette

    2015-01-01

    Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...

  4. Open access

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder consent, and many authors, musicians, filmmakers, and other creators who depend on royalties are understandably unwilling to give their consent. But for 350 years, scholars have written peer-reviewed journal articles for impact, not for money, and are free to consent to open access without losing revenue. In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. Distilling a decade of Suber's influential writing and thinking about open access, this is the indispe...

  5. Access French

    Grosz, Bernard

    2014-01-01

    Access is the major new language series designed with the needs of today's generation of students firmly in mind. Whether learning for leisure or business purposes or working towards a curriculum qualification, Access French is specially designed for adults of all ages and gives students a thorough grounding in all the skills required to understand, speak, read and write contemporary French from scratch. The coursebook consists of 10 units covering different topic areas, each of which includes Language Focus panels explaining the structures covered and a comprehensive glossary. Learning tips

  6. When Is Open Access Not Open Access?

    MacCallum, Catriona J.

    2007-01-01

    As open access grows in prominence, so too has confusion about what open access means; such confusion arises from a genuine misunderstanding of open access by funders, authors, editors, and publishers alike.

  7. JISC Open Access Briefing Paper

    Swan, Alma

    2005-01-01

    What Open Access is. What Open Access is not. How is Open Access provided? Open Access archives or repositories. Open Access journals. Why should authors provide Open Access to their work? Further information and resources

  8. CERN Access Cards and Access Authorisations

    2003-01-01

    From the 01/05/2003, all problems relating to access cards and refusal of access to any zone, building or experiment within CERN must be addressed to the Centrale de Surveillance des Accès (CSA building 120) on 78877 or send an e-mail to Access.Surveillance@cern.ch. The responsibles for CERN access control have put into place a procedure with the CSA, Service Enregistrement and the Technical Control Room, to make sure that all problems get resolved in a proper and timely manner.

  9. Open Access Publishing

    Morrison, Heather

    2007-01-01

    An overview of open access publishing, for college faculty. Presents a definition of open access, the two roads to open access (OA publishing and self-archiving), overview of business models for open access, and examples of open access journals, with a focus on journals developed in British Columbia, including one (Topics in Scholarly Communication) developed by graduate students as a class assignment, and another developed by high school students (The Pink Voice). Includes a handout of res...

  10. Advocacy for Open Access

    Das, Anup-Kumar

    2015-01-01

    In the scholarly communications world, the concept of open access publishing has proliferated at faster pace since the global open access declarations such as the Budapest Open Access Initiative (BOAI) in February 2002 and the Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities in October 2003. After one decade of these two epoch-making declarations, we see growing instances of open access resources due to collective efforts put by the advocacy organizations, advocac...

  11. Open Access Policy Update

    Morrison, Heather

    2007-01-01

    This presentation explores the status of open access policy developments internationally, and particularly in Canada, as of April 2007. While open access resources are substantial, and growing rapidly, the primary issue for open access archives (institutional repositories) is content acquisition, and few researchers fully understand open access, illustrating an ongoing need for policy. Open access policy initiatives are happening around the world. Sherpa Juliet lists more than 20 funding a...

  12. Open accessibility data interlinking

    Ding, Chaohai; Wald, Mike; Wills, Gary

    2014-01-01

    This paper presents the research of using Linked Open Data to enhance accessibility data for accessible travelling. Open accessibility data is the data related to the accessibility issues associated with geographical data, which could benefit people with disabilities and their special needs. With the aim of addressing the gap between users’ special needs and data, this paper presents the results of a survey of open accessibility data retrieved from four different sources in the UK. An ontolog...

  13. Accessibility and sensory experiences

    Ryhl, Camilla

    2010-01-01

    This article introduces a new design concept; sensory accessibility. While acknowledging the importance of sensory experiences in architectural quality, as well as the importance of accommodating user needs the concept combines three equally important factors; architecture, the senses and...... accessibility. Sensory accessibility accommodates aspects of a sensory disability and describes architectural design requirements needed to ensure access to architectural experiences. In the context of architecture accessibility has become a design concept of its own. It is generally described as ensuring...... physical access to the built environment by accommodating physical disabilities. While the existing concept of accessibility ensures the physical access of everyone to a given space, sensory accessibility ensures the choice of everyone to stay and be able to participate and experience....

  14. Professional Access 2013 programming

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  15. Access 2010 Programmer's Reference

    Hennig, Teresa; Griffith, Geoffrey L

    2010-01-01

    A comprehensive guide to programming for Access 2010 and 2007. Millions of people use the Access database applications, and hundreds of thousands of developers work with Access daily. Access 2010 brings better integration with SQL Server and enhanced XML support; this Wrox guide shows developers how to take advantage of these and other improvements. With in-depth coverage of VBA, macros, and other programming methods for building Access applications, this book also provides real-world code examples to demonstrate each topic.: Access is the leading database that is used worldwide; While VBA rem

  16. Physical Access Control Database

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  17. Hemodialysis access - self care

    ... an infection. To prevent infection: Avoid bumping or cutting your access. DO NOT lift anything heavy with ... Check the pulse in your access arm. You should feel blood rushing through that feels like a vibration. This vibration is ...

  18. Design for Accessibility

    Herriott, Richard

    2012-01-01

    A report on how nine rail builder, operators and transport designers deal with design for accessibility......A report on how nine rail builder, operators and transport designers deal with design for accessibility...

  19. Access Customized Forms

    Cosma Emil; Jeflea Victor

    2010-01-01

    By using Word, Excel or PowerPoint one can automate routine operations using the VBA language (Visual Basic for Applications). This language is also used in Access, allowing access to data stored in tables or queries. Thus, Access and VBA resources can be used together. Access is designed for programming forms and reports (among other things), so there won’t be found any of the VBA editor’s specific forms.

  20. Open Access : Three Perspectives

    Owen, G.W. Brian; Waller, Andrew; Perkins, Lesley

    2006-01-01

    Open Access has the potential to transform scholarly communications and access to academic research, especially for libraries in smaller institutions or in economically disadvantaged areas around the world. This important and timely panel discussion will focus on three aspects of open access: 1) the library as publisher, 2) the librarian as archivist, and 3) the role of open access in the careers of upcoming professionals.

  1. Open Access Alternatives

    Tenopir, Carol

    2004-01-01

    Open access publishing is a hot topic today. But open access publishing can have many different definitions, and pros and cons vary with the definitions. Open access publishing is especially attractive to companies and small colleges or universities that are likely to have many more readers than authors. A downside is that a membership fee sounds…

  2. Pro Access 2010 Development

    Collins, Mark

    2011-01-01

    Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for Applications (VBA) tools for Access applications, integrate Access with SharePoint and other business systems, and much more. Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, co

  3. Android Access Control Extension

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  4. Access 2013 for dummies

    Ulrich Fuller, Laurie

    2013-01-01

    The easy guide to Microsoft Access returns with updates on the latest version! Microsoft Access allows you to store, organize, view, analyze, and share data; the new Access 2013 release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. Access 2013 For Dummies covers all the new features of the latest version of Accessand serves as an ideal reference, combining the latest Access features with the basics of building usable databases. You'll learn how to create an app from the Welcome screen, get support

  5. Open Access @ DTU

    Ekstrøm, Jeannette

    Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all peer review...... articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access and related topics such...... as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc....

  6. Urban Railway Accessibility

    GUAN Hongzhi; YIN Yuanfei; YAN Hai; HAN Yan; QIN Huanmei

    2007-01-01

    Effective use of urban rapid railway systems requires that the railway systems be effectively connected with other transportation modes so that they are accessible. This paper uses the logit model and data to analyze the factors influencing railway access choices in a railway choice access model. The results indicate that access time, access cost, and access distance are factors significantly affecting railway access choices. The user's income significantly affects the probability of choosing to walk rather than to take a taxi,but is not related to choosing buses or bicycles. Vehicle ownership significantly affects the probability of choosing a taxi, but is not significantly related to the other modes. The conclusions provide an analysis tool for urban railway planning and construction.

  7. Android Access Control Extension

    Anton Baláž; Branislav Madoš; Michal Ambróz

    2015-01-01

    The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by pr...

  8. Usability and accessibility curricula

    Luján Mora, Sergio; Cachero Castro, Cristina

    2012-01-01

    Presentation of existing curricula connected with usability and accessibility at the University of Alicante for the Leonardo da Vinci project "GUI Usability and Accessibility: Exchanging Knowledge and Experiences" (Grenoble, France, 27 November 2012). Presentación del currículo actual relacionado con la usabilidad y la accesibilidad en la Universidad de Alicante para el proyecto Leonardo da Vinci "GUI Usability and Accessibility: Exchanging Knowledge and Experiences" (Grenoble, Francia, 27...

  9. Open Access and SSHRC

    Sylvain, Christian

    2007-01-01

    The presenter, Christian Sylvain, is the Director, Policy, Planning, and International Affairs of Canada's Social Sciences and Humanities Research Council (SSHRC), the primary funding agency for social sciences and humanities research in Canada. This session presents an overview of open access at SSHRC, beginning with the endorsement of the concept of open access by SSHRC Council in 2004. The objective is to remove barriers to access to publicly funded research, so as to increase circulatio...

  10. Accessibility to dental services

    Evenden, Craig Andrew

    2007-01-01

    Background: Access to dental care has become a key focus for Government officials in Scotland. Newton et al. (2004) note that the White Paper ‘Towards a healthier Scotland’ (The Scottish Office Department of Health, 1999), identifies dental health as a key area for action, with large numbers of the population unable to gain access to dental care. Various methodologies have been developed in an attempt to explore the inequalities in dental health care access; however a number of studies have ...

  11. Open Access in Practice

    Machovec, George; Morrison, Heather; Whitehead, Heather

    2006-01-01

    This session addressed some of the practical issues arising from open access. The Colorado Alliance of Research Libraries (CARL) links members with open access resources through the Gold Rush service, which includes 80 open access title lists. Librarians at the Colorado School of Mines have collaborated to develop a subject specialized list of titles - for their own library, and to share with all CARL members through Gold Rush. E-LIS, the Open Archive for Library and Information Studies...

  12. Access 2013 bible

    Alexander, Michael

    2013-01-01

    A comprehensive reference to the updated and new features of Access 2013 As the world's most popular database management tool, Access enables you to organize, present, analyze, and share data as well as build powerful database solutions. However, databases can be complex. That's why you need the expert guidance in this comprehensive reference. Access 2013 Bible helps you gain a solid understanding of database purpose, construction, and application so that whether you're new to Access or looking to upgrade to the 2013 version, this well-rounded resource provides you with a th

  13. Demystifying Open Access

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  14. OGIS Access System

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  15. Mathematics & database (open) access

    Guillopé, Laurent

    2003-01-01

    The textual version of this presentation at the Conference "Open Access to Scientific and Technical Information: State of the Art and Future Trends" was published with the title 'Mathematics and databases: Open Access' in "Information Services and Use", vol. 23 (2003), issue 2-3, p. 127-131.

  16. Market Access and Welfare

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    2015-01-01

    Well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. The present paper proposes a new set of tariff reforms that can achieve both...

  17. Coded Random Access

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi;

    2015-01-01

    The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered as...... waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access......, in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of...

  18. The Open Access Divide

    Jingfeng Xia

    2013-10-01

    Full Text Available This paper is an attempt to review various aspects of the open access divide regarding the difference between those academics who support free sharing of data and scholarly output and those academics who do not. It provides a structured description by adopting the Ws doctrines emphasizing such questions as who, what, when, where and why for information-gathering. Using measurable variables to define a common expression of the open access divide, this study collects aggregated data from existing open access as well as non-open access publications including journal articles and extensive reports. The definition of the open access divide is integrated into the discussion of scholarship on a larger scale.

  19. Pediatric vascular access

    Pediatric interventional radiologists are ideally suited to provide vascular access services to children because of inherent safety advantages and higher success from using image-guided techniques. The performance of vascular access procedures has become routine at many adult interventional radiology practices, but this service is not as widely developed at pediatric institutions. Although interventional radiologists at some children's hospitals offer full-service vascular access, there is little or none at others. Developing and maintaining a pediatric vascular access service is a challenge. Interventionalists skilled in performing such procedures are limited at pediatric institutions, and institutional support from clerical staff, nursing staff, and technologists might not be sufficiently available to fulfill the needs of such a service. There must also be a strong commitment by all members of the team to support such a demanding service. There is a slippery slope of expected services that becomes steeper and steeper as the vascular access service grows. This review is intended primarily as general education for pediatric radiologists learning vascular access techniques. Additionally, the pediatric or adult interventional radiologist seeking to expand services might find helpful tips. The article also provides education for the diagnostic radiologist who routinely interprets radiographs containing vascular access devices. (orig.)

  20. Pediatric vascular access

    Donaldson, James S. [Northwestern University, Feinberg School of Medicine, Department of Medical Imaging, Children' s Memorial Hospital, Chicago, IL (United States)

    2006-05-15

    Pediatric interventional radiologists are ideally suited to provide vascular access services to children because of inherent safety advantages and higher success from using image-guided techniques. The performance of vascular access procedures has become routine at many adult interventional radiology practices, but this service is not as widely developed at pediatric institutions. Although interventional radiologists at some children's hospitals offer full-service vascular access, there is little or none at others. Developing and maintaining a pediatric vascular access service is a challenge. Interventionalists skilled in performing such procedures are limited at pediatric institutions, and institutional support from clerical staff, nursing staff, and technologists might not be sufficiently available to fulfill the needs of such a service. There must also be a strong commitment by all members of the team to support such a demanding service. There is a slippery slope of expected services that becomes steeper and steeper as the vascular access service grows. This review is intended primarily as general education for pediatric radiologists learning vascular access techniques. Additionally, the pediatric or adult interventional radiologist seeking to expand services might find helpful tips. The article also provides education for the diagnostic radiologist who routinely interprets radiographs containing vascular access devices. (orig.)

  1. Corporate Remote Access

    Eronen, Erpo

    2009-01-01

    The objective of this thesis was to find a suitable, cost efficient and easy-to-use secure remote access solution for the Andritz Group. Currently these secure re-mote connections are provided using Check Point IPsec VPN connections. How-ever, there is a need for more precise access restriction and a cut in management costs. Because of these reasons Andritz Group piloted products of the Juniper Networks Secure Access series. Secondary reasons for choosing Juniper SSL VPN were the market leadi...

  2. Open Access Italia 2010

    De Robbio, Antonella

    2010-01-01

    The presentation is an update of the state of the art of Open Access in Italy which was illustrated during the 2009 Open Access Week. It covers the milestones of Open Access in Italy and the recommendations of the CRUI national Working Group that has recently reached the number of 60 members. It illustrates the CRUI WG agenda for the next three years which focuses on the following three issues: open courseware, open archive metadata, and a survey of the attitudes of Italian publishers toward...

  3. Access 2010 for dummies

    Ulrich Fuller, Laurie

    2010-01-01

    A friendly, step-by-step guide to the Microsoft Office database application Access may be the least understood and most challenging application in the Microsoft Office suite. This guide is designed to help anyone who lacks experience in creating and managing a database learn to use Access 2010 quickly and easily. In the classic For Dummies tradition, the book provides an education in Access, the interface, and the architecture of a database. It explains the process of building a database, linking information, sharing data, generating reports, and much more.As the Micr

  4. Market Access and Welfare

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    objectives of trade policy is problematic and calls for finding alternative tariff reform rules that can achieve both objectives at the same time. The present paper contributes to this aim by using a new set of tariff reforms that are based on local optimality. Using such reforms it is shown that market......According to the literature, well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. Such conflict between welfare and market access...... access and consumer welfare will always be weakly compatible, in the sense that reforms based on each objective have the same signed effect on the other objective. For strong compatibility, whereby both objectives increase as a result of a locally optimal tariff reform, we derive both a necessary and...

  5. Random access photonic metamaterials

    Cencillo-Abad, P.; Ou, J.Y.; Valente, J.; Plum, E.; Zheludev, N.I.

    2015-01-01

    We demonstrate the first addressable reconfigurable photonic metamaterials thus enabling control over optical material properties with simultaneous spatial and temporal resolution. Potential applications of random access metadevices include active focusing, beam steering, dynamic transformation optics and video holography.

  6. Access/AML

    Department of Transportation — The AccessAML is a web-based internet single application designed to reduce the vulnerability associated with several accounts assinged to a single users. This is a...

  7. UK Open Access Policy Landscape

    Picarra, Mafalda

    2014-01-01

    Two distinct paths for open access are being promoted in UK open access policies: open access publishing (gold open access) by RCUK (Gold OA) and self-archiving (green open access) by HEFCE. This requires continuous and coordinated efforts to support universities, academic libraries and researchers in achieving compliance.

  8. Dynamic Spectrum Access

    2011-01-01

    Software Defined Radio (SDR) and Cognitive Radio (CR) could be in all radio transmitters sometime in the future. This thesis gives information about both SDR and CR and how we could use these technologies to utilize the scarce resources of frequencies. The use of CR in Dynamic Spectrum Access Networks could be a possible solution, and this thesis will try to give as much information as possible to this challenge. Information about Dynamic Spectrum Access and different challenges with this tec...

  9. CERN access cards

    HR Department

    2007-01-01

    Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.

  10. The universal access handbook

    Stephanidis, Constantine

    2009-01-01

    In recent years, the field of Universal Access has made significant progress in consolidating theoretical approaches, scientific methods and technologies, as well as in exploring new application domains. Increasingly, professionals in this rapidly maturing area require a comprehensive and multidisciplinary resource that addresses current principles, methods, and tools. Written by leading international authorities from academic, research, and industrial organizations and nonmarket institutions, The Universal Access Handbook covers the unfolding scientific, methodological, technological, and pol

  11. Access to physiotherapy services

    Partridge, C. J.

    1982-01-01

    A survey of community physiotherapy services operating within the National Health Service throughout England and Wales in 1980 showed a considerable increase in the availability of physiotherapy outside hospital, with 159 health districts (75 per cent) having some form of community physiotherapy. Additional information obtained about access by general practitioners to hospital physiotherapy departments showed that in 140 districts (66 per cent), some direct access was available.

  12. IMPROVING ACCESS TO DRUGS

    Max Joseph Herman

    2012-01-01

    Although essentially not all therapies need drug intervention, drugs is still an important components in health sector, either in preventive, curative, rehabilitative or promotion efforts. Hence the access to drugs is a main problem, either in international or national scale even to the smallest unit. The problem on access to drugs is very complicated and cannot be separated especially from pharmacy management problems; moreover in general from the overall lack of policy development and effec...

  13. Children's access to medicines

    Alkahtani, Saad Ahmed

    2013-01-01

    Access to health care for children is important. It is dependent on access to health professionals and also parental attitudes towards illness. Children have the right to receive medicines that are scientifically evaluated for both efficacy and safety. Counterfeit and substandard medicines unfortunately result in the death of many children worldwide. There have been particular problems with diethylene glycol which has been used as a solvent in counterfeit medicines. It has also been foun...

  14. Information Access Surveys (IAS)

    2004-01-01

    What is an Information Access Survey? An Information Access Survey is a tool that: • Identifies key issues about people and what information needs they have • Identifies what media sources are available, what strategies people use to get information and finds out how cost-effective these are • Recommends methods of communication that are useful for poor rural communities who use aquatic resources to improve their livelihoods (Pdf contains 4 pages).

  15. Open Access Research Impacts

    Das, Anup-Kumar

    2015-01-01

    In an open access (OA) world, much importance has been given to using open source tools, open access resources and open solutions to engage authors and researchers in collaborative research, peer-to-peer sharing of scholarly information and collaborative evaluation of scholars’ works. On the other hand, exponential growth of scientific literature also has led to rapid disappearance of nascent literature before it actually gets noticed by the scientific communities. No single database can capt...

  16. Open Access in the Sciences

    Morrison, Heather

    2009-01-01

    Open Access in the Sciences is an overview presentation designed for a library science class at McGill University, with a focus on open access in the Canadian context. There are more than 3,900 fully open access journals listed in the Directory of Open Access Journals; more than a hundred are published in Canada. Selected examples of open access journals from across the country are presented, published by universities / libraries, societies, and government. Open access archives (disciplina...

  17. IVOA Simple Image Access

    Dowler, Patrick; Bonnarel, François

    2016-01-01

    The Simple Image Access protocol (SIA) provides capabilities for the discovery, description, access, and retrieval of multi-dimensional image datasets, including 2-D images as well as datacubes of three or more dimensions. SIA data discovery is based on the ObsCore Data Model (ObsCoreDM), which primarily describes data products by the physical axes (spatial, spectral, time, and polarization). Image datasets with dimension greater than 2 are often referred to as datacubes, cube or image cube datasets and may be considered examples of hypercube or n-cube data. In this document the term "image" refers to general multi-dimensional datasets and is synonymous with these other terms unless the image dimensionality is otherwise specified. SIA provides capabilities for image discovery and access. Data discovery and metadata access (using ObsCoreDM) are defined here. The capabilities for drilling down to data files (and related resources) and services for remote access are defined elsewhere, but SIA also allows for dir...

  18. Migrants' access to healthcare

    Norredam, Marie

    2011-01-01

    access were used to explore differences: 1) cancer stage at diagnosis as a clinical outcome and 2) emergency room (ER) contacts as a utilisation measure. Both informal and formal barriers to access were studied to explore why possible differences existed including: 1) motivation for using ER; and 2......) asylum seekers' healthcare entitlements. Different definitions of migration and ethnicity were investigated including: country of birth and residence status. Substudy I showed a tendency towards more advanced stage at diagnosis or unknown stage among most subgroups of migrant women with a history of...... informal barriers to access and screening. According to the law asylum seekers are entitled to emergency care only in 10 out of 24 countries. Medical screening was carried out in all but one of the 24 EU countries; however, the content and extent of screening programmes vary. The thesis aimed to explore if...

  19. Nuclear information access system

    The energy supply in the countries, which have abundant energy resources, may not be affected by accepting the assertion of anti-nuclear and environment groups. Anti-nuclear movements in the countries which have little energy resources may cause serious problem in securing energy supply. Especially, it is distinct in Korea because she heavily depends on nuclear energy in electricity supply(nuclear share in total electricity supply is about 40%).The cause of social trouble surrounding nuclear energy is being involved with various circumstances. However, it is very important that we are not aware of the importance of information access and prepared for such a situation from the early stage of nuclear energy's development. In those matter, this paper analyzes the contents of nuclear information access system in France and Japan which have dynamic nuclear development program and presents the direction of the nuclear access regime through comparing Korean status and referring to progresses of the regime

  20. Complication with intraosseous access

    Hallas, Peter; Brabrand, Mikkel; Folkestad, Lars

    2013-01-01

    INTRODUCTION: Intraosseous access (IO) is indicated if vascular access cannot be quickly established during resuscitation. Complication rates are estimated to be low, based on small patient series, model or cadaver studies, and case reports. However, user experience with IO use in real......-life emergency situations might differ from the results in the controlled environment of model studies and small patient series. We performed a survey of IO use in real-life emergency situations to assess users' experiences of complications. METHODS: An online questionnaire was sent to Scandinavian emergency...... physicians, anesthesiologists and pediatricians. RESULTS: 1,802 clinical cases of IO use was reported by n=386 responders. Commonly reported complications with establishing IO access were patient discomfort/pain (7.1%), difficulties with penetration of periosteum with IO needle (10.3%), difficulties with...

  1. Disruption - Access cards service

    2014-01-01

    We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.

  2. Open-Access-Suchmaschinen

    Nicolai, Thomas

    2009-01-01

    Open Access ist eine von Wissenschaftlern für Wissenschaftler gegründete Bewegung mit dem Interesse, einen kostenlosen und uneingeschränkten Zugang zu wissenschaftli-chen Forschungsbeiträgen über das Internet zu ermöglichen. Im Zuge dieser Entwicklung stellen Forschungsinstitutionen ihren Wissenschaftlern kostenlos Open-Access-Archive zur freien Veröffentlichung ihrer Forschungsbeiträge zur Verfügung. Dies hat in den vergangenen Jahren zu mehreren Millionen frei verfügbaren wissenschaftlichen...

  3. Sprawl and Accessibility

    Robert Bruegmann

    2008-07-01

    Full Text Available This essay argues that many of the assumptions that have been made about sprawl are misleading or just wrong. Nowhere has this been more the case than in debates about transportation and access. Because of this, it is not surprising that a good many of the policies advocated by proponents of Smart Growth would almost certainly lead to reduced mobility and impaired accessibility for a large part of the population. At very least, the debates over sprawl have pitted private vs. public transportation in a way that has contributed to serious underfunding of transportation infrastructure of all kinds.

  4. Accessibility | Smokefree.gov

    Smokefree.gov is committed to providing access to all individuals—disabled or not—who are seeking information on its Web sites. To provide this information, the smokefree.gov Web site has been designed to comply with Section 508 of the Rehabilitation Act (as amended). Section 508 requires that all individuals with disabilities (whether they are federal government employees or members of the general public) have access to and use of information and data comparable to that provided to individuals without disabilities, unless an undue burden would be imposed.

  5. Kinds of Access

    Overgaard, Morten; Sandberg, Kristian

    In experimental investigations of consciousness, participants are asked to reflect upon their own experiences by issuing reports about them in different ways. For this reason, a participant needs some access to the content of her own conscious experience in order to report. In such experiments, the...... there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesise that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about...

  6. Migrants' access to healthcare.

    Norredam, Marie

    2011-10-01

    There are strong pragmatic and moral reasons for receiving societies to address access to healthcare for migrants. Receiving societies have a pragmatic interest in sustaining migrants' health to facilitate integration; they also have a moral obligation to ensure migrants' access to healthcare according to international human rights principles. The intention of this thesis is to increase the understanding of migrants' access to healthcare by exploring two study aims: 1) Are there differences in migrants' access to healthcare compared to that of non-migrants? (substudy I and II); and 2) Why are there possible differences in migrants' access to healthcare compared to that of non-migrants? (substudy III and IV). The thesis builds on different methodological approaches using both register-based retrospective cohort design, cross-sectional design and survey methods. Two different measures of access were used to explore differences: 1) cancer stage at diagnosis as a clinical outcome and 2) emergency room (ER) contacts as a utilisation measure. Both informal and formal barriers to access were studied to explore why possible differences existed including: 1) motivation for using ER; and 2) asylum seekers' healthcare entitlements. Different definitions of migration and ethnicity were investigated including: country of birth and residence status. Substudy I showed a tendency towards more advanced stage at diagnosis or unknown stage among most subgroups of migrant women with a history of cancer compared to non-migrant women. Sub-study II found that some migrants (those born in Somalia, Turkey and Ex-Yugoslavia) use ER services more frequently than do non-migrants whereas others have the same or lower utilisation levels. As a consequence, substudy III was undertaken, which documented that more migrant within all subgroups had considered contacting a primary caregiver before visiting the ER compared to non-migrants, but that migrants experienced communication problems herein

  7. Digital Scholarship and Open Access

    Losoff, Barbara; Pence, Harry E.

    2010-01-01

    Open access publications provide scholars with unrestricted access to the "conversation" that is the basis for the advancement of knowledge. The large number of open access journals, archives, and depositories already in existence demonstrates the technical and economic viability of providing unrestricted access to the literature that is the…

  8. Analysis of Open Access Landscape

    Helen Doyle; Andy Gass; Debra Lappin; Rebecca Kennison

    2005-01-01

    This paper is created by bounding 5 editorials of Public Library of Science (PLoS ) which have written on various aspects of open access. It covers wide range topics of important open access issues, such as from paying for open access to copyright to open access as a public issue, which may be more or less of interest of our audience.

  9. Access to effective healthcare

    Høy, Bente

    2015-01-01

    Access to effective healthcare is in particular challenging for vulnerable and socially disadvantaged patients. Patients with chronic conditions are over-represented in these lower socioeconomic (LSES) groups. No generic review integrating the evidence on Self-Management support interventions in...

  10. Accessing vs Sourcing Knowledge

    Awate, Snehal; Larsen, Marcus M.; Mudambi, Ram

    2015-01-01

    to get on par with industry leaders. An in-depth comparison of knowledge flows reveals that within AMNEs, headquarters often serves the primary source of knowledge for R&D subsidiaries. In contrast, within EMNEs, headquarters accesses knowledge from R&D subsidiaries in advanced economies for...

  11. Access to telecommunications networks

    Canoy, M.F.M.; de Bijl, P.W.J.; Kemp, R.

    2003-01-01

    Contributing to a convergence of legal and economic approaches, The Economics of Antitrust and Regulation in Telecommunications integrates economic theory into current EU antitrust policy within the sector. The book addresses the role of competition and regulatory policies on a number of key issues in telecommunications, such as market definition, collective dominance, access to networks, and allocation of scarce resources.

  12. Greater needs, limited access

    2009-01-01

    With the recent ratification of the United Nations Convention on the Rights of Persons with Disabilities by the United Kingdom, Kathryn Senior reports that access to health care for people with mental health disorders is one area that leaves room for improvement.

  13. Open Access: Soziologische Aspekte

    Herb, Ulrich

    2007-01-01

    Die Forderung nach Open Access wird wissenschaftslogisch (Beschleunigung der wissenschaftlichen Kommunikation), finanziell (Linderung der Zeitschriftenkrise), sozial (Verringerung des Digital Divide), demokratietheoretisch (Zugang zu Informationen ermöglicht Partizipation) und sozialpolitisch (freier Zugang zu Informationen nivelliert Ungleichheiten) begründet. Dieser Beitrag untersucht einige dieser Annahmen mittels sozialwissenschaftlicher Modelle. Von Befunden aus der Bildungssoziologie un...

  14. Funding scientific open access

    In order to reduce the knowledge divide, more Open Access Journals (OAJ) are needed in all languages and scholarly subject areas that exercise peer-review or editorial quality control. To finance needed costs, it is discussed why and how to sell target specific advertisement by associating ads to given scientific keywords. (author)

  15. Kinds of access

    Overgaard, Morten; Sandberg, Kristian

    2012-01-01

    In experimental investigations of consciousness, participants are asked to reflect upon their own experiences by issuing reports about them in different ways. For this reason, a participant needs some access to the content of her own conscious experience in order to report. In such experiments, t...

  16. College Access Marketing

    Tremblay, Christopher W.

    2011-01-01

    College Access Marketing (CAM) is a relatively new phenomenon that seeks to positively influence the college-going rate. This report defines CAM, describes CAM examples, and discusses how CAM seeks to counter barriers to college. It explores four main elements of CAM: information, marketing, advocacy, and social mobilization. Further, it…

  17. Access as justice

    FITZPATRICK, Peter

    2005-01-01

    With the considerable help of Derrida, aptly aided by Mandela, this paper advances an idea of justice as integral to law. Thence, by way of an homology with such justice, access also is shown to be integral to law. What impels the overall argument is the primacy accorded to law in the constitution of the social bond.

  18. Strategies for Improving Access.

    Hore, Terry; Barwood, Bryan

    1989-01-01

    The development of the varied strategies that have been introduced in order to improve access for disadvantaged groups at Monash University is discussed. The Junior University Programme, the Monash Orientation Scheme for Aborigines, the Mature Age Special Admission Scheme, Special Entry Scheme, and the Schools Link Programme are described. (MLW)

  19. Efficient Distributed Medium Access

    Shah, Devavrat; Tetali, Prasad

    2011-01-01

    Consider a wireless network of n nodes represented by a graph G=(V, E) where an edge (i,j) models the fact that transmissions of i and j interfere with each other, i.e. simultaneous transmissions of i and j become unsuccessful. Hence it is required that at each time instance a set of non-interfering nodes (corresponding to an independent set in G) access the wireless medium. To utilize wireless resources efficiently, it is required to arbitrate the access of medium among interfering nodes properly. Moreover, to be of practical use, such a mechanism is required to be totally distributed as well as simple. As the main result of this paper, we provide such a medium access algorithm. It is randomized, totally distributed and simple: each node attempts to access medium at each time with probability that is a function of its local information. We establish efficiency of the algorithm by showing that the corresponding network Markov chain is positive recurrent as long as the demand imposed on the network can be supp...

