WorldWideScience

Sample records for access

  1. Open Access

    Science.gov (United States)

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  2. Accessible Knowledge - Knowledge on Accessibility

    DEFF Research Database (Denmark)

    Kirkeby, Inge Mette

    2015-01-01

    Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...

  3. Open access

    CERN Document Server

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder consent, and many authors, musicians, filmmakers, and other creators who depend on royalties are understandably unwilling to give their consent. But for 350 years, scholars have written peer-reviewed journal articles for impact, not for money, and are free to consent to open access without losing revenue. In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. Distilling a decade of Suber's influential writing and thinking about open access, this is the indispe...

  4. Access French

    CERN Document Server

    Grosz, Bernard

    2014-01-01

    Access is the major new language series designed with the needs of today's generation of students firmly in mind. Whether learning for leisure or business purposes or working towards a curriculum qualification, Access French is specially designed for adults of all ages and gives students a thorough grounding in all the skills required to understand, speak, read and write contemporary French from scratch. The coursebook consists of 10 units covering different topic areas, each of which includes Language Focus panels explaining the structures covered and a comprehensive glossary. Learning tips

  5. Hemodialysis access - self care

    Science.gov (United States)

    Kidney failure - chronic-hemodialysis access; Renal failure - chronic-hemodialysis access; Chronic renal insufficiency - hemodialysis access; Chronic kidney failure - hemodialysis access; Chronic renal failure - ...

  6. Hemodialysis access procedures

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/007641.htm Hemodialysis access procedures To use the sharing features on ... An access is needed for you to get hemodialysis. The access is where you receive hemodialysis . Using ...

  7. Fishing Access Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — The Vermont Fish & Wildlife Department maintains developed fishing access areas. These sites provide public access to waters in Vermont for shore fishing...

  8. JISC Open Access Briefing Paper

    OpenAIRE

    Swan, Alma

    2005-01-01

    What Open Access is. What Open Access is not. How is Open Access provided? Open Access archives or repositories. Open Access journals. Why should authors provide Open Access to their work? Further information and resources

  9. Accessibility and sensory experiences

    DEFF Research Database (Denmark)

    Ryhl, Camilla

    2010-01-01

    This article introduces a new design concept; sensory accessibility. While acknowledging the importance of sensory experiences in architectural quality, as well as the importance of accommodating user needs the concept combines three equally important factors; architecture, the senses and accessi......This article introduces a new design concept; sensory accessibility. While acknowledging the importance of sensory experiences in architectural quality, as well as the importance of accommodating user needs the concept combines three equally important factors; architecture, the senses...... and accessibility. Sensory accessibility accommodates aspects of a sensory disability and describes architectural design requirements needed to ensure access to architectural experiences. In the context of architecture accessibility has become a design concept of its own. It is generally described as ensuring...... physical access to the built environment by accommodating physical disabilities. While the existing concept of accessibility ensures the physical access of everyone to a given space, sensory accessibility ensures the choice of everyone to stay and be able to participate and experience....

  10. CERN Access Cards and Access Authorisations

    CERN Multimedia

    2003-01-01

    From the 01/05/2003, all problems relating to access cards and refusal of access to any zone, building or experiment within CERN must be addressed to the Centrale de Surveillance des Accès (CSA building 120) on 78877 or send an e-mail to Access.Surveillance@cern.ch. The responsibles for CERN access control have put into place a procedure with the CSA, Service Enregistrement and the Technical Control Room, to make sure that all problems get resolved in a proper and timely manner.

  11. World Wide Access: Accessible Web Design.

    Science.gov (United States)

    Washington Univ., Seattle.

    This brief paper considers the application of "universal design" principles to Web page design in order to increase accessibility for people with disabilities. Suggestions are based on the World Wide Web Consortium's accessibility initiative, which has proposed guidelines for all Web authors and federal government standards. Seven guidelines for…

  12. Access Nets: Modeling Access to Physical Spaces

    Science.gov (United States)

    Frohardt, Robert; Chang, Bor-Yuh Evan; Sankaranarayanan, Sriram

    Electronic, software-managed mechanisms using, for example, radio-frequency identification (RFID) cards, enable great flexibility in specifying access control policies to physical spaces. For example, access rights may vary based on time of day or could differ in normal versus emergency situations. With such fine-grained control, understanding and reasoning about what a policy permits becomes surprisingly difficult requiring knowledge of permission levels, spatial layout, and time. In this paper, we present a formal modeling framework, called AccessNets, suitable for describing a combination of access permissions, physical spaces, and temporal constraints. Furthermore, we provide evidence that model checking techniques are effective in reasoning about physical access control policies. We describe our results from a tool that uses reachability analysis to validate security policies.

  13. Professional Access 2013 programming

    CERN Document Server

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  14. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  15. Design for Accessibility

    DEFF Research Database (Denmark)

    Herriott, Richard

    2012-01-01

    A report on how nine rail builder, operators and transport designers deal with design for accessibility......A report on how nine rail builder, operators and transport designers deal with design for accessibility...

  16. Pro Access 2010 Development

    CERN Document Server

    Collins, Mark

    2011-01-01

    Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for Applications (VBA) tools for Access applications, integrate Access with SharePoint and other business systems, and much more. Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, co

  17. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  18. Access 2013 for dummies

    CERN Document Server

    Ulrich Fuller, Laurie

    2013-01-01

    The easy guide to Microsoft Access returns with updates on the latest version! Microsoft Access allows you to store, organize, view, analyze, and share data; the new Access 2013 release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. Access 2013 For Dummies covers all the new features of the latest version of Accessand serves as an ideal reference, combining the latest Access features with the basics of building usable databases. You'll learn how to create an app from the Welcome screen, get support

  19. Urban Railway Accessibility

    Institute of Scientific and Technical Information of China (English)

    GUAN Hongzhi; YIN Yuanfei; YAN Hai; HAN Yan; QIN Huanmei

    2007-01-01

    Effective use of urban rapid railway systems requires that the railway systems be effectively connected with other transportation modes so that they are accessible. This paper uses the logit model and data to analyze the factors influencing railway access choices in a railway choice access model. The results indicate that access time, access cost, and access distance are factors significantly affecting railway access choices. The user's income significantly affects the probability of choosing to walk rather than to take a taxi,but is not related to choosing buses or bicycles. Vehicle ownership significantly affects the probability of choosing a taxi, but is not significantly related to the other modes. The conclusions provide an analysis tool for urban railway planning and construction.

  20. Open Access @ DTU

    DEFF Research Database (Denmark)

    Ekstrøm, Jeannette

    Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all peer review...... articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access and related topics...... such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc....

  1. Port Access Cardiac Surgery.

    Science.gov (United States)

    Viganó, Mario; Minzioni, Gaetano; Spreafico, Patrizio; Rinaldi, Mauro; Pasquino, Stefano; Ceriana, Piero; Locatelli, Alessandro

    2000-10-01

    The port-access technique for cardiac surgery was recently developed at Stanford University in California as a less invasive method to perform some cardiac operations. The port-access system has been described in detail elsewhere. It is based on femoral arterial and venous access for cardiopulmonary bypass (CPB) and on the adoption of a specially designed triple-lumen catheter described originally by Peters, and subsequently modified and developed in the definitive configuration called the endoaortic clamp.

  2. Access Data Analysis Cookbook

    CERN Document Server

    Bluttman, Ken

    2008-01-01

    This book offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Whether you use Access 2007 or an earlier version, this book will teach you new methods to query data, different ways to move data in and out of Access, how to calculate answers to financial and investment issues, how to jump beyond SQL by manipulating data with VBA, and more.

  3. Accessible e-learning

    OpenAIRE

    Bühler, Christian; Scheer, Birgit

    2005-01-01

    People with disabilities often encounter difficulties while trying to learn something, because teaching material is for example not accessible to blind people or rooms, where courses take place, are not accessible to people using a wheelchair. E-learning provides an opportunity to disabled people. With the new German law on the equalisation of opportunities for people with disabilities for the first time access to information technology was explicitly taken up in German legislation. As a cons...

  4. Access 2013 bible

    CERN Document Server

    Alexander, Michael

    2013-01-01

    A comprehensive reference to the updated and new features of Access 2013 As the world's most popular database management tool, Access enables you to organize, present, analyze, and share data as well as build powerful database solutions. However, databases can be complex. That's why you need the expert guidance in this comprehensive reference. Access 2013 Bible helps you gain a solid understanding of database purpose, construction, and application so that whether you're new to Access or looking to upgrade to the 2013 version, this well-rounded resource provides you with a th

  5. Channel Access in Erlang

    Energy Technology Data Exchange (ETDEWEB)

    Nicklaus, Dennis J. [Fermilab

    2013-10-13

    We have developed an Erlang language implementation of the Channel Access protocol. Included are low-level functions for encoding and decoding Channel Access protocol network packets as well as higher level functions for monitoring or setting EPICS process variables. This provides access to EPICS process variables for the Fermilab Acnet control system via our Erlang-based front-end architecture without having to interface to C/C++ programs and libraries. Erlang is a functional programming language originally developed for real-time telecommunications applications. Its network programming features and list management functions make it particularly well-suited for the task of managing multiple Channel Access circuits and PV monitors.

  6. OGIS Access System

    Data.gov (United States)

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  7. Web Accessibility and Guidelines

    Science.gov (United States)

    Harper, Simon; Yesilada, Yeliz

    Access to, and movement around, complex online environments, of which the World Wide Web (Web) is the most popular example, has long been considered an important and major issue in the Web design and usability field. The commonly used slang phrase ‘surfing the Web’ implies rapid and free access, pointing to its importance among designers and users alike. It has also been long established that this potentially complex and difficult access is further complicated, and becomes neither rapid nor free, if the user is disabled. There are millions of people who have disabilities that affect their use of the Web. Web accessibility aims to help these people to perceive, understand, navigate, and interact with, as well as contribute to, the Web, and thereby the society in general. This accessibility is, in part, facilitated by the Web Content Accessibility Guidelines (WCAG) currently moving from version one to two. These guidelines are intended to encourage designers to make sure their sites conform to specifications, and in that conformance enable the assistive technologies of disabled users to better interact with the page content. In this way, it was hoped that accessibility could be supported. While this is in part true, guidelines do not solve all problems and the new WCAG version two guidelines are surrounded by controversy and intrigue. This chapter aims to establish the published literature related to Web accessibility and Web accessibility guidelines, and discuss limitations of the current guidelines and future directions.

  8. Towards Accessible Search Systems

    NARCIS (Netherlands)

    Serdyukov, Pavel; Hiemstra, Djoerd; Ruthven, Ian

    2010-01-01

    The SIGIR workshop Towards Accessible Search Systems was the first workshop in the field to raise the discussion on how to make search engines accessible for different types of users. We report on the results of the workshop that was held on 23 July 2010 in conjunction with the 33rd Annual ACM SIGIR

  9. ACCESS Pointing Control System

    Science.gov (United States)

    Brugarolas, Paul; Alexander, James; Trauger, John; Moody, Dwight; Egerman, Robert; Vallone, Phillip; Elias, Jason; Hejal, Reem; Camelo, Vanessa; Bronowicki, Allen; O'Connor, David; Partrick, Richard; Orzechowski, Pawel; Spitter, Connie; Lillie, Chuck

    2010-01-01

    ACCESS (Actively-Corrected Coronograph for Exoplanet System Studies) was one of four medium-class exoplanet concepts selected for the NASA Astrophysics Strategic Mission Concept Study (ASMCS) program in 2008/2009. The ACCESS study evaluated four major coronograph concepts under a common space observatory. This paper describes the high precision pointing control system (PCS) baselined for this observatory.

  10. MedlinePlus: Accessibility

    Science.gov (United States)

    ... Tools Español You Are Here: Home → MedlinePlus Accessibility URL of this page: https://medlineplus.gov/accessibility.html ... or (301) 594-5983 and provide the address (URL) of the page on which you need assistance, ...

  11. Intellectual Access to Images.

    Science.gov (United States)

    Chen, Hsin-Liang; Rasmussen, Edie M.

    1999-01-01

    The increased availability of digital images is accompanied by a need for solutions to the problems inherent in indexing them for retrieval. Problems in image description and access are discussed, with a perspective on traditional and new solutions. Recent developments in intellectual access to images are surveyed and contrasted with…

  12. ATLAS Data Access Policy

    CERN Document Server

    The ATLAS collaboration

    2015-01-01

    ATLAS has fully supported the principle of open access in its publication policy. This document outlines the policy of ATLAS as regards open access to data at different levels as described in the DPHEP model. The main objective is to make the data available in a usable way to people external to the ATLAS collaboration.

  13. Open Access policy effectiveness

    OpenAIRE

    Swan, Alma

    2015-01-01

    This presentation discusses the policy elements that are necessary for an effective open access policy, according to the findings of the analysis of the revamped ROARMAP tool for open access policies by PASTEUR4OA. It contains graphs, charts and numbers for evidence-based arguments

  14. Market Access and Welfare

    DEFF Research Database (Denmark)

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    2015-01-01

    Well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. The present paper proposes a new set of tariff reforms that can achieve both...

  15. Public Access Defibrillation

    DEFF Research Database (Denmark)

    Agerskov, Marianne; Nielsen, Anne Møller; Hansen, Carolina Malta

    2015-01-01

    of OHCA-cases where an accessible AED was located within 100 m. In addition, we assessed 30-day survival. METHODS: Using data from the Mobile Emergency Care Unit and the Danish Cardiac Arrest Registry, we identified 521 patients with OHCA between October 1, 2011 and September 31, 2013 in Copenhagen......, Denmark. RESULTS: An AED was applied in 20 cases (3.8%, 95% CI [2.4 to 5.9]). Irrespective of AED accessibility, an AED was located within 100 m of a cardiac arrest in 23.4% (n=102, 95% CI [19.5 to 27.7]) of all OHCAs. However, at the time of OHCA, an AED was located within 100 m and accessible in only 15...... to ambulance arrival, but 15.1% of all OHCAs occurred within 100 m of an accessible AED. This indicates the potential of utilising AED networks by improving strategies for AED accessibility and referring bystanders of OHCA to existing AEDs....

  16. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    , in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded......The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered...... as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access...

  17. Access 2010 for dummies

    CERN Document Server

    Ulrich Fuller, Laurie

    2010-01-01

    A friendly, step-by-step guide to the Microsoft Office database application Access may be the least understood and most challenging application in the Microsoft Office suite. This guide is designed to help anyone who lacks experience in creating and managing a database learn to use Access 2010 quickly and easily. In the classic For Dummies tradition, the book provides an education in Access, the interface, and the architecture of a database. It explains the process of building a database, linking information, sharing data, generating reports, and much more.As the Micr

  18. Market Access and Welfare

    DEFF Research Database (Denmark)

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    According to the literature, well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. Such conflict between welfare and market access...... objectives of trade policy is problematic and calls for finding alternative tariff reform rules that can achieve both objectives at the same time. The present paper contributes to this aim by using a new set of tariff reforms that are based on local optimality. Using such reforms it is shown that market...

  19. UK Open Access Policy Landscape

    OpenAIRE

    Picarra, Mafalda

    2014-01-01

    Two distinct paths for open access are being promoted in UK open access policies: open access publishing (gold open access) by RCUK (Gold OA) and self-archiving (green open access) by HEFCE. This requires continuous and coordinated efforts to support universities, academic libraries and researchers in achieving compliance.

  20. United States Access Board

    Science.gov (United States)

    ... an ABA Complaint Upcoming Events November 16 US Business and Leadership Network (USBLN) Webinar November 29 Section 508 Best Practices Webinar: Getting Social - Best Practices for Social Media Accessibility December 01 ...

  1. Access cavity preparation.

    Science.gov (United States)

    Adams, N; Tomson, P L

    2014-03-01

    Each stage of root canal treatment should be carried out to the highest possible standard. The access cavity is arguably the most important technical stage, as subsequent preparation of the root canal(s) can be severely comprised if this is not well executed. Inadequate access can lead to canals being left untreated, poorly disinfected, difficult to shape and obturate, and may ultimately lead to the failure of the treatment. This paper highlights common features in root canal anatomy and outlines basic principles for locating root canals and producing a good access cavity. It also explores each phase of the preparation in detail and offers suggestions of instruments that have been specifically designed to overcome potential difficulties in the process. Good access design and preparation will result in an operative environment which will facilitate cleaning, shaping and obturation of the root canal system in order to maximise success.

  2. Accessibility and assistive products

    Science.gov (United States)

    Rodríguez-Porrero, Cristina

    2009-01-01

    Introduction Accessibility and assistive products and technologies are needed to ensure the rights of persons with disabilities and older persons. Many developments have been implemented in laws, standards, markets and from the consumers perspective, at international, European and national levels. The real issue is that not all the potential users benefit from the use of assistive products or accessible measures. Discussion Innovative methods are needed to allow all potential users to have real advantage of assistive technologies and accessible and design for all facilities. Best practices will be presented and existing gaps and recommendations will be discussed. Cost-benefits aspects will also be presented. Conclusion In order to get advantages from opportunities of globalization, hard work and responsibilities of all stakeholders are needed, so that assistive products and accessibility reach a whole range of situations and environments and contribute to ensure quality of life in a society for all.

  3. Complication with intraosseous access

    DEFF Research Database (Denmark)

    Hallas, Peter; Brabrand, Mikkel; Folkestad, Lars

    2013-01-01

    INTRODUCTION: Intraosseous access (IO) is indicated if vascular access cannot be quickly established during resuscitation. Complication rates are estimated to be low, based on small patient series, model or cadaver studies, and case reports. However, user experience with IO use in real...... physicians, anesthesiologists and pediatricians. RESULTS: 1,802 clinical cases of IO use was reported by n=386 responders. Commonly reported complications with establishing IO access were patient discomfort/pain (7.1%), difficulties with penetration of periosteum with IO needle (10.3%), difficulties...... with aspiration of bone marrow (12.3%), and bended/broken needle (4.0%). When using an established IO access the reported complications were difficulties with injection fluid and drugs after IO insertion (7.4%), slow infusion (despite use of pressure bag) (8.8%), displacement after insertion (8...

  4. Access/AML -

    Data.gov (United States)

    Department of Transportation — The AccessAML is a web-based internet single application designed to reduce the vulnerability associated with several accounts assinged to a single users. This is a...

  5. Vascular Access Procedures

    Science.gov (United States)

    ... the needle directly into the vein during the venous puncture (or access) process. This helps improve the likelihood of a successful venous puncture and also helps the interventional radiologist avoid surrounding ...

  6. Topographic Accessability Index

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — The topographic accessibility index is a measure of elevation in relation to valley floor corrected for variation in valley floor elevation across the western United...

  7. CERN access cards

    CERN Multimedia

    HR Department

    2007-01-01

    Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.

  8. The universal access handbook

    CERN Document Server

    Stephanidis, Constantine

    2009-01-01

    In recent years, the field of Universal Access has made significant progress in consolidating theoretical approaches, scientific methods and technologies, as well as in exploring new application domains. Increasingly, professionals in this rapidly maturing area require a comprehensive and multidisciplinary resource that addresses current principles, methods, and tools. Written by leading international authorities from academic, research, and industrial organizations and nonmarket institutions, The Universal Access Handbook covers the unfolding scientific, methodological, technological, and pol

  9. IVOA Simple Image Access

    CERN Document Server

    Dowler, Patrick; Bonnarel, François

    2016-01-01

    The Simple Image Access protocol (SIA) provides capabilities for the discovery, description, access, and retrieval of multi-dimensional image datasets, including 2-D images as well as datacubes of three or more dimensions. SIA data discovery is based on the ObsCore Data Model (ObsCoreDM), which primarily describes data products by the physical axes (spatial, spectral, time, and polarization). Image datasets with dimension greater than 2 are often referred to as datacubes, cube or image cube datasets and may be considered examples of hypercube or n-cube data. In this document the term "image" refers to general multi-dimensional datasets and is synonymous with these other terms unless the image dimensionality is otherwise specified. SIA provides capabilities for image discovery and access. Data discovery and metadata access (using ObsCoreDM) are defined here. The capabilities for drilling down to data files (and related resources) and services for remote access are defined elsewhere, but SIA also allows for dir...

  10. Access, ethics and piracy

    Directory of Open Access Journals (Sweden)

    Stuart Lawson

    2017-03-01

    Full Text Available Ownership of intellectual property rights for a large proportion of the scholarly record is held by publishers, so a majority of journal articles are behind paywalls and unavailable to most people. As a result some readers are encouraged to use pirate websites such as Sci-Hub to access them, a practice that is alternately regarded as criminal and unethical or as a justified act of civil disobedience. This article considers both the efficacy and ethics of piracy, placing ‘guerrilla open access’ within a longer history of piracy and access to knowledge. By doing so, it is shown that piracy is an inevitable part of the intellectual landscape that can render the current intellectual property regime irrelevant. If we wish to actively construct a true scholarly commons, open access emerges as a contender for moving beyond proprietary forms of commodifying scholarly knowledge towards the creation of an open scholarly communication system that is fit for purpose.

  11. Support open access publishing

    DEFF Research Database (Denmark)

    Ekstrøm, Jeannette

    2013-01-01

    Projektet Support Open Access Publishing har til mål at få opdateret Sherpa/Romeo databasen (www.sherpa.ac.uk/romeo) med fagligt relevante, danske tidsskrifter. Projektet skal endvidere undersøge mulighederne for at få udviklet en database, hvor forskere på tværs af relevante tidsskriftsinformati......Projektet Support Open Access Publishing har til mål at få opdateret Sherpa/Romeo databasen (www.sherpa.ac.uk/romeo) med fagligt relevante, danske tidsskrifter. Projektet skal endvidere undersøge mulighederne for at få udviklet en database, hvor forskere på tværs af relevante...... tidsskriftsinformationer (faglig disciplin, BFI niveau, Impact Factor, Open Access) vil kunne danne sig et hurtigt overblik, for derved at kunne træffe et kvalificeret valg om, hvor og hvordan man skal publicere sine forskningsresultater....

  12. Disruption - Access cards service

    CERN Multimedia

    2014-01-01

    We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.

  13. Sprawl and Accessibility

    Directory of Open Access Journals (Sweden)

    Robert Bruegmann

    2008-07-01

    Full Text Available This essay argues that many of the assumptions that have been made about sprawl are misleading or just wrong. Nowhere has this been more the case than in debates about transportation and access. Because of this, it is not surprising that a good many of the policies advocated by proponents of Smart Growth would almost certainly lead to reduced mobility and impaired accessibility for a large part of the population. At very least, the debates over sprawl have pitted private vs. public transportation in a way that has contributed to serious underfunding of transportation infrastructure of all kinds.

  14. Empower: access to medicine - working towards early access.

    Science.gov (United States)

    Pearson, Jennifer Bryant; Turgoose, James; Hargrave, James

    2015-01-01

    Empower: Access to Medicine's contribution will document the founding of Empower: Access to Medicine and tactics used to create a lobbying campaign designed to facilitate the debate around barriers to medical innovation and patient access to medicines. The article will detail the evolution of the campaign's goals and the potential solutions to an expensive and slow system. Specifically the submission will look at the influence that Empower: Access to Medicine had on the Government's thinking and development of an early access scheme.

  15. Analysis of Open Access Landscape

    Institute of Scientific and Technical Information of China (English)

    Helen Doyle; Andy Gass; Debra Lappin; Rebecca Kennison

    2005-01-01

    This paper is created by bounding 5 editorials of Public Library of Science (PLoS ) which have written on various aspects of open access. It covers wide range topics of important open access issues, such as from paying for open access to copyright to open access as a public issue, which may be more or less of interest of our audience.

  16. Digital Scholarship and Open Access

    Science.gov (United States)

    Losoff, Barbara; Pence, Harry E.

    2010-01-01

    Open access publications provide scholars with unrestricted access to the "conversation" that is the basis for the advancement of knowledge. The large number of open access journals, archives, and depositories already in existence demonstrates the technical and economic viability of providing unrestricted access to the literature that is the…

  17. Access to effective healthcare

    DEFF Research Database (Denmark)

    Høy, Bente

    2015-01-01

    Access to effective healthcare is in particular challenging for vulnerable and socially disadvantaged patients. Patients with chronic conditions are over-represented in these lower socioeconomic (LSES) groups. No generic review integrating the evidence on Self-Management support interventions in ...

  18. Serving up Access

    Science.gov (United States)

    Rich, Sarah

    2011-01-01

    When low-income students returned to Chicago public schools this fall, many had better access to technology, thanks to a public-private partnership. Chicago families with children enrolled in the National School Lunch Program are eligible for subsidized computers and Internet connections through an agreement between the city and telecom giant…

  19. Efficient Distributed Medium Access

    CERN Document Server

    Shah, Devavrat; Tetali, Prasad

    2011-01-01

    Consider a wireless network of n nodes represented by a graph G=(V, E) where an edge (i,j) models the fact that transmissions of i and j interfere with each other, i.e. simultaneous transmissions of i and j become unsuccessful. Hence it is required that at each time instance a set of non-interfering nodes (corresponding to an independent set in G) access the wireless medium. To utilize wireless resources efficiently, it is required to arbitrate the access of medium among interfering nodes properly. Moreover, to be of practical use, such a mechanism is required to be totally distributed as well as simple. As the main result of this paper, we provide such a medium access algorithm. It is randomized, totally distributed and simple: each node attempts to access medium at each time with probability that is a function of its local information. We establish efficiency of the algorithm by showing that the corresponding network Markov chain is positive recurrent as long as the demand imposed on the network can be supp...

  20. Multiple Access Communications

    DEFF Research Database (Denmark)

    This book constitutes the proceedings of the 9th International Workshop on Multiple Access Communications, MACOM 2016, held in Aalborg, Denmark, in November 2016. The 10 full papers presented in this volume were carefully reviewed and selected from 12 submissions. They were organized in topical...

  1. Accessibility Standards, Illustrated.

    Science.gov (United States)

    Jones, Michael A.

    The book sets forth Illinois environmental accessibility standards for disabled persons based on observation and interview data. Photographs, drawings, and detailed floor plans are included in sections dealing with human data (including space requirements for maneuvering wheelchairs, color blindness, incontinence, and severe auditory or visual…

  2. Unique Access to Learning

    Science.gov (United States)

    Goble, Don

    2009-01-01

    This article describes the many learning opportunities that broadcast technology students at Ladue Horton Watkins High School in St. Louis, Missouri, experience because of their unique access to technology and methods of learning. Through scaffolding, stepladder techniques, and trial by fire, students learn to produce multiple television programs,…

  3. Kinds of Access

    DEFF Research Database (Denmark)

    Overgaard, Morten; Sandberg, Kristian

    2014-01-01

    that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesise that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about...

  4. Kinds of access

    DEFF Research Database (Denmark)

    Overgaard, Morten; Sandberg, Kristian

    2012-01-01

    that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesize that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about...

  5. Access and Fishing Activities

    DEFF Research Database (Denmark)

    Høst, Jeppe Engset

    2015-01-01

    In this chapter, I look at the implications of transferable quotas on the organization of production; that is, how fishing activities are structured around access to the individual and transferable quotas and how, in turn, the quotas structure the production. Therefore, this chapter will give...

  6. ACCESS Project: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Weller, Heiko [Robert Bosch, LLC, Farmington Hills, MI (United States)

    2015-04-01

    The ACCESS project addressed the development, testing, and demonstration of the proposed advanced technologies and the associated emission and fuel economy improvement at an engine dynamometer and on a full-scale vehicle. Improve fuel economy by 25% with minimum performance penalties Achieve SULEV level emissions with gasoline Demonstrate multi-mode combustion engine management system

  7. Managing access block.

    Science.gov (United States)

    Cameron, Peter; Scown, Paul; Campbell, Donald

    2002-01-01

    There is pessimism regarding the ability of the Acute Health Sector to manage access block for emergency and elective patients. Melbourne Health suffered an acute bed crisis in 2001 resulting in record ambulance diversions and emergency department (ED) delays. We conducted an observational study to reduce access block for emergency patients whilst maintaining elective throughput at Melbourne Health. This involved a clinician-led taskforce using previously proven principles for organisational change to implement 51 actions to improve patient access over a three-month period. The primary outcome measures were ambulance diversion, emergency patients waiting more than 12 hours for an inpatient bed, elective throughput and theatre cancellations. Despite a reduction in multi-day bed numbers all primary objectives were met, ambulance diversion decreased to minimal levels, 12-hour waits decreased by 40% and elective throughput was maintained. Theatre cancellations were also minimised. We conclude that access block can be improved by clinician-led implementation of proven process improvements over a short time frame. The ability to sustain change over the longer term requires further study.

  8. APS and Open Access

    Science.gov (United States)

    2011-03-01

    The movement toward Open Access continues to gain momentum. A brief review of APS efforts in this area will be presented by APS Editor in Chief, Gene Sprouse. Editors from Physical Review A, B, E, Focus, Letters, and X, Reviews of Modern Physics, and Physics will address your questions about publishing in this evolving environment.

  9. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  10. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    . Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set......When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...... of credentials needed to reach a certain location in a system. This knowledge allows to identify a set of (inside) actors who have the possibility to commit an insider attack at that location. This has immediate applications in analysing log files, but also nontechnical applications such as identifying possible...

  11. Internet access to ionosondes

    Science.gov (United States)

    Galkin, I. A.; Kitrosser, D. F.; Kecic, Z.; Reinisch, B. W.

    1999-01-01

    Connecting ionosondes to the Internet gives easy access to real-time information on ionospheric conditions. Some of the ionosonde sites provide just the ionogram displays, others give in addition the scaled ionospheric characteristics directly usable for frequency management and HF channel assessment. Some sounders also store days or months of station data, which makes it possible remotely to evaluate the time history of geophysical events. The Internet link is also a convenient means for remote system maintenance and control. The paper addresses various aspects of the Internet ionosonde scenario, including data base support, WWW publishing, user interface, security, and data format. A list of Internet accessible ionosonde stations is provided with a brief description.

  12. Accessing offshoring advantages

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona; Motika, Agnes; Wæhrens, Brian Vejrum

    2015-01-01

    Purpose – The purpose of this paper is to advance the understanding of factors that affect offshoring performance results. To do so, this paper focuses on the access to location-specific advantages, rather than solely on the properties of the offshoring company, its strategy or environment....... Assuming that different levels of synergy may exist between particular offshoring strategic decisions (choosing offshore outsourcing or captive offshoring and the type of function) and different offshoring advantages, this work advocates that the actual fact of realization of certain offshoring advantages...... (getting or not getting access to them) is a more reliable predictor of offshoring success. Design/methodology/approach – Aset of hypotheses derived from the extant literature is tested on the data from a quantitative survey of 1,143 Scandinavian firms. Findings – The paper demonstrates that different...

  13. Access to Research Inputs

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    The viability of modern open science norms and practices depend on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50% more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry....

  14. Access to Research Inputs

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    2015-01-01

    The viability of modern open science norms and practices depends on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50 % more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry...

  15. IMPROVING ACCESS TO DRUGS

    Directory of Open Access Journals (Sweden)

    Max Joseph Herman

    2012-11-01

    Full Text Available Although essentially not all therapies need drug intervention, drugs is still an important components in health sector, either in preventive, curative, rehabilitative or promotion efforts. Hence the access to drugs is a main problem, either in international or national scale even to the smallest unit. The problem on access to drugs is very complicated and cannot be separated especially from pharmacy management problems; moreover in general from the overall lack of policy development and effective of health policy, and also the implementation process. With the policy development and effective health policy, rational drug uses, sufficient health service budget so a country can overcome the health problems. Besides infrastructures, regulations, distribution and cultural influences; the main obstacles for drug access is drugs affordability if the price of drugs is an important part and determined by many factors, especially the drug status whether is still patent orgenerics that significantly decrease cost of health cares and enhance the drugs affordability. The determination of essential drug prices in developing countries should based on equity principal so that poor people pay cheaper and could afford the essential drugs. WHO predicts two third of world population can not afford the essential drugs in which in developing countries, some are because of in efficient budget allocation in consequence of drug distribution management, including incorrect selection and allocation and also irrational uses. In part these could be overcome by enhancing performances on the allocation pharmacy needs, including the management of information system, inventory management, stock management and the distribution. Key words: access, drugs, essential drugs, generic drugs

  16. [Complex vascular access].

    Science.gov (United States)

    Mangiarotti, G; Cesano, G; Thea, A; Hamido, D; Pacitti, A; Segoloni, G P

    1998-03-01

    Availability of a proper vascular access is a basic condition for a proper extracorporeal replacement in end-stage chronic renal failure. However, biological factors, management and other problems, may variously condition their middle-long term survival. Therefore, personal experience of over 25 years has been critically reviewed in order to obtain useful information. In particular "hard" situations necessitating complex procedures have been examined but, if possible, preserving the peripherical vascular features.

  17. Open access / accesso aperto

    Directory of Open Access Journals (Sweden)

    Maria Chiara Pievatolo

    2012-06-01

    Full Text Available Sto collaborando, per la voce Open access, a un e-book a più mani dal titolo Le parole dell’innovazione. Ricorro all’archivio Marini per mettere a disposizione di tutti una versione estesa del mio lemma. Non dice nulla di nuovo rispetto al già noto; può però essere utile a chi sia completamente disinformato sul tema.

  18. ADOPT Open Access

    CERN Multimedia

    2007-01-01

    Are you writing a theoretical paper? An experimental one? Or one about instrumentation? You can publish it in Open Access. Now. Read how... You might have heard about Open Access, the next big thing in scientific publishing. The idea is to make the results of your (publicly funded) research free to read for everyone out there ... not only those lucky ones who work in places where libraries can afford to purchase the expensive subscriptions to scientific journals. CERN, DESY and other particle physics institutes have accepted an offer by one of the leading journals in High Energy Physics, JHEP: our libraries will pay a special subscription fee, and, in exchange, all articles with at least one author from our institutes will be published in Open Access. Anyone, anywhere and anytime will be able to read them, without any financial barrier! If you are writing an instrumentation paper, you can submit it to JINST and benefit from the same offer. This is a major step forward in the planned conversion of existi...

  19. ITAINNOVA AIDA-2020 Transnational Access

    CERN Multimedia

    ITAINNOVA, Zaragoza, Spain

    2017-01-01

    The AIDA-2020 Transnational Access program offers access to 10 European facilities, including the Electromagnetic Compatibility Laboratory (EMClab) at Instituto Tecnológico de Aragón (ITAINNOVA) in Spain.

  20. UCLouvain AIDA-2020 Transnational Access

    CERN Multimedia

    Universite catholique de Louvain, Belgium

    2016-01-01

    The AIDA-2020 Transnational Access program offers access to 10 European facilities, including the Centre de Recherche du Cyclotron (CRC) at the Universite catholique de Louvain (UCLouvain) in Belgium.

