Brooks, Anthony Lewis
This contribution is timely as it addresses accessibility in regards system hardware and software aligned with introduction of the Twenty-First Century Communications and Video Accessibility Act (CVAA) and adjoined game industry waiver that comes into force January 2017. This is an act created...... by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...... platforms; and games software. However, the CVAA has no legal status in the EU. This text succinctly introduces and questions implications, impact, and wider adoption. By presenting the full CVAA and game industry waiver the text targets to motivate discussions and further publications on the subject...
First page Back Continue Last page Overview Graphics. Broadband Access. Worldwide market for broadband access $30 Billion! Over 200 million broadband subscribers worldwide! Various Competing Broadband access. Digital Subscriber line; Wireless; Optical Fiber.
First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.
Open access week Van 19 tot en met 25 oktober 2015 vond wereldwijd de Open Access Week plaats. Tijdens deze week werden er over de hele wereld evenementen georganiseerd waar open access een rol speelt. Ook in Nederland zijn er diverse symposia, workshops en debatten georganiseerd zoals het debat in
The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…
Prof. Dennis Ocholla
The argument that access to information is an instrumental and individual as well as ... and Dean School of Information Studies, University of Wisconsin, Milwaukee, USA. ... to scholarly publications and can be in any digital format, including text, movies and ... language barriers, censorship, lack of access to the Internet and ...
Transforming Global Information and Communication Markets: The Political Economy of ... 8 Control and Resistance: Attacks on Burmese Opposition Media 153 ...... “Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet,” in Access ...
Yoon, Doe Hyun; Muralimanohar, Naveen; Chang, Jichuan; Ranganthan, Parthasarathy
A disclosed example method involves performing simultaneous data accesses on at least first and second independently selectable logical sub-ranks to access first data via a wide internal data bus in a memory device. The memory device includes a translation buffer chip, memory chips in independently selectable logical sub-ranks, a narrow external data bus to connect the translation buffer chip to a memory controller, and the wide internal data bus between the translation buffer chip and the memory chips. A data access is performed on only the first independently selectable logical sub-rank to access second data via the wide internal data bus. The example method also involves locating a first portion of the first data, a second portion of the first data, and the second data on the narrow external data bus during separate data transfers.
C. Colloca TS/FM
TS/FM group informs you that, for the replacement of the door of the main entrance at bldg. 500, the access will be closed to the public between 19 and 30 July 2004. Access to the Main Building complex will be assured at any time through both of the side doors and from bldg. 64. For more information, please contact 73273. C. Colloca TS/FM
Kirkeby, Inge Mette
Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...
The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder consent, and many authors, musicians, filmmakers, and other creators who depend on royalties are understandably unwilling to give their consent. But for 350 years, scholars have written peer-reviewed journal articles for impact, not for money, and are free to consent to open access without losing revenue. In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. Distilling a decade of Suber's influential writing and thinking about open access, this is the indispe...
Access is the major new language series designed with the needs of today's generation of students firmly in mind. Whether learning for leisure or business purposes or working towards a curriculum qualification, Access French is specially designed for adults of all ages and gives students a thorough grounding in all the skills required to understand, speak, read and write contemporary French from scratch. The coursebook consists of 10 units covering different topic areas, each of which includes Language Focus panels explaining the structures covered and a comprehensive glossary. Learning tips
Wand, Sean; Thermos, Adam C.
Explains the issues to consider before a college decides to purchase a card-access system. The benefits of automation, questions involving implementation, the criteria for technology selection, what typical card technology involves, privacy concerns, and the placement of card readers are discussed. (GR)
Vermont Center for Geographic Information — The Vermont Fish & Wildlife Department maintains developed fishing access areas. These sites provide public access to waters in Vermont for shore fishing...
and accessibility. Sensory accessibility accommodates aspects of a sensory disability and describes architectural design requirements needed to ensure access to architectural experiences. In the context of architecture accessibility has become a design concept of its own. It is generally described as ensuring...... physical access to the built environment by accommodating physical disabilities. While the existing concept of accessibility ensures the physical access of everyone to a given space, sensory accessibility ensures the choice of everyone to stay and be able to participate and experience....
What Open Access is. What Open Access is not. How is Open Access provided? Open Access archives or repositories. Open Access journals. Why should authors provide Open Access to their work? Further information and resources
Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)
Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments. This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp
Hennig, Teresa; Griffith, Geoffrey L
A comprehensive guide to programming for Access 2010 and 2007. Millions of people use the Access database applications, and hundreds of thousands of developers work with Access daily. Access 2010 brings better integration with SQL Server and enhanced XML support; this Wrox guide shows developers how to take advantage of these and other improvements. With in-depth coverage of VBA, macros, and other programming methods for building Access applications, this book also provides real-world code examples to demonstrate each topic.: Access is the leading database that is used worldwide; While VBA rem
Tullney, Marco; van Wezenbeek, Wilma
Slides of an overview presentation given at a CESAER workshop on Open Access, February 2nd, 2017, in Brussels Cover major routes to more open access as discussed in the Task Force Open Science of CESAER: (national) open access strategies open access mandates open access incentives open access awareness open access publishing open access infrastructure
Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...
A report on how nine rail builder, operators and transport designers deal with design for accessibility......A report on how nine rail builder, operators and transport designers deal with design for accessibility...
Open Access (OA), defined most simply, means free full text online. There are over 130 Open Access journals hosted on the AJOL website. You can find a full list of these journals here: OA journals on AJOL ...
Cosma Emil; Jeflea Victor
By using Word, Excel or PowerPoint one can automate routine operations using the VBA language (Visual Basic for Applications). This language is also used in Access, allowing access to data stored in tables or queries. Thus, Access and VBA resources can be used together. Access is designed for programming forms and reports (among other things), so there won’t be found any of the VBA editor’s specific forms.
McKay, Sharon Cline
Discusses issues librarians need to consider when providing access to electronic journals. Topics include gateways; index and abstract services; validation and pay-per-view; title selection; integration with OPACs (online public access catalogs)or Web sites; paper availability; ownership versus access; usage restrictions; and services offered…
Full Text Available Abstract Uncensored exchange of scientific results hastens progress. Open Access does not stop at the removal of price and permission barriers; still, censorship and reading disabilities, to name a few, hamper access to information. Here, we invite the scientific community and the public to discuss new methods to distribute, store and manage literature in order to achieve unfettered access to literature.
Ulrich Fuller, Laurie
The easy guide to Microsoft Access returns with updates on the latest version! Microsoft Access allows you to store, organize, view, analyze, and share data; the new Access 2013 release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. Access 2013 For Dummies covers all the new features of the latest version of Accessand serves as an ideal reference, combining the latest Access features with the basics of building usable databases. You'll learn how to create an app from the Welcome screen, get support
Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for Applications (VBA) tools for Access applications, integrate Access with SharePoint and other business systems, and much more. Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, co
Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.
Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all peer review...... articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access and related topics...... such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc....
There are strong pragmatic and moral reasons for receiving societies to address access to healthcare for migrants. Receiving societies have a pragmatic interest in sustaining migrants' health to facilitate integration; they also have a moral obligation to ensure migrants' access to healthcare...... according to international human rights principles. The intention of this thesis is to increase the understanding of migrants' access to healthcare by exploring two study aims: 1) Are there differences in migrants' access to healthcare compared to that of non-migrants? (substudy I and II); and 2) Why...... are there possible differences in migrants' access to healthcare compared to that of non-migrants? (substudy III and IV). The thesis builds on different methodological approaches using both register-based retrospective cohort design, cross-sectional design and survey methods. Two different measures of access were...
This book offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Whether you use Access 2007 or an earlier version, this book will teach you new methods to query data, different ways to move data in and out of Access, how to calculate answers to financial and investment issues, how to jump beyond SQL by manipulating data with VBA, and more.
Bacchiega, Emanuele; Randon, Emanuela; Zirulia, Lorenzo
We analyze the effect of competition in market-accessibility enhancement among quality-differentiated firms. Firms are located in regions with different ex-ante transport costs to reach the final market. We characterize the equilibrium of the two-stage game in which firms first invest to improve market accessibility and then compete in prices. Efforts in accessibility improvement crucially depend on the interplay between the willingness to pay for the quality premium of the median consumer an...
Mireia Ribera Turró
Full Text Available Adobe PDF is one of the most widely used formats in scientific communications and in administrative documents. In its latest versions it has incorporated structural tags and improvements that increase its level of accessibility. This article reviews the concept of accessibility in the reading of digital documents and evaluates the accessibility of PDF according to the most widely established standards.
Svendsen, Michael; Hansen, Lars Asger Juel; Andersen, Dorte
Open Access Monitor - DK (OAM-DK) is a 2-year DEFF funded [DEFF.2016-0018] national project running in 2017-2018 with the aim of collecting, documenting and administrating Open Access publishing costs. OAM-DK is lead by Copenhagen University Library under the Royal Danish Library with participation...... of all Danish University Libraries. This poster presents the first results of Open Access costs related to 2015 publications at the The University of Copenhagen....
The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.
National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.
A comprehensive reference to the updated and new features of Access 2013 As the world's most popular database management tool, Access enables you to organize, present, analyze, and share data as well as build powerful database solutions. However, databases can be complex. That's why you need the expert guidance in this comprehensive reference. Access 2013 Bible helps you gain a solid understanding of database purpose, construction, and application so that whether you're new to Access or looking to upgrade to the 2013 version, this well-rounded resource provides you with a th
Harper, Simon; Yesilada, Yeliz
Access to, and movement around, complex online environments, of which the World Wide Web (Web) is the most popular example, has long been considered an important and major issue in the Web design and usability field. The commonly used slang phrase ‘surfing the Web’ implies rapid and free access, pointing to its importance among designers and users alike. It has also been long established that this potentially complex and difficult access is further complicated, and becomes neither rapid nor free, if the user is disabled. There are millions of people who have disabilities that affect their use of the Web. Web accessibility aims to help these people to perceive, understand, navigate, and interact with, as well as contribute to, the Web, and thereby the society in general. This accessibility is, in part, facilitated by the Web Content Accessibility Guidelines (WCAG) currently moving from version one to two. These guidelines are intended to encourage designers to make sure their sites conform to specifications, and in that conformance enable the assistive technologies of disabled users to better interact with the page content. In this way, it was hoped that accessibility could be supported. While this is in part true, guidelines do not solve all problems and the new WCAG version two guidelines are surrounded by controversy and intrigue. This chapter aims to establish the published literature related to Web accessibility and Web accessibility guidelines, and discuss limitations of the current guidelines and future directions.
Zheng, Jun; Ansari, Nirwan
Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or
Poort, J.P.; Groot, I.; Kok, L.; de Graaf, D.; Hof, B.J.F.
The accessibility of certain products and services to all people, irrespective of their income, age, health and geographical location is considered to be of great social importance. Think for instance of health care, education, electricity, and sanitation. Accessibility can be secured in a variety
Raimondos-Møller, Pascalis; Woodland, Alan D.
Well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. The present paper proposes a new set of tariff reforms that can achieve both...
Argues that easy claims about the relationship between language mastery and academic or economic access (made by both conservative commentators on education and mainstream writing teachers) are false and obscure real social and political boundaries, such as racism, sexism, elitism, and homophobia, that really do prevent access. (SR)
Wu, Xinxing; Wang, Jianjun
Highlights: • Obtain some characteristics of accessibility and Kato’s chaos. • Answer negatively a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. • A dynamical system is indecomposable if and only if it is weakly transitive. - Abstract: This note obtains some characteristics of accessibility and Kato’s chaos. Applying these results, an accessible dynamical system whose product system is not accessible is constructed, giving a negative answer to a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. Besides, it is proved that every transitive interval self-map is accessible.
Donaldson, James S.
Pediatric interventional radiologists are ideally suited to provide vascular access services to children because of inherent safety advantages and higher success from using image-guided techniques. The performance of vascular access procedures has become routine at many adult interventional radiology practices, but this service is not as widely developed at pediatric institutions. Although interventional radiologists at some children's hospitals offer full-service vascular access, there is little or none at others. Developing and maintaining a pediatric vascular access service is a challenge. Interventionalists skilled in performing such procedures are limited at pediatric institutions, and institutional support from clerical staff, nursing staff, and technologists might not be sufficiently available to fulfill the needs of such a service. There must also be a strong commitment by all members of the team to support such a demanding service. There is a slippery slope of expected services that becomes steeper and steeper as the vascular access service grows. This review is intended primarily as general education for pediatric radiologists learning vascular access techniques. Additionally, the pediatric or adult interventional radiologist seeking to expand services might find helpful tips. The article also provides education for the diagnostic radiologist who routinely interprets radiographs containing vascular access devices. (orig.)
Ulrich Fuller, Laurie
A friendly, step-by-step guide to the Microsoft Office database application Access may be the least understood and most challenging application in the Microsoft Office suite. This guide is designed to help anyone who lacks experience in creating and managing a database learn to use Access 2010 quickly and easily. In the classic For Dummies tradition, the book provides an education in Access, the interface, and the architecture of a database. It explains the process of building a database, linking information, sharing data, generating reports, and much more.As the Micr
Zheng, Jun; Ansari, Nirwan
Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks
Transportation engineers and planners are becoming more interested in using roundabouts to address access : management and safety concerns in the transportation system. While roundabouts are being used increasingly in a : variety of contexts, existin...
Raimondos-Møller, Pascalis; Woodland, Alan D.
According to the literature, well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. Such conflict between welfare and market access...... objectives of trade policy is problematic and calls for finding alternative tariff reform rules that can achieve both objectives at the same time. The present paper contributes to this aim by using a new set of tariff reforms that are based on local optimality. Using such reforms it is shown that market...... access and consumer welfare will always be weakly compatible, in the sense that reforms based on each objective have the same signed effect on the other objective. For strong compatibility, whereby both objectives increase as a result of a locally optimal tariff reform, we derive both a necessary...
Baessa, Mohamed A.
The library plays a critical role in facilitating open access for their researchers, from managing a repository to providing support and information on the OA publication process to their authors. Janis Tyhurst and Dr Imad
Andreasen, Manja Hoppe; Møller-Jensen, Lasse
This paper is concerned with access to the city for urban residents living in the periphery of Dar es Salaam, Tanzania. The paper presents an analysis of the mobility practices of residents and investigates the mobility constraints they experience in relation to the limited accessibility provided...... mobility and access to the city for residents in the periphery. Regular mobility is an ingrained part of residents' livelihood strategies. The majority of households rely on one or more members regularly travelling to central parts of the city in relation to their livelihood activities. The analysis...... by road and traffic conditions and highlights how accessibility problems of peripheral settlements are not easily understood separately from the general dysfunctions of the overall mobility system of city....
... for Success Am I Rural? Evidence-based Toolkits Economic Impact Analysis Tool Community Health Gateway Sustainability Planning ... hospitals and improve access to healthcare by keeping essential services in rural communities. To accomplish this goal, ...
.... Remote Network Access (RNA) includes or is associated with all communication devices/software, firewalls, intrusion detection systems and virus protection applications to ensure security of the OIG, DoD, Network from remote...
Department of Transportation — The AccessAML is a web-based internet single application designed to reduce the vulnerability associated with several accounts assinged to a single users. This is a...
Manson, T.; Blok, M.
A general review of the measures involved in restoring abandoned access road sites in British Columbia was presented. Permits and licences are needed for the use of crown land for roads used by the petroleum and natural gas industry for exploration activities. However, the regulatory framework for road site reclamation is not well developed. The nature of access road reclamation is very site-specific. Some of the issues that are considered for all reclamation projects include slope stability, water control, revegetation, soil rehabilitation, access management and monitoring. The primary objective of reclaiming access road sites is to return the site to conditions that are equal or better than pre-disturbance conditions. Restoration measures must be approved by BC Environment and by the Department of Fisheries and Oceans where federal fisheries responsibilities are involved. 54 refs., 5 tabs., 3 figs
Many place based accessibility studies ignore the time component. Relying on theoretical frameworks that treat distance between two fixed points as constant, these methods ignore the diurnal and seasonal changes in accessibility. Network distances between two nodes are dependent on the network structure and weight distribution on the edges. These weights can change quite frequently and the network structure itself is subject to modification because of availability and unavailability of links ...
In recent years, the field of Universal Access has made significant progress in consolidating theoretical approaches, scientific methods and technologies, as well as in exploring new application domains. Increasingly, professionals in this rapidly maturing area require a comprehensive and multidisciplinary resource that addresses current principles, methods, and tools. Written by leading international authorities from academic, research, and industrial organizations and nonmarket institutions, The Universal Access Handbook covers the unfolding scientific, methodological, technological, and pol
Accessible Geoscience is a developing field of pedagogic research aimed at widening participation in Geography, Earth and Environmental Science (GEES) subjects. These subjects are often less commonly associated with disabilities, ethnic minorities, low income socio-economic groups and females. While advancements and improvements have been made in the inclusivity of these subject areas in recent years, access and participation of disabled students remains low. While universities are legally obligated to provide reasonable adjustments to ensure accessibility, the assumed incompatibility of GEES subjects and disability often deters students from applying to study these courses at a university level. Instead of making reasonable adjustments if and when they are needed, universities should be aiming to develop teaching materials, spaces and opportunities which are accessible to all, which in turn will allow all groups to participate in the GEES subjects. With this in mind, the Swansea Geography Department wish to enhance the accessibility of our undergraduate degree by developing digital field work opportunities. In the first instance, we intend to digitise three afternoon excursions which are run as part of a 1st year undergraduate module. Each of the field trips will be digitized into English- and Welsh-medium formats. In addition, each field trip will be digitized into British Sign Language (BSL) to allow for accessibility for D/deaf and hard of hearing students. Subtitles will also be made available in each version. While the main focus of this work is to provide accessible fieldwork opportunities for students with disabilities, this work also has additional benefits. Students within the Geography Department will be able to revisit the field trips, to revise and complete associated coursework. The use of digitized field work should not replace opportunities for real field work, but its use by the full cohort of students will begin to "normalize" accessible field
Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.
Krishnamurthy, Ganesh; Keller, Marc S.
Establishment of stable vascular access is one of the essential and most challenging procedures in a pediatric hospital. Many clinical specialties provide vascular service in a pediatric hospital. At the top of the “expert procedural pyramid” is the pediatric interventional radiologist, who is best suited and trained to deliver this service. Growing awareness regarding the safety and high success rate of vascular access using image guidance has led to increased demand from clinicians to provide around-the-clock vascular access service by pediatric interventional radiologists. Hence, the success of a vascular access program, with the pediatric interventional radiologist as the key provider, is challenging, and a coordinated multidisciplinary team effort is essential for success. However, there are few dedicated pediatric interventional radiologists across the globe, and also only a couple of training programs exist for pediatric interventions. This article gives an overview of the technical aspects of pediatric vascular access and provides useful tips for obtaining vascular access in children safely and successfully using image guidance.
Rigotti, N A
To start smoking, young people need a supply of tobacco products. Reducing youth access to tobacco is a new approach to preventing tobacco use that has been a focus of federal, state, and local tobacco control efforts over the past decade. All 50 states ban tobacco sales to minors, but compliance is poor because laws are not enforced. Consequently, young people have little trouble obtaining tobacco products. Commercial sources of tobacco (stores and vending machines) are important for underage smokers, who often purchase their own cigarettes. Underage youths also obtain tobacco from noncommercial sources such as friends, relatives, older adolescents, and adults. Educating retailers about tobacco sales laws has not produced long-term improvement in their compliance. Active enforcement of tobacco sales laws changes retailer behavior, but whether this reduces young people's access to tobacco or their tobacco use is not clear. The effectiveness of new local, state, and federal actions that aim to reduce youth access to tobacco remains to be determined. Can enforcing tobacco sales laws reduce young people's access to tobacco? If so, will this prevent or delay the onset of their tobacco use? How will youths' sources of tobacco change as commercial sources are restricted? What are the social (noncommercial) sources of tobacco for minors and how can youths' access to tobacco from these sources be reduced? What is the impact of the new federal policies aimed at reducing youth access to tobacco? Do new state and local laws that ban youth possession or use of tobacco have a net positive or negative impact on youth attitudes, access to tobacco, or tobacco use? What is the relative effectiveness and cost-effectiveness of efforts to reduce the supply of tobacco compared to those that aim to reduce demand for tobacco? Will either work alone or are both necessary to achieve reductions in youth smoking?
An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described
.... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...
Ham, C. H.; Yang, M. H.; Yoon, S. W.
The energy supply in the countries, which have abundant energy resources, may not be affected by accepting the assertion of anti-nuclear and environment groups. Anti-nuclear movements in the countries which have little energy resources may cause serious problem in securing energy supply. Especially, it is distinct in Korea because she heavily depends on nuclear energy in electricity supply(nuclear share in total electricity supply is about 40%).The cause of social trouble surrounding nuclear energy is being involved with various circumstances. However, it is very important that we are not aware of the importance of information access and prepared for such a situation from the early stage of nuclear energy's development. In those matter, this paper analyzes the contents of nuclear information access system in France and Japan which have dynamic nuclear development program and presents the direction of the nuclear access regime through comparing Korean status and referring to progresses of the regime
Full Text Available This essay argues that many of the assumptions that have been made about sprawl are misleading or just wrong. Nowhere has this been more the case than in debates about transportation and access. Because of this, it is not surprising that a good many of the policies advocated by proponents of Smart Growth would almost certainly lead to reduced mobility and impaired accessibility for a large part of the population. At very least, the debates over sprawl have pitted private vs. public transportation in a way that has contributed to serious underfunding of transportation infrastructure of all kinds.
Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo
A random access memory (RAM) uses n bits to randomly address N=2^n distinct memory cells. A quantum random access memory (qRAM) uses n qubits to address any quantum superposition of N memory cells. We present an architecture that exponentially reduces the requirements for a memory call: O(log N) switches need be thrown instead of the N used in conventional (classical or quantum) RAM designs. This yields a more robust qRAM algorithm, as it in general requires entanglement among exponentially l...
We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.
Ganeshan, Arul; Warakaulle, Dinuke R.; Uberoi, Raman
Central venous access plays an important role in the management of an ever-increasing population of patients ranging from those that are critically ill to patients with difficult clinical access. Interventional radiologists are key in delivering this service and should be familiar with the wide range of techniques and catheters now available to them. A comprehensive description of these catheters with regard to indications, technical aspects of catheterization, success rates, and associated early and late complications, as well as a review of various published guidelines on central venous catheter insertion are given in this article
Full Text Available Seminar.net enters it’s fourth year, and has reached a state of maturity in a number of meanings: it receives manuscripts from all continents, the articles are read from 134 countries, of which India represents the highest number of readers, a number of articles have been read by more than 10 000 interested persons, and the frequency of issues is now three per year, and will reach four by next year. Interested parties now approach us in order to learn about our policies and practices.It takes time to become established and influential in the sense that articles are cited and referred to in prestigious publications. Still, the most prestigious publications are on paper. Many countries now embark on a policy that rewards researchers that publish in international journals, preferably in English. National languages are rendered less significant. In the UK, the research assessment exercise (RAE, and several other countries with a publication or citation based reward system in research, tend to favour quantitative dimensions at the expense of the quality of the publication. International publishing houses are huge profit-making companies that over years have increased their profit rates, charging increasingly economically pressured higher education institution with high subscription rates. With the advent of electronic publishing their position is severely challenged. It has been noted that the most significant publication of the last couple of decades was an electronic publication: Tim Berners Lee published the protocol for the World Wide Web in 1990. It was never refereed, nor was controlled by appointed gatekeepers of the “establishment”. The number of Open Access publications is rising every day, and the number of e-journals for academic publishing is reaching higher and higher numbers. In a recent case The Faculty of Arts and Sciences at Harvard University decided, that Harvard employees must publish all their material simultaneously on the
Hallas, Peter; Brabrand, Mikkel; Folkestad, Lars
with aspiration of bone marrow (12.3%), and bended/broken needle (4.0%). When using an established IO access the reported complications were difficulties with injection fluid and drugs after IO insertion (7.4%), slow infusion (despite use of pressure bag) (8.8%), displacement after insertion (8...
Tremblay, Christopher W.
College Access Marketing (CAM) is a relatively new phenomenon that seeks to positively influence the college-going rate. This report defines CAM, describes CAM examples, and discusses how CAM seeks to counter barriers to college. It explores four main elements of CAM: information, marketing, advocacy, and social mobilization. Further, it…
Canessa, E.; Fonda, C.; Zennaro, M.
In order to reduce the knowledge divide, more Open Access Journals (OAJ) are needed in all languages and scholarly subject areas that exercise peer-review or editorial quality control. To finance needed costs, it is discussed why and how to sell target specific advertisement by associating ads to given scientific keywords. (author)
Awate, Snehal; Larsen, Marcus M.; Mudambi, Ram
to get on par with industry leaders. An in-depth comparison of knowledge flows reveals that within AMNEs, headquarters often serves the primary source of knowledge for R&D subsidiaries. In contrast, within EMNEs, headquarters accesses knowledge from R&D subsidiaries in advanced economies for innovation...
Baessa, Mohamed A.
The transition to open access (OA) is being driven by funders, libraries, researchers and publishers around the world, and is having an impact on us all. It is inevitable that different countries, organisations and disciplines are moving at different rates towards an OA model, and it is this that we will focus on in this session. Drawing on experiences from across Europe and the Middle East we will provide perspectives from both a global publisher and institutions based in the region. Taylor & Francis take a flexible, evidence-based approach to open access, providing a choice of publication routes for our authors, and a choice of agreements for our library customers. Carolyn will outline some of the open access developments, opportunities and challenges at Taylor & Francis. The library plays a critical role in facilitating open access for their researchers, from managing a repository to providing support and information on the OA publication process to their authors. Janis Tyhurst and Dr Imad Bachir will each give an overview of how this is being managed by their institution. There will be an opportunity for questions and discussion with the panel.
For the past 12 to 15 years, the US electric power and energy industry and its federal regulators have been going through a prolonged exercise leading to opening up the national interconnected transmission grid for all qualified wholesale users to have open and equal access. The debates have been painful in a sense that not all parties - especially some of the transmission system owning utilities - believe that the concept of Open Access is achievable, due to technical constraints on the systems. The present Open Access activity is limited to wholesales transaction under the federal jurisdiction, but several states are either experimenting with or considering retail wheeling. In fact, the FERC - Federal Energy Regulatory Commission - has already expanded its view to embrace retail transmission, if the retail transaction involves the use of the interstate transmission systems which are under FERC's jurisdiction. This paper delves into some of the results of the technical cost and pricing analysis for open access. The statutes and resulting regulations are not addressed herein. (author). 1 fig
Community colleges, with their commitment to open access, admit millions of students each year who are unprepared for college-level work, even though they have earned a high-school diploma. For decades the schools had a built-in base of students attracted to their open doors and relative affordability. But enrollment at public two-year college has…
T. M. Pestunova
Full Text Available The main aspects of the development of the information system, which grants users the rights for access to automated information system resources on the basis of the organization business-processes, are considered. The conceptual, informational, functional models of the system, as well as a model, which allows to realize control while using various formal models (RBAC, DAC, MAC, are described.
Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi
The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered as ...
Spoor, Dana L.
Argues that barrier-free designs should be incorporated in the first steps of school facility planning to avoid the difficulties in meeting Americans with Disabilities Act (ADA) guidelines during renovations. Explains why not all barriers need be removed to make a facility accessible to everyone. Discusses issues involving ADA guidelines and child…
Weller, Heiko [Robert Bosch, LLC, Farmington Hills, MI (United States)
The ACCESS project addressed the development, testing, and demonstration of the proposed advanced technologies and the associated emission and fuel economy improvement at an engine dynamometer and on a full-scale vehicle. Improve fuel economy by 25% with minimum performance penalties Achieve SULEV level emissions with gasoline Demonstrate multi-mode combustion engine management system
This book constitutes the proceedings of the 9th International Workshop on Multiple Access Communications, MACOM 2016, held in Aalborg, Denmark, in November 2016. The 10 full papers presented in this volume were carefully reviewed and selected from 12 submissions. They were organized in topical...
Overgaard, Morten; Sandberg, Kristian
that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesise that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about...
Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio
Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.
Losoff, Barbara; Pence, Harry E.
Open access publications provide scholars with unrestricted access to the "conversation" that is the basis for the advancement of knowledge. The large number of open access journals, archives, and depositories already in existence demonstrates the technical and economic viability of providing unrestricted access to the literature that is the…
Projektet Support Open Access Publishing har til mål at få opdateret Sherpa/Romeo databasen (www.sherpa.ac.uk/romeo) med fagligt relevante, danske tidsskrifter. Projektet skal endvidere undersøge mulighederne for at få udviklet en database, hvor forskere på tværs af relevante tidsskriftsinformati......Projektet Support Open Access Publishing har til mål at få opdateret Sherpa/Romeo databasen (www.sherpa.ac.uk/romeo) med fagligt relevante, danske tidsskrifter. Projektet skal endvidere undersøge mulighederne for at få udviklet en database, hvor forskere på tværs af relevante...
Probst, Christian W.; Hansen, René Rydhof
When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...... common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker’s actions usually will be logged as permissible, standard actions—if they are logged at all....... Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...
Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel
The viability of modern open science norms and practices depends on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50 % more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry...
Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel
The viability of modern open science norms and practices depend on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50% more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry....
Max Joseph Herman
Full Text Available Although essentially not all therapies need drug intervention, drugs is still an important components in health sector, either in preventive, curative, rehabilitative or promotion efforts. Hence the access to drugs is a main problem, either in international or national scale even to the smallest unit. The problem on access to drugs is very complicated and cannot be separated especially from pharmacy management problems; moreover in general from the overall lack of policy development and effective of health policy, and also the implementation process. With the policy development and effective health policy, rational drug uses, sufficient health service budget so a country can overcome the health problems. Besides infrastructures, regulations, distribution and cultural influences; the main obstacles for drug access is drugs affordability if the price of drugs is an important part and determined by many factors, especially the drug status whether is still patent orgenerics that significantly decrease cost of health cares and enhance the drugs affordability. The determination of essential drug prices in developing countries should based on equity principal so that poor people pay cheaper and could afford the essential drugs. WHO predicts two third of world population can not afford the essential drugs in which in developing countries, some are because of in efficient budget allocation in consequence of drug distribution management, including incorrect selection and allocation and also irrational uses. In part these could be overcome by enhancing performances on the allocation pharmacy needs, including the management of information system, inventory management, stock management and the distribution. Key words: access, drugs, essential drugs, generic drugs
Scheel, H.; Breitfeld, B.; Huebner, B.
Proceeding from the features of on-line retrieval from the INIS data base, a description is given of the technical and organizational conditions established by the national INIS Centre of the GDR in using the INIS direct access service. Data are presented on the structure of search queries, retrieval precision, and connect time to the computer. Experience has shown that efficient dialogue searching necessitates the searcher's skill and familiarity with the system. (author)
Zheludev, I.S.; Romanenko, A.G.
Librarians, researchers, and information specialists throughout the world now have the opportunity for direct access to coverage of almost 95% of the world's literature dealing with the peaceful uses of atomic energy and nuclear science. This opportunity has been provided by the International Nuclear Information System (INIS) of the IAEA. INIS, with the voluntary collaboration of more than 60 of the Agency's Member States, maintains a comprehensive, computer-resident data-base, containing the bibliographic details plus informative abstracts of the bulk of the world's literature on nuclear science and technology. Since this data-base is growing at a rate of 75,000 items per year, and already contains more than 500,000 items, it is obviously important to be able to search this collection conveniently and efficiently. The usefulness of this ability is enhanced when other data-bases on related subjects are made available on an information network. During the early 1970s, on-line interrogation of large bibliographic data-bases became the accepted method for searching this type of information resource. Direct interaction between the searcher and the data-base provides quick feed-back resulting in improved literature listings for launching research and development projects. On-line access enables organizations which cannot store a large data-base on their own computer to expand the information resources at their command. Because of these advantages, INIS undertook to extend to interested Member States on-line access to its data-base in Vienna
Are you writing a theoretical paper? An experimental one? Or one about instrumentation? You can publish it in Open Access. Now. Read how... You might have heard about Open Access, the next big thing in scientific publishing. The idea is to make the results of your (publicly funded) research free to read for everyone out there ... not only those lucky ones who work in places where libraries can afford to purchase the expensive subscriptions to scientific journals. CERN, DESY and other particle physics institutes have accepted an offer by one of the leading journals in High Energy Physics, JHEP: our libraries will pay a special subscription fee, and, in exchange, all articles with at least one author from our institutes will be published in Open Access. Anyone, anywhere and anytime will be able to read them, without any financial barrier! If you are writing an instrumentation paper, you can submit it to JINST and benefit from the same offer. This is a major step forward in the planned conversion of existi...
Full Text Available Nature, one of the most prominent scientific journals dedicated one of its issues to recent changes in scientific publishing (Vol. 495, Issue 7442, 27 March 2013. Its editors stressed that words technology and revolution are closely related when it comes to scientific publishing. In addition, the transformation of research publishing is not as much a revolution than an attrition war in which all sides are buried. The most important change they refer to is the open-access model in which an author or an institution pays in advance for publishing a paper in a journal, and the paper is then available to users on the Internet free of charge.According to preliminary results of a survey conducted among 23 000 scientists by the publisher of Nature, 45% of them believes all papers should be published in open access, but at the same time 22% of them would not allow the use of papers for commercial purposes. Attitudes toward open access vary according to scientific disciplines, leading the editors to conclude the revolution still does not suit everyone.
Currently, dominant web accessibility standards do not respect disability as a complex and culturally contingent interaction; recognizing that disability is a variable, contrary and political power relation, rather than a biological limit. Against this background there is clear scope to broaden the ways in which accessibility standards are understood, developed and applied. Commentary. The values that shape and are shaped by legislation promote universal, statistical and automated approaches to web accessibility. This results in web accessibility standards conveying powerful norms fixing the relationship between technology and disability, irrespective of geographical, social, technological or cultural diversity. Web accessibility standards are designed to enact universal principles; however, they express partial and biopolitical understandings of the relation between disability and technology. These values can be limiting, and potentially counter-productive, for example, for the majority of disabled people in the "Global South" where different contexts constitute different disabilities and different experiences of web access. To create more robust, accessible outcomes for disabled people, research and standards practice should diversify to embrace more interactional accounts of disability in different settings. Implications for Rehabilitation Creating accessible experiences is an essential aspect of rehabilitation. Web standards promote universal accessibility as a property of an online resource or service. This undervalues the importance of the user's intentions, expertize, their context, and the complex social and cultural nature of disability. Standardized, universal approaches to web accessibility may lead to counterproductive outcomes for disabled people whose impairments and circumstances do not meet Western disability and accessibility norms. Accessible experiences for rehabilitation can be enhanced through an additional focus on holistic approaches to
Mônica Sena de Souza
Full Text Available Introduction: Discusses the role of information professionals in meeting the informational demands of people with disabilities in the information society. The librarian is crucial for the effectiveness and success in the informational inclusion of people with disabilities, considering also continuing education for their professional qualification.Objective: To provide reflections on the role of the librarian in serving users with disabilities, highlighting the need for improvement in information units, identified in the scientific literature with regard to accessibility.Methodology: Literature search, based on a review of literature in books and scientific papers, highlighting the main authors: Adams (2000, Mazzoni (2001 and Sassaki (1997, 2002, 2005.Results: The lack of informational access for people with disabilities hampers their social and political participation, hence, reduces its condition of citizenship.Conclusion: The librarian responsible for seeking continuing education, greater involvement in the events of the area and the constant search for job training, which will reflect on the best service the information needs of users with disabilities.
This paper focuses on the role of non-governmental organization (NGO) citizen groups in Ontario in the use and production of electricity. NGOs have the potential to act both directly on their own accord, and indirectly by pressuring government and others. Current demand for electricity is divided between industrial, commercial and residential users. Citizens have an important role to play in reducing energy demand. On the supply side, there is a revival of interest in renewable energy based on wind, photovoltaic and local-hydro technologies as a result of the escalating environmental and economic costs of coal and nuclear generation. However, citizen groups have greater interest and enthusiasm than technical expertise, creating a mismatch between technological solutions and human need or use of them. This paper discusses how this mismatch applies to renewable-energy technologies, many of which are not especially user-friendly, or accessible. While alternative technologies are increasingly welcomed by government, industry is developing a large and growing array of technological devices. In between this is the citizen, who, despite keen interest, can be overwhelmed by the complexity of the situation. This paper links the theoretical perspective to the real world with a discussion of the dynamics between people and renewable energy in citizen groups and makes particular reference to one group, Citizens for Renewable Energy, that has been making renewable energy technology more accessible to its members for over a decade
Kraimer, M.; Hill, J.
This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer's interface is given. Security protocol is described and finally aids for reading the access security code are provided
Facebook Visit us on Twitter Visit us on Youtube Emergency Access Initiative Home | Journals | Books | Online Databases | FAQs Take Short Survey FAQ What is the Emergency Access Initiative? The Emergency Access Initiative (EAI) is a collaborative partnership between NLM and participating publishers to
Jay D Raman
Full Text Available Laparoscopic nephrectomy has assumed a central role in the management of benign and malignant kidney diseases. While laparoscopy is less morbid than open surgery, it still requires several incisions each at least 1-2 cm in length. Each incision carries morbidity risks of bleeding, hernia and/or internal organ damage, and incrementally decreases cosmesis. An alternative to conventional laparoscopy is single access or keyhole surgery, which utilizes magnetic anchoring and guidance system (MAGS technology or articulating laparoscopic instruments. These technical innovations obviate the need to externally space trocars for triangulation, thus allowing for the creation of a small, solitary portal of entry into the abdomen. Laboratory and early clinical series demonstrate feasibility as well as safe and successful completion of keyhole nephrectomy. Future work is necessary to improve existing instrumentation, increase clinical experience, assess benefits of this surgical approach, and explore other potential applications for this technique.
Full Text Available Improved accessibility and its correlate lower generalized cost of contact, travel and transport have been sought by dynamic human societies for their economic and social benefits through- out recorded history. The paper will reflect about this process at a number of different spatial and temporal scales based on a conceptual model. Looking back at European history, it will trace the interaction between Christaller's logic of local market areas and the idea of (low contact cost network cities. Focusing on Switzerland since 1950 it will show how network investment changed the relative distribution of population and employment and how this interacted with changes in the preferences of the travelers. Using a recent snapshot of how a substantial sample of Swiss maintain their social networks over often very large areas, it will try to answer the question of what will happen in the future, if the current trend of ever lower costs of contact will persist.
of the European Union, and how its cultural policy responds to the changes that the digital paradigm has brought upon the field. The self-publishing features of various Web 2.0 platforms, along with the interactive and distributional potentials that the Internet offers, have given rise to what is referred to here...... in cultural production and consumption. The first part of this works looks at how these changes respond to the field of cultural policy, as well as suggesting a possible culturepolitical reaction in a model which I refer to as access culture. In terms of theoretical approach, the notion of digital cultural...... of YouTube, MySpace, Facebook and Flickr, along with lesser known platforms such as the animated short film Elephants Dream, the BBC's Creative Archive, various Internet artworks and the Internet Archive. I furthermore introduce the copyright system Creative Commons in order to suggest legal, widely...
Andersen, Ove Kjeld; Hjulmand, Christian
Approximately 30% of the Danish population has severe problems in reading everyday text. In the light of the increasing amount of text available on the Internet this poses a democratic challenge to ensure “equal access” to information. The Talking Internet service - Access For All (AFA) - offers...... a free Internet-based tool for reading aloud any marked text with a synthetic voice. The only requirements are a standard equipped PC running a recent Windows OS and an Internet connection. Experiences gathered from running the service for more than 28 months underline the viability of the concept....... There is a clear need for a free internet based Danish text-to-speech synthesizer. Furthermore, the current state of technology i.e. internet bandwidth, response time and server technology is sufficient for setting up an online automatic reading service that is used by steadily growing number of individuals...
Holmes, Jon L.
New JCE Internet Feature at JCE Online Biographical Snapshots of Famous Chemists is a new JCE Internet feature on JCE Online. Edited by Barbara Burke, this feature provides biographical information on leading chemists, especially women and minority chemists, fostering the attitude that the practitioners of chemistry are as human as those who endeavor to learn about it. Currently, the column features biographical "snapshots" of 30 chemists. Each snapshot includes keywords and bibliography and several contain links to additional online information about the chemist. More biographical snapshots will appear in future installments. In addition, a database listing over 140 women and minority chemists is being compiled and will be made available online with the snapshots in the near future. The database includes the years of birth and death, gender and ethnicity, major and minor discipline, keywords to facilitate searching, and references to additional biographical information. We welcome your input into what we think is a very worthwhile resource. If you would like to provide additional biographical snapshots, see additional chemists added to the database, or know of additional references for those that are already in the database, please contact JCE Online or the feature editor. Your feedback is welcome and appreciated. You can find Biographical Snapshots of Famous Chemists starting from the JCE Online home page-- click the Features item under JCE Internet and then the Chemist Bios item. Access JCE Online without Name and Password We have recently been swamped by libraries requesting IP-number access to JCE Online. With the great benefit IP-number authentication gives to librarians (no user names and passwords to administer) and to their patrons (no need to remember and enter valid names and passwords) this is not surprising. If you would like access to JCE Online without the need to remember and enter a user name and password, you should tell your librarian about our
WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min
Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.
By Robin Meckley, Contributing Writer, and Tracie Frederick, Guest Writer Open access and public access—are they different concepts or are they the same? What do they mean for the researchers at NCI at Frederick? “Open-access (OA) literature is digital, online, free of charge, and free of most copyright and licensing restrictions. What makes it possible is the Internet and the consent of the author or copyright-holder,” according to an open access website maintained by Peter Suber, director, Harvard Open Access Project.
Grice, Noreen A.
A new semester begins, and your students enter the classroom for the first time. You notice a student sitting in a wheelchair or walking with assistance from a cane. Maybe you see a student with a guide dog or carrying a Braille computer. Another student gestures "hello” but then continues hand motions, and you realize the person is actually signing. You wonder why another student is using an electronic device to speak. Think this can't happen in your class? According to the U.S. Census, one out of every five Americans has a disability. And some disabilities, such as autism, dyslexia and arthritis, are considered "invisible” disabilities. This means you have a high probability that one of your students will have a disability. As an astronomy instructor, you have the opportunity to reach a wide variety of learners by using creative teaching strategies. I will share some suggestions on how to make astronomy and your part of the universe more accessible for everyone.
Full Text Available This article presents the project that I led for HEFCE on the implications of OA (open access for monographs and other long-form research publications. The likely requirement that books should be OA if submitted to the REF (Research Excellence Framework after next means that OA development must be based on an understanding of the importance of the monograph in the AHSS (arts, humanities and social sciences as well as the challenges involved in making the transition to online OA. The project focused on three issues and each is summarized in turn in the article: What is the place of the monograph and other long-form publications in AHSS disciplines that makes it so important? What is happening to the monograph and is there a crisis as some suggest? What are the issues involved in moving monographs into a digital and OA environment – not just the challenge of effective business models but also many other aspects of sustaining and enhancing the qualities of the monograph? These include third-party rights, technical challenges, licences and the need for international collaboration.
Archer, Charles J.; Blocksome, Michael A.
Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.
Swahlan, David J; Wilke, Jason
An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.
Ahn, Jung Ho; Erez, Mattan; Dally, William J
Atomic memory access requests are handled using a variety of systems and methods. According to one example method, a data-processing circuit having an address-request generator that issues requests to a common memory implements a method of processing the requests using a memory-access intervention circuit coupled between the generator and the common memory. The method identifies a current atomic-memory access request from a plurality of memory access requests. A data set is stored that corresponds to the current atomic-memory access request in a data storage circuit within the intervention circuit. It is determined whether the current atomic-memory access request corresponds to at least one previously-stored atomic-memory access request. In response to determining correspondence, the current request is implemented by retrieving data from the common memory. The data is modified in response to the current request and at least one other access request in the memory-access intervention circuit.
Consolo, Michael J; Syed, Kirin K; Robison, Christopher; McFadden, Jacob; Shalowitz, David I; Brown, Gordon A; Sussman, David O; Figler, Bradley D
Urethroplasty is an effective treatment for men with anterior urethral strictures, but is utilized less frequently than ineffective treatments such as internal urethrotomy. We sought to identify provider-level barriers to urethroplasty. An anonymous online survey was emailed to all Mid-Atlantic American Urological Association members. Six scenarios in which urethroplasty was the most appropriate treatment were presented. Primary outcome was recommendation for urethroplasty in ≥ three clinical scenarios. Other factors measured include practice zip code, urethroplasty training, and proximity to a urethroplasty surgeon. Multivariate logistic regression identified factors associated with increased likelihood of urethroplasty recommendation. Of 670 members emailed, 109 (16%) completed the survey. Final analysis included 88 respondents. Mean years in practice was 17.2. Most respondents received formal training in urethroplasty: 43 (49%) in residency, 5 (6%) in fellowship, and 10 (11%) in both; 48 respondents (55%) had a urethroplasty surgeon in their practice, whereas 18 (20%) had a urethroplasty surgeon within 45 minutes of his or her primary practice location. The only covariate that was associated with an increased likelihood of recommending urethroplasty in ≥ three scenarios was formal urethroplasty training. Most members (68%) reported no barriers to referring patients for urethroplasty; the most common barriers cited were long distance to urethroplasty surgeon (n 5 13, 15%) and concern about complications (n 5 8, 9%). Urethroplasty continues to be underutilized in men with anterior urethral strictures, potentially due to lack of knowledge dissemination and access to a urethroplasty surgeon. Appropriate urethroplasty utilization may increase with greater exposure to urethroplasty in training.
The World Wide Web is an extremely powerful source of information, inspiration, ideas, and opportunities. As such, it has become an integral part of daily life for a great majority of people. Yet, for a significant number of others, the internet offers only limited value due to the existence of barriers which make accessing the Web difficult, if not impossible. This article illustrates some of the reasons that achieving equality of access to the online world of education is so critical, explores the current status of Web accessibility, discusses evaluative tools and methods that can help identify accessibility issues in educational websites, and provides practical recommendations and guidelines for resolving some of the obstacles that currently hinder the achievability of the goal of universal Web access.
The principles for the subsidy awards are based not only on the experience of ... the best-practice model for special funding to support access to communications .... Malaysia, Russia, Mongolia and elsewhere).5 The Ugandan model uses the ...... services or serve additional areas, access to radio spectrum and lower taxes.
Fitzpatrick, J J
Intravenous (IV) access is a valuable skill for dental practitioners in emergency situations and in IV sedation. However, many people feel some apprehension about performing this procedure. This article explains the basic principles behind IV access, and the relevant anatomy and physiology, as well as giving a step-by-step guide to placing an IV cannula.
Discusses traditional library approaches to access to information and the possible impact of information technologies, library automation, and artificial intelligence. Access issues raised by these technologies are identified and a research agenda to explore these issues is outlined. (31 references) (CLB)
Ruffini, Marco; Cincotti, Gabriella; Pizzinat, Anna; Vetter, Peter
Over the past decade we have seen an increasing number of operators deploying Fibre-to-the-home (FTTH) solutions in access networks, in order to provide home users with a much needed network access upgrade, to support higher peak rates, higher sustained rates and a better and more uniform broadband coverage of the territory.
Falch, Morten; Henten, Anders
The paper discusses appropriate policy measures for achieving universal access to broadband services in Europe. Access can be delivered by means of many different technology solutions described in the paper. This means a greater degree of competition and affects the kind of policy measures...
Hassler, Ardoth; Neuman, Michael
Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…
On 11 May, a major change concerning the requirements to access the CERN beam facilities was put in place and implemented in ADaMS in order to reduce the number of courses that people who need access to multiple installations have to follow. This revision includes dedicated safety training courses that replace, in particular, the “Safety during LS1” e-learning course, which is now to be considered obsolete. CERN’s Access Distribution and Management System (ADaMS). As of 11 May, an important improvement was implemented in ADaMS (CERN’s Access Distribution and Management System) regarding the requisites to access safety zones. This change is closely related to the introduction of a generic e-learning course ("CERN Beam Facilities") covering the common risks and systems present in CERN's beam facilities. Two e-learning courses are no longer valid, nor available on the SIR (Safety Information Registration) catalogue: the &ld...
Furano, F; Hanushevsky, A
High Energy Physics data processing and analysis applications typically deal with the problem of accessing and processing data at high speed. Recent studies, development and test work have shown that the latencies due to data access can often be hidden by parallelizing them with the data processing, thus giving the ability to have applications which process remote data with a high level of efficiency. Techniques and algorithms able to reach this result have been implemented in the client side of the Scalla/xrootd system, and in this contribution we describe the results of some tests done in order to compare their performance and characteristics. These techniques, if used together with multiple streams data access, can also be effective in allowing to efficiently and transparently deal with data repositories accessible via a Wide Area Network
Blanco-Gonzalo, Ramon; Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael
Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.
Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael
Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products. PMID:29565989
Full Text Available Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.
VISITS The rules and conditions to be followed for visits in the SM18 Hall are laid out in the EDMS 1205328 document. No visit is allowed without prior reservation. ACCESS Special access right is needed ONLY from 7 p.m. to 7 a.m. and during week-ends. From 1 December, the current SM18 access database will be closed and a new one “SM18-OWH outside normal hours” started from scratch. Requests, via EDH SM18-OWH, will have to be duly justified. For further information, please contact Evelyne Delucinge.
Kelley, Jay; Wessels, Denzil
Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step
Potter, K.; Littenberg, L.
An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release
Full Text Available In an environment where we increasingly have access to a collective collection of digitized books, special collections will become increasingly invisible if they are not accessible online. In an era of increasing expectations and decreasing budgets, finding ways to streamline some of our processes is the best way to enable us to do more with less. This report details a number of investigations into how access to special collections can be increased. It includes guidance running the gamut from digitization and rights management to policies and procedures.
Stieg, Kerstin; Pavlovic, Karlo
The glossary „Open Access from A to Z“ comprises essential key terms on Open Access such as arXiv, The Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities, the Budapest Open Access Initiative (BOAI), Creative Commons (CC), the Directory of Open Access Books (DOAB), the Directory of Open Access Journals (DOAJ), the Directory of Open Access Repositories (OpenDOAR), the EU project Digital Repository Infrastructure Vision for European Research (DRIVER), the Finch Report,...
Collins, Earl R., Jr. (Inventor)
A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.
A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)
Fahrenfort, Johannes J; van Leeuwen, Jonathan; Olivers, Christian N L; Hogendoorn, Hinze
The visual system has the remarkable ability to integrate fragmentary visual input into a perceptually organized collection of surfaces and objects, a process we refer to as perceptual integration. Despite a long tradition of perception research, it is not known whether access to consciousness is required to complete perceptual integration. To investigate this question, we manipulated access to consciousness using the attentional blink. We show that, behaviorally, the attentional blink impairs conscious decisions about the presence of integrated surface structure from fragmented input. However, despite conscious access being impaired, the ability to decode the presence of integrated percepts remains intact, as shown through multivariate classification analyses of electroencephalogram (EEG) data. In contrast, when disrupting perception through masking, decisions about integrated percepts and decoding of integrated percepts are impaired in tandem, while leaving feedforward representations intact. Together, these data show that access consciousness and perceptual integration can be dissociated.
Millennium Challenge Corporation — This is not a performance evaluation by an independent evaluator, but rather a review by the MCC former Benin Access to Land Project Lead of project implementation,...
Full Text Available This paper represents the overall electrical energy profile and access in Bangladesh. In the recent past Bangladesh has been experiencing shortage of electricity, and about 42 % of population no access to the electricity. The electricity consumption has rapidly increased over last decade. The demand and consumption will intensify in the remote future as overall development and future growth. To set “vision 2021” of Bangladesh; government of Bangladesh has devoted to ensuring access of affordable and reliable electricity for all by 2021. In the modern time, energy is the vital ingredient for socioeconomic growth in the developing country i.e., alleviating poverty. Along with electricity access in Bangladesh strived to become middle income country by 2021. Bangladesh has experienced that energy consumption inclines to increase rapidly when per capita income researches between US$ 1,000 and US$ 10,000, and a country’s
Francisco José GARCÍA-PEÑALVO
Full Text Available The first editorial of EKS volume 18 retakes a recurrent theme in this journal: the Open Access, in this case to reflect on some of the myths that are still very ingrained in the scientific community.
National Oceanic and Atmospheric Administration, Department of Commerce — This limited access system limits the number of charter vessels that may participate in the guided sport fishery for halibut in area 2C and 3A. NMFS issues a charter...
Minnesota Department of Natural Resources — This data shows the approximate locations of boat accesses in the state. This is not a comprehensive list but one that was generated through a cooperative effort....
This Policy establishes EPA's responsibilities and procedures for making its Electronic and Information Technology (EIT) products accessible to all people, including people with disabilities, in accordance with Section 508 of the Rehabilitation Act.
U.S. Department of Health & Human Services — Under the Affordable Care Act, millions of uninsured Americans will gain access to affordable coverage through Affordable Insurance Exchanges and improvements in...
U.S. Department of Health & Human Services — The MCBS 2013 Access to Care public use file (MCBS PUF) provides the first publically available MCBS file for researchers interested in the health, health care use,...
This book presents statistical models that have recently been developed within several research communities to access information contained in text collections. The problems considered are linked to applications aiming at facilitating information access:- information extraction and retrieval;- text classification and clustering;- opinion mining;- comprehension aids (automatic summarization, machine translation, visualization).In order to give the reader as complete a description as possible, the focus is placed on the probability models used in the applications
Waits and delays for healthcare are legendary. These delays are not only frustrating and potentially hazardous for patients and providers but also represent significant cost to office practices. The traditional medical model that defines urgent care versus routine care is a vain and futile attempt to sort demand. This approach is at constant odds with patients' definition of urgency. Trusting patients to determine when and how they want to access care makes sense from a customer service perspective. If approached systematically using the principles of Advanced Access, patient demand patterns can be tracked to forecast demand. These demand patterns become the template for deploying the resources necessary to meet patients' needs. Although not a simple journey, the transformation to Advanced Access provides an entree to patient-centered care where patients can say, "I get exactly the care I want and need, when I want and need it."
Al Shakarchi, Julien; Day, C; Inston, N
Home haemodialysis has been advocated due to improved quality of life. However, there are very little data on the optimum vascular access for it. A retrospective cohort study was carried on all patients who initiated home haemodialysis between 2011 and 2016 at a large university hospital. Access-related hospital admissions and interventions were used as primary outcome measures. Our cohort consisted of 74 patients. On initiation of home haemodialysis, 62 individuals were using an arteriovenous fistula as vascular access, while the remaining were on a tunnelled dialysis catheter. Of the 12 patients who started on a tunnelled dialysis catheter, 5 were subsequently converted to either an arteriovenous fistula ( n = 4) or an arteriovenous graft ( n = 1). During the period of home haemodialysis use, four arteriovenous fistula failed or thrombosed with patients continuing on home haemodialysis using an arteriovenous graft ( n = 3) or a tunnelled dialysis catheter ( n = 1). To maintain uninterrupted home haemodialysis, interventional rates were 0.32 per arteriovenous fistula/arteriovenous graft access-year and 0.4 per tunnelled dialysis catheter access-year. Hospital admission rates for patients on home haemodialysis were 0.33 per patient-year. Our study has shown that home haemodialysis can be safely and independently performed at home within a closely managed home haemodialysis programme. The authors also advocate the use of arteriovenous fistulas for this cohort of patients due to both low complication and intervention rates.
Sydee, Ahmed Nasim
In the first essay, a theoretical model is developed to determine the time path of optimal access price in the telecommunications industry. Determining the optimal access price is an important issue in the economics of telecommunications. Setting a high access price discourages potential entrants; a low access price, on the other hand, amounts to confiscation of private property because the infrastructure already built by the incumbent is sunk. Furthermore, a low access price does not give the incumbent incentives to maintain the current network and to invest in new infrastructures. Much of the existing literature on access pricing suffers either from the limitations of a static framework or from the assumption that all costs are avoidable. The telecommunications industry is subject to high stranded costs and, therefore, to address this issue a dynamic model is imperative. This essay presents a dynamic model of one-way access pricing in which the compensation involved in deregulatory taking is formalized and then analyzed. The short run adjustment after deregulatory taking has occurred is carried out and discussed. The long run equilibrium is also analyzed. A time path for the Ramsey price is shown as the correct dynamic price of access. In the second essay, a theoretical model is developed to determine the time path of optimal access price for an infrastructure that is characterized by congestion and lumpy investment. Much of the theoretical literature on access pricing of infrastructure prescribes that the access price be set at the marginal cost of the infrastructure. In proposing this rule of access pricing, the conventional analysis assumes that infrastructure investments are infinitely divisible so that it makes sense to talk about the marginal cost of investment. Often it is the case that investments in infrastructure are lumpy and can only be made in large chunks, and this renders the marginal cost concept meaningless. In this essay, we formalize a model of
Full Text Available The paper follows accessing patterns of five cohorts of postgraduate students enrolled in a core unit within a master of business administration (MBA program. The unit is designed to provide numerous opportunities for student participation in Discussion Boards using Blackboard technology. Discussion Boards create numerous opportunities for interaction amongst online learners to share and exchange their experiences, creating a sense of a virtual community. Relationships between accessing patterns for each week of the semester for each student are explored in relation to their performance using course statistics generated by the Blackboard technology. Close examination of the significant differences in access patterns to the course window and its components of communication, content, and student areas reveal middle of the semester (week 7 as the common critical point that differentiates high achieving students from low achieving students. Identifying critical points provides the faculty staff member an opportunity to introduce intervention strategies in order to improve the learning experience of all the students.
Dolog, Peter; Simon, Bernd; Nejdl, Wolfgang
In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address in this fra......In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address...... in this framework, enabling personalized access to federated learning repositories with a vast number of learning offers. Our infrastructure includes personalization strategies both at the query and the query results level. Query rewriting is based on learning and language preferences; rule-based and ranking...