  20. ACCESS Project: Final Report

    Weller, Heiko [Robert Bosch, LLC, Farmington Hills, MI (United States)

    2015-04-01

    The ACCESS project addressed the development, testing, and demonstration of the proposed advanced technologies and the associated emission and fuel economy improvement at an engine dynamometer and on a full-scale vehicle. Improve fuel economy by 25% with minimum performance penalties Achieve SULEV level emissions with gasoline Demonstrate multi-mode combustion engine management system

  1. Access2innovation

    Ravn, Jacob

    eksplicit haft fokus på at understøtte samarbejde mellem virksomhedere, forskere og NGOer som afsæt for at reducere fattigdomsproblematikkerne i udviklingslandene gennem en markedsdreven tilgang. Nærværende afhandling tager med udgangspunkt i studiet af access2innovation netværket (www.access2innovation.......com) fat i en flig af denne diskussion. Access2innovation har igennem et målrettet samarbejde mellem Folkekirkens Nødhjælp, virksomheder og forskere leveret en række konkrete kommercielle løsninger målrettet behovene i nødhjælps-­ og udviklingsbistanden. Netværket repræsenterer derved i praksis et...... succesfuldt eksempel på innovation i netværk ved at have lagt grunden for etablering af Sky Watch og ViewWorld og søsat yderligere to partnerskaber omkring Den Grønne Generator og WorldBarrow. Erfaringen fra access2innovation er dog samtidigt, at udvikling og implementering af samarbejdet har været...

  2. Access and Fishing Activities

    Høst, Jeppe Engset

    In this chapter, I look at the implications of transferable quotas on the organization of production; that is, how fishing activities are structured around access to the individual and transferable quotas and how, in turn, the quotas structure the production. Therefore, this chapter will give a d...

  3. Public Access Defibrillation

    Agerskov, Marianne; Nielsen, Anne Møller; Hansen, Carolina Malta;

    2015-01-01

    OHCA-cases where an accessible AED was located within 100 m. In addition, we assessed 30-day survival. METHODS: Using data from the Mobile Emergency Care Unit and the Danish Cardiac Arrest Registry, we identified 521 patients with OHCA between October 1, 2011 and September 31, 2013 in Copenhagen...

  4. Fixed Access Network Sharing

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  5. Accessing offshoring advantages

    Mykhaylenko, Alona; Motika, Agnes; Wæhrens, Brian Vejrum;

    2015-01-01

    Purpose – The purpose of this paper is to advance the understanding of factors that affect offshoring performance results. To do so, this paper focuses on the access to location-specific advantages, rather than solely on the properties of the offshoring company, its strategy or environment....... Assuming that different levels of synergy may exist between particular offshoring strategic decisions (choosing offshore outsourcing or captive offshoring and the type of function) and different offshoring advantages, this work advocates that the actual fact of realization of certain offshoring advantages...... (getting or not getting access to them) is a more reliable predictor of offshoring success. Design/methodology/approach – Aset of hypotheses derived from the extant literature is tested on the data from a quantitative survey of 1,143 Scandinavian firms. Findings – The paper demonstrates that different...

  6. Support open access publishing

    Ekstrøm, Jeannette

    2013-01-01

    Projektet Support Open Access Publishing har til mål at få opdateret Sherpa/Romeo databasen (www.sherpa.ac.uk/romeo) med fagligt relevante, danske tidsskrifter. Projektet skal endvidere undersøge mulighederne for at få udviklet en database, hvor forskere på tværs af relevante tidsskriftsinformati......Projektet Support Open Access Publishing har til mål at få opdateret Sherpa/Romeo databasen (www.sherpa.ac.uk/romeo) med fagligt relevante, danske tidsskrifter. Projektet skal endvidere undersøge mulighederne for at få udviklet en database, hvor forskere på tværs af relevante...

  7. Access to Research Inputs

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    The viability of modern open science norms and practices depend on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50% more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry....

  8. Access to Research Inputs

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    2015-01-01

    The viability of modern open science norms and practices depends on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50 % more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry...

  9. Advanced access control system

    A prototype voice verification system has been installed which provides the required positive identification at the main site access control point. This system compares an individual's file voice print with a sample voice print obtained from the individual when an attempt is made to enter the site. The voice system transmits the individual's identity to a central processor. The central processor associates that individual's authorization file with a card-key obtained at the access point. The system generates a record of personnel movement, provides a personnel inventory on a real-time basis, and it can retrieve a record of all prior events. The system installed at the Barnwell Nuclear Fuel Plant is described

  10. Internet Access to Spacecraft

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Jackson, Chris; Price, Harold

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project at NASA's Goddard Space flight Center (GSFC), is demonstrating the use of standard Internet protocols for spacecraft communication systems. This year, demonstrations of Internet access to a flying spacecraft have been performed with the UoSAT-12 spacecraft owned and operated by Surrey Satellite Technology Ltd. (SSTL). Previously, demonstrations were performed using a ground satellite simulator and NASA's Tracking and Data Relay Sa...

  11. RFID access control

    Luzar, Boštjan

    2012-01-01

    The goal of the thesis was to learn about the procedure of developing applications based on microcontrollers using the Arduino development platform and the IDE environment. Through practical development in the Arduino environment we realized a logic which is capable to authorize access to specific locations and areas based on 125 kHz RFID tags. Although many solutions exist, most of them require a lot of hardware and software because of their modular design and communication types, the so...

  12. Accessibility and Economic Opportunity

    O'Regan, Katherine M.; Quigley, John M.

    1997-01-01

    Over thirty years ago, researchers raised the possibility of an important link between transportation, jobs and prospects for the poor. Decentralized employment, centralized minorities and poor, and inadequate transportation links in between were the context of the urban riots of the 1960's and posited as a causal factor by researchers. Given federal mandates for large-scale movement of welfare recipients into jobs, whether--and to what extent--access affects employment is still of national i...

  13. Advanced access control system

    A prototype voice verification system has been installed which provides the required positive identification at the main site access control point. This system compares an individual's file voice print with a sample voice print obtained from the individual when an attempt is made to enter the site. The voice system transmits the individual's identify to a central processor. The system installed at the Barnwell Nuclear Fuel Plant is described

  14. Remote access thyroid surgery.

    Bhatia, Parisha; Mohamed, Hossam Eldin; Kadi, Abida; Kandil, Emad; Walvekar, Rohan R

    2015-10-01

    Robot assisted thyroid surgery has been the latest advance in the evolution of thyroid surgery after endoscopy assisted procedures. The advantage of a superior field vision and technical advancements of robotic technology have permitted novel remote access (trans-axillary and retro-auricular) surgical approaches. Interestingly, several remote access surgical ports using robot surgical system and endoscopic technique have been customized to avoid the social stigma of a visible scar. Current literature has displayed their various advantages in terms of post-operative outcomes; however, the associated financial burden and also additional training and expertise necessary hinder its widespread adoption into endocrine surgery practices. These approaches offer excellent cosmesis, with a shorter learning curve and reduce discomfort to surgeons operating ergonomically through a robotic console. This review aims to provide details of various remote access techniques that are being offered for thyroid resection. Though these have been reported to be safe and feasible approaches for thyroid surgery, further evaluation for their efficacy still remains. PMID:26425450

  15. Intelligent card access keys

    A newly developed access control technology allows information about users to be stored on key-like EEPROM devices. The keys store encrypted information about the user and his or her authorized access activity. Specially developed key readers scan, decrypt, and process the key data, and make the decision whether entry should be granted or denied. The key readers can function as complete, stand-alone facility management systems, incorporating access control, security monitoring, and remote control. In this configuration, the key readers provide anti-passback protection and other special features without requiring any data lines between readers. The key readers also feature sophisticated algorithmic processing for performing complex operations such as two-man control or cross zoned security annunciation. Key readers can also be interconnected with an MCM-1000 Multiples Monitoring System to form a distributed processing local area network. In such a configuration, changes in key reader status can be uploaded to the MCM-1000, and programming changes and operator commands can be downloaded to the key readers

  16. Direct access to INIS

    Librarians, researchers, and information specialists throughout the world now have the opportunity for direct access to coverage of almost 95% of the world's literature dealing with the peaceful uses of atomic energy and nuclear science. This opportunity has been provided by the International Nuclear Information System (INIS) of the IAEA. INIS, with the voluntary collaboration of more than 60 of the Agency's Member States, maintains a comprehensive, computer-resident data-base, containing the bibliographic details plus informative abstracts of the bulk of the world's literature on nuclear science and technology. Since this data-base is growing at a rate of 75,000 items per year, and already contains more than 500,000 items, it is obviously important to be able to search this collection conveniently and efficiently. The usefulness of this ability is enhanced when other data-bases on related subjects are made available on an information network. During the early 1970s, on-line interrogation of large bibliographic data-bases became the accepted method for searching this type of information resource. Direct interaction between the searcher and the data-base provides quick feed-back resulting in improved literature listings for launching research and development projects. On-line access enables organizations which cannot store a large data-base on their own computer to expand the information resources at their command. Because of these advantages, INIS undertook to extend to interested Member States on-line access to its data-base in Vienna

  17. ADOPT Open Access

    2007-01-01

    Are you writing a theoretical paper? An experimental one? Or one about instrumentation? You can publish it in Open Access. Now. Read how... You might have heard about Open Access, the next big thing in scientific publishing. The idea is to make the results of your (publicly funded) research free to read for everyone out there ... not only those lucky ones who work in places where libraries can afford to purchase the expensive subscriptions to scientific journals. CERN, DESY and other particle physics institutes have accepted an offer by one of the leading journals in High Energy Physics, JHEP: our libraries will pay a special subscription fee, and, in exchange, all articles with at least one author from our institutes will be published in Open Access. Anyone, anywhere and anytime will be able to read them, without any financial barrier! If you are writing an instrumentation paper, you can submit it to JINST and benefit from the same offer. This is a major step forward in the planned conversion of existi...

  18. Open-Access Publishing

    Nedjeljko Frančula

    2013-06-01

    Full Text Available Nature, one of the most prominent scientific journals dedicated one of its issues to recent changes in scientific publishing (Vol. 495, Issue 7442, 27 March 2013. Its editors stressed that words technology and revolution are closely related when it comes to scientific publishing. In addition, the transformation of research publishing is not as much a revolution than an attrition war in which all sides are buried. The most important change they refer to is the open-access model in which an author or an institution pays in advance for publishing a paper in a journal, and the paper is then available to users on the Internet free of charge.According to preliminary results of a survey conducted among 23 000 scientists by the publisher of Nature, 45% of them believes all papers should be published in open access, but at the same time 22% of them would not allow the use of papers for commercial purposes. Attitudes toward open access vary according to scientific disciplines, leading the editors to conclude the revolution still does not suit everyone.

  19. After Access: Underrepresented Students' Postmatriculation Perceptions of College Access Capital

    Means, Darris R.; Pyne, Kimberly B.

    2016-01-01

    This qualitative study explores the perceived impact of college-going capital gained during participation in a college access program. In three, semistructured interviews spanning the first-year college experience, 10 first-year college students who participated in a college access program articulate the value of access programming and also raise…

  20. Why Full Open Access Matters

    2011-01-01

    This perspective explains the mechanics of copyright and scholarly publishing and warns authors who support open-access publishing about a new pseudo open-access publishing model in which authors pay but publishers still retain commercial reuse rights.

  1. Chemists, Access, Statistics

    Holmes, Jon L.

    2000-06-01

    New JCE Internet Feature at JCE Online Biographical Snapshots of Famous Chemists is a new JCE Internet feature on JCE Online. Edited by Barbara Burke, this feature provides biographical information on leading chemists, especially women and minority chemists, fostering the attitude that the practitioners of chemistry are as human as those who endeavor to learn about it. Currently, the column features biographical "snapshots" of 30 chemists. Each snapshot includes keywords and bibliography and several contain links to additional online information about the chemist. More biographical snapshots will appear in future installments. In addition, a database listing over 140 women and minority chemists is being compiled and will be made available online with the snapshots in the near future. The database includes the years of birth and death, gender and ethnicity, major and minor discipline, keywords to facilitate searching, and references to additional biographical information. We welcome your input into what we think is a very worthwhile resource. If you would like to provide additional biographical snapshots, see additional chemists added to the database, or know of additional references for those that are already in the database, please contact JCE Online or the feature editor. Your feedback is welcome and appreciated. You can find Biographical Snapshots of Famous Chemists starting from the JCE Online home page-- click the Features item under JCE Internet and then the Chemist Bios item. Access JCE Online without Name and Password We have recently been swamped by libraries requesting IP-number access to JCE Online. With the great benefit IP-number authentication gives to librarians (no user names and passwords to administer) and to their patrons (no need to remember and enter valid names and passwords) this is not surprising. If you would like access to JCE Online without the need to remember and enter a user name and password, you should tell your librarian about our

  2. Analysing Access Control Specifications

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker’s actions usually will be logged as permissible, standard actions—if they are logged at all....... Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...

  3. Mechanisms that improve referential access*

    Gernsbacher, Morton Ann

    1989-01-01

    Two mechanisms, suppression and enhancement, are proposed to improve referential access. Enhancement improves the accessibility of previously mentioned concepts by increasing or boosting their activation; suppression improves concepts’ accessibility by decreasing or dampening the activation of other concepts. Presumably, these mechanisms are triggered by the informational content of anaphors. Six experiments investigated this proposal by manipulating whether an anaphoric reference was made wi...

  4. Online Information Source & Access Method

    Sthapit, Dilip Man

    2009-01-01

    Online resources play important role in research and development of the country. So, LIS professional are interested in accessing and guiding users and readers to all available information sources. This article highlighted and described the availability of online information sources, open access e-journals and its access method.

  5. Anonymous Biometric Access Control

    Shuiming Ye

    2009-01-01

    Full Text Available Access control systems using the latest biometric technologies can offer a higher level of security than conventional password-based systems. Their widespread deployments, however, can severely undermine individuals' rights of privacy. Biometric signals are immutable and can be exploited to associate individuals' identities to sensitive personal records across disparate databases. In this paper, we propose the Anonymous Biometric Access Control (ABAC system to protect user anonymity. The ABAC system uses novel Homomorphic Encryption (HE based protocols to verify membership of a user without knowing his/her true identity. To make HE-based protocols scalable to large biometric databases, we propose the k-Anonymous Quantization (kAQ framework that provides an effective and secure tradeoff of privacy and complexity. kAQ limits server's knowledge of the user to k maximally dissimilar candidates in the database, where k controls the amount of complexity-privacy tradeoff. kAQ is realized by a constant-time table lookup to identity the k candidates followed by a HE-based matching protocol applied only on these candidates. The maximal dissimilarity protects privacy by destroying any similarity patterns among the returned candidates. Experimental results on iris biometrics demonstrate the validity of our framework and illustrate a practical implementation of an anonymous biometric system.

  6. Compressed random access memory

    Jansson, Jesper; Sung, Wing-Kin

    2010-01-01

    Motivated by applications which need to store huge amounts of data in the main memory of a computer, this paper proposes a new dynamic data-structure for compressed random access memory. Ferragina and Venturini [SODA 2007, TCS 2007] recently gave a compressed data-structure for storing a string that allows substrings to be retrieved efficiently, but it requires the string to be static. Here, we extend their results in a non-trivial way to also allow the stored compressed string to be modified during execution. Our results are as follows. A memory (or string) $T[1..n]$, where each character $T[i]$ is of $\\log\\sigma$ bits, can be stored in $n H_k(T) + O(n \\log \\sigma \\frac{(k+1) (\\log \\sigma +\\log \\log n)}{\\log n})$ bits, where $H_k(T)$ is the $k$-th order empirical entropy of $T$, such that (1) accessing $T[i..j]$ takes optimal $O(1 + (j-i) / \\log_{\\sigma} n)$ time and (2) replacing $T[i..i+\\log_{\\sigma} n - 1]$ by another string of length $\\log_{\\sigma} n$ takes $O(\\log n/\\log\\log n)$ time. We can also suppor...

  7. Accessibility and inclusion informational

    Mônica Sena de Souza

    2013-06-01

    Full Text Available Introduction: Discusses the role of information professionals in meeting the informational demands of people with disabilities in the information society. The librarian is crucial for the effectiveness and success in the informational inclusion of people with disabilities, considering also continuing education for their professional qualification.Objective: To provide reflections on the role of the librarian in serving users with disabilities, highlighting the need for improvement in information units, identified in the scientific literature with regard to accessibility.Methodology: Literature search, based on a review of literature in books and scientific papers, highlighting the main authors: Adams (2000, Mazzoni (2001 and Sassaki (1997, 2002, 2005.Results: The lack of informational access for people with disabilities hampers their social and political participation, hence, reduces its condition of citizenship.Conclusion: The librarian responsible for seeking continuing education, greater involvement in the events of the area and the constant search for job training, which will reflect on the best service the information needs of users with disabilities.

  8. Art : accessible, renewable technology

    This paper focuses on the role of non-governmental organization (NGO) citizen groups in Ontario in the use and production of electricity. NGOs have the potential to act both directly on their own accord, and indirectly by pressuring government and others. Current demand for electricity is divided between industrial, commercial and residential users. Citizens have an important role to play in reducing energy demand. On the supply side, there is a revival of interest in renewable energy based on wind, photovoltaic and local-hydro technologies as a result of the escalating environmental and economic costs of coal and nuclear generation. However, citizen groups have greater interest and enthusiasm than technical expertise, creating a mismatch between technological solutions and human need or use of them. This paper discusses how this mismatch applies to renewable-energy technologies, many of which are not especially user-friendly, or accessible. While alternative technologies are increasingly welcomed by government, industry is developing a large and growing array of technological devices. In between this is the citizen, who, despite keen interest, can be overwhelmed by the complexity of the situation. This paper links the theoretical perspective to the real world with a discussion of the dynamics between people and renewable energy in citizen groups and makes particular reference to one group, Citizens for Renewable Energy, that has been making renewable energy technology more accessible to its members for over a decade

  9. Access to legal abortion.

    1993-10-01

    Countries are grouped by the nature and extent of access to legal abortion. The categories include abortion on demand, for social reasons, for health reasons, for rape or incest or to save a mother's life, and only to save a mother's life. Abortion on demand is available for about 40% of the world's population and may have restrictions, such as parental consent or approval of state committees or physicians. There are 22 countries in Europe, 12 in the former Soviet Union, four in Asia, four in the Americas, one in the Middle East (Turkey), and one in Africa (Tunisia) which provide access to early abortion on demand. Abortion for social and economic reasons is available to 21% of the world's population in five countries in Asia, three in Europe (Great Britain, Finland, and Hungary), and one in Africa (Zambia). Abortion for health reasons is available to 16% of the world's population located in 21 countries in Africa, eight in the Americas, seven in Asia, five in Europe, and four in the Middle East. Laws governing about 5% of the world's population permit abortion only in the case of rape, incest, or when a mother's life is in danger (Brazil, Mexico, and Sudan). 18% of the world's population is covered by laws which permit an abortion only when a mother's life is in danger; this includes 19 countries in Africa, 11 in the Americas, nine in Asia, seven in the Middle East, and one in Europe (Ireland). PMID:12287145

  10. A quantum access network

    Fröhlich, Bernd; Lucamarini, Marco; Sharpe, Andrew W; Yuan, Zhiliang; Shields, Andrew J

    2013-01-01

    The theoretically proven security of quantum key distribution (QKD) could revolutionise how information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, so far no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we show that adopting simple and cost-effective telecommunication technologies to form a quantum access network can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We are able to demonstrate that a high-speed single-photon detector positioned at the network node can be shared between up to 64 users, thereby significantly reducing the hardware requirements for each user added to the network. This shared receiver architecture removes one of the main obstacles restricting the widespread application...

  11. Accessibility Long Term Perspectives

    Kay Axhausen

    2008-11-01

    Full Text Available Improved accessibility and its correlate lower generalized cost of contact, travel and transport have been sought by dynamic human societies for their economic and social benefits through- out recorded history. The paper will reflect about this process at a number of different spatial and temporal scales based on a conceptual model. Looking back at European history, it will trace the interaction between Christaller's logic of local market areas and the idea of (low contact cost network cities. Focusing on Switzerland since 1950 it will show how network investment changed the relative distribution of population and employment and how this interacted with changes in the preferences of the travelers. Using a recent snapshot of how a substantial sample of Swiss maintain their social networks over often very large areas, it will try to answer the question of what will happen in the future, if the current trend of ever lower costs of contact will persist.

  12. Membrane accessibility of glutathione

    Garcia, Alvaro; Eljack, Nasma D; Sani, Marc-Antoine;

    2015-01-01

    Regulation of the ion pumping activity of the Na(+),K(+)-ATPase is crucial to the survival of animal cells. Recent evidence has suggested that the activity of the enzyme could be controlled by glutathionylation of cysteine residue 45 of the β-subunit. Crystal structures so far available indicate...... that this cysteine is in a transmembrane domain of the protein. Here we have analysed via fluorescence and NMR spectroscopy as well as molecular dynamics simulations whether glutathione is able to penetrate into the interior of a lipid membrane. No evidence for any penetration of glutathione into the...... membrane was found. Therefore, the most likely mechanism whereby the cysteine residue could become glutathionylated is via a loosening of the α-β subunit association, creating a hydrophilic passageway between them to allow access of glutathione to the cysteine residue. By such a mechanism...

  13. AccessCulture

    Valtysson, Bjarki

    of the European Union, and how its cultural policy responds to the changes that the digital paradigm has brought upon the field. The self-publishing features of various Web 2.0 platforms, along with the interactive and distributional potentials that the Internet offers, have given rise to what is referred to here...... in cultural production and consumption. The first part of this works looks at how these changes respond to the field of cultural policy, as well as suggesting a possible culturepolitical reaction in a model which I refer to as access culture. In terms of theoretical approach, the notion of digital cultural...... of YouTube, MySpace, Facebook and Flickr, along with lesser known platforms such as the animated short film Elephants Dream, the BBC's Creative Archive, various Internet artworks and the Internet Archive. I furthermore introduce the copyright system Creative Commons in order to suggest legal, widely...

  14. Access For All

    Andersen, Ove Kjeld; Hjulmand, Christian

    2005-01-01

    Approximately 30% of the Danish population has severe problems in reading everyday text. In the light of the increasing amount of text available on the Internet this poses a democratic challenge to ensure “equal access” to information. The Talking Internet service - Access For All (AFA) - offers...... a free Internet-based tool for reading aloud any marked text with a synthetic voice. The only requirements are a standard equipped PC running a recent Windows OS and an Internet connection. Experiences gathered from running the service for more than 28 months underline the viability of the concept....... There is a clear need for a free internet based Danish text-to-speech synthesizer. Furthermore, the current state of technology i.e. internet bandwidth, response time and server technology is sufficient for setting up an online automatic reading service that is used by steadily growing number of individuals...

  15. AccessCulture

    Valtysson, Bjarki

    the European Union, and how its cultural policy responds to the changes that the digital paradigm has brought upon the field. The self-publishing features of various Web 2.0 platforms, along with the interactive and distributional potentials that the Internet offers, have given rise to what is...... Flickr indicates changes in cultural production and consumption. The first part of this works looks at how these changes respond to the field of cultural policy, as well as suggesting a possible culturepolitical reaction in a model which I refer to as access culture. In terms of theoretical approach, the...... prosumers, I analyse the well-known examples of YouTube, MySpace, Facebook and Flickr, along with lesser known platforms such as the animated short film Elephants Dream, the BBC's Creative Archive, various Internet artworks and the Internet Archive. I furthermore introduce the copyright system Creative...

  16. Access Request Trustworthiness in Weighted Access Control Framework

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  17. Public Access and Open Access: Is There a Difference? | Poster

    By Robin Meckley, Contributing Writer, and Tracie Frederick, Guest Writer Open access and public access—are they different concepts or are they the same? What do they mean for the researchers at NCI at Frederick? “Open-access (OA) literature is digital, online, free of charge, and free of most copyright and licensing restrictions. What makes it possible is the Internet and the consent of the author or copyright-holder,” according to an open access website maintained by Peter Suber, director, Harvard Open Access Project. 

  18. Vehicle barrier with access delay

    Swahlan, David J; Wilke, Jason

    2013-09-03

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  19. ACCESSIBLE TOURISM - THE IGNORED OPPORTUNITY

    Souca Maria Luiza

    2010-12-01

    Full Text Available To create a positive visitor experience, a key factor in obtaining economic benefits, the tourism industry must pay attention to all the elements that contribute to it, especially to accessibility. Visitor accessibility encompasses all tourism markets including seniors and people with disabilities, who have been defined through accessible tourism. This article offers a short presentation of the term accessible tourism, the existing research in the field and the main reasons why the worldwide tourism industry is seemly unaware of this particular market.

  20. ACCESSIBILITY AND CRYSTALLINITY OF CELLULOSE

    Michael Ioelovich

    2009-08-01

    Full Text Available The accessibility of cellulose samples having various degrees of crystallinity was studied with respect to molecules of water, lower primary alcohols, and lower organic acids. It was found that small water molecules have full access to non-crystalline domains of cellulose (accessibility coefficient α = 1. Molecules of the lowest polar organic liquids (methanol, ethanol, and formic acid have partial access into the non-crystalline domains (α<1, and with increasing diameter of the organic molecules their accessibility to cellulose structure decreases. Accessibility of cellulose samples to molecules of various substances is a linear function of the coefficient α and the content of non-crystalline domains. The relationship between crystallinity (X and accessibility (A of cellulose to molecules of some liquids has been established as A = α (1-X. The water molecules were found to have greater access to cellulose samples than the molecules of the investigated organic liquids. The obtained results permit use of accessibility data to estimate the crystallinity of cellulose, to examine the structural state of non-crystalline domains, and to predict the reactivity of cellulose samples toward some reagents.

  1. Atomic memory access hardware implementations

    Ahn, Jung Ho; Erez, Mattan; Dally, William J

    2015-02-17

    Atomic memory access requests are handled using a variety of systems and methods. According to one example method, a data-processing circuit having an address-request generator that issues requests to a common memory implements a method of processing the requests using a memory-access intervention circuit coupled between the generator and the common memory. The method identifies a current atomic-memory access request from a plurality of memory access requests. A data set is stored that corresponds to the current atomic-memory access request in a data storage circuit within the intervention circuit. It is determined whether the current atomic-memory access request corresponds to at least one previously-stored atomic-memory access request. In response to determining correspondence, the current request is implemented by retrieving data from the common memory. The data is modified in response to the current request and at least one other access request in the memory-access intervention circuit.

  2. Making Astronomy Accessible

    Grice, Noreen A.

    2011-05-01

    A new semester begins, and your students enter the classroom for the first time. You notice a student sitting in a wheelchair or walking with assistance from a cane. Maybe you see a student with a guide dog or carrying a Braille computer. Another student gestures "hello” but then continues hand motions, and you realize the person is actually signing. You wonder why another student is using an electronic device to speak. Think this can't happen in your class? According to the U.S. Census, one out of every five Americans has a disability. And some disabilities, such as autism, dyslexia and arthritis, are considered "invisible” disabilities. This means you have a high probability that one of your students will have a disability. As an astronomy instructor, you have the opportunity to reach a wide variety of learners by using creative teaching strategies. I will share some suggestions on how to make astronomy and your part of the universe more accessible for everyone.

  3. Remote direct memory access

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  4. Ferroelectric random access memories.

    Ishiwara, Hiroshi

    2012-10-01

    Ferroelectric random access memory (FeRAM) is a nonvolatile memory, in which data are stored using hysteretic P-E (polarization vs. electric field) characteristics in a ferroelectric film. In this review, history and characteristics of FeRAMs are first introduced. It is described that there are two types of FeRAMs, capacitor-type and FET-type, and that only the capacitor-type FeRAM is now commercially available. In chapter 2, properties of ferroelectric films are discussed from a viewpoint of FeRAM application, in which particular attention is paid to those of Pb(Zr,Ti)O3, SrBi2Ta2O9, and BiFeO3. Then, cell structures and operation principle of the capacitor-type FeRAMs are discussed in chapter 3. It is described that the stacked technology of ferroelectric capacitors and development of new materials with large remanent polarization are important for fabricating high-density memories. Finally, in chapter 4, the optimized gate structure in ferroelectric-gate field-effect transistors is discussed and experimental results showing excellent data retention characteristics are presented. PMID:23421123

  5. Resistance random access memory

    Ting-Chang Chang

    2016-06-01

    Full Text Available Non-volatile memory (NVM will play a decisive role in the development of the next-generation of electronic products. Therefore, the development of next-generation NVM is urgent as widely applied flash memory is facing its physical limit. Among various next-generation NVMs, Resistive Random Access Memory (RRAM is a promising candidate for future memory due to its high-efficiency, high-speed and energy-saving characteristics. In recent years, continuous improvement and in-depth investigation in both materials and electrical switching mechanisms have not only lead to a breakthrough in the performance of digital NVM, but also lead to other possible memory functionality. This paper describes new findings and perspectives on various RRAM devices with different laminated structures and materials, and classifies RRAM into four categories according to different resistive switching mechanisms, from which the four elements are (1 anion-type RRAM: redox reaction and migration of oxygen ions, (2 cation-type RRAM: redox reaction and migration of cation ions, (3 carbon-based RRAM: the stretch of CC bond lengths due to oxygen and hydrogen dual ions, (4 oxide-based electrode: oxygen accumulation in oxide-based electrode.

  6. Radio access selection in multi-radio access systems

    Jorgušeski, L.; Litjens, R.; Zhiyi, C.; Nikookar, H.

    2007-01-01

    Future wireless access systems will be characterized by their heterogeneity from technological point of view. It is envisaged that in certain areas end-users will have a choice between various radio accesses (RAs) such as e.g. classical cellular networks (GSM, UMTS, WiMAX, etc), WLAN hot-spots, or o

  7. Open access and medicinal chemistry

    Swain Chris

    2007-01-01

    Abstract Chemistry Central is a new open access website for chemists publishing peer-reviewed research in chemistry from a range of open access journals. A new addition, Chemistry Central Journal, will cover all of chemistry and will be broken down into discipline-specific sections, and Im delighted that Medicinal Chemistry will be a key discipline in this new journal.

  8. Editorial: Next Generation Access Networks

    Ruffini, Marco; Cincotti, Gabriella; Pizzinat, Anna; Vetter, Peter

    2015-12-01

    Over the past decade we have seen an increasing number of operators deploying Fibre-to-the-home (FTTH) solutions in access networks, in order to provide home users with a much needed network access upgrade, to support higher peak rates, higher sustained rates and a better and more uniform broadband coverage of the territory.

  9. Achieving universal access to broadband

    Falch, Morten; Henten, Anders

    2009-01-01

    The paper discusses appropriate policy measures for achieving universal access to broadband services in Europe. Access can be delivered by means of many different technology solutions described in the paper. This means a greater degree of competition and affects the kind of policy measures to be...

  10. Accessible Information and Quantum operations

    Cai, Qing-yu

    2003-01-01

    The accessible information decreases under quantum operations. We analyzed the connection between quantum operations and accessible information. We show that a general quantum process cannot be operated accurately. Futhermore, an unknown state of a closed quantum system can not be operated arbitrarily by a unitary quantum operation.

  11. Justice: greater access, lower costs

    M. Saraceno

    2014-01-01

    Litigation imposes large costs on society; this justifies settlement considerations. In any case, access to justice is critical to socioeconomic development; as such, it needs to be balanced with litigation minimization. This study examines the tradeoff between litigation and access to justice and e

  12. Open Access: A Publisher's Perspective

    Wilkinson, Daniel

    2014-01-01

    This presentation was delivered in the seminar New systems for scientific evaluation, peer-review and open access organised by DIGITAL.CSIC on October 22, 2014 within the framework of the International Open Access Week 2014. More details at http://proyectos.bibliotecas.csic.es/digitalcsic/workshop_oa_2014/index_eng.html.

  13. IV access in dental practice.

    Fitzpatrick, J J

    2009-04-01

    Intravenous (IV) access is a valuable skill for dental practitioners in emergency situations and in IV sedation. However, many people feel some apprehension about performing this procedure. This article explains the basic principles behind IV access, and the relevant anatomy and physiology, as well as giving a step-by-step guide to placing an IV cannula.

  14. Open Access Resources and Services

    Waller, Andrew

    2008-01-01

    This presentation covers some of the basic elements of Open Access as well as some Open Access-related resources and services that are available to library users at the University of Calgary. Presented at a Libraries and Cultural Resources (LCR) training session, University of Calgary, Information Commons classroom B, October 20, 2008.

