WorldWideScience

Sample records for accessibility

  1. Access Denied

    Science.gov (United States)

    Villano, Matt

    2008-01-01

    Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…

  2. Accessible Knowledge - Knowledge on Accessibility

    DEFF Research Database (Denmark)

    Kirkeby, Inge Mette

    2015-01-01

    Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...

  3. Open access

    CERN Document Server

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder consent, and many authors, musicians, filmmakers, and other creators who depend on royalties are understandably unwilling to give their consent. But for 350 years, scholars have written peer-reviewed journal articles for impact, not for money, and are free to consent to open access without losing revenue. In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. Distilling a decade of Suber's influential writing and thinking about open access, this is the indispe...

  4. Hemodialysis access - self care

    Science.gov (United States)

    Kidney failure - chronic-hemodialysis access; Renal failure - chronic-hemodialysis access; Chronic renal insufficiency - hemodialysis access; Chronic kidney failure - hemodialysis access; Chronic renal failure - hemodialysis access; dialysis - hemodialysis access

  5. Access French

    CERN Document Server

    Grosz, Bernard

    2014-01-01

    Access is the major new language series designed with the needs of today's generation of students firmly in mind. Whether learning for leisure or business purposes or working towards a curriculum qualification, Access French is specially designed for adults of all ages and gives students a thorough grounding in all the skills required to understand, speak, read and write contemporary French from scratch. The coursebook consists of 10 units covering different topic areas, each of which includes Language Focus panels explaining the structures covered and a comprehensive glossary. Learning tips

  6. Hemodialysis access procedures

    Science.gov (United States)

    Kidney failure - chronic-dialysis access; Renal failure - chronic-dialysis access; Chronic renal insufficiency-dialysis access; Chronic kidney failure-dialysis access; Chronic renal failure-dialysis access

  7. CERN Access Cards and Access Authorisations

    CERN Multimedia

    2003-01-01

    From the 01/05/2003, all problems relating to access cards and refusal of access to any zone, building or experiment within CERN must be addressed to the Centrale de Surveillance des Accès (CSA building 120) on 78877 or send an e-mail to Access.Surveillance@cern.ch. The responsibles for CERN access control have put into place a procedure with the CSA, Service Enregistrement and the Technical Control Room, to make sure that all problems get resolved in a proper and timely manner.

  8. Accessibility and sensory experiences

    DEFF Research Database (Denmark)

    Ryhl, Camilla

    2010-01-01

    This article introduces a new design concept; sensory accessibility. While acknowledging the importance of sensory experiences in architectural quality, as well as the importance of accommodating user needs the concept combines three equally important factors; architecture, the senses...... and accessibility. Sensory accessibility accommodates aspects of a sensory disability and describes architectural design requirements needed to ensure access to architectural experiences. In the context of architecture accessibility has become a design concept of its own. It is generally described as ensuring...

  9. Professional Access 2013 programming

    CERN Document Server

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  10. Physical Access Control Database

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  11. Access Customized Forms

    OpenAIRE

    Cosma Emil; Jeflea Victor

    2010-01-01

    By using Word, Excel or PowerPoint one can automate routine operations using the VBA language (Visual Basic for Applications). This language is also used in Access, allowing access to data stored in tables or queries. Thus, Access and VBA resources can be used together. Access is designed for programming forms and reports (among other things), so there won’t be found any of the VBA editor’s specific forms.

  12. Open Access Alternatives

    Science.gov (United States)

    Tenopir, Carol

    2004-01-01

    Open access publishing is a hot topic today. But open access publishing can have many different definitions, and pros and cons vary with the definitions. Open access publishing is especially attractive to companies and small colleges or universities that are likely to have many more readers than authors. A downside is that a membership fee sounds…

  13. Pro Access 2010 Development

    CERN Document Server

    Collins, Mark

    2011-01-01

    Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for Applications (VBA) tools for Access applications, integrate Access with SharePoint and other business systems, and much more. Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, co

  14. Access 2013 for dummies

    CERN Document Server

    Ulrich Fuller, Laurie

    2013-01-01

    The easy guide to Microsoft Access returns with updates on the latest version! Microsoft Access allows you to store, organize, view, analyze, and share data; the new Access 2013 release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. Access 2013 For Dummies covers all the new features of the latest version of Accessand serves as an ideal reference, combining the latest Access features with the basics of building usable databases. You'll learn how to create an app from the Welcome screen, get support

  15. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  16. Urban Railway Accessibility

    Institute of Scientific and Technical Information of China (English)

    GUAN Hongzhi; YIN Yuanfei; YAN Hai; HAN Yan; QIN Huanmei

    2007-01-01

    Effective use of urban rapid railway systems requires that the railway systems be effectively connected with other transportation modes so that they are accessible. This paper uses the logit model and data to analyze the factors influencing railway access choices in a railway choice access model. The results indicate that access time, access cost, and access distance are factors significantly affecting railway access choices. The user's income significantly affects the probability of choosing to walk rather than to take a taxi,but is not related to choosing buses or bicycles. Vehicle ownership significantly affects the probability of choosing a taxi, but is not significantly related to the other modes. The conclusions provide an analysis tool for urban railway planning and construction.

  17. Open Access @ DTU

    DEFF Research Database (Denmark)

    Ekstrøm, Jeannette

    Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all peer review...... articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access and related topics...... such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc....

  18. Migrants' access to healthcare

    DEFF Research Database (Denmark)

    Norredam, Marie

    2011-01-01

    There are strong pragmatic and moral reasons for receiving societies to address access to healthcare for migrants. Receiving societies have a pragmatic interest in sustaining migrants' health to facilitate integration; they also have a moral obligation to ensure migrants' access to healthcare...... according to international human rights principles. The intention of this thesis is to increase the understanding of migrants' access to healthcare by exploring two study aims: 1) Are there differences in migrants' access to healthcare compared to that of non-migrants? (substudy I and II); and 2) Why...... are there possible differences in migrants' access to healthcare compared to that of non-migrants? (substudy III and IV). The thesis builds on different methodological approaches using both register-based retrospective cohort design, cross-sectional design and survey methods. Two different measures of access were...

  19. Access Data Analysis Cookbook

    CERN Document Server

    Bluttman, Ken

    2008-01-01

    This book offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Whether you use Access 2007 or an earlier version, this book will teach you new methods to query data, different ways to move data in and out of Access, how to calculate answers to financial and investment issues, how to jump beyond SQL by manipulating data with VBA, and more.

  20. Usability and accessibility curricula

    OpenAIRE

    Luján Mora, Sergio; Cachero Castro, Cristina

    2012-01-01

    Presentation of existing curricula connected with usability and accessibility at the University of Alicante for the Leonardo da Vinci project "GUI Usability and Accessibility: Exchanging Knowledge and Experiences" (Grenoble, France, 27 November 2012). Presentación del currículo actual relacionado con la usabilidad y la accesibilidad en la Universidad de Alicante para el proyecto Leonardo da Vinci "GUI Usability and Accessibility: Exchanging Knowledge and Experiences" (Grenoble, Francia, 27...

  1. Web Accessibility and Guidelines

    Science.gov (United States)

    Harper, Simon; Yesilada, Yeliz

    Access to, and movement around, complex online environments, of which the World Wide Web (Web) is the most popular example, has long been considered an important and major issue in the Web design and usability field. The commonly used slang phrase ‘surfing the Web’ implies rapid and free access, pointing to its importance among designers and users alike. It has also been long established that this potentially complex and difficult access is further complicated, and becomes neither rapid nor free, if the user is disabled. There are millions of people who have disabilities that affect their use of the Web. Web accessibility aims to help these people to perceive, understand, navigate, and interact with, as well as contribute to, the Web, and thereby the society in general. This accessibility is, in part, facilitated by the Web Content Accessibility Guidelines (WCAG) currently moving from version one to two. These guidelines are intended to encourage designers to make sure their sites conform to specifications, and in that conformance enable the assistive technologies of disabled users to better interact with the page content. In this way, it was hoped that accessibility could be supported. While this is in part true, guidelines do not solve all problems and the new WCAG version two guidelines are surrounded by controversy and intrigue. This chapter aims to establish the published literature related to Web accessibility and Web accessibility guidelines, and discuss limitations of the current guidelines and future directions.