Zhong, Wei-Ping, E-mail: email@example.com [Department of Electronic and Information Engineering, Shunde Polytechnic, Guangdong Province, Shunde 528300 (China); Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar); Belić, Milivoj [Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar); Zhang, Yiqi [Key Laboratory for Physical Electronics and Devices of the Ministry of Education & Shaanxi Key Lab of Information Photonic Technique, Xi’an Jiaotong University, Xi’an 710049 (China)
We demonstrate that accessible solitons described by an extended Schrödinger equation with the Laplacian of fractional dimension can exist in strongly nonlocal nonlinear media. The soliton solutions of the model are constructed by two special functions, the associated Legendre polynomials and the Laguerre polynomials in the fraction-dimensional space. Our results show that these fractional accessible solitons form a soliton family which includes crescent solitons, and asymmetric single-layer and multi-layer necklace solitons. -- Highlights: •Analytic solutions of a fractional Schrödinger equation are obtained. •The solutions are produced by means of self-similar method applied to the fractional Schrödinger equation with parabolic potential. •The fractional accessible solitons form crescent, asymmetric single-layer and multilayer necklace profiles. •The model applies to the propagation of optical pulses in strongly nonlocal nonlinear media.
Joyce Addo-Atuah * Joyce Addo-Atuah, BPharm, MSc, PhD, Assistant Professor, Touro College of Pharmacy, New York, USA. She was a PhD candidate at the University of Tennessee (UT), Memphis, USA, when the study was undertaken in Ghana. firstname.lastname@example.org, Dick Gourley Dick Gourley, PharmD, Professor and Dean, UT College of Pharmacy during the study and major research advisor. , Greta Gourley Greta Gourley, PharmD/PhD, retired Associate Professor of Pharmaceutical Sciences at UT College of Pharmacy and research advisor. , Shelley I. White-Means Shelley I. White-Means, PhD, Professor and Chair, Health Outcomes and Policy Research Division of UT College of Pharmacy at time of the study and research advisor. , Robin J. Womeodu Robin J. Womeodu, MD, F.A.C.P., Associate Professor of Internal Medicine and Preventive Medicine at UT College of Medicine at time of study and research advisor. , Richard J. Faris Richard J. Faris, Assistant Professor at UT College of Pharmacy at time of study and research advisor. &
May 30, 2012 ... The accuracy of any instructions, formulae, and drug doses ... The convenience of accessing antiretroviral therapy (ART) is ...... tious diseases, paediatrics, chest diseases, dermatology, public .... CD4 count, (2) a full blood count, (3) a liver function test, (4) ..... America: measures of the African brain drain.
SAHARA-J: Journal of Social Aspects of HIV/AIDS. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 9, No 2 (2012) >. Log in or Register to get access to full text downloads.
Full Text Available The paper discusses appropriate policy measures for achieving universal access to broadband services in Europe. Access can be delivered by means of many different technology solutions described in the paper. This means a greater degree of competition and affects the kind of policy measures to be applied. The paper concludes that other policy measure than the classical universal service obligation are in play, and discusses various policy measures taking the Lisbon process as a point of departure. Available policy measures listed in the paper include, universal service obligation, harmonization, demand stimulation, public support for extending the infrastructure, public private partnerships (PPP, and others.
Sala, Davide; Yalcin, Erdal; Schröder, Philipp
on the risk that exporters face in destination markets. The present paper formalizes the underlying interaction of risk, fixed export costs and firms' market entry decisions based on techniques known from the real options literature; doing so we highlight the important role of bound tariffs at the extensive...... margin of trade. We find that bound tariffs are more effective with higher risk destination markets, that a large binding overhang may still command substantial market access, and that reductions in bound tariffs generate effective market access even when bound rates are above current and longterm...
Sala, Davide; Schröder, Philipp J.H.; Yalcin, Erdal
on the risk that exporters face in destination markets. The present paper formalizes the underlying interaction of risk, fixed export costs and firms' market entry decisions based on techniques known from the real options literature; doing so we highlight the important role of bound tariffs at the extensive...... margin of trade. We find that bound tariffs are more effective with higher risk destination markets, that a large binding overhang may still command substantial market access, and that reductions in bound tariffs generate effective market access even when bound rates are above current and long...
Mele, Salvatore; D'Agostino, Dan; Dyas-Correia, Sharon
SCOAP3 is an innovative Open Access initiative for publishing in high-energy physics. The model is viewed by many as a potential solution to multiple issues related to the financial crisis, the peer review system, scholarly communication, and the need to support institutional repositories. This installment of “The Balance Point” presents articles written by three Open Access advocates, outlining the SCOAP3 proposal, benefits of participation, and some of the roles libraries, publishers and scientists can play in making important changes to scholarly communication. Contributors discuss scalability and transferability issues of SCOAP3, as well as other matters of concern.
Singh, Rajiv; Pentland, Brian
The Disability Discrimination Act (1995) protects disabled people from discrimination in access to services, facilities and goods as well as in education and employment. All hospitals have an inherent duty to enable access to services but this will now be enshrined in law. As the health sector has most contact with disability, it may be expected that most hospitals would already be in a good position to comply with the Act, especially one treating many patients with disability. However we identified many problems in a rehabilitation hospital setting by means of a simple access audit in March 2004. Recommendations were set out and by March 2005 considerable improvements had been made costing Pound 100,000. Although many necessary changes will be expensive, not all problems identified require costly correction. Many simply involve a change in staff attitudes and practices. We recommend that all hospitals start to identify the changes needed under the Act by means of a simple access audit that can be carried out by hospital staff with no specialist equipment.
Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…
The ANNALS of AFRICAN SURGERY. January 2016 Volume 13 Issue 1 1. EDITORIAL. Access to Specialized Surgical Care. Saidi H. University of Nairobi. Correspondence to: Prof Hassan Saidi, P.O Box 30196-00100, Nairobi. Email: email@example.com. Ann Afr Surg. 2016;13(1):1-2. The narrative of surgical disease in ...
The booklet provides information and resources for cultural organizations and institutions interested in making the arts accessible to deaf citizens. Preliminary information includes a discussion of deafness in America and the deaf in the history of the arts and notes that the era of silent films was the golden age of cinema. Listed are 36…
An experimental drug has been tested in the lab and with animals and approved for testing in people by the FDA, but can’t yet be advertised, sold, or prescribed. Experimental drugs may be available through clinical trials or expanded access programs - learn more about these programs and how to talk to your doctor.
Fahrenfort, Johannes J.; Van Leeuwen, Jonathan; Olivers, Christian N.L.; Hogendoorn, Hinze
The visual system has the remarkable ability to integrate fragmentary visual input into a perceptually organized collection of surfaces and objects, a process we refer to as perceptual integration. Despite a long tradition of perception research, it is not known whether access to consciousness is
Access to effective healthcare is in particular challenging for vulnerable and socially disadvantaged patients. Patients with chronic conditions are over-represented in these lower socioeconomic (LSES) groups. No generic review integrating the evidence on Self-Management support interventions in ...
Müller, Romina; Remdisch, Sabine; Köhler, Katharina
developmental stages. This article maps the development in Denmark, Finland, Germany and England using a case study approach deploying data triangulation from a national and institutional perspective. It explores the extent/commonality of structural factors for easing access for students engaging in lifelong...
Jæger, Mads Meier
with respect to Danish children's choice of secondary education. Denmark is well-suited for this study because access to secondary education is particularly meritocratic. The empirical analysis shows that all three channels through which cultural capital affects educational success are important....
While most open access journals are peer‐reviewed and high quality, there are a number of ... Publisher has a negative reputation (e.g., documented examples in Chronicle of Higher Education, ... A key part of Canada's aid program, IDRC supports research in developing countries to promote growth and development.
Lewis, David W.
Open access (OA) is an alternative business model for the publication of scholarly journals. It makes articles freely available to readers on the Internet and covers the costs associated with publication through means other than subscriptions. This article argues that Gold OA, where all of the articles of a journal are available at the time of…
Bode, Emil; Braukmann, Ricarda; Doorn, P.K.
This poster shows the state of open access in the Netherlands according to NARCIS, the national portal for information on Dutch science. The number of open and closed publications in NARCIS analysed, per type of publication, per year for PhD dissertations and articles, along with a percentage of OA
3 Impact of Public Access to ICT Skills on Job Prospects in Rwanda ... reform and information and communication technology (ICT) policies, particularly in developing countries. ... (From internal memoranda prepared by Amy Mahan, 2008) ..... little decision-making autonomy, power, or financial control within the household.
Darling, Richard L.
Reviews attitudes toward censorship in the United States throughout its history in relation to the nation and its institutions. The library is recognized as an institution in which censorship has no place, due to its creed of information access and intellectual freedom for all. (MBR)
Hawley, Willis D., Ed.; Ready, Timothy, Ed.
This study examined the continued relevance and adequacy of the Elementary and Secondary School Civil Rights Compliance Report (E&S Survey) as a tool for enforcing civil rights laws in education, monitoring quality of access to learning opportunities, and research on other current issues of educational policy and practice. The Committee on…
Full Text Available In January 2009, the Colorado Association of Libraries (CAL suspended publication of its print quarterly journal, Colorado Libraries, as a cost-saving measure in a time of fiscal uncertainty. Printing and mailing the journal to its 1300 members cost CAL more than $26,000 per year. Publication of the journal was placed on an indefinite hiatus until the editorial staff proposed an online, open access format a year later. The benefits to migrating to open access included: significantly lower costs; a green platform; instant availability of content; a greater level of access to users with disabilities; and a higher level of visibility of the journal and the association. The editorial staff chose Drupal, including the E-journal module, and while Drupal is notorious for its steep learning curve—which exacerbated delays to content that had been created before the publishing hiatus—the fourth electronic issue was published recently at coloradolibrariesjournal.org. This article will discuss both the benefits and challenges of transitioning to an open access model and the choice Drupal as a platform over other more established journal software options.
This work uses simple two-body orbital dynamics to initially determine the kinematic access for a ballistic vehicle. Primarily this analysis was developed to assess when a rocket body might conjunct with an orbiting satellite platform. A family of access opportunities can be represented as a volume for a specific rocket relative to its launch platform. Alternately, the opportunities can be represented as a geographical footprint relative to aircraft or satellite position that encompasses all possible launcher locations for a specific rocket. A thrusting rocket is treated as a ballistic vehicle that receives all its energy at launch and follows a coasting trajectory. To do so, the rocket's burnout energy is used to find its equivalent initial velocity for a given launcher's altitude. Three kinematic access solutions are then found that account for spherical Earth rotation. One solution finds the maximum range for an ascent-only trajectory while another solution accommodates a descending trajectory. In addition, the ascent engagement for the descending trajectory is used to depict a rapid access scenario. These preliminary solutions are formulated to address ground-, sea-, or air-launched vehicles.
Addo-Atuah, Joyce; Gourley, Dick; Gourley, Greta; White-Means, Shelley I; Womeodu, Robin J; Faris, Richard J; Addo, Nii Akwei
The convenience of accessing antiretroviral therapy (ART) is important for initial access to care and subsequent adherence to ART. We conducted a qualitative study of people living with HIV/AIDS (PLWHA) and ART healthcare providers in Ghana in 2005. The objective of this study was to explore the participants' perceived convenience of accessing ART by PLWHA in Ghana. The convenience of accessing ART was evaluated from the reported travel and waiting times to receive care, the availability, or otherwise, of special considerations, with respect to the waiting time to receive care, for those PLWHA who were in active employment in the formal sector, the frequency of clinic visits before and after initiating ART, and whether the PLWHA saw the same or different providers at each clinic visit (continuity of care). This qualitative study used in-depth interviews based on Yin's case-study research design to collect data from 20 PLWHA and 24 ART healthcare providers as study participants. • Reported travel time to receive ART services ranged from 2 to 12 h for 30% of the PLWHA. • Waiting time to receive care was from 4 to 9 h. • While known government workers, such as teachers, were attended to earlier in some of the centres, this was not a consistent practice in all the four ART centres studied. • The PLWHA corroborated the providers' description of the procedure for initiating and monitoring ART in Ghana. • PLWHA did not see the same provider every time, but they were assured that this did not compromise the continuity of their care. Our study suggests that convenience of accessing ART is important to both PLWHA and ART healthcare providers, but the participants alluded to other factors, including open provider-patient communication, which might explain the PLWHA's understanding of the constraints under which they were receiving care. The current nation-wide coverage of the ART programme in Ghana, however, calls for the replication of this study to identify
Snook, Bryan E.
The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).
Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.
In-depth overview of open access, covering definitions (open access publishing, open access archives, gratis and libre, open access works versus open access processes), major statements and declarations, types of open access, major initiatives, trends, advocacy and lobbying.
Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect
Stuart M Shieber
Full Text Available Open-access journals, which provide access to their scholarly articles freely and without limitations, are at a systematic disadvantage relative to traditional closed-access journal publishing and its subscription-based business model. A simple, cost-effective remedy to this inequity could put open-access publishing on a path to become a sustainable, efficient system.
... MANAGEMENT Non-Federal Oil and Gas Rights § 9.32 Access. (a) No access on, across or through lands or waters... access is by foot, pack animal, or designated road. Persons using designated roads for access to such a...
... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Accessibility guidelines... COMPLIANCE BOARD AMERICANS WITH DISABILITIES ACT (ADA) ACCESSIBILITY GUIDELINES FOR BUILDINGS AND FACILITIES; ARCHITECTURAL BARRIERS ACT (ABA) ACCESSIBILITY GUIDELINES § 1191.1 Accessibility guidelines. (a) The...
This survey of the literature reveals user and professional opinions of changes in subject access features available for online public access catalogs. Highlights include expanded access to fields already incorporated into traditional MARC record, access to context of the record, and design of the user interface. Twenty-four references are cited.…
Thelis R. S.
Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.
Phipps, Lawrie; Kelly, Brian
The importance of accessibility to digital e-learning resources is widely acknowledged. The World Wide Web Consortium Web Accessibility Initiative has played a leading role in promoting the importance of accessibility and developing guidelines that can help when developing accessible web resources. The accessibility of e-learning resources provides additional challenges. While it is important to consider the technical and resource related aspects of e-learning when designing and developing re...
Dolan, E.; Hovland, P.; More, J.; Norris, B.; Smith, B.
The network-oriented application services paradigm is becoming increasingly common for scientific computing. The popularity of this approach can be attributed to the numerous advantages to both user and developer provided by network-enabled mathematical software. The burden of installing and maintaining complex systems is lifted from the user, while enabling developers to provide frequent updates without disrupting service. Access to software with similar functionality can be unified under the same interface. Remote servers can utilize potentially more powerful computing resources than may be available locally. We discuss some of the application services developed by the Mathematics and Computer Science Division at Argonne National Laboratory, including the Network Enabled Optimization System (NEOS) Server and the Automatic Differentiation of C (ADIC) Server, as well as preliminary work on Web access to the Portable Extensible Toolkit for Scientific Computing (PETSc). We also provide a brief survey of related work
Olesen, Henning; Khajuria, Samant
Today, data is money. Whether it is private users' personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization measures to be deployed. Enabling...... advanced user controlled privacy is essential to realize the visions of 5G applications and services. For service providers and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user...... the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources and possibly give them control of how their data will be used by service providers....
MacKenzie, Ronald R.
All Control Systems that grow to any size have a variety of data that are stored in different formats on different nodes in the network. Examples include sensor value and status, archived sensor data, device oriented support data and relationships, message logs, application and machine configurations etc. Each type of data typically has a different programming interface. Higher-level applications need to access a logically related set of data that is in different data stores and may require different processing. AIDA is envisioned to be a distributed service that allows applications access to this wide variety of Control System data in a consistent way that is language and machine independent. It has the additional goal of providing an object-oriented layer for constructing applications on top of multiple existing conventional systems like EPICS or the SLC Control System. Motivation, design overview and current status will be presented
Full Text Available Open access (OA may have been the ‘big thing’ in 2013 but the OA juggernaut is still rolling and plans are now afoot for the requirements for the ‘next REF’ (which from now on we will refer to as REF2020. In 2013, on behalf of the four UK Funding Councils, the Higher Education Funding Council for England (HEFCE undertook a two-stage consultation exercise on open access requirements for articles submitted to REF2020. There are a number of nuances and caveats to the current proposals. This article will reflect on what the probable rules might be, and their implications for research managers, administrators and institutional repository managers alike.
Delgado Triana, Yanelys; Fariñas Wong, Ernesto Yoel
Energy is essential for the development of our life and for the development of production capacity. However, a number of people worldwide without this living, specifically power. To the extent that increase energy needs for domestic, industrial and agricultural use, each day more indispensable need access to this recognition as a human right or fundamental respect is made, so some questions in this paper are required both denominations, being essential to consider the emergence and evolution of these. An analysis of the international protection they receive the right of access to energy services, although currently there are no international treaties that specifically recognize it also performs a number of initiatives that promote its preservation manifested and recognized in several abstractly legal instruments, such as declarations, covenants and conventions. (full text)
Plante, R.; Fitzpatrick, M.; Graham, M.; Tody, D.; Young, W.
We introduce two products for accessing the VO from Python: PyVO and VOClient. PyVO is built on the widely-used Astropy package and is well suited for integrating automated access to astronomical data into highly customizable scripts and applications for data analysis in Python. VOClient is built on a collection of C-libraries and is well suited for integrating with multi-language analysis packages. It also provides a framework for integrating legacy software into the Python environment. In this demo, we will run through several examples demonstrate basic data discovery and retrieval of data. This includes finding archives containing data of interest (VO registry), retrieving datasets (SIA, SSA), and exploring (Cone Search, SLAP). VOClient features some extended capabilities including the ability to communicate to other desktop applications from a script using the SAMP protocol.
Chandler, Cynthia; Groman, Robert; Shepherd, Adam; Allison, Molly; Arko, Robert; Chen, Yu; Fox, Peter; Glover, David; Hitzler, Pascal; Leadbetter, Adam; Narock, Thomas; West, Patrick; Wiebe, Peter
The Biological and Chemical Oceanography Data Management Office (BCO-DMO) works in partnership with ocean science investigators to publish data from research projects funded by the Biological and Chemical Oceanography Sections and the Office of Polar Programs Antarctic Organisms & Ecosystems Program at the U.S. National Science Foundation. Since 2006, researchers have been contributing data to the BCO-DMO data system, and it has developed into a rich repository of data from ocean, coastal and Great Lakes research programs. While the ultimate goal of the BCO-DMO is to ensure preservation of NSF funded project data and to provide open access to those data, achievement of those goals is attained through a series of related phases that benefits from active collaboration and cooperation with a large community of research scientists as well as curators of data and information at complementary data repositories. The BCO-DMO is just one of many intermediate data management centers created to facilitate long-term preservation of data and improve access to ocean research data. Through partnerships with other data management professionals and active involvement in local and global initiatives, BCO-DMO staff members are working to enhance access to ocean research data available from the online BCO-DMO data system. Continuing efforts in use of controlled vocabulary terms, development of ontology design patterns and publication of content as Linked Open Data are contributing to improved discovery and availability of BCO-DMO curated data and increased interoperability of related content available from distributed repositories. We will demonstrate how Semantic Web technologies (e.g. RDF/XML, SKOS, OWL and SPARQL) have been integrated into BCO-DMO data access and delivery systems to better serve the ocean research community and to contribute to an expanding global knowledge network.
Cypaite, Asta; Šerkšnien, Justina; Rudžioniene, Jurgita
Disabled students who makes relatively small part of the academic society are in risk to disappear among all other students, due to their communication and mobility difficulties have less possibilities to satisfy their needs, ensuring their rights to qualitative studies, equal opportunities in the labor market and social integration. A topic about information accessibility for disabled students is extremely important because of their information exclusion in their study process at the un...
A number of configuration features and maintenance operations are influenced by the choice of whether a design is based on vertical or horizontal access for replacing reactor components. The features which are impacted most include the first wall/blanket segmentation, the poloidal field coil locations, the toroidal field coil number and size, access port size for in-vessel components, and facilities. Since either configuration can be made to work, the choice between the two is not clear cut because both have certain advantages. It is apparent that there are large cost benefits in the poloidal field coil system for ideal coil locations for high elongation plasmas and marginal savings for the INTOR case. If we assume that a new tokamak design will require a higher plasma elongation, the recommendation is to arrange the poloidal field coils in a cost-effective manner while providing reasonable midplane access for heating interfaces and test modules. If a new design study is not based on a high elongation plasma, it still appears prudent to consider this approach so that in-vessel maintenance can be accomplished without moving very massive structures such as the bulk shield. 10 refs., 29 figs., 3 tabs
Olesen, Henning; Khajuria, Samant
TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers and enterpr......TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers...... and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user’s personal data have become an economic asset, not necessarily to the owners of these data, but to the service providers, whose...... business mod- els often includes the use of these data. In this paper we focus on the user – service provider interaction and discuss how recent technological progress, in particular the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources...
Rodríguez Hernández, J A; González Parra, E; Julián Gutiérrez, J M; Segarra Medrano, A; Almirante, B; Martínez, M T; Arrieta, J; Fernández Rivera, C; Galera, A; Gallego Beuter, J; Górriz, J L; Herrero, J A; López Menchero, R; Ochando, A; Pérez Bañasco, V; Polo, J R; Pueyo, J; Ruiz, Camps I; Segura Iglesias, R
Quality of vascular access (VA) has a remarkable influence in hemodialysis patients outcomes. Dysfunction of VA represents a capital cause of morbi-mortality of these patients as well an increase in economical. Spanish Society of Neprhology, aware of the problem, has decided to carry out a revision of the issue with the aim of providing help in comprehensión and treatment related with VA problems, and achieving an homogenization of practices in three mayor aspects: to increase arteriovenous fistula utilization as first vascular access, to increment vascular access monitoring practice and rationalise central catheters use. We present a consensus document elaborated by a multidisciplinar group composed by nephrologists, vascular surgeons, interventional radiologysts, infectious diseases specialists and nephrological nurses. Along six chapters that cover patient education, creation of VA, care, monitoring, complications and central catheters, we present the state of the art and propose guidelines for the best practice, according different evidence based degrees, with the intention to provide help at the professionals in order to make aproppiate decissions. Several quality standars are also included.
Manca, Andrea; Martinez, Gianluca; Cugusi, Lucia; Dragone, Daniele; Mercuro, Giuseppe; Deriu, Franca
Increasingly scholars and researchers are being solicited by predatory open access journals seeking manuscript submissions and abusing the author-pays model by charging authors with publishing fees without any or proper peer review. Such questionable editorial practices are threatening the reputation and credibility of scholarly publishing. To date, no investigation has been conducted on this phenomenon in the field of rehabilitation. This study attempts to identify specific predatory journals operating in this field to quantify the phenomenon and its geographic distribution. Beall's List has been used to this end which, although not perfect, is a comprehensive and up-to-date report of predatory publishers. Of the 1113 publishers on the list, 59 journals were identified, for a total of 5610 published articles. The median number of articles published by each journal was 21, and the median amount of article processing charges was $499. Only 1 out of 59 journals was included in the Directory of Open Access Journals, whereas 7 (12%) were indexed by PubMed. Most of the publishers were based in India (36%) followed by the United States (25%) and Pakistan (5%), and 25% were without a verifiable address. The data indicate that the threat of predatory publishing in rehabilitation is real. Physiatrists, physiotherapists, researchers, and academics operating in this field are advised to use the tools available to recognize predatory practices before considering publishing in open access journals. Copyright © 2017 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.
From 2007, the CERN Library now offers readers online access to the complete IEEE Electronic Library (Institute of Electrical and Electronics Engineers). This new licence gives unlimited online access to all IEEE and IET (previously IEE) journals and proceedings as well as all current IEEE standards and selected archived ones. Some of the titles offer volumes back to 1913. This service currently represents more than 1,400,000 full-text articles! This leading engineering information resource replaces the previous service, a sub-product of the IEEE database called 'IEEE Enterprise', which offered online access to the complete collection of IEEE journals and proceedings, but with limited features. The service had become so popular that the CERN Working Group for Acquisitions recommended that the Library subscribe to the complete IEEE Electronic Library for 2007. Usage statistics for recent months showed there was a demand for the service from a large community of CERN users and we were aware that many users h...
CERN's Executive Board recently endorsed a new policy of open access to the laboratory's results: Continuing CERN action on Open Access (OA) [http://cds.cern.ch/record/828991/files/open-2005-006.pdf]. What does this policy mean for you? CERN authors have two responsibilities: Submit your document to the CERN Document Server; Consider submitting future articles to an Open Access journal. Since 2001, Operational Circular No. 6 has required every CERN author (Staff member, Fellow, or any Associated member of personnel who is allowed to use CERN as his affiliation) to submit a copy of their scientific documents to the CERN Document Server (CDS). For some groups all approved documents are submitted by the secretary (see the Departments' policies at: http://library.cern.ch/cern_publications/cern_publication_policy.html). Each author should personally also ensure the submission of any other articles which are not added in this way, such as conference contributions and review articles. It is not sufficient to re...
Whitney, Rachel; Langhan, Melissa; Pade, Kathryn H
Vascular access is a potentially life-saving procedure that is a mainstay of emergency medicine practice. There are a number of challenges associated with obtaining and maintaining vascular access, and the choice of the route of access and equipment used will depend on patient- and provider-specific factors. In this issue, the indications and complications of peripheral intravenous access, intraosseous access, and central venous access are reviewed. Timely and effective assessment and management of difficult-access patients, pain control techniques that can assist vascular access, and contraindications to each type of vascular access are also discussed. [Points & Pearls is a digest of Pediatric Emergency Medicine Practice].
GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping
This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.
Mark W. Tanner
Full Text Available Originally published in TESL-EJ March 2009, Volume 12, Number 4 (http://tesl-ej.org/ej48/a2.html. Reprinted with permission from the authors.Although some students have discovered how to use self-access centers effectively, the majority appear to be unaware of available resources. A website and database of materials were created to help students locate materials and use the Self-Access Study Center (SASC at Brigham Young University’s English Language Center (ELC more effectively. Students took two surveys regarding their use of the SASC. The first survey was given before the website and database were made available. A second survey was administered 12 weeks after students had been introduced to the resource. An analysis of the data shows that students tend to use SASC resources more autonomously as a result of having a web-based database. The survey results suggest that SAC managers can encourage more autonomous use of center materials by provided a website and database to help students find appropriate materials to use to learn English.
Koshy, Linda M; Aberle, Laura H; Krucoff, Mitchell W; Hess, Connie N; Mazzaferri, Ernest; Jolly, Sanjit S; Jacobs, Alice; Gibson, C Michael; Mehran, Roxana; Gilchrist, Ian C; Rao, Sunil V
This study was conducted to determine the association between radial access, guided femoral access, and non-guided femoral access on postprocedural bleeding and vascular complications after percutaneous coronary intervention (PCI). Bleeding events and major vascular complications after PCI are associated with increased morbidity, mortality, and cost. While the radial approach has been shown to be superior to the femoral approach in reducing bleeding and vascular complications, whether the use of micropuncture, fluoroscopy, or ultrasound mitigates these differences is unknown. We conducted a post hoc analysis of women in the SAFE-PCI for Women trial who underwent PCI and had the access method identified (n = 643). The primary endpoint of postprocedure bleeding or vascular complications occurring within 72 hours or at discharge was adjudicated by an independent clinical events committee and was compared based on three categories of access technique: radial, guided femoral (fluoroscopy, micropuncture, ultrasound), or non-guided femoral (none of the aforementioned). Differences between the groups were determined using multivariate logistic regression using radial access as the reference. Of the PCI population, 330 underwent radial access, 228 underwent guided femoral access, and 85 underwent non-guided femoral access. There was a statistically significant lower incidence of the primary endpoint with radial access vs non-guided femoral access; however, there was no significant difference between radial approach and femoral access guided by fluoroscopy, micropuncture, or ultrasound. This post hoc analysis demonstrates that while radial access is safer than non-guided femoral access, guided femoral access appears to be associated with similar bleeding events or vascular complications as radial access.