  1. EPICS: Channel Access security design

    Energy Technology Data Exchange (ETDEWEB)

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer`s interface is given. Security protocol is described and finally aids for reading the access security code are provided.

  2. Online Information Source & Access Method

    OpenAIRE

    2009-01-01

    Online resources play important role in research and development of the country. So, LIS professional are interested in accessing and guiding users and readers to all available information sources. This article highlighted and described the availability of online information sources, open access e-journals and its access method.

  3. Some self-access principles

    Directory of Open Access Journals (Sweden)

    Lucy Cooker

    2010-06-01

    Full Text Available In this article, I will describe how the Self-Access Learning Centre (SALC at Kanda University of International Studies (KUIS was established, and discuss some of the personal philosophies of self-access centres (SACs and self-access learning that I have developed over the eight years of being associated with this centre.

  4. Accessing vs Sourcing Knowledge

    DEFF Research Database (Denmark)

    Awate, Snehal; Larsen, Marcus M.; Mudambi, Ram

    2015-01-01

    Research and development (R&D) internationalization is on the rise for advanced economy multinationals (AMNEs) as well as emerging economy multinationals (EMNEs). We study EMNE R&D internationalization by comparing it to that by AMNEs in the context of an emerging, knowledge-intensive industry. We...... to get on par with industry leaders. An in-depth comparison of knowledge flows reveals that within AMNEs, headquarters often serves the primary source of knowledge for R&D subsidiaries. In contrast, within EMNEs, headquarters accesses knowledge from R&D subsidiaries in advanced economies for innovation...

  5. Why Open Access?

    OpenAIRE

    2015-01-01

    As mentioned in the previous editorial (López-López, 2015), Suber’s (2015) book is a significant contribution that we can use to clarify the limits and the scope of Open Access (OA), and it is also helpful in explaining confusions and inaccuracies that are widespread in our communities, which are not quite ready to face the accelerated changes that are being generated by the new dynamics of scientific output and communication (Gallegos, Berra, Benito, & López-López, 2014). Suber (2015) st...

  6. Accessibility and inclusion informational

    Directory of Open Access Journals (Sweden)

    Mônica Sena de Souza

    2013-06-01

    Full Text Available Introduction: Discusses the role of information professionals in meeting the informational demands of people with disabilities in the information society. The librarian is crucial for the effectiveness and success in the informational inclusion of people with disabilities, considering also continuing education for their professional qualification.Objective: To provide reflections on the role of the librarian in serving users with disabilities, highlighting the need for improvement in information units, identified in the scientific literature with regard to accessibility.Methodology: Literature search, based on a review of literature in books and scientific papers, highlighting the main authors: Adams (2000, Mazzoni (2001 and Sassaki (1997, 2002, 2005.Results: The lack of informational access for people with disabilities hampers their social and political participation, hence, reduces its condition of citizenship.Conclusion: The librarian responsible for seeking continuing education, greater involvement in the events of the area and the constant search for job training, which will reflect on the best service the information needs of users with disabilities.

  7. Metropolitan Access Network

    Directory of Open Access Journals (Sweden)

    Slavko Šarić

    2003-11-01

    Full Text Available The optical fibre is the highest quality transmission mediumfor broadband services, and therefore the new access cablenetwork has to be realized to the greatest extent and as closeas possible to the subscriber by means of the optical fibre cables,in accordance with the possibilities of the telecommunicationoperator. The development of digital technology in commutations,supported by the increasingly powerful systems of processorcontrol, development of optical communications andtransport technologies in the framework of SDH concepts, arereflected on the access telecommunication networks of the urbanareas. Urban areas are the most profitable regions in telecommunications.In planning of urban optical networks the fact should betaken as a guideline that only a well-organised urban networkwill allow high quality of service provision of the leased cablesto the end points of business customers.Business customers have greater requirements for the networkreliability, flexibility and maintainability, for the sake ofundisturbed telecommunication traffic.The optical medium based technology- FITL (fiber in theloop, provides almost limitless upgrading of the system regardingthe transmission bandwidths, as well as adaptation to allthe future customers' requirements.Considering the increase in the price of installing the coppercables, the prices of electronics and optical components arecontinuously falling. The application of the optical medium isincreasing and becoming more cost-effective, and due to higherreliability of the optical transmission systems the maintenancecosts are reduced.

  8. Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor

    OpenAIRE

    Desmedt, Yvo; Shaghaghi, Arash

    2016-01-01

    Security researchers have stated that the core concept behind current implementations of access control predates the Internet. These assertions are made to pinpoint that there is a foundational gap in this field, and one should consider revisiting the concepts from the ground up. Moreover, Insider threats, which are an increasing threat vector against organizations are also associated with the failure of access control. Access control models derived from access control matrix encompass three ...

  9. Random Access Transport Capacity

    CERN Document Server

    Andrews, Jeffrey G; Kountouris, Marios; Haenggi, Martin

    2009-01-01

    We develop a new metric for quantifying end-to-end throughput in multihop wireless networks, which we term random access transport capacity, since the interference model presumes uncoordinated transmissions. The metric quantifies the average maximum rate of successful end-to-end transmissions, multiplied by the communication distance, and normalized by the network area. We show that a simple upper bound on this quantity is computable in closed-form in terms of key network parameters when the number of retransmissions is not restricted and the hops are assumed to be equally spaced on a line between the source and destination. We also derive the optimum number of hops and optimal per hop success probability and show that our result follows the well-known square root scaling law while providing exact expressions for the preconstants as well. Numerical results demonstrate that the upper bound is accurate for the purpose of determining the optimal hop count and success (or outage) probability.

  10. Access For All

    DEFF Research Database (Denmark)

    Andersen, Ove Kjeld; Hjulmand, Christian

    2005-01-01

    . There is a clear need for a free internet based Danish text-to-speech synthesizer. Furthermore, the current state of technology i.e. internet bandwidth, response time and server technology is sufficient for setting up an online automatic reading service that is used by steadily growing number of individuals......Approximately 30% of the Danish population has severe problems in reading everyday text. In the light of the increasing amount of text available on the Internet this poses a democratic challenge to ensure “equal access” to information. The Talking Internet service - Access For All (AFA) - offers...... a free Internet-based tool for reading aloud any marked text with a synthetic voice. The only requirements are a standard equipped PC running a recent Windows OS and an Internet connection. Experiences gathered from running the service for more than 28 months underline the viability of the concept...

  11. AccessCulture

    DEFF Research Database (Denmark)

    Valtysson, Bjarki

    in cultural production and consumption. The first part of this works looks at how these changes respond to the field of cultural policy, as well as suggesting a possible culturepolitical reaction in a model which I refer to as access culture. In terms of theoretical approach, the notion of digital cultural...... on the system, the lifeworld, and the inter-mediating public sphere, and in order to adapt his theory better to the network society, I make much use of Manuel Castells' theories on the global network of new media and the culture of realvirtuality. Finally, the third main theoretician which I make use of, is Lev...... and the Audiovisual Media Services Directive from 2007. In order to exemplify the functions of digital cultural public spheres adequately, I therefore take a thorough look at EU's interventions within the cultural, media and communication sectors. Finally, I also analyse projects and programmes that the European...

  12. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  13. Chemists, Access, Statistics

    Science.gov (United States)

    Holmes, Jon L.

    2000-06-01

    New JCE Internet Feature at JCE Online Biographical Snapshots of Famous Chemists is a new JCE Internet feature on JCE Online. Edited by Barbara Burke, this feature provides biographical information on leading chemists, especially women and minority chemists, fostering the attitude that the practitioners of chemistry are as human as those who endeavor to learn about it. Currently, the column features biographical "snapshots" of 30 chemists. Each snapshot includes keywords and bibliography and several contain links to additional online information about the chemist. More biographical snapshots will appear in future installments. In addition, a database listing over 140 women and minority chemists is being compiled and will be made available online with the snapshots in the near future. The database includes the years of birth and death, gender and ethnicity, major and minor discipline, keywords to facilitate searching, and references to additional biographical information. We welcome your input into what we think is a very worthwhile resource. If you would like to provide additional biographical snapshots, see additional chemists added to the database, or know of additional references for those that are already in the database, please contact JCE Online or the feature editor. Your feedback is welcome and appreciated. You can find Biographical Snapshots of Famous Chemists starting from the JCE Online home page-- click the Features item under JCE Internet and then the Chemist Bios item. Access JCE Online without Name and Password We have recently been swamped by libraries requesting IP-number access to JCE Online. With the great benefit IP-number authentication gives to librarians (no user names and passwords to administer) and to their patrons (no need to remember and enter valid names and passwords) this is not surprising. If you would like access to JCE Online without the need to remember and enter a user name and password, you should tell your librarian about our

  14. Public Access and Open Access: Is There a Difference? | Poster

    Science.gov (United States)

    By Robin Meckley, Contributing Writer, and Tracie Frederick, Guest Writer Open access and public access—are they different concepts or are they the same? What do they mean for the researchers at NCI at Frederick? “Open-access (OA) literature is digital, online, free of charge, and free of most copyright and licensing restrictions. What makes it possible is the Internet and the consent of the author or copyright-holder,” according to an open access website maintained by Peter Suber, director, Harvard Open Access Project.

  15. Controlling Access to RDF Graphs

    Science.gov (United States)

    Flouris, Giorgos; Fundulaki, Irini; Michou, Maria; Antoniou, Grigoris

    One of the current barriers towards realizing the huge potential of Future Internet is the protection of sensitive information, i.e., the ability to selectively expose (or hide) information to (from) users depending on their access privileges. Given that RDF has established itself as the de facto standard for data representation over the Web, our work focuses on controlling access to RDF data. We present a high-level access control specification language that allows fine-grained specification of access control permissions (at triple level) and formally define its semantics. We adopt an annotation-based enforcement model, where a user can explicitly associate data items with annotations specifying whether the item is accessible or not. In addition, we discuss the implementation of our framework, propose a set of dimensions that should be considered when defining a benchmark to evaluate the different access control enforcement models and present the results of our experiments conducted on different Semantic Web platforms.

  16. Atomic memory access hardware implementations

    Science.gov (United States)

    Ahn, Jung Ho; Erez, Mattan; Dally, William J

    2015-02-17

    Atomic memory access requests are handled using a variety of systems and methods. According to one example method, a data-processing circuit having an address-request generator that issues requests to a common memory implements a method of processing the requests using a memory-access intervention circuit coupled between the generator and the common memory. The method identifies a current atomic-memory access request from a plurality of memory access requests. A data set is stored that corresponds to the current atomic-memory access request in a data storage circuit within the intervention circuit. It is determined whether the current atomic-memory access request corresponds to at least one previously-stored atomic-memory access request. In response to determining correspondence, the current request is implemented by retrieving data from the common memory. The data is modified in response to the current request and at least one other access request in the memory-access intervention circuit.

  17. Radio access selection in multi-radio access systems

    NARCIS (Netherlands)

    Jorgušeski, L.; Litjens, R.; Zhiyi, C.; Nikookar, H.

    2007-01-01

    Future wireless access systems will be characterized by their heterogeneity from technological point of view. It is envisaged that in certain areas end-users will have a choice between various radio accesses (RAs) such as e.g. classical cellular networks (GSM, UMTS, WiMAX, etc), WLAN hot-spots, or o

  18. Monographs and Open Access

    Directory of Open Access Journals (Sweden)

    Geoffrey Crossick

    2016-03-01

    Full Text Available This article presents the project that I led for HEFCE on the implications of OA (open access for monographs and other long-form research publications. The likely requirement that books should be OA if submitted to the REF (Research Excellence Framework after next means that OA development must be based on an understanding of the importance of the monograph in the AHSS (arts, humanities and social sciences as well as the challenges involved in making the transition to online OA. The project focused on three issues and each is summarized in turn in the article: What is the place of the monograph and other long-form publications in AHSS disciplines that makes it so important? What is happening to the monograph and is there a crisis as some suggest? What are the issues involved in moving monographs into a digital and OA environment – not just the challenge of effective business models but also many other aspects of sustaining and enhancing the qualities of the monograph? These include third-party rights, technical challenges, licences and the need for international collaboration.

  19. Access2innovation

    DEFF Research Database (Denmark)

    Ravn, Jacob

    Gennem de sidste årtier er der blevet sat fokus på samarbejde på tværs af organisatoriske skel som omdrejningspunkt og forudsætning for innovation af produkter, services, forretningsmodeller samt adgang til nye kunder og markeder. Denne udvikling kan også opleves indenfor nødhjælps-­‐ og udviklin......Gennem de sidste årtier er der blevet sat fokus på samarbejde på tværs af organisatoriske skel som omdrejningspunkt og forudsætning for innovation af produkter, services, forretningsmodeller samt adgang til nye kunder og markeder. Denne udvikling kan også opleves indenfor nødhjælps-­‐ og...... succesfuldt eksempel på innovation i netværk ved at have lagt grunden for etablering af Sky Watch og ViewWorld og søsat yderligere to partnerskaber omkring Den Grønne Generator og WorldBarrow. Erfaringen fra access2innovation er dog samtidigt, at udvikling og implementering af samarbejdet har været...

  20. Access to postacute rehabilitation.

    Science.gov (United States)

    Buntin, Melinda Beeuwkes

    2007-11-01

    Each year, more than 10 million Medicare beneficiaries are discharged from acute care hospitals into postacute care (PAC) settings, including inpatient rehabilitation facilities, skilled nursing facilities, and homes with services from home health agencies. These beneficiaries include very frail and vulnerable elders, many of whom have suffered from an acute event such as a stroke or a fall resulting in hip fracture, all of whom are judged unable to return to their homes without further care. Whether beneficiaries receive PAC and the type and intensity of care they receive is influenced not only by clinical factors, but by nonclinical factors including provider supply and financing, especially Medicare's methods of payment. This article provides a definition of PAC and discusses the wide cross-sectional variation in the use of postacute rehabilitation. It then discusses recent changes to PAC provider payment that have raised concerns about access to postacute rehabilitation, trends in the use of PAC, and what these trends imply about the appropriateness of PAC as it is now delivered. It concludes by identifying issues about the policy and research implications of recent developments and the PAC literature reviewed.

  1. Remote direct memory access

    Science.gov (United States)

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  2. Making Astronomy Accessible

    Science.gov (United States)

    Grice, Noreen A.

    2011-05-01

    A new semester begins, and your students enter the classroom for the first time. You notice a student sitting in a wheelchair or walking with assistance from a cane. Maybe you see a student with a guide dog or carrying a Braille computer. Another student gestures "hello” but then continues hand motions, and you realize the person is actually signing. You wonder why another student is using an electronic device to speak. Think this can't happen in your class? According to the U.S. Census, one out of every five Americans has a disability. And some disabilities, such as autism, dyslexia and arthritis, are considered "invisible” disabilities. This means you have a high probability that one of your students will have a disability. As an astronomy instructor, you have the opportunity to reach a wide variety of learners by using creative teaching strategies. I will share some suggestions on how to make astronomy and your part of the universe more accessible for everyone.

  3. Accessibility on the Hudson River

    Science.gov (United States)

    Exceptional Parent, 2010

    2010-01-01

    This article describes how Beverly and Martin Ryfa, working with an architect who specializes in accessible design, were able to build a house that is handicap accessible for their 9-year-old daughter, Danielle, who suffered an intraventricular hemorrhage when she was three days old. The article describes the features of their house that make…

  4. IV access in dental practice.

    LENUS (Irish Health Repository)

    Fitzpatrick, J J

    2009-04-01

    Intravenous (IV) access is a valuable skill for dental practitioners in emergency situations and in IV sedation. However, many people feel some apprehension about performing this procedure. This article explains the basic principles behind IV access, and the relevant anatomy and physiology, as well as giving a step-by-step guide to placing an IV cannula.

  5. Bus Rapid Transit Accessibility Guidelines

    OpenAIRE

    Rickert, Tom

    2007-01-01

    In recent years helpful guides have appeared in both English and Spanish to assist planners and officials to construct accessible buildings and pedestrian infrastructure which are usable by seniors, persons with disabilities, and all others who especially benefit from universal design. Less has been written about access to public transport systems. Very little guidance is available concern...

  6. Achieving universal access to broadband

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders

    2009-01-01

    The paper discusses appropriate policy measures for achieving universal access to broadband services in Europe. Access can be delivered by means of many different technology solutions described in the paper. This means a greater degree of competition and affects the kind of policy measures...

  7. Querying Schemas With Access Restrictions

    CERN Document Server

    Benedikt, Michael; Ley, Clemens

    2012-01-01

    We study verification of systems whose transitions consist of accesses to a Web-based data-source. An access is a lookup on a relation within a relational database, fixing values for a set of positions in the relation. For example, a transition can represent access to a Web form, where the user is restricted to filling in values for a particular set of fields. We look at verifying properties of a schema describing the possible accesses of such a system. We present a language where one can describe the properties of an access path, and also specify additional restrictions on accesses that are enforced by the schema. Our main property language, AccLTL, is based on a first-order extension of linear-time temporal logic, interpreting access paths as sequences of relational structures. We also present a lower-level automaton model, Aautomata, which AccLTL specifications can compile into. We show that AccLTL and A-automata can express static analysis problems related to "querying with limited access patterns" that h...

  8. Digital Image Representation and Access.

    Science.gov (United States)

    Mostafa, Javed

    1994-01-01

    Reviews the literature relating to the development and application of modern imaging technology between 1987 and 1993. Highlights include image representation, including image data, compression, and image formats; and image access, including indexing and modeling, user interface design, and distributed access. (143 references) (LRW)

  9. Editorial: Next Generation Access Networks

    Science.gov (United States)

    Ruffini, Marco; Cincotti, Gabriella; Pizzinat, Anna; Vetter, Peter

    2015-12-01

    Over the past decade we have seen an increasing number of operators deploying Fibre-to-the-home (FTTH) solutions in access networks, in order to provide home users with a much needed network access upgrade, to support higher peak rates, higher sustained rates and a better and more uniform broadband coverage of the territory.

  10. Get the right access rights!

    CERN Multimedia

    Rosaria Marraffino

    2015-01-01

    On 11 May, a major change concerning the requirements to access the CERN beam facilities was put in place and implemented in ADaMS in order to reduce the number of courses that people who need access to multiple installations have to follow. This revision includes dedicated safety training courses that replace, in particular, the “Safety during LS1” e-learning course, which is now to be considered obsolete.   CERN’s Access Distribution and Management System (ADaMS). As of 11 May, an important improvement was implemented in ADaMS (CERN’s Access Distribution and Management System) regarding the requisites to access safety zones. This change is closely related to the introduction of a generic e-learning course ("CERN Beam Facilities") covering the common risks and systems present in CERN's beam facilities. Two e-learning courses are no longer valid, nor available on the SIR (Safety Information Registration) catalogue: the &ld...

  11. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  12. Increasing Access to Special Collections

    Directory of Open Access Journals (Sweden)

    Ricky Erway

    2012-01-01

    Full Text Available In an environment where we increasingly have access to a collective collection of digitized books, special collections will become increasingly invisible if they are not accessible online. In an era of increasing expectations and decreasing budgets, finding ways to streamline some of our processes is the best way to enable us to do more with less. This report details a number of investigations into how access to special collections can be increased. It includes guidance running the gamut from digitization and rights management to policies and procedures.

  13. SM18 Visits and Access

    CERN Multimedia

    2012-01-01

      VISITS The rules and conditions to be followed for visits in the SM18 Hall are laid out in the EDMS 1205328 document. No visit is allowed without prior reservation.   ACCESS Special access right is needed ONLY from 7 p.m. to 7 a.m. and during week-ends. From 1 December, the current SM18 access database will be closed and a new one “SM18-OWH outside normal hours” started from scratch. Requests, via EDH SM18-OWH, will have to be duly justified.   For further information, please contact Evelyne Delucinge.

  14. 5 CFR 2606.203 - Granting access.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Granting access. 2606.203 Section 2606... Access to Records and Accounting of Disclosures § 2606.203 Granting access. (a) The methods for allowing access to records, when such access has been granted by OGE or the other agency concerned are:...

  15. 10 CFR 1017.21 - Limited access.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Limited access. 1017.21 Section 1017.21 Energy DEPARTMENT... INFORMATION Access to Unclassified Controlled Nuclear Information § 1017.21 Limited access. (a) A person who is not eligible for routine access to specific UCNI under § 1017.20 may request limited access...

  16. 32 CFR 154.49 - Granting access.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Granting access. 154.49 Section 154.49 National... SECURITY PROGRAM REGULATION Issuing Clearance and Granting Access § 154.49 Granting access. (a) Access to classified information shall be granted to persons whose official duties require such access and who have...

  17. 47 CFR 76.702 - Public access.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Public access. 76.702 Section 76.702... CABLE TELEVISION SERVICE Cable Television Access § 76.702 Public access. A cable operator may refuse to transmit any public access program or portion of a public access program that the operator...

  18. MCBS Access to Care PUF

    Data.gov (United States)

    U.S. Department of Health & Human Services — The MCBS 2013 Access to Care public use file (MCBS PUF) provides the first publically available MCBS file for researchers interested in the health, health care use,...

  19. Assuring Access to Affordable Coverage

    Data.gov (United States)

    U.S. Department of Health & Human Services — Under the Affordable Care Act, millions of uninsured Americans will gain access to affordable coverage through Affordable Insurance Exchanges and improvements in...

  20. Charter Halibut Limited Access Program

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This limited access system limits the number of charter vessels that may participate in the guided sport fishery for halibut in area 2C and 3A. NMFS issues a charter...

  1. Water Access Sites in Minnesota

    Data.gov (United States)

    Minnesota Department of Natural Resources — This data shows the approximate locations of boat accesses in the state. This is not a comprehensive list but one that was generated through a cooperative effort....

  2. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  3. Textual information access statistical models

    CERN Document Server

    Gaussier, Eric

    2013-01-01

    This book presents statistical models that have recently been developed within several research communities to access information contained in text collections. The problems considered are linked to applications aiming at facilitating information access:- information extraction and retrieval;- text classification and clustering;- opinion mining;- comprehension aids (automatic summarization, machine translation, visualization).In order to give the reader as complete a description as possible, the focus is placed on the probability models used in the applications

  4. 78 FR 77074 - Accessibility of User Interfaces, and Video Programming Guides and Menus; Accessible Emergency...

    Science.gov (United States)

    2013-12-20

    ... this proceeding reflects the ongoing problems that consumers have in finding and controlling these... accessible devices or accessibility solutions in marketing efforts, through their customer service centers... accessible devices or accessibility solutions in marketing efforts, through their customer service...

  5. Accessibility of adolescent health services

    Directory of Open Access Journals (Sweden)

    S Richter

    2000-09-01

    Full Text Available Adolescents represent a large proportion of the population. As they mature and become sexually active, they face more serious health risks. Most face these risks with too little factual information, too little guidance about sexual responsibility and multiple barriers to accessing health care. A typical descriptive and explanatory design was used to determine what the characteristics of an accessible adolescent health service should be. Important results and conclusions that were reached indicate that the adolescent want a medical doctor and a registered nurse to be part of the health team treating them and they want to be served in the language of their choice. Family planning, treatment of sexually transmitted diseases and psychiatric services for the prevention of suicide are services that should be included in an adolescent accessible health service. The provision of health education concerning sexual transmitted diseases and AIDS is a necessity. The service should be available thought out the week (included Saturdays and within easy reach. It is recommended that minor changes in existing services be made, that will contribute towards making a health delivery service an adolescent accessible service. An adolescent accessible health service can in turn make a real contribution to the community’s efforts to improve the health of its adolescents and can prove to be a rewarding professional experience to the health worker.

  6. Open Access. Chapter 6 of Scholarly Communication for Librarians.

    OpenAIRE

    Morrison, Heather

    2008-01-01

    In-depth overview of open access, covering definitions (open access publishing, open access archives, gratis and libre, open access works versus open access processes), major statements and declarations, types of open access, major initiatives, trends, advocacy and lobbying.

  7. Accessible solitons of fractional dimension

    Energy Technology Data Exchange (ETDEWEB)

    Zhong, Wei-Ping, E-mail: zhongwp6@126.com [Department of Electronic and Information Engineering, Shunde Polytechnic, Guangdong Province, Shunde 528300 (China); Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar); Belić, Milivoj [Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar); Zhang, Yiqi [Key Laboratory for Physical Electronics and Devices of the Ministry of Education & Shaanxi Key Lab of Information Photonic Technique, Xi’an Jiaotong University, Xi’an 710049 (China)

    2016-05-15

    We demonstrate that accessible solitons described by an extended Schrödinger equation with the Laplacian of fractional dimension can exist in strongly nonlocal nonlinear media. The soliton solutions of the model are constructed by two special functions, the associated Legendre polynomials and the Laguerre polynomials in the fraction-dimensional space. Our results show that these fractional accessible solitons form a soliton family which includes crescent solitons, and asymmetric single-layer and multi-layer necklace solitons. -- Highlights: •Analytic solutions of a fractional Schrödinger equation are obtained. •The solutions are produced by means of self-similar method applied to the fractional Schrödinger equation with parabolic potential. •The fractional accessible solitons form crescent, asymmetric single-layer and multilayer necklace profiles. •The model applies to the propagation of optical pulses in strongly nonlocal nonlinear media.

  8. [Medical journals and open access].

    Science.gov (United States)

    Sember, Marijan

    2008-01-01

    The open access (OA) or the idea of a free access to scholarly literature published in electronic form has been already well established in the field of medicine. Medline has already been free for a decade, PubMed Central has been growing steadily. The global crisis of the scientific publishing, becoming increasingly dominated by multinational companies and constant increase of journal prices have moved to action not only individuals and institutions but governments and research charities too. The aim of this article is to give an overview of the main open access initiatives and resources in biomedicine (PubMed, PubMed Central, BioMed Central, PLoS). The OA pros and cons are briefly discussed emphasizing the benefits of OA to medical research and practice.

  9. Achieving Universal Access to Broadband

    Directory of Open Access Journals (Sweden)

    Morten FALCH

    2009-01-01

    Full Text Available The paper discusses appropriate policy measures for achieving universal access to broadband services in Europe. Access can be delivered by means of many different technology solutions described in the paper. This means a greater degree of competition and affects the kind of policy measures to be applied. The paper concludes that other policy measure than the classical universal service obligation are in play, and discusses various policy measures taking the Lisbon process as a point of departure. Available policy measures listed in the paper include, universal service obligation, harmonization, demand stimulation, public support for extending the infrastructure, public private partnerships (PPP, and others.

  10. Code division multiple access (CDMA)

    CERN Document Server

    Buehrer, R Michael

    2006-01-01

    This book covers the basic aspects of Code Division Multiple Access or CDMA. It begins with an introduction to the basic ideas behind fixed and random access systems in order to demonstrate the difference between CDMA and the more widely understood TDMA, FDMA or CSMA. Secondly, a review of basic spread spectrum techniques are presented which are used in CDMA systems including direct sequence, frequency-hopping and time-hopping approaches. The basic concept of CDMA is presented, followed by the four basic principles of CDMA systems that impact their performance: interference averaging, universa

  11. Subsystems for future access networks

    DEFF Research Database (Denmark)

    Caballero Jambrina, Antonio; Tafur Monroy, Idelfonso; Zibar, Darko;

    We present a brief overview of the research activities in the European project “Pan-European Photonics Task Force: Integrating Europe’s Expertise on Photonic Subsystems” (EURO-FOS); an in particular in the area of optical Metro and Access Networks.......We present a brief overview of the research activities in the European project “Pan-European Photonics Task Force: Integrating Europe’s Expertise on Photonic Subsystems” (EURO-FOS); an in particular in the area of optical Metro and Access Networks....

  12. SCOAP3 and Open Access

    CERN Document Server

    Mele, Salvatore; D'Agostino, Dan; Dyas-Correia, Sharon

    2009-01-01

    SCOAP3 is an innovative Open Access initiative for publishing in high-energy physics. The model is viewed by many as a potential solution to multiple issues related to the financial crisis, the peer review system, scholarly communication, and the need to support institutional repositories. This installment of “The Balance Point” presents articles written by three Open Access advocates, outlining the SCOAP3 proposal, benefits of participation, and some of the roles libraries, publishers and scientists can play in making important changes to scholarly communication. Contributors discuss scalability and transferability issues of SCOAP3, as well as other matters of concern.

  13. Educational Access in India. Country Policy Brief

    Science.gov (United States)

    Online Submission, 2009

    2009-01-01

    This Policy Brief describes and explains patterns of access to schools in India. It outlines policy and legislation on access to education and provides an analysis of access, vulnerability and exclusion. The quantitative data is supported by a review of research which explains the patterns of access and exclusion. It is based on findings from the…

  14. 36 CFR 1191.1 - Accessibility guidelines.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Accessibility guidelines... COMPLIANCE BOARD AMERICANS WITH DISABILITIES ACT (ADA) ACCESSIBILITY GUIDELINES FOR BUILDINGS AND FACILITIES; ARCHITECTURAL BARRIERS ACT (ABA) ACCESSIBILITY GUIDELINES § 1191.1 Accessibility guidelines. (a)...

  15. Flexible access control for dynamic collaborative environments

    NARCIS (Netherlands)

    Dekker, Mari Antonius Cornelis

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect confident

  16. 36 CFR 9.32 - Access.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Access. 9.32 Section 9.32... MANAGEMENT Non-Federal Oil and Gas Rights § 9.32 Access. (a) No access on, across or through lands or waters... of operations serves as the operator's access permit. (b) No operations shall be conducted on a...

  17. 10 CFR 1017.20 - Routine access.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Routine access. 1017.20 Section 1017.20 Energy DEPARTMENT... INFORMATION Access to Unclassified Controlled Nuclear Information § 1017.20 Routine access. (a) Authorized... access to the UCNI, subject to limitations in paragraph (b) of this section, and who may...

  18. 22 CFR 9a.7 - Access.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Access. 9a.7 Section 9a.7 Foreign Relations... PROGRAMS; RELATED MATERIAL § 9a.7 Access. (a) Except as set forth in this section, access to information or... appropriate officer of the Department to be trustworthy and to have a need for access to the...

  19. 43 CFR 36.11 - Special access.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Special access. 36.11 Section 36.11 Public..., AND ACCESS INTO, CONSERVATION SYSTEM UNITS IN ALASKA § 36.11 Special access. (a) This section... this section. The use of aircraft for access to or from lands and waters within a national park...

  20. 32 CFR 701.107 - Record access.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Record access. 701.107 Section 701.107 National... DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.107 Record access. The access provisions of this... in systems of records. Accordingly, only individuals seeking first party access to records...

  1. 10 CFR 2.1007 - Access.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 1 2010-01-01 2010-01-01 false Access. 2.1007 Section 2.1007 Energy NUCLEAR REGULATORY... Geologic Repository § 2.1007 Access. (a)(1) A system to provide electronic access to the Licensing Support...-license application phase. (2) A system to provide electronic access to the Licensing Support...

  2. 44 CFR 6.32 - Granting access.

    Science.gov (United States)

    2010-10-01

    ... 44 Emergency Management and Assistance 1 2010-10-01 2010-10-01 false Granting access. 6.32 Section... SECURITY GENERAL IMPLEMENTATION OF THE PRIVACY ACT OF 1974 Individual Access to Records § 6.32 Granting access. (a) Upon receipt of a request for access to non-exempt records, the system manager shall...

  3. 48 CFR 252.239-7002 - Access.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Access. 252.239-7002... Clauses 252.239-7002 Access. As prescribed in 239.7411(a), use the following clause: Access (DEC 1991) (a) Subject to military security regulations, the Government shall permit the Contractor access at...

  4. 36 CFR 228.12 - Access.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 2 2010-07-01 2010-07-01 false Access. 228.12 Section 228.12... Minerals § 228.12 Access. An operator is entitled to access in connection with operations, but no road... other means of access, including but not limited to off-road vehicles, be used until the operator...

  5. 32 CFR 2400.25 - Access.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Access. 2400.25 Section 2400.25 National Defense... § 2400.25 Access. (a) A person is eligible for access to classified information provided that a... access is essential to the accomplishment of lawful and authorized Government purposes. A...

  6. 46 CFR 153.330 - Access.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Access. 153.330 Section 153.330 Shipping COAST GUARD..., LIQUEFIED GAS, OR COMPRESSED GAS HAZARDOUS MATERIALS Design and Equipment Cargo Pumprooms § 153.330 Access. (a) The access door to a cargo pump-room must open on the weatheredeck. (b) The access way to a...

  7. 43 CFR 36.12 - Temporary access.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Temporary access. 36.12 Section 36.12... ACROSS, AND ACCESS INTO, CONSERVATION SYSTEM UNITS IN ALASKA § 36.12 Temporary access. (a) For the... the National Petroleum Reserve—Alaska. (2) Temporary access means limited, short-term (i.e., up to...

  8. Registered access: a 'Triple-A' approach.

    Science.gov (United States)

    Dyke, Stephanie O M; Kirby, Emily; Shabani, Mahsa; Thorogood, Adrian; Kato, Kazuto; Knoppers, Bartha M

    2016-12-01

    We propose a standard model for a novel data access tier - registered access - to facilitate access to data that cannot be published in open access archives owing to ethical and legal risk. Based on an analysis of applicable research ethics and other legal and administrative frameworks, we discuss the general characteristics of this Registered Access Model, which would comprise a three-stage approval process: Authentication, Attestation and Authorization. We are piloting registered access with the Demonstration Projects of the Global Alliance for Genomics and Health for which it may provide a suitable mechanism for access to certain data types and to different types of data users.

  9. Open Access Publishing with Drupal

    Directory of Open Access Journals (Sweden)

    Nina McHale

    2011-10-01

    Full Text Available In January 2009, the Colorado Association of Libraries (CAL suspended publication of its print quarterly journal, Colorado Libraries, as a cost-saving measure in a time of fiscal uncertainty. Printing and mailing the journal to its 1300 members cost CAL more than $26,000 per year. Publication of the journal was placed on an indefinite hiatus until the editorial staff proposed an online, open access format a year later. The benefits to migrating to open access included: significantly lower costs; a green platform; instant availability of content; a greater level of access to users with disabilities; and a higher level of visibility of the journal and the association. The editorial staff chose Drupal, including the E-journal module, and while Drupal is notorious for its steep learning curve—which exacerbated delays to content that had been created before the publishing hiatus—the fourth electronic issue was published recently at coloradolibrariesjournal.org. This article will discuss both the benefits and challenges of transitioning to an open access model and the choice Drupal as a platform over other more established journal software options.

  10. Access, Intellectual Freedom and Libraries.

    Science.gov (United States)

    Darling, Richard L.