  2. OGIS Access System

    Data.gov (United States)

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  3. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi;

    2015-01-01

    as waste. However, if the common receiver (e.g., base station) is capable to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access...

  4. Market Access and Welfare

    DEFF Research Database (Denmark)

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    2015-01-01

    Well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. The present paper proposes a new set of tariff reforms that can achieve both...

  5. Intellectual Access to Images.

    Science.gov (United States)

    Chen, Hsin-Liang; Rasmussen, Edie M.

    1999-01-01

    The increased availability of digital images is accompanied by a need for solutions to the problems inherent in indexing them for retrieval. Problems in image description and access are discussed, with a perspective on traditional and new solutions. Recent developments in intellectual access to images are surveyed and contrasted with…

  6. The Open Access Divide

    Directory of Open Access Journals (Sweden)

    Jingfeng Xia

    2013-10-01

    Full Text Available This paper is an attempt to review various aspects of the open access divide regarding the difference between those academics who support free sharing of data and scholarly output and those academics who do not. It provides a structured description by adopting the Ws doctrines emphasizing such questions as who, what, when, where and why for information-gathering. Using measurable variables to define a common expression of the open access divide, this study collects aggregated data from existing open access as well as non-open access publications including journal articles and extensive reports. The definition of the open access divide is integrated into the discussion of scholarship on a larger scale.

  7. Pediatric vascular access

    International Nuclear Information System (INIS)

    Pediatric interventional radiologists are ideally suited to provide vascular access services to children because of inherent safety advantages and higher success from using image-guided techniques. The performance of vascular access procedures has become routine at many adult interventional radiology practices, but this service is not as widely developed at pediatric institutions. Although interventional radiologists at some children's hospitals offer full-service vascular access, there is little or none at others. Developing and maintaining a pediatric vascular access service is a challenge. Interventionalists skilled in performing such procedures are limited at pediatric institutions, and institutional support from clerical staff, nursing staff, and technologists might not be sufficiently available to fulfill the needs of such a service. There must also be a strong commitment by all members of the team to support such a demanding service. There is a slippery slope of expected services that becomes steeper and steeper as the vascular access service grows. This review is intended primarily as general education for pediatric radiologists learning vascular access techniques. Additionally, the pediatric or adult interventional radiologist seeking to expand services might find helpful tips. The article also provides education for the diagnostic radiologist who routinely interprets radiographs containing vascular access devices. (orig.)

  8. Pediatric vascular access

    Energy Technology Data Exchange (ETDEWEB)

    Donaldson, James S. [Northwestern University, Feinberg School of Medicine, Department of Medical Imaging, Children' s Memorial Hospital, Chicago, IL (United States)

    2006-05-15

    Pediatric interventional radiologists are ideally suited to provide vascular access services to children because of inherent safety advantages and higher success from using image-guided techniques. The performance of vascular access procedures has become routine at many adult interventional radiology practices, but this service is not as widely developed at pediatric institutions. Although interventional radiologists at some children's hospitals offer full-service vascular access, there is little or none at others. Developing and maintaining a pediatric vascular access service is a challenge. Interventionalists skilled in performing such procedures are limited at pediatric institutions, and institutional support from clerical staff, nursing staff, and technologists might not be sufficiently available to fulfill the needs of such a service. There must also be a strong commitment by all members of the team to support such a demanding service. There is a slippery slope of expected services that becomes steeper and steeper as the vascular access service grows. This review is intended primarily as general education for pediatric radiologists learning vascular access techniques. Additionally, the pediatric or adult interventional radiologist seeking to expand services might find helpful tips. The article also provides education for the diagnostic radiologist who routinely interprets radiographs containing vascular access devices. (orig.)

  9. Market Access and Welfare

    DEFF Research Database (Denmark)

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    According to the literature, well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. Such conflict between welfare and market access...... objectives of trade policy is problematic and calls for finding alternative tariff reform rules that can achieve both objectives at the same time. The present paper contributes to this aim by using a new set of tariff reforms that are based on local optimality. Using such reforms it is shown that market...

  10. Access 2010 for dummies

    CERN Document Server

    Ulrich Fuller, Laurie

    2010-01-01

    A friendly, step-by-step guide to the Microsoft Office database application Access may be the least understood and most challenging application in the Microsoft Office suite. This guide is designed to help anyone who lacks experience in creating and managing a database learn to use Access 2010 quickly and easily. In the classic For Dummies tradition, the book provides an education in Access, the interface, and the architecture of a database. It explains the process of building a database, linking information, sharing data, generating reports, and much more.As the Micr

  11. Extra- and intrathoracic access.

    Science.gov (United States)

    Lazarides, Miltos K; Georgakarakos, Efstratios I; Schoretsanitis, Nikolaos

    2014-01-01

    The most complex patients requiring vascular access are those with bilateral central vein occlusions. Endovascular repair of the central lesions when feasible allow upper extremity use for access. When endovascular repair is not feasible, femoral vein transposition should be the next choice. When lower limb access sites have been exhausted or are contraindicated as in obese patients and in patients with peripheral arterial obstructive disease, a range of extrathoracic "exotic" extra-anatomic access procedures as the necklace cross-chest arteriovenous (AV) grafts, the ipsilateral axillo-axillary loops, the brachial-jugular AV grafts, the axillo-femoral AV grafts or even intra-thoracic ones as the right atrial AV bypasses represent the vascular surgeon's last resort. The selection among those extra-anatomical chest-wall procedures should be based upon each patient's anatomy or patient-specific factors. PMID:24817469

  12. Access cavity preparation.

    Science.gov (United States)

    Adams, N; Tomson, P L

    2014-03-01

    Each stage of root canal treatment should be carried out to the highest possible standard. The access cavity is arguably the most important technical stage, as subsequent preparation of the root canal(s) can be severely comprised if this is not well executed. Inadequate access can lead to canals being left untreated, poorly disinfected, difficult to shape and obturate, and may ultimately lead to the failure of the treatment. This paper highlights common features in root canal anatomy and outlines basic principles for locating root canals and producing a good access cavity. It also explores each phase of the preparation in detail and offers suggestions of instruments that have been specifically designed to overcome potential difficulties in the process. Good access design and preparation will result in an operative environment which will facilitate cleaning, shaping and obturation of the root canal system in order to maximise success.

  13. Accessibility and assistive products

    Science.gov (United States)

    Rodríguez-Porrero, Cristina

    2009-01-01

    Introduction Accessibility and assistive products and technologies are needed to ensure the rights of persons with disabilities and older persons. Many developments have been implemented in laws, standards, markets and from the consumers perspective, at international, European and national levels. The real issue is that not all the potential users benefit from the use of assistive products or accessible measures. Discussion Innovative methods are needed to allow all potential users to have real advantage of assistive technologies and accessible and design for all facilities. Best practices will be presented and existing gaps and recommendations will be discussed. Cost-benefits aspects will also be presented. Conclusion In order to get advantages from opportunities of globalization, hard work and responsibilities of all stakeholders are needed, so that assistive products and accessibility reach a whole range of situations and environments and contribute to ensure quality of life in a society for all.

  14. Access/AML

    Data.gov (United States)

    Department of Transportation — The AccessAML is a web-based internet single application designed to reduce the vulnerability associated with several accounts assinged to a single users. This is a...