The information management needs of the Department of Energy (DOE) represents a fertile domain for the development of highly sophisticated yet intuitive enterprise-wide computing solutions. These solutions must support business operations, research agendas, technology development efforts, decision support, and other application areas with a user base ranging from technical staff to the highest levels of management. One area of primary interest is in the Environmental Restoration and Waste Management Branch of DOE. In this arena, the issue of tracking and managing nuclear waste related to the long legacy of prior defense production and research programs is one of high visibility and great concern. The Tank Waste Information Network System (TWINS) application has been created by the Pacific Northwest Laboratory (PNL) for the DOE to assist in managing and accessing the information related to this mission. The TWINS solution addresses many of the technical issues faced by other efforts to provide integrated information access to a wide variety of stakeholders. TWINS provides secure transparent access to distributed heterogeneous multimedia information sources from around the DOE complex. The users interact with the information through a consistent user interface that presents the desired data in a common format regardless of the structure of the source information. The solutions developed by the TWINS project represent an integration of several technologies and products that can be applied to other mission areas within DOE and other government agencies. These solutions are now being applied to public and private sector problem domains as well. The successful integration and inter-operation of both commercial and custom modules into a flexible and extensible information architecture will help ensure that new problems facing DOE and other clients can be addressed more rapidly in the future by re-use of existing tools and techniques proven viable through the TWINS efforts
Ayris, Paul; Björnshauge, Lars; Collier, Mel; Ferwerda, Eelco; Jacobs, Neil; Sinikara, Kaisa; Swan, Alma; de Bries, Saskia; van Wesenbeeck, Astrid
Money which is not directly spent on research and education, even though it is largely taxpayers´ money. As Harvard University already denounced in 2012, many large journal publishers have rendered the situation "fiscally unsustainable and academically restrictive", with some journals costing as much as $40,000 per year (and publishers drawing profits of 35% or more). If one of the wealthiest universities in the world can no longer afford it, who can? It is easy to picture the struggle of European universities with tighter budgets. In addition to subscription costs, academic research funding is also largely affected by "Article Processing Charges" (APC), which come at an additional cost of €2000/article, on average, when making individual articles Gold Open Access. Some publishers are in this way even being paid twice for the same content ("double dipping"). In the era of Open Science, Open Access to publications is one of the cornerstones of the new research paradigm and business models must support this transition. It should be one of the principal objectives of Commissioner Carlos Moedas and the Dutch EU Presidency (January-June 2016) to ensure that this transition happens. Further developing the EU´s leadership in research and innovation largely depends on it. With this statement "Moving Forwards on Open Access", LERU calls upon all universities, research institutes, research funders and researchers to sign this statement and give a clear signal towards the European Commission and the Dutch EU Presidency. Copyright© by the Spanish Society for Microbiology and Institute for Catalan Studies.
Janne Beate Reitan
Full Text Available Interest in open access (OA to scientific publications is steadily increasing, both in Norway and internationally. From the outset, FORMakademisk has been published as a digital journal, and it was one of the first to offer OA in Norway. We have since the beginning used Open Journal Systems (OJS as publishing software. OJS is part of the Public Knowledge Project (PKP, which was created by Canadian John Willinsky and colleagues at the Faculty of Education at the University of British Columbia in 1998. The first version of OJS came as an open source software in 2001. The programme is free for everyone to use and is part of a larger collective movement wherein knowledge is shared. When FORMakademisk started in 2008, we received much help from the journal Acta Didactic (n.d. at the University of Oslo, which had started the year before us. They had also translated the programme to Norwegian. From the start, we were able to publish in both Norwegian and English. Other journals have used FORMakademisk as a model and source of inspiration when starting or when converting from subscription-based print journals to electronic OA, including the Journal of Norwegian Media Researchers [Norsk medietidsskrift]. It is in this way that the movement around PKP works and continues to grow to provide free access to research. As the articles are OA, they are also easily accessible to non-scientists. We also emphasise that the language should be readily available, although it should maintain a high scientific quality. Often there may be two sides of the same coin. We on the editorial team are now looking forward to adopting the newly developed OJS 3 this spring, with many new features and an improved design for users, including authors, peer reviewers, editors and readers.
The easy, visual way to learn this popular database program Part of the Office 2013 productivity suite, Access enables you to organize, present, analyze, and share data on a network or over the web. With this Visual guide to show you how, you'll master the fundamentals of this robust database application in no time. Clear, step-by-step instructions are illustrated with full-color screen shots that show exactly what you should see on your screen. Learn to enter new records; create, edit, and design tables and forms; develop queries that generate specific reports; add smart tags to y
are in decreasing order Polish, German and British nationals. Debates among politicians reflected in the media have since the enlargement of the EU to 10 new Member States in 2004 focused on and off on the issue of access by migrants to social benefits and the issue of social tourism. The debate and discussions...... 2014. The reason for that is the government’s change of practice in administrating family benefits, granting them to all Union citizens lawfully residing in Denmark without any requirement of prior residence in the country. This change was the result of a request from the European Commission...
Nikolov, Nikolai Georgiev; Pavlov, Todor; Niemelä, Jay Russell
Computer-based representation of chemicals makes it possible to organize data in chemical databases-collections of chemical structures and associated properties. Databases are widely used wherever efficient processing of chemical information is needed, including search, storage, retrieval......, and dissemination. Structure and functionality of chemical databases are considered. The typical kinds of information found in a chemical database are considered-identification, structural, and associated data. Functionality of chemical databases is presented, with examples of search and access types. More details...... are included about the OASIS database and platform and the Danish (Q)SAR Database online. Various types of chemical database resources are discussed, together with a list of examples....
... Access to Records and Accounting of Disclosures § 2606.203 Granting access. (a) The methods for allowing... documentation will be required for the disclosure to the data subject of information required to be made...
Internet Accessibility: Challenges Before The African Nations. 207. Information ... increasing internet access in Africa (Jensen, ... bite, particularly in the area of policy ... especially the urban and rural poor. ... supply, but electricity power supply.
In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.
Elbæk, Mikael Karstensen; Ekstrøm, Jeannette
and related topics such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc. ORCID ORCID – Open Research & Contributor ID – is an internationally recognized and widely used researcher-ID. ORCID makes it easy to reuse your data across disciplines, publishers and databases – all you need to do......Open Access Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all...... peer review articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access...
Accessing Sexual and Reproductive Health Information and Services: A Mixed Methods Study of Young ... PROMOTING ACCESS TO AFRICAN RESEARCH ... and services in Soweto, South Africa using quantitative and qualitative methods.
I sine "Anbefalinger til implementering af Open Access i Danmark" foreslår det nationale Open Access Udvalget blandet andet, at Den Bibliometriske Forskningsindikator (BFI) bør koordineres med en national Open Access-politik. I dette paper, der er baseret på et blogindlæg, fremfører forfatteren...... fire grunde til, hvorfor han synes det er en dårlig idé at koble Open Access til BFI....
Nilsson Plymoth, Anders
As more and more applications and services in our society now depend on the Internet, it is important that dynamically deployed wireless multi hop networks are able to gain access to the Internet and other infrastructure networks and services. This thesis proposes and evaluates solutions for providing multi hop Internet Access. It investigates how ad hoc networks can be combined with wireless and mesh networks in order to create wireless multi hop access networks. When several access points t...
"The long-anticipated "first phase" meeting of the World Summit on the Information Society (WSIS), held in Geneva in December, was supposed to have been about equal access. It turned out being equally about open access as leading scientific organizations pushed their open-access initiative onto the World Summit agenda" (1 page)
Nariani, Rajiv; Fernandez, Leila
Campus-based open access author funds are being considered by many academic libraries as a way to support authors publishing in open access journals. Article processing fees for open access have been introduced recently by publishers and have not yet been widely accepted by authors. Few studies have surveyed authors on their reasons for publishing…
Universal access to ICTs has in recent years become a policy goal for many national ... is able to make use of a publicly available resource, such as information and ... access centres (public telephones, cybercafes, telecentres, business centres, etc.) ... The book examines the relationship between shared access centres, the ...
bequests, gifts and loans emerge as the principal means of access to land. These types of access prior to the law on state land property (assignment) still retain a large social legitimacy. Often, these forms of access (family allowance, legacy) in which men are privileged, serve as reference for local officials who administer ...
Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos
Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…
Tilburg, van A.; Schalkwyk, van H.D.
Smallholders, especially in less developed countries, have encountered several challenges in gaining access to markets. Market access includes the ability to obtain necessary farm inputs and farm services, and the ability to deliver farm products to buyers. Market access was less of a problem in the
... delivered, cable-affiliated RSNs in the 2010 Program Access Order. 3. With respect to the first element (the... exclusive contract involving a cable-affiliated RSN is an ``unfair act.'' In the 2010 Program Access Order... Agreements 18. ACA also urges the Commission to revise the program access rules to prohibit cable-affiliated...
... FARM CREDIT ADMINISTRATION Market Access Agreement AGENCY: Farm Credit Administration. ACTION: Notice of Draft Second Amended and Restated Market Access Agreement; request for comments. SUMMARY: The... Market Access Agreement (the ``Restated MAA'') is entered into among AgFirst Farm Credit Bank, AgriBank...
... FARM CREDIT ADMINISTRATION Market Access Agreement AGENCY: Farm Credit Administration. ACTION: Notice of approval of the draft amendment to the amended and restated market access agreement. SUMMARY... Credit Bank of Wichita and the Western Farm Credit Bank under Section 7.12 of the Market Access Agreement...
When teachers or technology coordinators publish a website, they are providing a product for a diverse group of people. That's why website design should follow accessibility guidelines. Websites should be accessible to those with visual, hearing, movement, cognitive, and speech disabilities. Good design means greater accessibility for all. This…
Sebring-Cale, Nancy J
Home modifications for barrier-free accessibility will assist the physically challenged populations by increasing their independence. By providing an accessible environment, an individual can become more independent and require less assistance for functional activities, such as kitchen appliance access, door widening, open floor plan, elevated electric outlets, roll-under sinks, roll-in showers and MobiLife elevating wheelchair.
Sachan, Amit; Emmanuel, Sabu
Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.
Sharples, Mike; Kloos, Carlos Delgado; Dimitriadis, Yannis; Garlatti, Serge; Specht, Marcus
Many modern web-based systems provide a "responsive" design that allows material and services to be accessed on mobile and desktop devices, with the aim of providing "ubiquitous access." Besides offering access to learning materials such as podcasts and videos across multiple locations, mobile, wearable and ubiquitous…
As a Crown corporation, IDRC is subject to Canada's laws on access to information and privacy protection. The following resources will help you learn more about IDRC and the access to information and privacy acts, including instructions for submitting an access to information or privacy act (ATIP) request. IDRC and ATIP ...
). In this subset sample, both letter access and lexical access accounted for unique variance in reading fluency. The pattern of effects for lexical access did not change by controlling for serial rapid naming (RAN). Conclusions: The results suggest that letter access and lexical access are important for different......Purpose: This study investigated the effects of lexical access speed and letter access speed on reading fluency and reading comprehension. We hypothesized that 1) letter access speed would correlate with reading fluency but not comprehension, while 2) lexical access speed would influence reading...... comprehension. For readers who are struggling with recoding, most of the reading effort is probably tied up with recoding, leaving little to be explained by lexical access. Therefore we expected that 3) lexical access speed would primarily predict reading fluency for readers who were no longer struggling...
One of the most important issues concerning the foundations of conscious perception centers on the question of whether perceptual consciousness is rich or sparse. The overflow argument uses a form of 'iconic memory' to argue that perceptual consciousness is richer (i.e., has a higher capacity) than cognitive access: when observing a complex scene we are conscious of more than we can report or think about. Recently, the overflow argument has been challenged both empirically and conceptually. This paper reviews the controversy, arguing that proponents of sparse perception are committed to the postulation of (i) a peculiar kind of generic conscious representation that has no independent rationale and (ii) an unmotivated form of unconscious representation that in some cases conflicts with what we know about unconscious representation. Copyright © 2011 Elsevier Ltd. All rights reserved.
Eggers, S.J.; Shoshani, A.
A compression technique is presented that allows a high degree of compression but requires only logarithmic access time. The technique is a constant suppression scheme, and is most applicable to stable databases whose distribution of constants is fairly clustered. Furthermore, the repeated use of the technique permits the suppression of a multiple number of different constants. Of particular interest is the application of the constant suppression technique to databases the composite key of which is made up of an incomplete cross product of several attribute domains. The scheme for compressing the full cross product composite key is well known. This paper, however, also handles the general, incomplete case by applying the constant suppression technique in conjunction with a composite key suppression scheme
A significant problem for the Bus Monitor Unit is to identify the source of a given transmission. This problem arises from the fact that the label which identifies the source of the transmission as it is put into the bus is intercepted by the Digital Autonomous Terminal Access Communications (DATAC) terminal and removed from the transmission. Thus, a given subsystem will see only data associated with a label and never the identifying label itself. The Bus Monitor must identify the source of the transmission so as to be able to provide some type of error identification/location in the event that some problem with the data transmission occurs. Steps taken to alleviate this problem by modifications to the DATAC terminal are discussed.
Whitenack, T.; Zaslavsky, I.; Valentine, D.; Djokic, D.
As part of the CUAHSI HIS (Consortium of Universities for the Advancement of Hydrologic Science, Inc., Hydrologic Information System), the CUAHSI HIS team has developed Data Access System for Hydrology or DASH. DASH is based on commercial off the shelf technology, which has been developed in conjunction with a commercial partner, ESRI. DASH is a web-based user interface, developed in ASP.NET developed using ESRI ArcGIS Server 9.2 that represents a mapping, querying and data retrieval interface over observation and GIS databases, and web services. This is the front end application for the CUAHSI Hydrologic Information System Server. The HIS Server is a software stack that organizes observation databases, geographic data layers, data importing and management tools, and online user interfaces such as the DASH application, into a flexible multi- tier application for serving both national-level and locally-maintained observation data. The user interface of the DASH web application allows online users to query observation networks by location and attributes, selecting stations in a user-specified area where a particular variable was measured during a given time interval. Once one or more stations and variables are selected, the user can retrieve and download the observation data for further off-line analysis. The DASH application is highly configurable. The mapping interface can be configured to display map services from multiple sources in multiple formats, including ArcGIS Server, ArcIMS, and WMS. The observation network data is configured in an XML file where you specify the network's web service location and its corresponding map layer. Upon initial deployment, two national level observation networks (USGS NWIS daily values and USGS NWIS Instantaneous values) are already pre-configured. There is also an optional login page which can be used to restrict access as well as providing a alternative to immediate downloads. For large request, users would be notified via
Uchiyama, A.; Furukawa, K.; Higurashi, Y.
Gang Huang; Lian-Shan Sun
Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.
Mercier , Aurélie
The concept of accessibility cannot only focus on " spatial accessibility " measurement but has to integer a " social accessibility " level to take into account individual inequalities and socioeconomic disparities to access to urban opportunities. In this context, this contribution focuses on socioeconomic disparities integration on accessibility measurement, considering the Lyon case study. The paper is divided into three parts The first part aims to present a method for integrating the soc...
Full Text Available As a high level development environment, the Java technologies offer support to the development of distributed applications, independent of the platform, providing a robust set of methods to access the databases, used to create software components on the server side, as well as on the client side. Analyzing the evolution of Java tools to access data, we notice that these tools evolved from simple methods that permitted the queries, the insertion, the update and the deletion of the data to advanced implementations such as distributed transactions, cursors and batch files. The client-server architectures allows through JDBC (the Java Database Connectivity the execution of SQL (Structured Query Language instructions and the manipulation of the results in an independent and consistent manner. The JDBC API (Application Programming Interface creates the level of abstractization needed to allow the call of SQL queries to any DBMS (Database Management System. In JDBC the native driver and the ODBC (Open Database Connectivity-JDBC bridge and the classes and interfaces of the JDBC API will be described. The four steps needed to build a JDBC driven application are presented briefly, emphasizing on the way each step has to be accomplished and the expected results. In each step there are evaluations on the characteristics of the database systems and the way the JDBC programming interface adapts to each one. The data types provided by SQL2 and SQL3 standards are analyzed by comparison with the Java data types, emphasizing on the discrepancies between those and the SQL types, but also the methods that allow the conversion between different types of data through the methods of the ResultSet object. Next, starting from the metadata role and studying the Java programming interfaces that allow the query of result sets, we will describe the advanced features of the data mining with JDBC. As alternative to result sets, the Rowsets add new functionalities that
Kaiser, Mary Elizabeth; Morris, Matthew J.; Aldoroty, Lauren Nicole; Godon, David; Pelton, Russell; McCandliss, Stephan R.; Kurucz, Robert L.; Kruk, Jeffrey W.; Rauscher, Bernard J.; Kimble, Randy A.; Wright, Edward L.; Benford, Dominic J.; Gardner, Jonathan P.; Feldman, Paul D.; Moos, H. Warren; Riess, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, William Van Dyke; Sahnow, David J.; Lampton, Michael; Perlmutter, Saul
ACCESS: Absolute Color Calibration Experiment for Standard Stars is a series of rocket-borne sub-orbital missions and ground-based experiments designed to leverage significant technological advances in detectors, instruments, and the precision of the fundamental laboratory standards used to calibrate these instruments to enable improvements in the precision of the astrophysical flux scale through the transfer of laboratory absolute detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass.A cross wavelength calibration of the astrophysical flux scale to this level of precision over this broad a bandpass is relevant for the data used to probe fundamental astrophysical problems such as the SNeIa photometry based measurements used to constrain dark energy theories.We will describe the strategy for achieving this level of precision, the payload and calibration configuration, present sub-system test data, and the status and preliminary performance of the integration and test of the spectrograph and telescope. NASA APRA sounding rocket grant NNX14AH48G supports this work.
Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.
ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.
Many organizations issuing standards offer reduced prices for publications to their members. Paying a membership fee, even a site membership fee, can therefore be worthwhile - even if relatively few standards are needed. The Library is now exploring the possibility, in collaboration with the rest of the CERN community, of joining standards-issuing organizations. So why not share your costs with the rest of the organization wherever this can be done without violating copyright or access regulations? The Library now provides documentation and other member services from IPC, the Association Connecting Electronics Industries (http://www.ipc.org/html/fsabout.htm) at favourable prices for the entire CERN population. For more information, or if you are a member of any other organization which provides services which could be shared CERN-wide, please contact firstname.lastname@example.org . We remind all users of international standards, that CERN has special agreements with ISO and IEC (see Bulletin 50/2000). You can order st...
One objective of the two open areas in the present ISABELLE design is to provide flexibility with respect to the size and shape of experimental equipment that would eventually be installed there. No permanent building would be installed initially. A second objective of the design of open areas is to keep initial costs as low as practicable. Another objective is open access. This note explores this idea and some design concepts based on it. It would permit inserting large pieces of experimental equipment quickly and removing them with equal ease and speed. Entire experiments would be moved in a single piece (or a few) by building them on movable platforms with capacities of up to about 1000 tons per platform. Most experiments could be built on a single platform or on a few. The shielding must also be moved. It must also be organized into a small number of large units. A scheme using large tanks filled with water is described. It is important to make the equipment on a given platform as complete and self-contained as possible, with a minimum of interconnections for power, coolant, controls, data transmission, etc. 5 figures
Traversa, F L; Bonani, F; Pershin, Y V; Di Ventra, M
The present von Neumann computing paradigm involves a significant amount of information transfer between a central processing unit and memory, with concomitant limitations in the actual execution speed. However, it has been recently argued that a different form of computation, dubbed memcomputing (Di Ventra and Pershin 2013 Nat. Phys. 9 200–2) and inspired by the operation of our brain, can resolve the intrinsic limitations of present day architectures by allowing for computing and storing of information on the same physical platform. Here we show a simple and practical realization of memcomputing that utilizes easy-to-build memcapacitive systems. We name this architecture dynamic computing random access memory (DCRAM). We show that DCRAM provides massively-parallel and polymorphic digital logic, namely it allows for different logic operations with the same architecture, by varying only the control signals. In addition, by taking into account realistic parameters, its energy expenditures can be as low as a few fJ per operation. DCRAM is fully compatible with CMOS technology, can be realized with current fabrication facilities, and therefore can really serve as an alternative to the present computing technology. (paper)
Full Text Available The web is destined to become humankind's cognitive commons, where digital knowledge is jointly created and freely shared. The UK has been a leader in the global movement toward open access (OA to research but recently its leadership has been derailed by the joint influence of the publishing industry lobby from without and well-intentioned but premature and unhelpful over-reaching from within the OA movement itself. The result has been the extremely counterproductive ‘Finch Report’ followed by a new draft of the Research Councils UK (RCUK OA mandate, downgrading the role of cost-free OA self-archiving of research publications (‘green OA’ in favor of paying subscription publishers over and above subscriptions, out of scarce research funds, in exchange for making single articles OA (‘hybrid gold OA’. The motivation of the new policy is to reform publication and to gain certain re-use rights (CC-BY, but the likely effect would be researcher resistance, very little OA and a waste of research funds. There is still time to fix the RCUK mandate and restore the UK's leadership by taking a few very specific steps to clarify and strengthen the green component by adding a mechanism for monitoring and verifying compliance, with consequences for non-compliance, along lines also being adopted in the EC and the US.
The main objective of the two open areas in the present ISABELLE design has been to provide flexibility with respect to the size and shape of experimental equipment that would eventually be installed there. No permanent building would be installed initially. One possibility would be to enclose each experiment in a temporary structure that would provide weatherproofing and shielding; another possibility would be to erect a permanent building at a later time, when experience has made the needs clearer than they are at present. The secondary objective of the design of open areas has been to keep initial costs as low as practicable. Another objective might be added, however, which we indicate by the term ''open access.'' This note will explore this idea and some design concepts based on it. In the ISABELLE 1977 summer workshop there was considerable discussion of the importance of techniques for inserting large pieces of experimental equipment quickly and removing them with equal ease and speed. Since enclosed halls have certain restrictions in this respect, open areas may be helpful in providing this feature. If the mechanical and electrical aspects could be handled quickly, one might even attempt to reduce the time spent on bureaucratic procedures in order to expedite the introduction of new experiments and new ideas in these areas
accessibility problems before the planning of housing intervention strategies. It is also critical that housing standards addressing accessibility intended to accommodate people with functional limitations are valid in the sense that their definitions truly support accessibility. However, there is a paucity...... of valid and reliable assessment instruments targeting housing accessibility, and in-depth analysis of factors potentially impacting on reliability in complex assessment situations is remarkably absent. Moreover, the knowledge base informing the housing standards appears to be vague. We may therefore...... reasonably question the validity of the housing standards addressing accessibility. This thesis addresses housing accessibility methodology in general and the reliability of assessment and the validity of standards targeting older people with functional limitations and a dependence on mobility devices...
Full Text Available The importance of accessibility to digital e-learning resources is widely acknowledged. The World Wide Web Consortium Web Accessibility Initiative has played a leading role in promoting the importance of accessibility and developing guidelines that can help when developing accessible web resources. The accessibility of e-learning resources provides additional challenges. While it is important to consider the technical and resource related aspects of e-learning when designing and developing resources for students with disabilities, there is a need to consider pedagogic and contextual issues as well. A holistic framework is therefore proposed and described, which in addition to accessibility issues takes into account learner needs, learning outcomes, local factors, infrastructure, usability and quality assurance. The practical application and implementation of this framework is discussed and illustrated through the use of examples and case studies.
The author focuses on a new rapidly spreading practice of publication in open-access journals. The pros and cons of open-access journals are discussed. Publishing in these journals may be cost prohibitive for educators and junior faculty members. Some authors may be lured by the ease of publishing in open-access journals (and their, at times, inflated self-description, e.g., "international", "scientific"), and their possibly valuable contributions will escape the attention of Academic Psychiatry readership in the vast sea of open-access journals. The readership may be flooded with a large number of low-quality articles (maybe not even properly peer-reviewed) from open-access journals. It may take some time to sort out what is and what is not relevant and useful. Open-access publishing represents a problematic and controversial practice and may be associated with a conflict of interest for the editors and publishers of these journals.
Luis Alejandro Casasola Balsells
Full Text Available This paper describes an analysis conducted in 2015 to evaluate the accessibility of content on Andalusian public university websites. In order to determinate whether these websites are accessible, an assessment has been carried out to check conformance with the latest Web Content Accessibility Guidelines (WCAG 2.0 established by the World Wide Web Consortium (W3C. For this purpose, we have designed a methodology for analysis that combines the use of three automatic tools (eXaminator, MINHAP web accessibility tool, and TAW with a manual analysis to provide a greater reliability and validity of the results. Although the results are acceptable overall, a detailed analysis shows that more is still needed for achieving full accessibility for the entire university community. In this respect, we suggest several corrections to common accessibility errors for facilitating the design of university web portals.
Full Text Available EU accession has brought, as expected, many changes in economic, social and cultural domains. An important chapter is the trade dynamics and how this dynamic has been modified over time by changes in the legal status of Romania's relations with certain trading partners. In this paper we present data on trade with countries with which Romania has concluded trade agreements before accession. Data presentation and analysis continues in "Romania's EU accession. Gains and losses (II".
Saul, Peter D.
General practitioners' access to remote data bases using microcomputers is increasing, making even the most obscure information readily available. Some of the systems available to general practitioners in the UK are described and the methods of access are outlined. General practitioners should be aware of the advances in technology; data bases are increasing in size, the cost of access is falling and their use is becoming easier.
Armstrong, Mark; Doyle, Chris; Vickers, John
The Baumol-Willig efficient component pricing rule states that it is efficient to set the price of access to an essential facility equal to the direct cost of access plus the opportunity cost to the integrated access provider. The authors analyze the relevant notion of 'opportunity cost' under various assumptions about demand and supply conditions, including product differentiation, bypass, and substitution possibilities, which all reduce opportunity cost compared to the benchmark case. They ...
Lazaro, J.A; Polo, V.; Schrenk, B.
Recent optical technologies are providing higher flexibility to next generation access networks: on the one hand, providing progressive FTTx and specifically FTTH deployment, progressively shortening the copper access network; on the other hand, also opening fixed-mobile convergence solutions...... in next generation PON architectures. It is provided an overview of the optical subsystems developed for the implementation of the proposed NG-Access Networks....
Fuller, Richard A; Lee, Jasmine R; Watson, James E M
Conservation science is a crisis discipline in which the results of scientific enquiry must be made available quickly to those implementing management. We assessed the extent to which scientific research published since the year 2000 in 20 conservation science journals is publicly available. Of the 19,207 papers published, 1,667 (8.68%) are freely downloadable from an official repository. Moreover, only 938 papers (4.88%) meet the standard definition of open access in which material can be freely reused providing attribution to the authors is given. This compares poorly with a comparable set of 20 evolutionary biology journals, where 31.93% of papers are freely downloadable and 7.49% are open access. Seventeen of the 20 conservation journals offer an open access option, but fewer than 5% of the papers are available through open access. The cost of accessing the full body of conservation science runs into tens of thousands of dollars per year for institutional subscribers, and many conservation practitioners cannot access pay-per-view science through their workplace. However, important initiatives such as Research4Life are making science available to organizations in developing countries. We urge authors of conservation science to pay for open access on a per-article basis or to choose publication in open access journals, taking care to ensure the license allows reuse for any purpose providing attribution is given. Currently, it would cost $51 million to make all conservation science published since 2000 freely available by paying the open access fees currently levied to authors. Publishers of conservation journals might consider more cost effective models for open access and conservation-oriented organizations running journals could consider a broader range of options for open access to nonmembers such as sponsorship of open access via membership fees. © 2014 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of the Society for
The LHC complex is divided into a number of zones with different levels of access controls.Inside the interlocked areas, the personnel protection is ensured by the LHC Access System.The system is made of two parts:the LHC Access Safety System and the LHC Access Control System. During machine operation,the LHC Access Safety System ensures the collective protection of the personnel against the radiation hazards arising from the operation of the accelerator by interlocking the LHC key safety elements. When the beams are off, the LHC Access Control System regulates the access to the accelerator and its many subsystems.It allows a remote, local or automatic operation of the access control equipment which verifies and identifies all users entering the controlled areas.The global architecture of the LHC Access System is now designed and is being validated to ensure that it meets the safety requirements for operation of the LHC.A pilot installation will be tested in the summer 2005 to validate the concept with the us...
Gasparyan, Armen Yuri; Ayvazyan, Lilit; Kitas, George D
The article reflects on open access as a strategy of changing the quality of science communication globally. Successful examples of open-access journals are presented to highlight implications of archiving in open digital repositories for the quality and citability of research output. Advantages and downsides of gold, green, and hybrid models of open access operating in diverse scientific environments are described. It is assumed that open access is a global trend which influences the workflow in scholarly journals, changing their quality, credibility, and indexability.
A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques. The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking. Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the
Full Text Available to improve score. Colour Contrast Fujitsu ColorSelector  Each colour combination has to be selected manually. Didn’t identify colour contrast problems that were highlighted by the other two tools. JuicyStudio Colour Contrast Analyser Firefox..., but this is not tested by AccessKeys AccessColor. However, AccessKeys AccessColor provides a link to the specific line in the code where the problem occurs. This is not provided by JuicyStudio Colour Contrast Analyser. According to these two tools, many colour...
Full Text Available BACKGROUND: Scientific publishing is undergoing significant changes due to the growth of online publications, increases in the number of open access journals, and policies of funders and universities requiring authors to ensure that their publications become publicly accessible. Most studies of the impact of these changes have focused on the growth of articles available through open access or the number of open-access journals. Here, we investigated access to publications at a number of institutes and universities around the world, focusing on publications in HIV vaccine research--an area of biomedical research with special importance to the developing world. METHODS AND FINDINGS: We selected research papers in HIV vaccine research field, creating: 1 a first set of 50 most recently published papers with keywords "HIV vaccine" and 2 a second set of 200 articles randomly selected from those cited in the first set. Access to the majority (80% of the recently published articles required subscription, while cited literature was much more accessible (67% freely available online. Subscriptions at a number of institutions around the world were assessed for providing access to subscription-only articles from the two sets. The access levels varied widely, ranging among institutions from 20% to 90%. Through the WHO-supported HINARI program, institutes in low-income countries had access comparable to that of institutes in the North. Finally, we examined the response rates for reprint requests sent to corresponding authors, a method commonly used before internet access became widespread. Contacting corresponding authors with requests for electronic copies of articles by email resulted in a 55-60% success rate, although in some cases it took up to 1.5 months to get a response. CONCLUSIONS: While research articles are increasingly available on the internet in open access format, institutional subscriptions continue to play an important role. However
The aim was to explore the use of an activity-based approach to determine the validity of a set of housing standards addressing accessibility. This included examination of the frequency and the extent of accessibility problems among older people with physical functional limitations who used...... participant groups were examined. Performing well-known kitchen activities was associated with accessibility problems for all three participant groups, in particular those using a wheelchair. The overall validity of the housing standards examined was poor. Observing older people interacting with realistic...... environments while performing real everyday activities seems to be an appropriate method for assessing accessibility problems....