    1979-01-01

    Reviews attitudes toward censorship in the United States throughout its history in relation to the nation and its institutions. The library is recognized as an institution in which censorship has no place, due to its creed of information access and intellectual freedom for all. (MBR)

  11. Wild Accessions and Mutant Resources

    DEFF Research Database (Denmark)

    Kawaguchi, Masayoshi; Sandal, Niels Nørgaard

    2014-01-01

    Lotus japonicus, Lotus burttii, and Lotus filicaulis are species of Lotus genus that are utilized for molecular genetic analysis such as the construction of a linkage map and QTL analysis. Among them, a number of mutants have been isolated from two wild accessions: L. japonicus Gifu B-129...

  12. Market access through bound tariffs

    DEFF Research Database (Denmark)

    Sala, Davide; Schröder, Philipp J.H.; Yalcin, Erdal

    2010-01-01

    WTO negotiations deal predominantly with bound - besides applied - tariff rates. But, how can reductions in tariffs ceilings, i.e. tariff rates that no exporter may ever actually be confronted with, generate market access? The answer to this question relates to the effects of tariff bindings on t...

  13. Market Access through Bound Tariffs

    DEFF Research Database (Denmark)

    Sala, Davide; Schröder, Philipp J.H.; Yalcin, Erdal

    WTO negotiations deal predominantly with bound - besides applied - tariff rates. But, how can reductions in tariffs ceilings, i.e. tariff rates that no exporter may ever actually be confronted with, generate market access? The answer to this question relates to the effects of tariff bindings on t...

  14. Accessing Students' Reasoning for Disengagement

    Science.gov (United States)

    Deed, Craig

    2011-01-01

    This paper examines what students can tell us about their strategic decision to engage or disengage from learning. A means of accessing student knowledge and experience about teaching and learning is explicated, along with a discussion of student reasoning for making an investment in learning. It is argued that disengagement is a reasoned decision…

  15. Equal Access but Unequal Outcomes

    DEFF Research Database (Denmark)

    Jæger, Mads Meier

    2009-01-01

    with respect to Danish children's choice of secondary education. Denmark is well-suited for this study because access to secondary education is particularly meritocratic. The empirical analysis shows that all three channels through which cultural capital affects educational success are important....

  16. Remotely Accessible Management System (RAMS).

    Science.gov (United States)

    Wood, Rex

    Oakland Schools, an Intermediate School District for Administration, operates a Remotely Accessible Management System (RAMS). RAMS is composed of over 100 computer programs, each of which performs procedures on the files of the 28 local school districts comprising the constituency of Oakland Schools. This regional service agency covers 900 square…

  17. The Inevitability of Open Access

    Science.gov (United States)

    Lewis, David W.

    2012-01-01

    Open access (OA) is an alternative business model for the publication of scholarly journals. It makes articles freely available to readers on the Internet and covers the costs associated with publication through means other than subscriptions. This article argues that Gold OA, where all of the articles of a journal are available at the time of…

  18. Proximity Displays for Access Control

    Science.gov (United States)

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  19. Accessibility of antiretroviral therapy in Ghana: convenience of access.

    Science.gov (United States)

    Addo-Atuah, Joyce; Gourley, Dick; Gourley, Greta; White-Means, Shelley I; Womeodu, Robin J; Faris, Richard J; Addo, Nii Akwei

    2012-01-01

    The convenience of accessing antiretroviral therapy (ART) is important for initial access to care and subsequent adherence to ART. We conducted a qualitative study of people living with HIV/AIDS (PLWHA) and ART healthcare providers in Ghana in 2005. The objective of this study was to explore the participants' perceived convenience of accessing ART by PLWHA in Ghana. The convenience of accessing ART was evaluated from the reported travel and waiting times to receive care, the availability, or otherwise, of special considerations, with respect to the waiting time to receive care, for those PLWHA who were in active employment in the formal sector, the frequency of clinic visits before and after initiating ART, and whether the PLWHA saw the same or different providers at each clinic visit (continuity of care). This qualitative study used in-depth interviews based on Yin's case-study research design to collect data from 20 PLWHA and 24 ART healthcare providers as study participants. • Reported travel time to receive ART services ranged from 2 to 12 h for 30% of the PLWHA. • Waiting time to receive care was from 4 to 9 h. • While known government workers, such as teachers, were attended to earlier in some of the centres, this was not a consistent practice in all the four ART centres studied. • The PLWHA corroborated the providers' description of the procedure for initiating and monitoring ART in Ghana. • PLWHA did not see the same provider every time, but they were assured that this did not compromise the continuity of their care. Our study suggests that convenience of accessing ART is important to both PLWHA and ART healthcare providers, but the participants alluded to other factors, including open provider-patient communication, which might explain the PLWHA's understanding of the constraints under which they were receiving care. The current nation-wide coverage of the ART programme in Ghana, however, calls for the replication of this study to identify

  20. Arteriovenous Vascular Access Selection and Evaluation

    Science.gov (United States)

    MacRae, Jennifer M.; Oliver, Matthew; Clark, Edward; Dipchand, Christine; Hiremath, Swapnil; Kappel, Joanne; Kiaii, Mercedeh; Lok, Charmaine; Luscombe, Rick; Miller, Lisa M.; Moist, Louise

    2016-01-01

    When making decisions regarding vascular access creation, the clinician and vascular access team must evaluate each patient individually with consideration of life expectancy, timelines for dialysis start, risks and benefits of access creation, referral wait times, as well as the risk for access complications. The role of the multidisciplinary team in facilitating access choice is reviewed, as well as the clinical evaluation of the patient. PMID:28270917

  1. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  2. Automated Computer Access Request System

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  3. Access to emergency number services.

    Science.gov (United States)

    Harkins, Judith E; Strauss, Karen Peltz

    2008-01-01

    Access to emergency services is mandated by Title II of the Americans with Disabilities Act (ADA). The Department of Justice oversees the accessibility of public safety answering points (PSAPs), popularly called 9-1-1 centers. The Federal Communications Commission (FCC) has at least two roles in emergency number access: (1) as regulator of the ADA's Title IV on telecommunications access, and (2) as regulator of communications companies with regard to support of and interconnection with PSAPs. The rules of both agencies contributed significantly to the improvement during the 1990s of access to 9-1-1 for people who are deaf, hard of hearing, or speech disabled. However, as new technologies for text wireless communications and relay services have moved quickly to Internet protocol (IP)-based technologies over the past 5-8 years, the use of traditional wireline telephones and text telephones among deaf, hard of hearing, and speech-disabled people has declined. PSAPs cannot be contacted via the newer forms of telecommunications, such as e-mail, instant messaging, and IP-based forms of relay services, including video relay services. The gap between the technology supported by policy and the technologies currently being used by deaf and hard of hearing people has become a serious problem that is difficult to solve because of the separate jurisdictions of the two agencies, the need for coordination within the FCC, technological challenges, and funding issues. In this article, the key policy and technology challenges will be analyzed and recommendations made for short-and long-term solutions to this dilemma.

  4. Implementation of a vascular access quality programme improves vascular access care

    NARCIS (Netherlands)

    van Loon, M.; van der Mark, W.; Beukers, N.; de Bruin, C.; Blankestijn, P. J.; Huisman, R. M.; Zijlstra, J. J.; van der Sande, F. M.; Tordoir, J. H. M.

    2007-01-01

    Introduction. In the Netherlands an access quality improvement plan (QIP) was introduced by vascular access coordinators (VAC) with the aim to decrease vascular access-related complications by preemptive intervention of malfunctioning accesses. A vascular access QIP was established in 24 centres (46

  5. Accessing and disclosing protected resources

    DEFF Research Database (Denmark)

    Olesen, Henning; Khajuria, Samant

    2015-01-01

    Today, data is money. Whether it is private users' personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization measures to be deployed. Enabling...... advanced user controlled privacy is essential to realize the visions of 5G applications and services. For service providers and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user...... the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources and possibly give them control of how their data will be used by service providers....

  6. Accessing SDO Data : The Poster

    Science.gov (United States)

    Hourcle, Joseph; Addison, K.; Bogart, R.; Chamberlin, P.; Freeland, S.; Hughitt, V. K.; Ireland, J.; Maddox, M.; Mueller, D.; Somani, A.; Sommers, J.; Thompson, B.; solar physics data community, The

    2011-05-01

    As the data from SDO are useful for a variety of purposes, including solar physics, helioseismology, atmospheric science, space weather forecasting, education and public outreach, a wide variety of tools have been development to cater to the different needs of the various groups. Systems have been developed for pipeline processing, searching, browsing, subsetting, or simply just moving around large volumes of data. We present a quick overview of the different systems that can be used to access SDO data including (J)Helioviewer, the Heliophysics Event Knowledgebase (HEK), the Virtual Solar Observatory (VSO), the Integrated Space Weather Analysis System (iSWA), the Data Record Management System (DRMS), and various websites. We cover web-based applications, application programming interfaces (APIs), and IDL command line tools. This poster serves as a supplement to the oral presentation as a place to distribute information about the various interfaces and to collect feedback about any unmet needs for data access.

  7. Easing access for lifelong learners

    DEFF Research Database (Denmark)

    Müller, Romina; Remdisch, Sabine; Köhler, Katharina

    2015-01-01

    Easing access to higher education (HE) for those engaging in lifelong learning has been a common policy objective across the European Union since the late 1990s. To reach this goal, the transition between vocational and academic routes must be simplified, but European countries are at different...... developmental stages. This article maps the development in Denmark, Finland, Germany and England using a case study approach deploying data triangulation from a national and institutional perspective. It explores the extent/commonality of structural factors for easing access for students engaging in lifelong...... learning. The cases are at widely different stages, but the following factors were considered essential in all countries for opening universities: the establishment of transition paths from secondary education and working life into HE and links between HE, businesses and adult education from a national...

  8. Enhancing Ocean Research Data Access

    Science.gov (United States)

    Chandler, Cynthia; Groman, Robert; Shepherd, Adam; Allison, Molly; Arko, Robert; Chen, Yu; Fox, Peter; Glover, David; Hitzler, Pascal; Leadbetter, Adam; Narock, Thomas; West, Patrick; Wiebe, Peter

    2014-05-01

    The Biological and Chemical Oceanography Data Management Office (BCO-DMO) works in partnership with ocean science investigators to publish data from research projects funded by the Biological and Chemical Oceanography Sections and the Office of Polar Programs Antarctic Organisms & Ecosystems Program at the U.S. National Science Foundation. Since 2006, researchers have been contributing data to the BCO-DMO data system, and it has developed into a rich repository of data from ocean, coastal and Great Lakes research programs. While the ultimate goal of the BCO-DMO is to ensure preservation of NSF funded project data and to provide open access to those data, achievement of those goals is attained through a series of related phases that benefits from active collaboration and cooperation with a large community of research scientists as well as curators of data and information at complementary data repositories. The BCO-DMO is just one of many intermediate data management centers created to facilitate long-term preservation of data and improve access to ocean research data. Through partnerships with other data management professionals and active involvement in local and global initiatives, BCO-DMO staff members are working to enhance access to ocean research data available from the online BCO-DMO data system. Continuing efforts in use of controlled vocabulary terms, development of ontology design patterns and publication of content as Linked Open Data are contributing to improved discovery and availability of BCO-DMO curated data and increased interoperability of related content available from distributed repositories. We will demonstrate how Semantic Web technologies (e.g. RDF/XML, SKOS, OWL and SPARQL) have been integrated into BCO-DMO data access and delivery systems to better serve the ocean research community and to contribute to an expanding global knowledge network.

  9. Seamless Access to Home Content

    OpenAIRE

    Høiby, Ola

    2006-01-01

    This thesis documents the mobile phone authentication in the data world and evaluate potential methods for seamless authentication. Telenors Mobil's authentication tool and Wap Gateway have been configured to provide the mobile phone's user id (MSISDN) to a Wap Server for authentication of the user. The thesis resultet in a demo which uses the wap functionality on the mobile phone to access content on a wap server. Automatic authentication based on the user information provided by the wap gat...

  10. [Personalized medicine: equity and access].

    Science.gov (United States)

    Joly, Yann; Knoppers, Bartha M

    2014-11-01

    Personalized medicine has seen a recent increase in popularity amongst medical researchers and policymakers. Nevertheless, there are persistent legal, ethical, and social questions that need to be explored, particularly related to the criticism that personalized medicine constitutes an elitist model of healthcare. Investigating this critique the current manuscript argues that personalized medicine has the potential to become a positive force for equitable access to better healthcare at a national and international level.

  11. Accessibility in the Smart City

    Directory of Open Access Journals (Sweden)

    Giuseppe Trieste

    2014-07-01

    Full Text Available FIABA is a cultural route for all, its aim is to promote a Global Accessibility and a Universal Usability through the removal of architectural, cultural, psychological and sensory barriers. FIABA is carrying out a real change and a cultural renewal in the name of equal opportunities. Respect for the environment in which we live is also a duty towards the younger generations to whom we must deliver a world in which free movement and the normal use of spaces are goals already achieved. There are millions of citizens who, because of their physical conditions are prisoners in their homes because there isn’t any elevator or any elevator maintenance. FIABA project aims at implementing “a Space for all” or “a landscape for all” following the path of the ONU Convention on the Rights of People with disabilities with an emphasis on architectural, cultural, and psychological barriers, the last ones in particular, create barriers to equal opportunities and they are often carriers of discrimination. The principle of accessibility is invoked in Article 9 of the Convention which confirms the principle that people have a right to live independently and participate fully in all spheres of life and thus States are required to take all necessary measures to ensure accessibility to physical environment, transport, information and communications, including systems and technologies of information and communication and other facilities and services open to the public, both in urban and rural areas.

  12. Accessing and disclosing protected resources

    DEFF Research Database (Denmark)

    Olesen, Henning; Khajuria, Samant

    2014-01-01

    TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers and enterpr......TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers...... and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user’s personal data have become an economic asset, not necessarily to the owners of these data, but to the service providers, whose...... business mod- els often includes the use of these data. In this paper we focus on the user – service provider interaction and discuss how recent technological progress, in particular the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources...

  13. Personalizing Access to Learning Networks

    DEFF Research Database (Denmark)

    Dolog, Peter; Simon, Bernd; Nejdl, Wolfgang

    2008-01-01

    In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address in this fra......In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address...... in this framework, enabling personalized access to federated learning repositories with a vast number of learning offers. Our infrastructure includes personalization strategies both at the query and the query results level. Query rewriting is based on learning and language preferences; rule-based and ranking......-based personalization improves these results further. Rule-based reasoning techniques are supported by formal ontologies we have developed based on standard information models for learning domains; ranking-based recommendations are supported through ensuring minimal sets of predicates appearing in query results. Our...

  14. [Vascular access guidelines for hemodialysis].

    Science.gov (United States)

    Rodríguez Hernández, J A; González Parra, E; Julián Gutiérrez, J M; Segarra Medrano, A; Almirante, B; Martínez, M T; Arrieta, J; Fernández Rivera, C; Galera, A; Gallego Beuter, J; Górriz, J L; Herrero, J A; López Menchero, R; Ochando, A; Pérez Bañasco, V; Polo, J R; Pueyo, J; Ruiz, Camps I; Segura Iglesias, R

    2005-01-01

    Quality of vascular access (VA) has a remarkable influence in hemodialysis patients outcomes. Dysfunction of VA represents a capital cause of morbi-mortality of these patients as well an increase in economical. Spanish Society of Neprhology, aware of the problem, has decided to carry out a revision of the issue with the aim of providing help in comprehensión and treatment related with VA problems, and achieving an homogenization of practices in three mayor aspects: to increase arteriovenous fistula utilization as first vascular access, to increment vascular access monitoring practice and rationalise central catheters use. We present a consensus document elaborated by a multidisciplinar group composed by nephrologists, vascular surgeons, interventional radiologysts, infectious diseases specialists and nephrological nurses. Along six chapters that cover patient education, creation of VA, care, monitoring, complications and central catheters, we present the state of the art and propose guidelines for the best practice, according different evidence based degrees, with the intention to provide help at the professionals in order to make aproppiate decissions. Several quality standars are also included.

  15. Support the Open Access Movement

    CERN Multimedia

    2005-01-01

    CERN's Executive Board recently endorsed a new policy of open access to the laboratory's results: Continuing CERN action on Open Access (OA) [http://cds.cern.ch/record/828991/files/open-2005-006.pdf]. What does this policy mean for you? CERN authors have two responsibilities: Submit your document to the CERN Document Server; Consider submitting future articles to an Open Access journal. Since 2001, Operational Circular No. 6 has required every CERN author (Staff member, Fellow, or any Associated member of personnel who is allowed to use CERN as his affiliation) to submit a copy of their scientific documents to the CERN Document Server (CDS). For some groups all approved documents are submitted by the secretary (see the Departments' policies at: http://library.cern.ch/cern_publications/cern_publication_policy.html). Each author should personally also ensure the submission of any other articles which are not added in this way, such as conference contributions and review articles. It is not sufficient to re...

  16. LERU roadmap towards Open Access.

    Science.gov (United States)

    Ayris, Paul; Björnshauge, Lars; Collier, Mel; Ferwerda, Eelco; Jacobs, Neil; Sinikara, Kaisa; Swan, Alma; de Bries, Saskia; van Wesenbeeck, Astrid

    2015-09-01

    Money which is not directly spent on research and education, even though it is largely taxpayers´ money. As Harvard University already denounced in 2012, many large journal publishers have rendered the situation "fiscally unsustainable and academically restrictive", with some journals costing as much as $40,000 per year (and publishers drawing profits of 35% or more). If one of the wealthiest universities in the world can no longer afford it, who can? It is easy to picture the struggle of European universities with tighter budgets. In addition to subscription costs, academic research funding is also largely affected by "Article Processing Charges" (APC), which come at an additional cost of €2000/article, on average, when making individual articles Gold Open Access. Some publishers are in this way even being paid twice for the same content ("double dipping"). In the era of Open Science, Open Access to publications is one of the cornerstones of the new research paradigm and business models must support this transition. It should be one of the principal objectives of Commissioner Carlos Moedas and the Dutch EU Presidency (January-June 2016) to ensure that this transition happens. Further developing the EU´s leadership in research and innovation largely depends on it. With this statement "Moving Forwards on Open Access", LERU calls upon all universities, research institutes, research funders and researchers to sign this statement and give a clear signal towards the European Commission and the Dutch EU Presidency.

  17. Predatory Open Access in Rehabilitation.

    Science.gov (United States)

    Manca, Andrea; Martinez, Gianluca; Cugusi, Lucia; Dragone, Daniele; Mercuro, Giuseppe; Deriu, Franca

    2017-01-20

    Increasingly scholars and researchers are being solicited by predatory open access journals seeking manuscript submissions and abusing the author-pays model by charging authors with publishing fees without any or proper peer review. Such questionable editorial practices are threatening the reputation and credibility of scholarly publishing. To date, no investigation has been conducted on this phenomenon in the field of rehabilitation. This study attempts to identify specific predatory journals operating in this field to quantify the phenomenon and its geographic distribution. Beall's List has been used to this end which, although not perfect, is a comprehensive and up-to-date report of predatory publishers. Of the 1113 publishers on the list, 59 journals were identified, for a total of 5610 published articles. The median number of articles published by each journal was 21, and the median amount of article processing charges was $499. Only 1 out of 59 journals was included in the Directory of Open Access Journals, whereas 7 (12%) were indexed by PubMed. Most of the publishers were based in India (36%) followed by the United States (25%) and Pakistan (5%), and 25% were without a verifiable address. The data indicate that the threat of predatory publishing in rehabilitation is real. Physiatrists, physiotherapists, researchers, and academics operating in this field are advised to use the tools available to recognize predatory practices before considering publishing in open access journals.

  18. Access to IEEE Electronic Library

    CERN Multimedia

    2007-01-01

    From 2007, the CERN Library now offers readers online access to the complete IEEE Electronic Library (Institute of Electrical and Electronics Engineers). This new licence gives unlimited online access to all IEEE and IET (previously IEE) journals and proceedings as well as all current IEEE standards and selected archived ones. Some of the titles offer volumes back to 1913. This service currently represents more than 1,400,000 full-text articles! This leading engineering information resource replaces the previous service, a sub-product of the IEEE database called 'IEEE Enterprise', which offered online access to the complete collection of IEEE journals and proceedings, but with limited features. The service had become so popular that the CERN Working Group for Acquisitions recommended that the Library subscribe to the complete IEEE Electronic Library for 2007. Usage statistics for recent months showed there was a demand for the service from a large community of CERN users and we were aware that many users h...

  19. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  20. Web Accessibility, Libraries, and the Law

    Directory of Open Access Journals (Sweden)

    Camilla Fulton

    2011-03-01

    Full Text Available With an abundance of library resources being served on the web, researchers are finding that disabled people oftentimes do not have the same level of access to materials as their nondisabled peers. This paper discusses web accessibility in the context of United States’ federal laws most referenced in web accessibility lawsuits. Additionally, it reveals which states have statutes that mirror federal web accessibility guidelines and to what extent. Interestingly, fewer than half of the states have adopted statutes addressing web accessibility, and fewer than half of these reference Section 508 of the Rehabilitation Act or Web Content Accessibility Guidelines (WCAG 1.0. Regardless of sparse legislation surrounding web accessibility, librarians should consult the appropriate web accessibility resources to ensure that their specialized content reaches all.

  1. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  2. Open Access and ORCID poster presentation

    DEFF Research Database (Denmark)

    Elbæk, Mikael Karstensen; Ekstrøm, Jeannette

    2014-01-01

    Open Access Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all...... peer review articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access...... and related topics such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc. ORCID ORCID – Open Research & Contributor ID – is an internationally recognized and widely used researcher-ID. ORCID makes it easy to reuse your data across disciplines, publishers and databases – all you need to do...

  3. Accessibility as indicator in sustainable transport planning

    DEFF Research Database (Denmark)

    Jensen, Anders Vestergaard; Leleur, Steen

    2014-01-01

    applied in a new SUSTAIN Appraisal Framework (SAF) concerns accessibility, and the paper describes and evaluate an accessibility index and methodology POINTER as concerns its relevance for SAF. POINTER is demonstrated on a Danish national transport infrastructure project. Finally conclusion...

  4. Self-Access Centers: Maximizing Learners’ Access to Center Resources

    Directory of Open Access Journals (Sweden)

    Mark W. Tanner

    2010-09-01

    Full Text Available Originally published in TESL-EJ March 2009, Volume 12, Number 4 (http://tesl-ej.org/ej48/a2.html. Reprinted with permission from the authors.Although some students have discovered how to use self-access centers effectively, the majority appear to be unaware of available resources. A website and database of materials were created to help students locate materials and use the Self-Access Study Center (SASC at Brigham Young University’s English Language Center (ELC more effectively. Students took two surveys regarding their use of the SASC. The first survey was given before the website and database were made available. A second survey was administered 12 weeks after students had been introduced to the resource. An analysis of the data shows that students tend to use SASC resources more autonomously as a result of having a web-based database. The survey results suggest that SAC managers can encourage more autonomous use of center materials by provided a website and database to help students find appropriate materials to use to learn English.

  5. Access to Local Agriculture and Weight Outcomes

    OpenAIRE

    Joshua P. Berning

    2012-01-01

    Recent studies examine the impact of the built environment on health outcomes such as obesity. Several studies find for certain populations that access to unhealthy food has a positive effect on obesity, whereas access to healthy choices has a negative effect. Given the growth and popularity of locally grown food, we examine how individual weight outcomes are affected by access to direct-to-consumer local food. After controlling for potential endogeneity, we find that greater access to local ...

  6. NASA thesaurus. Volume 2: Access vocabulary

    Science.gov (United States)

    1988-01-01

    The access vocabulary, which is essentially a permuted index, provides access to any word or number in authorized postable and nonpostable terms. Additional entries include postable and nonpostable terms, other word entries and pseudo-multiword terms that are permutations of words that contain words within words. The access vocabulary contains almost 42,000 entries that give increased access to the hierarchies in Volume 1 - Hierarchical Listing.

  7. Environment Implications of China's WTO Accession

    Institute of Scientific and Technical Information of China (English)

    Li Shantong; He Jianwu

    2006-01-01

    China's WTO accession will have important environmental implications. This article aims at providing environmental analysis of the impact of China's accession to the WTO, based on its final offer for WTO accession and a 53-sector, recursive dynamic computable general equilibrium (CGE) model of China. We try to provide some empirical evidences for policy makers to evaluate the effects of China's WTO accession from environmental prospective.

  8. Open Access og Den Bibliometriske Forskningsindikator

    DEFF Research Database (Denmark)

    Dorch, Bertil

    2011-01-01

    I sine "Anbefalinger til implementering af Open Access i Danmark" foreslår det nationale Open Access Udvalget blandet andet, at Den Bibliometriske Forskningsindikator (BFI) bør koordineres med en national Open Access-politik. I dette paper, der er baseret på et blogindlæg, fremfører forfatteren...... fire grunde til, hvorfor han synes det er en dårlig idé at koble Open Access til BFI....

  9. Open access to scientific publishing

    Directory of Open Access Journals (Sweden)

    Janne Beate Reitan

    2016-12-01

    Full Text Available Interest in open access (OA to scientific publications is steadily increasing, both in Norway and internationally. From the outset, FORMakademisk has been published as a digital journal, and it was one of the first to offer OA in Norway. We have since the beginning used Open Journal Systems (OJS as publishing software. OJS is part of the Public Knowledge Project (PKP, which was created by Canadian John Willinsky and colleagues at the Faculty of Education at the University of British Columbia in 1998. The first version of OJS came as an open source software in 2001. The programme is free for everyone to use and is part of a larger collective movement wherein knowledge is shared. When FORMakademisk started in 2008, we received much help from the journal Acta Didactic (n.d. at the University of Oslo, which had started the year before us. They had also translated the programme to Norwegian. From the start, we were able to publish in both Norwegian and English. Other journals have used FORMakademisk as a model and source of inspiration when starting or when converting from subscription-based print journals to electronic OA, including the Journal of Norwegian Media Researchers [Norsk medietidsskrift]. It is in this way that the movement around PKP works and continues to grow to provide free access to research. As the articles are OA, they are also easily accessible to non-scientists. We also emphasise that the language should be readily available, although it should maintain a high scientific quality. Often there may be two sides of the same coin. We on the editorial team are now looking forward to adopting the newly developed OJS 3 this spring, with many new features and an improved design for users, including authors, peer reviewers, editors and readers.

  10. Strategies to improve smallholders' market access

    NARCIS (Netherlands)

    Tilburg, van A.; Schalkwyk, van H.D.

    2011-01-01

    Smallholders, especially in less developed countries, have encountered several challenges in gaining access to markets. Market access includes the ability to obtain necessary farm inputs and farm services, and the ability to deliver farm products to buyers. Market access was less of a problem in the

  11. 36 CFR 910.51 - Access.

    Science.gov (United States)

    2010-07-01

    ... AREA Glossary of Terms § 910.51 Access. Access, when used in reference to parking or loading, means... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Access. 910.51 Section 910.51 Parks, Forests, and Public Property PENNSYLVANIA AVENUE DEVELOPMENT CORPORATION GENERAL GUIDELINES...

  12. University Access, Inclusion and Social Justice

    Science.gov (United States)

    Hlalele, D.; Alexander, G.

    2012-01-01

    University access programmes inherently and inevitably provide students with a "label". Firstly, students are generally segregated and stigmatised as they are treated as a separate group that accessed university somewhat "illegitimately". Access programmes generally place more emphasis on academic development and in so doing seem to undermine the…

  13. 47 CFR 76.1707 - Leased access.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Leased access. 76.1707 Section 76.1707... CABLE TELEVISION SERVICE Documents to be Maintained for Inspection § 76.1707 Leased access. If a cable operator adopts and enforces a written policy regarding indecent leased access programming pursuant to §...

  14. 45 CFR 98.31 - Parental access.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Parental access. 98.31 Section 98.31 Public... Program Operations (Child Care Services)-Parental Rights and Responsibilities § 98.31 Parental access. The... assistance is provided afford parents unlimited access to their children, and to the providers caring...

  15. 23 CFR 658.19 - Reasonable access.

    Science.gov (United States)

    2010-04-01

    ... 23 Highways 1 2010-04-01 2010-04-01 false Reasonable access. 658.19 Section 658.19 Highways... AND WEIGHT, ROUTE DESIGNATIONS-LENGTH, WIDTH AND WEIGHT LIMITATIONS § 658.19 Reasonable access. (a) No State may enact or enforce any law denying reasonable access to vehicles with dimensions authorized...

  16. 7 CFR 400.407 - Restricted access.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Restricted access. 400.407 Section 400.407 Agriculture... Social Security Account Numbers and Employer Identification Numbers § 400.407 Restricted access. The Manager, other officer, or employee of FCIC or an authorized person may have access to the SSNs and...

  17. 40 CFR 35.6710 - Records access.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Records access. 35.6710 Section 35.6710... Requirements Under A Cooperative Agreement § 35.6710 Records access. (a) Recipient requirements. The recipient must comply with the requirements regarding records access described in 40 CFR 31.42(e)....

  18. 5 CFR 1205.14 - Granting access.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Granting access. 1205.14 Section 1205.14... Procedures for Obtaining Records § 1205.14 Granting access. (a) The Board may allow a requester to inspect... access to records may be accompanied by another individual of the requester's choice. Under...

  19. 30 CFR 57.11001 - Safe access.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Safe access. 57.11001 Section 57.11001 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR METAL AND NONMETAL MINE SAFETY AND... Travelways-Surface and Underground § 57.11001 Safe access. Safe means of access shall be provided...

  20. 47 CFR 69.114 - Special access.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Special access. 69.114 Section 69.114 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES (CONTINUED) ACCESS CHARGES Computation of Charges § 69.114 Special access. (a) Appropriate subelements shall be established for the...

  1. 29 CFR 18.56 - Restricted access.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Restricted access. 18.56 Section 18.56 Labor Office of the... ADMINISTRATIVE LAW JUDGES General § 18.56 Restricted access. On his or her own motion, or on the motion of any party, the administrative law judge may direct that there be a restricted access portion of the...

  2. 34 CFR 108.6 - Equal access.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Equal access. 108.6 Section 108.6 Education Regulations... ACCESS TO PUBLIC SCHOOL FACILITIES FOR THE BOY SCOUTS OF AMERICA AND OTHER DESIGNATED YOUTH GROUPS § 108.6 Equal access. (a) General. Consistent with the requirements of paragraph (b) of this section,...

  3. 28 CFR 68.51 - Restricted access.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Restricted access. 68.51 Section 68.51... ALIENS, UNFAIR IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.51 Restricted access. On... be a restricted access portion of the record to contain any material in the record to which...

  4. 30 CFR 56.11001 - Safe access.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Safe access. 56.11001 Section 56.11001 Mineral... HEALTH SAFETY AND HEALTH STANDARDS-SURFACE METAL AND NONMETAL MINES Travelways § 56.11001 Safe access. Safe means of access shall be provided and maintained to all working places....

  5. 47 CFR 73.1944 - Reasonable access.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Reasonable access. 73.1944 Section 73.1944... Rules Applicable to All Broadcast Stations § 73.1944 Reasonable access. (a) Section 312(a)(7) of the... or repeated failure to allow reasonable access to, or to permit purchase of, reasonable amounts...

  6. 40 CFR 35.935-7 - Access.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Access. 35.935-7 Section 35.935-7... ASSISTANCE Grants for Construction of Treatment Works-Clean Water Act § 35.935-7 Access. The grantee must insure that EPA and State representatives will have access to the project work whenever it is...

  7. 45 CFR 98.43 - Equal access.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Equal access. 98.43 Section 98.43 Public Welfare... Operations (Child Care Services)-Lead Agency and Provider Requirements § 98.43 Equal access. (a) The Lead... sufficient to ensure equal access, for eligible families in the area served by the Lead Agency, to child...

  8. 36 CFR 13.120 - Access.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 1 2010-07-01 2010-07-01 false Access. 13.120 Section 13.120... SYSTEM UNITS IN ALASKA Cabins General Provisions § 13.120 Access. (a) A permittee under this subpart who...) When issuing a permit under this subpart, the Superintendent shall provide for reasonable access...

  9. 37 CFR 251.22 - Public access.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Public access. 251.22 Section... ROYALTY PANEL RULES AND PROCEDURES COPYRIGHT ARBITRATION ROYALTY PANEL RULES OF PROCEDURE Public Access to and Inspection of Records § 251.22 Public access. (a) Location of records. All of the...

  10. Challenges in Database Design with Microsoft Access

    Science.gov (United States)

    Letkowski, Jerzy

    2014-01-01

    Design, development and explorations of databases are popular topics covered in introductory courses taught at business schools. Microsoft Access is the most popular software used in those courses. Despite quite high complexity of Access, it is considered to be one of the most friendly database programs for beginners. A typical Access textbook…

  11. Advanced Call Center Supporting WAP Access

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Traditional call centers can be accessed via speech only, and the call center based on web provides both data and speech access, but it needs a powerful terminal-computer. By analyzing traditional call centers and call centers based on web, this paper presents the framework of an advanced call center supporting WAP access. A typical service is also described in detail.

  12. Five Steps to an Accessible Classroom Website

    Science.gov (United States)

    Amundson, Linda

    2009-01-01

    When teachers or technology coordinators publish a website, they are providing a product for a diverse group of people. That's why website design should follow accessibility guidelines. Websites should be accessible to those with visual, hearing, movement, cognitive, and speech disabilities. Good design means greater accessibility for all. This…

  13. University Access, Inclusion and Social Justice

    Science.gov (United States)

    Hlalele, D.; Alexander, G.

    2012-01-01

    University access programmes inherently and inevitably provide students with a "label". Firstly, students are generally segregated and stigmatised as they are treated as a separate group that accessed university somewhat "illegitimately". Access programmes generally place more emphasis on academic development and in so doing…

  14. World Summit embraces Open Access, libraries

    CERN Multimedia

    Kaser, D

    2004-01-01

    "The long-anticipated "first phase" meeting of the World Summit on the Information Society (WSIS), held in Geneva in December, was supposed to have been about equal access. It turned out being equally about open access as leading scientific organizations pushed their open-access initiative onto the World Summit agenda" (1 page)

  15. Open Access Publishing: What Authors Want

    Science.gov (United States)

    Nariani, Rajiv; Fernandez, Leila

    2012-01-01

    Campus-based open access author funds are being considered by many academic libraries as a way to support authors publishing in open access journals. Article processing fees for open access have been introduced recently by publishers and have not yet been widely accepted by authors. Few studies have surveyed authors on their reasons for publishing…

  16. Cost Vs. Redundancy in FTTH Access Networks

    DEFF Research Database (Denmark)

    Haraldsson, Gustav Helgi; Pedersen, Jens Myrup

    2006-01-01

    This paper studies the feasibility of offering redundancy within the access network by planning an access network using the ear topology. This proposed network is compared to a traditional tree structured access network. The basic idea of the ear topology is to offer two individual fibers from se...