  15. The universal access handbook

    CERN Document Server

    Stephanidis, Constantine

    2009-01-01

    In recent years, the field of Universal Access has made significant progress in consolidating theoretical approaches, scientific methods and technologies, as well as in exploring new application domains. Increasingly, professionals in this rapidly maturing area require a comprehensive and multidisciplinary resource that addresses current principles, methods, and tools. Written by leading international authorities from academic, research, and industrial organizations and nonmarket institutions, The Universal Access Handbook covers the unfolding scientific, methodological, technological, and pol

  16. CERN access cards

    CERN Multimedia

    HR Department

    2007-01-01

    Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.

  17. Children's access to medicines

    OpenAIRE

    Alkahtani, Saad Ahmed

    2013-01-01

    Access to health care for children is important. It is dependent on access to health professionals and also parental attitudes towards illness. Children have the right to receive medicines that are scientifically evaluated for both efficacy and safety. Counterfeit and substandard medicines unfortunately result in the death of many children worldwide. There have been particular problems with diethylene glycol which has been used as a solvent in counterfeit medicines. It has also been foun...

  18. IMPROVING ACCESS TO DRUGS

    OpenAIRE

    Max Joseph Herman

    2012-01-01

    Although essentially not all therapies need drug intervention, drugs is still an important components in health sector, either in preventive, curative, rehabilitative or promotion efforts. Hence the access to drugs is a main problem, either in international or national scale even to the smallest unit. The problem on access to drugs is very complicated and cannot be separated especially from pharmacy management problems; moreover in general from the overall lack of policy development and effec...

  19. IVOA Simple Image Access

    CERN Document Server

    Dowler, Patrick; Bonnarel, François

    2016-01-01

    The Simple Image Access protocol (SIA) provides capabilities for the discovery, description, access, and retrieval of multi-dimensional image datasets, including 2-D images as well as datacubes of three or more dimensions. SIA data discovery is based on the ObsCore Data Model (ObsCoreDM), which primarily describes data products by the physical axes (spatial, spectral, time, and polarization). Image datasets with dimension greater than 2 are often referred to as datacubes, cube or image cube datasets and may be considered examples of hypercube or n-cube data. In this document the term "image" refers to general multi-dimensional datasets and is synonymous with these other terms unless the image dimensionality is otherwise specified. SIA provides capabilities for image discovery and access. Data discovery and metadata access (using ObsCoreDM) are defined here. The capabilities for drilling down to data files (and related resources) and services for remote access are defined elsewhere, but SIA also allows for dir...

  20. Support open access publishing

    DEFF Research Database (Denmark)

    Ekstrøm, Jeannette

    2013-01-01

    Projektet Support Open Access Publishing har til mål at få opdateret Sherpa/Romeo databasen (www.sherpa.ac.uk/romeo) med fagligt relevante, danske tidsskrifter. Projektet skal endvidere undersøge mulighederne for at få udviklet en database, hvor forskere på tværs af relevante tidsskriftsinformati......Projektet Support Open Access Publishing har til mål at få opdateret Sherpa/Romeo databasen (www.sherpa.ac.uk/romeo) med fagligt relevante, danske tidsskrifter. Projektet skal endvidere undersøge mulighederne for at få udviklet en database, hvor forskere på tværs af relevante...... tidsskriftsinformationer (faglig disciplin, BFI niveau, Impact Factor, Open Access) vil kunne danne sig et hurtigt overblik, for derved at kunne træffe et kvalificeret valg om, hvor og hvordan man skal publicere sine forskningsresultater....

  1. Disruption - Access cards service

    CERN Multimedia

    2014-01-01

    We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.

  2. Sprawl and Accessibility

    Directory of Open Access Journals (Sweden)

    Robert Bruegmann

    2008-07-01

    Full Text Available This essay argues that many of the assumptions that have been made about sprawl are misleading or just wrong. Nowhere has this been more the case than in debates about transportation and access. Because of this, it is not surprising that a good many of the policies advocated by proponents of Smart Growth would almost certainly lead to reduced mobility and impaired accessibility for a large part of the population. At very least, the debates over sprawl have pitted private vs. public transportation in a way that has contributed to serious underfunding of transportation infrastructure of all kinds.

  3. Quantum random access memory

    OpenAIRE

    Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo

    2007-01-01

    A random access memory (RAM) uses n bits to randomly address N=2^n distinct memory cells. A quantum random access memory (qRAM) uses n qubits to address any quantum superposition of N memory cells. We present an architecture that exponentially reduces the requirements for a memory call: O(log N) switches need be thrown instead of the N used in conventional (classical or quantum) RAM designs. This yields a more robust qRAM algorithm, as it in general requires entanglement among exponentially l...

  4. Analysis of Open Access Landscape

    Institute of Scientific and Technical Information of China (English)

    Helen Doyle; Andy Gass; Debra Lappin; Rebecca Kennison

    2005-01-01

    This paper is created by bounding 5 editorials of Public Library of Science (PLoS ) which have written on various aspects of open access. It covers wide range topics of important open access issues, such as from paying for open access to copyright to open access as a public issue, which may be more or less of interest of our audience.

  5. Access to telecommunications networks

    OpenAIRE

    Canoy, M.F.M.; de Bijl, P.W.J.; Kemp, R.

    2003-01-01

    Contributing to a convergence of legal and economic approaches, The Economics of Antitrust and Regulation in Telecommunications integrates economic theory into current EU antitrust policy within the sector. The book addresses the role of competition and regulatory policies on a number of key issues in telecommunications, such as market definition, collective dominance, access to networks, and allocation of scarce resources.

  6. Access to effective healthcare

    DEFF Research Database (Denmark)

    Høy, Bente

    2015-01-01

    Access to effective healthcare is in particular challenging for vulnerable and socially disadvantaged patients. Patients with chronic conditions are over-represented in these lower socioeconomic (LSES) groups. No generic review integrating the evidence on Self-Management support interventions in ...

  7. ACCESS Project: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Weller, Heiko [Robert Bosch, LLC, Farmington Hills, MI (United States)

    2015-04-01

    The ACCESS project addressed the development, testing, and demonstration of the proposed advanced technologies and the associated emission and fuel economy improvement at an engine dynamometer and on a full-scale vehicle. Improve fuel economy by 25% with minimum performance penalties Achieve SULEV level emissions with gasoline Demonstrate multi-mode combustion engine management system

  8. Funding scientific open access

    International Nuclear Information System (INIS)

    In order to reduce the knowledge divide, more Open Access Journals (OAJ) are needed in all languages and scholarly subject areas that exercise peer-review or editorial quality control. To finance needed costs, it is discussed why and how to sell target specific advertisement by associating ads to given scientific keywords. (author)

  9. Efficient Distributed Medium Access

    CERN Document Server

    Shah, Devavrat; Tetali, Prasad

    2011-01-01

    Consider a wireless network of n nodes represented by a graph G=(V, E) where an edge (i,j) models the fact that transmissions of i and j interfere with each other, i.e. simultaneous transmissions of i and j become unsuccessful. Hence it is required that at each time instance a set of non-interfering nodes (corresponding to an independent set in G) access the wireless medium. To utilize wireless resources efficiently, it is required to arbitrate the access of medium among interfering nodes properly. Moreover, to be of practical use, such a mechanism is required to be totally distributed as well as simple. As the main result of this paper, we provide such a medium access algorithm. It is randomized, totally distributed and simple: each node attempts to access medium at each time with probability that is a function of its local information. We establish efficiency of the algorithm by showing that the corresponding network Markov chain is positive recurrent as long as the demand imposed on the network can be supp...

  10. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...

  11. College Access Marketing

    Science.gov (United States)

    Tremblay, Christopher W.