Lusi Herawati Sunyoto Usman Mark Zuidgeest
as indicators. Flowmap tool is used to analyze catchment area of each health facility using different transport modes choice:becak and public transport for poor group and motorcycle and car for non-poor group with different travel time within 30, 60 and more than 60 minutes. It is concluded that there was an accessibility difference between poor and non-poor group. The accessibility to the health facilities of poor group was lower than non-poor group. This condition occurred because the government policy of equitable access to health service facility did not pay attention to accessibility of poor group.
Atun, Rifat; Jaffray, David A; Barton, Michael B; Bray, Freddie; Baumann, Michael; Vikram, Bhadrasain; Hanna, Timothy P; Knaul, Felicia M; Lievens, Yolande; Lui, Tracey Y M; Milosevic, Michael; O'Sullivan, Brian; Rodin, Danielle L; Rosenblatt, Eduardo; Van Dyk, Jacob; Yap, Mei Ling; Zubizarreta, Eduardo; Gospodarowicz, Mary
Radiotherapy is a critical and inseparable component of comprehensive cancer treatment and care. For many of the most common cancers in low-income and middle-income countries, radiotherapy is essential for effective treatment. In high-income countries, radiotherapy is used in more than half of all cases of cancer to cure localised disease, palliate symptoms, and control disease in incurable cancers. Yet, in planning and building treatment capacity for cancer, radiotherapy is frequently the last resource to be considered. Consequently, worldwide access to radiotherapy is unacceptably low. We present a new body of evidence that quantifies the worldwide coverage of radiotherapy services by country. We show the shortfall in access to radiotherapy by country and globally for 2015-35 based on current and projected need, and show substantial health and economic benefits to investing in radiotherapy. The cost of scaling up radiotherapy in the nominal model in 2015-35 is US$26·6 billion in low-income countries, $62·6 billion in lower-middle-income countries, and $94·8 billion in upper-middle-income countries, which amounts to $184·0 billion across all low-income and middle-income countries. In the efficiency model the costs were lower: $14·1 billion in low-income, $33·3 billion in lower-middle-income, and $49·4 billion in upper-middle-income countries-a total of $96·8 billion. Scale-up of radiotherapy capacity in 2015-35 from current levels could lead to saving of 26·9 million life-years in low-income and middle-income countries over the lifetime of the patients who received treatment. The economic benefits of investment in radiotherapy are very substantial. Using the nominal cost model could produce a net benefit of $278·1 billion in 2015-35 ($265·2 million in low-income countries, $38·5 billion in lower-middle-income countries, and $239·3 billion in upper-middle-income countries). Investment in the efficiency model would produce in the same period an even
Kazanina, Nina; Bowers, Jeffrey S; Idsardi, William
Phonemes play a central role in traditional theories as units of speech perception and access codes to lexical representations. Phonemes have two essential properties: they are 'segment-sized' (the size of a consonant or vowel) and abstract (a single phoneme may be have different acoustic realisations). Nevertheless, there is a long history of challenging the phoneme hypothesis, with some theorists arguing for differently sized phonological units (e.g. features or syllables) and others rejecting abstract codes in favour of representations that encode detailed acoustic properties of the stimulus. The phoneme hypothesis is the minority view today. We defend the phoneme hypothesis in two complementary ways. First, we show that rejection of phonemes is based on a flawed interpretation of empirical findings. For example, it is commonly argued that the failure to find acoustic invariances for phonemes rules out phonemes. However, the lack of invariance is only a problem on the assumption that speech perception is a bottom-up process. If learned sublexical codes are modified by top-down constraints (which they are), then this argument loses all force. Second, we provide strong positive evidence for phonemes on the basis of linguistic data. Almost all findings that are taken (incorrectly) as evidence against phonemes are based on psycholinguistic studies of single words. However, phonemes were first introduced in linguistics, and the best evidence for phonemes comes from linguistic analyses of complex word forms and sentences. In short, the rejection of phonemes is based on a false analysis and a too-narrow consideration of the relevant data.
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Parental access. 98.31 Section 98.31 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Program Operations (Child Care Services)-Parental Rights and Responsibilities § 98.31 Parental access. The...
"Particle physicists have come up with a novel way to promote free, immediate access to journal articles. Led by CERN, the gian lab near Geneva, Switzerland, they want to raise at least $6 million a year to begin buying open access to all published papers in their field." (1 page)
Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the
Beck, T.H.L.; Demirgüc-Kunt, A.
Recent data compilations show that many poor and nonpoor people in many developing countries face a high degree of financial exclusion and high barriers in access to finance. Theory and empirical evidence point to the critical role that improved access to finance has in promoting growth and reducing
Yan, E.; Zhao, M.
In this research-in-progress paper, we provide preliminary evidence of data access and use in scientific literature based on a content analysis of 600 stratified sampled PLOS ONE publications. Results show that data access and use varied greatly from one paper to another in terms of how datasets were collected, referenced, and curated. (Author)
May 25, 2010 ... En faisant l'analyse combinée de la variance sur les sites, les accessions ont significativement ... hectare of coriander allows honey bees to collect about 500 kg of .... breeding programme to evaluate coriander accessions for ...
In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…
Rehman, Ibrahim Hafeezur; Sreekumar, Arun; Gill, Bigsna; Worrell, Ernst
As nearly a fifth of the world's population still lives without access to electricity and double that number with no access to modern cooking technologies, both public and private sector players have invested resources in developing infrastructure to address this energy gap. While there have been
Anderson, Terry; McConkey, Brigette
Open access (OA) publication has emerged, with disruptive effects, as a major outlet for scholarly publication. OA publication is usually associated with on-line distribution and provides access to scholarly publications to anyone, anywhere--regardless of their ability to pay subscription fees or their association with an educational institution.…
Richard, Jennifer; Koufogiannakis, Denise; Ryan, Pam
As new models of scholarly communication emerge, librarians and libraries have responded by developing and supporting new methods of storing and providing access to information and by creating new publishing support services. This article will examine the roles of libraries and librarians in developing and supporting open access publishing…
Background/Context: The open access movement has successfully drawn attention to economic and political aspects of scholarly communication through a significant body of commentary that debates the merits of open access and the potential damage it may do to scholarly publishing. Researchers within the field of education research, notably John…
Kuenburg, Alexa; Fellinger, Paul; Fellinger, Johannes
Access to health care without barriers is a clearly defined right of people with disabilities as stated by the UN Convention on the Rights of People with Disabilities. The present study reviews literature from 2000 to 2015 on access to health care for deaf people and reveals significant challenges in communication with health providers and gaps in…
"Particle physicists have come up with a novel way to promote free, immediate access to journal articles. Led by CERN, the giant lab near Geneva, Switzerland, thay want to raise at lesat $6 million a year to begin buying open access to all published papers in their field." (1/2 page)
Fosse, Henrik Barslund; Raimondos-Møller, Pascalis
When Vietnam joined the World Trade Organization (WTO) in 2007 it was granted an accession period up to 2014. During this period tariffs would have to fall according to the accession agreement. This paper evaluates this 2007–2014 trade liberalization by building an applied general equilibrium model...
Mendenhall, Robert W.
Access to higher education is subject to many factors including affordability, time and geography. Distance education can deliver education to those that live far from a campus. Some of that distance education may be synchronous, or live, requiring students to be available at certain times. Flexibility and access are increased when the instruction…
The Americans with Disabilities Act (ADA) of 1990 mandated that facilities and programs are accessible, so people with disabilities can be included in all aspects of community life including recreation (Dattilo, 2002). Understanding accessibility standards is not an easy task. Educators are faced with the challenge of teaching technical content,…
El Kateb, Donia; Zannone, N.; Moawad, Assaad; Caire, Patrice; Nain, Grégory; Mouelhi, Tejeddine; Le Traon, Yves
Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights
Adame, Silvia I.; Llorens, Luis
This paper presents a description of the metadata harvester software development. This system provides access to reliable and quality educational resources, shared by Mexican Universities through their repositories, to anyone with Internet Access. We present the conceptual and contextual framework, followed by the technical basis, the results and…
... FARM CREDIT ADMINISTRATION Market Access Agreement AGENCY: Farm Credit Administration. ACTION: Notice of approval of the Draft Second Amended and Restated Market Access Agreement. SUMMARY: The Farm Credit Administration (FCA) announces that it has approved the Draft Second Amended and Restated Market...
Margaret (Maggie) Williams
ScienceDirect journal homepage: http://ees.elsevier.com/hsag/default.asp ... inability of their caregivers to travel the distance requisite to accessing ... and describe the experiences of caregivers accessing ART for .... In this study credibility was facilitated by the researchers ensuring that .... educational assets to assist them.
Watson, C.; Smith, S.; Prather, J.
This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems
den Hollander, Franciscus
Open Access, de vrije toegang tot wetenschappelijke informatie, wint terrein: informatie is in toenemende mate openbaar toegankelijk. Het Open Accessjaar 2009 werd op 2 februari van dit jaar afgesloten met een drukbezocht symposium in de Beurs van Berlage in Amsterdam. Dat Open Access nu echt op de
Azbi, Trine; Larsen, Bente; Møbjerg, Anna Christine Meinertz
Resultater af en afdækning og analyse af Open Access (OA) publicering på Professionshøjskolen Metropol......Resultater af en afdækning og analyse af Open Access (OA) publicering på Professionshøjskolen Metropol...
Wald, Mike; Li, Yunjia; Draffan, E. A.
This paper describes accessible collaborative learning using mobile devices with mobile enhancements to Synote, the freely available, award winning, open source, web based application that makes web hosted recordings easier to access, search, manage, and exploit for all learners, teachers and other users. Notes taken live during lectures using…
Fermilab Security Site Access Request Database Use of the online version of the Fermilab Security Site Access Request Database requires that you login into the ESH&Q Web Site. Note: Only Fermilab generated from the ESH&Q Section's Oracle database on May 27, 2018 05:48 AM. If you have a question
Gottfried, John C.
This study examines potential correlates of business research database access through academic libraries serving top business programs in the United States. Results indicate that greater access to research databases is related to enrollment in graduate business programs, but not to overall enrollment or status as a public or private institution.…
The journal crisis and the demand for free accessibility to the results of publicly funded research were the main drivers of the Open Access movement since the late 1990's. Besides many academic institutions that support the different ways of Open Access publishing, there is a growing number of publishing houses that are specialized on this new access and business model of scholarly literature. The lecture provides an overview of the different kinds of Open Access publishing, discusses the variety of underlying business models, names the advantages and potentials for researches and the public, and overcomes some objections against Open Access. Besides the increased visibility and information supply, the topic of copyrights and exploitation rights will be discussed. Furthermore, it is a central aim of the presentation to show that Open Access does not only support full peer-review, but also provides the potential for even enhanced quality assurance. The financing of business models based on open accessible literature is another important part to be outlined in the lecture.
Access to Information in the Nordic Countries explains and compares the legal rules determining public access to documents and data in Sweden, Finland, Denmark, Norway, and Iceland. In addition, international rules emanating from the United Nations, the Council of Europe and the European Union...
Yu, Xianbin; Chen, Ying; Galili, Michael
THz technology has been considered feasible for ultrafast wireless data communi- cation, to meet the increasing demand on next-generation fast wireless access, e.g., huge data file transferring and fast mobile data stream access. This talk reviews recent progress in high-speed THz wireless...
The study examined the farmers' access to information and their manageriability of the intervention programme in the study area. To achieve the objective, there was need to determine farmers' information accessibility and manageriability of guinea worm intervention package; then determine farmers satisfaction with the ...
"The first meeting of European particle physics funding agencies took place today at CERN to establish a consortium for Open Access publishing in particle physics, SCOAP3. This is the first time an antire scientific field is exploring the conversion of its reader-paid journals into an author-paid Open Access format." (1 page)
Given the challenging economic climate in the United States, many academics are looking to open-access electronic textbooks as a way to provide students with traditional textbook content at a more financially advantageous price. Open access refers to "the free and widely available information throughout the World Wide Web. Once an article's…
Monkiewicz, Jacqueline; Murphy, Nicholas; Diaz-Merced, Wanda Liz; Aarnio, Alicia; Knierman, Karen; AAS Working Group for Accessibility and Disability
Attendance at meetings and conferences is a critical component of an astronomer's professional life, providing opportunities for presenting one's work, staying current in the field, career networking, and scientific collaboration. Exclusion from these gatherings due to lack of accessibility and accommodation failure is a reality for disabled astronomers, and contributes substantially to low levels of representation in the senior-most levels of the field. We present a preview of the AAS Working Group for Accessibility and Disability's best practice recommendations for meetings accessibility. Applying the principles of universal access and barrier-free design, we model a paradigm of anticipating and removing accessibility barriers in advance, rather than putting the burden of requesting accommodation solely on disabled astronomers and students. We cite several professional and nonprofessional societies identified as meetings accessibility exemplars, and model our guidelines on their best practices. We establish standards for accessibility budgeting, venue choice, publication of policies online, designating point persons, and identifying barriers. We make recommendations for oral and poster presentations, event registration, receptions and banquets, excursions, and other typical conference activities. For meetings which are constrained by fixed budgets and venue choice, we identify a number of low cost/high reward accessibility steps which might still have a large beneficial impact. We likewise provide adapted recommendations for low budget meetings. THIS IS A POSTER LOCATED IN THE AAS BOOTH
Koster, P.R.; Kroes, E.P.; Verhoef, E.T.
We analyze the cost of access travel time variability for air travelers. Reliable access to airports is important since the cost of missing a flight is likely to be high. First, the determinants of the preferred arrival times at airports are analyzed. Second, the willingness to pay (WTP) for
H. Çimen; İ. Yabanova; M. Nartkaya; S. M. Çinar
This paper presents a web based remote access microcontroller laboratory. Because of accelerated development in electronics and computer technologies, microcontroller-based devices and appliances are found in all aspects of our daily life. Before the implementation of remote access microcontroller laboratory an experiment set is developed by teaching staff for training microcontrollers. Requirement of technical teaching and industrial applications are considered when expe...
Henning, Marcus A.
The interrelationships between motivation for choosing a program of study, intention to access academic advisors, academic difficulty, and actual appointments with academic advisors were based on student self-reports of motivation and intentions. In addition, academic achievement measures and data on student access to academic advisors were…
Full Text Available The ability of an Internet user to access data collected about himself as a result of his online activity is a key privacy safeguard. Online, data access has been overshadowed by other protections such as notice and choice. This paper describes attitudes about data access. 873 US and Irish Internet users participated in a survey designed to examine views on data access to information held by online companies and data brokers. We observed low levels of awareness of access mechanisms along with a high desire for access in both participant groups. We tested three proposed access systems in keeping with industry programs and regulatory proposals. User response was positive. We conclude that access remains an important privacy protection that is inadequately manifested in practice. Our study provides insight for lawmakers and policymakers, as well as computer scientists who implement these systems.
This report summarizes previous phases of the Access to Destinations project and applies the techniques developed : over the course of the project to conduct an evaluation of accessibility in the Twin Cities metropolitan region for : 2010. It describ...
Globally over 1.3 billion people do not have access to electricity and 2.6 billion people rely on the traditional use of biomass for cooking. Energy access is one of the major challenges of the 21. century as it is a lever for both economic and human development, at individual and national level. Moreover, energy access represents a high-potential market and offers a lot of opportunities for private companies and industrials. In this publication, ENEA lays out the current situation of energy access (actors, actual and future needs, existing technological solutions, markets). The publication addresses the main issues energy access has to face: energy price, equipment financing, distribution, scale-up, and environmental performances
Sansivero, Gail Egan
To review venous anatomy and physiology, discuss assessment parameters before vascular access device (VAD) placement, and review VAD options. Journal articles, personal experience. A number of VAD options are available in clinical practice. Access planning should include comprehensive assessment, with attention to patient participation in the planning and selection process. Careful consideration should be given to long-term access needs and preservation of access sites. Oncology nurses are uniquely suited to perform a key role in VAD planning and placement. With knowledge of infusion therapy, anatomy and physiology, device options, and community resources, nurses can be key leaders in preserving vascular access and improving the safety and comfort of infusion therapy. Copyright 2010 Elsevier Inc. All rights reserved.
Health literacy, cited as essential to achieving Healthy People 2010's goals to "increase quality and years of healthy life" and to "eliminate health disparities," is defined by Healthy People as "the degree to which individuals have the capacity to obtain, process, and understand basic health information and services needed to make appropriate health decisions." Accessibility, by definition, the aforementioned "capacity to obtain," thus is health literacy's primary prerequisite. Accessibility's designation as the global gateway to health literacy is predicated also on life's realities: global aging and climate change, war and terrorism, and life-extending medical and technological advances. People with diverse access needs are health professionals' raison d'être. However, accessibility, consummately cross-cultural and universal, is virtually absent as a topic of health promotion and practice research and scholarly discussion of health literacy and equity. A call to action to place accessibility in its rightful premier position on the profession's agenda is issued.
This article investigates the approaches of the various discourses operating in the water sector and how they address the issues of scarcity and equitable access under projected climate change impacts. Little synergy exists between the different approaches dealing with these issues. Whilst being a sustainable development and water resources management issue, a holistic view of access, scarcity and the projected impacts of climate change is not prevalent in these discourses. The climate change discourse too does not adequately bridge the gap between these issues. The projected impacts of climate change are likely to exacerbate the problems of scarcity and equitable access unless appropriate adaptation strategies are adopted and resilience is built. The successful delivery of accessible water services under projected climate change impacts therefore lies with an extension of the adaptive water management approach to include equitable access as a key driver.
Full Text Available Objective. To study and understand the phenomenon of access to contraceptive methods in Mexican teenages, through the use of the Levesque model, which allows for the observation of both the system and the system and the user´s participation in the access process. Materials and methods. A qualitative study was conducted with focus groups technique in a middle and high school of Mexico City. Results. The perception of ability to access to health care is limited, teenagers do not know the mechanisms of care or supply of contraceptive methods. Prejudices of service providers provoke a negative reaction. The family is a source of information for adolescents to make decisions. Conclusions. The model allowed the assessment of access to contraceptive methods in teenagers. It were identified different aspects that act as barriers to access and may inform health care providers about this population in their sexual and reproductive health.
Full Text Available Video game accessibility may not seem of significance to some, and it may sound trivial to anyone who does not play video games. This assumption is false. With the digitalization of our culture, video games are an ever increasing part of our life. They contribute to peer to peer interactions, education, music and the arts. A video game can be created by hundreds of musicians and artists, and they can have production budgets that exceed modern blockbuster films. Inaccessible video games are analogous to movie theaters without closed captioning or accessible facilities. The movement to have accessible video games is small, unorganized and misdirected. Just like the other battles to make society accessible were accomplished through legislation and law, the battle for video game accessibility must be focused toward the law and not the market.
Gujba, Haruna; Thorne, Steve; Mulugetta, Yacob; Rai, Kavita; Sokona, Youba
Modern energy access in Africa is critical to meeting a wide range of developmental challenges including poverty reduction and the Millennium Development Goals (MDGs). Despite having a huge amount and variety of energy resources, modern energy access in the continent is abysmal, especially Sub-Saharan Africa. Only about 31% of the Sub-Saharan African population have access to electricity while traditional biomass energy accounts for over 80% of energy consumption in many Sub-Saharan African countries. With energy use per capita among the lowest in the world, there is no doubt that Africa will need to increase its energy consumption to drive economic growth and human development. Africa also faces a severe threat from global climate change with vulnerabilities in several key areas or sectors in the continent including agriculture, water supply, energy, etc. Low carbon development provides opportunities for African countries to improve and expand access to modern energy services while also building low-emission and climate-resilient economies. However, access to finance from different sources will be critical in achieving these objectives. This paper sets out to explore the financial instruments available for low carbon energy access in Africa including the opportunities, markets and risks in low carbon energy investments in the continent. - Highlights: ► Access to finance will be critical to achieving low carbon energy access in Africa. ► Domestic finance will be important in leveraging private finance. ► Private sector participation in modern and clean energy in Africa is still low. ► Many financing mechanisms exist for low carbon energy access in Africa. ► The right institutional frameworks are critical to achieving low carbon energy access in Africa.
Full Text Available This paper presents the rationale, common practices, challenges, and some personal anecdotes from a journal editor on the production, use, and re-use of peer-reviewed scholarly articles as open educational resources (OER. The scholarly and professional discourse related to open educational resources has largely focused on open learning objects, courseware, and textbooks. However, especially in graduate education, articles published in scholarly journals are often a major component of the course content in formal education. In addition, open access journal articles are critical to expanding access to knowledge by scholars in the developing world and in fostering citizen science, by which everyone has access to the latest academic information and research results. In this article, I highlight some of the challenges, economic models, and evidence for quality of open access journal content and look at new affordances provided by the Net for enhanced functionality, access, and distribution.In the 17 years since I graduated with a doctorate degree, the climate and acceptance of open access publishing has almost reversed itself. I recall a conversation with my PhD supervisor in which he argued that publishing online was not a viable option as the product would not have permanency, scholarly recognition, or the prestige of a paper publication. His comments reflect the confusion between online resources and those described as open access, but as well illustrate the change in academic acceptance and use of open access products during the past decade. The evolution from paper to online production and consumption is a disruptive technology in which much lower cost and increased accessibility of online work opens the product to a completely new group of potential users. In the case of OER these consumers are primarily students, but certainly access to scholars from all parts of the globe and the availability to support citizen science (Silvertown, 2009
Full Text Available This checklist provides an overview of the Open Access policies implemented at Austrian universities and extramural research institutions. Furthermore, the polices adopted at nine public universities are analyzed and the respective text modules are categorized thematically. The second part of the checklist presents measures for the promotion of Open Access following the implementation of an Open Access policy.
Full Text Available . Improving web site accessibility has proven to be a challenging task with a myriad of standards, accessibility testing tools and few technical guides for implementation. This paper presents the South African National Accessibility Portal (NAP), which is used...
Christiane Gomes dos Santos
Full Text Available This research deals with the process of search, navigation and retrieval of information by the person with blindness in web environment, focusing on knowledge of the areas of information recovery and architecture, to understanding the strategies used by these people to access the information on the web. It aims to propose the construction of an accessibility verification instrument, checklist, to be used to analyze the behavior of people with blindness in search actions, navigation and recovery sites and pages. It a research exploratory and descriptive of qualitative nature, with the research methodology, case study - the research to establish a specific study with the simulation of search, navigation and information retrieval using speech synthesis system, NonVisual Desktop Access, in assistive technologies laboratory, to substantiate the construction of the checklist for accessibility verification. It is considered the reliability of performed research and its importance for the evaluation of accessibility in web environment to improve the access of information for people with limited reading in order to be used on websites and pages accessibility check analysis.
Hari Antoni Musril
Full Text Available Keamana jaringan komputer saat ini menjadi hal penting untuk diterapkan. Banyak organisasi yang telah menjadikan teknologi informasi sebagai bahagian penting dalam menunjang aktivitasnya. Akses pengguna yang tidak dibatasi menjadi ancaman bagi sebuah organisasi, karena banyak data dan informasi penting yang tersebar dalam perangkat jaringan komputer di organisasi tersebut dapat disusupi oleh pihak yang tidak berwenang. Salah satu usaha yang dapat dilakukan adalah dengan menerapkan extended access list yang merupakan salah satu bagian dari metode access control list. Extended access list dapat menyaring lalu lintas data suatu jaringan dengan mengontrol apakah paket-paket tersebut dilewatkan atau dihentikan. Extended access list juga dapat menjamin keamanan untuk setiap komputer sehingga jalur komunikasi serta hak akses setiap komputer dapat berjalan dengan baik. Extended access list memungkinkan penyaringan berdasarkan sumber atau alamat tujuan, protokol yang dipilih, port yang digunakan, dan apakah koneksi sudah ditetapkan. Tulisan ini membahas penerapan extended access list dalam jaringan supaya dapat melakukan filter terhadap paket data yang melewati jaringan. Penerapannya menggunakan software Packet Tracer 6.1.1 untuk membuat prototipe jaringan dan mensimulasikannya. Sehingga nanti dapat diterapkan pada jaringan yang sebenarnya. List yang dibangun pada penelitian ini diterapkan untuk protokol antara lain : TCP (WWW, FTP, Telnet, SMTP, POP3, UDP (DNS, dan ICMP (Ping. Hasilnya didapatkan extended access list yang dikonfigurasi pada router dalam topologi penelitian ini mampu melakukan filter terhadap paket yang melewati jaringan. Hasil konfigurasinya sangat spesifik, sehingga penerapan hak akses permit dan deny dapat dilakukan sesuai dengan aturan dan skenario yang dirancang.
Hoffer, F.A.; Wyly, J.B.; Fellows, K.E.; Harmon, W.; Levey, R.H.
The patency of vascular access shunts and fistulae has been prolonged by a combined surgical and radiological approach that includes percutaneous transluminal angioplasty (PTA), surgical revision, thrombectomy, and thrombolysis. Over the last 3 years, 35 vascular accesses in 27 patients were found to have angiographic abnormality. PTA was performed 32 times of 19 accesses and 7 PTAs resulted in patent accesses by the end of the study. Surgical revision was performed 9 times on 8 accesses and 2 of the surgical revisions resulted in a patent access by the end of the study. Concerning Thomas femoral shunts, PTA prolonged the patency by 2.2 months and surgical revision by 3.8 months per procedure. Concerning arteriovenous (AV) fistulae, PTA prolonged the patency by 4.3 months and surgical revision by 3.5 months per procedure. A combination of procedures effectively doubles the duration of patency of Thomas femoral shunts and almost triples the duration of patency of AV fistulae in children. Forty-one percent of these accesses remain open 1 year following the initiation of these procedures. (orig.)
Evcil, A Nilay
Accessibility to public environment is the human right and basic need of each citizen and is one of the fundamental considerations for urban planning. The aim of this study is to determine the compliance of public buildings in central business districts (CBD) of Istanbul, Turkey, to wheelchair accessibility to the guidelines of the instrument and identify architectural barriers faced by wheelchair users. This is a descriptive study of 26 public buildings in CBD of Istanbul. The instrument used is the adapted Useh, Moyo and Munyonga questionnaire to collect the data from direct observation and measurement. Descriptive statistics of simple percentages and means are used to explain the compliance to the guidelines of the instrument and wheelchair accessibility. The descriptive survey results indicate that wheelchair users experience many accessibility problems in public environment of the most urbanised city (cultural capital of Europe in 2010) in a developing country. It is found that the major architectural barrier is the public transportation items with the lowest mean compliance (25%). Beside this, the most compliant to the instrument is entrance to building items with 79% as mean percentage. It is also found that there is an intention to improve accessibility when building construction period is investigated. This article describes the example of the compliance of public buildings accessibility when the country has legislation, but lacking regulations about accessibility for the wheelchair users.
ALBARELO, P. C.
Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.
To deal with long probing delay and inaccurate probing results in the endpoint admission control method,a joint local and end-to-end admission control algorithm is proposed,which introduces local probing of access network besides end-to-end probing.Through local probing,the algorithm accurately estimated the resource status of the access network.Simulation shows that this algorithm can improve admission control performance and reduce users' average waiting time when the access network is heavily loaded.
CERN is committed to Open Access. It represents one of the values written in our Convention sixty years ago and is increasingly important for our Member States. In the last edition of the Bulletin, this article described how CERN is doing with regards to open access publishing today. On Thursday this week, the Open Access Policy for CERN Physics Publications* was endorsed by the Scientific Information Policy Board (SIPB) and approved by the Director-General the same day . For any clarifications regarding the policy, please contact the Scientific Information Service email@example.com. * A French version of the policy will be made available shortly.
The phenomenon of conscious awareness or consciousness is complicated but fascinating. Although this concept has intrigued the mankind since antiquity, exploration of consciousness from scientific perspectives is not very old. Among myriad of theories regarding nature, functions and mechanism of consciousness, off late, cognitive theories have received wider acceptance. One of the most exciting hypotheses in recent times has been the "conscious access hypotheses" based on the "global workspace model of consciousness". It underscores an important property of consciousness, the global access of information in cerebral cortex. Present article reviews the "conscious access hypothesis" in terms of its theoretical underpinnings as well as experimental supports it has received.
South, Tabitha; Adair, Brigette
Open access has become an important topic in critical care over the last 3 years. In the past, critical care had restricted access and set visitation guidelines to protect patients. This article provides a review of the literature related to open access in the critical care environment, including the impact on patients, families, and health care providers. The ultimate goal is to provide care centered on patients and families and to create a healing environment to ensure safe passage of patients through their hospital stays. This outcome could lead to increased patient/family satisfaction. Copyright © 2014 Elsevier Inc. All rights reserved.