  17. Teach yourself visually Access 2013

    CERN Document Server

    McFedries, Paul

    2013-01-01

    The easy, visual way to learn this popular database program Part of the Office 2013 productivity suite, Access enables you to organize, present, analyze, and share data on a network or over the web. With this Visual guide to show you how, you'll master the fundamentals of this robust database application in no time. Clear, step-by-step instructions are illustrated with full-color screen shots that show exactly what you should see on your screen. Learn to enter new records; create, edit, and design tables and forms; develop queries that generate specific reports; add smart tags to y

  18. Accessing and using chemical databases

    DEFF Research Database (Denmark)

    Nikolov, Nikolai Georgiev; Pavlov, Todor; Niemelä, Jay Russell

    2013-01-01

    , and dissemination. Structure and functionality of chemical databases are considered. The typical kinds of information found in a chemical database are considered-identification, structural, and associated data. Functionality of chemical databases is presented, with examples of search and access types. More details...... are included about the OASIS database and platform and the Danish (Q)SAR Database online. Various types of chemical database resources are discussed, together with a list of examples.......Computer-based representation of chemicals makes it possible to organize data in chemical databases-collections of chemical structures and associated properties. Databases are widely used wherever efficient processing of chemical information is needed, including search, storage, retrieval...

  19. An optically accessible pyrolysis microreactor

    Energy Technology Data Exchange (ETDEWEB)

    Baraban, J. H.; Ellison, G. Barney [Department of Chemistry and Biochemistry, University of Colorado, Boulder, Colorado 80309 (United States); David, D. E. [Integrated Instrument Development Facility, CIRES, University of Colorado, Boulder, Colorado 80309-0216 (United States); Daily, J. W. [Department of Mechanical Engineering, University of Colorado at Boulder, Boulder, Colorado 80309 (United States)

    2016-01-15

    We report an optically accessible pyrolysis micro-reactor suitable for in situ laser spectroscopic measurements. A radiative heating design allows for completely unobstructed views of the micro-reactor along two axes. The maximum temperature demonstrated here is only 1300 K (as opposed to 1700 K for the usual SiC micro-reactor) because of the melting point of fused silica, but alternative transparent materials will allow for higher temperatures. Laser induced fluorescence measurements on nitric oxide are presented as a proof of principle for spectroscopic characterization of pyrolysis conditions.

  20. NASA studies access to space

    Science.gov (United States)

    Bekey, Ivan; Powell, Richard; Austin, Robery

    1994-01-01

    A comprehensive internal NASA study known as 'Access to Space' has sought to identify and assess major alternatives for the long-range direction the space transportation program should take. The scope of the study covered all U.S. civilian, commercial, and national security needs for space transportation for the next several decades. Three alternative approaches were identified: using current vehicles; developing new conventional technology vehicles, and developing new advanced technology vehicles. Large annual operations cost savings could be obtained only with new vehicles, and then only with considerable up-front investments. Seven other major factors were assessed. The third option is found to be the most attractive.

  1. Energy access and sustainable development

    Science.gov (United States)

    Kammen, Daniel M.; Alstone, Peter; Gershenson, Dimitry

    2015-03-01

    With 1.4 billion people lacking electricity to light their homes and provide other basic services, or to conduct business, and all of humanity (and particularly the poor) are in need of a decarbonized energy system can close the energy access gap and protect the global climate system. With particular focus on addressing the energy needs of the underserved, we present an analytical framework informed by historical trends and contemporary technological, social, and institutional conditions that clarifies the heterogeneous continuum of centralized on-grid electricity, autonomous mini- or community grids, and distributed, individual energy services. We find that the current day is a unique moment of innovation in decentralized energy networks based on super-efficient end-use technology and low-cost photovoltaics, supported by rapidly spreading information technology, particularly mobile phones. Collectively these disruptive technology systems could rapidly increase energy access, contributing to meeting the Millennium Development Goals for quality of life, while simultaneously driving action towards low-carbon, Earth-sustaining, energy systems.

  2. Medical records and access thereto.

    Science.gov (United States)

    McQuoid-Mason, D

    1996-01-01

    Medical records are essential tools in the practice of medicine. They are important in the planning and monitoring of patient care and for the protection of the legal interests of patients, hospitals and doctors. There is a legal duty on doctors to maintain confidentiality and failure to do so may result in an action for invasion of privacy, defamation or even breach of contract. There are, however, exceptions to this rule. There are procedural remedies available to obtain access to medical records where they are relevant to civil or criminal proceedings. There are also constitutional provisions under the Interim and Working Draft Constitutions which may allow such access. The former only applies to records held by the state while the latter applies to both state and privately held records. Ownership of medical records usually vests in the doctor or institution treating the patient, but such ownership is custodial rather than absolute. Patient records should be accurate, objective and contemporaneous. The international trend is to allow patients to inspect their records and to allow them to make copies thereof. It is submitted that given the provisions of the Interim and Working Draft Constitutions the same should apply in South Africa.

  3. High-impact open access journals

    OpenAIRE

    Vallez, Mari; Pagès i Camps, Gerard

    2014-01-01

    Poster presented in the LIBER 43rd Annual Conference. It is shown the tool "High-impact open access journals ¿" created by the Library of the Universitat Oberta de Catalunya. The tool gives access to open access journals listed in the Directory of Open Access Journals (DOAJ) with impact factor in the Journal Citation Reports 2011 or SCImago Journal Rank. Pòster presentat al LIBER 43rd Annual Conference. Es mostra l'eina "High-impact open access journals" creada per la Biblioteca de ...

  4. Access recirculation in a native fistula in spite of a seemingly adequate access flow

    NARCIS (Netherlands)

    Haas, Mark; Spargo, Benjamin H.; Wit, Ernst-Jan C.; Meehan, Shane M.

    2000-01-01

    True access recirculation (AR) measured by ultrasound dilution technique is usually absent in well-working shunts. It occurs with low access flows (Qa). High access flow rates are assumed to prevent AR. Two major exceptions to these rules are known: presence of intra-access strictures and inadverten

  5. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  6. Housing Accessibility Methodology Targeting Older People

    DEFF Research Database (Denmark)

    Helle, Tina

    accessibility problems before the planning of housing intervention strategies. It is also critical that housing standards addressing accessibility intended to accommodate people with functional limitations are valid in the sense that their definitions truly support accessibility. However, there is a paucity...... reasonably question the validity of the housing standards addressing accessibility. This thesis addresses housing accessibility methodology in general and the reliability of assessment and the validity of standards targeting older people with functional limitations and a dependence on mobility devices...... in particular. The overarching aim of the thesis was to develop and explore methods applicable for improving housing accessibility assessments and to explore feasible approaches to create housing standards that truly support accessibility and accommodate older people. A main methodological contribution...

  7. Digital autonomous terminal access communications

    Science.gov (United States)

    Novacki, S.

    1987-01-01

    A significant problem for the Bus Monitor Unit is to identify the source of a given transmission. This problem arises from the fact that the label which identifies the source of the transmission as it is put into the bus is intercepted by the Digital Autonomous Terminal Access Communications (DATAC) terminal and removed from the transmission. Thus, a given subsystem will see only data associated with a label and never the identifying label itself. The Bus Monitor must identify the source of the transmission so as to be able to provide some type of error identification/location in the event that some problem with the data transmission occurs. Steps taken to alleviate this problem by modifications to the DATAC terminal are discussed.

  8. Evaluating Accessible Synchronous CMC Applications

    CERN Document Server

    Lobo, Fernando G; Condado, Paulo A; Romão, Teresa; Godinho, Rui; Moreno, Manuel

    2010-01-01

    This paper proposes a more general evaluation methodology to measure the usability and user experience qualities of accessible synchronous computer-mediated communication applications. The proposed methodology goes beyond current practices by evaluating how the interaction between a user and a product influences the user experience of those at the other endpoint of the communication. Another contribution of the paper is the proposal of a user test where one of the participants tries to guess whether the other participant has a disability or not. An argument is made suggesting that the ultimate goal when designing real-time communication applications is to design mechanisms that can hide the disabilities of users, so that participants involved in the communication do not perceive the disabilities of each other. The proposed ideas are tested and validated with two examples of synchronous communication applications.

  9. Accessing social rights in Denmark

    DEFF Research Database (Denmark)

    Jacqueson, Catherine

    2015-01-01

    are in decreasing order Polish, German and British nationals. Debates among politicians reflected in the media have since the enlargement of the EU to 10 new Member States in 2004 focused on and off on the issue of access by migrants to social benefits and the issue of social tourism. The debate and discussions......, and the attitude of main actors, such as the media and political parties. It thus looks both at theory and practice. EU-based migration to Denmark is still relatively low, and is essentially exercised by workers and students. Apart from Scandinavians, the most representative EU-citizens actually living in Denmark......’s emphasizing that the existing law was incompatible with EU law, especially with Regulation 883/2004 on the coordination of social security schemes. While Denmark praises itself for being a good pupil in faithfully respecting and applying EU law, reality is another where EU law is seen as a threat...

  10. Open Access: (Social Sciences as Public Good

    Directory of Open Access Journals (Sweden)

    Katja Mruck

    2004-05-01

    Full Text Available The need to provide open access to articles published in peer-reviewed scholarly journals is becoming apparent to researchers as well as the non-scientific public as a result of "Budapest Open Access Initiative," the "Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities" and other initiatives. The core question that concerns open access is the following: since scientific information is usually financed by public funding, and therefore a public good, shouldn't the access be free of cost to all interested parties. Currently the open access movement is encountering the movement against the "Digital Divide," and therefore it is not surprising that the demand for open access has extended to a political level as reflected in the "WSIS Declaration of Principles" and the "WSIS Plan of Action." This article begins by providing a brief summary of the historical background of the open access movement and its major aims (Section 2. It then lists examples that explain possible links between the open access movement and the initiatives against the "Digital Divide" (Section 3. Section 4 considers some important barriers responsible for the fact that open access publishing is still not part of the everyday scientific publishing practices. This has various consequences. Selected consequences concerning the recent debate on redistribution processes between "information poor" and "information rich" are summarized in Section 5. URN: urn:nbn:de:0114-fqs0402141

  11. Comparing access for all: disability-induced accessibility disparity in Lisbon

    Science.gov (United States)

    Vale, David S.; Ascensão, Fernando; Raposo, Nuno; Figueiredo, António Pedro

    2017-01-01

    It is well known that individual impairments create disparities in the accessibility of individuals to opportunities, lengthening the distances or time needed to reach them or even completely impeding access. However, the accurate calculation and representation of these disparities remain a major challenge for urban and transportation planners. In this paper, we adopt the concept of accessibility disparity, originally applied to measure place accessibility by different modes of transport, to measure and represent the accessibility of individuals with physical disabilities compared to those without disabilities. We use spatial network analysis to calculate spatial connectivity and the accessibility of Lisbon's city center, revealing what we define as `disability-induced accessibility disparity'. Our results reveal not only the locations responsible for reduced accessibility, i.e., barriers and/or deterrents to movement, but also how much any given disparity reduces the accessibility of an individual, allowing the use of this methodology by planners to identify critical areas and to design inclusive public spaces.

  12. Web Accessibility - A timely recognized challenge

    CERN Document Server

    Qadri, Jameel A

    2011-01-01

    Web Accessibility for disabled people has posed a challenge to the civilized societies that claim to uphold the principles of equal opportunity and nondiscrimination. Certain concrete measures have been taken to narrow down the digital divide between normal and disabled users of Internet technology. The efforts have resulted in enactment of legislations and laws and mass awareness about the discriminatory nature of the accessibility issue, besides the efforts have resulted in the development of commensurate technological tools to develop and test the Web accessibility. World Wide Web consortium's (W3C) Web Accessibility Initiative (WAI) has framed a comprehensive document comprising of set of guidelines to make the Web sites accessible to the users with disabilities. This paper is about the issues and aspects surrounding Web Accessibility. The details and scope are kept limited to comply with the aim of the paper which is to create awareness and to provide basis for in-depth investigation.

  13. Perilous terra incognita--open-access journals.

    Science.gov (United States)

    Balon, Richard

    2014-04-01

    The author focuses on a new rapidly spreading practice of publication in open-access journals. The pros and cons of open-access journals are discussed. Publishing in these journals may be cost prohibitive for educators and junior faculty members. Some authors may be lured by the ease of publishing in open-access journals (and their, at times, inflated self-description, e.g., "international", "scientific"), and their possibly valuable contributions will escape the attention of Academic Psychiatry readership in the vast sea of open-access journals. The readership may be flooded with a large number of low-quality articles (maybe not even properly peer-reviewed) from open-access journals. It may take some time to sort out what is and what is not relevant and useful. Open-access publishing represents a problematic and controversial practice and may be associated with a conflict of interest for the editors and publishers of these journals.

  14. Reasons for not using intraosseous access in critical illness

    DEFF Research Database (Denmark)

    Hallas, Peter; Brabrand, Mikkel; Folkestad, Lars

    2012-01-01

    To identify reasons for not using intraosseous access (IO) when intravenous access is difficult during resuscitation.......To identify reasons for not using intraosseous access (IO) when intravenous access is difficult during resuscitation....

  15. Mapping City Accessibility: Review and Analysis.

    Science.gov (United States)

    Comai, Sara; Kayange, Daniel; Mangiarotti, Raffaella; Matteucci, Matteo; Ugur Yavuz, Secil; Valentini, Francesco

    2015-01-01

    The paper presents an analysis of prototypes, studies, and applications for the mapping of city accessibility, focusing mainly on sidewalks accessibility. Moreover, it presents the results of two focus groups that we organized both with electric and with manual wheelchairs to attain requirements and insights to design a user-friendly app for the collection and visualization of information about the accessibility of urban pedestrian pathways.

  16. Awareness of Turkish society about accessible tourism

    OpenAIRE

    2016-01-01

    Turkey is among the countries which cannot have a share of accessible tourism although it is challenging and has a big market in tourism. People with disabilities represent a significant market share and Turkey can have a share of this market to increase its tourism revenues. Aim of this study is to present the awareness level of Turkish society about accessible tourism. This study concluded that Turkish society has an awareness of accessible tourism, but tourism establishme...

  17. Processing keyword queries under access limitations

    OpenAIRE

    Calì, Andrea; Martinenghi, D.; Torlone, R.

    2015-01-01

    The Deep Web is constituted by data accessible through Web pages, but not readily indexable by search engines, as they are returned in dynamic pages. In this paper we propose a framework for accessing Deep Web sources, represented as relational tables with so-called access limitations, with keyword-based queries. We formalize the notion of optimal answer and propose methods for query processing. To the best of our knowledge, ours is the first systematic approach to keyword search in such cont...

  18. Energy Consumption of Wireless Network Access Points

    OpenAIRE

    ANDRADE MORELLI, SEBASTIÁN; RUIZ SANCHEZ, EDUARDO; GRANELL ROMERO, EMILIO; Lloret, Jaime

    2013-01-01

    2nd International Conference on Green Communications and Networking, GreeNets 2012; Gandia; Spain; 25 October 2012 through 26 October 2012 The development of low cost technology based on IEEE 802.11 standard permits to build telecommunication networks at low cost, allowing providing Internet access in rural areas in developing countries. The lack of access to the electrical grid is a problem when the network is being developed in rural areas, so that wireless access points should operate u...

  19. 5 CFR 1205.15 - Denying access.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Denying access. 1205.15 Section 1205.15... Procedures for Obtaining Records § 1205.15 Denying access. (a) Basis. In accordance with 5 U.S.C. 552a(k)(2), the Board may deny access to records that are of an investigatory nature and that are compiled for...

  20. Advanced Call Center Supporting WAP Access

    Institute of Scientific and Technical Information of China (English)

    YUANXiao-hua; CHENJun-liang

    2001-01-01

    Traditional call centers can be accessed via speech only, and the call center based on web provides both da-ta and speech access,but it needs a powerful terminal-computer.By analyzing traditional call centers and call cen-ters based on web, this paper presents the framework of an advanced call center supporting WAP access.A typical service is also described in detail.

  1. Optical Subsystems for Next Generation Access Networks

    DEFF Research Database (Denmark)

    Lazaro, J.A; Polo, V.; Schrenk, B.

    2011-01-01

    Recent optical technologies are providing higher flexibility to next generation access networks: on the one hand, providing progressive FTTx and specifically FTTH deployment, progressively shortening the copper access network; on the other hand, also opening fixed-mobile convergence solutions...... in next generation PON architectures. It is provided an overview of the optical subsystems developed for the implementation of the proposed NG-Access Networks....

  2. Achieving open access to conservation science.

    Science.gov (United States)

    Fuller, Richard A; Lee, Jasmine R; Watson, James E M

    2014-12-01

    Conservation science is a crisis discipline in which the results of scientific enquiry must be made available quickly to those implementing management. We assessed the extent to which scientific research published since the year 2000 in 20 conservation science journals is publicly available. Of the 19,207 papers published, 1,667 (8.68%) are freely downloadable from an official repository. Moreover, only 938 papers (4.88%) meet the standard definition of open access in which material can be freely reused providing attribution to the authors is given. This compares poorly with a comparable set of 20 evolutionary biology journals, where 31.93% of papers are freely downloadable and 7.49% are open access. Seventeen of the 20 conservation journals offer an open access option, but fewer than 5% of the papers are available through open access. The cost of accessing the full body of conservation science runs into tens of thousands of dollars per year for institutional subscribers, and many conservation practitioners cannot access pay-per-view science through their workplace. However, important initiatives such as Research4Life are making science available to organizations in developing countries. We urge authors of conservation science to pay for open access on a per-article basis or to choose publication in open access journals, taking care to ensure the license allows reuse for any purpose providing attribution is given. Currently, it would cost $51 million to make all conservation science published since 2000 freely available by paying the open access fees currently levied to authors. Publishers of conservation journals might consider more cost effective models for open access and conservation-oriented organizations running journals could consider a broader range of options for open access to nonmembers such as sponsorship of open access via membership fees.

  3. Database Access through Java Technologies

    Directory of Open Access Journals (Sweden)

    Nicolae MERCIOIU

    2010-09-01

    Full Text Available As a high level development environment, the Java technologies offer support to the development of distributed applications, independent of the platform, providing a robust set of methods to access the databases, used to create software components on the server side, as well as on the client side. Analyzing the evolution of Java tools to access data, we notice that these tools evolved from simple methods that permitted the queries, the insertion, the update and the deletion of the data to advanced implementations such as distributed transactions, cursors and batch files. The client-server architectures allows through JDBC (the Java Database Connectivity the execution of SQL (Structured Query Language instructions and the manipulation of the results in an independent and consistent manner. The JDBC API (Application Programming Interface creates the level of abstractization needed to allow the call of SQL queries to any DBMS (Database Management System. In JDBC the native driver and the ODBC (Open Database Connectivity-JDBC bridge and the classes and interfaces of the JDBC API will be described. The four steps needed to build a JDBC driven application are presented briefly, emphasizing on the way each step has to be accomplished and the expected results. In each step there are evaluations on the characteristics of the database systems and the way the JDBC programming interface adapts to each one. The data types provided by SQL2 and SQL3 standards are analyzed by comparison with the Java data types, emphasizing on the discrepancies between those and the SQL types, but also the methods that allow the conversion between different types of data through the methods of the ResultSet object. Next, starting from the metadata role and studying the Java programming interfaces that allow the query of result sets, we will describe the advanced features of the data mining with JDBC. As alternative to result sets, the Rowsets add new functionalities that

  4. Access to scientific publications: the scientist's perspective.

    Directory of Open Access Journals (Sweden)

    Yegor Voronin

    Full Text Available BACKGROUND: Scientific publishing is undergoing significant changes due to the growth of online publications, increases in the number of open access journals, and policies of funders and universities requiring authors to ensure that their publications become publicly accessible. Most studies of the impact of these changes have focused on the growth of articles available through open access or the number of open-access journals. Here, we investigated access to publications at a number of institutes and universities around the world, focusing on publications in HIV vaccine research--an area of biomedical research with special importance to the developing world. METHODS AND FINDINGS: We selected research papers in HIV vaccine research field, creating: 1 a first set of 50 most recently published papers with keywords "HIV vaccine" and 2 a second set of 200 articles randomly selected from those cited in the first set. Access to the majority (80% of the recently published articles required subscription, while cited literature was much more accessible (67% freely available online. Subscriptions at a number of institutions around the world were assessed for providing access to subscription-only articles from the two sets. The access levels varied widely, ranging among institutions from 20% to 90%. Through the WHO-supported HINARI program, institutes in low-income countries had access comparable to that of institutes in the North. Finally, we examined the response rates for reprint requests sent to corresponding authors, a method commonly used before internet access became widespread. Contacting corresponding authors with requests for electronic copies of articles by email resulted in a 55-60% success rate, although in some cases it took up to 1.5 months to get a response. CONCLUSIONS: While research articles are increasingly available on the internet in open access format, institutional subscriptions continue to play an important role. However

  5. BusinessUSA Resource Access API

    Data.gov (United States)

    General Services Administration — BusinessUSA connects businesses to government services and information. The API provides access to resource abstracts including programs, services, data, events, and...

  6. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  7. The LHC access system LACS and LASS

    CERN Document Server

    Ninin, P

    2005-01-01

    The LHC complex is divided into a number of zones with different levels of access controls.Inside the interlocked areas, the personnel protection is ensured by the LHC Access System.The system is made of two parts:the LHC Access Safety System and the LHC Access Control System. During machine operation,the LHC Access Safety System ensures the collective protection of the personnel against the radiation hazards arising from the operation of the accelerator by interlocking the LHC key safety elements. When the beams are off, the LHC Access Control System regulates the access to the accelerator and its many subsystems.It allows a remote, local or automatic operation of the access control equipment which verifies and identifies all users entering the controlled areas.The global architecture of the LHC Access System is now designed and is being validated to ensure that it meets the safety requirements for operation of the LHC.A pilot installation will be tested in the summer 2005 to validate the concept with the us...

  8. EQUITABLE ACCESS TO HEALTH SERVICE IN BANYUWANGI

    Directory of Open Access Journals (Sweden)

    Lusi Herawati Sunyoto Usman Mark Zuidgeest

    2012-06-01

    as indicators. Flowmap tool is used to analyze catchment area of each health facility using different transport modes choice:becak and public transport for poor group and motorcycle and car for non-poor group with different travel time within 30, 60 and more than 60 minutes. It is concluded that there was an accessibility difference between poor and non-poor group. The accessibility to the health facilities of poor group was lower than non-poor group. This condition occurred because the government policy of equitable access to health service facility did not pay attention to accessibility of poor group.

  9. Managing Delegation in Access Control Models

    CERN Document Server

    Ghorbel-Talbi, Meriam Ben; Cuppens-Boulahia, Nora; Bouhoula, Adel; 10.1109/ADCOM.2007.105

    2010-01-01

    In the field of access control, delegation is an important aspect that is considered as a part of the administration mechanism. Thus, a complete access control must provide a flexible administration model to manage delegation. Unfortunately, to our best knowledge, there is no complete model for describing all delegation requirements for role-based access control. Therefore, proposed models are often extended to consider new delegation characteristics, which is a complex task to manage and necessitate the redefinition of these models. In this paper we describe a new delegation approach for extended role-based access control models. We show that our approach is flexible and is sufficient to manage all delegation requirements.

  10. Monitoring and Surveillance of Hemodialysis Access.

    Science.gov (United States)

    Koirala, Nischal; Anvari, Evamaria; McLennan, Gordon

    2016-03-01

    Access surveillance using invasive or noninvasive methods with an objective to improve access patency and decrease hospital admissions for access dysfunction in dialysis population has been promoted, but its success to predict incipient thrombosis and subsequent access failure is a controversial topic. Some studies have shown improvement in access outcomes, while others have failed to demonstrate an ideal method to diagnose access problems. Furthermore, the use of endovascular interventions such as percutaneous transluminal angioplasty to timely correct access problem might itself be a promoter of neointimal hyperplasia and restenosis during balloon angioplasty. There are significant costs and efforts associated with routine dialysis surveillance; therefore, it is necessary to understand whether such programs will help improve access-related problems and guarantee adequate dialysis care. It is generally agreed upon that despite the lack of guaranteed success of surveillance, such strategies have helped improve dialysis management, resulted in decreased costs and hospitalizations, and represented clinically relevant indications of failure prior to planning any radiological or surgical intervention. In this study, the authors review monitoring and surveillance measures in place, and their associated merits and limitations to detect stenosis and prevent incidences of vascular access thrombosis.

  11. Approaches to Open Access in Scientific Publishing

    CERN Document Server

    Harnad, J

    2008-01-01

    Approaches to scientific journal publishing that provide free access to all readers are challenging the standard subscription-based model. But in domains that have a well-functioning system of publicly accessible preprint repositories like arXiv, Open Access is already effectively available. In physics, such repositories have long coexisted constructively with refereed, subscription based journals. Trying to replace this by a system based on journals whose revenue is derived primarily from fees charged to authors is unlikely to provide a better guarantee of Open Access, and may be in conflict with the maintenance of high quality standards.

  12. Open access: changing global science publishing.

    Science.gov (United States)

    Gasparyan, Armen Yuri; Ayvazyan, Lilit; Kitas, George D

    2013-08-01

    The article reflects on open access as a strategy of changing the quality of science communication globally. Successful examples of open-access journals are presented to highlight implications of archiving in open digital repositories for the quality and citability of research output. Advantages and downsides of gold, green, and hybrid models of open access operating in diverse scientific environments are described. It is assumed that open access is a global trend which influences the workflow in scholarly journals, changing their quality, credibility, and indexability.

  13. EASIER ACCESS TO STANDARDS DOCUMENTATION

    CERN Multimedia

    2001-01-01

    Many organizations issuing standards offer reduced prices for publications to their members. Paying a membership fee, even a site membership fee, can therefore be worthwhile - even if relatively few standards are needed. The Library is now exploring the possibility, in collaboration with the rest of the CERN community, of joining standards-issuing organizations. So why not share your costs with the rest of the organization wherever this can be done without violating copyright or access regulations? The Library now provides documentation and other member services from IPC, the Association Connecting Electronics Industries (http://www.ipc.org/html/fsabout.htm) at favourable prices for the entire CERN population. For more information, or if you are a member of any other organization which provides services which could be shared CERN-wide, please contact library.desk@cern.ch . We remind all users of international standards, that CERN has special agreements with ISO and IEC (see Bulletin 50/2000). You can order st...

  14. Worldwide open access: UK leadership?

    Directory of Open Access Journals (Sweden)

    Stevan Harnad

    2013-03-01

    Full Text Available The web is destined to become humankind's cognitive commons, where digital knowledge is jointly created and freely shared. The UK has been a leader in the global movement toward open access (OA to research but recently its leadership has been derailed by the joint influence of the publishing industry lobby from without and well-intentioned but premature and unhelpful over-reaching from within the OA movement itself. The result has been the extremely counterproductive ‘Finch Report’ followed by a new draft of the Research Councils UK (RCUK OA mandate, downgrading the role of cost-free OA self-archiving of research publications (‘green OA’ in favor of paying subscription publishers over and above subscriptions, out of scarce research funds, in exchange for making single articles OA (‘hybrid gold OA’. The motivation of the new policy is to reform publication and to gain certain re-use rights (CC-BY, but the likely effect would be researcher resistance, very little OA and a waste of research funds. There is still time to fix the RCUK mandate and restore the UK's leadership by taking a few very specific steps to clarify and strengthen the green component by adding a mechanism for monitoring and verifying compliance, with consequences for non-compliance, along lines also being adopted in the EC and the US.

  15. ACCESS Sub-system Performance

    Science.gov (United States)

    Kaiser, Mary Elizabeth; Morris, Matthew J.; Aldoroty, Lauren Nicole; Godon, David; Pelton, Russell; McCandliss, Stephan R.; Kurucz, Robert L.; Kruk, Jeffrey W.; Rauscher, Bernard J.; Kimble, Randy A.; Wright, Edward L.; Benford, Dominic J.; Gardner, Jonathan P.; Feldman, Paul D.; Moos, H. Warren; Riess, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, William Van Dyke; Sahnow, David J.; Lampton, Michael; Perlmutter, Saul

    2016-01-01

    ACCESS: Absolute Color Calibration Experiment for Standard Stars is a series of rocket-borne sub-orbital missions and ground-based experiments designed to leverage significant technological advances in detectors, instruments, and the precision of the fundamental laboratory standards used to calibrate these instruments to enable improvements in the precision of the astrophysical flux scale through the transfer of laboratory absolute detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass.A cross wavelength calibration of the astrophysical flux scale to this level of precision over this broad a bandpass is relevant for the data used to probe fundamental astrophysical problems such as the SNeIa photometry based measurements used to constrain dark energy theories.We will describe the strategy for achieving this level of precision, the payload and calibration configuration, present sub-system test data, and the status and preliminary performance of the integration and test of the spectrograph and telescope. NASA APRA sounding rocket grant NNX14AH48G supports this work.

  16. 47 CFR 15.609 - Marketing of Access BPL equipment.

    Science.gov (United States)

    2010-10-01

    ... Section 15.609 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Access Broadband Over Power Line (Access BPL) § 15.609 Marketing of Access BPL equipment. The marketing of Access... consist of AC power line public utilities, Access BPL service providers and associates of Access...

  17. Access Denied! Contrasting Data Access in the United States and Ireland

    Directory of Open Access Journals (Sweden)

    Grogan Samuel

    2016-07-01

    Full Text Available The ability of an Internet user to access data collected about himself as a result of his online activity is a key privacy safeguard. Online, data access has been overshadowed by other protections such as notice and choice. This paper describes attitudes about data access. 873 US and Irish Internet users participated in a survey designed to examine views on data access to information held by online companies and data brokers. We observed low levels of awareness of access mechanisms along with a high desire for access in both participant groups. We tested three proposed access systems in keeping with industry programs and regulatory proposals. User response was positive. We conclude that access remains an important privacy protection that is inadequately manifested in practice. Our study provides insight for lawmakers and policymakers, as well as computer scientists who implement these systems.

  18. Availability, Access, Authenticity, and Persistence: Creating the Environment for Permanent Public Access to Electronic Government Information.

    Science.gov (United States)

    Barnum, George

    2002-01-01

    Discusses efforts by the Federal Depository Library Program to make information accessible more or mostly by electronic means. Topics include Web-based locator tools; collection development; digital archives; bibliographic metadata; and access tools and user interfaces. (Author/LRW)

  19. Implementation of Flexible Access System

    Science.gov (United States)

    Wu, Chen-Hsiang; Peng, Jan-Wen; Shao, Shou-Kuo; Chen, Tzooming E.; Chen, Shih Chang; Lee, Meng-Shu; Yen, K.-Y.; Chen, Tsung-Mao; Wang, Ching Sheu; Tu, Yuan-Kuang

    1998-06-01

    In this paper we present the architecture, operation, and the implementation of a prototype system, flexible access system (FAS), developed by CHT T.L. for FITL applications. FAS adopts fiber to the curb (FTTC) topology and provides POTS, ISDN BRA, and T1 services. The system consists of three main parts, namely, fiber central office terminal (FCOT) at switch side, fiber nodes (FN) at customer side, and a monitor station. FCOT and FNs are connected through an STM-1 fiber distribution ring. The hardware structure and the operation principle for each module are described. FAS contains the mux-demux module, POTS, ISDN, and T1 central office/customer service modules, operation modules, and power module. In the design, each central office service module in FCOT simulates as a CPE to terminate signals from switch, and will separate the data and signaling and map them into DS1 format. Mux/demux module will add/drop these DS1, put the operation information in data communication channel (DCC), and convert them to STM-1 optical link. Each customer service module in FN simulates switch line cart to regenerate the signal for customers. The prototype system implementation confirms the benefits of introducing SDH add/drop technologies to FITL system to provide basic telecommunication services. The design experience reveals that the clock synchronization method and noise reduction technique can significantly influence the performance in such a system. The test results that demonstrate and verify the designed functionality and the service quality of the prototype system will be presented.

  20. Health Care Access among Deaf People

    Science.gov (United States)

    Kuenburg, Alexa; Fellinger, Paul; Fellinger, Johannes

    2016-01-01

    Access to health care without barriers is a clearly defined right of people with disabilities as stated by the UN Convention on the Rights of People with Disabilities. The present study reviews literature from 2000 to 2015 on access to health care for deaf people and reveals significant challenges in communication with health providers and gaps in…

  1. 20 CFR 655.550 - Public access.

    Science.gov (United States)

    2010-04-01

    ... Activities in U.S. Ports Public Access § 655.550 Public access. (a) Public examination at ETA. ETA shall make... this subpart, and for each such employer, a copy of the employer's attestation and accompanying documentation it has received. (b) Notice to public. ETA periodically shall publish a list in the...

  2. Web browser accessibility using open source software

    NARCIS (Netherlands)

    Obrenovic, Z.; Ossenbruggen, J.R. van

    2007-01-01

    A Web browser provides a uniform user interface to different types of information. Making this interface universally accessible and more interactive is a long term goal still far from being achieved. Universally accessible browsers require novel interaction modalities and additional functionalities,

  3. Open Access op de kaart gezet

    NARCIS (Netherlands)

    den Hollander, Franciscus

    2010-01-01

    Open Access, de vrije toegang tot wetenschappelijke informatie, wint terrein: informatie is in toenemende mate openbaar toegankelijk. Het Open Accessjaar 2009 werd op 2 februari van dit jaar afgesloten met een drukbezocht symposium in de Beurs van Berlage in Amsterdam. Dat Open Access nu echt op de

  4. Management Strategies in Hemodialysis Vascular Access

    NARCIS (Netherlands)

    J. van der Linden (Joke)

    2006-01-01

    textabstractSince the introduction of the AV fistula and the use of interposition graft little improvement has been made in the vascular access field. Still, vascular access related complications, are one of the most important reasons for patient hospitalization, morbidity and even mortality (1,2)

  5. Particle physicists want to expand open access

    CERN Multimedia

    Kaiser, Jocelyn

    2006-01-01

    "Particle physicists have come up with a novel way to promote free, immediate access to journal articles. Led by CERN, the gian lab near Geneva, Switzerland, they want to raise at least $6 million a year to begin buying open access to all published papers in their field." (1 page)

  6. Particle physicists want to expand open access

    CERN Multimedia

    Kaiser, Jocelyn

    2006-01-01

    "Particle physicists have come up with a novel way to promote free, immediate access to journal articles. Led by CERN, the giant lab near Geneva, Switzerland, thay want to raise at lesat $6 million a year to begin buying open access to all published papers in their field." (1/2 page)

  7. 36 CFR 1275.26 - Access procedures.