  15. Get the right access rights!

    Rosaria Marraffino

    2015-01-01

    On 11 May, a major change concerning the requirements to access the CERN beam facilities was put in place and implemented in ADaMS in order to reduce the number of courses that people who need access to multiple installations have to follow. This revision includes dedicated safety training courses that replace, in particular, the “Safety during LS1” e-learning course, which is now to be considered obsolete.   CERN’s Access Distribution and Management System (ADaMS). As of 11 May, an important improvement was implemented in ADaMS (CERN’s Access Distribution and Management System) regarding the requisites to access safety zones. This change is closely related to the introduction of a generic e-learning course ("CERN Beam Facilities") covering the common risks and systems present in CERN's beam facilities. Two e-learning courses are no longer valid, nor available on the SIR (Safety Information Registration) catalogue: the &ld...

  16. Open Access von A bis Z

    Stieg, Kerstin; Pavlovic, Karlo

    2012-01-01

    The glossary „Open Access from A to Z“ comprises essential key terms on Open Access such as arXiv, The Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities, the Budapest Open Access Initiative (BOAI), Creative Commons (CC), the Directory of Open Access Books (DOAB), the Directory of Open Access Journals (DOAJ), the Directory of Open Access Repositories (OpenDOAR), the EU project Digital Repository Infrastructure Vision for European Research (DRIVER), the Finch Report,...

  17. Random Access Game and Medium Access Control Design

    Chen, Lijun; Low, Steven H.; Doyle, John C.

    2010-01-01

    Motivated partially by a control-theoretic viewpoint, we propose a game-theoretic model, called random access game, for contention control. We characterize Nash equilibria of random access games, study their dynamics, and propose distributed algorithms (strategy evolutions) to achieve Nash equilibria. This provides a general analytical framework that is capable of modeling a large class of system-wide quality-of-service (QoS) models via the specification of per-node util...

  18. The Accessibility Quotient: A New Measure of Open Access

    Mathew A. Willmott

    2012-05-01

    Full Text Available INTRODUCTION The Accessibility Quotient (AQ, a new measure for assisting authors and librarians in assessing and characterizing the degree of accessibility for a group of papers, is proposed and described. The AQ offers a concise measure that assesses the accessibility of peer-reviewed research produced by an individual or group, by incorporating data on open availability to readers worldwide, the degree of financial barrier to access, and journal quality. The paper reports on the context for developing this measure, how the AQ is calculated, how it can be used in faculty outreach, and why it is a useful lens to use in assessing progress towards more open access to research. METHODS Journal articles published in 2009 and 2010 by faculty members from one department in each of MIT’s five schools were examined. The AQ was calculated using economist Ted Bergstrom’s Relative Price Index to assess affordability and quality, and data from SHERPA/RoMEO to assess the right to share the peer-reviewed version of an article. RESULTS The results show that 2009 and 2010 publications by the Media Lab and Physics have the potential to be more open than those of Sloan (Management, Mechanical Engineering, and Linguistics & Philosophy. DISCUSSION Appropriate interpretation and applications of the AQ are discussed and some limitations of the measure are examined, with suggestions for future studies which may improve the accuracy and relevance of the AQ. CONCLUSION The AQ offers a concise assessment of accessibility for authors, departments, disciplines, or universities who wish to characterize or understand the degree of access to their research output, capturing additional dimensions of accessibility that matter to faculty.

  19. Social inequalities in urban access: from mobility to accessibility policies

    Fol, Sylvie; GALLEZ, Caroline

    2014-01-01

    Since the 1990s, the link between the lack of access to opportunities (work, health, shopping, leisure, etc.) and social exclusion processes has been the subject of growing interest in research and policy. In the United Kingdom, for example, the creation of the Social Exclusion Unit in 1997 was a starting point for the development of many studies analysing the spatial dimension of social exclusion. Lack of access to facilities and services has been cited among the components of social isolati...

  20. The Accessibility of Open Access Materials in Libraries

    Jottkandt, Sigi

    2010-01-01

    Librarians often champion open access (OA) as a sustainable alternative to the current scholarly communications system, which is widely accepted as being in a state of crisis. However, there has been little insight into how far libraries are making this support tangible by providing access to OA publications in their OPACs and other library pathways. This study conducted a large-scale survey of US library holdings to determine the extent that records of journals from the Directory of Open Acc...

  1. Access control system for ISABELLE

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  2. Increasing Access to Special Collections

    Ricky Erway

    2012-01-01

    Full Text Available In an environment where we increasingly have access to a collective collection of digitized books, special collections will become increasingly invisible if they are not accessible online. In an era of increasing expectations and decreasing budgets, finding ways to streamline some of our processes is the best way to enable us to do more with less. This report details a number of investigations into how access to special collections can be increased. It includes guidance running the gamut from digitization and rights management to policies and procedures.

  3. SM18 Visits and Access

    2012-01-01

      VISITS The rules and conditions to be followed for visits in the SM18 Hall are laid out in the EDMS 1205328 document. No visit is allowed without prior reservation.   ACCESS Special access right is needed ONLY from 7 p.m. to 7 a.m. and during week-ends. From 1 December, the current SM18 access database will be closed and a new one “SM18-OWH outside normal hours” started from scratch. Requests, via EDH SM18-OWH, will have to be duly justified.   For further information, please contact Evelyne Delucinge.

  4. Assuring Access to Affordable Coverage

    U.S. Department of Health & Human Services — Under the Affordable Care Act, millions of uninsured Americans will gain access to affordable coverage through Affordable Insurance Exchanges and improvements in...

  5. Computer access security code system

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  6. MCBS Access to Care PUF

    U.S. Department of Health & Human Services — The MCBS 2013 Access to Care public use file (MCBS PUF) provides the first publically available MCBS file for researchers interested in the health, health care use,...

  7. Limited-Access Heart Surgery

    ... Heart tumor removal Atrial septal defect (ASD) repair Patent foramen ovale repair Catheter ablation for atrial fibrillation As with other kinds of limited-access surgery, robotic-assisted surgery can mean shorter hospital stays and ...

  8. Water Access Sites in Minnesota

    Minnesota Department of Natural Resources — This data shows the approximate locations of boat accesses in the state. This is not a comprehensive list but one that was generated through a cooperative effort....

  9. Open access e-books

    Dekker, Jennifer

    2009-01-01

    Open access e-books offer collection development opportunities for libraries with limited budgets. Describes four e-book collections and their features including content, functionality, and technical requirements.

  10. Charter Halibut Limited Access Program

    National Oceanic and Atmospheric Administration, Department of Commerce — This limited access system limits the number of charter vessels that may participate in the guided sport fishery for halibut in area 2C and 3A. NMFS issues a...

  11. Open Access for Librarians in Developing Countries

    Morrison, Heather

    2006-01-01

    The basics of open access are presented, as a starting point for discussion by librarians in developing countries. Open access is defined; resources for searching are presented, and resources for creating open access archives and publications. Policy development needed for open access is explained, along with what librarians in developing countries can do to promote open access.

  12. 29 CFR 32.27 - Accessibility.

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Accessibility. 32.27 Section 32.27 Labor Office of the... FINANCIAL ASSISTANCE Accessibility § 32.27 Accessibility. (a) Purpose. A recipient shall operate each... available at an alternative accessible site or sites. Accessibility requires nonpersonal aids to make...

  13. Access With(out) Anonymity

    Schepman, Tessie; Koren, Marian; Horvat, Aleksandra; Kurtovic, Dejana; Grgić, Ivana Hebrang

    2008-01-01

    Access to information is one aspect; collecting and retaining data of people accessing information is another aspect of library services in modern times. Users can benefit from new technologies applied in library services, such as user profiles, based on loan history; tailor made services through advanced marketing based on customer segmentation etc. Searching history on library internet computers, films with pictures of persons on security cameras are other data which may reveal a perso...

  14. China's Post Accession WTO Stance

    Glenda Mallon; John Whalley

    2004-01-01

    We discuss China's stance in the WTO post-accession, noting the many issues with implementation of China's accession terms by 2007. We evaluate how much benefit China can realistically receive from WTO membership given current problems with dumping actions against China and trade restrictions against textile and apparel exports. We discuss emerging WTO and non-WTO trade disputes involving China, and China's now extensive regional trade initiatives which raise issues of multilateral regional b...

  15. Textual information access statistical models

    Gaussier, Eric

    2013-01-01

    This book presents statistical models that have recently been developed within several research communities to access information contained in text collections. The problems considered are linked to applications aiming at facilitating information access:- information extraction and retrieval;- text classification and clustering;- opinion mining;- comprehension aids (automatic summarization, machine translation, visualization).In order to give the reader as complete a description as possible, the focus is placed on the probability models used in the applications

  16. Lobbying: Buying and utilizing access

    Mayer, Wolfgang; Mujumdar, Sudesh

    2012-01-01

    This paper develops a lobbying-by-firms model that draws on a more realistic characterization of the lobbying process; influence-seeking requires both money to 'buy access' and managerial time to 'utilize access'. This, more realistically grounded, modeling approach furnishes theoretical support for why one encounters different numbers of lobbying firms of varying sizes in different industries, without casting the (unrealistic) lifeline of the 'money-buys-policies' assumption or (unrealistica...

  17. Personalizing Access to Learning Networks

    Dolog, Peter; Simon, Bernd; Nejdl, Wolfgang; Klobucar, Tomaz

    2008-01-01

    In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address in this framework, enabling personalized access to federated learning repositories with a vast number of learning offers. Our infrastructure includes personalization strategies both at the query and the query re...

  18. Open Access Publishing with Drupal

    Nina McHale

    2011-01-01

    In January 2009, the Colorado Association of Libraries (CAL) suspended publication of its print quarterly journal, Colorado Libraries, as a cost-saving measure in a time of fiscal uncertainty. Printing and mailing the journal to its 1300 members cost CAL more than $26,000 per year. Publication of the journal was placed on an indefinite hiatus until the editorial staff proposed an online, open access format a year later. The benefits to migrating to open access included: significantly low...

  19. Editorial ~ Open Access in Action!

    Terry Anderson, Canada Research Chair in Distance Education

    2006-01-01

    Mid 2006 finds the academic research community engaged in an ideological and fiscal war related to Open Access publishing. Open Access requires that the full text of publications be made available at no cost to anyone on the open Internet. Recent position and discussion papers in Canada, the United States, the United Kingdom, and other countries, have called for dialogue amongst academics and strongly hinted that research supported by public funds should be made available freely to the genera...

  20. Social Capital Access and Entrepreneurship

    Stefan Bauernschuster; Oliver Falck; Stephan Heblich

    2010-01-01

    We investigate the effect of social capital access on entrepreneurship. Social capital helps entrepreneurs to overcome resource constraints. This is especially important in small communities where we often see a lack of market-oriented institutions such as venture capital firms. Entrepreneurs gain access to social capital via club memberships. Combining differences in the number of individual club memberships with differences in the importance of social capital across communities, we identify...

  1. Endogenous average cost based access pricing

    Fjell, Kenneth; Foros, Øystein; Pal, Debashis

    2006-01-01

    We consider an industry where a downstream competitor requires access to an upstream facility controlled by a vertically integrated and regulated incumbent. The literature on access pricing assumes the access price to be exogenously fixed ex-ante. We analyze an endogenous average cost based access pricing rule, where both firms realize the interdependence among their quantities and the regulated access price. Endogenous access pricing neutralizes the artificial cost advantag...

  2. Open Access to Knowledge: Initiatives in India

    Bandi, Anand; Bandi, Shekappa

    2011-01-01

    Study traces major Open Access Initiatives in a digital environment. Major National Open Access initiatives briefly enumerated to give an overview of the movement. Study strives to illustrate initiatives on open access to information and knowledge. Some of the common open access channels found are digital libraries, open access journals, institutional repositories, national-level repositories, open courseware, metadata harvesting services, etc. Most of the open access initiatives are supporte...

  3. Evidence Based Librarianship and Open Access

    Heather Morrison

    2006-01-01

    Evidence based practice, whether in librarianship or any other profession, depends on access to the evidence, and access to opportunities to share one’s own evidence. Open access (OA) is the perfect complement to evidence based librarianship. OA provides the optimum access to the evidence for librarians everwhere, and the optimum means of dissemination. This article compares examines access to the LIS literature in the print and electronic media, and the impact of open access.

  4. Accessibility of adolescent health services

    S Richter

    2000-09-01

    Full Text Available Adolescents represent a large proportion of the population. As they mature and become sexually active, they face more serious health risks. Most face these risks with too little factual information, too little guidance about sexual responsibility and multiple barriers to accessing health care. A typical descriptive and explanatory design was used to determine what the characteristics of an accessible adolescent health service should be. Important results and conclusions that were reached indicate that the adolescent want a medical doctor and a registered nurse to be part of the health team treating them and they want to be served in the language of their choice. Family planning, treatment of sexually transmitted diseases and psychiatric services for the prevention of suicide are services that should be included in an adolescent accessible health service. The provision of health education concerning sexual transmitted diseases and AIDS is a necessity. The service should be available thought out the week (included Saturdays and within easy reach. It is recommended that minor changes in existing services be made, that will contribute towards making a health delivery service an adolescent accessible service. An adolescent accessible health service can in turn make a real contribution to the community’s efforts to improve the health of its adolescents and can prove to be a rewarding professional experience to the health worker.

  5. Three essays on access pricing

    Sydee, Ahmed Nasim

    In the first essay, a theoretical model is developed to determine the time path of optimal access price in the telecommunications industry. Determining the optimal access price is an important issue in the economics of telecommunications. Setting a high access price discourages potential entrants; a low access price, on the other hand, amounts to confiscation of private property because the infrastructure already built by the incumbent is sunk. Furthermore, a low access price does not give the incumbent incentives to maintain the current network and to invest in new infrastructures. Much of the existing literature on access pricing suffers either from the limitations of a static framework or from the assumption that all costs are avoidable. The telecommunications industry is subject to high stranded costs and, therefore, to address this issue a dynamic model is imperative. This essay presents a dynamic model of one-way access pricing in which the compensation involved in deregulatory taking is formalized and then analyzed. The short run adjustment after deregulatory taking has occurred is carried out and discussed. The long run equilibrium is also analyzed. A time path for the Ramsey price is shown as the correct dynamic price of access. In the second essay, a theoretical model is developed to determine the time path of optimal access price for an infrastructure that is characterized by congestion and lumpy investment. Much of the theoretical literature on access pricing of infrastructure prescribes that the access price be set at the marginal cost of the infrastructure. In proposing this rule of access pricing, the conventional analysis assumes that infrastructure investments are infinitely divisible so that it makes sense to talk about the marginal cost of investment. Often it is the case that investments in infrastructure are lumpy and can only be made in large chunks, and this renders the marginal cost concept meaningless. In this essay, we formalize a model of

  6. Open Access. Chapter 6 of Scholarly Communication for Librarians.

    Morrison, Heather

    2008-01-01

    In-depth overview of open access, covering definitions (open access publishing, open access archives, gratis and libre, open access works versus open access processes), major statements and declarations, types of open access, major initiatives, trends, advocacy and lobbying.

  7. Evaluating Web Accessibility Metrics for Jordanian Universities

    Israa Wahbi Kamal

    2016-07-01

    Full Text Available University web portals are considered one of the main access gateways for universities. Typically, they have a large candidate audience among the current students, employees, and faculty members aside from previous and future students, employees, and faculty members. Web accessibility is the concept of providing web content universal access to different machines and people with different ages, skills, education levels, and abilities. Several web accessibility metrics have been proposed in previous years to measure web accessibility. We integrated and extracted common web accessibility metrics from the different accessibility tools used in this study. This study evaluates web accessibility metrics for 36 Jordanian universities and educational institute websites. We analyze the level of web accessibility using a number of available evaluation tools against the standard guidelines for web accessibility. Receiver operating characteristic quality measurements is used to evaluate the effectiveness of the integrated accessibility metrics.

  8. Advanced Placement: Access Not Exclusion

    Wayne J. Camara

    2000-08-01

    Full Text Available Lichten (2000 argues that increased access to AP courses in high schools has led to a decline in AP quality. He uses a mix of actual data, inaccurate data, and fabricated data to support this hypothesis. A logical consequence of his argument is that a reduction in the availability of AP courses will lead to an improvement in AP quality. In this paper, we maintain that his thesis is flawed because he confounds quality with scarcity. In contrast to his narrow conception of quality, quality in the AP context is subject- specific and multifaceted, embracing course content, the teacher, the student as well as the exam. Increased access will not diminish quality. Instead, increased access exposes students to college-level course material, encourages teachers to expand their knowledge domains, serves as a lever for lifting curriculum rigor, and provides students with the opportunity to experience the challenges associated with advanced placement in college.

  9. Personalizing Access to Learning Networks

    Dolog, Peter; Simon, Bernd; Nejdl, Wolfgang;

    2008-01-01

    In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address in this fra......In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address...... in this framework, enabling personalized access to federated learning repositories with a vast number of learning offers. Our infrastructure includes personalization strategies both at the query and the query results level. Query rewriting is based on learning and language preferences; rule-based and ranking...

  10. Mechanisms that improve referential access.

    Gernsbacher, M A

    1989-07-01

    Two mechanisms, suppression and enhancement, are proposed to improve referential access. Enhancement improves the accessibility of previously mentioned concepts by increasing or boosting their activation; suppression improves concepts' accessibility by decreasing or dampening the activation of other concepts. Presumably, these mechanisms are triggered by the informational content of anaphors. Six experiments investigated this proposal by manipulating whether an anaphoric reference was made with a very explicit, repeated name anaphor or a less explicit pronoun. Subjects read sentences that introduced two participants in their first clauses, for example, "Ann predicted that Pam would lose the track race," and the sentences referred to one of the two participants in their second clauses, "but Pam/she came in first very easily." While subjects read each sentence, the activation level of the two participants was measured by a probe verification task. The first two experiments demonstrated that explicit, repeated name anaphors immediately trigger the enhancement of their own antecedents and immediately trigger the suppression of other (nonantecedent) participants. The third experiment demonstrated that less explicit, pronoun anaphors also trigger the suppression of other nonantecedents, but they do so less quickly--even when, as in the fourth experiment, the semantic information to identify their antecedents occurs prior to the pronouns (e.g., "Ann predicted that Pam would lose the track race. But after winning the race, she..."). The fifth experiment demonstrated that more explicit pronouns--pronouns that match the gender of only one participant-trigger suppression more powerfully. A final experiment demonstrated that it is not only rementioned participants who improve their referential access by triggering the suppression of other participants; newly introduced participants do so too (e.g., "Ann predicted that Pam would lose the track race, but Kim..."). Thus, both

  11. Datamining on publicly accessible data

    Pangrác, Jiří

    2016-01-01

    This bachelor thesis deals with the datamining methods on publicly accessible data. Data mining is a technique of mining potentially interesting relations from data. Analysis is carried out on data provided by Česká obchodní inspekce, the czech office for trade inspection, which are accessible to public. I am trying to find possible answers for some analytical questions asked. For the analysis itself, LISp-Miner system was used focusing on 4ft-Miner and CF-Miner procedures. Besides the actual...

  12. Code division multiple access (CDMA)

    Buehrer, R Michael

    2006-01-01

    This book covers the basic aspects of Code Division Multiple Access or CDMA. It begins with an introduction to the basic ideas behind fixed and random access systems in order to demonstrate the difference between CDMA and the more widely understood TDMA, FDMA or CSMA. Secondly, a review of basic spread spectrum techniques are presented which are used in CDMA systems including direct sequence, frequency-hopping and time-hopping approaches. The basic concept of CDMA is presented, followed by the four basic principles of CDMA systems that impact their performance: interference averaging, universa

  13. SCOAP3 and Open Access

    Mele, Salvatore; D'Agostino, Dan; Dyas-Correia, Sharon

    2009-01-01

    SCOAP3 is an innovative Open Access initiative for publishing in high-energy physics. The model is viewed by many as a potential solution to multiple issues related to the financial crisis, the peer review system, scholarly communication, and the need to support institutional repositories. This installment of “The Balance Point” presents articles written by three Open Access advocates, outlining the SCOAP3 proposal, benefits of participation, and some of the roles libraries, publishers and scientists can play in making important changes to scholarly communication. Contributors discuss scalability and transferability issues of SCOAP3, as well as other matters of concern.

  14. Achieving Universal Access to Broadband

    Morten FALCH

    2009-01-01

    Full Text Available The paper discusses appropriate policy measures for achieving universal access to broadband services in Europe. Access can be delivered by means of many different technology solutions described in the paper. This means a greater degree of competition and affects the kind of policy measures to be applied. The paper concludes that other policy measure than the classical universal service obligation are in play, and discusses various policy measures taking the Lisbon process as a point of departure. Available policy measures listed in the paper include, universal service obligation, harmonization, demand stimulation, public support for extending the infrastructure, public private partnerships (PPP, and others.

  15. Open Access and ORCID poster presentation

    Elbæk, Mikael Karstensen; Ekstrøm, Jeannette

    2014-01-01

    Open Access Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all p...

  16. 24 CFR 8.32 - Accessibility standards.

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Accessibility standards. 8.32... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT Program Accessibility § 8.32 Accessibility standards. (a... 3-8 of the Uniform Federal Accessibility Standards (UFAS) shall be deemed to comply with...

  17. Proximity Displays for Access Control

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  18. Open Access Publishing with Drupal

    Nina McHale

    2011-10-01

    Full Text Available In January 2009, the Colorado Association of Libraries (CAL suspended publication of its print quarterly journal, Colorado Libraries, as a cost-saving measure in a time of fiscal uncertainty. Printing and mailing the journal to its 1300 members cost CAL more than $26,000 per year. Publication of the journal was placed on an indefinite hiatus until the editorial staff proposed an online, open access format a year later. The benefits to migrating to open access included: significantly lower costs; a green platform; instant availability of content; a greater level of access to users with disabilities; and a higher level of visibility of the journal and the association. The editorial staff chose Drupal, including the E-journal module, and while Drupal is notorious for its steep learning curve—which exacerbated delays to content that had been created before the publishing hiatus—the fourth electronic issue was published recently at coloradolibrariesjournal.org. This article will discuss both the benefits and challenges of transitioning to an open access model and the choice Drupal as a platform over other more established journal software options.

  19. Towards Trusted Network Access Control

    Bente, Ingo; von Helden, Josef

    Network Access Control (NAC) solutions promise to significantly increase the security level of modern networks. In short, they allow to measure the integrity state of an endpoint that tries to get access to the network. Based upon the measurement results, which are compared to a defined NAC policy, access to the network can be allowed or denied. One problem of all currently available NAC solutions is referred to as the “lying endpoint” problem. Normally, special software components are responsible for gathering the relevant integrity information on the endpoint. If an attacker modifies those software components, an endpoint can lie about its current integrity state. Therefore, endpoints which are not compliant to the defined NAC policy can get access to the network. Those endpoints must be considered as potential threat. This paper summarizes a possible solution for the lying endpoint problem based upon the specifications of the Trusted Computing Group (TCG) and the results of the two research projects TNC@ FHH and Turaya. The goal is to develop an open source, TNC compatible NAC solution with full TPM support within a new research project: tNAC.

  20. Wild Accessions and Mutant Resources

    Kawaguchi, Masayoshi; Sandal, Niels Nørgaard

    2014-01-01

    Lotus japonicus, Lotus burttii, and Lotus filicaulis are species of Lotus genus that are utilized for molecular genetic analysis such as the construction of a linkage map and QTL analysis. Among them, a number of mutants have been isolated from two wild accessions: L. japonicus Gifu B-129 and Miy...

  1. The Inevitability of Open Access

    Lewis, David W.

    2012-01-01

    Open access (OA) is an alternative business model for the publication of scholarly journals. It makes articles freely available to readers on the Internet and covers the costs associated with publication through means other than subscriptions. This article argues that Gold OA, where all of the articles of a journal are available at the time of…

  2. Multilingual Access for Information Systems.

    Peters, Carol; Sheridan, Paraic

    With the rapid growth of the global information society, the concept of library has evolved to embrace all kinds of information collections, on all kinds of storage media, and using many different access methods. The users of today's information networks and digital libraries, no longer restricted by geographic or spatial boundaries, want to be…

  3. Market Access through Bound Tariffs

    Sala, Davide; Schröder, Philipp J.H.; Yalcin, Erdal

    WTO negotiations deal predominantly with bound - besides applied - tariff rates. But, how can reductions in tariffs ceilings, i.e. tariff rates that no exporter may ever actually be confronted with, generate market access? The answer to this question relates to the effects of tariff bindings on t...

  4. Market access through bound tariffs

    Sala, Davide; Schröder, Philipp J.H.; Yalcin, Erdal

    2010-01-01

    WTO negotiations deal predominantly with bound - besides applied - tariff rates. But, how can reductions in tariffs ceilings, i.e. tariff rates that no exporter may ever actually be confronted with, generate market access? The answer to this question relates to the effects of tariff bindings on t...

  5. Automated Computer Access Request System

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  6. Controlling Access to Suicide Means

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  7. Selective access and editing in a database

    Maluf, David A. (Inventor); Gawdiak, Yuri O. (Inventor)

    2010-01-01

    Method and system for providing selective access to different portions of a database by different subgroups of database users. Where N users are involved, up to 2.sup.N-1 distinguishable access subgroups in a group space can be formed, where no two access subgroups have the same members. Two or more members of a given access subgroup can edit, substantially simultaneously, a document accessible to each member.

  8. Integration von Open Access Repositorien in Fachportale

    Schaer, Philipp

    2008-01-01

    Open Access Repositorien sind Online Archive für frei im Internet zugängliche Publikationen im Volltext. Open Access Materialien oder die Open Access Repositorien selbst sind allerdings nur unzureichend in zentrale Fachportale (z.B. virtuelle Fachbibliotheken) eingebunden. Der Beitrag stellt SSOAR – Social Science Open Access Repository, einen disziplinären Open Access Volltextserver für die Sozialwissenschaften vor und zeigt wie dieser in das sozialwissenschaftliche Fachportal Sowiport...

  9. Open Access Publishing: What Authors Want

    Nariani, R.; Fernandez, L.

    2012-01-01

    Campus-based open access author funds are being considered by many academic libraries as a way to support authors publishing in open access journals. Article processing fees for open access have been introduced recently by publishers and have not yet been widely accepted by authors. Few studies have surveyed authors on their reasons for publishing open access and their perceptions of open access journals. The present study was designed to gauge the uptake of library support for author funding...

  10. Demystifying open access journals : pure gold

    Morrison, Heather; Charron, Jason

    2007-01-01

    Panel presentation of two different perspectives on open access publishing in Canada. Open access advocate Heather Morrison presents a brief overview of open access publishing (pure gold, i.e. no delayed back access) and library involvement, with a focus on the Canadian scene. Includes audience quizzes. The pragmatic perspective of Canadian scholarly journal publisher National Research Council Press on open access is presented by Jason Charron. This Canadian Library Association Pre...

  11. The Stratified Economics of Open Access

    John Willinsky

    2009-01-01

    There is a growing recognition within the academic community that ‘open access’ to research and scholarship can increase its value and reach. A variety of open access models have developed over the last twenty years, including author self-archiving, immediate (sponsored) open access, delayed open access, and article-processing-fee open access. Yet the economics of open access is being largely determined, at this point, by the interests of a stratified scholarly publishing market that can be r...

  12. Access to Scientific Publications: The Scientist's Perspective

    Yegor Voronin; Askar Myrzahmetov; Alan Bernstein

    2011-01-01

    BACKGROUND: Scientific publishing is undergoing significant changes due to the growth of online publications, increases in the number of open access journals, and policies of funders and universities requiring authors to ensure that their publications become publicly accessible. Most studies of the impact of these changes have focused on the growth of articles available through open access or the number of open-access journals. Here, we investigated access to publications at a number of insti...

  13. Access to what? Access, diversity and participation in India's schools

    Juneja, Nalini

    2010-01-01

    India has witnessed substantial diversification of provision to basic education. Policy changes from 1980s onwards, has seen the creation of para-formal delivery systems and the inclusion in the system of non state providers. The Education Guarantee Scheme and the Alternate Initiatives in Education programmes have generated new pathways to access. The paper examines the different educational providers and looks at the spread of provision, the enrolment shares, the different structure, costs a...

  14. Right of access to energy

    Energy is essential for the development of our life and for the development of production capacity. However, a number of people worldwide without this living, specifically power. To the extent that increase energy needs for domestic, industrial and agricultural use, each day more indispensable need access to this recognition as a human right or fundamental respect is made, so some questions in this paper are required both denominations, being essential to consider the emergence and evolution of these. An analysis of the international protection they receive the right of access to energy services, although currently there are no international treaties that specifically recognize it also performs a number of initiatives that promote its preservation manifested and recognized in several abstractly legal instruments, such as declarations, covenants and conventions. (full text)

  15. Accessing and disclosing protected resources

    Olesen, Henning; Khajuria, Samant

    2014-01-01

    TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers and...... enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user’s personal data have become an economic asset, not necessarily to the owners of these data, but to the service providers, whose...... business mod- els often includes the use of these data. In this paper we focus on the user – service provider interaction and discuss how recent technological progress, in particular the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources and...

  16. Accessing opportunistic resources with Bosco

    Bosco is a software project developed by the Open Science Grid to help scientists better utilize their on-campus computing resources. Instead of submitting jobs through a dedicated gatekeeper, as most remote submission mechanisms use, it uses the built-in SSH protocol to gain access to the cluster. By using a common access method, SSH, we are able to simplify the interaction with the cluster, making the submission process more user friendly. Additionally, it does not add any extra software to be installed on the cluster making Bosco an attractive option for the cluster administrator. In this paper, we will describe Bosco, the personal supercomputing assistant, and how Bosco is used by researchers across the U.S. to manage their computing workflows. In addition, we will also talk about how researchers are using it, including an unique use of Bosco to submit CMS reconstruction jobs to an opportunistic XSEDE resource.

  17. Remote access to mathematical software

    The network-oriented application services paradigm is becoming increasingly common for scientific computing. The popularity of this approach can be attributed to the numerous advantages to both user and developer provided by network-enabled mathematical software. The burden of installing and maintaining complex systems is lifted from the user, while enabling developers to provide frequent updates without disrupting service. Access to software with similar functionality can be unified under the same interface. Remote servers can utilize potentially more powerful computing resources than may be available locally. We discuss some of the application services developed by the Mathematics and Computer Science Division at Argonne National Laboratory, including the Network Enabled Optimization System (NEOS) Server and the Automatic Differentiation of C (ADIC) Server, as well as preliminary work on Web access to the Portable Extensible Toolkit for Scientific Computing (PETSc). We also provide a brief survey of related work

  18. Accessing the VO with Python

    Plante, R.; Fitzpatrick, M.; Graham, M.; Tody, D.; Young, W.

    2014-05-01

    We introduce two products for accessing the VO from Python: PyVO and VOClient. PyVO is built on the widely-used Astropy package and is well suited for integrating automated access to astronomical data into highly customizable scripts and applications for data analysis in Python. VOClient is built on a collection of C-libraries and is well suited for integrating with multi-language analysis packages. It also provides a framework for integrating legacy software into the Python environment. In this demo, we will run through several examples demonstrate basic data discovery and retrieval of data. This includes finding archives containing data of interest (VO registry), retrieving datasets (SIA, SSA), and exploring (Cone Search, SLAP). VOClient features some extended capabilities including the ability to communicate to other desktop applications from a script using the SAMP protocol.

  19. The nuclear industry and accession

    The European Union has played an important role in international efforts to help the Central and Eastern European nuclear sector to improve the level of safety of their power plants. This is in line with the 1992 G7 summit which called for the early closure of the older, less safe Soviet design reactors, namely the VVER-440/230 and RBMK-type reactors. The enlargement process initiated in 1997 added a new dimension which was reinforced in Agenda 2000 which put into a political perspective the issue of nuclear safety in the countries applying for accession in the EU. At the end of 1999, the decision was taken between the European Commission and the three countries operating those reactors which were deemed non-upgradable, to close those reactors. This paper looks at the key issues surrounding accession and the nuclear industry, what progress has been made to date and what assistance is needed in the future. (author)

  20. Towards Accessible Semantic Web Applications

    Moreno, Lourdes; Martínez, Paloma; Contreras, Jesús; Benjamins, Richard

    2005-01-01

    The importance for Web applications to reach all kind of potential users and customers is being stressed by companies and public sectors. The standardization initiative for Web applications, WAI and the Universal Design framework establish useful rules for building accessible applications for any kind of disabled and non-disabled users. The proliferation of Semantic Web technologies and formal ontologies offer a technological opportunity for establishing automatic and advanced methods for ...