    2011-01-01

    College Access Marketing (CAM) is a relatively new phenomenon that seeks to positively influence the college-going rate. This report defines CAM, describes CAM examples, and discusses how CAM seeks to counter barriers to college. It explores four main elements of CAM: information, marketing, advocacy, and social mobilization. Further, it…

  12. Access as justice

    OpenAIRE

    FITZPATRICK, Peter

    2005-01-01

    With the considerable help of Derrida, aptly aided by Mandela, this paper advances an idea of justice as integral to law. Thence, by way of an homology with such justice, access also is shown to be integral to law. What impels the overall argument is the primacy accorded to law in the constitution of the social bond.

  13. Open Access: Soziologische Aspekte

    OpenAIRE

    Herb, Ulrich

    2007-01-01

    Die Forderung nach Open Access wird wissenschaftslogisch (Beschleunigung der wissenschaftlichen Kommunikation), finanziell (Linderung der Zeitschriftenkrise), sozial (Verringerung des Digital Divide), demokratietheoretisch (Zugang zu Informationen ermöglicht Partizipation) und sozialpolitisch (freier Zugang zu Informationen nivelliert Ungleichheiten) begründet. Dieser Beitrag untersucht einige dieser Annahmen mittels sozialwissenschaftlicher Modelle. Von Befunden aus der Bildungssoziologie un...

  14. Kinds of access

    DEFF Research Database (Denmark)

    Overgaard, Morten; Sandberg, Kristian

    2012-01-01

    that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesize that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about...

  15. Kinds of Access

    DEFF Research Database (Denmark)

    Overgaard, Morten; Sandberg, Kristian

    2014-01-01

    that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesise that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about...

  16. Managing access block.

    Science.gov (United States)

    Cameron, Peter; Scown, Paul; Campbell, Donald

    2002-01-01

    There is pessimism regarding the ability of the Acute Health Sector to manage access block for emergency and elective patients. Melbourne Health suffered an acute bed crisis in 2001 resulting in record ambulance diversions and emergency department (ED) delays. We conducted an observational study to reduce access block for emergency patients whilst maintaining elective throughput at Melbourne Health. This involved a clinician-led taskforce using previously proven principles for organisational change to implement 51 actions to improve patient access over a three-month period. The primary outcome measures were ambulance diversion, emergency patients waiting more than 12 hours for an inpatient bed, elective throughput and theatre cancellations. Despite a reduction in multi-day bed numbers all primary objectives were met, ambulance diversion decreased to minimal levels, 12-hour waits decreased by 40% and elective throughput was maintained. Theatre cancellations were also minimised. We conclude that access block can be improved by clinician-led implementation of proven process improvements over a short time frame. The ability to sustain change over the longer term requires further study.

  17. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  18. Accessing offshoring advantages

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona; Motika, Agnes; Wæhrens, Brian Vejrum;

    2015-01-01

    Purpose – The purpose of this paper is to advance the understanding of factors that affect offshoring performance results. To do so, this paper focuses on the access to location-specific advantages, rather than solely on the properties of the offshoring company, its strategy or environment....... Assuming that different levels of synergy may exist between particular offshoring strategic decisions (choosing offshore outsourcing or captive offshoring and the type of function) and different offshoring advantages, this work advocates that the actual fact of realization of certain offshoring advantages...... (getting or not getting access to them) is a more reliable predictor of offshoring success. Design/methodology/approach – Aset of hypotheses derived from the extant literature is tested on the data from a quantitative survey of 1,143 Scandinavian firms. Findings – The paper demonstrates that different...

  19. Complication with intraosseous access

    DEFF Research Database (Denmark)

    Hallas, Peter; Brabrand, Mikkel; Folkestad, Lars

    2013-01-01

    INTRODUCTION: Intraosseous access (IO) is indicated if vascular access cannot be quickly established during resuscitation. Complication rates are estimated to be low, based on small patient series, model or cadaver studies, and case reports. However, user experience with IO use in real......-life emergency situations might differ from the results in the controlled environment of model studies and small patient series. We performed a survey of IO use in real-life emergency situations to assess users' experiences of complications. METHODS: An online questionnaire was sent to Scandinavian emergency...... the willingness of medical staff to use IO. Therefore, user experience should be addressed both in education of how to use, and research and development of IOs....

  20. Internet Access to Spacecraft

    OpenAIRE

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Jackson, Chris; Price, Harold

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project at NASA's Goddard Space flight Center (GSFC), is demonstrating the use of standard Internet protocols for spacecraft communication systems. This year, demonstrations of Internet access to a flying spacecraft have been performed with the UoSAT-12 spacecraft owned and operated by Surrey Satellite Technology Ltd. (SSTL). Previously, demonstrations were performed using a ground satellite simulator and NASA's Tracking and Data Relay Sa...

  1. Accessibility and Economic Opportunity

    OpenAIRE

    O'Regan, Katherine M.; Quigley, John M.

    1997-01-01

    Over thirty years ago, researchers raised the possibility of an important link between transportation, jobs and prospects for the poor. Decentralized employment, centralized minorities and poor, and inadequate transportation links in between were the context of the urban riots of the 1960's and posited as a causal factor by researchers. Given federal mandates for large-scale movement of welfare recipients into jobs, whether--and to what extent--access affects employment is still of national i...

  2. IMPROVING ACCESS TO DRUGS

    Directory of Open Access Journals (Sweden)

    Max Joseph Herman

    2012-11-01

    Full Text Available Although essentially not all therapies need drug intervention, drugs is still an important components in health sector, either in preventive, curative, rehabilitative or promotion efforts. Hence the access to drugs is a main problem, either in international or national scale even to the smallest unit. The problem on access to drugs is very complicated and cannot be separated especially from pharmacy management problems; moreover in general from the overall lack of policy development and effective of health policy, and also the implementation process. With the policy development and effective health policy, rational drug uses, sufficient health service budget so a country can overcome the health problems. Besides infrastructures, regulations, distribution and cultural influences; the main obstacles for drug access is drugs affordability if the price of drugs is an important part and determined by many factors, especially the drug status whether is still patent orgenerics that significantly decrease cost of health cares and enhance the drugs affordability. The determination of essential drug prices in developing countries should based on equity principal so that poor people pay cheaper and could afford the essential drugs. WHO predicts two third of world population can not afford the essential drugs in which in developing countries, some are because of in efficient budget allocation in consequence of drug distribution management, including incorrect selection and allocation and also irrational uses. In part these could be overcome by enhancing performances on the allocation pharmacy needs, including the management of information system, inventory management, stock management and the distribution. Key words: access, drugs, essential drugs, generic drugs

  3. ADOPT Open Access

    CERN Multimedia

    2007-01-01

    Are you writing a theoretical paper? An experimental one? Or one about instrumentation? You can publish it in Open Access. Now. Read how... You might have heard about Open Access, the next big thing in scientific publishing. The idea is to make the results of your (publicly funded) research free to read for everyone out there ... not only those lucky ones who work in places where libraries can afford to purchase the expensive subscriptions to scientific journals. CERN, DESY and other particle physics institutes have accepted an offer by one of the leading journals in High Energy Physics, JHEP: our libraries will pay a special subscription fee, and, in exchange, all articles with at least one author from our institutes will be published in Open Access. Anyone, anywhere and anytime will be able to read them, without any financial barrier! If you are writing an instrumentation paper, you can submit it to JINST and benefit from the same offer. This is a major step forward in the planned conversion of existi...