    Science.gov (United States)

    2010-07-01

    ... present during, each search necessary to comply with an authorized access under § 1275.32 or § 1275.34. (e) Only NARA archivists shall conduct searches necessary to comply with authorized accesses under §§ 1275... documentary Presidential historical materials shall be provided to comply with a subpoena or other...

  8. Thoracic aorta stent grafting through transapical access.

    NARCIS (Netherlands)

    Saouti, N.; Vos, J.A.; Heuvel, D. van de; Morshuis, W.J.; Heijmen, R.H.

    2015-01-01

    BACKGROUND: To describe the transapical approach for thoracic endovascular aortic repair (TEVAR). METHODS: Three patients, 2 elective and 1 emergent, with thoracic aorta aneurysm are described with vascular or direct aortic inaccessible access, who underwent TEVAR through transapical access. The tec

  9. 77 FR 26213 - Access Authorization Fees

    Science.gov (United States)

    2012-05-03

    ... current cost for the program. Copies of the current NRC material access authorization fee may be obtained... reflect the current cost for the program. Copies of the current NRC access authorization fee may be...). The amended cost is due to an increase in the review time for each application for...

  10. Access to Information in the Nordic Countries

    DEFF Research Database (Denmark)

    Jørgensen, Oluf

    Access to Information in the Nordic Countries explains and compares the legal rules determining public access to documents and data in Sweden, Finland, Denmark, Norway, and Iceland. In addition, international rules emanating from the United Nations, the Council of Europe and the European Union ar...

  11. String Analysis for Dynamic Field Access

    DEFF Research Database (Denmark)

    Madsen, Magnus; Andreasen, Esben

    2014-01-01

    In JavaScript, and scripting languages in general, dynamic field access is a commonly used feature. Unfortunately, current static analysis tools either completely ignore dynamic field access or use overly conservative approximations that lead to poor precision and scalability. We present new stri...

  12. Calculating True Computer Access in Schools.

    Science.gov (United States)

    Slovacek, Simeon P.

    1992-01-01

    Discusses computer access in schools; explains how to determine sufficient quantities of computers; and describes a formula that illustrates the relationship between student access hours, the number of computers in a school, and the number of instructional hours in a typical school week. (six references) (LRW)

  13. Reducing Tariffs According to WTO Accession Rules

    DEFF Research Database (Denmark)

    Fosse, Henrik Barslund; Raimondos-Møller, Pascalis

    2012-01-01

    When Vietnam joined the World Trade Organization (WTO) in 2007 it was granted an accession period up to 2014. During this period tariffs would have to fall according to the accession agreement. This paper evaluates this 2007–2014 trade liberalization by building an applied general equilibrium model...

  14. Easy Access: Auditing the System Network

    Science.gov (United States)

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  15. Child Health and Access to Medical Care

    Science.gov (United States)

    Leininger, Lindsey; Levy, Helen

    2015-01-01

    It might seem strange to ask whether increasing access to medical care can improve children's health. Yet Lindsey Leininger and Helen Levy begin by pointing out that access to care plays a smaller role than we might think, and that many other factors, such as those discussed elsewhere in this issue, strongly influence children's health.…

  16. 20 CFR 655.350 - Public access.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Public access. 655.350 Section 655.350 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR TEMPORARY EMPLOYMENT OF... Nurses § 655.350 Public access. (a) Public examination at ETA. ETA shall make available for...

  17. 45 CFR 707.8 - Physical access.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Physical access. 707.8 Section 707.8 Public... § 707.8 Physical access. (a) Discrimination prohibited. Except as otherwise provided in this section, no... facilities-program access—(1) Existing facilities defined. For the purpose of this section,...

  18. 5 CFR 1320.14 - Public access.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Public access. 1320.14 Section 1320.14 Administrative Personnel OFFICE OF MANAGEMENT AND BUDGET OMB DIRECTIVES CONTROLLING PAPERWORK BURDENS ON THE PUBLIC § 1320.14 Public access. (a) In order to enable the public to participate in and provide...

  19. Lower Extremity Permanent Dialysis Vascular Access.

    Science.gov (United States)

    Parekh, Vishal B; Niyyar, Vandana D; Vachharajani, Tushar J

    2016-09-07

    Hemodialysis remains the most commonly used RRT option around the world. Technological advances, superior access to care, and better quality of care have led to overall improvement in survival of patients on long-term hemodialysis. Maintaining a functioning upper extremity vascular access for a prolonged duration continues to remain a challenge for dialysis providers. Frequently encountered difficulties in clinical practice include (1) a high incidence of central venous catheter-related central vein stenosis and (2) limited options for creating a functioning upper extremity permanent arteriovenous access. Lack of surgical skills, fear of complications, and limited involvement of the treating nephrologists in the decision-making process are some of the reasons why lower extremity permanent dialysis access remains an infrequently used option. Similar to upper extremity vascular access options, lower extremity arteriovenous fistula remains a preferred access over arteriovenous synthetic graft. The use of femoral tunneled catheter as a long-term access should be avoided as far as possible, especially with the availability of newer graft-catheter hybrid devices. Our review provides a summary of clinical evidence published in surgical, radiology, and nephrology literature highlighting the pros and cons of different types of lower extremity permanent dialysis access.

  20. Prevention and treatment of hemodialysis access thrombosis

    NARCIS (Netherlands)

    Smits, Johannes Henricus Maria

    2001-01-01

    Thrombosis of the vascular access is the main problem in hemodialysis therapy for end-stage renal disease. In most cases, thrombosis is associated with the presence of one or more stenoses in the access. These stenoses are due to progressive neointimal hyperplasia. In this thesis, methods are descri

  1. 34 CFR 300.613 - Access rights.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false Access rights. 300.613 Section 300.613 Education... § 300.613 Access rights. (a) Each participating agency must permit parents to inspect and review any... pursuant to § 300.510, and in no case more than 45 days after the request has been made. (b) The right...

  2. Accessibility of MOOCs: Understanding the Provider Perspective

    Science.gov (United States)

    Iniesto, Francisco; McAndrew, Patrick; Minocha, Shailey; Coughlan, Tim

    2016-01-01

    Massive Online Open Courses (MOOCs) have become an accepted way to make learning opportunities available at large scale and with low cost to the learner. However, only if these are made accessible will they be able to offer flexibility of learning and benefits to all, irrespective of disability. Experience in providing accessible online learning…

  3. Remote Access M\\"ossbauer Spectrometry

    CERN Document Server

    Silaev, A A; Postnikov, E B; Radchenko, V V; Silaev, A A

    2015-01-01

    The authors' design for a M\\"ossbauer spectroscopy unit accessed via the Internet is presented. The spectrometer's configuration, operational peculiarities, key specifications, and remote access procedures are described. More detailed educational, scientific, and technical information can be found at the project's official website http://www.efmsb.ru

  4. True Public Access Defibrillator Coverage is Overestimated

    NARCIS (Netherlands)

    Sun, Christopher L.F.; Demirtas, Derya; Brooks, Steven C.; Morrison, Laurie J.; Chan, Timothy C.Y.

    2015-01-01

    Background: Out-of-hospital cardiac arrests (OHCAs) occur at all times of the day and night. Immediate access to an AED increases survival. However, most public-location AEDs are placed in buildings without 24 hour access. Objective: To measure fixed-location public AED coverage of OHCAs by time

  5. Development of Disruptive Open Access Journals

    Science.gov (United States)

    Anderson, Terry; McConkey, Brigette

    2009-01-01

    Open access (OA) publication has emerged, with disruptive effects, as a major outlet for scholarly publication. OA publication is usually associated with on-line distribution and provides access to scholarly publications to anyone, anywhere--regardless of their ability to pay subscription fees or their association with an educational institution.…

  6. Experimenteren met een Open Access Fonds

    NARCIS (Netherlands)

    De Leeuwe, J.; Versteeg, A.M.C.

    2012-01-01

    Om Open Access onder de eigen medewerkers te promoten, beschikt TU Delft over een Open Access Fonds. Wat heeft dit fonds de afgelopen jaren opgeleverd? Anke Versteeg en Just de Leeuwe bespreken de resultaten en belichten en passant ook nieuwe ontwikkelingen. Engelse versie is zonder tabellen en nie

  7. Open Access, Education Research, and Discovery

    Science.gov (United States)

    Furlough, Michael

    2010-01-01

    Background/Context: The open access movement has successfully drawn attention to economic and political aspects of scholarly communication through a significant body of commentary that debates the merits of open access and the potential damage it may do to scholarly publishing. Researchers within the field of education research, notably John…

  8. A New Era of Open Access?

    Science.gov (United States)

    Mercieca, Paul; Macauley, Peter

    2008-01-01

    There has been a push for open access journals for more than a decade in a higher education and research environment in which the "publish or perish" syndrome is as dominant as ever. This article examines the success, or otherwise, of open access schemes in light of the Excellence in Research for Australia (ERA) initiative. It compares…

  9. Librarians and Libraries Supporting Open Access Publishing

    Science.gov (United States)

    Richard, Jennifer; Koufogiannakis, Denise; Ryan, Pam

    2009-01-01

    As new models of scholarly communication emerge, librarians and libraries have responded by developing and supporting new methods of storing and providing access to information and by creating new publishing support services. This article will examine the roles of libraries and librarians in developing and supporting open access publishing…

  10. Open Access and Civic Scientific Information Literacy

    Science.gov (United States)

    Zuccala, Alesia

    2010-01-01

    Introduction: We examine how residents and citizens of The Netherlands perceive open access to acquire preliminary insight into the role it might play in cultivating civic scientific literacy. Open access refers to scientific or scholarly research literature available on the Web to scholars and the general public in free online journals and…

  11. Open-Access Electronic Textbooks: An Overview

    Science.gov (United States)

    Ovadia, Steven

    2011-01-01

    Given the challenging economic climate in the United States, many academics are looking to open-access electronic textbooks as a way to provide students with traditional textbook content at a more financially advantageous price. Open access refers to "the free and widely available information throughout the World Wide Web. Once an article's…

  12. Open Access to Mexican Academic Production

    Science.gov (United States)

    Adame, Silvia I.; Llorens, Luis

    2016-01-01

    This paper presents a description of the metadata harvester software development. This system provides access to reliable and quality educational resources, shared by Mexican Universities through their repositories, to anyone with Internet Access. We present the conceptual and contextual framework, followed by the technical basis, the results and…

  13. Open Access publicering på Metropol

    DEFF Research Database (Denmark)

    Azbi, Trine; Larsen, Bente; Møbjerg, Anna Christine Meinertz

    2016-01-01

    Resultater af en afdækning og analyse af Open Access (OA) publicering på Professionshøjskolen Metropol......Resultater af en afdækning og analyse af Open Access (OA) publicering på Professionshøjskolen Metropol...

  14. Open Access policy guidelines for research institutions

    OpenAIRE

    PASTEUR4OA

    2015-01-01

    This presentation draws on the Policy Guidelines for institutions. The guidelines aim to assist in the development of efficient Open Access policies among institutions. They provide the context, the process and a model policy (template) that will enable [funders/institutions] to develop and implement their own Open Access policy

  15. Open Access policy guidelines for research funders

    OpenAIRE

    PASTEUR4OA

    2015-01-01

    This presentation draws on the Policy Guidelines for funders. The guidelines aim to assist in the development of efficient Open Access policies among funders. They provide the context, the process and a model policy (template) that will enable [funders/institutions] to develop and implement their own Open Access policy

  16. 18 CFR 3a.41 - Access requirements.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Access requirements. 3a.41 Section 3a.41 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY GENERAL RULES NATIONAL SECURITY INFORMATION Access to Classified Materials §...

  17. Surveillance and Monitoring of Dialysis Access

    Directory of Open Access Journals (Sweden)

    Lalathaksha Kumbar

    2012-01-01

    Full Text Available Vascular access is the lifeline of a hemodialysis patient. Currently arteriovenous fistula and graft are considered the permanent options for vascular access. Monitoring and surveillance of vascular access are an integral part of the care of hemodialysis patient. Although different techniques and methods are available for identifying access dysfunction, the scientific evidence for the optimal methodology is lacking. A small number of randomized controlled trials have been performed evaluating different surveillance techniques. We performed a study of the recent literature published in the PUBMED, to review the scientific evidence on different methodologies currently being used for surveillance and monitoring and their impact on the care of the dialysis access. The limited randomized studies especially involving fistulae and small sample size of the published studies with conflicting results highlight the need for a larger multicentered randomized study with hard clinical end points to evaluate the optimal surveillance strategy for both fistula and graft.

  18. Data access service of China-VO

    Science.gov (United States)

    Sang, Jian; Zhao, Yong-Heng; Cui, Chen-Zhou

    2004-09-01

    With the development of technologies and the implementation of large quantity of astronomical observation projects, astronomy faces data avalanche and has entered an information era. A basic aim of the Virtual Observatory is to provide uniform access to highly distributed, complicated, huge astronomical datasets, and to realize federation of global astronomical data resources, so that astronomers can obtain required data efficiently and conveniently for their research. China Virtual Observatory (China-VO) project designs and implements astronomical data access services based on Grid technology, and provides uniform interface to Grid client application. In this paper, we introduce the data access service toolkit development using Globus Toolkit, the Grid services encapsulation of catalogs according to the latest astronomical data standards recommended by International Virtual Observatory Alliance, the implements of catalog Cone Search access service. Furthermore, we also introduce how to construct other Grid services using above data access services.

  19. Accessibility: global gateway to health literacy.

    Science.gov (United States)

    Perlow, Ellen

    2010-01-01

    Health literacy, cited as essential to achieving Healthy People 2010's goals to "increase quality and years of healthy life" and to "eliminate health disparities," is defined by Healthy People as "the degree to which individuals have the capacity to obtain, process, and understand basic health information and services needed to make appropriate health decisions." Accessibility, by definition, the aforementioned "capacity to obtain," thus is health literacy's primary prerequisite. Accessibility's designation as the global gateway to health literacy is predicated also on life's realities: global aging and climate change, war and terrorism, and life-extending medical and technological advances. People with diverse access needs are health professionals' raison d'être. However, accessibility, consummately cross-cultural and universal, is virtually absent as a topic of health promotion and practice research and scholarly discussion of health literacy and equity. A call to action to place accessibility in its rightful premier position on the profession's agenda is issued.

  20. [The publishing industry against open access journals].

    Science.gov (United States)

    Camargo Junior, Kenneth Rochel de

    2012-12-01

    Open-access journal publishing has significantly grown in recent years. Restricted access publications have, in turn, increasing access costs as they benefit from a unique economic model in which relevant work and essential inputs are provided free of charge to vendors who have a captive market that has almost no competition. An additional issue typical of industries that work under the copyright regime is that the oligopoly market structure of the publishing industry which in turn further contributes to increase their products' prices. Mandatory open-access policies, as determined by the NIH, constitute a threat to this business model and are being challenged by the industry on several fronts, including the passage of legislation to undermine these initiatives. The purpose of this commentary article was to review key aspects of this confrontation and to suggest potential strategies for encouraging open-access publishing in Brazil.

  1. Expanding access to published research: open access and self-archiving.

    Science.gov (United States)

    Mower, Allyson; Youngkin, Mary E

    2008-03-01

    Academic libraries traditionally provide access to the life science journal literature for their respective institutions by purchasing annual subscriptions to journals. However, with skyrocketing subscription prices and decreased or flattened library budgets, fewer journals are being purchased. This trend results in diminished access to the literature for members of that institution. Open access and self-archiving are possible solutions to this crisis.

  2. Open Access Scholarly Publications as OER

    Directory of Open Access Journals (Sweden)

    Terry Anderson

    2013-06-01

    Full Text Available This paper presents the rationale, common practices, challenges, and some personal anecdotes from a journal editor on the production, use, and re-use of peer-reviewed scholarly articles as open educational resources (OER. The scholarly and professional discourse related to open educational resources has largely focused on open learning objects, courseware, and textbooks. However, especially in graduate education, articles published in scholarly journals are often a major component of the course content in formal education. In addition, open access journal articles are critical to expanding access to knowledge by scholars in the developing world and in fostering citizen science, by which everyone has access to the latest academic information and research results. In this article, I highlight some of the challenges, economic models, and evidence for quality of open access journal content and look at new affordances provided by the Net for enhanced functionality, access, and distribution.In the 17 years since I graduated with a doctorate degree, the climate and acceptance of open access publishing has almost reversed itself. I recall a conversation with my PhD supervisor in which he argued that publishing online was not a viable option as the product would not have permanency, scholarly recognition, or the prestige of a paper publication. His comments reflect the confusion between online resources and those described as open access, but as well illustrate the change in academic acceptance and use of open access products during the past decade. The evolution from paper to online production and consumption is a disruptive technology in which much lower cost and increased accessibility of online work opens the product to a completely new group of potential users. In the case of OER these consumers are primarily students, but certainly access to scholars from all parts of the globe and the availability to support citizen science (Silvertown, 2009

  3. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  4. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  5. Lexical semantic access and letter access are involved in different aspects of reading

    DEFF Research Database (Denmark)

    Poulsen, Mads

    Purpose: This study investigated the effects of lexical access speed and letter access speed on reading fluency and reading comprehension. We hypothesized that 1) letter access speed would correlate with reading fluency but not comprehension, while 2) lexical access speed would influence reading...... comprehension. For readers who are struggling with recoding, most of the reading effort is probably tied up with recoding, leaving little to be explained by lexical access. Therefore we expected that 3) lexical access speed would primarily predict reading fluency for readers who were no longer struggling...... with recoding. Method: 85 Grade 5 students completed tasks of reading accuracy, fluency, and comprehension. In addition they were tested on isolated letter naming and isolated picture naming tasks as measures of letter and lexical access speed. All items in both naming tasks were unique. Parallel serial rapid...

  6. Does momentary accessibility influence metacomprehension judgments? The influence of study-judgment lags on accessibility effects.

    Science.gov (United States)

    Baker, Julie M C; Dunlosky, John

    2006-02-01

    In two experiments, we investigated momentary accessibility as a basis for metacomprehension judgments. Momentary accessibility has been cited as a major contributor to these judgments, yet the only previous investigation on the topic used judgments that were delayed a day after study, which have not been used in any other studies in the field and may be necessary for demonstrating accessibility-based effects. As expected, Experiment 1 demonstrated that the time between study and judgments moderates accessibility effects, with the relationship between judgments and access measures being substantially greater for delayed than for immediate judgments. Experiment 2 ruled out a plausible artifactual interpretation for accessibility effects on delayed judgments. In the discussion, we explore why study-judgment lags moderate accessibility effects.

  7. BEACON FRAME MANIPULATION TO MITIGATE ROGUE ACCESS POINTS: CASE OF ANDROID SMARTPHONE ROGUE ACCESS POINTS

    Directory of Open Access Journals (Sweden)

    Thambo Nyathi

    2015-11-01

    Full Text Available The use of wireless devices to access corporate network resources is now part of the norm within corporate environments. When wireless users need to connect to a network they hardly question the source of their connectivity. Mobile phones, particularly smartphones allow users to access network resources. These harmless looking wireless devices can be a source of major threats if configured to be so. The Internet is awash with mobile apps capable of performing packet sniffing. These applications, coupled with the capability of the smartphone to be configured as an access point, can present a Smartphone Rogue Access Point. Access Points advertise their availability using what is called a beacon frame. This research paper proposes a solution which restructures this beacon frame to include an Authentic Access Point Value which can be used to defend against Rogue Access Points.

  8. Web Accessibility in Romania: The Conformance of Municipal Web Sites to Web Content Accessibility Guidelines

    Directory of Open Access Journals (Sweden)

    Costin PRIBEANU

    2012-01-01

    Full Text Available The accessibility of public administration web sites is a key quality attribute for the successful implementation of the Information Society. The purpose of this paper is to present a second review of municipal web sites in Romania that is based on automated accessibility checking. A number of 60 web sites were evaluated against WCAG 2.0 recommendations. The analysis of results reveals a relatively low web accessibility of municipal web sites and highlights several aspects. Firstly, a slight progress in web accessibility was noticed as regarded the sample evaluated in 2010. Secondly, the number of specific accessibility errors is varying across the web sites and the accessibility is not preserved in time. Thirdly, these variations suggest that an accessibility check before launching a new release for a web page is not a common practice.

  9. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  10. Open Access Policy for CERN Physics Publications

    CERN Multimedia

    2014-01-01

    CERN is committed to Open Access. It represents one of the values written in our Convention sixty years ago and is increasingly important for our Member States.   In the last edition of the Bulletin, this article described how CERN is doing with regards to open access publishing today. On Thursday this week, the Open Access Policy for CERN Physics Publications* was endorsed by the Scientific Information Policy Board (SIPB) and approved by the Director-General the same day . For any clarifications regarding the policy, please contact the Scientific Information Service library.desk@cern.ch. * A French version of the policy will be made available shortly.

  11. Open access in the critical care environment.

    Science.gov (United States)

    South, Tabitha; Adair, Brigette

    2014-12-01

    Open access has become an important topic in critical care over the last 3 years. In the past, critical care had restricted access and set visitation guidelines to protect patients. This article provides a review of the literature related to open access in the critical care environment, including the impact on patients, families, and health care providers. The ultimate goal is to provide care centered on patients and families and to create a healing environment to ensure safe passage of patients through their hospital stays. This outcome could lead to increased patient/family satisfaction.

  12. 41 CFR 51-9.303-3 - Granting access.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Granting access. 51-9.303...-Individual Access to Records § 51-9.303-3 Granting access. (a) Upon receipt of a request for access to non...) If an individual's request for access does not contain sufficient information to permit the...

  13. Standardization of broadband radio access networks

    Science.gov (United States)

    Kruys, Jan; Haine, John

    1998-09-01

    This paper introduces the ETSI Project on Broadband Radio Access Networks (EP-BRAN). BRAN systems will be used for local area applications with limited mobility (HIPERLAN/2); fixed access with area coverage in urban and rural areas (HIPERACCESS); and short range high-speed point-to-point links (HIPERLINK). They will support transport of either IP or ATM protocols, supporting managed quality of service. Such systems are needed to provide access to the future broadband core networks supporting multi-media applications. The paper addresses the motivation and market demand for broadband radio access networks, the objectives and scope of the Project, the operational and technical requirements, the types of networks to be standardized, the scope of the standards, the issue of spectrum and the Project schedule.

  14. Seamless access to OER with mobile technologies

    NARCIS (Netherlands)

    Tabuenca, Bernardo

    2014-01-01

    This presentation provides insight on how ubiquitous technology can support lifelong learners facilitating access across context. The 3LHub tool is presented as suitable tool to scaffold personal learning ecologies.

  15. Open Access publishing in physics gains momentum

    CERN Multimedia

    2006-01-01

    The first meeting of European particle physics funding agencies took place on 3 November at CERN to establish a consortium for Open Access publishing in particle physics, SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). Open Access could transform the academic publishing world, with a great impact on research. The traditional model of research publication is funded through reader subscriptions. Open Access will turn this model on its head by changing the funding structure of research results, without increasing the overall cost of publishing. Instead of demanding payment from readers, publications will be distributed free of charge, financed by funding agencies via laboratories and the authors. This new concept will bring greater benefits and broaden opportunities for researchers and funding agencies by providing unrestricted distribution of the results of publicly funded research. The meeting marked a positive step forward, with international support from laboratories, fundin...

  16. Accelerating global access to plant diversity information.

    Science.gov (United States)

    Lughadha, Eimear Nic; Miller, Chuck

    2009-11-01

    Botanic gardens play key roles in the development and dissemination of plant information resources. Drivers for change have included progress in information technology, growing public expectations of electronic access and international conservation policy. Great advances have been made in the quantity, quality and accessibility of plant information in digital form and the extent to which information from multiple providers can be accessed through a single portal. However, significant challenges remain to be addressed in making botanic gardens resources maximally accessible and impactful, not least the overwhelming volume of material which still awaits digitisation. The year 2010 represents an opportunity for botanic gardens to showcase their collaborative achievements in delivery of electronic plant information and reinforce their relevance to pressing environmental issues.

  17. Minnesota Walk-In Access Sites

    Data.gov (United States)

    Minnesota Department of Natural Resources — The Minnesota Walk-In Access site (WIA) GIS data represents areas of private land that have been made open to the public for the purpose of walk-in (foot travel)...

  18. Environmental Research Division's Data Access Program (ERDDAP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — ERDDAP (the Environmental Research Division's Data Access Program) is a data server that gives you a simple, consistent way to download subsets of scientific...

  19. Validation of Housing Standards Addressing Accessibility

    DEFF Research Database (Denmark)

    Helle, Tina

    2013-01-01

    The aim was to explore the use of an activity-based approach to determine the validity of a set of housing standards addressing accessibility. This included examination of the frequency and the extent of accessibility problems among older people with physical functional limitations who used...... participant groups were examined. Performing well-known kitchen activities was associated with accessibility problems for all three participant groups, in particular those using a wheelchair. The overall validity of the housing standards examined was poor. Observing older people interacting with realistic...... no mobility device (n = 10) or who used a wheelchair (n = 10) or a rollator (n = 10). The setting was a kitchen designed according to present housing standards. The participants prepared lunch in the kitchen. Accessibility problems were assessed by observation and self-report. Differences between the three...

  20. Rail Access to Yucca Mountain: Critical Issues

    Energy Technology Data Exchange (ETDEWEB)

    Halstead, R. J.; Dilger, F.; Moore, R. C.

    2003-02-25

    The proposed Yucca Mountain repository site currently lacks rail access. The nearest mainline railroad is almost 100 miles away. Absence of rail access could result in many thousands of truck shipments of spent nuclear fuel and high-level radioactive waste. Direct rail access to the repository could significantly reduce the number of truck shipments and total shipments. The U.S. Department of Energy (DOE) identified five potential rail access corridors, ranging in length from 98 miles to 323 miles, in the Final Environmental Impact Statement (FEIS) for Yucca Mountain. The FEIS also considers an alternative to rail spur construction, heavy-haul truck (HHT) delivery of rail casks from one of three potential intermodal transfer stations. The authors examine the feasibility and cost of the five rail corridors, and DOE's alternative proposal for HHT transport. The authors also address the potential for rail shipments through the Las Vegas metropolitan area.

  1. Decision Analysis of Dynamic Spectrum Access Rules

    Energy Technology Data Exchange (ETDEWEB)

    Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

    2011-12-01

    A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

  2. CDC STATE System Tobacco Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  3. Digitisation for access to preserved documents

    Directory of Open Access Journals (Sweden)

    Majlis Bremer-Laamanen

    2003-06-01

    Full Text Available Today the digitisation of our collections is a goal for libraries all over Europe. The choices we make in digitisation and preservation now will have a significant impact on the future. Do we only emphasise access? How do we enable access and preserve our originals in a qualitative and productive way? What will actually be left of our cultural heritage in the next millennium? In this paper I am going to look at promoting access to preserved originals mirrored by the experience at the Helsinki University Library, the National Library of Finland: · Preservation activities as platform for digitisation and OCR · Processing access to collections · The future - looking ahead

  4. Opportunistic Interference Alignment for Random Access Networks

    OpenAIRE

    Jin, Hu; Jeon, Sang-Woon; Jung, Bang Chul

    2015-01-01

    An interference management problem among multiple overlapped random access networks (RANs) is investigated, each of which operates with slotted ALOHA protocol. Assuming that access points and users have multiple antennas, a novel opportunistic interference alignment~(OIA) is proposed to mitigate interference among overlapped RANs. The proposed technique intelligently combines the transmit beamforming technique at the physical layer and the opportunistic packet transmission at the medium acces...

  5. Determinants of Internet access in Colombia

    OpenAIRE

    Botello Peñaloza, Héctor Alberto

    2016-01-01

    Objective: to identify the determinants of Internet access in Colombian homes during 2013.Methodology: Socioeconomic characteristics were incorporated within a discrete choice model in order to estimate the probability of Internet access in Colombian households. It was based on microdata from the quality of life survey conducted by DANE (The National Administrative Department of Statistics).Results: a marked increase in the use of Internet in Colombia was found: in 2007, 17% of Colombians had...

  6. Web accessibility and open source software.

    Science.gov (United States)

    Obrenović, Zeljko

    2009-07-01

    A Web browser provides a uniform user interface to different types of information. Making this interface universally accessible and more interactive is a long-term goal still far from being achieved. Universally accessible browsers require novel interaction modalities and additional functionalities, for which existing browsers tend to provide only partial solutions. Although functionality for Web accessibility can be found as open source and free software components, their reuse and integration is complex because they were developed in diverse implementation environments, following standards and conventions incompatible with the Web. To address these problems, we have started several activities that aim at exploiting the potential of open-source software for Web accessibility. The first of these activities is the development of Adaptable Multi-Interface COmmunicator (AMICO):WEB, an infrastructure that facilitates efficient reuse and integration of open source software components into the Web environment. The main contribution of AMICO:WEB is in enabling the syntactic and semantic interoperability between Web extension mechanisms and a variety of integration mechanisms used by open source and free software components. Its design is based on our experiences in solving practical problems where we have used open source components to improve accessibility of rich media Web applications. The second of our activities involves improving education, where we have used our platform to teach students how to build advanced accessibility solutions from diverse open-source software. We are also partially involved in the recently started Eclipse projects called Accessibility Tools Framework (ACTF), the aim of which is development of extensible infrastructure, upon which developers can build a variety of utilities that help to evaluate and enhance the accessibility of applications and content for people with disabilities. In this article we briefly report on these activities.

  7. Integrated Access to Hybrid Information Resources

    OpenAIRE

    Tamar Sadeh

    2003-01-01

    This paper is entitled "Integrated access to hybrid information resources", but integrated access is just a means to reach an end. Our challenge is to create an integrated environment in a heterogeneous world. Users are not aware, and do not want to be aware, of the differences between the various information resources that their institution provides. All they want is to be able to attain the information they are looking for, in the simplest and most straightforward way possible.

  8. Access 2007 for Starters: The Missing Manual

    CERN Document Server

    MacDonald, Matthew

    2009-01-01

    This fast-paced book teaches you the basics of Access 2007 so you can start using the program right away. You'll learn how to design databases, maintain them, search for valuable nuggets of information, and build attractive forms for quick-and-easy data entry. The new Access is radically different from previous versions, but with this book, you'll breeze through the new interface and its timesaving features in no time.

  9. Travel Time Variability and Airport Accessibility

    OpenAIRE

    Koster, P.R.; Kroes, E.P.; Verhoef, E.T.

    2010-01-01

    This discussion paper resulted in a publication in Transportation Research Part B: Methodological (2011). Vol. 45(10), pages 1545-1559. This paper analyses the cost of access travel time variability for air travelers. Reliable access to airports is important since it is likely that the cost of missing a flight is high. First, the determinants of the preferred arrival times at airports are analyzed, including trip purpose, type of airport, flight characteristics, travel experience, type of che...

  10. Open Access Publishing: A Literature Review

    OpenAIRE

    Frosio, Giancarlo; Derclaye, Estelle

    2014-01-01

    Within the context of the Centre for Copyright and New Business Models in the Creative Economy (CREATe) research scope, this literature review investigates the current trends, advantages, disadvantages, problems and solutions, opportunities and barriers in Open Access Publishing (OAP), and in particular Open Access (OA) academic publishing.  This study is intended to scope and evaluate current theory and practice concerning models for OAP and engage with intellectual, legal and economic ...

  11. Karyotypic characterization of Capsicum sp. accessions

    OpenAIRE

    Willame Rodrigues do Nascimento Souza; Angela Celis de Almeida; Reginaldo de Carvalho; Regina Lúcia Ferreira; Ana Paula Peron

    2015-01-01

    This study aimed to determine the chromosome number and the karyotype of Capsicum annuum, Capsicum chinense, Capsicum frutencens and Capsicum baccatum accessions in the active Capsicum sp. genebank at the Federal University of Piauí (BGC-UFPI). These species have great economic importance throughout the world, and their cytogenetic characterization can inform taxonomy and lead to improvement in the genus. Karyotypes were obtained from the rootlet meristems of the studied accessions using...

  12. Audio description as an accessibility enhancer

    OpenAIRE

    Martins, Cláudia Susana Nunes

    2012-01-01

    Audio description for the blind and visually-impaired has been around since people have described what is seen. Throughout time, it has evolved and developed in different contexts, starting with daily life, moving into the cinema and television, then across other performing arts, museums and galleries, historical sites and public places. Audio description is above all an issue of accessibility and of providing visually-impaired people with the same rights to have access to culture, e...

  13. Open access and scholarly communication, part 4

    CERN Document Server

    Eden, Brad

    2009-01-01

    This fourth e-book on the subject of open access in the academic field includes a Latin American case study on open access penetration, a paper from Germany on the promotion of OA illustrated by a project at the University of Konstanz, and a case study on OA at Bioline International, a non-profit scholarly publications aggregator, distributor, publisher and publishing assistance service.

  14. Access to bank finance for Scottish SMEs.

    OpenAIRE

    2008-01-01

    There is evidence that some SMEs may still face difficulties in accessing bank finance from lenders (CEEDR, 2007). This paper reports an in-depth study into demand and supply side issues relating to access to bank finance by Scottish SMEs and whether there is still market failure associated with good, bankable business cases from SMEs that do not receive finance. We argue that our study utilises innovative methodology and is relatively rare as a robust study in this area. We combine demand...

  15. Universal access through biometrics in mobile scenarios

    OpenAIRE

    Sanchez-Reillo, Raul; Blanco-Gonzalo, Ramon; Liu-Jimenez, Judith; López García, Mariano; Camós Andreu, Carles

    2013-01-01

    The main aim of this paper is the development of a new technology for biometric recognition that allows safe and secure access to universal services such as credit card payment, ATMs, access control, border control, etc. The technology being developed is very generic and ea sily adaptable to the specific particularities of disabled people; a collective that represents an important proportion of current po pulation (e.g. about the 9% of the total Spanish populatio...