  1. Enhancing Ocean Research Data Access

    Chandler, Cynthia; Groman, Robert; Shepherd, Adam; Allison, Molly; Arko, Robert; Chen, Yu; Fox, Peter; Glover, David; Hitzler, Pascal; Leadbetter, Adam; Narock, Thomas; West, Patrick; Wiebe, Peter

    2014-05-01

    The Biological and Chemical Oceanography Data Management Office (BCO-DMO) works in partnership with ocean science investigators to publish data from research projects funded by the Biological and Chemical Oceanography Sections and the Office of Polar Programs Antarctic Organisms & Ecosystems Program at the U.S. National Science Foundation. Since 2006, researchers have been contributing data to the BCO-DMO data system, and it has developed into a rich repository of data from ocean, coastal and Great Lakes research programs. While the ultimate goal of the BCO-DMO is to ensure preservation of NSF funded project data and to provide open access to those data, achievement of those goals is attained through a series of related phases that benefits from active collaboration and cooperation with a large community of research scientists as well as curators of data and information at complementary data repositories. The BCO-DMO is just one of many intermediate data management centers created to facilitate long-term preservation of data and improve access to ocean research data. Through partnerships with other data management professionals and active involvement in local and global initiatives, BCO-DMO staff members are working to enhance access to ocean research data available from the online BCO-DMO data system. Continuing efforts in use of controlled vocabulary terms, development of ontology design patterns and publication of content as Linked Open Data are contributing to improved discovery and availability of BCO-DMO curated data and increased interoperability of related content available from distributed repositories. We will demonstrate how Semantic Web technologies (e.g. RDF/XML, SKOS, OWL and SPARQL) have been integrated into BCO-DMO data access and delivery systems to better serve the ocean research community and to contribute to an expanding global knowledge network.

  2. Open access intrapartum CTG database

    Chudáček, Václav; Spilka, Jiří; Burša, Miroslav; Janků, Petr; Hruban, Lukáš; Huptych, Michal; Lhotská, Lenka

    2014-01-01

    Background Cardiotocography (CTG) is a monitoring of fetal heart rate and uterine contractions. Since 1960 it is routinely used by obstetricians to assess fetal well-being. Many attempts to introduce methods of automatic signal processing and evaluation have appeared during the last 20 years, however still no significant progress similar to that in the domain of adult heart rate variability, where open access databases are available (e.g. MIT-BIH), is visible. Based on a thorough review of th...

  3. Open Access and Bakhtinian Dialogism

    R.W. Vaagan

    2006-01-01

    The article explores Open Access in the context of recent contributions in communication and public relations theory, notably Bakhtinian dialogism. Increasingly since the 1960s communication and public relations theory have shifted their focus away from one-way, asymmetrical to two-way, symmetrical models, thereby progressing to more equitable and interactive, multi-level conceptual models of dialogic and polyphonic communication. It is in this context that Bakhtinian dialogism becomes highly...

  4. Open Access e Pubblica Amministrazione

    Galimberti, Paola

    2007-01-01

    The speech tries to analyze how the tools offered by OA, open archives in particolar, can fulfil to the needs of accessibility and publicity of documents of the public administration, with reference to those surveys and those studies (grey literature) that now cannot find a chance for dissemination and remain invisible. Instead documents in open archives are electronics from their origin, especially with associated metadata that assure harvesting, searchability and interoperability.

  5. Fast Access Data Acquisition System

    Dr. Vladimir Katsman

    1998-03-17

    Our goal in this program is to develop Fast Access Data Acquisition System (FADAS) by combining the flexibility of Multilink's GaAs and InP electronics and electro-optics with an extremely high data rate for the efficient handling and transfer of collider experimental data. This novel solution is based on Multilink's and Los Alamos National Laboratory's (LANL) unique components and technologies for extremely fast data transfer, storage, and processing.

  6. Database access from the Web

    Dean, Andrew S.

    1997-01-01

    Determining the best method for granting World Wide Web (Web) users access to remote relational databases is difficult. Choosing the best supporting Web/database link method for implementation requires an in-depth understanding of the methods available and the relationship between the link designer's goals and the underlying issues of Performance and Functionality, Cost, Development Time and Ease, Serviceability, Flexibility and Openness, Security, State and Session. This thesis examined exis...

  7. Worldwide open access: UK leadership?

    Harnad, Stevan

    2013-01-01

    The web is destined to become humankind's cognitive commons, where digital knowledge is jointly created and freely shared. The UK has been a leader in the global movement toward open access (OA) to research but recently its leadership has been derailed by the joint influence of the publishing industry lobby from without and well-intentioned but premature and unhelpful over-reaching from within the OA movement itself. The result has been the extremely counterproductive ‘Finch Report’ followed ...

  8. Minerals, markets and open access

    Mitchell, Clive

    2014-01-01

    Minerals, Markets and Open Access Clive Mitchell, Industrial Minerals Specialist, British Geological Survey, Nottingham, UK Email: The British Geological Survey (BGS) is a world-leading geological survey that focuses on public-good science for government and research to understand earth and environmental processes. The BGS is the UK provider of spatial and statistical minerals information, in addition it carries out research in areas such as metallogenesis, land-use im...

  9. Statistics of Open Access Journals

    Toni, Franco

    2006-01-01

    The exponential growth of e-journal access and downloads has strongly enhanced the role of statistical data, in order to evaluate the use of resources and define subscription acquisition strategies and their management. On one hand, the automatic data harvesting performed by computers provides statistics, but on the other hand it does not guarantee the comparability and harmonisation of collected data. Therefore, the process of statistical data formulation has to be supported by the use...

  10. Audio Interfaces for Improved Accessibility

    Duarte, Carlos; Carrico, Lu&#;s

    2008-01-01

    This chapter focused on how endowing interfaces with audio interaction capabilities can improve their accessibility. To exemplify this outcome the development of several versions of a Digital Talking Book player was presented. This allowed us to show it is possible to maintain the same set of features while stripping the interface of visual components, and still keep it usable for the visually impaired population. The interface development concerns focused on both ends of the interaction spec...

  11. Accessibility in the Smart City

    Giuseppe Trieste

    2014-07-01

    Full Text Available FIABA is a cultural route for all, its aim is to promote a Global Accessibility and a Universal Usability through the removal of architectural, cultural, psychological and sensory barriers. FIABA is carrying out a real change and a cultural renewal in the name of equal opportunities. Respect for the environment in which we live is also a duty towards the younger generations to whom we must deliver a world in which free movement and the normal use of spaces are goals already achieved. There are millions of citizens who, because of their physical conditions are prisoners in their homes because there isn’t any elevator or any elevator maintenance. FIABA project aims at implementing “a Space for all” or “a landscape for all” following the path of the ONU Convention on the Rights of People with disabilities with an emphasis on architectural, cultural, and psychological barriers, the last ones in particular, create barriers to equal opportunities and they are often carriers of discrimination. The principle of accessibility is invoked in Article 9 of the Convention which confirms the principle that people have a right to live independently and participate fully in all spheres of life and thus States are required to take all necessary measures to ensure accessibility to physical environment, transport, information and communications, including systems and technologies of information and communication and other facilities and services open to the public, both in urban and rural areas.

  12. Telerehabilitation Technologies: Accessibility and Usability

    Michael Pramuka

    2009-09-01

    Full Text Available In the fields of telehealth and telemedicine, phone and/or video technologies are key to the successful provision of services such as remote monitoring and visits. How do these technologies affect service accessibility, effectiveness, quality, and usefulness when applied to rehabilitation services in the field of telerehabilitation? To answer this question, we provide a overview of the complex network of available technologies and discuss how they link to rehabilitation applications, services, and practices as well as to the telerehabilitation end-user. This white paper will first present the numerous professional considerations that shape the use of technology in telerehabilitation service and set it somewhat apart from telemedicine. It will then provide an overview of concepts essential to usability analysis; present a summary of various telerehabilitation technologies and their strengths and limitations, and consider how the technologies interface with end users’ clinical needs for service accessibility, effectiveness, quality, and usefulness. The paper will highlight a conceptual framework (including task analyses and usability issues that underlies a functional match between telerehabilitation technologies, clinical applications, and end-user capabilities for telerehabilitation purposes. Finally, we will discuss pragmatic issues related to user integration of telerehabilitation technology versus traditional face-to-face approaches. Key Words: Remote, Technology, Usability, Accessibility, Decision Factors, Decision Support

  13. Access to IEEE Electronic Library

    2007-01-01

    From 2007, the CERN Library now offers readers online access to the complete IEEE Electronic Library (Institute of Electrical and Electronics Engineers). This new licence gives unlimited online access to all IEEE and IET (previously IEE) journals and proceedings as well as all current IEEE standards and selected archived ones. Some of the titles offer volumes back to 1913. This service currently represents more than 1,400,000 full-text articles! This leading engineering information resource replaces the previous service, a sub-product of the IEEE database called 'IEEE Enterprise', which offered online access to the complete collection of IEEE journals and proceedings, but with limited features. The service had become so popular that the CERN Working Group for Acquisitions recommended that the Library subscribe to the complete IEEE Electronic Library for 2007. Usage statistics for recent months showed there was a demand for the service from a large community of CERN users and we were aware that many users h...

  14. Support the Open Access Movement

    2005-01-01

    CERN's Executive Board recently endorsed a new policy of open access to the laboratory's results: Continuing CERN action on Open Access (OA) [http://cds.cern.ch/record/828991/files/open-2005-006.pdf]. What does this policy mean for you? CERN authors have two responsibilities: Submit your document to the CERN Document Server; Consider submitting future articles to an Open Access journal. Since 2001, Operational Circular No. 6 has required every CERN author (Staff member, Fellow, or any Associated member of personnel who is allowed to use CERN as his affiliation) to submit a copy of their scientific documents to the CERN Document Server (CDS). For some groups all approved documents are submitted by the secretary (see the Departments' policies at: http://library.cern.ch/cern_publications/cern_publication_policy.html). Each author should personally also ensure the submission of any other articles which are not added in this way, such as conference contributions and review articles. It is not sufficient to re...

  15. A new access scheme in OFDMA systems

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  16. An Access Definition and Query Language : Towards a Unified Access Control Model

    Sonnenbichler, Andreas

    2013-01-01

    In this work we suggest a meta access control model emulating established access control models by configuration and offering enhanced features like the delegation of rights, ego-centered roles, and decentralized administration. The suggested meta access control model is named \\'\\'Access Definition and Query Language\\'\\' (ADQL). ADQL is represented by a formal, context-free grammar allowing to express the targeted access control model, policies, facts, and access queries as a formal language.

  17. Grant-free Rateless Multiple Access: A Novel Massive Access Scheme for Internet of Things

    Zhang, Zhaoyang; Wang, Xianbin; Zhang, Yu; Chen, Yan

    2016-01-01

    Rateless Multiple Access (RMA) is a novel non-orthogonal multiple access framework that is promising for massive access in Internet of Things (IoT) due to its high efficiency and low complexity. In the framework, after certain \\emph{registration}, each active user respectively transmits to the access point (AP) randomly based on an assigned random access control function (RACf) until receiving an acknowledgement (ACK). In this work, by exploiting the intrinsic access pattern of each user, we ...

  18. Wireless Broadband Access and Accounting Schemes

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  19. Self-Access Centers: Maximizing Learners’ Access to Center Resources

    Mark W. Tanner

    2010-09-01

    Full Text Available Originally published in TESL-EJ March 2009, Volume 12, Number 4 (http://tesl-ej.org/ej48/a2.html. Reprinted with permission from the authors.Although some students have discovered how to use self-access centers effectively, the majority appear to be unaware of available resources. A website and database of materials were created to help students locate materials and use the Self-Access Study Center (SASC at Brigham Young University’s English Language Center (ELC more effectively. Students took two surveys regarding their use of the SASC. The first survey was given before the website and database were made available. A second survey was administered 12 weeks after students had been introduced to the resource. An analysis of the data shows that students tend to use SASC resources more autonomously as a result of having a web-based database. The survey results suggest that SAC managers can encourage more autonomous use of center materials by provided a website and database to help students find appropriate materials to use to learn English.

  20. Open Access : Bibliotheken unterwegs ins gelobte Land?

    Hartmann, Helmut

    2007-01-01

    This paper is a critical examination of open access publishing for scholarly journal literature. At conferences and congresses, open access publishing is considered as a panacea against budgeting problems in academic libraries. There is a plenty of more or less free initiatives outside the traditional publishing industry that compete with open-access-like services from traditional publishers. The shortcomings of the independent publishers and the traditional publishers offering open access ar...

  1. The ethics of open access publishing.

    Parker, M.

    2013-01-01

    Should those who work on ethics welcome or resist moves to open access publishing? This paper analyses arguments in favour and against the increasing requirement for open access publishing and considers their implications for bioethics research. In the context of biomedical science, major funders are increasingly mandating open access as a condition of funding and such moves are also common in other disciplines. Whilst there has been some debate about the implications of open-access for the s...

  2. Environment Implications of China's WTO Accession

    Li Shantong; He Jianwu

    2006-01-01

    China's WTO accession will have important environmental implications. This article aims at providing environmental analysis of the impact of China's accession to the WTO, based on its final offer for WTO accession and a 53-sector, recursive dynamic computable general equilibrium (CGE) model of China. We try to provide some empirical evidences for policy makers to evaluate the effects of China's WTO accession from environmental prospective.

  3. Open Access og Den Bibliometriske Forskningsindikator

    Dorch, Bertil

    2011-01-01

    I sine "Anbefalinger til implementering af Open Access i Danmark" foreslår det nationale Open Access Udvalget blandet andet, at Den Bibliometriske Forskningsindikator (BFI) bør koordineres med en national Open Access-politik. I dette paper, der er baseret på et blogindlæg, fremfører forfatteren...... fire grunde til, hvorfor han synes det er en dårlig idé at koble Open Access til BFI....

  4. Open Access Funds: A Canadian Library Survey

    Leila Fernandez; Rajiv Nariani

    2011-01-01

    A survey of Canadian research libraries was conducted to determine the extent of funding support for open access publications in these institutions. Results indicate that there is substantial support for open access publishing, and a diversity of approaches is being used to fund open access resources. The reasons for funding support along with policy and promotional issues are explored. The broader implications of funding open access are discussed in the context of a changing scholarly publis...

  5. Open Access Publishing - Models and Attributes

    Dallmeier-Tiessen, S.; Goerner, B.; Darby, R.; Hyppoelae, J.; Igo-Kemenes, P.; Kahn, D; S. Lambert; Lengenfelder, A.; Leonard, C.; S. Mele; Polydoratou, P.; Ross, D; Ruiz-Perez, S.; Schimmer, R.; Swaisland, M.

    2010-01-01

    The SOAP (Study of Open Access Publishing) project has compiled data on the present offer for open access publishing in online peer-reviewed journals. Starting from the Directory of Open Access Journals, several sources of data are considered, including inspection of journal web site and direct inquiries within the publishing industry. Several results are derived and discussed, together with their correlations: the number of open access journals and articles; their subject area; the starti...

  6. Access to Local Agriculture and Weight Outcomes

    Berning, Joshua P.

    2012-01-01

    Recent studies examine the impact of the built environment on health outcomes such as obesity. Several studies find for certain populations that access to unhealthy food has a positive effect on obesity, whereas access to healthy choices has a negative effect. Given the growth and popularity of locally grown food, we examine how individual weight outcomes are affected by access to direct-to-consumer local food. After controlling for potential endogeneity, we find that greater access to local ...

  7. Enhancing a Self-Access Website

    Troy Rubesch

    2010-01-01

    Since July of 2009, the Self-Access Learning Center (SALC) at Kanda University has maintained a student-oriented Let’s Study English website (accessible at http://elisalc.org). The website acts as an extension of the physical space of the SALC, supporting the Center’s commitment to student access to information and materials which suit individual students’ learning needs, abilities and preferences. It also widens the learning environment- enabling students to access SALC information and resou...

  8. Effective access to health care in Mexico

    Gutiérrez, Juan Pablo; García-Saisó, Sebastián; Dolci, Germán Fajardo; Ávila, Mauricio Hernández

    2014-01-01

    Background Effective access measures are intended to reflect progress toward universal health coverage. This study proposes an operative approach to measuring effective access: in addition to the lack of financial protection, the willingness to make out-of-pocket payments for health care signifies a lack of effective access to pre-paid services. Methods Using data from a nationally representative health survey in Mexico, effective access at the individual level was determined by combining fin...

  9. A Linux Implementation of Temporal Access Controls

    Chiang, Ken; Nguyen, Thuy D.; Irvine, Cynthia E.

    2007-01-01

    Control of access to information based upon temporal attributes can add another dimension to access control. To demonstrate the feasibility of operating system level support for temporal access controls, the Time Interval File Protection System (TIFPS), a prototype of the Time Interval Access Control (TIAC) model, has been implemented by modifying Linux extended attributes to include temporal metadata associated both with files and users. The Linux Security Module was used to provide hooks fo...

  10. Interact - Access to the Arctic

    Johansson, M.; Callaghan, T. V.

    2013-12-01

    INTERACT is currently a network of 50 terrestrial research stations from all Arctic countries, but is still growing. The network was inaugurated in January 2011 when it received an EU 7th Framework award. INTERACT's main objective is to build capacity for identifying, understanding, predicting and responding to diverse environmental changes throughout the wide environmental and land-use envelopes of the Arctic. Implicit in this objective is the task to build capacity for monitoring, research, education and outreach. INTERACT is increasing access to the Arctic: 20 INTERACT research stations in Europe and Russia are offering Transnational Access and so far, 5600 person-days of access have been granted from the total of 10,000 offered. An INTERACT Station Managers' Forum facilitates a dialogue among station managers on subjects such as best practice in station management and standardised monitoring. The Station Managers' Forum has produced a unique 'one-stop-shop' for information from 45 research stations in an informative and attractive Station Catalogue that is available in hard copy and on the INTERACT web site (www.eu-interact.org). INTERACT also includes three joint research activities that are improving monitoring in remote, harsh environments and are making data capture and dissemination more efficient. Already, new equipment for measuring feedbacks from the land surface to the climate system has been installed at several locations, while best practices for sensor networking have been established. INTERACT networks with most of the high-level Arctic organisations: it includes AMAP and WWF as partners, is endorsed by IASC and CBMP, has signed MoUs with ISAC and the University of the Arctic, is a task within SAON, and contributes to the Cold Region community within GEO/GEOSS. INTERACT welcomes other interactions.

  11. Enterprise wide transparent information access

    The information management needs of the Department of Energy (DOE) represents a fertile domain for the development of highly sophisticated yet intuitive enterprise-wide computing solutions. These solutions must support business operations, research agendas, technology development efforts, decision support, and other application areas with a user base ranging from technical staff to the highest levels of management. One area of primary interest is in the Environmental Restoration and Waste Management Branch of DOE. In this arena, the issue of tracking and managing nuclear waste related to the long legacy of prior defense production and research programs is one of high visibility and great concern. The Tank Waste Information Network System (TWINS) application has been created by the Pacific Northwest Laboratory (PNL) for the DOE to assist in managing and accessing the information related to this mission. The TWINS solution addresses many of the technical issues faced by other efforts to provide integrated information access to a wide variety of stakeholders. TWINS provides secure transparent access to distributed heterogeneous multimedia information sources from around the DOE complex. The users interact with the information through a consistent user interface that presents the desired data in a common format regardless of the structure of the source information. The solutions developed by the TWINS project represent an integration of several technologies and products that can be applied to other mission areas within DOE and other government agencies. These solutions are now being applied to public and private sector problem domains as well. The successful integration and inter-operation of both commercial and custom modules into a flexible and extensible information architecture will help ensure that new problems facing DOE and other clients can be addressed more rapidly in the future by re-use of existing tools and techniques proven viable through the TWINS efforts

  12. An optically accessible pyrolysis microreactor

    Baraban, J. H.; Ellison, G. Barney [Department of Chemistry and Biochemistry, University of Colorado, Boulder, Colorado 80309 (United States); David, D. E. [Integrated Instrument Development Facility, CIRES, University of Colorado, Boulder, Colorado 80309-0216 (United States); Daily, J. W. [Department of Mechanical Engineering, University of Colorado at Boulder, Boulder, Colorado 80309 (United States)

    2016-01-15

    We report an optically accessible pyrolysis micro-reactor suitable for in situ laser spectroscopic measurements. A radiative heating design allows for completely unobstructed views of the micro-reactor along two axes. The maximum temperature demonstrated here is only 1300 K (as opposed to 1700 K for the usual SiC micro-reactor) because of the melting point of fused silica, but alternative transparent materials will allow for higher temperatures. Laser induced fluorescence measurements on nitric oxide are presented as a proof of principle for spectroscopic characterization of pyrolysis conditions.

  13. An optically accessible pyrolysis microreactor

    Baraban, J. H.; David, D. E.; Ellison, G. Barney; Daily, J. W.

    2016-01-01

    We report an optically accessible pyrolysis micro-reactor suitable for in situ laser spectroscopic measurements. A radiative heating design allows for completely unobstructed views of the micro-reactor along two axes. The maximum temperature demonstrated here is only 1300 K (as opposed to 1700 K for the usual SiC micro-reactor) because of the melting point of fused silica, but alternative transparent materials will allow for higher temperatures. Laser induced fluorescence measurements on nitric oxide are presented as a proof of principle for spectroscopic characterization of pyrolysis conditions.

  14. Head Access Piping System Desing

    中大路 道彦; 一宮 正和; 向坊 隆一; 前田 清彦; 永田 敬

    1994-01-01

    PNC made design studies on loop type FBR plants:a 600 MWe class in '91, and a 1300 MWe class in '93 both with the "head access" primary piping system. This paper focuses on the features of the smaller plant at first and afterwards on the extension to the larger one. The contents of the paper consist of R/V wall protection mechanism, primary piping circuit, secondary piping circuit, plant layout and then, discusses the extension of the applicability of the wall protection mechanism, primary pi...

  15. WTO Accession: Lessons from Experience

    Evenett, Simon J.

    2005-01-01

    Trade Note - Introduction Since its creation in 1995, twenty new Members have acceded to the World Trade Organization (WTO). On 13 October 2004, Cambodia became the WTO's 148th member, almost 10 years after it had first applied and just over a year after its membership package was approved at the Cancún Ministerial Conference. Cambodia is the second least-developed country (LDC) to join the WTO, following Nepal's accession on 23 April 2004. Countries applying for WTO membership face a complex...

  16. Easing access for lifelong learners

    Müller, Romina; Remdisch, Sabine; Köhler, Katharina;

    2015-01-01

    Easing access to higher education (HE) for those engaging in lifelong learning has been a common policy objective across the European Union since the late 1990s. To reach this goal, the transition between vocational and academic routes must be simplified, but European countries are at different...... learning. The cases are at widely different stages, but the following factors were considered essential in all countries for opening universities: the establishment of transition paths from secondary education and working life into HE and links between HE, businesses and adult education from a national...

  17. Teach yourself visually Access 2013

    McFedries, Paul

    2013-01-01

    The easy, visual way to learn this popular database program Part of the Office 2013 productivity suite, Access enables you to organize, present, analyze, and share data on a network or over the web. With this Visual guide to show you how, you'll master the fundamentals of this robust database application in no time. Clear, step-by-step instructions are illustrated with full-color screen shots that show exactly what you should see on your screen. Learn to enter new records; create, edit, and design tables and forms; develop queries that generate specific reports; add smart tags to y

  18. Tietokantasovelluksen toteutus Access 2007 -ohjelmalla

    Ojakorpi, Pia

    2011-01-01

    Tietokantasovellus on ohjelma, jonka avulla tietokannan tietoja tallennetaan ja hallitaan. Tietokantasovelluksen kehitystyön lähtökohtana ovat loppukäyttäjän toiveet ja tarpeet. Kehitystyötä edeltää tietokannan huolellinen suunnittelu, jonka tavoitteena on hyvä ja kestävä tietokantarakenne. Hyvin suunnitellulla tietokannalla edesautetaan sovelluksen kehittämistä ja rakentamista loppukäyttäjää varten. Microsoft Office Access 2007 on tietokannan hallintajärjestelmä, joka mahdollistaa tietok...

  19. HRP Data Accessibility Current Status

    Sams, Clarence

    2009-01-01

    Overview of talk: a) Content of Human Life Science data; b) Data archive structure; c) Applicable legal documents and policies; and d) Methods for data access. Life Science Data Archive (LSDA) contains research data from NASA-funded experiments, primarily data from flight experiments and ground analog data collected at NASA facilities. Longitudinal Study of Astronaut Health (LSAH) contains electronic health records (medical data) of all astronauts, including mission data. Data are collected for clinical purposes. Clinical data are analyzed by LSAH epidemiologists to identify trends in crew health and implement changes in pre-, in-, or post-flight medical care.

  20. An optically accessible pyrolysis microreactor

    We report an optically accessible pyrolysis micro-reactor suitable for in situ laser spectroscopic measurements. A radiative heating design allows for completely unobstructed views of the micro-reactor along two axes. The maximum temperature demonstrated here is only 1300 K (as opposed to 1700 K for the usual SiC micro-reactor) because of the melting point of fused silica, but alternative transparent materials will allow for higher temperatures. Laser induced fluorescence measurements on nitric oxide are presented as a proof of principle for spectroscopic characterization of pyrolysis conditions

  1. Accessing and using chemical databases

    Nikolov, Nikolai Georgiev; Pavlov, Todor; Niemelä, Jay Russell;

    2013-01-01

    Computer-based representation of chemicals makes it possible to organize data in chemical databases-collections of chemical structures and associated properties. Databases are widely used wherever efficient processing of chemical information is needed, including search, storage, retrieval, and...... dissemination. Structure and functionality of chemical databases are considered. The typical kinds of information found in a chemical database are considered-identification, structural, and associated data. Functionality of chemical databases is presented, with examples of search and access types. More details...... are included about the OASIS database and platform and the Danish (Q)SAR Database online. Various types of chemical database resources are discussed, together with a list of examples....

  2. Lexical semantic access and letter access are involved in different aspects of reading

    Poulsen, Mads

    ). In this subset sample, both letter access and lexical access accounted for unique variance in reading fluency. The pattern of effects for lexical access did not change by controlling for serial rapid naming (RAN). Conclusions: The results suggest that letter access and lexical access are important for different......Purpose: This study investigated the effects of lexical access speed and letter access speed on reading fluency and reading comprehension. We hypothesized that 1) letter access speed would correlate with reading fluency but not comprehension, while 2) lexical access speed would influence reading...... comprehension. For readers who are struggling with recoding, most of the reading effort is probably tied up with recoding, leaving little to be explained by lexical access. Therefore we expected that 3) lexical access speed would primarily predict reading fluency for readers who were no longer struggling...

  3. Revocable Anonymous Access to the Internet?

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  4. Five Steps to an Accessible Classroom Website

    Amundson, Linda

    2009-01-01

    When teachers or technology coordinators publish a website, they are providing a product for a diverse group of people. That's why website design should follow accessibility guidelines. Websites should be accessible to those with visual, hearing, movement, cognitive, and speech disabilities. Good design means greater accessibility for all. This…

  5. World Summit embraces Open Access, libraries

    Kaser, D

    2004-01-01

    "The long-anticipated "first phase" meeting of the World Summit on the Information Society (WSIS), held in Geneva in December, was supposed to have been about equal access. It turned out being equally about open access as leading scientific organizations pushed their open-access initiative onto the World Summit agenda" (1 page)

  6. 5 CFR 2606.203 - Granting access.

    2010-01-01

    ... include a statement of the procedures to obtain a review of the decision to deny access in accordance with... operational control of the record may require the data subject making the request to submit a signed statement... Access to Records and Accounting of Disclosures § 2606.203 Granting access. (a) The methods for...

  7. Mobility support for ubiquitous Internet access

    Karagiannis, Georgios; Heijenk, Geert

    2000-01-01

    This document describes an architecture that is providing Internet access to mobile hosts, by allowing them to access this architecture through various access points and using various wireless technologies. In particular, this deliverable focuses on QoS and mobility between various IP subnetworks that are using different wireless technologies, e.g., UMTS (Universal Mobile Telecommunication Services) and Bluetooth.

  8. Advanced Call Center Supporting WAP Access

    2001-01-01

    Traditional call centers can be accessed via speech only, and the call center based on web provides both data and speech access, but it needs a powerful terminal-computer. By analyzing traditional call centers and call centers based on web, this paper presents the framework of an advanced call center supporting WAP access. A typical service is also described in detail.

  9. Mobile and Accessible Learning for MOOCs

    Sharples, Mike; Kloos, Carlos Delgado; Dimitriadis, Yannis; Garlatti, Serge; Specht, Marcus

    2015-01-01

    Many modern web-based systems provide a "responsive" design that allows material and services to be accessed on mobile and desktop devices, with the aim of providing "ubiquitous access." Besides offering access to learning materials such as podcasts and videos across multiple locations, mobile, wearable and ubiquitous…

  10. Strategies to improve smallholders' market access

    Tilburg, van A.; Schalkwyk, van H.D.

    2011-01-01

    Smallholders, especially in less developed countries, have encountered several challenges in gaining access to markets. Market access includes the ability to obtain necessary farm inputs and farm services, and the ability to deliver farm products to buyers. Market access was less of a problem in the

  11. Open Access Publishing: What Authors Want

    Nariani, Rajiv; Fernandez, Leila

    2012-01-01

    Campus-based open access author funds are being considered by many academic libraries as a way to support authors publishing in open access journals. Article processing fees for open access have been introduced recently by publishers and have not yet been widely accepted by authors. Few studies have surveyed authors on their reasons for publishing…

  12. Open Access Resources, Services, and More

    Waller, Andrew

    2009-01-01

    This presentation briefly discusses the basics and benefits of Open Access as well as some Open Access-related resources and services that are available to library users at the University of Calgary. It also covers the upcoming Open Access Week activities. Presented at a Libraries and Cultural Resources (LCR) training session, University of Calgary, Information Commons classroom B, October 15, 2009.

  13. 49 CFR 192.185 - Vaults: Accessibility.

    2010-10-01

    ... 49 Transportation 3 2010-10-01 2010-10-01 false Vaults: Accessibility. 192.185 Section 192.185 Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY...: Accessibility. Each vault must be located in an accessible location and, so far as practical, away from:...

  14. 9 CFR 354.231 - Accessibility.

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Accessibility. 354.231 Section 354.231 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE AGENCY... Accessibility. All equipment shall be so placed as to be readily accessible for all processing and...

  15. 14 CFR 25.611 - Accessibility provisions.

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Accessibility provisions. 25.611 Section 25... AIRWORTHINESS STANDARDS: TRANSPORT CATEGORY AIRPLANES Design and Construction General § 25.611 Accessibility... required by § 25.1529. (b) EWIS must meet the accessibility requirements of § 25.1719....

  16. Improving Web Accessibility in a University Setting

    Olive, Geoffrey C.

    2010-01-01

    Improving Web accessibility for disabled users visiting a university's Web site is explored following the World Wide Web Consortium (W3C) guidelines and Section 508 of the Rehabilitation Act rules for Web page designers to ensure accessibility. The literature supports the view that accessibility is sorely lacking, not only in the USA, but also…

  17. 24 CFR 3280.713 - Accessibility.

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Accessibility. 3280.713 Section 3280.713 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... § 3280.713 Accessibility. Every appliance shall be accessible for inspection, service, repair,...

  18. 78 FR 39649 - Passenger Vessels Accessibility Guidelines

    2013-07-02

    ... TRANSPORTATION BARRIERS COMPLIANCE BOARD 36 CFR Part 1196 RIN 3014-AA11 Passenger Vessels Accessibility... Tuesday, June 25, 2013, make the following correction: PART 1196--PASSENGER VESSELS ACCESSIBILITY... ``Figure V703.7.2.1 International Symbol of Accessibility'' and are added to read as set forth...

  19. 40 CFR 7.65 - Accessibility.

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Accessibility. 7.65 Section 7.65... of Handicap § 7.65 Accessibility. (a) General. A recipient shall operate each program or activity... ensuring compliance in existing facilities. A recipient may comply with the accessibility requirements...

  20. 40 CFR 75.43 - Accessibility criteria.

    2010-07-01

    ... 40 Protection of Environment 16 2010-07-01 2010-07-01 false Accessibility criteria. 75.43 Section...) CONTINUOUS EMISSION MONITORING Alternative Monitoring Systems § 75.43 Accessibility criteria. To demonstrate accessibility equal to or better than the continuous emission monitoring system, the owner or operator...