Vascular surgeons are more and more becoming responsible for "life-line" creation well functioning and maintenance of hemodialysis patients and to provide a well functioning and multidisciplinary access service together with nefrologists, dialysis staff, and interventional radiology. For many, this sometimes arduous surgery with associated complicated clinical decision making, becomes a constant and challenging burden but much through the appearance of national and international guidelines and especially the endovascular technology, feasible solutions are easily at hand and the life as an access surgeon more pleasant. Here, basics in dialysis access care are presented together with some examples of novel available solutions to troublesome clinical problems.
Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo
A random access memory, or RAM, is a device that, when interrogated, returns the content of a memory location in a memory array. A quantum RAM, or qRAM, allows one to access superpositions of memory sites, which may contain either quantum or classical information. RAMs and qRAMs with n-bit addresses can access 2^n memory sites. Any design for a RAM or qRAM then requires O(2^n) two-bit logic gates. At first sight this requirement might seem to make large scale quantum versions of such devices ...
Bowers, Dan M
Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed
Liang, Bryan A; Mackey, Tim K; Lovett, Kimberly M
Issues surrounding contraception access have been a national focus. During this debate, adolescent and adult women may seek these products online. Due to safety concerns, including potential counterfeit forms, we wished to assess whether online "no prescription" contraceptives were available. We assessed online availability of reversible, prescription contraceptive methods resulting in online pharmacy marketing is shifting from direct search engine access to social media (Facebook, Twitter, Slidehare, flickr). Online contraceptive sales represent patient safety risks and a parallel system of high-risk product access absent professional guidance. Providers should educate patients, while policy makers employ legal strategies to address these systemic risks. Copyright © 2012 Elsevier Inc. All rights reserved.
Hakkarinen, C.; Brown, D.; Callahan, J.; hankin, S.; de Koningh, M.; Middleton-Link, D.; Wigley, T.
A Web-based access system to climate model output data sets for intercomparison and analysis has been produced, using the NOAA-PMEL developed Live Access Server software as host server and Ferret as the data serving and visualization engine. Called ARCAS ("ACACIA Regional Climate-data Access System"), and publicly accessible at http://dataserver.ucar.edu/arcas, the site currently serves climate model outputs from runs of the NCAR Climate System Model for the 21st century, for Business as Usual and Stabilization of Greenhouse Gas Emission scenarios. Users can select, download, and graphically display single variables or comparisons of two variables from either or both of the CSM model runs, averaged for monthly, seasonal, or annual time resolutions. The time length of the averaging period, and the geographical domain for download and display, are fully selectable by the user. A variety of arithmetic operations on the data variables can be computed "on-the-fly", as defined by the user. Expansions of the user-selectable options for defining analysis options, and for accessing other DOD-compatible ("Distributed Ocean Data System-compatible") data sets, residing at locations other than the NCAR hardware server on which ARCAS operates, are planned for this year. These expansions are designed to allow users quick and easy-to-operate web-based access to the largest possible selection of climate model output data sets available throughout the world.
Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti
Jun 10, 2009 ... One of the key drivers of this project has been an understanding which has evolved over the last ... Communication and Access to Knowledge in Africa Project. ... Institutional capacities include human resources and skills,.
Halstead, R. J.; Dilger, F.; Moore, R. C.
The proposed Yucca Mountain repository site currently lacks rail access. The nearest mainline railroad is almost 100 miles away. Absence of rail access could result in many thousands of truck shipments of spent nuclear fuel and high-level radioactive waste. Direct rail access to the repository could significantly reduce the number of truck shipments and total shipments. The U.S. Department of Energy (DOE) identified five potential rail access corridors, ranging in length from 98 miles to 323 miles, in the Final Environmental Impact Statement (FEIS) for Yucca Mountain. The FEIS also considers an alternative to rail spur construction, heavy-haul truck (HHT) delivery of rail casks from one of three potential intermodal transfer stations. The authors examine the feasibility and cost of the five rail corridors, and DOE's alternative proposal for HHT transport. The authors also address the potential for rail shipments through the Las Vegas metropolitan area
... online tool helps people locate and access their electronic health records from a variety of sources. Plan for children ... in a busy room or to provide instant privacy, headphones to decrease auditory distractions, and comfort snacks ...
Minnesota Department of Natural Resources — The Minnesota Walk-In Access site (WIA) GIS data represents areas of private land that have been made open to the public for the purpose of walk-in (foot travel)...
Juan D. Deaton; Luiz A. DaSilva; Christian Wernz
A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.
Almorsy, Lamia; Khalifa, Mohamed
Access time refers to the interval between requesting and actual outpatient appointment. It reflects healthcare accessibility and has a great influence on patient treatment and satisfaction. King Faisal Specialist Hospital and Research Center, Jeddah, Saudi Arabia studied the accessibility to outpatient services in order to develop useful strategies and recommendations for improvement. Utilized, unutilized and no-show appointments were analyzed. It is crucial to manage no-shows and short notice appointment cancellations by preparing a waiting list for those patients who can be called in to an appointment on the same day using an open access policy. An overlapping appointment scheduling model can be useful to minimize patient waiting time and doctor idle time in addition to the sensible use of appointment overbooking that can significantly improve productivity.
The first meeting of European particle physics funding agencies took place on 3 November at CERN to establish a consortium for Open Access publishing in particle physics, SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). Open Access could transform the academic publishing world, with a great impact on research. The traditional model of research publication is funded through reader subscriptions. Open Access will turn this model on its head by changing the funding structure of research results, without increasing the overall cost of publishing. Instead of demanding payment from readers, publications will be distributed free of charge, financed by funding agencies via laboratories and the authors. This new concept will bring greater benefits and broaden opportunities for researchers and funding agencies by providing unrestricted distribution of the results of publicly funded research. The meeting marked a positive step forward, with international support from laboratories, fundin...
Full Text Available Abstract Open Access publishing is a valuable resource for the synthesis and distribution of essential health care information. This article discusses the potential benefits of Open Access, specifically in terms of Low and Middle Income (LAMI countries in which there is currently a lack of informed health care providers – mainly a consequence of poor availability to information. We propose that without copyright restrictions, Open Access facilitates distribution of the most relevant research and health care information. Furthermore, we suggest that the technology and infrastructure that has been put in place for Open Access could be used to publish download-able manuals, guides or basic handbooks created by healthcare providers in LAMI countries.
Few healthcare workers are trained to offer emergency obstetrical care, so timely ... With better access to skilled care and emergency services, the project aims to ... training program as it relates to health service delivery and health outcomes.
U.S. Department of Health & Human Services — 1995-2018. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...
U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. LegislationâYouth Access. The STATE...
Full Text Available Improving access and mobility of people with disabilities is an essential component of the alleviation of poverty in developing countries. Disabled people are among the most socially excluded members of society and poorly designed and inaccessible...
This presentation provides insight on how ubiquitous technology can support lifelong learners facilitating access across context. The 3LHub tool is presented as suitable tool to scaffold personal learning ecologies.
Social Security Administration — A dataset containing payment amounts made by the Social Security Administration for court-approved Equal Access to Justice Act (EAJA) payments for fiscal year 2010...
U.S. Department of Health & Human Services — This dataset includes facility details, performance rates, vascular access topic measure score, and the state and national average measure scores for the vascular...
African Journal of Food, Agriculture, Nutrition and Development View Journal | Current .... Journal is Open Access. International Journal of Applied Agriculture and Apiculture Research ... Journal of Applied Biosciences View Journal | Current ...
Geeraert, Jérémy; Rivollier, Elisabeth
Accessing hospital care is a privilege for a growing proportion of the population in situations of economic and social precarity. It is therefore important that caregivers understand these difficulties in order to adapt their nursing approach.
The work of health service access points highlights the process of exclusion through marginalisation, the phenomenon of precarity and anthropological tensions between hospitality and inhospitality or between the desirable and undesirable. Copyright © 2017 Elsevier Masson SAS. All rights reserved.
National Oceanic and Atmospheric Administration, Department of Commerce — ERDDAP (the Environmental Research Division's Data Access Program) is a data server that gives you a simple, consistent way to download subsets of scientific...
Vasilikos, Panagiotis; Nielson, Flemming; Nielson, Hanne Riis
also on other attributes of the environment such as the time. In this paper, we use systems of Timed Automata to model distributed systems and we present a logic in which one can express time-dependent policies for access control. We show how a fragment of our logic can be reduced to a logic......Access control policies are essential to determine who is allowed to access data in a system without compromising the data's security. However, applications inside a distributed environment may require those policies to be dependent on the actual content of the data, the flow of information, while...... that current model checkers for Timed Automata such as UPPAAL can handle and we present a translator that performs this reduction. We then use our translator and UPPAAL to enforce time-dependent policy-based access control on an example application from the aerospace industry....
Zanella, Andrea; Zorzi, Michele; Santos, André F.
In order to make the Internet of Things a reality, ubiquitous coverage and low-complexity connectivity are required. Cellular networks are hence the most straightforward and realistic solution to enable a massive deployment of always connected Machines around the globe. Nevertheless, a paradigm...... shift in the conception and design of future cellular networks is called for. Massive access attempts, low-complexity and cheap machines, sporadic transmission and correlated signals are among the main properties of this new reality, whose main consequence is the disruption of the development...... Access Reservation, Coded Random Access and the exploitation of multiuser detection in random access. Additionally, we will show how the properties of machine originated signals, such as sparsity and spatial/time correlation can be exploited. The end goal of this paper is to provide motivation...
web site ODP/TAMU Science Operator Home Ocean Drilling Program Web Site Access Statistics* Overview See statistics for JOIDES members. See statistics for Janus database. 1997 October November December
.... The first component of LADDER is INLAND (Informal Natural Language Access to Navy Data), which allows the user to ask questions in English about information contained in databases similar to those currently...
Lehner, William D
... Training Corps, and Officer Candidate School. Three areas are covered: historical patterns in officer accessions and historical changes in Navy pre-commissioning training and education philosophy and policy...
Hoe worden de kosten van BioMedCentral’s Article Processing Charges gedekt, hoe worden verantwoordelijkheden omtrent de betaling daarvan gedeeld, en wat zijn de opvattingen van deze auteurs over Open Access? Enquête.
While female labour force participation has increased in some parts of the world, ... In India, for example, only 24% of women have access to paid work, ... female entrepreneurship and enhancing the productivity of women-owned enterprises.
Cano Soveri, M.D.; Norp, A.H.J.; Popova, M.P.
Satellite communications (Satcom) networks are increasingly integrating with terrestrial communications networks, namely Next Generation Networks (NGN). In the area of NGN the Evolved Packet Core (EPC) is a new network architecture that can support multiple access technologies. When Satcom is
Cano, M.D.; Norp, A.H.J.; Popova, M.P.
Satellite communications (Satcom) networks are increasingly integrating with terrestrial communications networks, namely Next Generation Networks (NGN). In the area of NGN the Evolved Packet Core (EPC) is a new network architecture that can support multiple access technologies. When Satcom is
Full Text Available Today the digitisation of our collections is a goal for libraries all over Europe. The choices we make in digitisation and preservation now will have a significant impact on the future. Do we only emphasise access? How do we enable access and preserve our originals in a qualitative and productive way? What will actually be left of our cultural heritage in the next millennium? In this paper I am going to look at promoting access to preserved originals mirrored by the experience at the Helsinki University Library, the National Library of Finland: · Preservation activities as platform for digitisation and OCR · Processing access to collections · The future - looking ahead
...-economic circumstances and drug needs. Volume two presents an analysis of the un-insured and under-insured by measuring the extent to which Canadians have access to insurance for prescription drug expenses and the quality of that coverage...
The purpose of this research is to examine the relationship between accessibility and the : growth of employment centers in order to improve our understanding of how transportation : investments influence the spatial organization of metropolitan area...
Bahl, P.K.; Gray, R.G.
In recent years, the electric industry has undergone dramatic changes as the federal and state governments have encouraged bulk power production by Independent Power Producers (IPPS) and Qualified Facilities (QFs). With decentralization and the consequent competition in the field of bulk power production, there has emerged the problem of non-utility generators (NUGS) and of transmission dependent utilities accessing the existing transmission systems owned by electric utilities. This paper presents current and future issues related to transmission access by IPPS, QFs and transmission dependent utilities. These issues include: (a) impact on system reliability, (b) impact of pricing strategies, (c) changes in state and federal regulations, (d) transmission proposals by various entities, (e) present access arrangements, (f) formation of the Western Systems Power Pool (WSPP), and (g) siting difficulties. The transmission access problem warrants consideration of transmission services, coordination among electric utilities, joint planning on a regional basis, and accommodation of IPPs and NUGs
Short, H; Manzi, A; De Notaris, V; Keeble, O; Kiryanov, A; Mikkonen, H; Tedesco, P; Wartel, R
Access to WLCG resources is authenticated using an x509 and PKI infrastructure. Even though HEP users have always been exposed to certificates directly, the development of modern Web Applications by the LHC experiments calls for simplified authentication processes keeping the underlying software unmodified. In this work we will show a solution with the goal of providing access to WLCG resources using the user’s home organisations credentials, without the need for user-acquired x509 certificat...
This fourth e-book on the subject of open access in the academic field includes a Latin American case study on open access penetration, a paper from Germany on the promotion of OA illustrated by a project at the University of Konstanz, and a case study on OA at Bioline International, a non-profit scholarly publications aggregator, distributor, publisher and publishing assistance service.
The current state of scholarly communication is one of contest between an increasingly commercial system that is dysfunctional and incompatible with the basic aims of scholarship, and emerging alternatives, particularly open access publishing and open access archiving. Two approaches to facilitating global participation in scholarly communication are contrasted in this paper; equity is seen as a superior goal to the donor model, which requires poverty or inequity to succeed. The current stat...
The National Rural Electric Cooperative Association (NRECA) believes that while access to the interconnected transmission system (grid) is necessary to provide the most efficient and economical development and use of the bulk power supply system, the grid cannot be unconditionally opened. Additionally, access should be provided only under reasonable terms, conditions, and cost-based compensation, within a framework of joint planning and coordinated operations. NRECA describes here its transmission policy, a coordinated planning and utilization model (CPU)
Savić, Dobrica (IAEA-NIS); GreyNet, Grey Literature Network Service
Since its creation in 1970, the International Nuclear Information System (INIS) has collected and provided access to more than 3.8 million bibliographic references to publications, documents, technical reports, non-copyrighted documentation, and other grey literature, as well as over a million full texts. Overall, there are 800 GB of data in the INIS repository. Public interest in accessing this collection has been remarkable. This year alone, there were more than one million sessions and alm...
Bebchuk, Lucian Arye; Hirst, Scott
This paper contains the proceedings of the Proxy Access Roundtable that was held by the Harvard Law School Program on Corporate Governance on October 7, 2009. The Roundtable brought together prominent participants in the debate - representing a range of perspectives and experiences - for a day of discussion on the subject. The day’s first two sessions focused on the question of whether the Securities and Exchange Commission should provide an access regime, or whether it should leave the adopt...
Koster, P.R.; Kroes, E.P.; Verhoef, E.T.
This discussion paper resulted in a publication in Transportation Research Part B: Methodological (2011). Vol. 45(10), pages 1545-1559. This paper analyses the cost of access travel time variability for air travelers. Reliable access to airports is important since it is likely that the cost of missing a flight is high. First, the determinants of the preferred arrival times at airports are analyzed, including trip purpose, type of airport, flight characteristics, travel experience, type of che...
Chiavegatto, R B; Paula, C M P; Souza Sobrinho, F; Benites, F R G; Techio, V H
Cynodon is a genus of plants with forage potential that has attracted the interest of breeders. These species have high morphological variability in a large number of varieties and cytotypes, hampering identification. This study aimed to determine the karyotype asymmetry index among accessions of Cynodon to discriminate between them. Karyotype symmetry was based on three estimates, which were compared. The basic number for the genus is x = 9. The results of the chromosome count and DNA quantification, respectively, were as follows: two diploid accessions (2n = 2x = 18 and 1.08 ± 0.094 to 1.17 ± 0.036 pg DNA and ± standard deviation), one triploid accession (2n = 3x = 27 and 1.63 ± 0.017 pg DNA), four tetraploid accessions (2n = 4x = 36 and 1.88 ± 0.069 to 2.10 ± 0.07 pg DNA), and one pentaploid accession (2n = 5x = 45 and 2.55 ± 0.098 pg DNA). C. incompletus var. hirsutus had the longest total length of the haploid lot (29.05 µm), with chromosomes that ranged from 1.7 to 6.2 µm in length. On the basis of the karyotype asymmetry indices, the accessions were divided into two groups: 1) C. dactylon var. dactylon, C. transvaalensis, C. dactylon var. polevansii, three accessions of Cynodon sp, and C. nlemfuensis; and 2) C. incompletus var. hirsutus. This is the first description of tetraploidy in C. transvaalensis. The karyotypic data facilitated a determination of the degree of proximity between the accessions.
This study is intended to analyze the current levels of financial depth and financial access in Indonesia and to analyze the factors affecting them. The analysis method used was a combination of descriptive quantitative, benchmarking, and literature reviews. The conclusion is that the financial depth in Indonesia has not shown a satisfactory level since it was the lowest, or the second lowest ranked country among the sampled countries. Meanwhile, the financial access in Indonesia is relativel...
After having presented the initial characteristics and weaknesses of the software provided for the control of a memory disk coupled with a Multi 8 computer, the author reports the development and improvement of this controller software. He presents the different constitutive parts of the computer and the operation of the disk coupling and of the direct access to memory. He reports the development of the disk access controller: software organisation, loader, subprograms and statements
Kreickemeier, Udo; Raimondos-Møller, Pascalis
Reducing tariffs and increasing consumption taxes is a standard IMF advice to countries that want to open up their economy without hurting government finances. Indeed, theoretical analysis of such a tariff-tax reform shows an unambiguous increase in welfare and government revenues. The present pa...... efficient proposal to follow both as far as it concerns market access and welfare.JEL code: F13, H20.Keywords: Market access; tariff reform, consumption tax reform....
A Web browser provides a uniform user interface to different types of information. Making this interface universally accessible and more interactive is a long-term goal still far from being achieved. Universally accessible browsers require novel interaction modalities and additional functionalities, for which existing browsers tend to provide only partial solutions. Although functionality for Web accessibility can be found as open source and free software components, their reuse and integration is complex because they were developed in diverse implementation environments, following standards and conventions incompatible with the Web. To address these problems, we have started several activities that aim at exploiting the potential of open-source software for Web accessibility. The first of these activities is the development of Adaptable Multi-Interface COmmunicator (AMICO):WEB, an infrastructure that facilitates efficient reuse and integration of open source software components into the Web environment. The main contribution of AMICO:WEB is in enabling the syntactic and semantic interoperability between Web extension mechanisms and a variety of integration mechanisms used by open source and free software components. Its design is based on our experiences in solving practical problems where we have used open source components to improve accessibility of rich media Web applications. The second of our activities involves improving education, where we have used our platform to teach students how to build advanced accessibility solutions from diverse open-source software. We are also partially involved in the recently started Eclipse projects called Accessibility Tools Framework (ACTF), the aim of which is development of extensible infrastructure, upon which developers can build a variety of utilities that help to evaluate and enhance the accessibility of applications and content for people with disabilities. In this article we briefly report on these activities.
In den letzten Jahren hat der Gedanke des Open Access vermehrt Einzug in den Bereich des wissenschaftlichen Publizierens erhalten. Viele namhafte Wissenschaftsorganisationen und renommierte Wissenschaftler/innen haben sich öffentlich zu diesem Prinzip positioniert und fordern den kostenlosen und barrierefreien Zugang zu wissenschaftlichen Informationen. Trotz dieser positiven Einstellung gegenüber Open Access veröffentlichen viele Autor/innen nur selten ihre wissenschaftlichen Arbeiten nach d...
Should those who work on ethics welcome or resist moves to open access publishing? This paper analyses arguments in favour and against the increasing requirement for open access publishing and considers their implications for bioethics research. In the context of biomedical science, major funders are increasingly mandating open access as a condition of funding and such moves are also common in other disciplines. Whilst there has been some debate about the implications of open-access for the social sciences and humanities, there has been little if any discussion about the implications of open access for ethics. This is surprising given both the central role of public reason and critique in ethics and the fact that many of the arguments made for and against open access have been couched in moral terms. In what follows I argue that those who work in ethics have a strong interest in supporting moves towards more open publishing approaches which have the potential both to inform and promote richer and more diverse forms of public deliberation and to be enriched by them. The importance of public deliberation in practical and applied ethics suggests that ethicists have a particular interest in the promotion of diverse and experimental forms of publication and debate and in supporting new, more creative and more participatory approaches to publication.
Elbæk, Mikael; Hansen, Tove Juul; Larsen, Asger V.
Denne rapport viser, at det faglige domæne er en meget stærk faktor i forhold til, hvor stor en andel af forskningsoutputtet, der er open access. Rapporten viser, at der er forskelle mellem universiteterne som ikke alene kan forklares med faglige faktorer, men forklaringerne må findes andre steder......, det kunne være lokale procedurer, kultur eller strukturer (politikker). Dette tager rapporten dog ikke stilling til. Andelen af gylden open access ligger relativt stabilt på tværs af universiteterne, med en andel mellem 6 – 10 % af den samlede publicering i peer reviewede tidsskrifter. Dermed er grøn...... open access den væsentligste faktor som adskiller universiteternes samlede open access andel. Endvidere viser rapporten, at der er et meget stort uudnyttet open access potentiale på alle universiteterne. Faktisk kunne mere end 5.000 flere BFI-pointgivende artikler være open access, dvs. at 71 % af det...
Jin Han Park
Full Text Available Housing prices are determined by a variety of factors, including the features of the building and the neighborhood environment, and a potential buyer decides to buy a house after reviewing these factors and concluding that it is worth the price. We used Hedonic Price Methods to find the relationship between monetary value of house and access conditions to urban parks. Two meaningful results were discovered in this study: first, as the distance from the park increases, the value of the park inherent in the housing price decreases; second, the greater walking accessibility, to the park, the higher the park value inherent in housing prices. Despite presenting shorter distances to walk and more entrances, poorly accessible zones were deemed as such due to the necessity of crossing an arterial road. This indicates that the results can define accessibility not as the Euclidian distance but as the shortest walking distance while considering crossroads and park entrances. The results of this study have significant implications for urban park economic impact analyses in Seoul. Also, the increase in housing prices closer to parks supports the idea that access is dependent on the residents’ socioeconomic status. Lastly, the results of this study can improve walking accessibility to the park.
Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos
The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios. Copyright © 2014 Elsevier Inc. All rights reserved.
Choi, Won-Kyu; Kim, Jang-Kew; Yang, Jung-Bo; Ko, Young-Bok; Nam, Sang-Lyun; Lee, Ki-Hwan
This study was conducted to compare the surgical outcomes between two-port access and four-port access laparoscopic ovarian cystectomy. Four hundred and eighty nine patients who had received two-port access laparoscopic ovarian cystectomy (n=175) and four-port access laparoscopic ovarian cystectomy (n=314) in Chungnam National University Hospital from January 2009 to August 2012 were analyzed retrospectively. The data were compared between the bilaterality of the cysts and cyst diameter of less than 6 cm and 6 cm or more. There were no significant differences in patient's age, parity, body weight, body mass index and history of previous surgery between the two-port and four-port access laparoscopy group. Bilaterality of ovarian cysts was more in fourport access laparoscopy group (13.7% vs. 32.5%, P=0.000). There were no significant differences in operation time, hemoglobin change, hospital stay, adhesiolysis, transfusion, and insertion of hemo-vac between the two-port and four-port access laparoscopy group for size matched compare. However additional analgesics were more in four-port access laparoscopy group for unilateral ovarian cystectomy. Two-port access laparoscopic surgery was feasible and safe for unilateral and bilateral ovarian cystectomy compare with four-port access laparoscopic surgery.
Souliotis, Kyriakos; Hasardzhiev, Stanimir; Agapidaki, Eirini
Research evidence suggests that access to health care is the key influential factor for improved population health outcomes and health care system sustainability. Although the importance of addressing barriers in access to health care across European countries is well documented, little has been done to improve the situation. This is due to different definitions, approaches and policies, and partly due to persisting disparities in access within and between European countries. To bridge this gap, the Patient Access Partnership (PACT) developed (a) the '5As' definition of access, which details the five critical elements (adequacy, accessibility, affordability, appropriateness, and availability) of access to health care, (b) a multi-stakeholders' approach for mapping access, and (c) a 13-item questionnaire based on the 5As definition in an effort to address these obstacles and to identify best practices. These tools are expected to contribute effectively to addressing access barriers in practice, by suggesting a common framework and facilitating the exchange of knowledge and expertise, in order to improve access to health care between and within European countries. © 2016 S. Karger AG, Basel.
Kelly, Brian; Nevile, Liddy; Sloan, David; Fanou, Sotiris; Ellison, Ruth; Herrod, Lisa
This article asserts that current approaches to enhance the accessibility of Web resources fail to provide a solid foundation for the development of a robust and future-proofed framework. In particular, they fail to take advantage of new technologies and technological practices. The article introduces a framework for Web adaptability, which encourages the development of Web-based services that can be resilient to the diversity of uses of such services, the target audience, available resources, technical innovations, organisational policies and relevant definitions of 'accessibility'. The article refers to a series of author-focussed approaches to accessibility through which the authors and others have struggled to find ways to promote accessibility for people with disabilities. These approaches depend upon the resource author's determination of the anticipated users' needs and their provision. Through approaches labelled as 1.0, 2.0 and 3.0, the authors have widened their focus to account for contexts and individual differences in target audiences. Now, the authors want to recognise the role of users in determining their engagement with resources (including services). To distinguish this new approach, the term 'adaptability' has been used to replace 'accessibility'; new definitions of accessibility have been adopted, and the authors have reviewed their previous work to clarify how it is relevant to the new approach. Accessibility 1.0 is here characterised as a technical approach in which authors are told how to construct resources for a broadly defined audience. This is known as universal design. Accessibility 2.0 was introduced to point to the need to account for the context in which resources would be used, to help overcome inadequacies identified in the purely technical approach. Accessibility 3.0 moved the focus on users from a homogenised universal definition to recognition of the idiosyncratic needs and preferences of individuals and to cater for them. All of
... 47 Telecommunication 1 2010-10-01 2010-10-01 false Marketing of Access BPL equipment. 15.609 Section 15.609 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Access Broadband Over Power Line (Access BPL) § 15.609 Marketing of Access BPL equipment. The marketing of Access...
Full Text Available In the study; the assessment of accessibility has been conducted in Istanbul public libraries within the scope of public area. Public libraries commonly serve with its user of more than 20 million in total, spread to the general of Turkey, having more than one thousand branches in the centrums and having more than one million registered members. The building principles and standards covering the subjects such as the selection of place, historical and architectural specification of the region, distance to the centre of population and design in a way that the disabled people could benefit from the library services fully have been determined with regulations in the construction of new libraries. There are works for the existent libraries such as access for the disabled, fire safety precautions etc. within the scope of the related standards. Easy access by everyone is prioritized in the public libraries having a significant role in life-long learning. The purpose of the study is to develop solution suggestions for the accessibility problems in the public libraries. The study based on the eye inspection and assessments carried out within the scope of accessibility in the public libraries subsidiary to Istanbul Culture and Tourism Provincial Directorate Library and Publications Department within the provincial borders of Istanbul. The arrangements such as reading halls, study areas, book shelves etc. have been examined within the frame of accessible building standards. Building entrances, ramps and staircases, horizontal and vertical circulation of building etc. have been taken into consideration within the scope of accessible building standards. The subjects such as the reading and studying areas and book shelf arrangements for the library have been assessed within the scope of specific buildings. There are a total of 34 public libraries subsidiary to Istanbul Culture and Tourism Provincial Directorate on condition that 20 ea. of them are in the
Costin PRIBEANU; Ruxandra-Dora MARINESCU; Paul FOGARASSY-NESZLY; Maria GHEORGHE-MOISII
The accessibility of public administration web sites is a key quality attribute for the successful implementation of the Information Society. The purpose of this paper is to present a second review of municipal web sites in Romania that is based on automated accessibility checking. A number of 60 web sites were evaluated against WCAG 2.0 recommendations. The analysis of results reveals a relatively low web accessibility of municipal web sites and highlights several aspects. Firstly, a slight ...