  4. Intelligent card access keys

    International Nuclear Information System (INIS)

    A newly developed access control technology allows information about users to be stored on key-like EEPROM devices. The keys store encrypted information about the user and his or her authorized access activity. Specially developed key readers scan, decrypt, and process the key data, and make the decision whether entry should be granted or denied. The key readers can function as complete, stand-alone facility management systems, incorporating access control, security monitoring, and remote control. In this configuration, the key readers provide anti-passback protection and other special features without requiring any data lines between readers. The key readers also feature sophisticated algorithmic processing for performing complex operations such as two-man control or cross zoned security annunciation. Key readers can also be interconnected with an MCM-1000 Multiples Monitoring System to form a distributed processing local area network. In such a configuration, changes in key reader status can be uploaded to the MCM-1000, and programming changes and operator commands can be downloaded to the key readers

  5. Open-Access Publishing

    Directory of Open Access Journals (Sweden)

    Nedjeljko Frančula

    2013-06-01

    Full Text Available Nature, one of the most prominent scientific journals dedicated one of its issues to recent changes in scientific publishing (Vol. 495, Issue 7442, 27 March 2013. Its editors stressed that words technology and revolution are closely related when it comes to scientific publishing. In addition, the transformation of research publishing is not as much a revolution than an attrition war in which all sides are buried. The most important change they refer to is the open-access model in which an author or an institution pays in advance for publishing a paper in a journal, and the paper is then available to users on the Internet free of charge.According to preliminary results of a survey conducted among 23 000 scientists by the publisher of Nature, 45% of them believes all papers should be published in open access, but at the same time 22% of them would not allow the use of papers for commercial purposes. Attitudes toward open access vary according to scientific disciplines, leading the editors to conclude the revolution still does not suit everyone.

  6. Direct access to INIS

    International Nuclear Information System (INIS)

    Librarians, researchers, and information specialists throughout the world now have the opportunity for direct access to coverage of almost 95% of the world's literature dealing with the peaceful uses of atomic energy and nuclear science. This opportunity has been provided by the International Nuclear Information System (INIS) of the IAEA. INIS, with the voluntary collaboration of more than 60 of the Agency's Member States, maintains a comprehensive, computer-resident data-base, containing the bibliographic details plus informative abstracts of the bulk of the world's literature on nuclear science and technology. Since this data-base is growing at a rate of 75,000 items per year, and already contains more than 500,000 items, it is obviously important to be able to search this collection conveniently and efficiently. The usefulness of this ability is enhanced when other data-bases on related subjects are made available on an information network. During the early 1970s, on-line interrogation of large bibliographic data-bases became the accepted method for searching this type of information resource. Direct interaction between the searcher and the data-base provides quick feed-back resulting in improved literature listings for launching research and development projects. On-line access enables organizations which cannot store a large data-base on their own computer to expand the information resources at their command. Because of these advantages, INIS undertook to extend to interested Member States on-line access to its data-base in Vienna

  7. After Access: Underrepresented Students' Postmatriculation Perceptions of College Access Capital

    Science.gov (United States)

    Means, Darris R.; Pyne, Kimberly B.

    2016-01-01

    This qualitative study explores the perceived impact of college-going capital gained during participation in a college access program. In three, semistructured interviews spanning the first-year college experience, 10 first-year college students who participated in a college access program articulate the value of access programming and also raise…

  8. Access and Fishing Activities

    DEFF Research Database (Denmark)

    Høst, Jeppe Engset

    2015-01-01

    a detailed ethnographic description of five different fishing operations and then compare them on a number of different fronts. This will direct us to some general differences in their modes of operation in relation to the vessel quota share (VQS) system and lead us to the next chapter, where the principal......In this chapter, I look at the implications of transferable quotas on the organization of production; that is, how fishing activities are structured around access to the individual and transferable quotas and how, in turn, the quotas structure the production. Therefore, this chapter will give...

  9. Access to Research Inputs

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    2015-01-01

    The viability of modern open science norms and practices depends on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...

  10. Access to Research Inputs

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    The viability of modern open science norms and practices depend on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...

  11. Some self-access principles

    Directory of Open Access Journals (Sweden)

    Lucy Cooker

    2010-06-01

    Full Text Available In this article, I will describe how the Self-Access Learning Centre (SALC at Kanda University of International Studies (KUIS was established, and discuss some of the personal philosophies of self-access centres (SACs and self-access learning that I have developed over the eight years of being associated with this centre.

  12. Mechanisms that improve referential access*

    OpenAIRE

    Gernsbacher, Morton Ann

    1989-01-01

    Two mechanisms, suppression and enhancement, are proposed to improve referential access. Enhancement improves the accessibility of previously mentioned concepts by increasing or boosting their activation; suppression improves concepts’ accessibility by decreasing or dampening the activation of other concepts. Presumably, these mechanisms are triggered by the informational content of anaphors. Six experiments investigated this proposal by manipulating whether an anaphoric reference was made wi...

  13. Accessibility and inclusion informational

    Directory of Open Access Journals (Sweden)

    Mônica Sena de Souza

    2013-06-01

    Full Text Available Introduction: Discusses the role of information professionals in meeting the informational demands of people with disabilities in the information society. The librarian is crucial for the effectiveness and success in the informational inclusion of people with disabilities, considering also continuing education for their professional qualification.Objective: To provide reflections on the role of the librarian in serving users with disabilities, highlighting the need for improvement in information units, identified in the scientific literature with regard to accessibility.Methodology: Literature search, based on a review of literature in books and scientific papers, highlighting the main authors: Adams (2000, Mazzoni (2001 and Sassaki (1997, 2002, 2005.Results: The lack of informational access for people with disabilities hampers their social and political participation, hence, reduces its condition of citizenship.Conclusion: The librarian responsible for seeking continuing education, greater involvement in the events of the area and the constant search for job training, which will reflect on the best service the information needs of users with disabilities.

  14. Access to legal abortion.

    Science.gov (United States)

    1993-10-01

    Countries are grouped by the nature and extent of access to legal abortion. The categories include abortion on demand, for social reasons, for health reasons, for rape or incest or to save a mother's life, and only to save a mother's life. Abortion on demand is available for about 40% of the world's population and may have restrictions, such as parental consent or approval of state committees or physicians. There are 22 countries in Europe, 12 in the former Soviet Union, four in Asia, four in the Americas, one in the Middle East (Turkey), and one in Africa (Tunisia) which provide access to early abortion on demand. Abortion for social and economic reasons is available to 21% of the world's population in five countries in Asia, three in Europe (Great Britain, Finland, and Hungary), and one in Africa (Zambia). Abortion for health reasons is available to 16% of the world's population located in 21 countries in Africa, eight in the Americas, seven in Asia, five in Europe, and four in the Middle East. Laws governing about 5% of the world's population permit abortion only in the case of rape, incest, or when a mother's life is in danger (Brazil, Mexico, and Sudan). 18% of the world's population is covered by laws which permit an abortion only when a mother's life is in danger; this includes 19 countries in Africa, 11 in the Americas, nine in Asia, seven in the Middle East, and one in Europe (Ireland). PMID:12287145

  15. Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor

    OpenAIRE

    Desmedt, Yvo; Shaghaghi, Arash

    2016-01-01

    Security researchers have stated that the core concept behind current implementations of access control predates the Internet. These assertions are made to pinpoint that there is a foundational gap in this field, and one should consider revisiting the concepts from the ground up. Moreover, Insider threats, which are an increasing threat vector against organizations are also associated with the failure of access control. Access control models derived from access control matrix encompass three ...

  16. Access For All

    DEFF Research Database (Denmark)

    Andersen, Ove Kjeld; Hjulmand, Christian

    2005-01-01

    Approximately 30% of the Danish population has severe problems in reading everyday text. In the light of the increasing amount of text available on the Internet this poses a democratic challenge to ensure “equal access” to information. The Talking Internet service - Access For All (AFA) - offers...... a free Internet-based tool for reading aloud any marked text with a synthetic voice. The only requirements are a standard equipped PC running a recent Windows OS and an Internet connection. Experiences gathered from running the service for more than 28 months underline the viability of the concept....... There is a clear need for a free internet based Danish text-to-speech synthesizer. Furthermore, the current state of technology i.e. internet bandwidth, response time and server technology is sufficient for setting up an online automatic reading service that is used by steadily growing number of individuals...