  1. 41 CFR 101-8.309 - Accessibility.

    2010-07-01

    ... 41 Public Contracts and Property Management 2 2010-07-01 2010-07-01 true Accessibility. 101-8.309... FINANCIAL ASSISTANCE 8.3-Discrimination Prohibited on the Basis of Handicap § 101-8.309 Accessibility. (a... discrimination under any program or activity that receives Federal assistance from GSA. (b) Accessibility....

  2. 18 CFR 1307.6 - Accessibility.

    2010-04-01

    ... conformance with Sections 3-8 of the Uniform Federal Accessibility Standards (UFAS) (41 CFR Subpart 101-19.6... 18 Conservation of Power and Water Resources 2 2010-04-01 2010-04-01 false Accessibility. 1307.6... RESPECT TO HANDICAP § 1307.6 Accessibility. (a) General. No qualified handicapped person shall,...

  3. 36 CFR 228.12 - Access.

    2010-07-01

    ... Minerals § 228.12 Access. An operator is entitled to access in connection with operations, but no road... other means of access, including but not limited to off-road vehicles, be used until the operator has... forest surface resources, including measures to protect scenic values and to insure against erosion...

  4. Microfibrillated cellulose: morphology and accessibility

    Herrick, F.W.; Casebier, R.L.; Hamilton, J.K.; Sandberg, K.R.

    1983-01-01

    Microfibrillated cellulose (MFC) is prepared by subjecting dilute slurries of cellulose fibers to repeated high-pressure homogenizing action. A highly microfibrillated product will have a gel-like appearance at 2% concentration in water. Such gels have pseudoplastic viscosity properties and are very fluid when stirred at high shear rate. The relative viscosity of 2% MFC dispersions may be used as a measure of the degree of homogenization or microfibrillation of a given wood cellulose pulp. The water retention value of an MFC product can also be used as an indicator for degree of homogenization. Structurally, MFC appears to be a web of interconnected fibrils and microfibrils, the latter having diameters in the range 10-100 nm as observed in scanning and transmission electron micrographs. Chemical studies have revealed that MFC is only moderately degraded, while being greatly expanded in surface area. The accessibility of cellulose in MFC is only moderately degraded, while being greatly expanded in surface area. The accessibility of cellulose in MFC toward chemical reagents is greatly increased. Higher reactivity was demonstrated in dilute cupriethylenediamine solubility, triphenylmethylation, acetylation, periodate oxidation, and mineral acid and cellulase enzyme hydrolysis rates. 16 references, 8 figures, 7 tables.

  5. Nosocomial infections in dialysis access.

    Schweiger, Alexander; Trevino, Sergio; Marschall, Jonas

    2015-01-01

    Nosocomial infections in patients requiring renal replacement therapy have a high impact on morbidity and mortality. The most dangerous complication is bloodstream infection (BSI) associated with the vascular access, with a low BSI risk in arteriovenous fistulas or grafts and a comparatively high risk in central venous catheters. The single most important measure for preventing BSI is therefore the reduction of catheter use by means of early fistula formation. As this is not always feasible, prevention should focus on educational efforts, hand hygiene, surveillance of dialysis-associated events, and specific measures at and after the insertion of catheters. Core measures at the time of insertion include choosing the optimal site of insertion, the use of maximum sterile barrier precautions, adequate skin antisepsis, and the choice of catheter type; after insertion, access care needs to ensure hub disinfection and regular dressing changes. The application of antimicrobial locks is reserved for special situations. Evidence suggests that bundling a selection of the aforementioned measures can significantly reduce infection rates. The diagnosis of central line-associated BSI (CLABSI) is based on clinical signs and microbiological findings in blood cultures ideally drawn both peripherally and from the catheter. The prompt installation of empiric antibiotic treatment covering the most commonly encountered organisms is key regarding CLABSI treatment. Catheter removal is recommended in complicated cases or if cultures yield Staphylococcus aureus, enterococci, Pseudomonas or fungi. In other cases, guide wire exchange or catheter salvage strategies with antibiotic lock solutions may be acceptable alternatives. PMID:25676304

  6. Energy access and sustainable development

    Kammen, Daniel M.; Alstone, Peter; Gershenson, Dimitry

    2015-03-01

    With 1.4 billion people lacking electricity to light their homes and provide other basic services, or to conduct business, and all of humanity (and particularly the poor) are in need of a decarbonized energy system can close the energy access gap and protect the global climate system. With particular focus on addressing the energy needs of the underserved, we present an analytical framework informed by historical trends and contemporary technological, social, and institutional conditions that clarifies the heterogeneous continuum of centralized on-grid electricity, autonomous mini- or community grids, and distributed, individual energy services. We find that the current day is a unique moment of innovation in decentralized energy networks based on super-efficient end-use technology and low-cost photovoltaics, supported by rapidly spreading information technology, particularly mobile phones. Collectively these disruptive technology systems could rapidly increase energy access, contributing to meeting the Millennium Development Goals for quality of life, while simultaneously driving action towards low-carbon, Earth-sustaining, energy systems.

  7. Open Access Funds: A Canadian Library Survey

    Leila Fernandez

    2011-07-01

    Full Text Available A survey of Canadian research libraries was conducted to determine the extent of funding support for open access publications in these institutions. Results indicate that there is substantial support for open access publishing, and a diversity of approaches is being used to fund open access resources. The reasons for funding support along with policy and promotional issues are explored. The broader implications of funding open access are discussed in the context of a changing scholarly publishing landscape. This paper will be especially relevant to Canadian academic libraries that are exploring options for funding open access publications.

  8. 7 CFR 54.13 - Accessibility and refrigeration of products; access to establishments.

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Accessibility and refrigeration of products; access to establishments. 54.13 Section 54.13 Agriculture Regulations of the Department of Agriculture (Continued...) Regulations Service § 54.13 Accessibility and refrigeration of products; access to establishments. (a)...

  9. An Access Control Framework for Reflective Middleware

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  10. Housing Accessibility Methodology Targeting Older People

    Helle, Tina

    accessibility problems before the planning of housing intervention strategies. It is also critical that housing standards addressing accessibility intended to accommodate people with functional limitations are valid in the sense that their definitions truly support accessibility. However, there is a paucity of...... reasonably question the validity of the housing standards addressing accessibility. This thesis addresses housing accessibility methodology in general and the reliability of assessment and the validity of standards targeting older people with functional limitations and a dependence on mobility devices in...... particular. The overarching aim of the thesis was to develop and explore methods applicable for improving housing accessibility assessments and to explore feasible approaches to create housing standards that truly support accessibility and accommodate older people. A main methodological contribution of the...

  11. The index of rural access: an innovative integrated approach for measuring primary care access

    McGrail Matthew R; Humphreys John S

    2009-01-01

    Abstract Background The problem of access to health care is of growing concern for rural and remote populations. Many Australian rural health funding programs currently use simplistic rurality or remoteness classifications as proxy measures of access. This paper outlines the development of an alternative method for the measurement of access to primary care, based on combining the three key access elements of spatial accessibility (availability and proximity), population health needs and mobil...

  12. Accessing and disclosing protected resources

    Olesen, Henning; Khajuria, Samant

    2015-01-01

    Today, data is money. Whether it is private users' personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization measures to be deployed. Enabling...... advanced user controlled privacy is essential to realize the visions of 5G applications and services. For service providers and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user......'s personal data have become an economic asset, not necessarily to the owners of these data, but to the service providers, whose business models often include the use of these data. In this paper we focus on the user-service provider interaction and discuss how recent technological progress, in particular the...

  13. Digital autonomous terminal access communications

    Novacki, S.

    1987-01-01

    A significant problem for the Bus Monitor Unit is to identify the source of a given transmission. This problem arises from the fact that the label which identifies the source of the transmission as it is put into the bus is intercepted by the Digital Autonomous Terminal Access Communications (DATAC) terminal and removed from the transmission. Thus, a given subsystem will see only data associated with a label and never the identifying label itself. The Bus Monitor must identify the source of the transmission so as to be able to provide some type of error identification/location in the event that some problem with the data transmission occurs. Steps taken to alleviate this problem by modifications to the DATAC terminal are discussed.

  14. Access to efavirenz and amprenavir.

    Gilden, D

    1998-10-01

    DuPont's new nonnucleoside analog, efavirenz (Sustiva), is embroiled in a controversy related to the high costs of the drug. DuPont has offered a 5 percent discount off of the current ADAP price, but several large ADAP programs are not including efavirenz yet. The company has committed to providing the drug free of charge to financially-needy patients, but only as a last resort. Recently, a new protease inhibitor called amprenavir (Agenerase) has been introduced by Glaxo Wellcome. Amprenavir is available from an expanded access program for patients who have failed one protease inhibitor and who fit into one of three treatment protocols. Problems with ingesting the drug are reviewed. Glaxo expects FDA approval for amprenavir in the near future. PMID:11365902

  15. Accessing social rights in Denmark

    Jacqueson, Catherine

    2015-01-01

    are in decreasing order Polish, German and British nationals. Debates among politicians reflected in the media have since the enlargement of the EU to 10 new Member States in 2004 focused on and off on the issue of access by migrants to social benefits and the issue of social tourism. The debate and discussions......, and the attitude of main actors, such as the media and political parties. It thus looks both at theory and practice. EU-based migration to Denmark is still relatively low, and is essentially exercised by workers and students. Apart from Scandinavians, the most representative EU-citizens actually living in Denmark......’s emphasizing that the existing law was incompatible with EU law, especially with Regulation 883/2004 on the coordination of social security schemes. While Denmark praises itself for being a good pupil in faithfully respecting and applying EU law, reality is another where EU law is seen as a threat...

  16. Equal Access but Unequal Outcomes

    Jæger, Mads Meier

    2009-01-01

    This article argues that existing studies on cultural capital and educational success fail to distinguish the different channels through which cultural capital promotes educational success. Following Bourdieu, the article proposes that for cultural capital to promote educational success three...... conditions must hold: (1. parents must possess cultural capital, (2. they must transfer their cultural capital to children, and (3. children must absorb cultural capital and convert it into educational success. This research develops an empirical model that analyzes the significance of the three effects with...... respect to Danish children's choice of secondary education. Denmark is well-suited for this study because access to secondary education is particularly meritocratic. The empirical analysis shows that all three channels through which cultural capital affects educational success are important....

  17. EPICS channel access using websocket

    Web technology is useful as a means of widely disseminating accelerator and beam status information. For this purpose, WebOPI was implemented by SNS as a web-based system using Ajax (asynchronous JavaScript and XML) with EPICS. On the other hand, it is often necessary to control the accelerator from different locations as well as the central control room during beam operation and maintenance. However, it is not realistic to replace the GUI-based operator interface (OPI) with a Web-based system using Ajax technology because of interactive performance issue. Therefore, as a next generation OPI over the web using EPICS Channel Access (CA), we developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force (IETF) for Web-based systems. WebSocket is a web technology that provides bidirectional, full-duplex communication channels over a single TCP connection. By utilizing Node.js and the WebSocket access library called Socket.IO, a WebSocket server was implemented. Node.js is a server-side JavaScript language built on the Google V8 JavaScript Engine. In order to construct the WebSocket server as an EPICS CA client, an add-on for Node.js was developed in C/C++ using the EPICS CA library, which is included in the EPICS base. As a result, for accelerator operation, Web-based client systems became available not only in the central control room but also with various types of equipment. (author)

  18. Holistic approaches to e-learning accessibility

    Lawrie Phipps

    2006-12-01

    Full Text Available The importance of accessibility to digital e-learning resources is widely acknowledged. The World Wide Web Consortium Web Accessibility Initiative has played a leading role in promoting the importance of accessibility and developing guidelines that can help when developing accessible web resources. The accessibility of e-learning resources provides additional challenges. While it is important to consider the technical and resource related aspects of e-learning when designing and developing resources for students with disabilities, there is a need to consider pedagogic and contextual issues as well. A holistic framework is therefore proposed and described, which in addition to accessibility issues takes into account learner needs, learning outcomes, local factors, infrastructure, usability and quality assurance. The practical application and implementation of this framework is discussed and illustrated through the use of examples and case studies.

  19. Variability among Indian Indigo accessions in Kerala

    Neema Mohammad

    2015-06-01

    Full Text Available Abstract: Twenty accessions of Indian Indigo (Indigofera tinctoria L. collected from different parts of Kerala state were assessed for their variability. The study was carried out at College of Agriculture, Vellayani, Kerala. The morphological traits, flowering and seeding behavior, yield and yield attributes and root nodule characteristics were studied. Analysis of variance revealed substantial variations among the accessions. IT 13, accession from Thiruvananthapuram followed by IT 11 (Kollam and IT 9 (Thiruvananthapuram were found to be superior based on selection indices and morphological characterization. These accessions exhibited high yield of leaf, shoot and root. The study revealed an insight into the variations among Indigofera tinctoria accessions and indicated the relative superiority of certain accessions that can further be multiplied and released as high yielding varieties. 

  20. Database Access through Java Technologies

    Nicolae MERCIOIU

    2010-09-01

    Full Text Available As a high level development environment, the Java technologies offer support to the development of distributed applications, independent of the platform, providing a robust set of methods to access the databases, used to create software components on the server side, as well as on the client side. Analyzing the evolution of Java tools to access data, we notice that these tools evolved from simple methods that permitted the queries, the insertion, the update and the deletion of the data to advanced implementations such as distributed transactions, cursors and batch files. The client-server architectures allows through JDBC (the Java Database Connectivity the execution of SQL (Structured Query Language instructions and the manipulation of the results in an independent and consistent manner. The JDBC API (Application Programming Interface creates the level of abstractization needed to allow the call of SQL queries to any DBMS (Database Management System. In JDBC the native driver and the ODBC (Open Database Connectivity-JDBC bridge and the classes and interfaces of the JDBC API will be described. The four steps needed to build a JDBC driven application are presented briefly, emphasizing on the way each step has to be accomplished and the expected results. In each step there are evaluations on the characteristics of the database systems and the way the JDBC programming interface adapts to each one. The data types provided by SQL2 and SQL3 standards are analyzed by comparison with the Java data types, emphasizing on the discrepancies between those and the SQL types, but also the methods that allow the conversion between different types of data through the methods of the ResultSet object. Next, starting from the metadata role and studying the Java programming interfaces that allow the query of result sets, we will describe the advanced features of the data mining with JDBC. As alternative to result sets, the Rowsets add new functionalities that

  1. Optical Subsystems for Next Generation Access Networks

    Lazaro, J.A; Polo, V.; Schrenk, B.;

    2011-01-01

    Recent optical technologies are providing higher flexibility to next generation access networks: on the one hand, providing progressive FTTx and specifically FTTH deployment, progressively shortening the copper access network; on the other hand, also opening fixed-mobile convergence solutions...... in next generation PON architectures. It is provided an overview of the optical subsystems developed for the implementation of the proposed NG-Access Networks....

  2. An electronically controlled automatic security access gate

    Jonathan A. Enokela; Michael N. TYOWUAH

    2014-01-01

    The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF) transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is ...

  3. On the numerical measurement of accessibility

    J W Weibull

    1980-01-01

    The aim of this paper is to clarify the validity of a fairly broadrange of numerical indicators of accessibility. To this purpose a measurement-theoretic framework is presented, where accessibility is considered as a property of configurations of opportunities for spatial interaction. Within this framework a few established indicators of accessibility are discussed and notions of separable, additive, and maxitive indicators are introduced. An analysis is given of the validity of numerical ind...

  4. Accessibility in cities: transport and urban form

    Rode, Philipp; Floater, Graham; Thomopoulos, Nikolas; Docherty, James; Schwinger, Peter; Mahendra, Anjali; Fang, Wanli

    2014-01-01

    This paper focusses on one central aspect of urban development: transport and urban form and how the two shape the provision of access to people, goods and services, and information in cities. The more efficient this access, the greater the economic benefits through economies of scale, agglomeration effects and networking advantages. This paper discusses how different urban accessibility pathways impact directly on other measures of human development and environmental sustainability. It also ...

  5. Share Research Results in Open Access

    Das, Anup-Kumar

    2015-01-01

    In an academic research environment, scholarly communications become central part of the process of deliberations. Scholars across the world are now better equipped with services offered by open access knowledge repositories for self-archiving their intellectual outcomes of scholarly research, i.e., research publications and research reports. Global open access statements enlighten academic researchers to make use of Green open access channels for harnessing global visibility, readability and...

  6. Open Access and DSpace Institutional Repository System

    Çelik, Sönmez; Gürdal, Gültekin; Keten, Burcu; Türkfidanı, Ata; Kutlutürk, Levent

    2013-01-01

    The Open Access movement is a social movement in academia, dedicated to the principle of open access - to information - sharing for the common good and is being supported by many scientists, publishers, and researchers in the world, today. The software that is used to operate the institutional archive systems which are the basis of the Open Access, are divided into two forms of some free open source software and paid package programs which were developed by some corporates. DSpace, whose firs...

  7. Open Access Initiatives in India - an Evaluation

    Leila Fernandez

    2006-01-01

    Developing countries have embraced open access with a view to promoting visibility of research done in these regions. Open access initiatives described in this paper are based on interviews with information professionals responsible for creation and maintenance of online research repositories in India. Open access journals, e-print archives and e-theses repositories are covered with an emphasis on the sciences including the physical sciences, mathematics and the biomedical sciences. Existing ...

  8. Telecommunication policies for broadband access networks

    Pereira, João Paulo

    2009-01-01

    The "triple play" services required (Internet, telephone and TV services) lead to a great increase in bandwidth demand. However, the existing access networks are not able to support this increase, and the capacity to delivery broadband services remain as a challenge ("last mile problem"). The access network remains a bottleneck in terms of the bandwidth and service quality it affords the end user. Besides the bandwidth, other great challenge to access networks is the mobility and the user nee...

  9. Governance Matters: Universal Access to Water

    Anillo, Andrea; Boehm , Frédéric; Polo-Otero, José

    2014-01-01

    Universal access to water is acknowledged as a fundamental human right which governments have to secure. To improve access to water, it has been argued that an important factor, if not the most important, is to strengthen water sector governance and reduce corruption. Looking at the relationship between governance indicators and access to water sources and controlling for various factors, our contribution fills a gap in proving empirically, for a cross-country analysis including 147 countries...

  10. Efficient Access Control for Wireless Sensor Data

    Sorniotti, Alessandro; Molva, Refik; GOMEZ, Laurent; Trefois, Christophe; Laube, Annett; Scaglioso, Piervito

    2009-01-01

    Abstract Although very developed in many sectors (databases, filesystems), access control schemes are still somewhat elusive when it comes to wireless sensor net- works. However, it is clear that many WSN systems—such as healthcare and automotive ones—need a controlled access to data that sensor nodes produce, given its high sensitivity. Enforcing access control in wireless sensor networks is a particularly difficult task due to the limited computational capacity of wireless sensor nodes. In ...

  11. Open Your Minds to Open Access

    Humphreys, Alexandra; Pannabecker, Virginia

    2013-01-01

    "...a student's education is only as valuable as the information that a student has access to..." ~Matt Cooper, (2012 President if the National Association of Graduate and Professional Students), at the October 2012 SPARC/World Bank Open Access Week kickoff event. Abstract: Want to increase Open Access participation at your institution? This poster and its accompanying handout present resources and strategies from a large public research university library to encourage understanding of ...

  12. Aproximació al moviment "open access"

    Keefer, Alice

    2005-01-01

    [eng] The article describes the background and current state of the open access (OA) movement. Its objectives --with roots in scientists' traditional desire to disseminate their works, in librarians' concerns about the serials crisis, and in technological advances-- were formally articulated in the Budapest Open Access Initiative (BOAI) declaration of 2002. This statement established two strategies for providing access to scientific information without any economic, technical, or legal obstac...

  13. Modelling Access Control For Healthcare Information Systems

    Ferreira, Ana; Chadwick, David W; Antunes, Luis

    2007-01-01

    The widening use of Information Systems, which allow the collection, extraction, storage, management and search of information, is increasing the need for information security. After a user is successfully identified and authenticated to a system, he needs to be authorised to access the resources he/she requested. Access control is part of this last process that checks if a user can access those resources. This is particularly important in the healthcare environment where there is the need to...

  14. Evaluation of file access control implementations

    Madar, Fatima Ali

    2005-01-01

    This thesis discusses two implementations of file access controls: the UNIX Permissions (UP) and the Access Control List (ACL). We will evaluate advantages and weaknesses in these two implementations. The criteria of evaluation are usefulness, security and manageability. The level of usefulness of systems was measured by evaluating user-surveys. The level of security was measured by comparing the implementations against well-established file access control models concerning privacy, inte...

  15. Advanced Call Center Supporting WAP Access

    YUANXiao-hua; CHENJun-liang

    2001-01-01

    Traditional call centers can be accessed via speech only, and the call center based on web provides both da-ta and speech access,but it needs a powerful terminal-computer.By analyzing traditional call centers and call cen-ters based on web, this paper presents the framework of an advanced call center supporting WAP access.A typical service is also described in detail.

  16. Negotiating access into firms: obstacles and strategies

    Laryea, Sam; Hughes, Will

    2011-01-01

    Researchers often experience difficulties with the negotiation of access into firms for the purpose of data collection. The question we explore is: What are the main obstacles associated with access negotiation into firms; and what strategies do researchers employ to increase their chances of success? Our research work on the tendering process of contractors took place between 2006 and 2008. We successfully negotiated access into four firms (two each in Ghana and the UK) to observe live ex...

  17. German Medical Science - "open access" ist erfolgreich

    Müller, W.

    2008-01-01

    Im Portal German Medical Science (gemeinschaftlich betrieben von AWMF, DIMDI und ZB MED) werden zur Zeit 13 Zeitschriften und eine Schriftenreihe elektronisch mit freiem Zugriff ("open access") publiziert:

  18. BusinessUSA Resource Access API

    General Services Administration — BusinessUSA connects businesses to government services and information. The API provides access to resource abstracts including programs, services, data, events,...

  19. Enhancing a Self-Access Website

    Troy Rubesch

    2010-09-01

    Full Text Available Since July of 2009, the Self-Access Learning Center (SALC at Kanda University has maintained a student-oriented Let’s Study English website (accessible at http://elisalc.org. The website acts as an extension of the physical space of the SALC, supporting the Center’s commitment to student access to information and materials which suit individual students’ learning needs, abilities and preferences. It also widens the learning environment- enabling students to access SALC information and resources virtually anywhere at any time. Lastly, it helps promote a community of language learners, encouraging student involvement in Learning Center activities.

  20. [Reaching Target Groups--Shaping Accessibility].

    Walter, U; Jahn, I

    2015-09-01

    This paper describes the public health discourse on the accessibility and access paths, theoretical approaches as well as factors influencing the utilisation of prevention and health promotion interventions, and requirements for their evaluation. Various projects funded by the German Federal Ministry of Education and Research address many aspects of accessibility and describe extensive experiences with access paths, approaches to information transfer, target group-driven supply chain design, etc. Recommendations for practice and research are given at the end of the article. PMID:24081569

  1. Open areas and open access

    One objective of the two open areas in the present ISABELLE design is to provide flexibility with respect to the size and shape of experimental equipment that would eventually be installed there. No permanent building would be installed initially. A second objective of the design of open areas is to keep initial costs as low as practicable. Another objective is open access. This note explores this idea and some design concepts based on it. It would permit inserting large pieces of experimental equipment quickly and removing them with equal ease and speed. Entire experiments would be moved in a single piece (or a few) by building them on movable platforms with capacities of up to about 1000 tons per platform. Most experiments could be built on a single platform or on a few. The shielding must also be moved. It must also be organized into a small number of large units. A scheme using large tanks filled with water is described. It is important to make the equipment on a given platform as complete and self-contained as possible, with a minimum of interconnections for power, coolant, controls, data transmission, etc. 5 figures

  2. EASIER ACCESS TO STANDARDS DOCUMENTATION

    2001-01-01

    Many organizations issuing standards offer reduced prices for publications to their members. Paying a membership fee, even a site membership fee, can therefore be worthwhile - even if relatively few standards are needed. The Library is now exploring the possibility, in collaboration with the rest of the CERN community, of joining standards-issuing organizations. So why not share your costs with the rest of the organization wherever this can be done without violating copyright or access regulations? The Library now provides documentation and other member services from IPC, the Association Connecting Electronics Industries (http://www.ipc.org/html/fsabout.htm) at favourable prices for the entire CERN population. For more information, or if you are a member of any other organization which provides services which could be shared CERN-wide, please contact library.desk@cern.ch . We remind all users of international standards, that CERN has special agreements with ISO and IEC (see Bulletin 50/2000). You can order st...

  3. Agriculture: access to technology limited.

    1997-01-01

    From country to country and even regionally, the roles of women in agriculture vary, but most of their labor is in unpaid subsistence production and their contributions tend to be underestimated, according to the results of the [UN] Secretary-General's report. Depending on circumstances, they have complementary roles with men, sharing or dividing tasks in the production of crops, care of animals, and forestry management. In sub-Saharan Africa, for example, women contribute 60-80% of labor in food production for both household consumption and sale, while in Malaysia the women account for only 35% of the agricultural labor force, and in Ireland the participation rate is only 10.4%. Although women make this important amount of labor contributions to agricultural production, "development policies tend to favor export crops to earn foreign exchange and the agricultural research tends to address the improvement of production and technologies for commercial production". This results in limited access for women to technical knowledge and innovations, including irrigation, machinery, farming techniques and extension services. This is strengthened by the fact that most of the extension services target farmers who own land and can obtain credit to invest in input and technology. PMID:12293737

  4. ACCESS Sub-system Performance

    Kaiser, Mary Elizabeth; Morris, Matthew J.; Aldoroty, Lauren Nicole; Godon, David; Pelton, Russell; McCandliss, Stephan R.; Kurucz, Robert L.; Kruk, Jeffrey W.; Rauscher, Bernard J.; Kimble, Randy A.; Wright, Edward L.; Benford, Dominic J.; Gardner, Jonathan P.; Feldman, Paul D.; Moos, H. Warren; Riess, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, William Van Dyke; Sahnow, David J.; Lampton, Michael; Perlmutter, Saul

    2016-01-01

    ACCESS: Absolute Color Calibration Experiment for Standard Stars is a series of rocket-borne sub-orbital missions and ground-based experiments designed to leverage significant technological advances in detectors, instruments, and the precision of the fundamental laboratory standards used to calibrate these instruments to enable improvements in the precision of the astrophysical flux scale through the transfer of laboratory absolute detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass.A cross wavelength calibration of the astrophysical flux scale to this level of precision over this broad a bandpass is relevant for the data used to probe fundamental astrophysical problems such as the SNeIa photometry based measurements used to constrain dark energy theories.We will describe the strategy for achieving this level of precision, the payload and calibration configuration, present sub-system test data, and the status and preliminary performance of the integration and test of the spectrograph and telescope. NASA APRA sounding rocket grant NNX14AH48G supports this work.

  5. A Review of Open Access Publication in Tanzania

    Mgonzo, Wasiwasi J.; Yonah, Zaipuna O.

    2014-01-01

    New forms of scholarship are emerging in the world. These aim at providing freely accessible research materials through scholarly communication. There are two common ways of providing open access to research outputs namely, through the open access journals and through discipline or institutional-based open access repositories, that is: Open Access Institutional Repositories (OAIR) driven by open access publishing. In principle, open access to research outputs maximizes research access and the...

  6. Attention, please! Getting the focus on Open Access (advocacy for Open Access in institutions)

    Swan, Alma

    2009-01-01

    A presentation describing Open Access advocacy processes within research institutions, including making the business case for a repository, the Open Access citation advantage, the impact advantage for institutions, and advocating to institutional managers, researchers and the library.

  7. Availability, Access, Authenticity, and Persistence: Creating the Environment for Permanent Public Access to Electronic Government Information.

    Barnum, George

    2002-01-01

    Discusses efforts by the Federal Depository Library Program to make information accessible more or mostly by electronic means. Topics include Web-based locator tools; collection development; digital archives; bibliographic metadata; and access tools and user interfaces. (Author/LRW)

  8. Development of new channel access library

    The libraries JCA and CAJ are used commonly for channel access in Java applications, but the API of JCA and its implementation contain many problems, so we create new channel access library. In this report we describe problems of previous libraries, some designs of new library, differences of APIs, etc. (author)

  9. Our Foundation: Understanding and Promoting Youth Access.

    Gardner, Carrie

    2001-01-01

    Examines how libraries can encourage and increase youth access to information. Discusses the role of the school library media center; law, illegal information, and censorship; parental rights; information policy; and promoting youth access before a challenge occurs in the library. (AEF)

  10. 78 FR 20255 - Leased Commercial Access

    2013-04-04

    .... SUPPLEMENTARY INFORMATION: We published a final rule document at 73 FR 10675, February 28, 2008, revising rules... COMMISSION 47 CFR Part 76 Leased Commercial Access AGENCY: Federal Communications Commission. ACTION... revised rules concerning Leased Commercial Access. Some of the revised rules contained...

  11. On Flat Objects of Finitely Accessible Categories

    Septimiu Crivei

    2013-01-01

    Full Text Available Flat objects of a finitely accessible additive category are described in terms of some objects of the associated functor category of , called strongly flat functors. We study closure properties of the class of strongly flat functors, and we use them to deduce the known result that every object of a finitely accessible abelian category has a flat cover.

  12. Access control and service-oriented architectures

    Leune, C.J.

    2007-01-01

    Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the

  13. Locally Accessible Information and Distillation of Entanglement

    Ghosh, S; Kar, G; Kunkri, S; Roy, A; Ghosh, Sibasish; Joag, Pramod; Kar, Guruprasad; Kunkri, Samir; Roy, Anirban

    2004-01-01

    A new type of complementary relation is found between locally accessible information and final average entanglement for given ensemble. It is also shown that in some well known distillation protocol, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

  14. Locally accessible information and distillation of entanglement

    Ghosh, Sibasish; Joag, Pramod; Kar, Guruprasad; Kunkri, Samir; Roy, Anirban

    2005-01-01

    A different type of complementarity relation is found between locally accessible information and final average entanglement for a given ensemble. It is also shown that in some well-known distillation protocols, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

  15. Open Access Publishing - Strengths and Strategies

    Rasmussen, Martin

    2010-05-01

    The journal crisis and the demand for free accessibility to the results of publicly funded research were the main drivers of the Open Access movement since the late 1990's. Besides many academic institutions that support the different ways of Open Access publishing, there is a growing number of publishing houses that are specialized on this new access and business model of scholarly literature. The lecture provides an overview of the different kinds of Open Access publishing, discusses the variety of underlying business models, names the advantages and potentials for researches and the public, and overcomes some objections against Open Access. Besides the increased visibility and information supply, the topic of copyrights and exploitation rights will be discussed. Furthermore, it is a central aim of the presentation to show that Open Access does not only support full peer-review, but also provides the potential for even enhanced quality assurance. The financing of business models based on open accessible literature is another important part to be outlined in the lecture.