Since its creation in 1970, the International Nuclear Information System (INIS) has collected and provided access to more than 3.8 million bibliographic references to publications, documents, technical reports, non‐copyrighted documentation, and other grey literature, as well as over a million full texts. Overall, there are 800 GB of data in the INIS repository. Public interest in accessing this collection has been remarkable. This year alone, there were more than one million sessions and almost two million page views. During the same period, there were 1.6 million full text document downloads. The INIS collection consists of seven types of literature – computer media, patents, books, reports, journal articles, miscellaneous and audio‐visuals. This paper provides an overview of the INIS collection subject coverage, and the distribution of different types of grey literature. It also provides INIS repository access statistics based on Google Analytics and other Web search data pertaining to public interest in accessing these different types of literature and the uniqueness of the collection. As one of the world's largest collections of published information on the peaceful uses of nuclear science and technology, INIS represents an extraordinary example of world cooperation. 154 INIS members share and allow access to their valuable nuclear information resources, preserving them for future generations and offering a freely available nuclear knowledge repository. (author)
Margaret (Maggie Williams
Full Text Available Despite efforts to scale up access to antiretroviral therapy (ART, particularly at primary health care (PHC facilities, antiretroviral therapy (ART continues to be out of reach formany human immunodeficiency virus (HIV-positive children in sub-Saharan Africa. In resource limited settings decentralisation of ART is required to scale up access to essential medication. Traditionally, paediatric HIV care has been provided in tertiary care facilities which have better human and material resources, but limited accessibility in terms of distance for caregivers of HIV-positive children. The focus of this article is on the experiences of caregivers whilst accessing ART for HIV-positive children at PHC (decentralised care facilities in Nelson Mandela Bay (NMB in the Eastern Cape, South Africa. A qualitative, explorative, descriptive and contextual research design was used. The target population comprised caregivers of HIV-positive children. Data were collected by means of indepth individual interviews, which were thematically analysed. Guba's model was usedto ensure trustworthiness. Barriers to accessing ART at PHC clinics for HIV-positive children included personal issues, negative experiences, lack of support and finance, stigma and discrimination. The researchers recommend standardised programmes be developed and implemented in PHC clinics to assist in providing treatment, care and support for HIV positive children.
Full Text Available Purpose: Airport Surface Access faces two main opposite issues: (1 cars, being the main transport mode, contribute to the increasing level of congestion and pollution of cities; and (2 simultaneously, parking fees are one important source of airports commercial revenue, creating a dilemma for airports when facing the problem. Following the recent trend of air passengers travelling with Smartphone (78% in 2013, the purpose of this paper is to monitor the adoption of mobile Applications (Apps by airports and to analyze if the information and functions provided in those Apps can help to overcome the above two issues. Design/methodology/approach: 31 iPhone App of some of the largest European airports were evaluated in the lab using the evaluation model of Destinations Mobile Applications (Scolari and Fernández-Cavia 2014 adapted for for the Airport Surface Access on Airport Apps Findings and Originality/value: The Apps evaluated provided a very limited functionality to help passengers to plan and book their trips to/from the airports on public transports and gave high priority to parking information and services. Originality/value: Although Airport Surface Access has been a widely researched, the originality of this paper is the analysis of airport mobile Apps as a potential tool for airports to deal with the surface airport access problems.Access, Airports, Mobile Internet, Commercial Revenues
Particle Physics, often referred to as High Energy Physics (HEP), spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-Web era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peerreview system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs...
Margaret (Maggie Williams
Full Text Available Despite efforts to scale up access to antiretroviral therapy (ART, particularly at primary health care (PHC facilities, antiretroviral therapy (ART continues to be out of reach for many human immunodeficiency virus (HIV-positive children in sub-Saharan Africa. In resource limited settings decentralisation of ART is required to scale up access to essential medication. Traditionally, paediatric HIV care has been provided in tertiary care facilities which have better human and material resources, but limited accessibility in terms of distance for caregivers of HIV-positive children. The focus of this article is on the experiences of caregivers whilst accessing ART for HIV-positive children at PHC (decentralised care facilities in Nelson Mandela Bay (NMB in the Eastern Cape, South Africa. A qualitative, explorative, descriptive and contextual research design was used. The target population comprised caregivers of HIV-positive children. Data were collected by means of in-depth individual interviews, which were thematically analysed. Guba's model was used to ensure trustworthiness. Barriers to accessing ART at PHC clinics for HIV-positive children included personal issues, negative experiences, lack of support and finance, stigma and discrimination. The researchers recommend standardised programmes be developed and implemented in PHC clinics to assist in providing treatment, care and support for HIV-positive children.
With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.
Maria Fernanda do Prado Tostes
Full Text Available Objective to characterize the access to surgical assistance in Brazil. Method documentary study, with a quantitative approach, developed from information of the Caixa Preta da Saúde [Health Black Box] database, of the Brazilian Medical Association. Results in the one-year period 3773 cases related to health care in Brazil were recorded. There were 458 (12.3% records on surgical assistance. Of these, most, 339 (74.1%, involved the lack of access in all regions of Brazil. The main access constraint was the prolonged waiting time for surgery. Other constraints were the excessive waiting for medical appointment with experts, doing examinations and cancellation of surgeries. Conclusion the access to surgical assistance, by users of the Brazilian health system, is not widely guaranteed, reinforcing the need for integrated governmental actions, organization of the health care network, management of health care and human resources to overcome the challenges imposed to achieve the Universal Access to Health and Universal Health Coverage.
Seybold, M. G.; Donoho, N. A.; McNamara, D.; Paquette, J.; Renkevens, T.
The Office of Satellite and Product Operations (OSPO) is the NESDIS office responsible for satellite operations, product generation, and product distribution. Access to and distribution of OSPO data was formally established in a Data Access Policy dated February, 2011. An extension of the data access policy is the OSPO Customer Relationship Management (CRM) Database, which has been in development since 2008 and is reaching a critical level of maturity. This presentation will provide a summary of the data access policy and standard operating procedure (SOP) for handling data access requests. The tangential CRM database will be highlighted including the incident tracking system, reporting and notification capabilities, and the first comprehensive portfolio of NESDIS satellites, instruments, servers, applications, products, user organizations, and user contacts. Select examples of CRM data exploitation will show how OSPO is utilizing the CRM database to more closely satisfy the user community's satellite data needs with new product promotions, as well as new data and imagery distribution methods in OSPO's Environmental Satellite Processing Center (ESPC). In addition, user services and outreach initiatives from the Satellite Products and Services Division will be highlighted.
Venous access is an essential part of medical practice. It is needed to obtain blood samples to make the diagnosis and to administer fluids or medicines as part of treatment. Although relatively new in the history of medicine, the placement and maintenance of the various venous access devices now occupies a significant portion of many vascular and interventional radiology practices. Thus, it is important to have a thorough understanding of these devices and their uses. The first long-term venous access devices were used in 1973. These were placed via a surgical cut-down on the subclavian vein. In 1982, the first subcutaneous implantable ports were described. These procedures were initially performed by surgeons, but over the last 5-10 years, both the insertion and management of these devices has shifted to interventional radiologists. Peripherally inserted central catheter (PICC) lines have almost completely supplanted the use of standard central lines (Fig. 1). A number of factors have facilitated this - namely, ready and less expensive room access, outpatient procedure and radiologists' accessibility and familiarity with image-guidance procedures and catheters and guide wires. (author)
Patil, Kishor P.; Skouby, Knud Erik; Prasad, Ramjee
The digital transition of TV transmission will make available some TV frequencies which are to be geographically unused called as TV White Spaces. The important regulatory trend in the context of Dynamic Spectrum Access (DSA) is the Cognitive access of TV white Spaces. In this context, we have pe...... of India, we have proposed wireless broadband access to rural areas using TV White Spaces (TVWSs). This will help in bridging the digital divide by offering governance, banking, and health services online in the rural areas.......The digital transition of TV transmission will make available some TV frequencies which are to be geographically unused called as TV White Spaces. The important regulatory trend in the context of Dynamic Spectrum Access (DSA) is the Cognitive access of TV white Spaces. In this context, we have...... performed spectrum measurements of TV band in Pune, India. Our result shows poor spectrum utilization in TV band, and good potential for Cognitive radio operation. Digital switchover in India will generate golden opportunity for empowering rural India. As majority of India’s population lives in rural part...
Full Text Available Open Access (OA) refers to electronic scholarly articles, books, monographs and other grey literature that is freely available. Various electronic platforms limit access to their content due to subscription costs, firewalls, and other access...
Ndumele, Chima D; Cohen, Michael S; Cleary, Paul D
Medicaid recipients have consistently reported less timely access to specialists than patients with other types of coverage. By 2018, state Medicaid agencies will be required by the Center for Medicare and Medicaid Services (CMS) to enact time and distance standards for managed care organizations to ensure an adequate supply of specialist physicians for enrollees; however, there have been no published studies of whether these policies have significant effects on access to specialty care. To compare ratings of access to specialists for adult Medicaid and commercial enrollees before and after the implementation of specialty access standards. We used Consumer Assessment of Healthcare Providers and Systems survey data to conduct a quasiexperimental difference-in-differences (DID) analysis of 20 163 nonelderly adult Medicaid managed care (MMC) enrollees and 54 465 commercially insured enrollees in 5 states adopting access standards, and 37 290 MMC enrollees in 5 matched states that previously adopted access standards. Reported access to specialty care in the previous 6 months. Seven thousand six hundred ninety-eight (69%) Medicaid enrollees and 28 423 (75%) commercial enrollees reported that it was always or usually easy to get an appointment with a specialist before the policy implementation (or at baseline) compared with 11 889 (67%) of Medicaid enrollees in states that had previously implemented access standards. Overall, there was no significant improvement in timely access to specialty services for MMC enrollees in the period following implementation of standard(s) (adjusted difference-in-differences, -1.2 percentage points; 95% CI, -2.7 to 0.1), nor was there any impact of access standards on insurance-based disparities in access (0.6 percentage points; 95% CI, -4.3 to 5.4). There was heterogeneity across states, with 1 state that implemented both time and distance standards demonstrating significant improvements in access and reductions in disparities
Kang, Won Yu; Campia, Umberto; Ota, Hideaki; Didier, Romain J; Negi, Smita I; Kiramijyan, Sarkis; Koifman, Edward; Baker, Nevin C; Magalhaes, Marco A; Lipinski, Michael J; Escarcega, Ricardo O; Torguson, Rebecca; Waksman, Ron; Bernardo, Nelson L
Currently, percutaneous endovascular intervention is considered a first line of therapy for treating patients with critical limb ischemia. As the result of remarkable development of techniques and technologies, percutaneous endovascular intervention has led to rates of limb salvage comparable to those achieved with bypass surgery, with fewer complications, even in the presence of lower rates of long-term patency. Currently, interventionalists have a multiplicity of access routes including smaller arteries, with both antegrade and retrograde approaches. Therefore, the choice of the optimal access site has become an integral part of the success of the percutaneous intervention. By understanding the technical aspects, as well as the advantages and limitations of each approach, the interventionalists can improve clinical outcomes in patients with severe peripheral arterial disease. This article reviews the access routes in critical limb ischemia, their advantages and disadvantages, and the clinical outcomes of each. Copyright © 2016 Elsevier Inc. All rights reserved.
With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. When the ad hoc network is the access network of the internet, the gateway discovery protocol is very important to choose the most appropriate gateway to guarantee the connectivity between ad hoc network and IP based fixed networks. The paper proposes a QoS gateway discovery protocol which uses the time delay and stable route to the gateway selection conditions. And according to the gateway discovery protocol, it also proposes a fast handover scheme which can decrease the handover time and improve the handover efficiency.
Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan
The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.
Nielsen, Jannie; Bahendeka, Silver K.; Bygbjerg, Ib C.
Non-communicable diseases including type 2 diabetes (T2D) are increasing rapidly in most Sub-Saharan African (SSA) countries like Uganda. Little attention has been given to how patients with T2D try to achieve treatment when the availability of public health care for their disease is limited......, as is the case in most SSA countries. In this paper we focus on the landscape of availability of care and the therapeutic journeys of patients within that landscape. Based on fieldwork in south-western Uganda including 10 case studies, we explore the diabetes treatment options in the area and what it takes...... to access the available treatment. We analyse the resources patients need to use the available treatment options, and demonstrate that the patients’ journeys to access and maintain treatment are facilitated by the knowledge and support of their therapy management groups. Patients access treatment more...
Rocklage, Matthew D; Fazio, Russell H
Despite the centrality of both attitude accessibility and attitude basis to the last 30 years of theoretical and empirical work concerning attitudes, little work has systematically investigated their relation. The research that does exist provides conflicting results and is not at all conclusive given the methodology that has been used. The current research uses recent advances in statistical modeling and attitude measurement to provide the most systematic examination of the relation between attitude accessibility and basis to date. Specifically, we use mixed-effects modeling which accounts for variation across individuals and attitude objects in conjunction with the Evaluative Lexicon (EL)-a linguistic approach that allows for the simultaneous measurement of an attitude's valence, extremity, and emotionality. We demonstrate across four studies, over 10,000 attitudes, and nearly 50 attitude objects that attitudes based on emotion tend to be more accessible in memory, particularly if the attitude is positive.
Joannah Caborn Wengler
In line with CERN’s principle of maximising the dissemination of knowledge to society, the Knowledge Transfer (KT) Group has launched a new collaborative initiative to share the products of CERN’s scientific and technological labours: Easy Access IP, where IP stands for intellectual property. CERN has a whole portfolio of dissemination channels designed and implemented by the KT Group, with Easy Access IP being the latest addition. “Inspired by the UK’s Easy Access Innovation initiative, our scheme involves making some of CERN's technologies available royalty-free and through a more agile licensing process,” explains Giovanni Anelli, head of the Group. “This approach seems to be an appropriate model for CERN, where the ultimate goal of technology transfer is not to generate income but to transfer knowledge to external partners.” The new scheme, as the name suggests, is designed to make it easier for industry and othe...
Full Text Available This study is intended to analyze the current levels of financial depth and financial access in Indonesia and to analyze the factors affecting them. The analysis method used was a combination of descriptive quantitative, benchmarking, and literature reviews. The conclusion is that the financial depth in Indonesia has not shown a satisfactory level since it was the lowest, or the second lowest ranked country among the sampled countries. Meanwhile, the financial access in Indonesia is relatively better than its financial depth, especially for financial markets, in which Indonesia ranks in the lower average group. From literature reviews, it can be inferred that the main factor driving the poor financial depth in Indonesia is non-competitiveness of the institutions; whereas the driving force of poor financial access in Indonesia are geographical constraints, poverty, a high income gap, and a less than effective national financial development policy.
Considering the number of access network technologies and the investment needed for the “last mile” of a solution, in today’s highly competitive markets, planning tools are crucial for the service providers to optimize the network costs and accelerate the planning process. In this paper, we propose to tackle the problem of planning access networks composed of four technologies/architectures: the digital subscriber line (xDSL) technologies deployed directly from the central office (CO), the fiber-to-the-node (FTTN), the fiber-to-the-micro-node (FTTn) and the fiber-to-the-premises (FTTP). A mathematical programming model is proposed for this planning problem that is solved using a commercial implementation of the branch-and-bound algorithm. Next, a detailed access network planning example is presented followed by a systematic set of experiments designed to assess the performance of the proposed approach.
Dr Jim Cheshire
Full Text Available This article discusses the thoughts of a humanities researcher in relation to open access (OA publishing. Digital media have dramatically improved access to historic texts but library e-books are frustrating due to software and loan arrangements. Authors of illustrated books risk losing control of book design, although new media offer opportunities to improve image quality and access. Alfred Tennyson's career shows that authors have been sensitive about the physical form of their work since the Victorian period and ignoring the material significance of the book could make us overlook the fundamental changes that the e-book represents. Monographs retain value as a way of evaluating substantive research projects and those published through the OA process will have great advantages over the commercial e-book. ‘Green’ OA publishing is impractical for humanities scholars and funded ‘gold’ OA publishing is likely to involve a labour-intensive application process.
Full Text Available This paper addresses methodology and tools applied to the monitoring of accessibility services in digital television at a time when the principles of accessibility and design are being considered in all new audiovisual media communication services. The main objective of this research is to measure the quality and quantity of existing accessibility services offered by digital terrestrial television (DTT. The preliminary results, presented here, offer the development of a prototype for automatic monitoring and a methodology for obtaining quality measurements, along with the conclusions drawn by initial studies carried out in Spain. The recent approval of the UN Convention on the Rights of Persons with Disabilities gives special relevance to this research because it provides valuable guidelines to help set the priorities to improve services currently available to users.
The data service on GSM subscriptions has been improved, allowing CERN users to access the Internet directly. A CERN GSM subscription with data option now allows you to connect to the Internet from a mobile phone or a PC equipped with a GSM modem. The previous access (CERN intranet) still exists. To get access to the new service, you will find all the information on configurations at: http://cern.ch/gprs The use of this service on the Sunrise network is charged on a flat-rate basis (no extra charge related to the volume of downloaded data). Depending on your CERN subscription type (standard or master), you can also connect to foreign GSM data networks (roaming), but this is strongly discouraged, except where absolutely necessary, due to international roaming charges. Telecom Section, IT/CS
Full Text Available The current emphasis on broad sharing of human genomic data generated in research in order to maximize utility and public benefit is a significant legacy of the Human Genome Project. Concerns about privacy and discrimination have led to policy responses that restrict access to genomic data as the means for protecting research participants. Our research and experience show, however, that a considerable number of research participants agree to open access sharing of their genomic data when given the choice. General policies that limit access to all genomic data fail to respect the autonomy of these participants and, at the same time, unnecessarily limit the utility of the data. We advocate instead a more balanced approach that allows for individual choice and encourages informed decision making, while protecting against the misuse of genomic data through enhanced legislation.
Transmission access if a term used to describe the concept of making a utility's transmission lines available to other utilities and non-utilities for buying and selling electricity. Interest in the issue has increased recently because of current industry conditions. Marketing excess capacity, exploiting cost differences between utilities, and the growth of non-utility capacity have made transmission important to many of the traditional and non-traditional industry participants. Although, transmission service has increased substantially faster than retail sales, there is some concern the present supply and access conditions are inadequate. Moreover, many believe there remains significant potential for broad economic benefits from power transfers which are precluded by current institutional constraints. Proposals for greater access are usually justified on the basis of competition. A main benefit of wheeling is that customers are no longer limited to a single supplier for their electric needs
Delivery of a prescribed dialysis dose, which is critical for longevity on hemodialysis, is directly dependent on vascular access (VA). However, VA is fraught with high failure rates and has room for innovation. Arteriovenous fistula (AVF), considered the 'best choice', has a high 'failure to mature' rate. Arteriovenous grafts (AVGs) are considered when patients are poor candidates for or have failed AVF, but have a high incidence of infections and thrombosis. Due to associated morbidity and mortality from complications, central venous catheters are considered only as 'bridging short-term access' when there is an urgent need for dialysis. The observation from current data that there is a significant center effect in the rate of AVF maturation supports investigation to identify factors that contribute to success in high-performing centers that create AVF and establish 'best practice' approaches to improve outcomes. Biocompatible AVG constructs that promote rapid tissue incorporation withstand needle punctures due to better integrity and can improve current AVG outcomes. Stenosis in the 'access circuit' is a major cause for short- and long-term permanent access failure. While the pathology of stenosis development is well understood, factors responsible for this problem are poorly studied. Increased flow in the access circuit likely plays a major role in the development of such stenosis. Investigation into understanding the hemodynamics of this flow may help identify etiology and stenosis sites perhaps even prior to the event, thus providing potential targets to mitigate the stenotic response. In summary, this chapter reflects on the shortcomings of current access modalities and discusses potential avenues to improve VA outcomes in the future. © 2017 S. Karger AG, Basel.
Full Text Available The biofortification of lentil (Lens culinaris Medikus. has the potential to provide adequate daily selenium (Se to human diets. The objectives of this study were to (1 determine how low-dose Se fertilizer application at germination affects seedling biomass, antioxidant activity, and Se uptake of 26 cultivated lentil genotypes; and (2 quantify the seed Se concentration of 191 lentil wild accessions grown in Terbol, Lebanon. A germination study was conducted with two Se treatments [0 (control and 30 kg of Se/ha] with three replicates. A separate field study was conducted in Lebanon for wild accessions without Se fertilizer. Among cultivated lentil accessions, PI533690 and PI533693 showed >100% biomass increase vs. controls. Se addition significantly increased seedling Se uptake, with the greatest uptake (6.2 µg g−1 by PI320937 and the least uptake (1.1 µg g−1 by W627780. Seed Se concentrations of wild accessions ranged from 0 to 2.5 µg g−1; accessions originating from Syria (0–2.5 µg g−1 and Turkey (0–2.4 µg g−1 had the highest seed Se. Frequency distribution analysis revealed that seed Se for 63% of accessions was between 0.25 and 0.75 µg g−1, and thus a single 50 g serving of lentil has the potential to provide adequate dietary Se (20–60% of daily recommended daily allowance. As such, Se application during plant growth for certain lentil genotypes grown in low Se soils may be a sustainable Se biofortification solution to increase seed Se concentration. Incorporating a diverse panel of lentil wild germplasm into Se biofortification programs will increase genetic diversity for effective genetic mapping for increased lentil seed Se nutrition and plant productivity.
Turner, S; Ross, M
Aim The aim of this study was to identify and survey dental hygienists and therapists working in direct access practices in the UK, obtain their views on its benefits and disadvantages, establish which treatments they provided, and what barriers they had encountered.Method The study used a purposive sample of GDC-registered hygienists and therapists working in practices offering direct access, identified through a 'Google' search. An online survey was set up through the University of Edinburgh, and non-responses followed up by post.Results The initial search identified 243 individuals working in direct access practices. Where a practice listed more than one hygienist/therapist, one was randomly selected. This gave a total of 179 potential respondents. Eighty-six responses were received, representing a response rate of 48%. A large majority of respondents (58, 73%) were favourable in their view of the GDC decision to allow direct access, and most thought advantages outnumbered disadvantages for patients, hygienists, therapists and dentists. There were no statistically significant differences in views between hygienists and therapists. Although direct access patients formed a small minority of their caseload for most respondents, it is estimated that on average respondents saw approximately 13 per month. Treatment was mainly restricted to periodontal work, irrespective of whether the respondent was singly or dually qualified. One third of respondents reported encountering barriers to successful practice, including issues relating to teamwork and dentists' unfavourable attitudes. However, almost two thirds (64%) felt that direct access had enhanced their job satisfaction, and 45% felt their clinical skills had increased.Discussion Comments were mainly positive, but sometimes raised worrying issues, for example in respect to training, lack of dental nurse support and the limited availability of periodontal treatment under NHS regulations.
Thavarajah, Dil; Abare, Alex; Mapa, Indika; Coyne, Clarice J; Thavarajah, Pushparajah; Kumar, Shiv
The biofortification of lentil ( Lens culinaris Medikus.) has the potential to provide adequate daily selenium (Se) to human diets. The objectives of this study were to (1) determine how low-dose Se fertilizer application at germination affects seedling biomass, antioxidant activity, and Se uptake of 26 cultivated lentil genotypes; and (2) quantify the seed Se concentration of 191 lentil wild accessions grown in Terbol, Lebanon. A germination study was conducted with two Se treatments [0 (control) and 30 kg of Se/ha] with three replicates. A separate field study was conducted in Lebanon for wild accessions without Se fertilizer. Among cultivated lentil accessions, PI533690 and PI533693 showed >100% biomass increase vs. Se addition significantly increased seedling Se uptake, with the greatest uptake (6.2 µg g -1 ) by PI320937 and the least uptake (1.1 µg g -1 ) by W627780. Seed Se concentrations of wild accessions ranged from 0 to 2.5 µg g -1 ; accessions originating from Syria (0-2.5 µg g -1 ) and Turkey (0-2.4 µg g -1 ) had the highest seed Se. Frequency distribution analysis revealed that seed Se for 63% of accessions was between 0.25 and 0.75 µg g -1 , and thus a single 50 g serving of lentil has the potential to provide adequate dietary Se (20-60% of daily recommended daily allowance). As such, Se application during plant growth for certain lentil genotypes grown in low Se soils may be a sustainable Se biofortification solution to increase seed Se concentration. Incorporating a diverse panel of lentil wild germplasm into Se biofortification programs will increase genetic diversity for effective genetic mapping for increased lentil seed Se nutrition and plant productivity.
Arrivillaga, Marcela; Aristizabal, Juan Carlos; Pérez, Mauricio; Estrada, Victoria Eugenia
The aim of this study was to design and validate a health services access survey for households in Colombia to provide a methodological tool that allows the country to accumulate evidence of real-life access conditions experienced by the Colombian population. A validation study with experts and a pilot study were performed. It was conducted in the municipality of Jamundi, located in the department of Valle del Cauca, Colombia. Probabilistic, multistage and stratified cluster sampling was carried out. The final sample was 215 households. The survey was composed of 63 questions divided into five modules: socio-demographic profile of the head of the household or adult informant, household socioeconomic profile, access to preventive services, access to curative and rehabilitative services and household out of pocket expenditure. In descriptive terms, the promotion of preventive services only reached 44%; the use of these services was always highest among children younger than one year old and up to the age of ten. The perceived need for emergency medical care and hospitalisation was between 82% and 85%, but 36% perceived the quality of care to be low or very low. Delays were experienced in medical visits with GPs and specialists. The designed survey is valid, relevant and representative of access to health services in Colombia. Empirically, the pilot showed institutional weaknesses in a municipality of the country, indicating that health coverage does not in practice mean real and effective access to health services. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.
To question the efficacy of 'gold' open access to published articles. Open access is unrestricted access to academic, theoretical and research literature that is scholarly and peer-reviewed. Two models of open access exist: 'gold' and 'green'. Gold open access provides everyone with access to articles during all stages of publication, with processing charges paid by the author(s). Green open access involves placing an already published article into a repository to provide unrestricted access, with processing charges incurred by the publisher. This is a discussion paper. An exploration of the relative benefits and drawbacks of the 'gold' and 'green' open access systems. Green open access is a more economic and efficient means of granting open access to scholarly literature but a large number of researchers select gold open access journals as their first choices for manuscript submissions. This paper questions the efficacy of gold open access models and presents an examination of green open access models to encourage nurse researchers to consider this approach. In the current academic environment, with increased pressures to publish and low funding success rates, it is difficult to understand why gold open access still exists. Green open access enhances the visibility of an academic's work, as increased downloads of articles tend to lead to increased citations. Green open access is the cheaper option, as well as the most beneficial choice, for universities that want to provide unrestricted access to all literature at minimal risk.
North, David J.; Baldock, Robert; Deakins, David; Whittam, Geoff
There is evidence that some SMEs may still face difficulties in accessing bank finance from lenders (CEEDR, 2007). This paper reports an in-depth study into demand and supply side issues relating to access to bank finance by Scottish SMEs and whether there is still market\\ud failure associated with good, bankable business cases from SMEs that do not receive finance. We argue that our study utilises innovative methodology and is relatively rare as a robust study in this area. We combine demand...
Do you have tons and tons of data on your computer but you're not quite sure how to make heads or tails of them-or even organize them? Are you using Access as spreadsheet rather than what it was really meant for? If you have trouble finding meaning in your data, then Access 2007 Forms & Reports for Dummies let you discover the wonders of this highly useful program. This no-nonsense guide gets right down to business by showing you the easy way to use this powerful tool. It gets you started with selective, targeted queries; forms that improve efficiency; and reports that communicate-while sparin
Bergenholtz, Henning; Gouws, Rufus
, including linguistic text books, books presenting the formal spelling and orthographic rules of Afrikaans as well as a monolingual dictionary. The paper argues that the applicability of the access process, as developed in lexicography, goes beyond dictionaries, illustrating the importance of a process...... are important elements when trying to satisfy certain information needs. This topic is discussed based on two case studies: one concerning certain fixed expressions in seven Danish printed and electronic dictionaries and one concerning looking at different access attempts in six Afrikaans reference sources...
Zhang, Jing; Liu, Yu-xi; Özdemir, Şahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco
A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels. PMID:23860488
Goseling, Jasper; Stefanovic, Cedomir; Popovski, Petar
Full Text Available Die Deutsche Forschungsgemeinschaft (DFG hat im Frühjahr 2017 eine Ausschreibung veröffentlicht, um „Open-Access-Transformationsverträge“ zu unterstützen. Anträge können bis Ende 2018 gestellt werden. Dieser Artikel erläutert den Inhalt der Ausschreibung, erklärt die Beweggründe für die Ausschreibung, diskutiert die Vor- und Nachteile dieses Instruments der Open-Access-Transformation und legt dar, inwiefern einzelne Bibliotheken in Deutschland die Transformation befördern können.
Kim, Gyeong Min; Lee, Myeong Jin
This book introduces database theory and SQL practice using Access. It is comprised of seven chapters, which give description of understanding database with basic conception and DMBS, understanding relational database with examples of it, building database table and inputting data using access 2000, structured Query Language with introduction, management and making complex query using SQL, command for advanced SQL with understanding conception of join and virtual table, design on database for online bookstore with six steps and building of application with function, structure, component, understanding of the principle, operation and checking programming source for application menu.
This study is intended to analyse the current levels of financial depth and financial access in Indonesia and to analyse the factors affecting them. The analysis method used was a combination of descriptive quantitative, benchmarking, and literature reviews. The conclusion is that the financial depth in Indonesia has not shown a satisfactory level since it was the lowest, or the second lowest ranked country among the sampled countries. Meanwhile, the financial access in Indonesia is relativel...
Bolderman, J. W.