  17. AccessCulture

    DEFF Research Database (Denmark)

    Valtysson, Bjarki

    of the European Union, and how its cultural policy responds to the changes that the digital paradigm has brought upon the field. The self-publishing features of various Web 2.0 platforms, along with the interactive and distributional potentials that the Internet offers, have given rise to what is referred to here...... in cultural production and consumption. The first part of this works looks at how these changes respond to the field of cultural policy, as well as suggesting a possible culturepolitical reaction in a model which I refer to as access culture. In terms of theoretical approach, the notion of digital cultural...... of YouTube, MySpace, Facebook and Flickr, along with lesser known platforms such as the animated short film Elephants Dream, the BBC's Creative Archive, various Internet artworks and the Internet Archive. I furthermore introduce the copyright system Creative Commons in order to suggest legal, widely...

  18. Membrane accessibility of glutathione

    DEFF Research Database (Denmark)

    Garcia, Alvaro; Eljack, Nasma D; Sani, Marc-Antoine;

    2015-01-01

    Regulation of the ion pumping activity of the Na(+),K(+)-ATPase is crucial to the survival of animal cells. Recent evidence has suggested that the activity of the enzyme could be controlled by glutathionylation of cysteine residue 45 of the β-subunit. Crystal structures so far available indicate...... that this cysteine is in a transmembrane domain of the protein. Here we have analysed via fluorescence and NMR spectroscopy as well as molecular dynamics simulations whether glutathione is able to penetrate into the interior of a lipid membrane. No evidence for any penetration of glutathione into the...... membrane was found. Therefore, the most likely mechanism whereby the cysteine residue could become glutathionylated is via a loosening of the α-β subunit association, creating a hydrophilic passageway between them to allow access of glutathione to the cysteine residue. By such a mechanism...

  19. Accessibility Long Term Perspectives

    Directory of Open Access Journals (Sweden)

    Kay Axhausen

    2008-11-01

    Full Text Available Improved accessibility and its correlate lower generalized cost of contact, travel and transport have been sought by dynamic human societies for their economic and social benefits through- out recorded history. The paper will reflect about this process at a number of different spatial and temporal scales based on a conceptual model. Looking back at European history, it will trace the interaction between Christaller's logic of local market areas and the idea of (low contact cost network cities. Focusing on Switzerland since 1950 it will show how network investment changed the relative distribution of population and employment and how this interacted with changes in the preferences of the travelers. Using a recent snapshot of how a substantial sample of Swiss maintain their social networks over often very large areas, it will try to answer the question of what will happen in the future, if the current trend of ever lower costs of contact will persist.

  20. A quantum access network

    CERN Document Server

    Fröhlich, Bernd; Lucamarini, Marco; Sharpe, Andrew W; Yuan, Zhiliang; Shields, Andrew J

    2013-01-01

    The theoretically proven security of quantum key distribution (QKD) could revolutionise how information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, so far no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we show that adopting simple and cost-effective telecommunication technologies to form a quantum access network can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We are able to demonstrate that a high-speed single-photon detector positioned at the network node can be shared between up to 64 users, thereby significantly reducing the hardware requirements for each user added to the network. This shared receiver architecture removes one of the main obstacles restricting the widespread application...

  1. AccessCulture

    DEFF Research Database (Denmark)

    Valtysson, Bjarki

    the European Union, and how its cultural policy responds to the changes that the digital paradigm has brought upon the field. The self-publishing features of various Web 2.0 platforms, along with the interactive and distributional potentials that the Internet offers, have given rise to what is...... Flickr indicates changes in cultural production and consumption. The first part of this works looks at how these changes respond to the field of cultural policy, as well as suggesting a possible culturepolitical reaction in a model which I refer to as access culture. In terms of theoretical approach, the...... prosumers, I analyse the well-known examples of YouTube, MySpace, Facebook and Flickr, along with lesser known platforms such as the animated short film Elephants Dream, the BBC's Creative Archive, various Internet artworks and the Internet Archive. I furthermore introduce the copyright system Creative...

  2. Chemists, Access, Statistics

    Science.gov (United States)

    Holmes, Jon L.

    2000-06-01

    New JCE Internet Feature at JCE Online Biographical Snapshots of Famous Chemists is a new JCE Internet feature on JCE Online. Edited by Barbara Burke, this feature provides biographical information on leading chemists, especially women and minority chemists, fostering the attitude that the practitioners of chemistry are as human as those who endeavor to learn about it. Currently, the column features biographical "snapshots" of 30 chemists. Each snapshot includes keywords and bibliography and several contain links to additional online information about the chemist. More biographical snapshots will appear in future installments. In addition, a database listing over 140 women and minority chemists is being compiled and will be made available online with the snapshots in the near future. The database includes the years of birth and death, gender and ethnicity, major and minor discipline, keywords to facilitate searching, and references to additional biographical information. We welcome your input into what we think is a very worthwhile resource. If you would like to provide additional biographical snapshots, see additional chemists added to the database, or know of additional references for those that are already in the database, please contact JCE Online or the feature editor. Your feedback is welcome and appreciated. You can find Biographical Snapshots of Famous Chemists starting from the JCE Online home page-- click the Features item under JCE Internet and then the Chemist Bios item. Access JCE Online without Name and Password We have recently been swamped by libraries requesting IP-number access to JCE Online. With the great benefit IP-number authentication gives to librarians (no user names and passwords to administer) and to their patrons (no need to remember and enter valid names and passwords) this is not surprising. If you would like access to JCE Online without the need to remember and enter a user name and password, you should tell your librarian about our

  3. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  4. Atomic memory access hardware implementations

    Science.gov (United States)

    Ahn, Jung Ho; Erez, Mattan; Dally, William J

    2015-02-17

    Atomic memory access requests are handled using a variety of systems and methods. According to one example method, a data-processing circuit having an address-request generator that issues requests to a common memory implements a method of processing the requests using a memory-access intervention circuit coupled between the generator and the common memory. The method identifies a current atomic-memory access request from a plurality of memory access requests. A data set is stored that corresponds to the current atomic-memory access request in a data storage circuit within the intervention circuit. It is determined whether the current atomic-memory access request corresponds to at least one previously-stored atomic-memory access request. In response to determining correspondence, the current request is implemented by retrieving data from the common memory. The data is modified in response to the current request and at least one other access request in the memory-access intervention circuit.

  5. ACCESSIBILITY AND CRYSTALLINITY OF CELLULOSE

    Directory of Open Access Journals (Sweden)

    Michael Ioelovich

    2009-08-01

    Full Text Available The accessibility of cellulose samples having various degrees of crystallinity was studied with respect to molecules of water, lower primary alcohols, and lower organic acids. It was found that small water molecules have full access to non-crystalline domains of cellulose (accessibility coefficient α = 1. Molecules of the lowest polar organic liquids (methanol, ethanol, and formic acid have partial access into the non-crystalline domains (α<1, and with increasing diameter of the organic molecules their accessibility to cellulose structure decreases. Accessibility of cellulose samples to molecules of various substances is a linear function of the coefficient α and the content of non-crystalline domains. The relationship between crystallinity (X and accessibility (A of cellulose to molecules of some liquids has been established as A = α (1-X. The water molecules were found to have greater access to cellulose samples than the molecules of the investigated organic liquids. The obtained results permit use of accessibility data to estimate the crystallinity of cellulose, to examine the structural state of non-crystalline domains, and to predict the reactivity of cellulose samples toward some reagents.