  16. Remote Access M\\"ossbauer Spectrometry

    Silaev, A A; Postnikov, E B; Radchenko, V V; Silaev, A A

    2015-01-01

    The authors' design for a M\\"ossbauer spectroscopy unit accessed via the Internet is presented. The spectrometer's configuration, operational peculiarities, key specifications, and remote access procedures are described. More detailed educational, scientific, and technical information can be found at the project's official website http://www.efmsb.ru

  17. Including Language Access into Medicaid ACO Design.

    Gershon, Rachel; Morris, Lisa; Ferguson, Warren

    2016-09-01

    Quality health care relies upon communication in a patient's preferred language. Language access in health care occurs when individuals are: (1) Welcomed by providers regardless of language ability; and (2) Offered quality language services as part of their care. Federal law generally requires access to health care and quality language services for deaf and Limited English Proficient (LEP) patients in health care settings, but these patients still find it hard to access health care and quality language services.Meanwhile, several states are implementing Medicaid Accountable Care Organization (ACO) initiatives to reduce health care costs and improve health care quality. Alternative payment methods used in these initiatives can give Accountable Care Organizations more flexibility to design linguistically accessible care, but they can also put ACOs at increased financial risk for the cost of care. If these new payment methods do not account for differences in patient language needs, ACO initiatives could have the unintended consequence of rewarding ACOs who do not reach out to deaf and LEP communities or offer quality language services.We reviewed public documents related to Medicaid ACO initiatives in six states. Some of these documents address language access. More could be done, however, to pay for language access efforts. This article describes Medicaid ACO initiatives and explores how different payment tools could be leveraged to reward ACOs for increased access to care and quality language services. We find that a combination of payment tools might be helpful to encourage both access and quality. PMID:27587453

  18. Online Access to Knowledge: System Design.

    Meadow, Charles T.; And Others

    1989-01-01

    Reports on design and rationale of Online Access to Knowledge, a computer intermediary developed by Online Access to Knowledge Project to enable users with little or no training or experience in bibliographic searching to conduct their own searches. Topics covered include software design, tutorials and assistance programs, and conclusions based on…

  19. Easy Access: Auditing the System Network

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  20. National Radiobiology Archives Distributed Access user's manual

    This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems

  1. Librarians and Libraries Supporting Open Access Publishing

    Richard, Jennifer; Koufogiannakis, Denise; Ryan, Pam

    2009-01-01

    As new models of scholarly communication emerge, librarians and libraries have responded by developing and supporting new methods of storing and providing access to information and by creating new publishing support services. This article will examine the roles of libraries and librarians in developing and supporting open access publishing…

  2. Open Access and Civic Scientific Information Literacy

    Zuccala, Alesia

    2010-01-01

    Introduction: We examine how residents and citizens of The Netherlands perceive open access to acquire preliminary insight into the role it might play in cultivating civic scientific literacy. Open access refers to scientific or scholarly research literature available on the Web to scholars and the general public in free online journals and…

  3. Open Access Conference Berlin9 (Washington)

    Burešová, Iva

    -, 3-4 (2011). E-ISSN 1805-2800. [ Open Access Conference Berlin9. 10.11.2011, 08.11.2011] Institutional research plan: CEZ:AV0Z70830501 Keywords : Open Access http://www.lib.cas.cz/casopis-informace/3107/

  4. Development of Disruptive Open Access Journals

    Anderson, Terry; McConkey, Brigette

    2009-01-01

    Open access (OA) publication has emerged, with disruptive effects, as a major outlet for scholarly publication. OA publication is usually associated with on-line distribution and provides access to scholarly publications to anyone, anywhere--regardless of their ability to pay subscription fees or their association with an educational institution.…

  5. Open-Access Electronic Textbooks: An Overview

    Ovadia, Steven

    2011-01-01

    Given the challenging economic climate in the United States, many academics are looking to open-access electronic textbooks as a way to provide students with traditional textbook content at a more financially advantageous price. Open access refers to "the free and widely available information throughout the World Wide Web. Once an article's author…

  6. A New Era of Open Access?

    Mercieca, Paul; Macauley, Peter

    2008-01-01

    There has been a push for open access journals for more than a decade in a higher education and research environment in which the "publish or perish" syndrome is as dominant as ever. This article examines the success, or otherwise, of open access schemes in light of the Excellence in Research for Australia (ERA) initiative. It compares the…

  7. Correlates of Access to Business Research Databases

    Gottfried, John C.

    2010-01-01

    This study examines potential correlates of business research database access through academic libraries serving top business programs in the United States. Results indicate that greater access to research databases is related to enrollment in graduate business programs, but not to overall enrollment or status as a public or private institution.…

  8. 5 CFR 900.705 - Program accessibility.

    2010-01-01

    ...) (appendix A to 41 CFR subpart 101-19.6) shall be deemed to comply with the requirements of this section with... 5 Administrative Personnel 2 2010-01-01 2010-01-01 false Program accessibility. 900.705 Section... Assisted Programs of the Office of Personnel Management § 900.705 Program accessibility. (a) No...

  9. 47 CFR 95.645 - Control accessibility.

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Control accessibility. 95.645 Section 95.645 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) SAFETY AND SPECIAL RADIO SERVICES PERSONAL RADIO SERVICES Technical Regulations Certification Requirements § 95.645 Control accessibility. (a) No...

  10. 14 CFR 23.611 - Accessibility provisions.

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Accessibility provisions. 23.611 Section 23.611 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION AIRCRAFT... § 23.611 Accessibility provisions. For each part that requires maintenance, inspection, or...

  11. 43 CFR 17.216 - Accessibility.

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Accessibility. 17.216 Section 17.216 Public Lands: Interior Office of the Secretary of the Interior NONDISCRIMINATION IN FEDERALLY ASSISTED... Accessibility. No handicapped person shall, because a recipient's facilities are inaccessible to or unusable...

  12. 28 CFR 40.4 - Accessibility.

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Accessibility. 40.4 Section 40.4 Judicial Administration DEPARTMENT OF JUSTICE STANDARDS FOR INMATE GRIEVANCE PROCEDURES Minimum Standards for Inmate Grievance Procedures § 40.4 Accessibility. Each inmate shall be entitled to invoke the grievance...

  13. Teaching Accessibility Standards to Generation Y Students

    Klitzing, Sandra

    2011-01-01

    The Americans with Disabilities Act (ADA) of 1990 mandated that facilities and programs are accessible, so people with disabilities can be included in all aspects of community life including recreation (Dattilo, 2002). Understanding accessibility standards is not an easy task. Educators are faced with the challenge of teaching technical content,…

  14. Open Access, Education Research, and Discovery

    Furlough, Michael

    2010-01-01

    Background/Context: The open access movement has successfully drawn attention to economic and political aspects of scholarly communication through a significant body of commentary that debates the merits of open access and the potential damage it may do to scholarly publishing. Researchers within the field of education research, notably John…

  15. Health Care Access among Deaf People

    Kuenburg, Alexa; Fellinger, Paul; Fellinger, Johannes

    2016-01-01

    Access to health care without barriers is a clearly defined right of people with disabilities as stated by the UN Convention on the Rights of People with Disabilities. The present study reviews literature from 2000 to 2015 on access to health care for deaf people and reveals significant challenges in communication with health providers and gaps in…

  16. Open Access to Mexican Academic Production

    Adame, Silvia I.; Llorens, Luis

    2016-01-01

    This paper presents a description of the metadata harvester software development. This system provides access to reliable and quality educational resources, shared by Mexican Universities through their repositories, to anyone with Internet Access. We present the conceptual and contextual framework, followed by the technical basis, the results and…

  17. The index of rural access: an innovative integrated approach for measuring primary care access

    McGrail Matthew R

    2009-07-01

    Full Text Available Abstract Background The problem of access to health care is of growing concern for rural and remote populations. Many Australian rural health funding programs currently use simplistic rurality or remoteness classifications as proxy measures of access. This paper outlines the development of an alternative method for the measurement of access to primary care, based on combining the three key access elements of spatial accessibility (availability and proximity, population health needs and mobility. Methods The recently developed two-step floating catchment area (2SFCA method provides a basis for measuring primary care access in rural populations. In this paper, a number of improvements are added to the 2SFCA method in order to overcome limitations associated with its current restriction to a single catchment size and the omission of any distance decay function. Additionally, small-area measures for the two additional elements, health needs and mobility are developed. By utilising this improved 2SFCA method, the three access elements are integrated into a single measure of access. This index has been developed within the state of Victoria, Australia. Results The resultant index, the Index of Rural Access, provides a more sensitive and appropriate measure of access compared to existing classifications which currently underpin policy measures designed to overcome problems of limited access to health services. The most powerful aspect of this new index is its ability to identify access differences within rural populations at a much finer geographical scale. This index highlights that many rural areas of Victoria have been incorrectly classified by existing measures as homogenous in regards to their access. Conclusion The Index of Rural Access provides the first truly integrated index of access to primary care. This new index can be used to better target the distribution of limited government health care funding allocated to address problems of poor

  18. Access to versus Use of Loans: What are the True Determinants of Access?

    Hainz, Christa; Nabokin, Tatjana

    2009-01-01

    Access to finance is a prerequisite for economic development. Existing studies measure access by the use of finance. We develop a direct measurement for access to finance from the Business Environment and Enterprise Performance Survey 2005 data. We determine whether a firm without a loan does not need one or is indeed credit-constrained. The determinants of access estimated in a Heckman selection model are compared with those of use. Our results show that firm age and sector effects do not in...

  19. Successful Access Rate and Risk Factor of Vascular Access Surgery in Arm for Dialysis

    Yoo, Dae Woo; Yoon, Myunghee; Jun, Hee Jae

    2014-01-01

    Purpose: Preservation of adequate vascular access is of vital importance for patients undergoing chronic dialysis in renal failure. The aim of this study is to evaluate the successful access rate and risk factors of arteriovenous fistula (AVF) in the arm for dialysis at a single center. Materials and Methods: Patients undergoing vascular access operation between January 2006 and December 2011 were retrospectively identified. Results: A total of 362 vascular access operations were performed. T...

  20. [The publishing industry against open access journals].

    Camargo Junior, Kenneth Rochel de

    2012-12-01

    Open-access journal publishing has significantly grown in recent years. Restricted access publications have, in turn, increasing access costs as they benefit from a unique economic model in which relevant work and essential inputs are provided free of charge to vendors who have a captive market that has almost no competition. An additional issue typical of industries that work under the copyright regime is that the oligopoly market structure of the publishing industry which in turn further contributes to increase their products' prices. Mandatory open-access policies, as determined by the NIH, constitute a threat to this business model and are being challenged by the industry on several fronts, including the passage of legislation to undermine these initiatives. The purpose of this commentary article was to review key aspects of this confrontation and to suggest potential strategies for encouraging open-access publishing in Brazil. PMID:23380837

  1. Accessibility: global gateway to health literacy.

    Perlow, Ellen

    2010-01-01

    Health literacy, cited as essential to achieving Healthy People 2010's goals to "increase quality and years of healthy life" and to "eliminate health disparities," is defined by Healthy People as "the degree to which individuals have the capacity to obtain, process, and understand basic health information and services needed to make appropriate health decisions." Accessibility, by definition, the aforementioned "capacity to obtain," thus is health literacy's primary prerequisite. Accessibility's designation as the global gateway to health literacy is predicated also on life's realities: global aging and climate change, war and terrorism, and life-extending medical and technological advances. People with diverse access needs are health professionals' raison d'être. However, accessibility, consummately cross-cultural and universal, is virtually absent as a topic of health promotion and practice research and scholarly discussion of health literacy and equity. A call to action to place accessibility in its rightful premier position on the profession's agenda is issued. PMID:18955546

  2. Energy access. Current situation, challenges and outlook

    Globally over 1.3 billion people do not have access to electricity and 2.6 billion people rely on the traditional use of biomass for cooking. Energy access is one of the major challenges of the 21. century as it is a lever for both economic and human development, at individual and national level. Moreover, energy access represents a high-potential market and offers a lot of opportunities for private companies and industrials. In this publication, ENEA lays out the current situation of energy access (actors, actual and future needs, existing technological solutions, markets). The publication addresses the main issues energy access has to face: energy price, equipment financing, distribution, scale-up, and environmental performances

  3. Surveillance and Monitoring of Dialysis Access

    Lalathaksha Kumbar

    2012-01-01

    Full Text Available Vascular access is the lifeline of a hemodialysis patient. Currently arteriovenous fistula and graft are considered the permanent options for vascular access. Monitoring and surveillance of vascular access are an integral part of the care of hemodialysis patient. Although different techniques and methods are available for identifying access dysfunction, the scientific evidence for the optimal methodology is lacking. A small number of randomized controlled trials have been performed evaluating different surveillance techniques. We performed a study of the recent literature published in the PUBMED, to review the scientific evidence on different methodologies currently being used for surveillance and monitoring and their impact on the care of the dialysis access. The limited randomized studies especially involving fistulae and small sample size of the published studies with conflicting results highlight the need for a larger multicentered randomized study with hard clinical end points to evaluate the optimal surveillance strategy for both fistula and graft.

  4. Financing low carbon energy access in Africa

    Modern energy access in Africa is critical to meeting a wide range of developmental challenges including poverty reduction and the Millennium Development Goals (MDGs). Despite having a huge amount and variety of energy resources, modern energy access in the continent is abysmal, especially Sub-Saharan Africa. Only about 31% of the Sub-Saharan African population have access to electricity while traditional biomass energy accounts for over 80% of energy consumption in many Sub-Saharan African countries. With energy use per capita among the lowest in the world, there is no doubt that Africa will need to increase its energy consumption to drive economic growth and human development. Africa also faces a severe threat from global climate change with vulnerabilities in several key areas or sectors in the continent including agriculture, water supply, energy, etc. Low carbon development provides opportunities for African countries to improve and expand access to modern energy services while also building low-emission and climate-resilient economies. However, access to finance from different sources will be critical in achieving these objectives. This paper sets out to explore the financial instruments available for low carbon energy access in Africa including the opportunities, markets and risks in low carbon energy investments in the continent. - Highlights: ► Access to finance will be critical to achieving low carbon energy access in Africa. ► Domestic finance will be important in leveraging private finance. ► Private sector participation in modern and clean energy in Africa is still low. ► Many financing mechanisms exist for low carbon energy access in Africa. ► The right institutional frameworks are critical to achieving low carbon energy access in Africa.

  5. Open Access Scholarly Publications as OER

    Terry Anderson

    2013-06-01

    Full Text Available This paper presents the rationale, common practices, challenges, and some personal anecdotes from a journal editor on the production, use, and re-use of peer-reviewed scholarly articles as open educational resources (OER. The scholarly and professional discourse related to open educational resources has largely focused on open learning objects, courseware, and textbooks. However, especially in graduate education, articles published in scholarly journals are often a major component of the course content in formal education. In addition, open access journal articles are critical to expanding access to knowledge by scholars in the developing world and in fostering citizen science, by which everyone has access to the latest academic information and research results. In this article, I highlight some of the challenges, economic models, and evidence for quality of open access journal content and look at new affordances provided by the Net for enhanced functionality, access, and distribution.In the 17 years since I graduated with a doctorate degree, the climate and acceptance of open access publishing has almost reversed itself. I recall a conversation with my PhD supervisor in which he argued that publishing online was not a viable option as the product would not have permanency, scholarly recognition, or the prestige of a paper publication. His comments reflect the confusion between online resources and those described as open access, but as well illustrate the change in academic acceptance and use of open access products during the past decade. The evolution from paper to online production and consumption is a disruptive technology in which much lower cost and increased accessibility of online work opens the product to a completely new group of potential users. In the case of OER these consumers are primarily students, but certainly access to scholars from all parts of the globe and the availability to support citizen science (Silvertown, 2009

  6. Access control, security, and trust a logical approach

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  7. BEACON FRAME MANIPULATION TO MITIGATE ROGUE ACCESS POINTS: CASE OF ANDROID SMARTPHONE ROGUE ACCESS POINTS

    Thambo Nyathi

    2015-11-01

    Full Text Available The use of wireless devices to access corporate network resources is now part of the norm within corporate environments. When wireless users need to connect to a network they hardly question the source of their connectivity. Mobile phones, particularly smartphones allow users to access network resources. These harmless looking wireless devices can be a source of major threats if configured to be so. The Internet is awash with mobile apps capable of performing packet sniffing. These applications, coupled with the capability of the smartphone to be configured as an access point, can present a Smartphone Rogue Access Point. Access Points advertise their availability using what is called a beacon frame. This research paper proposes a solution which restructures this beacon frame to include an Authentic Access Point Value which can be used to defend against Rogue Access Points.

  8. Beacon Frame Manipulation to Mitigate Rogue Access Points: Case of Android Smartphone Rogue Access Points

    Thambo Nyathi

    2014-02-01

    Full Text Available The use of wireless devices to access corporate network resources is now part of the norm within corporate environments. When wireless users need to connect to a network they hardly question the source of their connectivity. Mobile phones, particularly smartphones allow users to access network resources. These harmless looking wireless devices can be a source of major threats if configured to be so. The Internet is awash with mobile apps capable of performing packet sniffing. These applications, coupled with the capability of the smartphone to be configured as an access point, can present a Smartphone Rogue Access Point. Access Points advertise their availability using what is called a beacon frame. This research paper proposes a solution which restructures this beacon frame to include an Authentic Access Point Value which can be used to defend against Rogue Access Points.

  9. Antioxidants in hot pepper: variation among accessions.

    Antonious, George F; Kochhar, Tejinder S; Jarret, Robert L; Snyder, John C

    2006-01-01

    The U.S. Department of Agriculture (USDA) pepper (Capsicum spp.) germplasm collection contains several thousand members or accessions. Many of these species and cultivars have not been analyzed for their concentrations of ascorbic acid, capsaicin, and total phenolic compounds, which are important antioxidants having a number of benefits for human health. The objective of this investigation was to select candidate accessions of hot pepper having high concentrations of ascorbic acid, capsaicin, free sugars, and total phenols for use as parents in breeding for these compounds. Seventeen accessions of pepper from the core Capsicum germplasm collection (four accessions of Capsicum chinense; five accessions of C. baccatum; six accessions of C. annuum; and two of C. frutescens) were field grown and their mature fruits were analyzed for their antioxidant composition. Concentrations of these compounds tended to be higher in C. chinense and C. baccatum, than in C. annuum and C. frutescens. Across all accessions the concentration of total phenols was correlated with ascorbic acid (r = 0.97) and free sugars (r = 0.80). Concentrations of total phenols (1.4, 1.3, and 1.3 mg g-1 fruit) and ascorbic acid (1.6, 1.2, and 1.3 mg g-1 fruit) were significantly greater in PI-633757, PI-387833, and PI-633754, respectively, compared to other accessions analyzed. Total capsaicinoids concentrations were greatest (1.3 mg g-1 fruit) in PI-438622 and lowest (0.002 mg g-1 fruit) in Grif-9320. The great variability within and among Capsicum species for these phytochemicals suggests that these selected accessions may be useful as parents in hybridization programs to produce fruits with value-added traits. PMID:16923603

  10. Open Access-Zeitschriften leicht gemacht

    Blumtritt, Ute; Rösch, Henriette; Voigt, Michaela

    2014-01-01

    Über die Publikationsfonds der DFG, mit denen Gebühren für Veröffentlichungen in Open Access-Zeitschriften für sächsische Wissenschaftlerinnen und Wissenschaftler bezuschusst werden können, berichteten wir im letzten Heft. Daneben bieten die drei Hochschulbibliotheken in Chemnitz, Leipzig und Dresden jeweils auch die Möglichkeit, selbst Open-Access-Journale herauszugeben. Open Access-Zeitschriften ermöglichen ohne Umwege direkten und kostenfreien Zugriff. Deshalb unterstützen Bibliotheken wel...

  11. Editorial: Directions in Self-Access Learning

    Neil Curry

    2014-03-01

    Full Text Available This special issue accompanies the “Directions in Self-Access Learning” symposium held at Kanda University of International Studies in on October 19th, 2013. The purpose of the event was to explore past, present and future directions of the field of self-access learning and was aimed at newcomers and veterans alike. This special issue continues the dialogue by examining several related themes, which are: the role and purpose of self-access, learner support, online presence, and learner involvement.

  12. Capital--its application, access and attitudes.

    Bohlmann, R C

    1996-01-01

    Access to capital for group or network development is generally through one of three sources: current revenue, borrowing, or outside investors. Groups often have not planned well for their financial future, and consequently when integration or managed care opportunities arise, they can be without the necessary funds. This article addresses the acquisition of capital in the context of application (need), access (resources), and attitudes (concerns). Determining capital needs is the starting point, followed by investigating institutional resources, and then investigating the attitudes of the group toward accessing the needed capital. PMID:10159459

  13. Accessibility percolation on n-trees

    Nowak, Stefan; Krug, Joachim

    2013-01-01

    Accessibility percolation is a new type of percolation problem inspired by evolutionary biology. To each vertex of a graph a random number is assigned and a path through the graph is called accessible if all numbers along the path are in ascending order. For the case when the random variables are independent and identically distributed, we derive an asymptotically exact expression for the probability that there is at least one accessible path from the root to the leaves in an $n$-tree. This p...

  14. Open Access for the Australian Medical Librarian

    Morrison, Heather; Waller, Andrew

    2008-01-01

    “An old tradition and a new technology have converged to make possible an unprecedented public good” (Budapest Open Access Initiative)1. Recent events are transforming the possibility of this unprecedented public good into a reality, with medical literature leading the way. The Directory of Open Access Journals lists close to 3,200 fully open access, peer-reviewed scholarly journals as of February 2008. More than 400 of the journals in DOAJ are in the health sciences. DOAJ is growing rapi...

  15. Open access in Southern European Countries

    Abadal, Ernest; Anglada, Lluís; Abad, Francisca; André, Francis; Badolato, Anne-Marie; Barthet, Emilie; Cassella, Maria; Creppy, Rachel; Gargiulo, Paola; Georgiou, Panos; Gurdal, Gultekin; Lutz, Jean-François; Melero, Remedios; Moral, Aynur; Naud, Mariette

    2010-01-01

    CONTENTS 1 Presentation 11 2 Introduction 13 3 Open access in France 15 3.1 Introduction 15 3.2 Background 16 3.2.1 Institutional background 20 3.2.2 Historical background 3.3 Open access journals in France 3.3.1 How the list of open access journals was compiled 3.3.2 Comments 3.4 Open archives in France 3.4.1 How the list of repositories was compiled 3.4.2 Comments 3.5 Large digitization program...

  16. Access control and personal identification systems

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  17. Open Access Policy for CERN Physics Publications

    2014-01-01

    CERN is committed to Open Access. It represents one of the values written in our Convention sixty years ago and is increasingly important for our Member States.   In the last edition of the Bulletin, this article described how CERN is doing with regards to open access publishing today. On Thursday this week, the Open Access Policy for CERN Physics Publications* was endorsed by the Scientific Information Policy Board (SIPB) and approved by the Director-General the same day . For any clarifications regarding the policy, please contact the Scientific Information Service library.desk@cern.ch. * A French version of the policy will be made available shortly.

  18. Open Access to essential health care information

    Pandey Manoj

    2004-12-01

    Full Text Available Abstract Open Access publishing is a valuable resource for the synthesis and distribution of essential health care information. This article discusses the potential benefits of Open Access, specifically in terms of Low and Middle Income (LAMI countries in which there is currently a lack of informed health care providers – mainly a consequence of poor availability to information. We propose that without copyright restrictions, Open Access facilitates distribution of the most relevant research and health care information. Furthermore, we suggest that the technology and infrastructure that has been put in place for Open Access could be used to publish download-able manuals, guides or basic handbooks created by healthcare providers in LAMI countries.

  19. Environmental Research Division's Data Access Program (ERDDAP)

    National Oceanic and Atmospheric Administration, Department of Commerce — ERDDAP (the Environmental Research Division's Data Access Program) is a data server that gives you a simple, consistent way to download subsets of scientific...

  20. Minnesota Walk-In Access Sites

    Minnesota Department of Natural Resources — The Minnesota Walk-In Access site (WIA) GIS data represents areas of private land that have been made open to the public for the purpose of walk-in (foot travel)...

  1. Decision Analysis of Dynamic Spectrum Access Rules

    Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

    2011-12-01

    A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

  2. Highly Migratory Species Open Access Vessel Permits

    National Oceanic and Atmospheric Administration, Department of Commerce — This database identifies the universe of (permitted) vessels participating in open access commercial and recreational Atlantic highly migratory species (HMS)...

  3. Inequality and access to health care.

    Davis, K

    1991-01-01

    Health services research has laid the groundwork for ongoing policy debates over the shortcomings of the American health care system and the need for the expansion of health insurance protection. In the early 1970s, studies of inequality in access to medical care provided the basis for proposals for national health insurance. The examination of the impact of Medicare and Medicaid demonstrated the critical role of these governmental efforts in reducing inequalities in access to care. By the 1980s the focus of investigation turned to the impact of policies designed to contain the cost of health care on access to medical services by vulnerable populations. Documentation of the negative health outcomes that followed from restrictions on access to care has set the stage for a renewed debate over universal health insurance. PMID:1791790

  4. Accessible Near-Earth Objects (NEOs)

    Barbee, Brent W.

    2015-01-01

    Near Earth Objects (NEOs) are asteroids and comets whose orbits are in close proximity to Earth's orbit; specifically, they have perihelia less than 1.3 astronomical units. NEOs particularly near Earth asteroids (NEAs) are identified as potential destinations for future human exploration missions. In this presentation I provide an overview of the current state of knowledge regarding the astrodynamical accessibility of NEAs according to NASA's Near Earth Object Human Space Flight Accessible Targets Study (NHATS). I also investigate the extremes of NEA accessibility using case studies and illuminate the fact that a space-based survey for NEOs is essential to expanding the set of known accessible NEAs for future human exploration missions.

  5. Open Access publishing in physics gains momentum

    2006-01-01

    The first meeting of European particle physics funding agencies took place on 3 November at CERN to establish a consortium for Open Access publishing in particle physics, SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). Open Access could transform the academic publishing world, with a great impact on research. The traditional model of research publication is funded through reader subscriptions. Open Access will turn this model on its head by changing the funding structure of research results, without increasing the overall cost of publishing. Instead of demanding payment from readers, publications will be distributed free of charge, financed by funding agencies via laboratories and the authors. This new concept will bring greater benefits and broaden opportunities for researchers and funding agencies by providing unrestricted distribution of the results of publicly funded research. The meeting marked a positive step forward, with international support from laboratories, fundin...

  6. UCL preparations for Federated Access Management

    Stone, M

    2008-01-01

    A case study on UCL's preparations for federated access to electronic library resources using Shibboleth technology. Describes the context of UCL Library Services, the decision-making process, practical considerations, current plans, and the user experience

  7. CDC STATE System Tobacco Legislation - Youth Access

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  8. M2M massive wireless access

    Zanella, Andrea; Zorzi, Michele; Santos, André F.;

    2013-01-01

    In order to make the Internet of Things a reality, ubiquitous coverage and low-complexity connectivity are required. Cellular networks are hence the most straightforward and realistic solution to enable a massive deployment of always connected Machines around the globe. Nevertheless, a paradigm...... shift in the conception and design of future cellular networks is called for. Massive access attempts, low-complexity and cheap machines, sporadic transmission and correlated signals are among the main properties of this new reality, whose main consequence is the disruption of the development...... Access Reservation, Coded Random Access and the exploitation of multiuser detection in random access. Additionally, we will show how the properties of machine originated signals, such as sparsity and spatial/time correlation can be exploited. The end goal of this paper is to provide motivation...

  9. Digitisation for access to preserved documents

    Majlis Bremer-Laamanen

    2003-06-01

    Full Text Available Today the digitisation of our collections is a goal for libraries all over Europe. The choices we make in digitisation and preservation now will have a significant impact on the future. Do we only emphasise access? How do we enable access and preserve our originals in a qualitative and productive way? What will actually be left of our cultural heritage in the next millennium? In this paper I am going to look at promoting access to preserved originals mirrored by the experience at the Helsinki University Library, the National Library of Finland: · Preservation activities as platform for digitisation and OCR · Processing access to collections · The future - looking ahead

  10. A Conceptual Framework of Mapping Access to Health Care across EU Countries: The Patient Access Initiative.

    Souliotis, Kyriakos; Hasardzhiev, Stanimir; Agapidaki, Eirini

    2016-01-01

    Research evidence suggests that access to health care is the key influential factor for improved population health outcomes and health care system sustainability. Although the importance of addressing barriers in access to health care across European countries is well documented, little has been done to improve the situation. This is due to different definitions, approaches and policies, and partly due to persisting disparities in access within and between European countries. To bridge this gap, the Patient Access Partnership (PACT) developed (a) the '5As' definition of access, which details the five critical elements (adequacy, accessibility, affordability, appropriateness, and availability) of access to health care, (b) a multi-stakeholders' approach for mapping access, and (c) a 13-item questionnaire based on the 5As definition in an effort to address these obstacles and to identify best practices. These tools are expected to contribute effectively to addressing access barriers in practice, by suggesting a common framework and facilitating the exchange of knowledge and expertise, in order to improve access to health care between and within European countries. PMID:27237814

  11. Prevention and treatment of hemodialysis access thrombosis

    Smits, Johannes Henricus Maria

    2001-01-01

    Thrombosis of the vascular access is the main problem in hemodialysis therapy for end-stage renal disease. In most cases, thrombosis is associated with the presence of one or more stenoses in the access. These stenoses are due to progressive neointimal hyperplasia. In this thesis, methods are described to timely identify patients at risk of thrombosis, to treat the stenoses timely with an angioplasty procedure, to depict the stenotic lesions with a new imaging modality, and to treat the throm...

  12. EARS: Electronic Access to Reference Service.

    Weise, F O; Borgendale, M

    1986-01-01

    Electronic Access to Reference Service (EARS) is a front end to the Health Sciences Library's electronic mail system, with links to the online public catalog. EARS, which became operational in September 1984, is accessed by users at remote sites with either a terminal or microcomputer. It is menu-driven, allowing users to request: a computerized literature search, reference information, a photocopy of a journal article, or a book. This paper traces the history of EARS and discusses its use, i...

  13. SMES' SECTOR ACCESS TO FINANCE: AN OVERVIEW

    Roman Angela

    2011-01-01

    Through their contribution to the creation of added value and new jobs, the small and medium enterprises (SMEs) have a significant role in the economic and social development of a country. However, these enterprises are facing numerous obstacles that limit their performance, growth and development. Among the difficulties faced by SMEs, the access to finance is often reported as a major obstacle to the deployment and expansion of their activity. The access to finance is crucial for efficient a...

  14. Disk access controller for Multi 8 computer

    After having presented the initial characteristics and weaknesses of the software provided for the control of a memory disk coupled with a Multi 8 computer, the author reports the development and improvement of this controller software. He presents the different constitutive parts of the computer and the operation of the disk coupling and of the direct access to memory. He reports the development of the disk access controller: software organisation, loader, subprograms and statements

  15. 'High' Achievers? Cannabis Access and Academic Performance

    Marie, Olivier; Zölitz, Ulf

    2015-01-01

    This paper investigates how legal cannabis access affects student performance. Identification comes from an exceptional policy introduced in the city of Maastricht which discriminated legal access based on individuals’ nationality. We apply a difference-in-difference approach using administrative panel data on over 54,000 course grades of local students enrolled at Maastricht University before and during the partial cannabis prohibition. We find that the academic performance of students who a...

  16. Design of Reversible Random Access Memory

    Mamun, Md. Selim Al; Hossain, Syed Monowar

    2013-01-01

    Reversible logic has become immensely popular research area and its applications have spread in various technologies for their low power consumption. In this paper we proposed an efficient design of random access memory using reversible logic. In the way of designing the reversible random access memory we proposed a reversible decoder and a write enable reversible master slave D flip-flop. All the reversible designs are superior in terms of quantum cost, delay and garbage outputs compared to ...

  17. Speed Measurements of Residential Internet Access

    Goga, Oana; Teixeira, Renata

    2012-01-01

    The spread of residential broadband Internet access is raising the question of how to measure Internet speed. We argue that available bandwidth is a key metric of access link speed. Unfortunately, the performance of available bandwidth estimation tools has rarely been tested from hosts connected to residential networks. This paper compares the accuracy and overhead of state-of-the-art available bandwidth estimation tools from hosts connected to commercial ADSL and cable networks. Our results ...

  18. Access control issues in social networks

    Carreras Coch, Anna; Rodríguez Luna, Eva; Delgado Mercè, Jaime; Maroñas Borras, Xavier

    2010-01-01

    Social Networks, as the main axis of Web 2.0, are creating a number of interesting challenges to the research and standardisation communities. In this paper, we analyse the current and future use of access control policies in Social Networks. Subsequently, two main issues are addressed: the interoperability amongst systems using different policy languages and the lack of elements in the existing policy languages when trying to express Social Networks’ access control. In part...

  19. Single access retroperitoneoscopic adrenalectomy: initial experience

    Beiša, Virgilijus; Kildušis, Edvinas; Strupas, Kęstutis

    2011-01-01

    Today, endoscopic adrenalectomy has become a gold standard in endocrine surgery. To minimize the morbidity and improve cosmesis, single access retroperitoneoscopic adrenalectomy (SARA) has been developed as an alternative to traditional multiport laparoscopy and single port access (SPA) surgery, potentially exploiting even more the already proven benefits of minimally invasive surgery. We applied the SARA technique to adrenalectomy using the posterior retroperitoneal approach. The aim is to h...