  16. Park Accessibility Impacts Housing Prices in Seoul

    Directory of Open Access Journals (Sweden)

    Jin Han Park

    2017-01-01

    Full Text Available Housing prices are determined by a variety of factors, including the features of the building and the neighborhood environment, and a potential buyer decides to buy a house after reviewing these factors and concluding that it is worth the price. We used Hedonic Price Methods to find the relationship between monetary value of house and access conditions to urban parks. Two meaningful results were discovered in this study: first, as the distance from the park increases, the value of the park inherent in the housing price decreases; second, the greater walking accessibility, to the park, the higher the park value inherent in housing prices. Despite presenting shorter distances to walk and more entrances, poorly accessible zones were deemed as such due to the necessity of crossing an arterial road. This indicates that the results can define accessibility not as the Euclidian distance but as the shortest walking distance while considering crossroads and park entrances. The results of this study have significant implications for urban park economic impact analyses in Seoul. Also, the increase in housing prices closer to parks supports the idea that access is dependent on the residents’ socioeconomic status. Lastly, the results of this study can improve walking accessibility to the park.

  17. Vascular access considerations for therapeutic apheresis procedures.

    Science.gov (United States)

    Okafor, Chidi; Kalantarinia, Kambiz

    2012-01-01

    The success of therapeutic apheresis (TA), similar to hemodialysis, depends on the integrity of the extracorporeal circuit as well as a reliable vascular access. However, unlike hemodialysis, which requires high flow of blood around 400 mL/minute through the extracorporeal circuit for effective clearance, TA is usually carried out with much lower blood flow rates (<100 ml/minute). Therefore, even peripheral venous access can be considered for TA. The main determinants of the choice of vascular access for TA is the duration of the planned treatment and, to a certain degree, the indication for its use. While peripheral venous access and temporary central venous catheters are sufficient for short-term TA, tunnelled catheters and arteriovenous fistulae (AVF) are usually used for long-term treatments. Because of the large body of evidence in the hemodialysis literature on the advantages of AVF over tunnelled catheters and AV grafts, they should be considered as the preferred access for chronic TA as well. However, advance planning for the care of AVF after creation is of critical importance especially since many of the healthcare providers dealing with TA are less familiar with caring for AVF than nephrologists and dialysis nurses. In this article we first review the similarities and differences between HD and TA procedures. The pros and cons of different vascular access options are discussed next. Finally, we have included a list of recommendations on maintenance of AVF created for TA based on our own experience.

  18. The linked medical data access control framework.

    Science.gov (United States)

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios.

  19. Open Access kortlægning 2011

    DEFF Research Database (Denmark)

    Elbæk, Mikael; Hansen, Tove Juul; Larsen, Asger V.

    Denne rapport viser, at det faglige domæne er en meget stærk faktor i forhold til, hvor stor en andel af forskningsoutputtet, der er open access. Rapporten viser, at der er forskelle mellem universiteterne som ikke alene kan forklares med faglige faktorer, men forklaringerne må findes andre steder......, det kunne være lokale procedurer, kultur eller strukturer (politikker). Dette tager rapporten dog ikke stilling til. Andelen af gylden open access ligger relativt stabilt på tværs af universiteterne, med en andel mellem 6 – 10 % af den samlede publicering i peer reviewede tidsskrifter. Dermed er grøn...... open access den væsentligste faktor som adskiller universiteternes samlede open access andel. Endvidere viser rapporten, at der er et meget stort uudnyttet open access potentiale på alle universiteterne. Faktisk kunne mere end 5.000 flere BFI-pointgivende artikler være open access, dvs. at 71 % af det...

  20. The ethics of open access publishing.

    Science.gov (United States)

    Parker, Michael

    2013-03-22

    Should those who work on ethics welcome or resist moves to open access publishing? This paper analyses arguments in favour and against the increasing requirement for open access publishing and considers their implications for bioethics research. In the context of biomedical science, major funders are increasingly mandating open access as a condition of funding and such moves are also common in other disciplines. Whilst there has been some debate about the implications of open-access for the social sciences and humanities, there has been little if any discussion about the implications of open access for ethics. This is surprising given both the central role of public reason and critique in ethics and the fact that many of the arguments made for and against open access have been couched in moral terms. In what follows I argue that those who work in ethics have a strong interest in supporting moves towards more open publishing approaches which have the potential both to inform and promote richer and more diverse forms of public deliberation and to be enriched by them. The importance of public deliberation in practical and applied ethics suggests that ethicists have a particular interest in the promotion of diverse and experimental forms of publication and debate and in supporting new, more creative and more participatory approaches to publication.

  1. Assessment method of accessibility conditions: how to make public buildings accessible?

    Science.gov (United States)

    Andrade, Isabela Fernandes; Ely, e Vera Helena Moro Bins

    2012-01-01

    The enforcement of accessibility today has faced several difficulties, such as intervention in historic buildings that now house public services and cultural activities, such as town halls, museums and theaters and should allow access, on equal terms to all people. The paper presents the application of a method for evaluating the spatial accessibility conditions and their results. For this, we sought to support the theoretical foundation about the main issue involved and legislation. From the method used--guided walks--it was possible to identify the main barriers to accessibility in historic buildings. From the identified barriers, possible solutions are presented according to the four components of accessibility: spatial orientation, displacement, use and communication. It is hoped also that the knowledge gained in this research contributes to an improvement of accessibility legislation in relation to the listed items.

  2. Using Accession to investigate accessibility induced social exclusion in Edinburgh and the Lothians

    OpenAIRE

    Weir, Andrew

    2008-01-01

    An exploratory analysis of accessibility-based social exclusionary mechanisms in Edinburgh and the Lothians is presented, with the aim of highlighting the benefits of a technique that incorporates socio-geodemographic variables. Accession software is used to produce accessibility times to three different types of services. Postcode centroids are used to represent centres of population, while the Navteq road network and latest public transport timetables are used to model the transport network...

  3. Uplink Access Schemes for LTE-Advanced

    Science.gov (United States)

    Liu, Le; Inoue, Takamichi; Koyanagi, Kenji; Kakura, Yoshikazu

    The 3GPP LTE-Advanced has been attracting much attention recently, where the channel bandwidth would be beyond the maximum bandwidth of LTE, 20MHz. In LTE, single carrier-frequency division multiple access (SC-FDMA) was accepted as the uplink access scheme due to its advantage of very low cubic metric (CM). For LTE-A wideband transmission, multicarrier access would be more effective than single carrier access to make use of multi-user diversity and can maintain the physical channel structure of LTE, where the control information is transmitted on the edges of each 20MHz. In this paper, we discuss the access schemes in bandwidth under 20MHz as well as over 20MHz. In the case of bandwidth under 20MHz, we propose the access schemes allowing discontinuous resource allocation to enhance average throughput while maintaining cell-edge user throughput, that is, DFT-spread-OFDM with spectrum division control (SDC) and adaptive selection of SC-FDMA and OFDM (SC+OFDM). The number of discontinuous spectrums is denoted as spectrum division (SD). For DFT-S-OFDM, we define a parameter max SD as the upper limit of SD. We evaluate our proposed schemes in bandwidth under 20MHz and find that SC+OFDM as well as SDC with common max SD or UE-specific max SD can improve average throughput while their cell-edge user throughput can approach that of SC-FDMA. In the case of bandwidth over 20MHz, we consider key factors to decide a feasible access scheme for aggregating several 20MHz-wide bands.

  4. Cognitive Access to TVWS in India

    DEFF Research Database (Denmark)

    Patil, Kishor P.; Skouby, Knud Erik; Prasad, Ramjee

    2013-01-01

    The digital transition of TV transmission will make available some TV frequencies which are to be geographically unused called as TV White Spaces. The important regulatory trend in the context of Dynamic Spectrum Access (DSA) is the Cognitive access of TV white Spaces. In this context, we have pe...... of India, we have proposed wireless broadband access to rural areas using TV White Spaces (TVWSs). This will help in bridging the digital divide by offering governance, banking, and health services online in the rural areas.......The digital transition of TV transmission will make available some TV frequencies which are to be geographically unused called as TV White Spaces. The important regulatory trend in the context of Dynamic Spectrum Access (DSA) is the Cognitive access of TV white Spaces. In this context, we have...... performed spectrum measurements of TV band in Pune, India. Our result shows poor spectrum utilization in TV band, and good potential for Cognitive radio operation. Digital switchover in India will generate golden opportunity for empowering rural India. As majority of India’s population lives in rural part...

  5. Accessing antiretroviral therapy for children: Caregivers' voices

    Directory of Open Access Journals (Sweden)

    Margaret (Maggie Williams

    2016-12-01

    Full Text Available Despite efforts to scale up access to antiretroviral therapy (ART, particularly at primary health care (PHC facilities, antiretroviral therapy (ART continues to be out of reach for many human immunodeficiency virus (HIV-positive children in sub-Saharan Africa. In resource limited settings decentralisation of ART is required to scale up access to essential medication. Traditionally, paediatric HIV care has been provided in tertiary care facilities which have better human and material resources, but limited accessibility in terms of distance for caregivers of HIV-positive children. The focus of this article is on the experiences of caregivers whilst accessing ART for HIV-positive children at PHC (decentralised care facilities in Nelson Mandela Bay (NMB in the Eastern Cape, South Africa. A qualitative, explorative, descriptive and contextual research design was used. The target population comprised caregivers of HIV-positive children. Data were collected by means of in-depth individual interviews, which were thematically analysed. Guba's model was used to ensure trustworthiness. Barriers to accessing ART at PHC clinics for HIV-positive children included personal issues, negative experiences, lack of support and finance, stigma and discrimination. The researchers recommend standardised programmes be developed and implemented in PHC clinics to assist in providing treatment, care and support for HIV-positive children.

  6. NESDIS OSPO Data Access Policy and CRM

    Science.gov (United States)

    Seybold, M. G.; Donoho, N. A.; McNamara, D.; Paquette, J.; Renkevens, T.

    2012-12-01

    The Office of Satellite and Product Operations (OSPO) is the NESDIS office responsible for satellite operations, product generation, and product distribution. Access to and distribution of OSPO data was formally established in a Data Access Policy dated February, 2011. An extension of the data access policy is the OSPO Customer Relationship Management (CRM) Database, which has been in development since 2008 and is reaching a critical level of maturity. This presentation will provide a summary of the data access policy and standard operating procedure (SOP) for handling data access requests. The tangential CRM database will be highlighted including the incident tracking system, reporting and notification capabilities, and the first comprehensive portfolio of NESDIS satellites, instruments, servers, applications, products, user organizations, and user contacts. Select examples of CRM data exploitation will show how OSPO is utilizing the CRM database to more closely satisfy the user community's satellite data needs with new product promotions, as well as new data and imagery distribution methods in OSPO's Environmental Satellite Processing Center (ESPC). In addition, user services and outreach initiatives from the Satellite Products and Services Division will be highlighted.

  7. A secure solution on hierarchical access control

    CERN Document Server

    Wei, Chuan-Sheng; Huang, Tone-Yau; Ong, Yao Lin

    2011-01-01

    Hierarchical access control is an important and traditional problem in information security. In 2001, Wu et.al. proposed an elegant solution for hierarchical access control by the secure-filter. Jeng and Wang presented an improvement of Wu et. al.'s method by the ECC cryptosystem. However, secure-filter method is insecure in dynaminc access control. Lie, Hsu and Tripathy, Paul pointed out some secure leaks on the secure-filter and presented some improvements to eliminate these secure flaws. In this paper, we revise the secure-filter in Jeng-Wang method and propose another secure solutions in hierarchical access control problem. CA is a super security class (user) in our proposed method and the secure-filter of $u_i$ in our solutions is a polynomial of degree $n_i+1$ in $\\mathbb{Z}_p^*$, $f_i(x)=(x-h_i)(x-a_1)...(x-a_{n_i})+L_{l_i}(K_i)$. Although the degree of our secure-filter is larger than others solutions, our solution is secure and efficient in dynamics access control.

  8. Venous access: options, approaches and issues

    Energy Technology Data Exchange (ETDEWEB)

    Asch, M.R. [Univ. of Toronto, Mount Sinai Hospital, Dept. of Medical Imaging, Toronto, Ontario (Canada)

    2001-06-01

    Venous access is an essential part of medical practice. It is needed to obtain blood samples to make the diagnosis and to administer fluids or medicines as part of treatment. Although relatively new in the history of medicine, the placement and maintenance of the various venous access devices now occupies a significant portion of many vascular and interventional radiology practices. Thus, it is important to have a thorough understanding of these devices and their uses. The first long-term venous access devices were used in 1973. These were placed via a surgical cut-down on the subclavian vein. In 1982, the first subcutaneous implantable ports were described. These procedures were initially performed by surgeons, but over the last 5-10 years, both the insertion and management of these devices has shifted to interventional radiologists. Peripherally inserted central catheter (PICC) lines have almost completely supplanted the use of standard central lines (Fig. 1). A number of factors have facilitated this - namely, ready and less expensive room access, outpatient procedure and radiologists' accessibility and familiarity with image-guidance procedures and catheters and guide wires. (author)

  9. Ad Hoc Access Gateway Selection Algorithm

    Science.gov (United States)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  10. Access to Space Interactive Design Web Site

    Science.gov (United States)

    Leon, John; Cutlip, William; Hametz, Mark

    2000-01-01

    The Access To Space (ATS) Group at NASA's Goddard Space Flight Center (GSFC) supports the science and technology community at GSFC by facilitating frequent and affordable opportunities for access to space. Through partnerships established with access mode suppliers, the ATS Group has developed an interactive Mission Design web site. The ATS web site provides both the information and the tools necessary to assist mission planners in selecting and planning their ride to space. This includes the evaluation of single payloads vs. ride-sharing opportunities to reduce the cost of access to space. Features of this site include the following: (1) Mission Database. Our mission database contains a listing of missions ranging from proposed missions to manifested. Missions can be entered by our user community through data input tools. Data is then accessed by users through various search engines: orbit parameters, ride-share opportunities, spacecraft parameters, other mission notes, launch vehicle, and contact information. (2) Launch Vehicle Toolboxes. The launch vehicle toolboxes provide the user a full range of information on vehicle classes and individual configurations. Topics include: general information, environments, performance, payload interface, available volume, and launch sites.

  11. Access to surgical assistance: challenges and perspectives

    Directory of Open Access Journals (Sweden)

    Maria Fernanda do Prado Tostes

    2016-01-01

    Full Text Available Objective to characterize the access to surgical assistance in Brazil. Method documentary study, with a quantitative approach, developed from information of the Caixa Preta da Saúde [Health Black Box] database, of the Brazilian Medical Association. Results in the one-year period 3773 cases related to health care in Brazil were recorded. There were 458 (12.3% records on surgical assistance. Of these, most, 339 (74.1%, involved the lack of access in all regions of Brazil. The main access constraint was the prolonged waiting time for surgery. Other constraints were the excessive waiting for medical appointment with experts, doing examinations and cancellation of surgeries. Conclusion the access to surgical assistance, by users of the Brazilian health system, is not widely guaranteed, reinforcing the need for integrated governmental actions, organization of the health care network, management of health care and human resources to overcome the challenges imposed to achieve the Universal Access to Health and Universal Health Coverage.

  12. Accessibility mapping in cultural public buildings

    Directory of Open Access Journals (Sweden)

    Luciene Gomes

    2016-07-01

    Full Text Available Objective: This study analyzed issues regarding accessibility in cultural facilities and aimed to analyze accessibility in the municipal cultural institutions and two districts of São Paulo state. Method: All cultural buildings were visited and, using a checklist based on the Brazilian Association of Technical Standards (NBR 9050, 2004, the public spaces were classed as adequate or inadequate with respect to their accessibility to people with a visual and physical disability. The data collected was subjected to descriptive analysis by scoring the most common accessibility resources, their adequacy as well as the resources not installed. Results: The results show that all the external and internal areas of the analyzed buildings need for adaptations, installations or the building of equipment that allows the physically or visually disabled to interact with the environment in the chosen cultural spaces. The work showed that the best evaluated item were the ramps and the worst was the tactile map, absent in all buildings. Conclusion: The data show the “state of the art” in the chosen city and discussed the difficulties in the implementation of Brazilian Association of Technical standards, both in construction and in the adaptations, pointing new accessibility concerns on the studied cities.

  13. Airport Surface Access and Mobile Apps

    Directory of Open Access Journals (Sweden)

    Luis Martin-Domingo

    2015-02-01

    Full Text Available Purpose: Airport Surface Access faces two main opposite issues: (1 cars, being the main transport mode, contribute to the increasing level of congestion and pollution of cities; and (2 simultaneously, parking fees are one important source of airports commercial revenue, creating a dilemma for airports when facing the problem. Following the recent trend of air passengers travelling with Smartphone (78% in 2013, the purpose of this paper is to monitor the adoption of mobile Applications (Apps by airports and to analyze if the information and functions provided in those Apps can help to overcome the above two issues. Design/methodology/approach: 31 iPhone App of some of the largest European airports were evaluated in the lab using the evaluation model of Destinations Mobile Applications (Scolari and Fernández-Cavia 2014 adapted for for the Airport Surface Access on Airport Apps Findings and Originality/value: The Apps evaluated provided a very limited functionality to help passengers to plan and book their trips to/from the airports on public transports and gave high priority to parking information and services. Originality/value: Although Airport Surface Access has been a widely researched, the originality of this paper is the analysis of airport mobile Apps as a potential tool for airports to deal with the surface airport access problems.Access, Airports, Mobile Internet, Commercial Revenues

  14. New Insights into Dialysis Vascular Access: What Is the Optimal Vascular Access Type and Timing of Access Creation in CKD and Dialysis Patients?

    Science.gov (United States)

    Woo, Karen; Lok, Charmaine E

    2016-08-08

    Optimal vascular access planning begins when the patient is in the predialysis stages of CKD. The choice of optimal vascular access for an individual patient and determining timing of access creation are dependent on a multitude of factors that can vary widely with each patient, including demographics, comorbidities, anatomy, and personal preferences. It is important to consider every patient's ESRD life plan (hence, their overall dialysis access life plan for every vascular access creation or placement). Optimal access type and timing of access creation are also influenced by factors external to the patient, such as surgeon experience and processes of care. In this review, we will discuss the key determinants in optimal access type and timing of access creation for upper extremity arteriovenous fistulas and grafts.

  15. Quantum Game Theory and Open Access Publishing

    CERN Document Server

    Hanauske, M; Dugall, B; Bernius, Steffen; Dugall, Berndt; Hanauske, Matthias

    2006-01-01

    The digital revolution of the information age and in particular the sweeping changes of scientific communication brought about by computing and novel communication technology, potentiate global, high grade scientific information for free. The arXiv for example is the leading scientific communication platform, mainly for mathematics and physics, where everyone in the world has free access on. While in some scientific disciplines the open access way is successfully realized, other disciplines (e.g. humanities and social sciences) dwell on the traditional path, even though many scientists belonging to these communities approve the open access principle. In this paper we try to explain these different publication patterns by using a game theoretical approach. Based on the assumption, that the main goal of scientists is the maximization of their reputation, we model different possible game settings, namely a zero sum game, the prisoners' dilemma case and a version of the stag hunt game, that show the dilemma of sc...

  16. Internet Access from CERN GSM subscriptions

    CERN Multimedia

    IT Department

    2008-01-01

    The data service on GSM subscriptions has been improved, allowing CERN users to access the Internet directly. A CERN GSM subscription with data option now allows you to connect to the Internet from a mobile phone or a PC equipped with a GSM modem. The previous access (CERN intranet) still exists. To get access to the new service, you will find all the information on configurations at: http://cern.ch/gprs The use of this service on the Sunrise network is charged on a flat-rate basis (no extra charge related to the volume of downloaded data). Depending on your CERN subscription type (standard or master), you can also connect to foreign GSM data networks (roaming), but this is strongly discouraged, except where absolutely necessary, due to international roaming charges. Telecom Section, IT/CS

  17. Flexible And Secure Access To Computing Clusters

    Directory of Open Access Journals (Sweden)

    Jan Meizner

    2010-01-01

    Full Text Available The investigation presented in this paper was prompted by the need to provide a manageablesolution for secure access to computing clusters with a federated authentication framework.This requirement is especially important for scientists who need direct access to computingnodes in order to run their applications (e.g. chemical or medical simulations with proprietary,open-source or custom-developed software packages. Our existing software, whichenables non-Web clients to use Shibboleth-secured services, has been extended to providedirect SSH access to cluster nodes using the Linux Pluggable Authentication Modules mechanism.This allows Shibboleth users to run the required software on clusters. Validationand performance comparison with existing SSH authentication mechanisms confirm that thepresented tools satisfy the stated requirements.

  18. Cognitive Medium Access: Exploration, Exploitation and Competition

    CERN Document Server

    Lai, Lifeng; Jiang, Hai; Poor, H Vincent

    2007-01-01

    This paper establishes the equivalence between cognitive medium access and the competitive multi-armed bandit problem. First, the scenario in which a single cognitive user wishes to opportunistically exploit the availability of empty frequency bands in the spectrum with multiple bands is considered. In this scenario, the availability probability of each channel is unknown to the cognitive user a priori. Hence efficient medium access strategies must strike a balance between exploring the availability of other free channels and exploiting the opportunities identified thus far. By adopting a Bayesian approach for this classical bandit problem, the optimal medium access strategy is derived and its underlying recursive structure is illustrated via examples. To avoid the prohibitive computational complexity of the optimal strategy, a low complexity asymptotically optimal strategy is developed. The proposed strategy does not require any prior statistical knowledge about the traffic pattern on the different channels....

  19. Remote computer access through Android mobiles

    Directory of Open Access Journals (Sweden)

    Jaya Bharathi Chintalapati

    2012-09-01

    Full Text Available In this paper, we will present the process to access the computers with the help of android mobile phones. This process is based on VNC (virtual network computing technique. So to work on this, we must install VNC server on our computer connected with Wi-Fi network. The user can access and perform operation through the range of Wi-Fi platforms like Linux, Mac, windows etc. The image of the desktop is compressed before it is transmitted to the cellular phone. There are several functions provided so as to ease the viewing on cell-phones. There is shortcut function that can be used to quickly access the frequently used area. Current key assignments can be viewed using guidance function. A user can view two areas simultaneously using a twin view function. The prototype is already implemented using java and tested on a java based cellular phone.

  20. The equal accessibility to patient complaint measures

    DEFF Research Database (Denmark)

    Birkeland, Søren

    The equal accessibility to patient complaint measures – a Danish perspective Like the Danish Healthcare Act (Para 2) basically prescribes a right to easy, equal access to healthcare, a Complaint Act (Para 2) entitles patients to file a complaint (about health professional conduct, informed consent...... obtainment etc.) with a Health Disciplinary Board at no cost. While there is no guarantee that healthcare is proportionately delivered across patient groups there is no warrant either that the complaint system actually promotes equal accessibility (by natives, cross-border patients etc.). To further study...... the actual complaint pattern a review was conducted on a 1-year General Practice care complaint sample (2007). Data were extracted on patient gender, age, and affiliation with labor market (if available). Interpreter use or family name presence on the Family Government Agency’s list of foreign names was used...

  1. Observer Access to the Cherenkov Telescope Array

    CERN Document Server

    Knödlseder, Jürgen; Boisson, Catherine; Brau-Nogué, Sylvie; Deil, Christoph; Khélifi, Bruno; Mayer, Michael; Walter, Roland

    2015-01-01

    The Cherenkov Telescope Array (CTA), a ground-based facility for very-high-energy (VHE) gamma-ray astronomy, will operate as an open observatory, serving a wide scientific community to explore and to study the non-thermal universe. Open community access is a novelty in this domain, putting a challenge on the implementation of services that make VHE gamma-ray astronomy as accessible as any other waveband. We present here the design of the CTA Observer Access system that comprises support of scientific users, dissemination of data and software, tools for scientific analysis, and the system to submit observing proposals. We outline the scientific user workflows and provide the status of the current developments.

  2. Freeing up access to CERN technology

    CERN Multimedia

    Joannah Caborn Wengler

    2012-01-01

    In line with CERN’s principle of maximising the dissemination of knowledge to society, the Knowledge Transfer (KT) Group has launched a new collaborative initiative to share the products of CERN’s scientific and technological labours: Easy Access IP, where IP stands for intellectual property.   CERN has a whole portfolio of dissemination channels designed and implemented by the KT Group, with Easy Access IP being the latest addition. “Inspired by the UK’s Easy Access Innovation initiative, our scheme involves making some of CERN's technologies available royalty-free and through a more agile licensing process,” explains Giovanni Anelli, head of the Group. “This approach seems to be an appropriate model for CERN, where the ultimate goal of technology transfer is not to generate income but to transfer knowledge to external partners.” The new scheme, as the name suggests, is designed to make it easier for industry and othe...

  3. A new perspective on the access process

    DEFF Research Database (Denmark)

    Bergenholtz, Henning; Gouws, Rufus

    2010-01-01

    Only 10 or 15 years ago, you had to spend hours, days or even weeks in libraries to find data of many kinds. Today, one has access to data at your desks at home. Therefore, the biggest problem for a real information society is not that you do not have access to the needed data, but that you cannot...... find it or that it takes so long to find it that you quit the search before finding the result. This is clearly shown by a Google search where you get so many results that can lead to a case of information stress or even worse information death. An easy search route and a short search time......, including linguistic text books, books presenting the formal spelling and orthographic rules of Afrikaans as well as a monolingual dictionary. The paper argues that the applicability of the access process, as developed in lexicography, goes beyond dictionaries, illustrating the importance of a process...

  4. Monitoring Accessibility Services in Digital Television

    Directory of Open Access Journals (Sweden)

    Francisco Utray

    2012-01-01

    Full Text Available This paper addresses methodology and tools applied to the monitoring of accessibility services in digital television at a time when the principles of accessibility and design are being considered in all new audiovisual media communication services. The main objective of this research is to measure the quality and quantity of existing accessibility services offered by digital terrestrial television (DTT. The preliminary results, presented here, offer the development of a prototype for automatic monitoring and a methodology for obtaining quality measurements, along with the conclusions drawn by initial studies carried out in Spain. The recent approval of the UN Convention on the Rights of Persons with Disabilities gives special relevance to this research because it provides valuable guidelines to help set the priorities to improve services currently available to users.

  5. Tariff-Tax Reforms and Market Access

    DEFF Research Database (Denmark)

    Kreickemeier, Udo; Raimondos-Møller, Pascalis

    2006-01-01

    paper examines whether the country that implements such a reform ends up opening up its markets to international trade, i.e. whether its market access improves. It is shown that this is not necessarily so. We also show that, comparing to the reform of only tariffs, the tariff-tax reform is a less......Reducing tariffs and increasing consumption taxes is a standard IMF advice to countries that want to open up their economy without hurting government finances. Indeed, theoretical analysis of such a tariff-tax reform shows an unambiguous increase in welfare and government revenues. The present...... efficient proposal to follow both as far as it concerns market access and welfare.JEL code: F13, H20.Keywords: Market access; tariff reform, consumption tax reform....

  6. A Digitally Addressable Random-Access Image Selector and Random-Access Audio System.

    Science.gov (United States)

    Bitzer, Donald L.; And Others

    The requirements of PLATO IV, a computer based education system at the University of Illinois, have led to the development of an improved, digitally addressable, random access image selector and a digitally addressable, random access audio device. Both devices utilize pneumatically controlled mechanical binary adders to position the mecahnical…

  7. Access to Attainment: An Access Agenda for 21st Century College Students

    Science.gov (United States)

    Miller, Abby; Valle, Katherine; Engle, Jennifer; Cooper, Michelle

    2014-01-01

    This report, "Access to Attainment: An Access Agenda for 21st Century College Students," examines the challenges facing 21st century students and presents strategies for addressing these challenges through policy-and practice-based solutions at the institutional, state and national levels. Recommendations include implementing a…

  8. Accessibility of U.S. Federal Government Home Pages: Section 508 Compliance and Site Accessibility Statements

    Science.gov (United States)

    Olalere, Abiodun; Lazar, Jonathan

    2011-01-01

    U.S. federal websites are required to be accessible for people with impairments. However, despite the existing regulations and guidelines, many federal websites continue to be inaccessible, and accessibility policy statements available on federal websites often do not provide any useful information. This paper provides three contributions to the…

  9. Hybrid Lyot Coronagraph for the ACCESS Mission

    Science.gov (United States)

    Trauger, J.; ACCESS Science and Engineering Team

    2010-10-01

    We report the design and fabrication of hybrid focal-plane masks for Lyot coronagraphy, supported this year by NASA's Technology Demonstration for Exoplanet Missions (TDEM) program. These masks are composed of thickness-profiled metallic and dielectric thin films, and manufactured by vacuum deposition on a glass substrate. Hybrid masks are in principle band-limited in both the real and imaginary parts of the complex amplitude characteristics, providing the theoretical basis for mathematically perfect starlight suppression. Together with a deformable mirror for control of wavefront phase, these masks achieve contrast levels of 2e-10 at inner working angles of 3 lambda/D, over spectral bandwidths of 20% or more, and with throughput efficiencies of 60%. We evaluate the science potential of these coronagaph masks in the context of ACCESS, a representative exoplanet mission concept. ACCESS is one of four medium-class concepts studied in 2008-2009 under NASA's Astrophysics Strategic Mission Concepts Study program. In a nutshell, the ACCESS study seeks the most capable medium-class coronagraphic mission that is possible with high-readiness telescope, instrument, and spacecraft technologies available today. The ACCESS study compared the performance of four major coronagraph architectures. It defined a conceptual space observatory platform as the "level playing field" for comparisons among coronagraph types. And it used laboratory validation of the representative coronagraph types as a second "level playing field" for assessing coronagraph hardware readiness. ACCESS identifies a class of scientifically compelling mission concepts built upon mature (TRL6+) subsystem technologies, and evaluates science reach of a medium-class coronagraph mission. Using current high-TRL technologies, the ACCESS minimum science program surveys the nearest 120+ AFGK stars for exoplanet systems, and surveys the majority of those for exozodiacal dust to the level of 1 zodi at 3 AU. Discoveries are

  10. Ultrasound Evaluation Before and After Hemodialysis Access

    Directory of Open Access Journals (Sweden)

    Daryoush Saedi

    2009-01-01

    Full Text Available   "nThe basic concept of hemodialysis access is to make a route to the central circulation in CRF patients. Vascular access procedures and subsequent complications represent a major cause of morbidity, hospitalization and cost for hemodialysis patients. Native arteriovenous fistulas (AVFs are preferable to synthetic arteriovenous grafts because they are associated with a lower frequency of thrombosis and infection, as well as greater longevity. AVFs that are never usable and early graft failures are associated with the common problem of inadequate vessel (artery or vein selection. The surgeon’s preoperative physical examination is the primary basis for AVF versus graft selection. Only palpable veins are considered for construction of AVFs, and the more proximal draining venous anatomy is not known prior to the operation. Physical examination is the traditional surgical evaluation performed prior to hemodialysis access placement. Palpation and inspection are difficult in obese arms, and few patients have vessels that are visible throughout their entire course. Patients with end-stage renal disease have often had multiple venipunctures and numerous intravenous lines placed and thus have an increased likelihood of venous stenosis or occlusion. Central vein problems are difficult to detect at visual inspection. By colour Doppler analysis vessels can be assessed for size, stenosis, and occlusion. US mapping assists in surgical planning and is especially valuable in patients who are difficult surgical cases (eg, obesity, diabetes, history of prior access, elderly women.  "nThis lecture contains two separate sections: 1-Vascular mapping prior to access placement and 2-Fistula maturity by US evaluation. Ultrasonography (US is an excellent modality for hemodialysis access evaluation because it is  readily available, non-invasive and inexpensive. It avoids the risks associated with iodinated contrast material and ionizing radiation.   

  11. A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data.

    Science.gov (United States)

    Gope, Prosanta; Amin, Ruhul

    2016-11-01

    Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.

  12. [Ultrasound-guided peripheral venous access].

    Science.gov (United States)

    Fuzier, Régis; Rougé, Pierre; Pierre, Sébastien

    2016-02-01

    International guidelines advocate the use of first-line ultrasound for central venous catheter, particularly for the internal jugular vein. The role of ultrasound in peripheral venous access remains questionable. In some specific situations, such as pediatrics, obesity and patients with poor venous network, problems to cannulate peripheral vein may occur. Success rate of peripheral intravenous access increases with the diameter of the vein and for a depth of the vein between 0.3 and 1.5 cm. The type of puncture (long-axis or short-axis) and the type of catheters have little influence on the success rate. Specific considerations have to be taken concerning infection control.

  13. CytoJournal joins 'open access' philosophy

    Directory of Open Access Journals (Sweden)

    Shidham Vinod B

    2004-07-01

    Full Text Available Abstract Welcome to CytoJournal! We would like to introduce you to your journal, one that is run by and for the scientific cytopathology community with incontestable benefits of Open Access, and support from Cytopathology Foundation, Inc. http://www.cytopathology-foundation.org/index.htmlCytoJournal is a peer-reviewed, PubMed indexed, online journal, publishing research in the field of cytopathology and related areas, with world wide free access. Authors submitting to CytoJournal retain the copyright to their hard earned work.

  14. Access Control in Data Management Systems

    CERN Document Server

    Ferrari, Elena

    2010-01-01

    Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary,

  15. Web-accessible Chemical Compound Information

    OpenAIRE

    Roth, Dana L

    2008-01-01

    Web-accessible chemical compound information resources are widely available. In addition to fee-based resources, such as SciFinder Scholar and Beilstein, there is a wide variety of freely accessible resources such as ChemSpider and PubChem. The author provides a general description of various fee-based and free chemical compound resources. The free resources generally offer an acceptable alternative to fee-based resources for quick retrieval. It is assumed that readers will be familiar with ...

  16. Streaming movies, media, and instant access

    CERN Document Server

    Dixon, Wheeler Winston

    2013-01-01

    Film stocks are vanishing, but the iconic images of the silver screen remain -- albeit in new, sleeker formats. Today, viewers can instantly stream movies on televisions, computers, and smartphones. Gone are the days when films could only be seen in theaters or rented at video stores: movies are now accessible at the click of a button, and there are no reels, tapes, or discs to store. Any film or show worth keeping may be collected in the virtual cloud and accessed at will through services like Netflix, Hulu, and Amazon Instant.The movies have changed, and we are changing with them.

  17. Access 2007 forms and reports for dummies

    CERN Document Server

    Underdahl, Brian

    2013-01-01

    Do you have tons and tons of data on your computer but you're not quite sure how to make heads or tails of them-or even organize them? Are you using Access as spreadsheet rather than what it was really meant for? If you have trouble finding meaning in your data, then Access 2007 Forms & Reports for Dummies let you discover the wonders of this highly useful program. This no-nonsense guide gets right down to business by showing you the easy way to use this powerful tool. It gets you started with selective, targeted queries; forms that improve efficiency; and reports that communicate-while sparin

  18. High Optical Access Trap 2.0.

    Energy Technology Data Exchange (ETDEWEB)

    Maunz, Peter Lukas Wilhelm [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-01-26

    The High Optical Access (HOA) trap was designed in collaboration with the Modular Universal Scalable Ion-trap Quantum Computer (MUSIQC) team, funded along with Sandia National Laboratories through IARPA's Multi Qubit Coherent Operations (MQCO) program. The design of version 1 of the HOA trap was completed in September 2012 and initial devices were completed and packaged in February 2013. The second version of the High Optical Access Trap (HOA-2) was completed in September 2014 and is available at IARPA's disposal.