  6. Vehicle barrier with access delay

    Science.gov (United States)

    Swahlan, David J; Wilke, Jason

    2013-09-03

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  7. Resistance random access memory

    Directory of Open Access Journals (Sweden)

    Ting-Chang Chang

    2016-06-01

    Full Text Available Non-volatile memory (NVM will play a decisive role in the development of the next-generation of electronic products. Therefore, the development of next-generation NVM is urgent as widely applied flash memory is facing its physical limit. Among various next-generation NVMs, Resistive Random Access Memory (RRAM is a promising candidate for future memory due to its high-efficiency, high-speed and energy-saving characteristics. In recent years, continuous improvement and in-depth investigation in both materials and electrical switching mechanisms have not only lead to a breakthrough in the performance of digital NVM, but also lead to other possible memory functionality. This paper describes new findings and perspectives on various RRAM devices with different laminated structures and materials, and classifies RRAM into four categories according to different resistive switching mechanisms, from which the four elements are (1 anion-type RRAM: redox reaction and migration of oxygen ions, (2 cation-type RRAM: redox reaction and migration of cation ions, (3 carbon-based RRAM: the stretch of CC bond lengths due to oxygen and hydrogen dual ions, (4 oxide-based electrode: oxygen accumulation in oxide-based electrode.

  8. Ferroelectric random access memories.

    Science.gov (United States)

    Ishiwara, Hiroshi

    2012-10-01

    Ferroelectric random access memory (FeRAM) is a nonvolatile memory, in which data are stored using hysteretic P-E (polarization vs. electric field) characteristics in a ferroelectric film. In this review, history and characteristics of FeRAMs are first introduced. It is described that there are two types of FeRAMs, capacitor-type and FET-type, and that only the capacitor-type FeRAM is now commercially available. In chapter 2, properties of ferroelectric films are discussed from a viewpoint of FeRAM application, in which particular attention is paid to those of Pb(Zr,Ti)O3, SrBi2Ta2O9, and BiFeO3. Then, cell structures and operation principle of the capacitor-type FeRAMs are discussed in chapter 3. It is described that the stacked technology of ferroelectric capacitors and development of new materials with large remanent polarization are important for fabricating high-density memories. Finally, in chapter 4, the optimized gate structure in ferroelectric-gate field-effect transistors is discussed and experimental results showing excellent data retention characteristics are presented. PMID:23421123

  9. Making Astronomy Accessible

    Science.gov (United States)

    Grice, Noreen A.

    2011-05-01

    A new semester begins, and your students enter the classroom for the first time. You notice a student sitting in a wheelchair or walking with assistance from a cane. Maybe you see a student with a guide dog or carrying a Braille computer. Another student gestures "hello” but then continues hand motions, and you realize the person is actually signing. You wonder why another student is using an electronic device to speak. Think this can't happen in your class? According to the U.S. Census, one out of every five Americans has a disability. And some disabilities, such as autism, dyslexia and arthritis, are considered "invisible” disabilities. This means you have a high probability that one of your students will have a disability. As an astronomy instructor, you have the opportunity to reach a wide variety of learners by using creative teaching strategies. I will share some suggestions on how to make astronomy and your part of the universe more accessible for everyone.

  10. Access to postacute rehabilitation.

    Science.gov (United States)

    Buntin, Melinda Beeuwkes

    2007-11-01

    Each year, more than 10 million Medicare beneficiaries are discharged from acute care hospitals into postacute care (PAC) settings, including inpatient rehabilitation facilities, skilled nursing facilities, and homes with services from home health agencies. These beneficiaries include very frail and vulnerable elders, many of whom have suffered from an acute event such as a stroke or a fall resulting in hip fracture, all of whom are judged unable to return to their homes without further care. Whether beneficiaries receive PAC and the type and intensity of care they receive is influenced not only by clinical factors, but by nonclinical factors including provider supply and financing, especially Medicare's methods of payment. This article provides a definition of PAC and discusses the wide cross-sectional variation in the use of postacute rehabilitation. It then discusses recent changes to PAC provider payment that have raised concerns about access to postacute rehabilitation, trends in the use of PAC, and what these trends imply about the appropriateness of PAC as it is now delivered. It concludes by identifying issues about the policy and research implications of recent developments and the PAC literature reviewed.

  11. Radio access selection in multi-radio access systems

    NARCIS (Netherlands)

    Jorgušeski, L.; Litjens, R.; Zhiyi, C.; Nikookar, H.

    2007-01-01

    Future wireless access systems will be characterized by their heterogeneity from technological point of view. It is envisaged that in certain areas end-users will have a choice between various radio accesses (RAs) such as e.g. classical cellular networks (GSM, UMTS, WiMAX, etc), WLAN hot-spots, or o

  12. Open access and medicinal chemistry

    OpenAIRE

    Swain Chris

    2007-01-01

    Abstract Chemistry Central is a new open access website for chemists publishing peer-reviewed research in chemistry from a range of open access journals. A new addition, Chemistry Central Journal, will cover all of chemistry and will be broken down into discipline-specific sections, and Im delighted that Medicinal Chemistry will be a key discipline in this new journal.

  13. Editorial: Next Generation Access Networks

    Science.gov (United States)

    Ruffini, Marco; Cincotti, Gabriella; Pizzinat, Anna; Vetter, Peter

    2015-12-01

    Over the past decade we have seen an increasing number of operators deploying Fibre-to-the-home (FTTH) solutions in access networks, in order to provide home users with a much needed network access upgrade, to support higher peak rates, higher sustained rates and a better and more uniform broadband coverage of the territory.

  14. Accessible Information and Quantum operations

    OpenAIRE

    Cai, Qing-yu

    2003-01-01

    The accessible information decreases under quantum operations. We analyzed the connection between quantum operations and accessible information. We show that a general quantum process cannot be operated accurately. Futhermore, an unknown state of a closed quantum system can not be operated arbitrarily by a unitary quantum operation.

  15. IV access in dental practice.

    LENUS (Irish Health Repository)

    Fitzpatrick, J J

    2009-04-01

    Intravenous (IV) access is a valuable skill for dental practitioners in emergency situations and in IV sedation. However, many people feel some apprehension about performing this procedure. This article explains the basic principles behind IV access, and the relevant anatomy and physiology, as well as giving a step-by-step guide to placing an IV cannula.

  16. Justice: greater access, lower costs

    NARCIS (Netherlands)

    M. Saraceno

    2014-01-01

    Litigation imposes large costs on society; this justifies settlement considerations. In any case, access to justice is critical to socioeconomic development; as such, it needs to be balanced with litigation minimization. This study examines the tradeoff between litigation and access to justice and e

  17. Digital Image Representation and Access.

    Science.gov (United States)

    Mostafa, Javed

    1994-01-01

    Reviews the literature relating to the development and application of modern imaging technology between 1987 and 1993. Highlights include image representation, including image data, compression, and image formats; and image access, including indexing and modeling, user interface design, and distributed access. (143 references) (LRW)

  18. Get the right access rights!

    CERN Multimedia

    Rosaria Marraffino

    2015-01-01

    On 11 May, a major change concerning the requirements to access the CERN beam facilities was put in place and implemented in ADaMS in order to reduce the number of courses that people who need access to multiple installations have to follow. This revision includes dedicated safety training courses that replace, in particular, the “Safety during LS1” e-learning course, which is now to be considered obsolete.   CERN’s Access Distribution and Management System (ADaMS). As of 11 May, an important improvement was implemented in ADaMS (CERN’s Access Distribution and Management System) regarding the requisites to access safety zones. This change is closely related to the introduction of a generic e-learning course ("CERN Beam Facilities") covering the common risks and systems present in CERN's beam facilities. Two e-learning courses are no longer valid, nor available on the SIR (Safety Information Registration) catalogue: the &ld...