This paper will describe four schemes which have been established to permit Australian researchers access to some of the most advanced overseas research facilities. These include, access to Major Research Facilities Program, the Australian National Beamline Facility at the Photon Factory, the Australian Synchrotron Research Program and the ISIS Agreement. The details of each of these programs is discussed and the statistics on the scientific output provided. All programs are managed on behalf of the Department of Industry, Science and Tourism by the Australian Nuclear Science and Technology Organisation. One hundred and thirteen senior scientists plus forty, one postgraduate, students were supported through these schemes during the 1996-1997 financial year
Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems
is between UMTS access network and Internet. The split proxy divides the bandwidth delay product into two parts, resulting in two TCP connections with smaller bandwidth delay products. Simulation results show, the split TCP proxy can significantly improve the TCP performance under high bit rate DCH channel......We aim at optimize the TCP performance over UMTS access network challenged by the large delay bandwidth product that is mainly caused by the latency from the link layer ARQ retransmissions and diversity technique at physical layer. We propose to place a split TCP proxy at GGSN nodes which...
Maunz, Peter Lukas Wilhelm [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
The High Optical Access (HOA) trap was designed in collaboration with the Modular Universal Scalable Ion-trap Quantum Computer (MUSIQC) team, funded along with Sandia National Laboratories through IARPA's Multi Qubit Coherent Operations (MQCO) program. The design of version 1 of the HOA trap was completed in September 2012 and initial devices were completed and packaged in February 2013. The second version of the High Optical Access Trap (HOA-2) was completed in September 2014 and is available at IARPA's disposal.
Weise, F O; Borgendale, M
Electronic Access to Reference Service (EARS) is a front end to the Health Sciences Library's electronic mail system, with links to the online public catalog. EARS, which became operational in September 1984, is accessed by users at remote sites with either a terminal or microcomputer. It is menu-driven, allowing users to request: a computerized literature search, reference information, a photocopy of a journal article, or a book. This paper traces the history of EARS and discusses its use, its impact on library staff and services, and factors that influence the diffusion of new technology.
Based on a modified WKB analysis of the interplanetary irregularity spectra, a discussion of the radial dependence of the radial cosmic ray diffusion coefficient at polar heliographic latitudes is presented. At l-AU radial distance the parameters are taken to equal those observed in the ecliptic. In the sense of a present best estimate it is argued that relativistic nuclei should have significantly easier access to 1 AU at the pole than in the ecliptic. The reverse may very well be true for the direct access of very low rigidity particles
This study is intended to analyse the current levels of financial depth and financial access in Indonesia and to analyse the factors affecting them. The analysis method used was a combination of descriptive quantitative, benchmarking, and literature reviews. The conclusion is that the financial depth in Indonesia has not shown a satisfactory level since it was the lowest, or the second lowest ranked country among the sampled countries. Meanwhile, the financial access in Indonesia is relativel...
Ana M. B. Pavani
Full Text Available This article addresses the access to information from a point of view that relates the evolution of technology to the methods of treating information and to the desire for knowledge. The first part introduces some important events in ancient times, the end of the middle ages/beginning of the modern age and the XIX century. Then, it presents an overview of the current situation of traditional libraries and compares some characteristics with the corresponding ones for digital libraries. It ends by mentioning the international efforts towards open archives and open access to information; it shows examples of positive results.
Dixon, Wheeler Winston
Film stocks are vanishing, but the iconic images of the silver screen remain -- albeit in new, sleeker formats. Today, viewers can instantly stream movies on televisions, computers, and smartphones. Gone are the days when films could only be seen in theaters or rented at video stores: movies are now accessible at the click of a button, and there are no reels, tapes, or discs to store. Any film or show worth keeping may be collected in the virtual cloud and accessed at will through services like Netflix, Hulu, and Amazon Instant.The movies have changed, and we are changing with them.
Omar, Hassan Aboubakr
This brief focuses on medium access control (MAC) in vehicular ad hoc networks (VANETs), and presents VeMAC, a novel MAC scheme based on distributed time division multiple access (TDMA) for VANETs. The performance of VeMAC is evaluated via mathematical analysis and computer simulations in comparison with other existing MAC protocols, including the IEEE 802.11p standard. This brief aims at proposing TDMA as a suitable MAC scheme for VANETs, which can support the quality-of-service requirements of high priority VANET applications.
Lee, Jongwook; Burnett, Gary; Vandegrift, Micah; Baeg, Jung Hoon; Morris, Richard
Introduction: This study explores the extent to which an institutional repository makes papers available and accessible on the open Web by using 170 journal articles housed in DigiNole Commons, the institutional repository at Florida State University. Method: To analyse the repository's impact on availability and accessibility, we conducted…
Knierman, Karen A.; Diaz Merced, Wanda; Aarnio, Alicia; Garcia, Beatriz; Monkiewicz, Jacqueline A.; Murphy, Nicholas Arnold
The AAS Working Group on Accessibility and Disability (WGAD) was formed in January of 2016 with the express purpose of seeking equity of opportunity and building inclusive practices for disabled astronomers at all educational and career stages. In this presentation, we will provide a summary of current activities, focusing on developing best practices for accessibility with respect to astronomical databases, publications, and meetings. Due to the reliance of space sciences on databases, it is important to have user centered design systems for data retrieval. The cognitive overload that may be experienced by users of current databases may be mitigated by use of multi-modal interfaces such as xSonify. Such interfaces would be in parallel or outside the original database and would not require additional software efforts from the original database. WGAD is partnering with the IAU Commission C1 WG Astronomy for Equity and Inclusion to develop such accessibility tools for databases and methods for user testing. To collect data on astronomical conference and meeting accessibility considerations, WGAD solicited feedback from January AAS attendees via a web form. These data, together with upcoming input from the community and analysis of accessibility documents of similar conferences, will be used to create a meeting accessibility document. Additionally, we will update the progress of journal access guidelines and our social media presence via Twitter. We recommend that astronomical journals form committees to evaluate the accessibility of their publications by performing user-centered usability studies.
Puskar Shyam Chowdhury
Conclusion: The MAG is a simple, portable, cheap, and novel assistant to achieve successful PCNL puncture. It would be of great help for novices to establish access during their learning phase of PCNL. It would also be an asset toward significantly decreasing the radiation dose during PCNL access.
The way in which a Local Area Network access mechanism (Medium Access Control protocol) designed for a specific type of physical service can be used on top of another type of physical service is discussed using a particular example. In the example, an Ethernet physical layer is used to provide
Costa, Marta Cocco da; Silva, Ethel Bastos da; Soares, Joannie Dos Santos Fachinelli; Borth, Luana Cristina; Honnef, Fernanda
To analyze the access and accessibility to the healthcare network of women dwelling in rural contexts undergoing violence situation, as seen from the professionals' speeches. A qualitative, exploratory, descriptive study with professionals from the healthcare network services about coping with violence in four municipalities in the northern region of Rio Grande do Sul. The information derived from interviews, which have been analyzed by thematic modality. (Lack of) information of women, distance, restricted access to transportation, dependence on the partner and (lack of) attention by professionals to welcome women undergoing violence situation and (non)-articulation of the network are factors that limit the access and, as a consequence, they result in the lack of confrontation of this problem. To bring closer the services which integrate the confrontation network of violence against women and to qualify professionals to welcome these situations are factors that can facilitate the access and adhesion of rural women to the services.
Hu Linxi; Yang Can; He Guangqiang
A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of the code. Recently, the chaotic phase shifters were proposed to guarantee the orthogonality by different chaotic signals and spread the spectral content of the quantum states. In this letter, we propose to implement the code division multiple access quantum network by using chaotic phase shifters and synchronization. Due to the orthogonality of the different chaotic phase shifter, every pair of users can faithfully transmit quantum information through a common channel and have little crosstalk between different users. Meanwhile, the broadband spectra of chaotic signals efficiently help the quantum states to defend against channel loss and noise. (paper)
Gibson, Shannon G; Axler, Renata E; Lemmens, Trudo
A key issue impacting public trust in biobanks is how these resources are utilized, including who is given access to biobank data and samples. To assess the conditions under which researchers are given access to Canadian biobanks, we reviewed websites and contacted Canadian biobanks to determine the availability of information on access policies and procedures; research resulting from access biobank data and samples; and conditions on private industry access to biobanks. We also conducted expert interviews with key Canadian stakeholders ( n = 11) to obtain their perspectives on biobank transparency and access policies. Among 21 Canadian biobanks, there was wide variation in the access information made publicly available, and the majority of these allowed access by industry applicants. Biobanks should be governed by the principles of transparency, accountability, and accessibility, and attention must be given to the conditions around the commercialization of biobank-based research.
In most rural and township English additional language classrooms, everyday language discursive practices of bi/multilingual students are underutilised. This study reports on how grade 4 emergent isiZulu-English bilingual children used their everyday language resources as a tool for epistemic access. Drawing on ...
Ham, M. van
Are career opportunities influenced by the place where you live? Does it help your career if you accept a job at a longer distance? What is the best place to live if you want to combine maximum career opportunities with a minimum of commuting and migration costs? Job access, workplace mobility,
McConnell, William Stewart
Farmers are small business leaders using available technology to remain competitive. The availability of technology is dependent on the suppliers' use of the marketing mix 4Ps theory--product, price, placement, and promotion. The purpose of this study was to determine how the relation between availability and accessibility influences the adoption…
Bialkova, S.E.; Oberauer, K.
Abstract. In two experiments participants held in working memory (WM) three digits in three different colors, and updated individual digits with the results of arithmetic equations presented in one of the colors. In the memory-access condition, a digit from WM had to be used as the first number in
Christiansen, Lars; Ray, Aaron D.; Smith, Joel B.
of international public funding sources dedicated to adaptation investments (Chapter 3) • Seven fundamental eligibility criteria for accessing international public funding and guidance on how to apply these concepts to project ideas (Chapter 3) • A template (built on the abovementioned seven fundamental...
Germann, Clark; Broida, Jane Kaufman; Broida, Jeffrey M.; Thompson, Kimberly
The Community Access Through Technology Project (CATT) is developing and implementing virtual reality software that persons with disabilities can use to experience a physical location prior to visiting it in person. A virtual scenario of one physical location has been developed, implemented, and tested, and work is underway on two others. Using a…
This Ph.D. thesis consists of a collection of four independent papers on economic analysis of access to justice. The research methodologies involve game theoretical and empirical analysis of litigation and settlement. Chapter two investigates the institutional causes of delay in litigation. Using
Nunes Leal Franqueira, V.
Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the
Nunes Leal Franqueira, V.; Wieringa, Roelf J.
Role-Based Access Control (RBAC) has been a success in terms of the amount of research that went into it, its uptake in international standards, and its adoption by major software vendors. Yet, RBAC remains complex to implement in user organizations. In this paper we review the state of the art of
Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.
The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described
This paper is a desk study that examines issues around and beyond digitization within the context of Nigeria. The paper focuses on access and preservation as some of the main objectives of digitization. It indentifies Institutional Repositories (IR) as panacea to achieving these aims. The enabling technologies and ...
Abbott, Philip; Bentzen, Jeanet; Tarp, Finn
is not the main factor driving economic adjustments, and market imperfections mean there is potential for greater output and trade expansion. The key questions to ask in future research are what critical new institutional reforms WTO accession will bring, and what incentives will be put in place to determine...
Kuenburg, Alexa; Fellinger, Paul; Fellinger, Johannes
Access to health care without barriers is a clearly defined right of people with disabilities as stated by the UN Convention on the Rights of People with Disabilities. The present study reviews literature from 2000 to 2015 on access to health care for deaf people and reveals significant challenges in communication with health providers and gaps in global health knowledge for deaf people including those with even higher risk of marginalization. Examples of approaches to improve access to health care, such as providing powerful and visually accessible communication through the use of sign language, the implementation of important communication technologies, and cultural awareness trainings for health professionals are discussed. Programs that raise health knowledge in Deaf communities and models of primary health care centers for deaf people are also presented. Published documents can empower deaf people to realize their right to enjoy the highest attainable standard of health. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please email: firstname.lastname@example.org.
Snelling, Brian M; Sur, Samir; Shah, Sumedh Subodh; Marlow, Megan M; Cohen, Mauricio G; Peterson, Eric C
Innovations in interventional cardiology historically predate those in neuro-intervention. As such, studying trends in interventional cardiology can be useful in exploring avenues to optimise neuro-interventional techniques. One such cardiology innovation has been the steady conversion of arterial puncture sites from transfemoral access (TFA) to transradial access (TRA), a paradigm shift supported by safety benefits for patients. While neuro-intervention has unique anatomical challenges, the access itself is identical. As such, examining the extensive cardiology literature on the radial approach has the potential to offer valuable lessons for the neuro-interventionalist audience who may be unfamiliar with this body of work. Therefore, we present here a report, particularly for neuro-interventionalists, regarding the best practices for TRA by reviewing the relevant cardiology literature. We focused our review on the data most relevant to our audience, namely that surrounding the access itself. By reviewing the cardiology literature on metrics such as safety profiles, cost and patient satisfaction differences between TFA and TRA, as well as examining the technical nuances of the procedure and post-procedural care, we hope to give physicians treating complex cerebrovascular disease a broader data-driven understanding of TRA. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Kurtcu, Wanda M.
The purpose of this paper is to investigate how a teacher can disrupt an established curriculum that continues the cycle of inequity of access to science, technology, engineering, and math (STEM) curriculum by students in alternative education. For this paper, I will focus on the technology components of the STEM curriculum. Technology in the…
The Forum's work led to advice to the Scottish Government concluding that ... respect of the facilitation and upholding of access rights. This is ...... particular protection of a person's rights in respect of private and family life and the home under ... jurisprudence emphasising the necessity of a balancing-of-interests approach.
In two light-controlled experiments conducted at the Teaching and Research Farm of the Department of Crop Science, Faculty of Agriculture, University of Nigeria, Nsukka, the effects of six photoperiods (8, 10, 12, 14, 16 hours and natural photoperiod) on growth and flower induction in six accessions of bambara groundnut ...
Mountford-Zimdars, Anna, Ed.; Sabbagh, Daniel, Ed.; Post, David, Ed.
What does "fairness" mean internationally in terms of access to higher education? Increased competition for places in elite universities has prompted a worldwide discussion regarding the fairness of student admission policies. Despite budget cuts from governments--and increasing costs for students--competition is fierce at the most…
Suanpang, Pannee; Petocz, Peter; Reid, Anna
This paper reports on a study carried out in Thailand investigating the relationship between students' use of an e-learning system and their learning outcomes in a course on Business Statistics. The results show a clear relationship between accesses to the e-learning system, as measured by number of "hits", and outcomes, as measured by…
Wagner, Christoph; Eiselt, Michael; Grobe, Klaus
WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...
The CERN Library Information desk.At a meeting on the Wednesday before Easter, the Executive Committee endorsed a policy of open access to all the laboratory's results, as expressed in the document ‘Continuing CERN action on Open Access' (http://cds.cern.ch/record/828991/files/open-2005-006.pdf), released by its Scientific Information Policy Board (SIPB) earlier in the month. "This underlines CERN's commitment to sharing the excitement of fundamental research with as wide an audience as possible", said Guido Altarelli, current SIPB chairman. Open Access to scientific knowledge is today the goal of an increasing component of the worldwide scientific community. It is a concept, made possible by new electronic tools, which would bring enormous benefits to all readers by giving them free access to research results. CERN has implicitly supported such moves from its very beginning. Its Convention (http://cds.cern.ch/record/330625/files/cm-p00046871.pdf), adopted in 1953, requires openness, stipulating that "......
... regarding current and future health care. Removing barriers to a veteran's access to VA records will support... patient autonomy and shared decision making. Removing this regulation will directly benefit veterans by... property, Infants and children, Inventions and patents, Parking, Penalties, Privacy, Reporting and...
Rajsic, Jason; Swan, Garrett; Wilson, Daryl E.; Pratt, Jay
In this article, we demonstrate limitations of accessibility of information in visual working memory (VWM). Recently, cued-recall has been used to estimate the fidelity of information in VWM, where the feature of a cued object is reproduced from memory (Bays, Catalao, & Husain, 2009; Wilken & Ma, 2004; Zhang & Luck, 2008). Response…
Alphin, Henry C., Jr., Ed.; Lavine, Jennie, Ed.; Chan, Roy Y., Ed.
Education is the foundation to almost all successful lives. It is vital that learning opportunities are available on a global scale, regardless of individual disabilities or differences, and to create more inclusive educational practices. "Disability and Equity in Higher Education Accessibility" is a comprehensive reference source for…
Solutions to empower women, reduce violence Researchers will identify and analyze interventions in Colombia, Guatemala, Mexico, and Peru. They will assess the impact of efforts on: -preventing violence against women -reducing victimization -improving women's access to justice The results will guide governments, civil ...
Personnel in the rehabilitation field have come to recognize the possibilities and implications of computers as assistive technology for disabled persons. This manual provides information on how to adapt the Unicorn Board, Touch Talker/Light Talker overlays, the Adaptive Firmware Card setup disk, and Trace-Transparent Access Module (T-TAM) to…
Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar
One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.
van Kersen, J.; van den Broek, Egon; Kok, Thijs
Most search engines utilize keywords to retrieve information (e.g., Google). However, when one accesses a specific domain such as art and is a layperson in this field, how to retrieve information? Without the knowledge of artist's name, the period he lived in, the art movement he was affiliated
Geurs, Karst Teunis; Dentinho, T.; Patuelli, R.; Geurs, K.T.; Patuelli, R.; Dentinho, T.
The tension between efficiency and equity has been the focus of major debate since equity aspects started to be considered as part of project evaluation procedures (Thomopoulos et al. 2009). In this book, we contribute to the debate by focusing on the links and trade-offs between accessibility,
Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…
This article provides a brief report on the proceedings of the 9th Annual Integrity Action Summer School's policy lab on Government Records Management and Citizen Access to Information, held in July 2013 at the Central European University, Hungary and attended by international experts in records management and ...
Yin, Shuangxu; Kawachi, Paul
This paper explores and presents new data on how to improve open access in distance education through using prior learning assessments. Broadly there are three types of prior learning assessment (PLAR): Type-1 for prospective students to be allowed to register for a course; Type-2 for current students to avoid duplicating work-load to gain…
This full-text print version of RDA offers a snapshot that serves as an offline access point to help solo and part-time cataloguers evaluate RDA, as well as to support training and classroom use in any size institution. An index is included.
Bille, Philip; Landau, Gad M.; Raman, Rajeev
(n) is the inverse of the kth row of Ackermann's function. Our representations also efficiently support decompression of any substring in S: we can decompress any substring of length m in the same complexity as a single random access query and ad- ditional O(m) time. Combining these results with fast algorithms...
Adolescent sexual and reproductive health access continues to dominate the development agenda since the historic 1994 Cairo Conference and becomes a huge public health concern for the increasing diverse of undocumented adolescents who have become an important component as irregular migration patterns and ...
Describes e-global library, a virtual library based on the Jones International University's library that organizes Internet resources to make them more accessible to students at all skill levels. Highlights include online tutorials; research guides; financial aid and career development information; and possible partnerships with other digital…
Sutton Trust, 2015
This report reviews national and international research on widening participation and access programmes to find out which methods are most likely to help disadvantaged pupils get into higher education. Analysis of existing research in the United States and United Kingdom suggests that summer schools, tutoring, and mentoring are among five methods…
Apr 28, 1990 ... accessibility and business performance of the community banks over a six-year period. The ... relationship with the banks' business performance. ..... Marketing Management ... Effects of the Information on the Business Performance of Banks. ..... 'Information sources used for strategic planning decisions.
This paper presents a review of the current situation and projections for energy access in Africa. The paper also presents several sets of ambitious energy access targets as agreed by the regional groupings within the region. The paper argues that achieving between 50% and 100% access to modern energy services by 2030 in Africa will require more effective mobilization and use of both domestic and external funding, and the development and implementation of innovative policy frameworks. The paper suggests that greater emphasis will need to be placed on productive uses of energy and energy for income generation in order to break the vicious circle of low incomes leading to poor access to modern energy services, which in turn puts severe limitations on the ability to generate higher incomes. The paper further suggests that if anything near the ambitious targets set by African organisations are to be achieved then it will be advisable to tap into the full menu of energy resource and technology options, and there will be the need for significant increases in the numbers of various actors involved together with more effective institutions in the energy sector.
Welle Donker, F.M.
In the digital age geo-information has become embedded in our daily lives, such as navigation systems, community platforms, real estate information and weather forecasts. Everybody uses geo-information for their day-to-day decision making. Therefore, access to geo-information is of vital importance
van Laer, Coen
This study investigates to what extent Open Access is useful for international criminal lawyers. Free reuse and distribution may be particularly advantageous for the audience in less resourceful countries. And individual authors need visibility to promote their academic reputation. However, many
Dijkstra, A.F.J.; Kroll, J.F.; Groot, A.M.B. de
In spite of the intuition of many bilinguals, a review of empirical studies indicates that during reading under many circumstances, possible words from different languages temporarily become active. Such evidence for "language non-selective lexical access" is found using stimulus materials of
Madsen, Magnus; Andreasen, Esben
Amaya Fernández, Ferney Orlando; Soto, Ana Cardenas; Tafur Monroy, Idelfonso
Several issues in the design and optimization of the next generation optical access network (NG-OAN) are presented. The noise, the distortion and the fiber optic nonlinearities are considered to optimize the video distribution link in a passive optical network (PON). A discussion of the effect...
This third quarterly report for the period January to March 1977 describes the production schedule, records, and estimated costs and times in creating the Subject Access Project data base. Plans for on-line use of the data base and search strategy design are outlined. A table of specifications for preparing the data base for on-line searching is…
A multi-user network that supports both classical and quantum communication is proposed. By relying on optical code-division multiple access techniques, this system offers simultaneous key exchange between multiple pairs of network users. A lower bound on the secure key generation rate will be derived for decoy-state quantum key distribution protocols.
Falch, Morten; Henten, Anders
The paper examines investment dimensions of next generation networks in a universal service perspective in a European context. The question is how new network infrastructures for getting access to communication, information and entertainment services in the present and future information society...
Heinrichs, John H.; Sharkey, Thomas W.; Lim, Jeen-Su
This study investigates the satisfaction of library users at Wayne State University who utilize alternative information access methods. The LibQUAL+[TM] desired and perceived that satisfaction ratings are used to determine the user's "superiority gap." By focusing limited library resources to address "superiority gap" issues identified by each…
Full Text Available received a wide acceptance in next generation and intelligent wireless communication systems. In this paper the authors make use of game theory approach to model and analyze cognitive radio networks in order to allow dynamic spectrum access in broadband...
Genilloud, Guy; Gay, David
This paper presents a mechanism allowing an ODP compliant distributed system, ANSA, to access OSI network management objects as if they were ANSA objects. It defines a mapping from the OSI object model to the ANSA object model, and it specifies how an adapter implements this mapping.
... 34 Education 1 2010-07-01 2010-07-01 false Equal access. 108.6 Section 108.6 Education Regulations of the Offices of the Department of Education OFFICE FOR CIVIL RIGHTS, DEPARTMENT OF EDUCATION EQUAL... limited to, school-related means of communication, such as bulletin board notices and literature...
van der Wende, Marijk
This article addresses the growing demand for access to higher education and the conditions under which this is leading to a worldwide market. The supply of transnational (or cross-border) education and the export of educational services play an increasingly important role in fulfilling this demand.
Cochrane, Pauline A.
A listing is presented of 17 documents in the ERIC database concerning the Online Catalog (sometimes referred to as OPAC or Online Public Access Catalog), a computer-based and supported library catalog designed for patron use. The database usually represents recent acquisitions and often contains information about books on order and items in…
Thornton, Lee R.; Greene, James C.
Considers the possible impact of recent federal legislation on educational utilization of cable television. Stresses the importance of educators understanding the law's provisions and acting to initiate relationships with cable companies. Reviews public educational or governmental access provisions. Presents strategies for promoting reciprocity…
market women have a low socio-economic status due to financial and ... market women have little or no access to micro credit schemes largely .... industry contributes to its poor performance in servicing the needs of the poor especially .... single; 11.1% are either divorced or separated; 33.3% are widows whereas a larger.
Montizaan, R.M.; de Grip, A.; Fouarge, D.
This paper investigates whether employers can induce employees to postpone retirement by offering access to training courses that maintain job proficiency. We use unique, matched employer-employee surveys for the Dutch public sector, which include detailed information on a wide range of HR practices
Journal Home > Vol 14, No 1 (2017) > ... The ability to undertake effective legal research is one of the skills required of a lawyer but ... The use of Information and communication technology by Nigerian lawyers deals with ... for Researchers · for Journals · for Authors · for Policy Makers · about Open Access · Journal Quality.
From 1 August till 31 October, CERN users are invited to enjoy a trial access to all Cambridge University Press electronic books: http://ebooks.cambridge.org/. Please don't hesitate to send feedback to email@example.com.
..., Classroom Training and On-the-Job-Training, when each part is viewed in its entirety, is readily accessible... method of complying with § 32.27(a) at a particular Job Corps Center, other than by making a significant alteration in its existing facilities or in its training, assign that individual to another Job Corps Center...
Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina
The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.
PC Forms Inc. 834-4048
To apply for information under the Access to. Information Act, complete this form or a written request mentioning the Act. Describe the information being sought and provide any relevant details necessary to help the International. Development Research Centre (IDRC) find it. If you require assistance, refer to Info Source.
This paper presents the study on Wavelet transform based Multicarrier Code Division Multiple Access (MC-CDMA) system for a downlink wireless channel. The performance of the system is studied for Additive White Gaussian Noise Channel (AWGN) and slowly varying multipath channels. The bit error rate (BER) versus ...
Jonathan A. ENOKELA
Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.
This article examines a proposal from PSI Energy, Inc. (formerly Public Service Company of Indiana) to allow open access to its power transmission facilities and the response of the Federal Energy Regulatory Commission's response to that proposal. The topics discussed include transmission tariffs, competition, market share, expansion of transmission capacity and its funding, and reciprocal agreements to provide similar service
This thesis investigates four cross-cutting controversies in access to medicines – aspects of pharmaceutical R&D, equity, generics policy and scale up. Chapter 2 describes the state of pharmaceutical research and development (R&D). It finds that failure rates remain high with the probability of
David L Carey Miller
Full Text Available This article attempts to understand the radical reform of Scottish land law in its provision for a general right of public access to private land introduced in 2003 as part of land reform legislation, an important aspect of the initial agenda of the Scottish Parliament revived in 1999. The right is to recreational access for a limited period and the right to cross land. Access can be taken only on foot or by horse or bicycle. As a starting point clarification of the misunderstood pre-reform position is attempted. The essential point is that Scots common law does not give civil damages for a simple act of trespass (as English law does but only a right to obtain removal of the trespasser. Under the reforms the longstanding Scottish position of landowners allowing walkers access to the hills and mountains becomes a legal right. A critical aspect of the new right is that it is one of responsible access; provided a landowner co-operates with the spirit and system of the Act access can be denied on the basis that it is not being exercised responsibly. But the onus is on the landowner to show that the exercise of the right is not responsible.Although the right applies to all land a general exception protects the privacy of a domestic dwelling. Early case law suggests that the scope of this limit depends upon particular circumstances although reasonable 'garden ground' is likely to be protected. There are various particular limits such as school land.Compliance with the protection of property under the European Convention on Human Rights is discussed. The article emphasises the latitude, open to nations, for limitations to the right of ownership in land in the public interest. The extent of the Scottish access inroad illustrates this. This leads to the conclusion that 'land governance' – the subject of the Potchefstroom Conference at which the paper was initially presented – largely remains a matter for domestic law; the lex situs concept is alive
A. F. Bukharov
Full Text Available The squash is one of the most ancient plants, bearing numerous qualities. The squash gave high yield and is unpretentious plant, the fruit of which is long-stored and can be used as boiled, stewed, baked, fried product, and be added to bread, mush and pudding, and be prepared as puree, jam, candied fruit and other meals. Owing to useful characteristics the squash is a valuable source or raw material for food canning industry, for health-care and functional foodstuff production. Its best cultivar accessions contain to 30% of dry matter, to 12% of sugars and to 36% of carotene. The species of squash includes 4 subspecies and 20 varieties. One accession that came from Spain in 1937 served as an initial breeding accession for many other table cultivars for long time. For 80 years of national breeding program the many cultivars for table use have been released. There are the classic cultivars, such as ‘Mramornaya’, ‘Stolovaya Zimnaya’, Gribovskaya Zimnaya’, ‘Donskaya Sladkaya’, ‘Michurinskaya’ that are selected or developed from first Spanish accession. This richness and originality of cultivar squash accessions should be carefully preserved. There are the new generation cultivars, such as ‘Kroshka’, ‘Malishka’, ‘Rossiyanka’, ‘Konfetka’, ‘Moskvichka’, ‘Vnuchka’ and many others, which are short-tendrils and suitable for modern mechanized cultivation technology. Moreover the development of new cultivars, bearing resistance to biotic and abiotic stress is the main goal of nearest breeding program.
Jadlovský, J; Jadlovská, A; Sarnovský, J; Jajčišin, Š; Čopík, M; Jadlovská, S; Papcun, P; Bielek, R; Čerkala, J; Kopčík, M; Chochula, P; Augustinus, A
ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead – users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data – an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.