  19. 50 CFR 648.59 - Sea Scallop Access Areas.

    Science.gov (United States)

    2010-10-01

    ... September 1 through October 31 of each year the Delmarva Access Area is open to scallop fishing as a Sea... Closed Area I Sea Scallop Access Area is open to scallop vessels, unless transiting pursuant to paragraph... each year the Elephant Turnk Access Area is open to scallop fishing as a Sea Scallop Access...

  20. Critical Approaches to Accessibility for Technology-Enhanced Learning

    Science.gov (United States)

    Lewthwaite, Sarah

    2011-01-01

    The term "accessibility" is broadly used to describe the degree to which a service or product gives learners the "ability to access" functionality, services or materials. In recent years there has been a push towards accessibility in technology-enhanced learning (TEL) across all levels of education. However, accessibility represents a shifting…

  1. 36 CFR 1193.31 - Accessibility and usability.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Accessibility and usability... COMPLIANCE BOARD TELECOMMUNICATIONS ACT ACCESSIBILITY GUIDELINES Requirements for Accessibility and Usability § 1193.31 Accessibility and usability. When required by § 1193.21, telecommunications equipment...

  2. 40 CFR 1400.6 - Enhanced local access.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Enhanced local access. 1400.6 Section... INFORMATION Public Access § 1400.6 Enhanced local access. (a) OCA data elements. Consistent with 42 U.S.C.... (2) LEPCs and related local government agencies that provide read-only access to the OCA sections...

  3. 41 CFR 51-9.303-4 - Denials of access.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Denials of access. 51-9...-Individual Access to Records § 51-9.303-4 Denials of access. (a) The Executive Director may deny any individual access to his record only on the grounds that the Committee has published rules in the...

  4. 14 CFR 25.813 - Emergency exit access.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Emergency exit access. 25.813 Section 25... Emergency exit access. Each required emergency exit must be accessible to the passengers and located where... following must be provided for each Type III or Type IV exit—(1) There must be access from the nearest...

  5. Publishing in Open Access Education Journals: The Authors' Perspectives

    Science.gov (United States)

    Coonin, Bryna; Younce, Leigh M.

    2010-01-01

    Open access publishing is now an accepted method of scholarly communication. However, the greatest traction for open access publishing thus far has been in the sciences. Penetration of open access publishing has been much slower among the social sciences. This study surveys 309 authors from recent issues of open access journals in education to…

  6. Positioning Your Library in an Open-Access Environment

    Science.gov (United States)

    Bhatt, Anjana H.

    2010-01-01

    This paper is a summary of the project that the author completed at Florida Gulf Coast University (FGCU) library for providing online access to 80 open access E-journals and digital collections. Although FGCU uses SerialsSolutions products to establish online access, any one can provide access to these collections as they are free for all. Paper…

  7. 50 CFR 660.312 - Open access fishery-prohibitions.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Open access fishery-prohibitions. 660.312... Groundfish-Open Access Fisheries § 660.312 Open access fishery—prohibitions. General groundfish prohibitions..., possess, or land groundfish in excess of the landing limit for the open access fishery without having...

  8. 50 CFR 660.311 - Open access fishery-definitions.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Open access fishery-definitions. 660.311... Groundfish-Open Access Fisheries § 660.311 Open access fishery—definitions. General definitions for the... specific to the open access fishery covered in this subpart and are in addition to those specified at §...

  9. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  10. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  11. Technology Adoption: Influence of Availability and Accessibility

    Science.gov (United States)

    McConnell, William Stewart

    2009-01-01

    Farmers are small business leaders using available technology to remain competitive. The availability of technology is dependent on the suppliers' use of the marketing mix 4Ps theory--product, price, placement, and promotion. The purpose of this study was to determine how the relation between availability and accessibility influences the adoption…

  12. 77 FR 26149 - Access Authorization Fees

    Science.gov (United States)

    2012-05-03

    ....S.C. 2214). Federal Register Citation: October 10, 2003; 68 FR 58792, 58800. 0 2. In Sec. 11.15: 0 i...). Federal Register Citation: November 30, 2010; 75 FR 73935, 73941. 0 4. In Sec. 25.17: 0 i. Add paragraph... Program (MAAP) and the Information Access Authority Program (IAAP). The amended cost is due to an...

  13. 20 CFR 655.950 - Public access.

    Science.gov (United States)

    2010-04-01

    ....950 Public access. (a) Public examination at ETA. ETA shall compile and maintain a list of employers who filed attestations specifying the occupation(s), geographical location, and wage rate(s) attested to. The list shall be available for public inspection at the ETA office at which the attestation...

  14. Achieving universal access to next generation networks

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders

    The paper examines investment dimensions of next generation networks in a universal service perspective in a European context. The question is how new network infrastructures for getting access to communication, information and entertainment services in the present and future information society...

  15. Predictive access control for distributed computation

    DEFF Research Database (Denmark)

    Yang, Fan; Hankin, Chris; Nielson, Flemming;

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future...

  16. Locally Accessible Information from Multipartite Ensembles

    Institute of Scientific and Technical Information of China (English)

    SONG Wei

    2009-01-01

    We present a universal Holevo-like upper bound on the locally accessible information for arbitrary multipartite ensembles.This bound allows us to analyze the indistinguishability of a set of orthogonal states under local operations and classical communication.We also derive the upper bound for the capacity of distributed dense coding with multipartite senders and multipartite receivers.

  17. Il quadrants for information access technology

    NARCIS (Netherlands)

    Olthof, W.; Willems, J.

    2008-01-01

    Information Access Technology is used for indexing and classifying information so it canbe stored and retrieved in a supported way. Information Logistics needs this technology in order to support the knowledge worker with the right information without him having to spend a lot of time searching for

  18. RDA resource, description and access, 2013 revision

    CERN Document Server

    2013-01-01

    This full-text print version of RDA offers a snapshot that serves as an offline access point to help solo and part-time cataloguers evaluate RDA, as well as to support training and classroom use in any size institution. An index is included.

  19. Direct Access to Working Memory Contents

    NARCIS (Netherlands)

    Bialkova, S.E.; Oberauer, K.

    2010-01-01

    Abstract. In two experiments participants held in working memory (WM) three digits in three different colors, and updated individual digits with the results of arithmetic equations presented in one of the colors. In the memory-access condition, a digit from WM had to be used as the first number in t

  20. The economics of the limited access order

    NARCIS (Netherlands)

    van Besouw, Bram; Ansink, Erik; van Bavel, Bas

    2015-01-01

    Violence and coercion are key to understanding economic and social interactions in any society. This premise was used by North et al. (2009) to distinguish three `patterns of social organization' that societies have used to solve the problem of violence. We model one of these, the `limited access or

  1. Evaluation of Crosstalk Attacks in Access Networks

    DEFF Research Database (Denmark)

    Wagner, Christoph; Eiselt, Michael; Grobe, Klaus

    2016-01-01

    WDM-PON systems regained interest as low-cost solution for metro and access networks. We present a comparative analysis of resilience of wavelength-selective and wavelength-routed architectures against crosstalk attackers. We compare the vulnerability of these architectures against attacks...

  2. Globalisation and Access to Higher Education.

    Science.gov (United States)

    van der Wende, Marijk C.

    2003-01-01

    Addresses the growing demand for access to higher education and the conditions under which this is leading to a worldwide market through transnational education and the export of educational services. Discusses extension of the General Agreement on Trade in Services to higher education, and the adequacy of Europe's Bologna Process as a response to…

  3. Information, communication, travel behaviour and accessibility

    NARCIS (Netherlands)

    Wee, van B.; Chorus, C.; Geurs, K.T.

    2013-01-01

    Over the past two decades many papers have been published on the impact of Information and Communication Technologies (ICT) on travel behavior, but the literature focusing on the impact of ICT on accessibility is relatively scarce. In this paper we give an overview of the impact of ICT on four compo

  4. Quantum game theory and open access publishing

    Science.gov (United States)

    Hanauske, Matthias; Bernius, Steffen; Dugall, Berndt

    2007-08-01

    The digital revolution of the information age and in particular the sweeping changes of scientific communication brought about by computing and novel communication technology, potentiate global, high grade scientific information for free. The arXiv, for example, is the leading scientific communication platform, mainly for mathematics and physics, where everyone in the world has free access on. While in some scientific disciplines the open access way is successfully realized, other disciplines (e.g. humanities and social sciences) dwell on the traditional path, even though many scientists belonging to these communities approve the open access principle. In this paper we try to explain these different publication patterns by using a game theoretical approach. Based on the assumption, that the main goal of scientists is the maximization of their reputation, we model different possible game settings, namely a zero sum game, the prisoners’ dilemma case and a version of the stag hunt game, that show the dilemma of scientists belonging to “non-open access communities”. From an individual perspective, they have no incentive to deviate from the Nash equilibrium of traditional publishing. By extending the model using the quantum game theory approach it can be shown, that if the strength of entanglement exceeds a certain value, the scientists will overcome the dilemma and terminate to publish only traditionally in all three settings.

  5. Moving beyond the Amalgam: Restructuring Access Services

    Science.gov (United States)

    Austin, Brice

    2010-01-01

    At least since the early 1990s, academic libraries have been merging Circulation and various other related functions into a single department typically labeled "Access Services." In many cases, however, that merger has proven to be administrative rather than functional, with minimal integration of common workflows. This article describes…

  6. Center for Assistive Technology & Environmental Access

    Science.gov (United States)

    ... new address and college name * The Center for Assistive Technology and Environmental Access Georgia Institute of Technology (GT) College of Design 512 Means St., Suite 300, Atlanta, GA 30332-0156 (for shipping, please use 30318) U.S.A. Phone: 404-894-4960 (v/tty) ... | Privacy Agreement

  7. Role-based access control in retrospect

    NARCIS (Netherlands)

    Franqueira, Virginia N.L.; Wieringa, Roel

    2012-01-01

    Role-Based Access Control (RBAC) has been a success in terms of the amount of research that went into it, its uptake in international standards, and its adoption by major software vendors. Yet, RBAC remains complex to implement in user organizations. In this paper we review the state of the art of R

  8. Access, Consider, Teach: ACT in Your Classroom

    Science.gov (United States)

    Stanford, Pokey; Reeves, Stacy

    2007-01-01

    University teachers who are teacher educators cannot connect to "The Millennial Generation" of today's preservice learners by using chalk and dull outdated textbooks. When university professionals access the technology available, consider the curriculum, and teach with technology (ACT) undergraduate teacher candidates acquire the vision of…

  9. Open Access for International Criminal Lawyers

    NARCIS (Netherlands)

    van Laer, Coen

    2016-01-01

    This study investigates to what extent Open Access is useful for international criminal lawyers. Free reuse and distribution may be particularly advantageous for the audience in less resourceful countries. And individual authors need visibility to promote their academic reputation. However, many pub

  10. Sociocritical Matters: Migrant Students' College Access

    Science.gov (United States)

    Núñez, Anne-Marie; Gildersleeve, Ryan Evely

    2016-01-01

    Migrant students face many educational, economic, social, and cultural challenges to college access. Anti-bilingual, anti-affirmative action, and anti-immigrant policies also constrain their postsecondary pathways. With these issues in mind, this article draws on quantitative and qualitative research to examine the influence of a residential…

  11. Evaluating Web accessibility at different processing phases

    Science.gov (United States)

    Fernandes, N.; Lopes, R.; Carriço, L.

    2012-09-01

    Modern Web sites use several techniques (e.g. DOM manipulation) that allow for the injection of new content into their Web pages (e.g. AJAX), as well as manipulation of the HTML DOM tree. This has the consequence that the Web pages that are presented to users (i.e. after browser processing) are different from the original structure and content that is transmitted through HTTP communication (i.e. after browser processing). This poses a series of challenges for Web accessibility evaluation, especially on automated evaluation software. This article details an experimental study designed to understand the differences posed by accessibility evaluation after Web browser processing. We implemented a Javascript-based evaluator, QualWeb, that can perform WCAG 2.0 based accessibility evaluations in the two phases of browser processing. Our study shows that, in fact, there are considerable differences between the HTML DOM trees in both phases, which have the consequence of having distinct evaluation results. We discuss the impact of these results in the light of the potential problems that these differences can pose to designers and developers that use accessibility evaluators that function before browser processing.

  12. Making Archival and Special Collections More Accessible

    Science.gov (United States)

    Renspie, Melissa, Comp.; Shepard, Linda, Comp.; Childress, Eric, Comp.

    2015-01-01

    Revealing hidden assets stewarded by research institutions so they can be made available for research and learning locally and globally is a prime opportunity for libraries to create and deliver new value. "Making Archival and Special Collections More Accessible" collects important work OCLC Research has done to help achieve the…

  13. Multilevel Access to our Cultural Heritage (MACH)

    NARCIS (Netherlands)

    Broek, van den Egon L.; Kok, Thijs; Kersen, van J.

    2005-01-01

    Most search engines utilize keywords to retrieve information (e.g., Google). However, when one accesses a specific domain such as art and is a layperson in this field, how to retrieve information? Without the knowledge of artist's name, the period he lived in, the art movement he was affiliated with

  14. Access to Medicines : Common problems, common solutions?

    NARCIS (Netherlands)

    Stephens, P.N.

    2015-01-01

    This thesis investigates four cross-cutting controversies in access to medicines – aspects of pharmaceutical R&D, equity, generics policy and scale up. Chapter 2 describes the state of pharmaceutical research and development (R&D). It finds that failure rates remain high with the probability of mark

  15. Satcom access in the Evolved Packet Core

    NARCIS (Netherlands)

    Cano Soveri, M.D.; Norp, A.H.J.; Popova, M.P.

    2011-01-01

    Satellite communications (Satcom) networks are increasingly integrating with terrestrial communications networks, namely Next Generation Networks (NGN). In the area of NGN the Evolved Packet Core (EPC) is a new network architecture that can support multiple access technologies. When Satcom is consid

  16. Satcom access in the evolved packet core

    NARCIS (Netherlands)

    Cano, M.D.; Norp, A.H.J.; Popova, M.P.

    2012-01-01

    Satellite communications (Satcom) networks are increasingly integrating with terrestrial communications networks, namely Next Generation Networks (NGN). In the area of NGN the Evolved Packet Core (EPC) is a new network architecture that can support multiple access technologies. When Satcom is consid

  17. Performance Analysis of VPN Remote Access Tunnels

    Directory of Open Access Journals (Sweden)

    Dymora Paweł

    2014-09-01

    Full Text Available The purpose of the study is to analyze the efficiency of communication with the server using the methods of secure remote access, as well as checking and comparing the quality of services provided by the server depending on the method of secure remote connection. The article focuses on VPN technology implemented in the latest Windows Server 2012 R2 operating system.

  18. Optical access: networks and components (overview)

    Science.gov (United States)

    Mynbaev, Djafar K.

    2004-09-01

    The exponential gtowth of traffic delivered to an individual customer both for business and personal needs puts tremendous pressure on the telecommunications networks. Because the development of the long-haul and metro networks has advanced rapidly and their capacity much eceeds demand, tremendous pressure now falls in the local networks to provide customers with access to the global telecom infrastructure. Building a broadband access network enabling fast delivery of high-volume traffic is the current task of network operators. A brief review of broadband access networks brings us to the conclusion that only wired optical networks can serve as an immediate and future solution to the "last-mile" problem. After discussin goptical access network classification, we focus mainly on passive optical networks (PON) because PON is a major technology today. From the network standpoint, we discuss the principle of PON operation, architectures, topologies, protocols and standards, design issues, and network management and services. We also discuss the main problems with PON and the use of WDM technology. From the hardware standpoint, we consider both active and passive components. We analyze the structure and elements of these components, including their technical characteristics.

  19. Atom-Role-Based Access Control Model

    Science.gov (United States)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  20. The Metadata Approach to Accessing Government Information.

    Science.gov (United States)

    Moen, William E.

    2001-01-01

    Provides an overview of the articles in this issue, includes a history of the development of GILS (Government Information Locator Service), and offers perspectives on the importance of metadata for resource description and resource discovery. Presents interoperability as a challenge in integrating access to government information locator services.…

  1. Canadian Librarians and Access to Government Information

    Science.gov (United States)

    Hearder-Moan, Wendy

    1977-01-01

    Canada is considering the need for freedom of information legislation. Current legislation in Sweden and the United States is discussed, and librarians are urged to lobby for their involvement in government information dissemination, access to historical documents, and complete bibliographic control. (JAB)

  2. Public sector information access policies in Europe

    NARCIS (Netherlands)

    Welle Donker, F.M.

    2010-01-01

    In the digital age geo-information has become embedded in our daily lives, such as navigation systems, community platforms, real estate information and weather forecasts. Everybody uses geo-information for their day-to-day decision making. Therefore, access to geo-information is of vital importance

  3. Sign Compute Resolve for Random Access

    DEFF Research Database (Denmark)

    Goseling, Jasper; Stefanovic, Cedomir; Popovski, Petar

    2014-01-01

    users collide. We measure the performance of the proposed method in terms of user resolution rate as well as overall throughput of the system. The results show that our approach significantly increases the performance of the system even compared to coded random access, where collisions are not wasted...

  4. Heterogeneity in the WTP for recreational access

    DEFF Research Database (Denmark)

    Campbell, Danny; Vedel, Suzanne Elizabeth; Thorsen, Bo Jellesmark;

    2014-01-01

    In this study we have addressed appropriate modelling of heterogeneity in willingness to pay (WTP) for environmental goods, and have demonstrated its importance using a case of forest access in Denmark. We compared WTP distributions for four models: (1) a multinomial logit model, (2) a mixed logi...

  5. Stanford University's Archimedes Project: Design for Accessibility.

    Science.gov (United States)

    McNulty, Tom, Ed.

    1996-01-01

    The Archimedes Project's primary goal is to educate those who will develop the next generation of software and hardware on the obstacles and opportunities that technology presents for people with disabilities. Its research program designs prototypes, explores accessibility problems, and conducts research on relevant scientific issues. (Author/PEN)

  6. Monitoring Compliance with Open Access policies

    OpenAIRE

    Picarra, Mafalda

    2015-01-01

    In parallel to implementing Open Access policies, institutions and research funders are also engaged in developing mechanisms to monitor compliance with the existing policies. This study highlights why policy compliance must be monitored and how it can be done. A series of case studies illustrate where compliance is being effectively monitored.

  7. File access prediction using neural networks.

    Science.gov (United States)

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.

  8. Direct access : Lessons learnt from the Netherlands

    NARCIS (Netherlands)

    Northcott, A.; Brocklehurst, P.; Jerkovic-Cosic, K.; Reinders, J. J.; McDermott, I.; Tickle, M.

    2013-01-01

    Objective To use a qualitative approach to examine the perceptions of policy makers, general dental practitioners, dental hygienists, dental students and dental hygiene students in the Netherlands following the introduction of a direct access policy in 2006. Methods Semi-structured interviews and fo

  9. On Codes for Optimal Rebuilding Access

    CERN Document Server

    Wang, Zhiying; Bruck, Jehoshua

    2011-01-01

    MDS (maximum distance separable) array codes are widely used in storage systems due to their computationally efficient encoding and decoding procedures. An MDS code with r redundancy nodes can correct any r erasures by accessing (reading) all the remaining information in both the systematic nodes and the parity (redundancy) nodes. However, in practice, a single erasure is the most likely failure event; hence, a natural question is how much information do we need to access in order to rebuild a single storage node? We define the rebuilding ratio as the fraction of remaining information accessed during the rebuilding of a single erasure. In our previous work we showed that the optimal rebuilding ratio of 1/r is achievable (using our newly constructed array codes) for the rebuilding of any systematic node, however, all the information needs to be accessed for the rebuilding of the parity nodes. Namely, constructing array codes with a rebuilding ratio of 1/r was left as an open problem. In this paper, we solve th...

  10. Access to the Online Planetary Research Literature

    Science.gov (United States)

    Henneken, E. A.; Accomazzi, A.; Kurtz, M. J.; Grant, C. S.; Thompson, D.; Di Milia, G.; Bohlen, E.; Murray, S. S.

    2009-12-01

    The SAO/NASA Astrophysics Data System (ADS) provides various free services for finding, accessing, and managing bibliographic data, including a basic search form, the myADS notification service, and private library capabilities (a useful tool for building bibliographies), plus access to scanned pages of published articles. The ADS also provides powerful search capabilities, allowing users to find e.g. the most instructive or most important articles on a given subject . For the Planetary Sciences, the citation statistics of the ADS have improved considerably with the inclusion of the references from Elsevier journals, including Icarus, Planetary and Space Science, and Earth and Planetary Science Letters. We currently have about 78 journals convering the planetary and space sciences (Advances in Space Research, Icarus, Solar Physics, Astrophusics and Space Science, JGRE, Meteoritics, to name a few). Currently, this set of journals represents about 180,000 articles and 1.1 million references. Penetration into the Solar Physics, Planetary Sciences and Geophysics community has increased significantly. During the period 2004-2008, user access to JGR and Icarus increased by a factor of 4.4, while e.g. access to the Astrophysical Journal "only" increased by a factor of 1.8.

  11. 77 FR 29473 - Market Access Program

    Science.gov (United States)

    2012-05-17

    ... of activities designed to address international market access issues; modifying the list of eligible... with the UES. The content of some MAP notices were already codified in the proposed rule. In response... meetings of international organizations conducted in the United States. In response to the comment,...

  12. Facility Accessibility: Opening the Doors to All

    Science.gov (United States)

    Petersen, Jeffrey C.; Piletic, Cindy K.

    2006-01-01

    A facility developed for fitness, physical activity, recreation, or sport is a vital community resource that contributes to the overall health and wellness of that community's citizens. In order to maximize the benefits derived from these facilities, it is imperative that they be accessible to as wide a range of people as possible. The Americans…

  13. Reflections on data access in lexicographic works

    DEFF Research Database (Denmark)

    2009-01-01

    This article discusses the need for quick and easy access to the relevant lexicographic data in the light of the function theory. In this respect, it raises the question: How many data does a user need in each consultation? As many as possible? Or as few as possible? The answer provided in the ar...

  14. Training access, reciprocity, and expected retirement age

    NARCIS (Netherlands)

    Montizaan, R.M.; de Grip, A.; Fouarge, D.

    2015-01-01

    This paper investigates whether employers can induce employees to postpone retirement by offering access to training courses that maintain job proficiency. We use unique, matched employer-employee surveys for the Dutch public sector, which include detailed information on a wide range of HR practices

  15. Accessibility of GI for Public Participation

    DEFF Research Database (Denmark)

    Arleth, Mette; Campagna, Michele

    2005-01-01

    The paper reports an ongoing comparative study on the accessibility of Geographic Information at public authorities’ websites in Denmark and Italy. The purpose of the study is twofold; to give an idea of the latest development and diffusion of GI on public authorities websites, and to identify...

  16. Accessibility: Definition, Labeling, and CVAA impact

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2017-01-01

    by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...

  17. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  18. Boosting Access to Government Rocket Science

    Science.gov (United States)

    2014-10-01

    a Space Act Agreement (SAA) to enable Sierra Nevada Corporation ( SNC ) access to the Agency’s expertise. Specifically, the Marshall Space Flight...Center (MSFC) in Huntsville, Ala., will support SNC in its devel- opment of the Dream Chaser spacecraft. SNC has had a relationship Defense AT&L

  19. CERN Confirms commitment to Open Access

    CERN Multimedia

    2005-01-01

    The CERN Library Information desk.At a meeting on the Wednesday before Easter, the Executive Committee endorsed a policy of open access to all the laboratory's results, as expressed in the document ‘Continuing CERN action on Open Access' (http://cds.cern.ch/record/828991/files/open-2005-006.pdf), released by its Scientific Information Policy Board (SIPB) earlier in the month. "This underlines CERN's commitment to sharing the excitement of fundamental research with as wide an audience as possible", said Guido Altarelli, current SIPB chairman. Open Access to scientific knowledge is today the goal of an increasing component of the worldwide scientific community. It is a concept, made possible by new electronic tools, which would bring enormous benefits to all readers by giving them free access to research results. CERN has implicitly supported such moves from its very beginning. Its Convention (http://cds.cern.ch/record/330625/files/cm-p00046871.pdf), adopted in 1953, requires openness, stipulating that "......

  20. Trial access to Cambridge University Press ebooks

    CERN Multimedia

    CERN Library

    2011-01-01

    From 1 August till 31 October, CERN users are invited to enjoy a trial access to all Cambridge University Press electronic books: http://ebooks.cambridge.org/. Please don't hesitate to send feedback to library.desk@cern.ch.

  1. Improving Open Access through Prior Learning Assessment

    Science.gov (United States)

    Yin, Shuangxu; Kawachi, Paul

    2013-01-01

    This paper explores and presents new data on how to improve open access in distance education through using prior learning assessments. Broadly there are three types of prior learning assessment (PLAR): Type-1 for prospective students to be allowed to register for a course; Type-2 for current students to avoid duplicating work-load to gain…

  2. How Governments Can Improve Access to College

    Science.gov (United States)

    Ehrenberg, Ronald G.

    2007-01-01

    This article discusses how federal and state governments can improve student access to private and public higher education institutions. Florida helps to achieve that with a common course-numbering system across community and four-year colleges, which permits students to easily transfer credits. Both the Senate and the House of Delegates in…

  3. Job access, workplace mobility, and occupational achievement

    NARCIS (Netherlands)

    Ham, M. van

    2002-01-01

    Are career opportunities influenced by the place where you live? Does it help your career if you accept a job at a longer distance? What is the best place to live if you want to combine maximum career opportunities with a minimum of commuting and migration costs? Job access, workplace mobility, and

  4. Assessment and Evaluation Methods for Access Services

    Science.gov (United States)

    Long, Dallas

    2014-01-01

    This article serves as a primer for assessment and evaluation design by describing the range of methods commonly employed in library settings. Quantitative methods, such as counting and benchmarking measures, are useful for investigating the internal operations of an access services department in order to identify workflow inefficiencies or…

  5. No access to LHC from 7 to 13 January 2008

    CERN Multimedia

    ST Department

    2007-01-01

    From 7 to 13 January 2008, tests of the LHC access system will be carried out to validate its role in the operational safety of the LHC. During this period, no access will be permitted to the controlled zones of LHC: service zones, experimental areas and tunnels. Access to the machine shafts and the tunnels will only be possible for emergency interventions coordinated with the CCC operators or for fire brigade interventions. The biometric access card integrated with the dosimeter, as issued by Bldg. 55, must be used to access these areas during this period. Access to the experimental caverns will be managed by the respective technical coordinator. After the tests, the access system will be restored to installation mode, i.e. access will again be possible using the CERN access cards for authorised personnel. Please communicate this information to your contractors. Thank you in advance for your comprehension and collaboration. Pierre Ninin - "LHC Access" project leader

  6. PUBLIC ACCESS TO PRIVATE LAND IN SCOTLAND

    Directory of Open Access Journals (Sweden)

    David L Carey Miller

    2012-08-01

    Full Text Available This article attempts to understand the radical reform of Scottish land law in its provision for a general right of public access to private land introduced in 2003 as part of land reform legislation, an important aspect of the initial agenda of the Scottish Parliament revived in 1999. The right is to recreational access for a limited period and the right to cross land. Access can be taken only on foot or by horse or bicycle. As a starting point clarification of the misunderstood pre-reform position is attempted. The essential point is that Scots common law does not give civil damages for a simple act of trespass (as English law does but only a right to obtain removal of the trespasser. Under the reforms the longstanding Scottish position of landowners allowing walkers access to the hills and mountains becomes a legal right. A critical aspect of the new right is that it is one of responsible access; provided a landowner co-operates with the spirit and system of the Act access can be denied on the basis that it is not being exercised responsibly. But the onus is on the landowner to show that the exercise of the right is not responsible.Although the right applies to all land a general exception protects the privacy of a domestic dwelling. Early case law suggests that the scope of this limit depends upon particular circumstances although reasonable 'garden ground' is likely to be protected. There are various particular limits such as school land.Compliance with the protection of property under the European Convention on Human Rights is discussed. The article emphasises the latitude, open to nations, for limitations to the right of ownership in land in the public interest. The extent of the Scottish access inroad illustrates this. This leads to the conclusion that 'land governance' – the subject of the Potchefstroom Conference at which the paper was initially presented – largely remains a matter for domestic law; the lex situs concept is alive

  7. Notified Access: Extending Remote Memory Access Programming Models for Producer-Consumer Synchronization

    KAUST Repository

    Belli, Roberto

    2015-05-01

    Remote Memory Access (RMA) programming enables direct access to low-level hardware features to achieve high performance for distributed-memory programs. However, the design of RMA programming schemes focuses on the memory access and less on the synchronization. For example, in contemporary RMA programming systems, the widely used producer-consumer pattern can only be implemented inefficiently, incurring in an overhead of an additional round-trip message. We propose Notified Access, a scheme where the target process of an access can receive a completion notification. This scheme enables direct and efficient synchronization with a minimum number of messages. We implement our scheme in an open source MPI-3 RMA library and demonstrate lower overheads (two cache misses) than other point-to-point synchronization mechanisms for each notification. We also evaluate our implementation on three real-world benchmarks, a stencil computation, a tree computation, and a Colicky factorization implemented with tasks. Our scheme always performs better than traditional message passing and other existing RMA synchronization schemes, providing up to 50% speedup on small messages. Our analysis shows that Notified Access is a valuable primitive for any RMA system. Furthermore, we provide guidance for the design of low-level network interfaces to support Notified Access efficiently.

  8. Wie messen wir unseren Open-Access-Anteil?

    OpenAIRE

    Tullney, Marco

    2016-01-01

    Open Access ist auf dem Siegeszug. Die „Open-Access-Transformation“ hat sich als neues Schlagwort etabliert, und Verlage konzentrieren sich mehrheitlich darauf, weitere Einnahmen durch Open Access zu generieren, statt die Entwicklung zu bekämpfen. Die von wissenschaftlichen Einrichtungen getragenen Kosten für Open-Access-Artikel steigen (ganz zu schweigen vom enormen Arbeitsaufwand, den manche der zugrundeliegenden Modelle mit sich bringen). Open Access ist ein Thema, das prominent in Auflage...

  9. Carotid artery access for transcatheter aortic valve replacement.

    Science.gov (United States)

    Guyton, Robert A; Block, Peter C; Thourani, Vinod H; Lerakis, Stamatios; Babaliaros, Vasilis

    2013-10-01

    We report three patients who had successful transcatheter aortic valve replacement (TAVR) via carotid artery access. None were candidates for thoracotomy (including minimal access incisions) and had no other vascular access sites that would accommodate the transcatheter valve sheath. Antegrade carotid perfusion and retrograde insertion of the delivery sheath maintained cerebral blood flow without sequelae. Carotid access for TAVR is an option for unusual patients without other access.

  10. OpenAPC. Open-Access-Publikationskosten als Open Data

    OpenAIRE

    Tullney, Marco

    2015-01-01

    Präsentationsfolien zum Vortrag „OpenAPC. Open-Access-Publikationskosten als Open Data“ in der Session „Ausgestaltung eines wissenschaftsadäquaten APC-Marktes: Grundsätze, Finanzierungsansätze und Management“ der Open-Access-Tage 2015 in Zürich (https://www.open-access.net/community/open-access-tage/open-access-tage-2015-zuerich/programm/#c1974)

  11. Publishing in open access era: focus on respiratory journals.

    Science.gov (United States)

    Dai, Ni; Xu, Dingyao; Zhong, Xiyao; Li, Li; Ling, Qibo; Bu, Zhaode

    2014-05-01

    We have entered an open access publishing era. The impact and significance of open access is still under debate after two decades of evolution. Open access journals benefit researchers and the general public by promoting visibility, sharing and communicating. Non-mainstream journals should turn the challenge of open access into opportunity of presenting best research articles to the global readership. Open access journals need to optimize their business models to promote the healthy and continuous development.

  12. Chromosome numbers and meiotic behavior of some Paspalum accessions

    OpenAIRE

    Eleniza de Victor Adamowski; Maria Suely Pagliarini; Andréa Beatriz Mendes Bonato; Luiz Alberto Rocha Batista; José Francisco Montenegro Valls

    2005-01-01

    Chromosome number and meiotic behavior were evaluated in 36 Brazilian accessions of the grass Paspalum (which had never previously been analyzed) to determinate which accessions might be useful in interspecific hybridizations. The analysis showed that one accession of Paspalum coryphaeum was diploid (2n = 2x = 20) and one accession of Paspalum conspersum hexaploid (2n = 6x = 60), the remaining 34 accessions being tetraploid (2n = 4x = 40). The pairing configuration was typical for the ploidy ...

  13. Speed control system for an access gate

    Science.gov (United States)

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  14. Accessibility, land use and transport. Accessibility evaluation of land-use and transport developments and policy strategies

    NARCIS (Netherlands)

    Geurs, Karst Teunis

    2006-01-01

    How can accessibility be defined? How useful are different accessibility approaches in evaluating land-use and transport policy strategies? How can the economic benefits associated with accessibility changes be measured? What are the accessibility benefits of having a public transport service availa

  15. Facilitating Full-text Access to Biomedical Literature Using Open Access Resources.

    Science.gov (United States)

    Kang, Hongyu; Hou, Zhen; Li, Jiao

    2015-01-01

    Open access (OA) resources and local libraries often have their own literature databases, especially in the field of biomedicine. We have developed a method of linking a local library to a biomedical OA resource facilitating researchers' full-text article access. The method uses a model based on vector space to measure similarities between two articles in local library and OA resources. The method achieved an F-score of 99.61%. This method of article linkage and mapping between local library and OA resources is available for use. Through this work, we have improved the full-text access of the biomedical OA resources.

  16. Ultrasonography-Guided Peripheral Intravenous Access: Regular Technique Versus Seldinger Technique in Patients with Difficult Vascular Access

    OpenAIRE

    2012-01-01

    We sought to compare ultrasonography (US)-guided peripheral intravenous (PIV) access by regular technique using standard length catheters with a Seldinger technique using 16-cm central venous catheters in a randomized trial of adult patients with difficult intravenous (IV) access. Patients were randomized into two groups: (1) An US-guided IV access obtained through a regular technique or (2) An US-guided IV access obtained through a Seldinger technique. Outcomes measured were IV access succes...