  20. Corporate Social Responsibility and Access to Finance

    Cheng, Beiting; Ioannou, Ioannis; Serafeim, Georgios

    2012-01-01

    In this paper, we investigate whether superior performance on corporate social responsibility (CSR) strategies leads to better access to finance. We hypothesize that better access to finance can be attributed to a) reduced agency costs due to enhanced stakeholder engagement and b) reduced informational asymmetry due to increased transparency. Using a large cross-section of firms, we find that firms with better CSR performance face significantly lower capital constraints. Moreover, we provide ...

  1. Optimized access to distributed relational database system

    Hrivnac, J.

    2006-01-01

    Efficient and friendly access to the large amount of data distributed over the wide area network is a challenge for the near future LCG experiments. The problem can be solved using current standard open technologies and tools. A JDBC standard soution has been chosen as a base for a comprehensive system for the relational data access and management. Widely available open tools have been reused and extended to satisfy HEP needs.

  2. Licensing Revisited: Open Access Clauses in Practice

    2012-01-01

    Open access increases the visibility and use of research outputs and promises to maximize the return on our public investment in research. However, only a minority of researchers will "spontaneously" deposit their articles into an open access repository. Even with the growing number of institutional and funding agency mandates requiring the deposit of papers into the university repository, deposit rates have remained stubbornly low. As a result, the responsibility for populating repositories ...

  3. Photonic-assisted ultrafast THz wireless access

    Yu, Xianbin; Chen, Ying; Galili, Michael;

    THz technology has been considered feasible for ultrafast wireless data communi- cation, to meet the increasing demand on next-generation fast wireless access, e.g., huge data file transferring and fast mobile data stream access. This talk reviews recent progress in high-speed THz wireless...... communications enabled by photonics technologies, as well as the needed technical breakthroughs for achieving ultrafast data rates beyond 100Gbit/s...

  4. FDI Technological Spillovers and Access to Credit

    Vlad Manole; Mariana Spatareanu

    2014-01-01

    Using a unique data set from the Czech Republic for 1994-2003, this study examines the relationship between technological spillovers from FDI and firms’ access to external finance. The empirical analysis indicates that overall, Czech firms benefit little from technological spillovers from FDI. However, a closer look at the financing of domestic firms suggests that firms that have access to external finance enjoy larger benefits from the presence of foreign firms, through increased productivit...

  5. Travel Time Variability and Airport Accessibility

    Koster, P.R.; Kroes, E.P.; Verhoef, E.T.

    2010-01-01

    This discussion paper resulted in a publication in Transportation Research Part B: Methodological (2011). Vol. 45(10), pages 1545-1559. This paper analyses the cost of access travel time variability for air travelers. Reliable access to airports is important since it is likely that the cost of missing a flight is high. First, the determinants of the preferred arrival times at airports are analyzed, including trip purpose, type of airport, flight characteristics, travel experience, type of che...

  6. Tariff-Tax Reforms and Market Access

    Kreickemeier, Udo; Raimondos-Møller, Pascalis

    2006-01-01

    Reducing tariffs and increasing consumption taxes is a standard IMF advice to countries that want to open up their economy without hurting government finances. Indeed, theoretical analysis of such a tariff-tax reform shows an unambiguous increase in welfare and government revenues. The present pa...... efficient proposal to follow both as far as it concerns market access and welfare.JEL code: F13, H20.Keywords: Market access; tariff reform, consumption tax reform....

  7. Universal Accessibility as a Multimodal Design Issue

    Obrenovic, Z.; Abascal, J.; Starcevic, D

    2007-01-01

    In recent years, many research activities have focused on design that aims to produce universally accessible systems, taking into account special needs of various user groups. These special needs are associated with many user factors, such as impairments of speech, hearing or vision, cognitive limitations, aging, as well as with various environmental factors. Fields that address this problem, such as Usability, Universal Accessibility, Universal Design, or Inclusive Design have been developed...

  8. Flexible And Secure Access To Computing Clusters

    Jan Meizner; Maciej Malawski; Marian Bubak

    2010-01-01

    The investigation presented in this paper was prompted by the need to provide a manageablesolution for secure access to computing clusters with a federated authentication framework.This requirement is especially important for scientists who need direct access to computingnodes in order to run their applications (e.g. chemical or medical simulations) with proprietary,open-source or custom-developed software packages. Our existing software, whichenables non-Web clients to use Shibboleth-secured...

  9. Access 2007 for Starters: The Missing Manual

    MacDonald, Matthew

    2009-01-01

    This fast-paced book teaches you the basics of Access 2007 so you can start using the program right away. You'll learn how to design databases, maintain them, search for valuable nuggets of information, and build attractive forms for quick-and-easy data entry. The new Access is radically different from previous versions, but with this book, you'll breeze through the new interface and its timesaving features in no time.

  10. String Analysis for Dynamic Field Access

    Madsen, Magnus; Andreasen, Esben

    2014-01-01

    In JavaScript, and scripting languages in general, dynamic field access is a commonly used feature. Unfortunately, current static analysis tools either completely ignore dynamic field access or use overly conservative approximations that lead to poor precision and scalability. We present new string...... with the Η domain gains significant precision resulting in an analysis speedup of more than 1.5x for 7 out of 10 benchmark programs....

  11. Integrated Access to Hybrid Information Resources

    Tamar Sadeh

    2003-01-01

    This paper is entitled "Integrated access to hybrid information resources", but integrated access is just a means to reach an end. Our challenge is to create an integrated environment in a heterogeneous world. Users are not aware, and do not want to be aware, of the differences between the various information resources that their institution provides. All they want is to be able to attain the information they are looking for, in the simplest and most straightforward way possible.

  12. High-impact open access journals

    Vallez, Mari; Pagès i Camps, Gerard

    2014-01-01

    Poster presentado en el LIBER 43rd Annual Conference . Se muestra la herramienta "High-impact open access journals ¿" creada por la Biblioteca de la Universitat Oberta de Catalunya¿. Esta herramienta facilita una lista de revistas de acceso abierto recogidas en el Directory of Open Access Journals (DOAJ) que tienen factor de impacto en el Journal Citation Reports 2011 o están enSCImago Journal Rank.

  13. Huddersfield Open Access Publishing final report

    Stone, Graham; White, Sue; Robinson, Denise; Pitchford, Ian; Edmunds, Cherry

    2012-01-01

    The Huddersfield Open Access Publishing (HOAP) Project aimed to develop a low cost sustainable journal publishing platform using EPrints software. The development of the HOAP platform has three main outcomes as part of the project. It has been used to convert the University journal, Teaching in Lifelong Learning, from its existing model of a print subscription journal to an open access e-journal. A specific front end has been created for the journal, with content being archived in the Uni...

  14. Should access to credit be a right?

    Hudon, Marek

    2009-01-01

    Discussion on financial ethics increasingly includes the problem of exclusion of the poorer segments of society from the financial system and access to credit. This paper explores the ethical dimensions surrounding the concept of a human right to credit. If access to credit is directly instrumental to economic development, poverty reduction and the improved welfare of all citizens, then one can proclaim, as Nobel Prize Laureate M. Yunus has done, that it is a moral necessity to establish cred...

  15. Enclosure and open access in communication scholarship

    Morrison, Heather

    2011-01-01

    The current state of scholarly communication is one of contest between an increasingly commercial system that is dysfunctional and incompatible with the basic aims of scholarship, and emerging alternatives, particularly open access publishing and open access archiving. Two approaches to facilitating global participation in scholarly communication are contrasted in this paper; equity is seen as a superior goal to the donor model, which requires poverty or inequity to succeed. The current stat...

  16. Open access and scholarly communication, part 4

    Eden, Brad

    2009-01-01

    This fourth e-book on the subject of open access in the academic field includes a Latin American case study on open access penetration, a paper from Germany on the promotion of OA illustrated by a project at the University of Konstanz, and a case study on OA at Bioline International, a non-profit scholarly publications aggregator, distributor, publisher and publishing assistance service.

  17. Child Access Prevention Laws and Nonfatal Gun

    Jeffrey DeSimone; Sara Markowitz

    2013-01-01

    Many states have passed child access prevention (CAP) laws, which hold the gun owner responsible if a child gains access to a gun that is not securely stored. Previous research on CAP laws has focused exclusively on gun-related deaths even though most gun injuries are not fatal. We use annual hospital discharge data to investigate whether CAP laws are associated with decreased nonfatal gun injuries. Results from Poisson regressions that control for various hospital, county, and state characte...

  18. Compulsory licensing and access to drugs

    Stavropoulou, C; Valletti, T.

    2015-01-01

    Compulsory licensing allows the use of a patented invention without the owner's consent, with the aim of improving access to essential drugs. The pharmaceutical sector argues that, if broadly used, it can be detrimental to innovation. We model the interaction between a company in the North that holds the patent for a certain drug and a government in the South that needs to purchase it. We show that both access to drugs and pharmaceutical innovation depend largely on the Southern country's abi...

  19. Time limiting of access to the Internet

    Medvešček, Edi

    2013-01-01

    The thesis deals with time limiting of access to the Internet. In the first part of the thesis we present and analyse already existing solutions of such restricted Internet usage, whereas in the second part, our own application for time limiting is developed. We built into the application various functionalities, allowing the user a number of possibilities for limiting the access to the Internet. We mainly focused on security and reliability, with special attention paid to the potential avoid...

  20. 75 FR 35439 - Medical Diagnostic Equipment Accessibility Standards

    2010-06-22

    ... TRANSPORTATION BARRIERS COMPLIANCE BOARD Medical Diagnostic Equipment Accessibility Standards AGENCY... consultation with the Food and Drug Administration, to issue accessibility standards for medical diagnostic... accessibility needs of individuals with disabilities with respect to medical diagnostic equipment and...

  1. Open Access an deutschen Hochschulen : Institutional Repositories und die Informationsplattform open-access.net

    Hätscher, Petra

    2007-01-01

    Open access is an important topic at universities in Germany: for the scientists as producers of scientific publications, for the university administration as financial backers, and for libraries as information suppliers. This article gives an overview of the current discussions and the developments of open access at theuniversities. It focuses particularly on the expansion of institutional repositories and the use of open access journals, giving a short description of the information platfor...

  2. Access networks for mobility: a techno-economic model for broadband access technologies

    Pereira, João Paulo; Ferreira, Pedro

    2009-01-01

    The two main challenges for the access networks are the increasing bandwidth demand and mobility trends. The "triple play" services required (Internet, telephone and TV services) lead to a great increase in bandwidth demand. However, the existing access networks are not able to support this increase, and the capacity to delivery broadband services remain as a challenge ("last mile problem"). The access network remains a bottleneck in terms of the bandwidth and service quality it affords the e...

  3. Using Accession to investigate accessibility induced social exclusion in Edinburgh and the Lothians

    Weir, Andrew

    2008-01-01

    An exploratory analysis of accessibility-based social exclusionary mechanisms in Edinburgh and the Lothians is presented, with the aim of highlighting the benefits of a technique that incorporates socio-geodemographic variables. Accession software is used to produce accessibility times to three different types of services. Postcode centroids are used to represent centres of population, while the Navteq road network and latest public transport timetables are used to model the transport network...

  4. The size distribution of Open Access publishers – a problem for Open Access?

    Frantsvåg, Jan Erik

    2010-01-01

    I stumbled across the question of publisher size while preparing for an earlier article. From the viewpoint of an economist, the size distribution of open access publishers looked inefficient. In this article I first explore reasons to be sceptical to a situation with a large number of small publishers. Then I go through the numbers from the directory of Open Access Journals, also discussing problems inherent in the material. The results are then compared to similar data about toll access pub...

  5. Open Access - Ein Wundermittel? Wissenschaft, Gesellschaft, Demokratie, Digital Divide

    Herb, Ulrich

    2007-01-01

    Claims for Open Access are mostly underpinned with a)science-related (Open Access accelerates scientific communication) b) financial (Open Access alleviates the serials crisis), c) social (Open Access reduces the Digital Divide), d) democracy-related (Open Access facilitates participation) and socio-political (Open Access levels disparities) arguments. Using sociological concepts and notions this contribution analyses some of the presumptions mentioned. Naiveties as the assu...

  6. How OSI is helping to make open access happen

    Friend, Frederick J.

    2004-01-01

    The Open Access Project builds upon the principles outlined in the Budapest Open Access Initiative (BOAI) and aims to assist the international effort to make research articles in all academic fields freely available online. The Open Access Project: Supports authors and institutions from the OSI region to publish articles in open access journals, Supports the development of business guides for open access journals , Spreads awareness of the benefits of open access by hosting meetings of publis...

  7. Biometric Alternatives to CAPTCHA: Exploring Accessible Interface Options

    Foley, Anita

    2012-01-01

    In the computing domain the relationship between accessibility and security is a complex and evolving one; accessibility attempts to ensure that as wide a range of individuals as possible are granted access to systems, whereas security attempts to restrict access only to individuals who are entitled to access those systems. A key security concern is to determine whether or not the system is being accessed by a software agent or a real human being, and a number of approaches have been develope...

  8. Morphophysiological characterization of giant missionary grass accessions

    Cristiano Reschke Lajús

    2011-11-01

    Full Text Available In this study, the phenotypic diversity of five accessions of giant missionary grass (Axonopus jesuiticus × A. scoparius was evaluated by using morphophysiological traits. Accessions V 14337, V 14403, V 14404, V 14405 and V 14406 are hybrids derived from spontaneous crossing that occurred in Vale do Itajaí, Santa Catarina, Brazil. Plants were cultivated in greenhouse and evaluated at 60, 90, 120, 150, 180, 210 and 240 days of growth. Variation was observed for dry matter production, phenology and morphological traits, showing the possibility of selection. Flowering started at 210 days of growth and only in accessions V 14337 and V 14404. The Mahalanobis distance among accessions ranged from 35.64 (V 14403 and V 14405 to 183.38 (V 14337 and V 14405, and three groups were formed, based on 17 vegetative morphophysiological traits evaluated in plants with 180 days of growth: G1 (V 14403, V 14405, G2 (V 14406 and G3 (V 14337, V 14404. Group I presented the greatest dry matter production of stolon and aboveground, which were the traits with the largest relative contribution to genetic divergence, 38.67% and 38.31%, respectively. Accessions V 14403 and V 14405 are the most promising for agronomic evaluations that address their records as forage cultivars.

  9. Airport Surface Access and Mobile Apps

    Luis Martin-Domingo

    2015-02-01

    Full Text Available Purpose: Airport Surface Access faces two main opposite issues: (1 cars, being the main transport mode, contribute to the increasing level of congestion and pollution of cities; and (2 simultaneously, parking fees are one important source of airports commercial revenue, creating a dilemma for airports when facing the problem. Following the recent trend of air passengers travelling with Smartphone (78% in 2013, the purpose of this paper is to monitor the adoption of mobile Applications (Apps by airports and to analyze if the information and functions provided in those Apps can help to overcome the above two issues. Design/methodology/approach: 31 iPhone App of some of the largest European airports were evaluated in the lab using the evaluation model of Destinations Mobile Applications (Scolari and Fernández-Cavia 2014 adapted for for the Airport Surface Access on Airport Apps Findings and Originality/value: The Apps evaluated provided a very limited functionality to help passengers to plan and book their trips to/from the airports on public transports and gave high priority to parking information and services. Originality/value: Although Airport Surface Access has been a widely researched, the originality of this paper is the analysis of airport mobile Apps as a potential tool for airports to deal with the surface airport access problems.Access, Airports, Mobile Internet, Commercial Revenues

  10. Open Access Publishing in Particle Physics

    2007-01-01

    Particle Physics, often referred to as High Energy Physics (HEP), spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-Web era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peerreview system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs...

  11. NESDIS OSPO Data Access Policy and CRM

    Seybold, M. G.; Donoho, N. A.; McNamara, D.; Paquette, J.; Renkevens, T.

    2012-12-01

    The Office of Satellite and Product Operations (OSPO) is the NESDIS office responsible for satellite operations, product generation, and product distribution. Access to and distribution of OSPO data was formally established in a Data Access Policy dated February, 2011. An extension of the data access policy is the OSPO Customer Relationship Management (CRM) Database, which has been in development since 2008 and is reaching a critical level of maturity. This presentation will provide a summary of the data access policy and standard operating procedure (SOP) for handling data access requests. The tangential CRM database will be highlighted including the incident tracking system, reporting and notification capabilities, and the first comprehensive portfolio of NESDIS satellites, instruments, servers, applications, products, user organizations, and user contacts. Select examples of CRM data exploitation will show how OSPO is utilizing the CRM database to more closely satisfy the user community's satellite data needs with new product promotions, as well as new data and imagery distribution methods in OSPO's Environmental Satellite Processing Center (ESPC). In addition, user services and outreach initiatives from the Satellite Products and Services Division will be highlighted.

  12. Open Access Initiatives in India - an Evaluation

    Leila Fernandez

    2006-03-01

    Full Text Available Developing countries have embraced open access with a view to promoting visibility of research done in these regions. Open access initiatives described in this paper are based on interviews with information professionals responsible for creation and maintenance of online research repositories in India. Open access journals, e-print archives and e-theses repositories are covered with an emphasis on the sciences including the physical sciences, mathematics and the biomedical sciences. Existing repositories were identified from the Registry of Open Access Repositories located at http://archives.eprints.org. Key contacts were facilitated by well-known local open access advocates. Participants were contacted by e-mail and sites visited wherever possible. Many universities in India are at present lacking in infrastructure for establishing institutional repositories, so most of the institutions visited were research institutes and informatics centres. Semi-structured interviews were conducted to ascertain the background of participants, institutional culture, software selection, nature of funding, submission policies and future plans of these repositories. Also covered were promotion methods, user feedback and institutional support. Barriers to setting up institutional repositories are identified in this paper. Special features are described. Based on participant feedback a list of best practices is presented. The study has definite implications for the role of Canadian librarians in the promotion of Canadian research.

  13. Licensing Revisited: Open Access Clauses in Practice

    Birgit Schmidt

    2012-11-01

    Full Text Available Open access increases the visibility and use of research outputs and promises to maximize the return on our public investment in research. However, only a minority of researchers will "spontaneously" deposit their articles into an open access repository. Even with the growing number of institutional and funding agency mandates requiring the deposit of papers into the university repository, deposit rates have remained stubbornly low. As a result, the responsibility for populating repositories often falls onto the shoulders of library staff and/or repository managers. Populating repositories in this way – which involves obtaining the articles, checking the rights, and depositing articles into the repository – is time consuming and resource intensive work.The Confederation of Open Access Repositories (COAR, a global association of repository initiatives and networks, is promoting a new strategy for addressing some of the barriers to populating repositories, involving the use of open access archiving clauses in publisher licenses. These types of clauses are being considered by consortia and licensing agencies around the world as a way of ensuring that all the papers published by a given publisher are cleared for deposit into the institutional repository. This paper presents some use cases of open access archiving clauses, discusses the major barriers to implementing archiving language into licenses, and describes some strategies that organizations can adopt in order to include such clauses into publisher licenses.

  14. Karyotypic characterization of Capsicum sp. accessions

    Willame Rodrigues do Nascimento Souza

    2015-05-01

    Full Text Available This study aimed to determine the chromosome number and the karyotype of Capsicum annuum, Capsicum chinense, Capsicum frutencens and Capsicum baccatum accessions in the active Capsicum sp. genebank at the Federal University of Piauí (BGC-UFPI. These species have great economic importance throughout the world, and their cytogenetic characterization can inform taxonomy and lead to improvement in the genus. Karyotypes were obtained from the rootlet meristems of the studied accessions using the squash method and Giemsa staining. The chromosome number 2n=2x=24 was verified for each of the four species. Chromosomal polymorphisms were observed for the C. frutencens accession BGC 37, which presented 12 pairs of metacentric chromosomes instead of 11 pairs of metacentric chromosomes and 1 submetacentric chromosome pair present in other accessions. In the accessions BGC 01 and BGC 37, secondary constrictions were observed in the 1 and 12 as well as in the 6 and 11 homologs, respectively. The karyotypes of the studied species were asymmetrical among themselves. The results obtained in this study confirm the high genetic diversity previously described in the literature for this genus.

  15. Access to surgical assistance: challenges and perspectives

    Maria Fernanda do Prado Tostes

    2016-01-01

    Full Text Available Objective to characterize the access to surgical assistance in Brazil. Method documentary study, with a quantitative approach, developed from information of the Caixa Preta da Saúde [Health Black Box] database, of the Brazilian Medical Association. Results in the one-year period 3773 cases related to health care in Brazil were recorded. There were 458 (12.3% records on surgical assistance. Of these, most, 339 (74.1%, involved the lack of access in all regions of Brazil. The main access constraint was the prolonged waiting time for surgery. Other constraints were the excessive waiting for medical appointment with experts, doing examinations and cancellation of surgeries. Conclusion the access to surgical assistance, by users of the Brazilian health system, is not widely guaranteed, reinforcing the need for integrated governmental actions, organization of the health care network, management of health care and human resources to overcome the challenges imposed to achieve the Universal Access to Health and Universal Health Coverage.

  16. Public Interest in Accessing the INIS Collection

    Since its creation in 1970, the International Nuclear Information System (INIS) has collected and provided access to more than 3.8 million bibliographic references to publications, documents, technical reports, non‐copyrighted documentation, and other grey literature, as well as over a million full texts. Overall, there are 800 GB of data in the INIS repository. Public interest in accessing this collection has been remarkable. This year alone, there were more than one million sessions and almost two million page views. During the same period, there were 1.6 million full text document downloads. The INIS collection consists of seven types of literature – computer media, patents, books, reports, journal articles, miscellaneous and audio‐visuals. This paper provides an overview of the INIS collection subject coverage, and the distribution of different types of grey literature. It also provides INIS repository access statistics based on Google Analytics and other Web search data pertaining to public interest in accessing these different types of literature and the uniqueness of the collection. As one of the world's largest collections of published information on the peaceful uses of nuclear science and technology, INIS represents an extraordinary example of world cooperation. 154 INIS members share and allow access to their valuable nuclear information resources, preserving them for future generations and offering a freely available nuclear knowledge repository. (author)

  17. Access to Space Interactive Design Web Site

    Leon, John; Cutlip, William; Hametz, Mark

    2000-01-01

    The Access To Space (ATS) Group at NASA's Goddard Space Flight Center (GSFC) supports the science and technology community at GSFC by facilitating frequent and affordable opportunities for access to space. Through partnerships established with access mode suppliers, the ATS Group has developed an interactive Mission Design web site. The ATS web site provides both the information and the tools necessary to assist mission planners in selecting and planning their ride to space. This includes the evaluation of single payloads vs. ride-sharing opportunities to reduce the cost of access to space. Features of this site include the following: (1) Mission Database. Our mission database contains a listing of missions ranging from proposed missions to manifested. Missions can be entered by our user community through data input tools. Data is then accessed by users through various search engines: orbit parameters, ride-share opportunities, spacecraft parameters, other mission notes, launch vehicle, and contact information. (2) Launch Vehicle Toolboxes. The launch vehicle toolboxes provide the user a full range of information on vehicle classes and individual configurations. Topics include: general information, environments, performance, payload interface, available volume, and launch sites.

  18. Freeing up access to CERN technology

    Joannah Caborn Wengler

    2012-01-01

    In line with CERN’s principle of maximising the dissemination of knowledge to society, the Knowledge Transfer (KT) Group has launched a new collaborative initiative to share the products of CERN’s scientific and technological labours: Easy Access IP, where IP stands for intellectual property.   CERN has a whole portfolio of dissemination channels designed and implemented by the KT Group, with Easy Access IP being the latest addition. “Inspired by the UK’s Easy Access Innovation initiative, our scheme involves making some of CERN's technologies available royalty-free and through a more agile licensing process,” explains Giovanni Anelli, head of the Group. “This approach seems to be an appropriate model for CERN, where the ultimate goal of technology transfer is not to generate income but to transfer knowledge to external partners.” The new scheme, as the name suggests, is designed to make it easier for industry and othe...

  19. Access Control Management for SCADA Systems

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  20. Observer Access to the Cherenkov Telescope Array

    Knödlseder, Jürgen; Boisson, Catherine; Brau-Nogué, Sylvie; Deil, Christoph; Khélifi, Bruno; Mayer, Michael; Walter, Roland

    2015-01-01

    The Cherenkov Telescope Array (CTA), a ground-based facility for very-high-energy (VHE) gamma-ray astronomy, will operate as an open observatory, serving a wide scientific community to explore and to study the non-thermal universe. Open community access is a novelty in this domain, putting a challenge on the implementation of services that make VHE gamma-ray astronomy as accessible as any other waveband. We present here the design of the CTA Observer Access system that comprises support of scientific users, dissemination of data and software, tools for scientific analysis, and the system to submit observing proposals. We outline the scientific user workflows and provide the status of the current developments.

  1. Open Access Data Sharing in Genomic Research

    Stacey Pereira

    2014-08-01

    Full Text Available The current emphasis on broad sharing of human genomic data generated in research in order to maximize utility and public benefit is a significant legacy of the Human Genome Project. Concerns about privacy and discrimination have led to policy responses that restrict access to genomic data as the means for protecting research participants. Our research and experience show, however, that a considerable number of research participants agree to open access sharing of their genomic data when given the choice. General policies that limit access to all genomic data fail to respect the autonomy of these participants and, at the same time, unnecessarily limit the utility of the data. We advocate instead a more balanced approach that allows for individual choice and encourages informed decision making, while protecting against the misuse of genomic data through enhanced legislation.

  2. Metrics and Evaluation Models for Accessible Television

    Li, Dongxiao; Looms, Peter Olaf

    2014-01-01

    The adoption of the UN Convention on the Rights of Persons with Disabilities (UN CRPD) in 2006 has provided a global framework for work on accessibility, including information and communication technologies and audiovisual content. One of the challenges facing the application of the UN CRPD is...... compare. Using case studies from three emerging economies (Argentina, Brazil and China) as well as industrialized nations including Canada, Denmark, the United Kingdom and the USA), this paper examines the situation facing television accessibility. Having identified and discussed existing metrics and...... evaluation models for access service provision, the paper identifies options that could facilitate the evaluation of UN CRPD outcomes and suggests priorities for future research in this area....

  3. Spatially-Coupled Random Access on Graphs

    Liva, Gianluigi; Lentmaier, Michael; Chiani, Marco

    2012-01-01

    In this paper we investigate the effect of spatial coupling applied to the recently-proposed coded slotted ALOHA (CSA) random access protocol. Thanks to the bridge between the graphical model describing the iterative interference cancelation process of CSA over the random access frame and the erasure recovery process of low-density parity-check (LDPC) codes over the binary erasure channel (BEC), we propose an access protocol which is inspired by the convolutional LDPC code construction. The proposed protocol exploits the terminations of its graphical model to achieve the spatial coupling effect, attaining performance close to the theoretical limits of CSA. As for the convolutional LDPC code case, large iterative decoding thresholds are obtained by simply increasing the density of the graph. We show that the threshold saturation effect takes place by defining a suitable counterpart of the maximum-a-posteriori decoding threshold of spatially-coupled LDPC code ensembles. In the asymptotic setting, the proposed s...

  4. Planning Multitechnology Access Networks with Performance Constraints

    Chamberland, Steven

    Considering the number of access network technologies and the investment needed for the “last mile” of a solution, in today’s highly competitive markets, planning tools are crucial for the service providers to optimize the network costs and accelerate the planning process. In this paper, we propose to tackle the problem of planning access networks composed of four technologies/architectures: the digital subscriber line (xDSL) technologies deployed directly from the central office (CO), the fiber-to-the-node (FTTN), the fiber-to-the-micro-node (FTTn) and the fiber-to-the-premises (FTTP). A mathematical programming model is proposed for this planning problem that is solved using a commercial implementation of the branch-and-bound algorithm. Next, a detailed access network planning example is presented followed by a systematic set of experiments designed to assess the performance of the proposed approach.

  5. Accessible collaborative learning using mobile devices

    Mike Wald

    2014-09-01

    Full Text Available This paper describes accessible collaborative learning using mobile devices with mobile enhancements to Synote, the freely available, award winning, open source, web based application that makes web hosted recordings easier to access, search, manage, and exploit for all learners, teachers and other users. Notes taken live during lectures using Twitter on any mobile device can be automatically uploaded into Synote and synchronised with a recording of the lecture. Syntalk, a mobile speech recognition application enables synchronized live verbal contributions from the class to also be captured on Synote through captions. Synote Mobile has been developed as an accessible cross device and cross browser HTML5 version of Synote. Synote Discussion supports commenting on Synote’s Synmark notes stored as discussions in its own database and published as Linked data so they are available for Synote or other systems to use.

  6. CALCEPH: Planetary ephemeris files access code

    Gastineau, M.; Laskar, J.; Manche, H.; Fienga, A.

    2015-05-01

    CALCEPH accesses binary planetary ephemeris files, including INPOPxx, JPL DExxx ,and SPICE ephemeris files. It provides a C Application Programming Interface (API) and, optionally, a Fortran 77 or 2003 interface to be called by the application. Two groups of functions enable the access to the ephemeris files, single file access functions, provided to make transition easier from the JPL functions, such as PLEPH, to this library, and many ephemeris file at the same time. Although computers have different endianess (order in which integers are stored as bytes in computer memory), CALCEPH can handles the binary ephemeris files with any endianess by automatically swaps the bytes when it performs read operations on the ephemeris file.

  7. Flexible And Secure Access To Computing Clusters

    Jan Meizner

    2010-01-01

    Full Text Available The investigation presented in this paper was prompted by the need to provide a manageablesolution for secure access to computing clusters with a federated authentication framework.This requirement is especially important for scientists who need direct access to computingnodes in order to run their applications (e.g. chemical or medical simulations with proprietary,open-source or custom-developed software packages. Our existing software, whichenables non-Web clients to use Shibboleth-secured services, has been extended to providedirect SSH access to cluster nodes using the Linux Pluggable Authentication Modules mechanism.This allows Shibboleth users to run the required software on clusters. Validationand performance comparison with existing SSH authentication mechanisms confirm that thepresented tools satisfy the stated requirements.

  8. Internet Access from CERN GSM subscriptions

    IT Department

    2008-01-01

    The data service on GSM subscriptions has been improved, allowing CERN users to access the Internet directly. A CERN GSM subscription with data option now allows you to connect to the Internet from a mobile phone or a PC equipped with a GSM modem. The previous access (CERN intranet) still exists. To get access to the new service, you will find all the information on configurations at: http://cern.ch/gprs The use of this service on the Sunrise network is charged on a flat-rate basis (no extra charge related to the volume of downloaded data). Depending on your CERN subscription type (standard or master), you can also connect to foreign GSM data networks (roaming), but this is strongly discouraged, except where absolutely necessary, due to international roaming charges. Telecom Section, IT/CS

  9. A new perspective on the access process

    Bergenholtz, Henning; Gouws, Rufus

    2010-01-01

    Only 10 or 15 years ago, you had to spend hours, days or even weeks in libraries to find data of many kinds. Today, one has access to data at your desks at home. Therefore, the biggest problem for a real information society is not that you do not have access to the needed data, but that you cannot...... find it or that it takes so long to find it that you quit the search before finding the result. This is clearly shown by a Google search where you get so many results that can lead to a case of information stress or even worse information death. An easy search route and a short search time are...... important elements when trying to satisfy certain information needs. This topic is discussed based on two case studies: one concerning certain fixed expressions in seven Danish printed and electronic dictionaries and one concerning looking at different access attempts in six Afrikaans reference sources...

  10. Remote computer access through Android mobiles

    Jaya Bharathi Chintalapati

    2012-09-01

    Full Text Available In this paper, we will present the process to access the computers with the help of android mobile phones. This process is based on VNC (virtual network computing technique. So to work on this, we must install VNC server on our computer connected with Wi-Fi network. The user can access and perform operation through the range of Wi-Fi platforms like Linux, Mac, windows etc. The image of the desktop is compressed before it is transmitted to the cellular phone. There are several functions provided so as to ease the viewing on cell-phones. There is shortcut function that can be used to quickly access the frequently used area. Current key assignments can be viewed using guidance function. A user can view two areas simultaneously using a twin view function. The prototype is already implemented using java and tested on a java based cellular phone.

  11. Quantum Game Theory and Open Access Publishing

    Hanauske, M; Dugall, B; Bernius, Steffen; Dugall, Berndt; Hanauske, Matthias

    2006-01-01

    The digital revolution of the information age and in particular the sweeping changes of scientific communication brought about by computing and novel communication technology, potentiate global, high grade scientific information for free. The arXiv for example is the leading scientific communication platform, mainly for mathematics and physics, where everyone in the world has free access on. While in some scientific disciplines the open access way is successfully realized, other disciplines (e.g. humanities and social sciences) dwell on the traditional path, even though many scientists belonging to these communities approve the open access principle. In this paper we try to explain these different publication patterns by using a game theoretical approach. Based on the assumption, that the main goal of scientists is the maximization of their reputation, we model different possible game settings, namely a zero sum game, the prisoners' dilemma case and a version of the stag hunt game, that show the dilemma of sc...

  12. Business Models for Open Access. Copyright and Licensing under Open Access

    Stanchev, Peter

    2014-01-01

    The lecture analyses the traditional business model in scientific communication and describes the new emerging models in the context of Open Access. Copyright and licensing part provides an overview of the legal issues and copyright at the heart of Open Access.

  13. Performance analysis of multichannel medium access control algorithms for opportunistic spectrum access

    Pawelczak, P.; Pollin, S.; So, H.-S.W.; Bahai, A.R.S.; Prasad, R.V.; Hekmat, R.

    2009-01-01

    In this paper, different control channel (CC) implementations for multichannel medium access control (MAC) algorithms are compared and analyzed in the context of opportunistic spectrum access (OSA) as a function of spectrum-sensing performance and licensed user activity. The analysis is based on a d

  14. Availability and Accessibility in an Open Access Institutional Repository: A Case Study

    Lee, Jongwook; Burnett, Gary; Vandegrift, Micah; Baeg, Jung Hoon; Morris, Richard

    2015-01-01

    Introduction: This study explores the extent to which an institutional repository makes papers available and accessible on the open Web by using 170 journal articles housed in DigiNole Commons, the institutional repository at Florida State University. Method: To analyse the repository's impact on availability and accessibility, we conducted…

  15. Accessibility of U.S. Federal Government Home Pages: Section 508 Compliance and Site Accessibility Statements

    Olalere, Abiodun; Lazar, Jonathan

    2011-01-01

    U.S. federal websites are required to be accessible for people with impairments. However, despite the existing regulations and guidelines, many federal websites continue to be inaccessible, and accessibility policy statements available on federal websites often do not provide any useful information. This paper provides three contributions to the…

  16. Assessing Accessibility: How Accessible Are Online Courses for Students with Disabilities?

    Massengale, Lindsey R.; Vasquez, Eleazar, III

    2016-01-01

    Delivering course material in a manner that is accessible to all students including those with disabilities is important in the online environment. This article presents an analysis focusing on the accessibility of six courses presented through the Webcourses platform. Six professors volunteered one course for analysis. The tool used for analyzing…

  17. Percutaneous intervention for permanent hemodialysis access

    To evaluate the effectiveness of percutaneous transluminal angioplasty (PTA) and pulse-spray pharmacomechanical thrombolysis (PSPMT) using urokinase for the management of insufficient hemodyalitic access, and to identify contributory patency-related factors following interventional procedures. Between August 1995 and July 2001, 105 cases of insufficient hemodyalitic access involving 38 artificial arteriovenous fistulae (AVF) and 67 graft arteriovenous fistulae (AVG) were treated interventionally. The patients underwent PTA alone in 53 cases and PSPMT combined with in 47, and procedural success and long-term patency were evaluated in terms of a patient's age and sex, the presence of diadural, the location of access, the type of AVG, the draining vein of AVG, the presence of central vein stenosis, the degree of residual stenosis, and the method of interventional procedure, and contributory factors were thus identified. The overall technical success rate of interventional management was 83.3% (88/105), while the overall primary patency rate was 58.7±5.2% at 6 months 43.0±6.0% % at 1 year, and 18.1±6.0% at 2 years. In AVF/AVG groups, primary patency rates were 55.9±9.2%/57.8±6.5% at 6 months, 45.8±10.0%/42.7±8.4% at 1 year, and 21.8±9.8%/18.9±6.5% at 2 years. The overall secondary patency rate was 40.0±8.1% at 2 years. No contributory factors were found (95% confidence level), though patency of access decreased when residual stenosis was more than 30% (p=0.054). Interventional management of insufficient hemodylitic access has high success and patency rates, and is an effective primary method. There appear to be no contributory factors, though residual stenosis of more than 30% tends to decrease the patency of hemodialytic access

  18. Ultrasound Evaluation Before and After Hemodialysis Access

    Daryoush Saedi

    2009-01-01

    Full Text Available   "nThe basic concept of hemodialysis access is to make a route to the central circulation in CRF patients. Vascular access procedures and subsequent complications represent a major cause of morbidity, hospitalization and cost for hemodialysis patients. Native arteriovenous fistulas (AVFs are preferable to synthetic arteriovenous grafts because they are associated with a lower frequency of thrombosis and infection, as well as greater longevity. AVFs that are never usable and early graft failures are associated with the common problem of inadequate vessel (artery or vein selection. The surgeon’s preoperative physical examination is the primary basis for AVF versus graft selection. Only palpable veins are considered for construction of AVFs, and the more proximal draining venous anatomy is not known prior to the operation. Physical examination is the traditional surgical evaluation performed prior to hemodialysis access placement. Palpation and inspection are difficult in obese arms, and few patients have vessels that are visible throughout their entire course. Patients with end-stage renal disease have often had multiple venipunctures and numerous intravenous lines placed and thus have an increased likelihood of venous stenosis or occlusion. Central vein problems are difficult to detect at visual inspection. By colour Doppler analysis vessels can be assessed for size, stenosis, and occlusion. US mapping assists in surgical planning and is especially valuable in patients who are difficult surgical cases (eg, obesity, diabetes, history of prior access, elderly women.  "nThis lecture contains two separate sections: 1-Vascular mapping prior to access placement and 2-Fistula maturity by US evaluation. Ultrasonography (US is an excellent modality for hemodialysis access evaluation because it is  readily available, non-invasive and inexpensive. It avoids the risks associated with iodinated contrast material and ionizing radiation.   

  19. A new perspective on the access process

    Bergenholtz, Henning; Gouws, Rufus

    2010-01-01

    Only 10 or 15 years ago, you had to spend hours, days or even weeks in libraries to find data of many kinds. Today, one has access to data at your desks at home. Therefore, the biggest problem for a real information society is not that you do not have access to the needed data, but that you cannot find it or that it takes so long to find it that you quit the search before finding the result. This is clearly shown by a Google search where you get so many results that can lead to a case of info...

  20. Editorial: Making GIScience Research More Open Access

    Jiang, Bin

    2013-01-01

    This is the editorial for the special issue on "data-intensive geospatial computing", which I guest edited with the International Journal of Geographical Information Science (Taylor & Francis). As remarked in the editorial, the special issue is particularly special in the sense that all source and data are published together with the published papers. This editorial elaborates on scholarly communication, with particular attention to publishing data alongside papers and the emergence of open access journals, in order to make our research more open access.

  1. Cognitive Access to TVWS in India

    Patil, Kishor P.; Skouby, Knud Erik; Prasad, Ramjee

    2013-01-01

    performed spectrum measurements of TV band in Pune, India. Our result shows poor spectrum utilization in TV band, and good potential for Cognitive radio operation. Digital switchover in India will generate golden opportunity for empowering rural India. As majority of India’s population lives in rural part......The digital transition of TV transmission will make available some TV frequencies which are to be geographically unused called as TV White Spaces. The important regulatory trend in the context of Dynamic Spectrum Access (DSA) is the Cognitive access of TV white Spaces. In this context, we have...

  2. Streaming movies, media, and instant access

    Dixon, Wheeler Winston

    2013-01-01

    Film stocks are vanishing, but the iconic images of the silver screen remain -- albeit in new, sleeker formats. Today, viewers can instantly stream movies on televisions, computers, and smartphones. Gone are the days when films could only be seen in theaters or rented at video stores: movies are now accessible at the click of a button, and there are no reels, tapes, or discs to store. Any film or show worth keeping may be collected in the virtual cloud and accessed at will through services like Netflix, Hulu, and Amazon Instant.The movies have changed, and we are changing with them.

  3. Starting an open access journal in Iceland

    Watson, Ian

    2009-01-01

    To access full text version of this article. Please click on the hyperlink "View/Open" at the bottom of this page The Bifröst Journal of Social Science / Tímarit um félagsvísindi is one of Iceland’s first open access journals and the first to use Open Journal Systems software. This article summarizes lessons learned from the first three years of the journal’s operation, including issues connected to funding, staffing, peer review, printing, bibliographic formats, and the future of open acc...

  4. Access 2007 forms and reports for dummies

    Underdahl, Brian

    2013-01-01

    Do you have tons and tons of data on your computer but you're not quite sure how to make heads or tails of them-or even organize them? Are you using Access as spreadsheet rather than what it was really meant for? If you have trouble finding meaning in your data, then Access 2007 Forms & Reports for Dummies let you discover the wonders of this highly useful program. This no-nonsense guide gets right down to business by showing you the easy way to use this powerful tool. It gets you started with selective, targeted queries; forms that improve efficiency; and reports that communicate-while sparin

  5. CytoJournal joins 'open access' philosophy

    Shidham Vinod B

    2004-07-01

    Full Text Available Abstract Welcome to CytoJournal! We would like to introduce you to your journal, one that is run by and for the scientific cytopathology community with incontestable benefits of Open Access, and support from Cytopathology Foundation, Inc. http://www.cytopathology-foundation.org/index.htmlCytoJournal is a peer-reviewed, PubMed indexed, online journal, publishing research in the field of cytopathology and related areas, with world wide free access. Authors submitting to CytoJournal retain the copyright to their hard earned work.

  6. Access to major overseas research facilities

    This paper will describe four schemes which have been established to permit Australian researchers access to some of the most advanced overseas research facilities. These include, access to Major Research Facilities Program, the Australian National Beamline Facility at the Photon Factory, the Australian Synchrotron Research Program and the ISIS Agreement. The details of each of these programs is discussed and the statistics on the scientific output provided. All programs are managed on behalf of the Department of Industry, Science and Tourism by the Australian Nuclear Science and Technology Organisation. One hundred and thirteen senior scientists plus forty, one postgraduate, students were supported through these schemes during the 1996-1997 financial year

  7. Performance estimates for personnel access control systems

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  8. Database theory and SQL practice using Access

    This book introduces database theory and SQL practice using Access. It is comprised of seven chapters, which give description of understanding database with basic conception and DMBS, understanding relational database with examples of it, building database table and inputting data using access 2000, structured Query Language with introduction, management and making complex query using SQL, command for advanced SQL with understanding conception of join and virtual table, design on database for online bookstore with six steps and building of application with function, structure, component, understanding of the principle, operation and checking programming source for application menu.

  9. Directory of Open Access Journals (DOAJ)

    Morrison, Heather

    2008-01-01

    The Directory of Open Access Journals (DOAJ) is the world’s most authoritative list of scholarly, peer-reviewed, fully open access journals, and a “must” for libraries of all types. As of August 2007, DOAJ includes over 2,800 titles, over 10% of the world’s estimated 20-25,000 peer-reviewed scholarly journal titles. This is an impressive list; in terms of numbers of titles, DOAJ compares favorably with commercial journal packages. DOAJ is growing rapidly, at a rate of more than one title pe...

  10. The Right of Access to Court

    Sokol Mëngjesi; Klodjan Skënderaj

    2015-01-01

    Every person has the right to address the court in order to protect his legal rights, freedom and interests. Access to justice is an important aspect of due process, the absence of which makes inexistent the discussion for respecting the principle of due legal process. Access to the court is a right guaranteed by the Constitution, international acts and is specifically interpreted by the European Court of Human Rights.The right to address the court is not an absolute right. This right can be ...

  11. Quantum internet using code division multiple access

    Zhang, Jing; Liu, Yu-Xi; Özdemir, Şahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-07-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels.

  12. TCP Performance Enhancement for UMTS Access Network

    Hu, Liang

    2008-01-01

    is between UMTS access network and Internet. The split proxy divides the bandwidth delay product into two parts, resulting in two TCP connections with smaller bandwidth delay products. Simulation results show, the split TCP proxy can significantly improve the TCP performance under high bit rate DCH channel......We aim at optimize the TCP performance over UMTS access network challenged by the large delay bandwidth product that is mainly caused by the latency from the link layer ARQ retransmissions and diversity technique at physical layer. We propose to place a split TCP proxy at GGSN nodes which...

  13. High Optical Access Trap 2.0.

    Maunz, Peter Lukas Wilhelm [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-01-26

    The High Optical Access (HOA) trap was designed in collaboration with the Modular Universal Scalable Ion-trap Quantum Computer (MUSIQC) team, funded along with Sandia National Laboratories through IARPA's Multi Qubit Coherent Operations (MQCO) program. The design of version 1 of the HOA trap was completed in September 2012 and initial devices were completed and packaged in February 2013. The second version of the High Optical Access Trap (HOA-2) was completed in September 2014 and is available at IARPA's disposal.

  14. Endoscopic Ultrasound-Assisted Pancreaticobiliary Access.

    Weilert, Frank; Binmoeller, Kenneth F

    2015-10-01

    Endoscopic retrograde cholangiopancreatography (ERCP) is the primary approach to drain an obstructed pancreatic or biliary duct. Failed biliary drainage is traditionally referred for percutaneous transhepatic biliary drainage or surgical bypass, which carry significantly higher morbidity and mortality rates compared with ERCP and transpapillary drainage. Endoscopic ultrasound provides a real-time imaging platform to access and deliver therapy to organs and tissues outside of the bowel lumen. The bile and pancreatic ducts can be directly accessed from the stomach and duodenum, offering an alternative to ERCP when this fails or is not feasible. PMID:26431606

  15. Performance estimates for personnel access control systems

    Bradley, R. G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems.

  16. Access Control in Data Management Systems

    Ferrari, Elena

    2010-01-01

    Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary,

  17. 48 CFR 252.241-7001 - Government access.

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Government access. 252.241... Clauses 252.241-7001 Government access. As prescribed in 241.501-70(b), use the following clause: Government Access (DEC 1991) Authorized representatives of the Government may have access to the...

  18. 34 CFR 21.1 - Equal Access to Justice Act.

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Equal Access to Justice Act. 21.1 Section 21.1 Education Office of the Secretary, Department of Education EQUAL ACCESS TO JUSTICE General § 21.1 Equal Access to Justice Act. (a) The Equal Access to Justice Act (the Act) provides for the award of fees...

  19. 50 CFR 660.311 - Open access fishery-definitions.

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Open access fishery-definitions. 660.311... Groundfish-Open Access Fisheries § 660.311 Open access fishery—definitions. General definitions for the... specific to the open access fishery covered in this subpart and are in addition to those specified at §...

  20. Publishing in Open Access Education Journals: The Authors' Perspectives

    Coonin, Bryna; Younce, Leigh M.

    2010-01-01

    Open access publishing is now an accepted method of scholarly communication. However, the greatest traction for open access publishing thus far has been in the sciences. Penetration of open access publishing has been much slower among the social sciences. This study surveys 309 authors from recent issues of open access journals in education to…

  1. Positioning Your Library in an Open-Access Environment

    Bhatt, Anjana H.

    2010-01-01

    This paper is a summary of the project that the author completed at Florida Gulf Coast University (FGCU) library for providing online access to 80 open access E-journals and digital collections. Although FGCU uses SerialsSolutions products to establish online access, any one can provide access to these collections as they are free for all. Paper…

  2. 36 CFR 1193.31 - Accessibility and usability.

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Accessibility and usability... COMPLIANCE BOARD TELECOMMUNICATIONS ACT ACCESSIBILITY GUIDELINES Requirements for Accessibility and Usability § 1193.31 Accessibility and usability. When required by § 1193.21, telecommunications equipment...

  3. Bibliography on open access in Latin America and the Caribbean

    Babini, Dominique

    2012-01-01

    Bibliography on open access in Latin America and the Caribbean. Selection mainly based on open access publications describing open access initiatives in Latin America and the Caribbean. Prepared for UNESCO-Latin America and the Caribbean Section of the UNESCO-GOAP Global Open Access Portal.

  4. Sign Compute Resolve for Random Access

    Goseling, Jasper; Stefanovic, Cedomir; Popovski, Petar

    2014-01-01

    users collide. We measure the performance of the proposed method in terms of user resolution rate as well as overall throughput of the system. The results show that our approach significantly increases the performance of the system even compared to coded random access, where collisions are not wasted...

  5. An electronically controlled automatic security access gate

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  6. CGE Modeling of Market Access in Services

    Elisabeth M. Christen; Francois, Joseph; Hoekman, Bernard

    2012-01-01

    This paper examines how the applied multi-sector computable general equilibrium (CGE) literature has moved into quantication of the impacts of greater market access for services. This includes discussion of multi-sector linkages to the service sector, as well both measuring barriers to trade and investment (generally with a mix of firm surveys, price comparisons, and econometrics), and how...

  7. Intensive Care in Critical Access Hospitals

    Freeman, Victoria A.; Walsh, Joan; Rudolf, Matthew; Slifkin, Rebecca T.; Skinner, Asheley Cockrell

    2007-01-01

    Context: Although critical access hospitals (CAHs) have limitations on number of acute care beds and average length of stay, some of them provide intensive care unit (ICU) services. Purpose: To describe the facilities, equipment, and staffing used by CAHs for intensive care, the types of patients receiving ICU care, and the perceived impact of…

  8. Troubling Clarity: The Politics of Accessible Language.

    Lather, Patti

    1996-01-01

    Using feminist and postmodern theories, argues that transparent or "accessible" language is not innocent, but is part of a discourse of power. Reflects on an experimental approach to writing about research that results in a multiply coded, multivoiced text that speaks to multiple audiences. (SK)

  9. Network and Nodal Accessibility Teaching Exercise.

    Wheeler, James O.

    1988-01-01

    Presents an exercise, for use in college-level economic geography courses, which teaches the concept of nodal and network accessibility with an application to manufacturing locations. Intended to guide students to think spatially and to generalize from numeric data, this out-of-class activity teaches students to discover results, to do simple…

  10. Obesity and access to chain grocers.

    Chen, Susan; Florax, Raymond J G M; Snyder, Samantha; Miller, Christopher C

    2010-01-01

    Recent empirical work in the obesity literature has highlighted the role of the built environment and its potential influence in the increasing prevalence of obesity in adults and children. One feature of the built environment that has gained increasing attention is the role of access to chain grocers and their impact on body mass index (BMI). The assessment of the impacts of spatial access to chain grocers on BMI is complicated by two empirical regularities in the data. There is evidence that health outcomes such as BMI are clustered in space and that there is spatial dependence across individuals. In this article, we use an econometric model that takes into account the spatial dependence, and we allow the effect of access to differ for a person depending on whether he or she lives in a low-income community or peer group. We categorize this community using the characteristics of the people who immediately surround the individual rather than using census tracts. Using georeferenced survey data on adults in Marion County, Indiana, we find that the effect of improvements in chain grocer access on BMI varies depending on community characteristics. PMID:21117331

  11. Direct data access protocols benchmarking on DPM

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  12. Heterogeneity in the WTP for recreational access

    Campbell, Danny; Vedel, Suzanne Elizabeth; Thorsen, Bo Jellesmark;

    2014-01-01

    In this study we have addressed appropriate modelling of heterogeneity in willingness to pay (WTP) for environmental goods, and have demonstrated its importance using a case of forest access in Denmark. We compared WTP distributions for four models: (1) a multinomial logit model, (2) a mixed logi...

  13. Screening Capsicum accessions for capsaicinoids content.

    Antonious, George F; Jarret, Robert L

    2006-01-01

    Ninety Capsicum accessions selected from the USDA Capsicum germplasm collection were screened for their capsaicinoids content using gas hromatography with nitrogen phosphorus detection (GC/NPD). Fresh fruits of Capsicum chinense, C. frutescens, C. baccatum, C. annuum, and C. pubescens were extracted with methanol and analyzed for capsaicin, dihydrocapsaicin, and nordihydrocapsaicin. Mass spectrometry of the fruit crude extracts indicated that the molecular ions at m/z 305, 307, and 293, which correspond to capsaicin, dihydrocapsaicin, and nordihydrocapsaicin, respectively, have a common benzyl cation fragment at m/z 137 that can be used for monitoring capsaicinoids in pepper fruit extracts. Capsaicin and dihydrocapsaicin were the dominant capsaicinoids detected. Capsaicin concentrations were typically greater than dihydrocapsaicin. Concentrations of total capsaicinoids varied from not detectable to 11.2 mg fruit(-1). Statistical analysis revealed that accession PI-441624 (C. chinense) had the highest capsaicin content (2.9 mg g(-1) fresh fruit) and accession PI-497984 (C. frutescens) had the highest dihydrocapsaicin content (2.3 mg g(-1) fresh fruit). Genebank accessions PI-439522 (C. frutescens) and PI-497984 contained the highest concentrations of total capsaicinoids. PMID:16785178

  14. Access to Effective Teaching for Disadvantaged Students.

    Eric Isenberg; Jeffrey Max; Philip Gleason; Liz Potamites; Robert Santillano; Heinrich Hock; Michael Hansen

    2013-01-01

    This study explores the disparity in access to effective teachers in 29 school districts across the country, revealing that disadvantaged students receive poorer-quality instruction, on average, compared with other students. Mathematica conducted the studies for the Institute of Education Sciences.

  15. 77 FR 37553 - Access Authorization Fees

    2012-06-22

    ... direct final rule published in the Federal Register on May 3, 2012 (77 FR 26149) is confirmed as June 22...: On May 3, 2012 (77 FR 26149), the NRC published a direct final rule amending its regulations at Title... COMMISSION 10 CFR Parts 11 and 25 RIN 3150-AJ00 Access Authorization Fees AGENCY: Nuclear...

  16. 77 FR 26213 - Access Authorization Fees

    2012-05-03

    ... ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR MATERIAL 1. The authority citation for part 11 is...; 68 FR 58792, 58800. 2. In Sec. 11.15: i. Add paragraph (e) introductory text; ii. Revise paragraphs... Reconciliation Act of 1990 sec. 6101 (42 U.S.C. 2214). Federal Register Citation: November 30, 2010; 75 FR...

  17. 77 FR 26149 - Access Authorization Fees

    2012-05-03

    ... 11--CRITERIA AND PROCEDURES FOR DETERMINING ELIGIBILITY FOR ACCESS TO OR CONTROL OVER SPECIAL NUCLEAR....S.C. 2214). Federal Register Citation: October 10, 2003; 68 FR 58792, 58800. 0 2. In Sec. 11.15: 0 i...). Federal Register Citation: November 30, 2010; 75 FR 73935, 73941. 0 4. In Sec. 25.17: 0 i. Add...

  18. Continuing CERN action on Open Access

    Altarelli, Guido

    2005-01-01

    Open Access (OA) is an idea that would change the publishing landscape to bring benefits to all readers and authors. New publishing models based on electronic dissemination and OA are emerging. Active measures taken by CERN at this time could have an important impact on the wider adoption of OA principles.

  19. Random Access to Grammar-Compressed Strings

    Bille, Philip; Landau, Gad M.; Raman, Rajeev; Sadakane, Kunihiko; Satti, Srinivasa Rao; Weimann, Oren

    (n) is the inverse of the kth row of Ackermann's function. Our representations also efficiently support decompression of any substring in S: we can decompress any substring of length m in the same complexity as a single random access query and ad- ditional O(m) time. Combining these results with fast...

  20. Optical access: networks and components (overview)

    Mynbaev, Djafar K.

    2004-09-01

    The exponential gtowth of traffic delivered to an individual customer both for business and personal needs puts tremendous pressure on the telecommunications networks. Because the development of the long-haul and metro networks has advanced rapidly and their capacity much eceeds demand, tremendous pressure now falls in the local networks to provide customers with access to the global telecom infrastructure. Building a broadband access network enabling fast delivery of high-volume traffic is the current task of network operators. A brief review of broadband access networks brings us to the conclusion that only wired optical networks can serve as an immediate and future solution to the "last-mile" problem. After discussin goptical access network classification, we focus mainly on passive optical networks (PON) because PON is a major technology today. From the network standpoint, we discuss the principle of PON operation, architectures, topologies, protocols and standards, design issues, and network management and services. We also discuss the main problems with PON and the use of WDM technology. From the hardware standpoint, we consider both active and passive components. We analyze the structure and elements of these components, including their technical characteristics.

  1. Accessing OSI Managed Objects from ANSAware

    Genilloud, Guy; Gay, David

    1995-01-01

    This paper presents a mechanism allowing an ODP compliant distributed system, ANSA, to access OSI network management objects as if they were ANSA objects. It defines a mapping from the OSI object model to the ANSA object model, and it specifies how an adapter implements this mapping.

  2. Urban Accessibility / Mobility Index Feasibility Stage Report

    World Bank

    2010-01-01

    Given the increasing importance of the urban transport sector, the World Bank decided to explore the feasibility of setting up a possible urban accessibility/mobility index. The purpose of such an index would be to provide an indicator / measurement, of how urban transport systems in different cities compared to one another, and how the transport system developed in each individual city. T...

  3. Improving Open Access through Prior Learning Assessment

    Yin, Shuangxu; Kawachi, Paul

    2013-01-01

    This paper explores and presents new data on how to improve open access in distance education through using prior learning assessments. Broadly there are three types of prior learning assessment (PLAR): Type-1 for prospective students to be allowed to register for a course; Type-2 for current students to avoid duplicating work-load to gain…

  4. Making Your Website More Accessible. Tips

    Arnone, Marilyn

    2007-01-01

    Employing Universal Design for Learning (UDL) principles, such as multiple means of representation (of content), multiple means of engagement (motivation) and multiple means of expression (sharing the results of research, for example), will put one on the right path toward increasing accessibility for all learners. In this article, the author…

  5. Multiple-Access Quantum-Classical Networks

    Razavi, Mohsen

    2011-10-01

    A multi-user network that supports both classical and quantum communication is proposed. By relying on optical code-division multiple access techniques, this system offers simultaneous key exchange between multiple pairs of network users. A lower bound on the secure key generation rate will be derived for decoy-state quantum key distribution protocols.

  6. Sociocritical Matters: Migrant Students' College Access

    Núñez, Anne-Marie; Gildersleeve, Ryan Evely

    2016-01-01

    Migrant students face many educational, economic, social, and cultural challenges to college access. Anti-bilingual, anti-affirmative action, and anti-immigrant policies also constrain their postsecondary pathways. With these issues in mind, this article draws on quantitative and qualitative research to examine the influence of a residential…

  7. Research Grants Program Office Open Access Policy

    Research Grant Program Office (RGPO)

    2014-01-01

    This is the Open Access Policy for all research funded through the Research Grants Program Office in the University of California Office of the President. Specifically, it applies to all research funded through UC Research Initiatives (UCRI), the California Breast Cancer Prevention Program (CBCRP), the Tobacco-Related Disease Research Program (TRDRP), and the California HIV/AIDS Research Program (CHRP).  

  8. LANSCE personnel access control system (PACS)

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  9. Open Access Dissemination Challenges: A Case Study

    Young, Philip

    2009-01-01

    This paper explores dissemination, broadly considered, of an open access (OA) database as part of a librarian-faculty collaboration currently in progress. Metadata optimization for cataloging, repository submission, and search engines is examined, as are user notification methods. Libraries should consider their role in scholarly publishing, develop workflows to enable it, and extend their efforts to the web.

  10. Energy access in Africa: Challenges ahead

    This paper presents a review of the current situation and projections for energy access in Africa. The paper also presents several sets of ambitious energy access targets as agreed by the regional groupings within the region. The paper argues that achieving between 50% and 100% access to modern energy services by 2030 in Africa will require more effective mobilization and use of both domestic and external funding, and the development and implementation of innovative policy frameworks. The paper suggests that greater emphasis will need to be placed on productive uses of energy and energy for income generation in order to break the vicious circle of low incomes leading to poor access to modern energy services, which in turn puts severe limitations on the ability to generate higher incomes. The paper further suggests that if anything near the ambitious targets set by African organisations are to be achieved then it will be advisable to tap into the full menu of energy resource and technology options, and there will be the need for significant increases in the numbers of various actors involved together with more effective institutions in the energy sector.

  11. Moving beyond the Amalgam: Restructuring Access Services

    Austin, Brice

    2010-01-01

    At least since the early 1990s, academic libraries have been merging Circulation and various other related functions into a single department typically labeled "Access Services." In many cases, however, that merger has proven to be administrative rather than functional, with minimal integration of common workflows. This article describes a…

  12. 45 CFR 98.31 - Parental access.

    2010-10-01

    ... Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Program Operations (Child Care Services)-Parental Rights and Responsibilities § 98.31 Parental access. The Lead Agency shall have in effect procedures to ensure that providers of child care services for...

  13. Access and Indigency: Lessons from Morristown.

    Conable, Gordon M.

    1992-01-01

    Discussion of the present deterioration in public services focuses on indigent and homeless library patrons and the Kreimer v. Morristown litigation. Issues of access and intellectual freedom are addressed, First Amendment rights are discussed, and implications of this case for libraries' roles as public forums are examined. (five references) (LRW)

  14. Village Green Project: Web-accessible Database

    The purpose of this web-accessible database is for the public to be able to view instantaneous readings from a solar-powered air monitoring station located in a public location (prototype pilot test is outside of a library in Durham County, NC). The data are wirelessly transmitte...

  15. Access to Finance for Smallholder Farmers

    International Finance Corporation

    2014-01-01

    The percentage of smallholders with access to finance is equally difficult to quantify. According to estimates, even promising approaches to expanding smallholder lending, such as value chain finance, are reaching fewer than 10 percent of smallholders, primarily those in well-established value chains dedicated to higher value cash crops. International Finance Corporation (IFC) has been eng...

  16. Access to the Online Planetary Research Literature

    Henneken, E. A.; Accomazzi, A.; Kurtz, M. J.; Grant, C. S.; Thompson, D.; Di Milia, G.; Bohlen, E.; Murray, S. S.

    2009-12-01

    The SAO/NASA Astrophysics Data System (ADS) provides various free services for finding, accessing, and managing bibliographic data, including a basic search form, the myADS notification service, and private library capabilities (a useful tool for building bibliographies), plus access to scanned pages of published articles. The ADS also provides powerful search capabilities, allowing users to find e.g. the most instructive or most important articles on a given subject . For the Planetary Sciences, the citation statistics of the ADS have improved considerably with the inclusion of the references from Elsevier journals, including Icarus, Planetary and Space Science, and Earth and Planetary Science Letters. We currently have about 78 journals convering the planetary and space sciences (Advances in Space Research, Icarus, Solar Physics, Astrophusics and Space Science, JGRE, Meteoritics, to name a few). Currently, this set of journals represents about 180,000 articles and 1.1 million references. Penetration into the Solar Physics, Planetary Sciences and Geophysics community has increased significantly. During the period 2004-2008, user access to JGR and Icarus increased by a factor of 4.4, while e.g. access to the Astrophysical Journal "only" increased by a factor of 1.8.

  17. Mobile Information Access with Spoken Query Answering

    Brøndsted, Tom; Larsen, Henrik Legind; Larsen, Lars Bo; Lindberg, Børge; Ortiz-Arroyo, Daniel; Tan, Zheng-Hua; Xu, Haitian

    2006-01-01

    This paper addresses the problem of information and service accessibility in mobile devices with limited resources. A solution is developed and tested through a prototype that applies state-of-the-art Distributed Speech Recognition (DSR) and knowledge-based Information Retrieval (IR) processing for...

  18. 78 FR 38101 - Passenger Vessels Accessibility Guidelines

    2013-06-25

    .... See 69 FR 69244 and 69245, November 26, 2004. The ANPRM requested comment on whether and how to... guidelines for comment. See 71 FR 38563, July 7, 2006. We received more than 175 comments on the 2006 draft... include onboard accessible routes connecting passenger decks and passenger amenities within...

  19. Access to the Common Core for All

    McLaughlin, Margaret J.

    2012-01-01

    Too often under the various state-developed standards and assessments, accommodations for students with disabilities--a heterogeneous group with varied characteristics and needs--have not been adequately addressed or have been ignored. The Common Core State Standards (CCSS) initiative provides an historic opportunity to improve access to rigorous…

  20. Accessibility of GI for Public Participation

    Arleth, Mette; Campagna, Michele

    2005-01-01

    The paper reports an ongoing comparative study on the accessibility of Geographic Information at public authorities’ websites in Denmark and Italy. The purpose of the study is twofold; to give an idea of the latest development and diffusion of GI on public authorities websites, and to identify...