  17. Integrating Live Access Server into Google Earth

    Science.gov (United States)

    Li, J.; Schweitzer, R.; Hankin, S.; O'Brien, K.

    2006-12-01

    The Live Access Server (LAS) is a highly configurable Web server designed to provide flexible access to visualization and analysis products generated from geo-referenced scientific data sets. Now at version 7.0, LAS has been in operation since 1994. The current ~{!0~}Armstrong?release of LAS V7 consists of a set of modular components in a three tiered architecture -- user interface, workflow orchestration and services to access data and generate scientific products. The LAS user interface (UI) helps the user make requests, preventing requests that are impossible or unreasonable. The UI communicates with the LAS Product Server (LPS the workflow orchestration component) via an XML string with an HTTP GET. When a request is received by the LPS, business logic converts this request into a series of Web Service requests invoked via SOAP. The SOAP services perform data access and generate products (visualizations, data subsets, analyses, etc.). LPS packages these outputs into final products via Jakarta Velocity templates for delivery to the end user. Back-end services are most often a legacy application wrapped in a Java class. The Java wrapper classes are deployed as Web Services accessible via SOAP using the AxisServlet and a custom Web Services Deployment Descriptor file. Ferret is the default visualization application used by LAS, though other applications (e.g. Matlab, CDAT, and GrADS) can also be used. This application demonstrates how Keyhole Markup Language (KML) can be used to provide simple integration of LAS and Google Earth. KML makes access to "Virtual Globe" capabilities so simple that it can be added as an option to existing systems. This application is one such example. The ability to package an image in KML was added to the LAS as a new SOAP service. On the LAS user interface, users can select a Google Earth product in the same manner that any other LAS product is requested. The server will dynamically generate a KML file, which contains the 2D plot

  18. Data Access, Ownership, and Control: Toward Empirical Studies of Access Practices.

    Science.gov (United States)

    Hilgartner, Stephen; Brandt-Rauf, Sherry I.

    1994-01-01

    Examines how the new sociology of science can approach data access issues. A perspective is developed based on an analysis of the process of scientific production, data streams, and intellectual policy issues. (Contains 55 references.) (JLB)

  19. Checklists Application Accessibility and Usability for Redesign of Site Accessible for the Elderly users

    Directory of Open Access Journals (Sweden)

    Anne Lesinhovski

    2015-05-01

    Full Text Available This paper presents the evaluation of the accessibility and usability of four sites with information and services for the elderly user. With the results, the site with the lowest score was selected and underwent a process of Redesign in order to improve their accessibility. In this study the methodology used the ergonomic approach and the use of Design in phases. For this, adopted action research, which stands out for its characteristic of knowing and acting, and then study the results. Participated in this study 21 elderly users voluntarily reviewed the four selected sites, helped in some stages of prototype development and its assessment of accessibility. Among the results, after the Redesign process of prototype and evaluation, it became clear that there was a gain in accessibility and usability over the original version of the site. Fact verified through the application of two Checklists, specific to review sites and for its assessment of accessibility and usability held with the participants of the study elderly. Keywords: Elderly; Redesign; Accessibility; Usability.

  20. [Innovative medicines and market access agreements].

    Science.gov (United States)

    Toumi, M; Zard, J; Duvillard, R; Jommi, C

    2013-09-01

    Market Access Agreements (MAA) for drugs have emerged in response to the need to control health expenditures, as well as to the uncertainty about the true benefit of a drug. It is possible to group MAA in two types of agreements: financial agreements and outcome-based agreements. MAA is a growing trend and is shifting towards conditional access. However, the willingness to use these contracts and their implementation differ across countries, and some are still resistant to put them in place. The MAA challenges to overcome encompass the complexity of the schemes, the administrative burden and the difficulty of evaluating MAA. It is likely that these agreements might experience further evolution in the future to become a faster pathway for therapeutic innovations, at a fair price.

  1. Research-based standards for accessible housing

    DEFF Research Database (Denmark)

    Helle, Tina; Iwarsson, Susanne; Brandt, Åse

    2010-01-01

    by the database search (n= 2,577), resulting in the inclusion of one publication. Contacts to leading researchers in the field identified five publications. The hand search of 22 journals led to one publication. We have exemplified how the prevalence of common environmental problems in housing environments......Since standards for accessible housing seldom are manifestly based on research and vary cross nationally, it is important to examine if there exists any scientific evidence, supporting these standards. Thus, one aim of this study was to review the literature in search of such scientific evidence...... to inform research-based accessibility standards is available?, a descriptive literature review was conducted. The studies should be empirically based, published during 1990 to 2010, target adult persons, published in peer reviewed journals or, as architectural competitions, PhD-thesis or conference...

  2. [Sex workers: limited access to healthcare].

    Science.gov (United States)

    Gloor, E; Meystre-Agustoni, G; Ansermet-Pagot, A; Vaucher, P; Durieux-Paillard, S; Bodenmann, P; Cavassini, M

    2011-06-29

    Sex workers constitute a heterogeneous group possessing a combination of vulnerability factors such as geographical instability, forced migration, substance addiction and lack of legal residence permit. Access to healthcare for sex workers depends on the laws governing the sex market and on migration policies in force in the host country. In this article, we review different European health strategies established for sex workers, and present preliminary results of a pilot study conducted among 50 sex workers working on the streets in Lausanne. The results are worrying: 56% have no health insurance, 96% are migrants and 66% hold no legal residence permit. These data should motivate public health departments towards improving access to healthcare for this vulnerable population.

  3. Direct data access protocols benchmarking on DPM

    CERN Document Server

    Furano, Fabrizio; Keeble, Oliver; Mancinelli, Valentina

    2015-01-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring infor...

  4. A Theorem on Grid Access Control

    Institute of Scientific and Technical Information of China (English)

    XU ZhiWei(徐志伟); BU GuanYing(卜冠英)

    2003-01-01

    The current grid security research is mainly focused on the authentication of grid systems. A problem to be solved by grid systems is to ensure consistent access control. This problem is complicated because the hosts in a grid computing environment usually span multiple autonomous administrative domains. This paper presents a grid access control model, based on asynchronous automata theory and the classic Bell-LaPadula model. This model is useful to formally study the confidentiality and integrity problems in a grid computing environment. A theorem is proved, which gives the necessary and sufficient conditions to a grid to maintain confidentiality.These conditions are the formalized descriptions of local (node) relations or relationship between grid subjects and node subjects.

  5. Metrics and Evaluation Models for Accessible Television

    DEFF Research Database (Denmark)

    Li, Dongxiao; Looms, Peter Olaf

    2014-01-01

    The adoption of the UN Convention on the Rights of Persons with Disabilities (UN CRPD) in 2006 has provided a global framework for work on accessibility, including information and communication technologies and audiovisual content. One of the challenges facing the application of the UN CRPD is te...... and evaluation models for access service provision, the paper identifies options that could facilitate the evaluation of UN CRPD outcomes and suggests priorities for future research in this area....... number of platforms on which audiovisual content needs to be distributed, requiring very clear multiplatform architectures to facilitate interworking and assure interoperability. As a consequence, the regular evaluations of progress being made by signatories to the UN CRPD protocol are difficult...

  6. Accessibility & Inclusivity in the Astronomical Community

    Science.gov (United States)

    Gilbert, Lauren; Shanahan, J.; Monkiewicz, Jacqueline A.; Noel-Storr, Jacob; Murphy, Nicholas Arnold

    2016-06-01

    Nearly one in five Americans have a disability. However, in a 2013 survey, fewer than 2% of AAS members identified as having a disability. Persons with disabilities are dramatically underrepresented in STEM fields and astronomy in particular. Though the Americans with Disabilities Act has been law for 25 years, few astronomy departments have implemented full universal design and structures for accessibility for students. Our field which often sees itself as pushing the limits can offer an environment for enhanced stigmatization and discrimination based on disability. Indeed, many current structures place undue burden to those who are excluded. Instead, we aspire to a way of working together that does not require disclosure of disability, and where diverse needs are being met with each of our interactions and activities. A mindset of diverse access makes the experience of learning, working, and collaborating stronger for all.

  7. Vascular access for hemodialysis: arteriovenous fistula.

    Science.gov (United States)

    Malovrh, Marko

    2005-06-01

    The long-term survival and quality of life of patients on hemodialysis (HD) is dependant on the adequacy of dialysis via an appropriately placed vascular access. The optimal vascular access is unquestionably the autologous arteriovenous fistula (AVF), with the most common method being the conventional radio-cephalic fistula at the wrist. Recent clinical practice guidelines recommend the creation of native fistula or synthetic graft before the start of chronic HD therapy to prevent the need for complication-prone dialysis catheters. This could also have a beneficial effect on the rapidity of worsening kidney failure. A multidisciplinary approach (nephrologists, surgeons, radiologists and nurses) should improve the HD outcome by promoting the use of AVF. An important additional component of this program is the Doppler ultrasound for preoperative vascular mapping. Such an approach may be realized without unsuccessful surgical explorations, with a minimal early failure rate and a high maturation, even in patients with diabetes mellitus.

  8. Solidarity, justice and unconditional access to healthcare.

    Science.gov (United States)

    Gheaus, Anca

    2017-03-01

    Luck egalitarianism provides a reason to object to conditionality in health incentive programmes in some cases when conditionality undermines political values such as solidarity or inclusiveness. This is the case with incentive programmes that aim to restrict access to essential healthcare services. Such programmes undermine solidarity. Yet, most people's lives are objectively worse, in one respect, in non-solidary societies, because solidarity contributes both instrumentally and directly to individuals' well-being. Because solidarity is non-excludable, undermining it will deprive both the prudent and the imprudent citizens of its goods. Thereby, undermining solidarity can make prudent citizens worse off than they would have otherwise been, out of no fault or choice of their own, but rather as a result of somebody else's imprudent choice. This goes against the spirit of luck egalitarianism. Therefore (luck egalitarian) justice can require us to save the imprudent and avoid conditionality in access to essential healthcare services.

  9. Open Access Transmission and Renewable Energy Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Porter, K.

    1996-09-01

    In April 1996, the Federal Regulatory Commission (PERC) approved Orders 888 and 889 and released a draft rule for public comment on capacity reservation tariffs (CRTs). Order No. 888 requires electric utilities to file transmission tariffs that would allow transmission access to third parties who want to conduct wholesale transactions, and Order No. 889 requires transmission-owning utilities to set up open access, same-time information systems (OASIS), using commercial software and Internet protocols. This paper discusses these Orders in detail, as well as some of the issues before FERC with implications for renewables, which include: transmission pricing; transmission terms and conditions; reassignment of transmission capacity; defining state and FERC jurisdiction over transmission and distribution; the pricing of ancillary services; and the adoption and implementation of independent system operators.

  10. Random Access to Grammar-Compressed Strings

    DEFF Research Database (Denmark)

    Bille, Philip; Landau, Gad M.; Raman, Rajeev;

    2011-01-01

    Let S be a string of length N compressed into a context- free grammar S of size n. We present two representa- tions of S achieving O(logN) random access time, and either O(n-ak(n)) construction time and space on the pointer machine model, or O(n) construction time and space on the RAM. Here, k......(n) is the inverse of the kth row of Ackermann's function. Our representations also efficiently support decompression of any substring in S: we can decompress any substring of length m in the same complexity as a single random access query and ad- ditional O(m) time. Combining these results with fast algorithms...

  11. Stepwise Approach to Accessible MOOC Development.

    Science.gov (United States)

    Draffan, E A; Wald, Mike; Dickens, Kate; Zimmermann, Gottfried; Kelle, Sebastian; Miesenberger, Klaus; Petz, Andrea

    2015-01-01

    Developing resources for online learning in its many guises and more recently for MOOCs has been discussed across the educational sector, usually by individuals working for one institution or organisation. Rarely are there discussions that highlight the issues of collaborative working on content that is delivered over a period of weeks for a wide range of abilities and skills. In particular there is a reluctance to face the issues presented by barriers to access for those with disabilities and even the issues that could arise should an academic be unable to access the development platform to present content. This paper aims to approach these issues by providing guidance in a series of practical steps that highlight an inclusive design approach.

  12. Accessing International Funding for Climate Change Adaptation

    DEFF Research Database (Denmark)

    Christiansen, Lars; Ray, Aaron D.; Smith, Joel B.

    The primary aim of this guidebook is to provide countries participating in the Technology Needs Assessment (TNA) Project with practical guidance that will help them secure financing for adaptation technology transfer project profiles identified in their Technology Action Plans (TAPs). The TNA...... of international public funding sources dedicated to adaptation investments (Chapter 3) • Seven fundamental eligibility criteria for accessing international public funding and guidance on how to apply these concepts to project ideas (Chapter 3) • A template (built on the abovementioned seven fundamental...... eligibility criteria) for developing/ presenting adaptation project ideas to international donors. Using this format when communicating project ideas to international donors and agencies is likely to facilitate greater interest and increase the chances of successfully accessing available funding (Chapter 3...

  13. Making Access to Astronomical Software More Efficient

    CERN Document Server

    Grosbol, P

    2010-01-01

    Access to astronomical data through archives and VO is essential but does not solve all problems. Availability of appropriate software for analyzing the data is often equally important for the efficiency with which a researcher can publish results. A number of legacy systems (e.g. IRAF, MIDAS, Starlink, AIPS, Gipsy), as well as others now coming online are available but have very different user interfaces and may no longer be fully supported. Users may need multiple systems or stand-alone packages to complete the full analysis which introduces significant overhead. The OPTICON Network on `Future Astronomical Software Environments' and the USVAO have discussed these issues and have outlined a general architectural concept that solves many of the current problems in accessing software packages. It foresees a layered structure with clear separation of astronomical code and IT infrastructure. By relying on modern IT concepts for messaging and distributed execution, it provides full scalability from desktops to cl...

  14. TCP Performance Enhancement for UMTS Access Network

    DEFF Research Database (Denmark)

    Hu, Liang

    2008-01-01

    We aim at optimize the TCP performance over UMTS access network challenged by the large delay bandwidth product that is mainly caused by the latency from the link layer ARQ retransmissions and diversity technique at physical layer. We propose to place a split TCP proxy at GGSN nodes which...... is between UMTS access network and Internet. The split proxy divides the bandwidth delay product into two parts, resulting in two TCP connections with smaller bandwidth delay products. Simulation results show, the split TCP proxy can significantly improve the TCP performance under high bit rate DCH channel...... scenario (e.g.256 kbps). Besides, the split TCP proxy brings more performance gain for downloading large files than downloading small ones. Finally, an aggressive initial TCP congestion window size at proxy can brings even more performance gain for radio links with high data rates DCH channels with large...

  15. Purely antiferromagnetic magnetoelectric random access memory

    Science.gov (United States)

    Kosub, Tobias; Kopte, Martin; Hühne, Ruben; Appel, Patrick; Shields, Brendan; Maletinsky, Patrick; Hübner, René; Liedke, Maciej Oskar; Fassbender, Jürgen; Schmidt, Oliver G.; Makarov, Denys

    2017-01-01

    Magnetic random access memory schemes employing magnetoelectric coupling to write binary information promise outstanding energy efficiency. We propose and demonstrate a purely antiferromagnetic magnetoelectric random access memory (AF-MERAM) that offers a remarkable 50-fold reduction of the writing threshold compared with ferromagnet-based counterparts, is robust against magnetic disturbances and exhibits no ferromagnetic hysteresis losses. Using the magnetoelectric antiferromagnet Cr2O3, we demonstrate reliable isothermal switching via gate voltage pulses and all-electric readout at room temperature. As no ferromagnetic component is present in the system, the writing magnetic field does not need to be pulsed for readout, allowing permanent magnets to be used. Based on our prototypes, we construct a comprehensive model of the magnetoelectric selection mechanisms in thin films of magnetoelectric antiferromagnets, revealing misfit induced ferrimagnetism as an important factor. Beyond memory applications, the AF-MERAM concept introduces a general all-electric interface for antiferromagnets and should find wide applicability in antiferromagnetic spintronics.

  16. Transparent data service with multiple wireless access

    Science.gov (United States)

    Dean, Richard A.; Levesque, Allen H.

    1993-01-01

    The rapid introduction of digital wireless networks is an important part of the emerging digital communications scene. The introduction of Digital Cellular, LEO and GEO Satellites, and Personal Communications Services poses both a challenge and an opportunity for the data user. On the one hand wireless access will introduce significant new portable data services such as personal notebooks, paging, E-mail, and fax that will put the information age in the user's pocket. On the other hand the challenge of creating a seamless and transparent environment for the user in multiple access environments and across multiple network connections is formidable. A summary of the issues associated with developing techniques and standards that can support transparent and seamless data services is presented. The introduction of data services into the radio world represents a unique mix of RF channel problems, data protocol issues, and network issues. These problems require that experts from each of these disciplines fuse the individual technologies to support these services.

  17. VHDL IMPLEMENTATION OF TEST ACCESS PORT CONTROLLER

    Directory of Open Access Journals (Sweden)

    MANPREET KAUR

    2012-06-01

    Full Text Available In this paper, an implementation of IEEE 1149.7 standard is used for designing Test Access Port (TAP Controller and testing of interconnects is done using boundary scan. By c-JTAG the pin count gets reduced which increases the performance and simplifies the connection between devices. TAP Controller is a synchronous Moore type finite state machine that is changed when the TMS and TCK signals of the test access port gets change. This controls the sequence operation of the circuitry conveyed by JTAG and c-JTAG. JTAGmainly used four pins with TAP and fifth pin is for optional use in Boundary scan. But c-JTAG uses only two pins with TAP. In this approach TDI and TDO gets multiplexed by using class T4 and T5 of c-JTAG. Various instructions are used for testing interconnects using IEEE 1149.7 standard (std.

  18. Museum audio guides as an accessibility enhancer

    OpenAIRE

    Martins, Cláudia Susana Nunes

    2012-01-01

    Accessibility to museums is enhanced by various types of cultural mediation, such as the use of audio guides, which consist of a means for innovative mediation put forth to make the museum visit more autonomous and simultaneously replace the traditional guided visit. Their use is integrated in the tendency for museum democratisation felt in Europe between the 60s and the 80s of the 20th century, especially with the development of educational services at museums and their opening to schools. I...

  19. Globalisation and schooling: equity and access issues

    Science.gov (United States)

    Zajda, Joseph

    2011-03-01

    This review essay focuses on the prominence given to globalisation and discourses of globalisation in education reforms and pedagogy, as well as the way conceptual thinking in this area has changed and developed, due to competing ideologies, forces of globalisation and political, economic and cultural transformations. It analyses and evaluates the shifts in methodological approaches to globalisation and its effects on education policy and pedagogy. It focuses on forces of globalisation, ideology, social inequality and implications for equity and access to quality education.

  20. Mechanism for alternating access in neurotransmitter transporters.

    Science.gov (United States)

    Forrest, Lucy R; Zhang, Yuan-Wei; Jacobs, Miriam T; Gesmonde, Joan; Xie, Li; Honig, Barry H; Rudnick, Gary

    2008-07-29

    Crystal structures of LeuT, a bacterial homologue of mammalian neurotransmitter transporters, show a molecule of bound substrate that is essentially exposed to the extracellular space but occluded from the cytoplasm. Thus, there must exist an alternate conformation for LeuT in which the substrate is accessible to the cytoplasm and a corresponding mechanism that switches accessibility from one side of the membrane to the other. Here, we identify the cytoplasmic accessibility pathway of the alternate conformation in a mammalian serotonin transporter (SERT) (a member of the same transporter family as LeuT). We also propose a model for the cytoplasmic-facing state that exploits the internal pseudosymmetry observed in the crystal structure. LeuT contains two structurally similar repeats (TMs1-5 and TMs 6-10) that are inverted with respect to the plane of the membrane. The conformational differences between them result in the formation of the extracellular pathway. Our model for the cytoplasm-facing state exchanges the conformations of the two repeats and thus exposes the substrate and ion-binding sites to the cytoplasm. The conformational change that connects the two states primarily involves the tilting of a 4-helix bundle composed of transmembrane helices 1, 2, 6, and 7. Switching the tilt angle of this bundle is essentially equivalent to switching the conformation of the two repeats. Extensive mutagenesis of SERT and accessibility measurements, using cysteine reagents, are accommodated by our model. These observations may be of relevance to other transporter families, many of which contain internal inverted repeats.

  1. Distributed Access View Integrated Database (DAVID) system

    Science.gov (United States)

    Jacobs, Barry E.

    1991-01-01

    The Distributed Access View Integrated Database (DAVID) System, which was adopted by the Astrophysics Division for their Astrophysics Data System, is a solution to the system heterogeneity problem. The heterogeneous components of the Astrophysics problem is outlined. The Library and Library Consortium levels of the DAVID approach are described. The 'books' and 'kits' level is discussed. The Universal Object Typer Management System level is described. The relation of the DAVID project with the Small Business Innovative Research (SBIR) program is explained.

  2. Open Access publishing in physics gains momentum

    CERN Multimedia

    2006-01-01

    "As if inventing the World-Wide Web were not revolutionary enough, the European Organisation for Nuclear Research (CERN) is now on its way to unleashing a paradigm shift in the world of academic publishing. For the first time ever, an entire scientific field is exploring the possibility of converting its reader-paid journals into an author-pai Open Access format." (1 page)

  3. An introduction to direct access storage devices

    CERN Document Server

    Sierra, Hugh M

    2012-01-01

    This book presents an exposition of the technology, design, organization, and structure of direct access storage devices (disk drives). It includes a discussion of the evolution of the technology (magnetic recording) and an assessment of other storage technologies, including optical recording. Examples of codes used in past implementations of disk drives as well as an application of disk drive usage dictated by reliability considerations are also included. The presentation assumes a minimum knowledge of magnetic recording, servomechanism design, and coding.

  4. Funding the Way to Open Access

    Institute of Scientific and Technical Information of China (English)

    Robert Terry

    2005-01-01

    The Wellcome Trust supports open access publishing via the author pays model and through the deposition of peer reviewed papers into PubMed Central. The costs of disseminating research and the author pays model should be seen as part of research costs and is estimated to be approximately 1% -2% of the grant funding budget. A PubMed Central version of the article adds value to the article through additional functions especially provide links between the literature and the data.

  5. Accessible Content Generation for the Learning Disabled

    Directory of Open Access Journals (Sweden)

    Zainab Pirani

    2014-06-01

    Full Text Available The research for this paper was conducted to explore the various aspects of Learning Disabled students and how the student-centered learning environments have been influenced and aided by educational technology. The educational content material which plays the important role in the field of educational technology has to be transformed in the way accessible to the LD learner. This paper provides the guidelines for the same as well provides the comparative analysis in support of th guidelines provided.

  6. Web services interface to EPICS channel access

    Institute of Scientific and Technical Information of China (English)

    DUAN Lei; SHEN Liren

    2008-01-01

    Web services is used in Experimental Physics and Industrial Control System (EPICS). Combined with EPICS Channel Access protocol, Web services' high usability, platform independence and language independence can be used to design a fully transparent and uniform software interface layer, which helps us complete channel data acquisition, modification and monitoring functions. This software interface layer, a cross-platform of cross-language,has good interopcrability and reusability.

  7. Complication with Intraosseous Access: Scandinavian Users' Experience

    Directory of Open Access Journals (Sweden)

    Peter Hallas

    2013-09-01

    Full Text Available Introduction: Intraosseous access (IO is indicated if vascular access cannot be quickly established during resuscitation. Complication rates are estimated to be low, based on small patient series, model or cadaver studies, and case reports. However, user experience with IO use in real-life emergency situations might differ from the results in the controlled environment of model studies and small patient series. We performed a survey of IO use in real-life emergency situations to assess users’ experiences of complications.Methods: An online questionnaire was sent to Scandinavian emergency physicians, anesthesiologists and pediatricians.Results: 1,802 clinical cases of IO use was reported by n=386 responders. Commonly reported complications with establishing IO access were patient discomfort/pain (7.1%, difficulties with penetration of periosteum with IO needle (10.3%, difficulties with aspiration of bone marrow (12.3%, and bended/broken needle (4.0%. When using an established IO access the reported complications were difficulties with injection fluid and drugs after IO insertion (7.4%, slow infusion (despite use of pressure bag (8.8%, displacement after insertion (8.5%, and extravasation (3.7%. Compartment syndrome and osteomyelitis occurred in 0.6% and 0.4% of cases respectively.Conclusion: In users’ recollection of real-life IO use, perceived complications were more frequent than usually reported from model studies. The perceived difficulties with using IO could affect the willingness of medical staff to use IO. Therefore, user experience should be addressed both in education of how to use, and research and development of IOs. [West J Emerg Med. 2013;14(5:440–443.

  8. Paper-based mobile access to databases

    OpenAIRE

    Signer, Beat; Norrie, Moira C.; Grossniklaus, Michael; Belotti, Rudi; Decurtins, Corsin; Weibel, Nadir

    2006-01-01

    Our demonstration is a paper-based interactive guide for visitors to the world's largest international arts festival that was developed as part of a project investigating new forms of context-aware information delivery and interaction in mobile environments. Information stored in a database is accessed from a set of interactive paper documents, including a printed festival brochure, a city map and a bookmark. Active areas are defined within the documents and selection of these using a special...

  9. Duodenal damage complicating percutaneous access to kidney

    OpenAIRE

    Antonio Corrêa Lopes Neto; Marcos Tobias-Machado; Roberto Vaz Juliano; Marco Aurélio Lipay; Milton Borrelli; Eric Roger Wroclawski

    2000-01-01

    CONTEXT: Since the first percutaneous nephrostomy performed by Goodwin in 1954, technical advances in accessing the kidneys via percutaneous puncture have increased the use of this procedure and thus the complications too. Among these complications, digestive tract damage is not common. DESIGN: Case report. CASE REPORT: We report a duodenal lesion that was corrected using surgical exploration and we touch on the therapeutic options, which may be conservative or interventionist. We chose conse...

  10. Spatiotemporal accessible solitons in fractional dimensions

    Science.gov (United States)

    Zhong, Wei-Ping; Belić, Milivoj R.; Malomed, Boris A.; Zhang, Yiqi; Huang, Tingwen

    2016-07-01

    We report solutions for solitons of the "accessible" type in globally nonlocal nonlinear media of fractional dimension (FD), viz., for self-trapped modes in the space of effective dimension 2 functions that include Gegenbauer polynomials, associated Laguerre polynomials, and associated Legendre functions. The validity of these solutions is verified by direct simulations. The model can be realized in various physical settings emulated by FD spaces; in particular, it applies to excitons trapped in quantum wells.

  11. The Internet accessible mathematical computation framework

    Institute of Scientific and Technical Information of China (English)

    Paul S. Wang; Simon Gray; Norbert Kajler; Dongdai Lin; Weidong Liao; Xiao Zou

    2004-01-01

    The Internet Accessible Mathematical Computation (IAMC) framework aims to make it easy to supply mathematical computing powers over the Internet/Web. The protocol-based IAMC framework enables developers to create interoperable clients and servers easily and independently. Presented are conceptual and experimental work on the IAMC framework architecture and major components: the Mathematical Computation Protocol (MCP), a client prototype (Dragonfly), a server prototype (Starfish), a mathematical encoding converter (XMEC), and an open mathematical compute engine interface (OMEI).

  12. Transformational leadership: visibility, accessibility, and communication.

    Science.gov (United States)

    Clavelle, Joanne T

    2012-01-01

    The chief nursing officer of a Magnet® organization is a dynamic, transformational leader who develops and communicates a strong vision for nursing excellence and creates a foundation for exemplary nursing practice and excellent patient care. Transformational leadership is a core component of the Magnet Model®. The 3rd subcomponent--visibility, accessibility, and communication--is the focus of this article.

  13. Performance indicators for SMEs accessing EU funds

    OpenAIRE

    2013-01-01

    Being the best supporters of national economies Small and Medium Sized Enterprises are actively searching alternative sources of finance for sustaining their goals and their performances. European Union is sustaining the SMEs access to finance by direct funding: grants from the European Commission and indirect funding: financial intermediaries in the SMEs origin country. Considering the importance of SMEs for national and European economy we will analyze the relationship between the EU fundin...

  14. Biliary Access During Endoscopic Retrograde Cholangiopancreatography

    Directory of Open Access Journals (Sweden)

    David L Carr-Locke

    2004-01-01

    Full Text Available Several techniques have been developed to facilitate cannulation of the papilla during endoscopic retrograde cholangiopancreatography (ERCP. The position of the endoscope should generally provide a 'straight' route to the papilla, and the efforts should be directed at shortening the intraduodenal portion of the bile duct. If a guidewire is used, one should be chosen that possesses suitable tip and shaft characteristics, including flexibility, strength, low friction and trackability, but no one device is likely to be suitable for all purposes. The development of guidewires composed of nitinol has revolutionized endoscopic practice. Access papillotomy ('pre-cut' can be employed as an alternative to (or in addition to insertion of a guidewire when cannulation of the major papilla has been unsuccessful. The same techniques may be used to allow deep cannulation of the bile or pancreatic duct after ductography, when fluoroscopy can also be used. The 'needle-knife', which must be used carefully because it cuts with even slight tissue contact, is moved in the expected direction of the intramural bile (or pancreatic duct to gain direct access into the duct. Access papillotomy is a valuable procedure in difficult cases, but is associated with greater risks than standard ERCP techniques (except perhaps for a reduced likelihood of pancreatitis, and is best employed by personnel who have extensive experience with therapeutic endoscopy. Technical details for a variety of clinical situations are described. Success requires application of 'the four Ps': position, practice, patience and perseverance.

  15. Mapping urban accessibility: gamifying the citizens’ experience

    Directory of Open Access Journals (Sweden)

    Catia Prandi

    2015-12-01

    Full Text Available In this paper we present the design process and some interesting field t rial r esults of two d ifferent game applications, designed and developed in order to extend and motivate the community of mPASS. mPASS is an urban accessibility mapping system that allows citizens to collect reliable data about barriers and facilities via crowdsourcing and crowdsensing and it uses these data to calculate accessible paths. On the one hand mPASS needs to collect a sufficiently dense, detailed and trustworthy amount of data. On the other hand, the community interested in obtaining accessible paths is not big enough to reach the critical mass of information needed by the system in order to provide effective services. To overcome this problem, we investigated gamification strategies in designing two mobile applications targeting young adults walkers, aimed to enlarge the data contributors community. The design process and field t rial results of both games are presented, highlighting the design decisions resulted from feedback sessions, focus groups and experience prototyping.

  16. Low latency memory access and synchronization

    Energy Technology Data Exchange (ETDEWEB)

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

    2010-10-19

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  17. Open Access to Content and Financial Innovation

    Directory of Open Access Journals (Sweden)

    Wesley Mendes-Da-Silva

    2015-08-01

    Full Text Available Over the last twenty years the world has experienced significant growth in the supply of knowledge as a result of the advent of the Internet and there has been a drastic reduction in the cost of acquiring or constructing relevant information. This has meant that various industries, like banks, commerce and even the public management sector have undergone a reconfiguration process. Similarly, universities and the publishers of scientific periodicals need to reflect on their future. After all, who is prepared to pay for content that can be freely accessed? In the wake of the change in the technological paradigm that characterizes communication, and driven by financial crises, we find the topic of Financial Innovation (Lerner, 2006. But this topic was already on the agenda even before the Internet appeared on the scene (Miller, 1986. At the beginning of May 2013, when we started putting together the Journal of Financial Innovation (JoFI an article entitled “Free-for-all”, which was published in the important British publication, The Economist, discussed the growth of open access scientific journals. At the time the British magazine stressed the practice adopted in the UK, which established open access journals as being the destination for research results. In essence, what is intended is to constitute a quality publication route without readers or authors being burdened with high costs, an area that is still responsible for large portions of the billionaire publishing market around the world. 

  18. Entrance C - Meyrin site: new access conditions

    CERN Multimedia

    2013-01-01

    Entrance C on the Meyrin site, which drivers of motorised vehicles can use Mondays to Fridays from 7 a.m. to 9 a.m. and from 5 p.m. to 7 p.m., has been altered to include a turnstile to allow cyclists and pedestrians to use their access card to get in and out of the site from 6 a.m. until 10 p.m.   The following video illustrates how to use the new turnstile: A new type of entrance gate fitted with a number plate reader similar to that installed at the entrance to the Prévessin site should, once fully tested, allow drivers of motorised vehicles to access the site. For the time being, the conditions of use of Entrance C remain unchanged. Further information on the entry into force of new arrangements will be issued in due course. For further information about CERN entrances: CERN opening hours CERN control access GS Department

  19. Random Access to Grammar Compressed Strings

    CERN Document Server

    Bille, Philip; Weimann, Oren

    2010-01-01

    Grammar based compression, where one replaces a long string by a small context-free grammar that generates the string, is a simple and powerful paradigm that captures many of the popular compression schemes, including the Lempel-Ziv family, Run-Length Encoding, Byte-Pair Encoding, Sequitur, and Re-Pair. In this paper, we present a novel grammar representation that allows efficient random access to any character or substring of $S$ without decompressing $S$. Let $S$ be a string of length $N$ compressed into a context-free grammar $\\mathcal{S}$ of size $n$. We present two representations of $\\mathcal{S}$ achieving either O(n) construction time and space and $O(\\log N \\log \\log N)$ random access time, or $O(n\\cdot \\alpha_k(n))$ construction time and space and $O(\\log N)$ random access time. Here, $\\alpha_k(n)$ is the inverse of the $k^{th}$ row of Ackermann's function. Our representations extend to efficiently support decompression of any substring in $S$. Namely, we can decompress any substring of length $m$ in...

  20. Internet access for everybody: The satellite solution

    Science.gov (United States)

    Wittig, Manfred

    2009-01-01

    The use of the Internet has been grown tremendously within the last decade to more than one billion subscribers. The other five billion people on Earth cannot enjoy the possibilities offered by the Internet. The digital divide is everywhere: in the developing as well as in the developed part of the world. In the developing countries basic communication needs (voice, IP access) need to be provided to a large population not living in cities. In the developed part of the world people residing outside the large cities, on the nice country side, have still difficulties to get broadband access. The reason being, that the investment to install the network infrastructure to this minority part of the population is a major part of the total investment for the network. The benefit for the telecom operators is marginal to get these customers on board. In this paper an analysis of the Internet and satellite development is being presented and based on these historical data a prediction of a possible evolution of satellite communications and broadband access is performed. One result is that the capacity of the GEO ring at the Ka-band alone would allow to provide to each individual on Earth in 2050 (assumed to be 10 billion people) a monthly capacity of about 1 Gbyte for a charge of 1$ per month.