  19. Random Access Game and Medium Access Control Design

    OpenAIRE

    Chen, Lijun; Low, Steven H.; Doyle, John C.

    2010-01-01

    Motivated partially by a control-theoretic viewpoint, we propose a game-theoretic model, called random access game, for contention control. We characterize Nash equilibria of random access games, study their dynamics, and propose distributed algorithms (strategy evolutions) to achieve Nash equilibria. This provides a general analytical framework that is capable of modeling a large class of system-wide quality-of-service (QoS) models via the specification of per-node util...

  20. The Accessibility Quotient: A New Measure of Open Access

    Directory of Open Access Journals (Sweden)

    Mathew A. Willmott

    2012-05-01

    Full Text Available INTRODUCTION The Accessibility Quotient (AQ, a new measure for assisting authors and librarians in assessing and characterizing the degree of accessibility for a group of papers, is proposed and described. The AQ offers a concise measure that assesses the accessibility of peer-reviewed research produced by an individual or group, by incorporating data on open availability to readers worldwide, the degree of financial barrier to access, and journal quality. The paper reports on the context for developing this measure, how the AQ is calculated, how it can be used in faculty outreach, and why it is a useful lens to use in assessing progress towards more open access to research. METHODS Journal articles published in 2009 and 2010 by faculty members from one department in each of MIT’s five schools were examined. The AQ was calculated using economist Ted Bergstrom’s Relative Price Index to assess affordability and quality, and data from SHERPA/RoMEO to assess the right to share the peer-reviewed version of an article. RESULTS The results show that 2009 and 2010 publications by the Media Lab and Physics have the potential to be more open than those of Sloan (Management, Mechanical Engineering, and Linguistics & Philosophy. DISCUSSION Appropriate interpretation and applications of the AQ are discussed and some limitations of the measure are examined, with suggestions for future studies which may improve the accuracy and relevance of the AQ. CONCLUSION The AQ offers a concise assessment of accessibility for authors, departments, disciplines, or universities who wish to characterize or understand the degree of access to their research output, capturing additional dimensions of accessibility that matter to faculty.

  1. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  2. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  3. SM18 Visits and Access

    CERN Multimedia

    2012-01-01

      VISITS The rules and conditions to be followed for visits in the SM18 Hall are laid out in the EDMS 1205328 document. No visit is allowed without prior reservation.   ACCESS Special access right is needed ONLY from 7 p.m. to 7 a.m. and during week-ends. From 1 December, the current SM18 access database will be closed and a new one “SM18-OWH outside normal hours” started from scratch. Requests, via EDH SM18-OWH, will have to be duly justified.   For further information, please contact Evelyne Delucinge.

  4. Computer access security code system

    Science.gov (United States)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  5. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  6. Charter Halibut Limited Access Program

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This limited access system limits the number of charter vessels that may participate in the guided sport fishery for halibut in area 2C and 3A. NMFS issues a...

  7. Assuring Access to Affordable Coverage

    Data.gov (United States)

    U.S. Department of Health & Human Services — Under the Affordable Care Act, millions of uninsured Americans will gain access to affordable coverage through Affordable Insurance Exchanges and improvements in...

  8. MCBS Access to Care PUF

    Data.gov (United States)

    U.S. Department of Health & Human Services — The MCBS 2013 Access to Care public use file (MCBS PUF) provides the first publically available MCBS file for researchers interested in the health, health care use,...

  9. Open Access Publishing in Astronomy

    Science.gov (United States)

    Grothkopf, U.; Meakins, S.

    2012-08-01

    Open Access (OA) in scholarly literature means the "immediate, free availability on the public internet, permitting any users to read, download, copy, distribute, print, search or link to the full text of these articles". The Open Access movement has been made possible thanks to the wide-spread availability of internet access and has received increasing interest since the 1990s, mostly due to the fast rising journal subscription prices. This presentation will review the current situation of Open Access in astronomy. It will answer the question why it makes sense to publish in an OA journal and will provide criteria to judge the quality of OA journals and publishers, along with suggestions how to identify so-called predatory publishers.

  10. Water Access Sites in Minnesota

    Data.gov (United States)

    Minnesota Department of Natural Resources — This data shows the approximate locations of boat accesses in the state. This is not a comprehensive list but one that was generated through a cooperative effort....

  11. 36 CFR 9.32 - Access.

    Science.gov (United States)

    2010-07-01

    ... MANAGEMENT Non-Federal Oil and Gas Rights § 9.32 Access. (a) No access on, across or through lands or waters... CFR 2.17. (d) No access to a site outside a unit will be permitted across unit lands unless such access is by foot, pack animal, or designated road. Persons using designated roads for access to such...

  12. Personalizing Access to Learning Networks

    OpenAIRE

    Dolog, Peter; Simon, Bernd; Nejdl, Wolfgang; Klobucar, Tomaz

    2008-01-01

    In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address in this framework, enabling personalized access to federated learning repositories with a vast number of learning offers. Our infrastructure includes personalization strategies both at the query and the query re...

  13. Textual information access statistical models

    CERN Document Server

    Gaussier, Eric

    2013-01-01

    This book presents statistical models that have recently been developed within several research communities to access information contained in text collections. The problems considered are linked to applications aiming at facilitating information access:- information extraction and retrieval;- text classification and clustering;- opinion mining;- comprehension aids (automatic summarization, machine translation, visualization).In order to give the reader as complete a description as possible, the focus is placed on the probability models used in the applications

  14. Endogenous average cost based access pricing

    OpenAIRE

    Fjell, Kenneth; Foros, Øystein; Pal, Debashis

    2006-01-01

    We consider an industry where a downstream competitor requires access to an upstream facility controlled by a vertically integrated and regulated incumbent. The literature on access pricing assumes the access price to be exogenously fixed ex-ante. We analyze an endogenous average cost based access pricing rule, where both firms realize the interdependence among their quantities and the regulated access price. Endogenous access pricing neutralizes the artificial cost advantag...

  15. Three essays on access pricing

    Science.gov (United States)

    Sydee, Ahmed Nasim

    In the first essay, a theoretical model is developed to determine the time path of optimal access price in the telecommunications industry. Determining the optimal access price is an important issue in the economics of telecommunications. Setting a high access price discourages potential entrants; a low access price, on the other hand, amounts to confiscation of private property because the infrastructure already built by the incumbent is sunk. Furthermore, a low access price does not give the incumbent incentives to maintain the current network and to invest in new infrastructures. Much of the existing literature on access pricing suffers either from the limitations of a static framework or from the assumption that all costs are avoidable. The telecommunications industry is subject to high stranded costs and, therefore, to address this issue a dynamic model is imperative. This essay presents a dynamic model of one-way access pricing in which the compensation involved in deregulatory taking is formalized and then analyzed. The short run adjustment after deregulatory taking has occurred is carried out and discussed. The long run equilibrium is also analyzed. A time path for the Ramsey price is shown as the correct dynamic price of access. In the second essay, a theoretical model is developed to determine the time path of optimal access price for an infrastructure that is characterized by congestion and lumpy investment. Much of the theoretical literature on access pricing of infrastructure prescribes that the access price be set at the marginal cost of the infrastructure. In proposing this rule of access pricing, the conventional analysis assumes that infrastructure investments are infinitely divisible so that it makes sense to talk about the marginal cost of investment. Often it is the case that investments in infrastructure are lumpy and can only be made in large chunks, and this renders the marginal cost concept meaningless. In this essay, we formalize a model of

  16. Personalizing Access to Learning Networks

    DEFF Research Database (Denmark)

    Dolog, Peter; Simon, Bernd; Nejdl, Wolfgang;

    2008-01-01

    In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address in this fra......In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address...... in this framework, enabling personalized access to federated learning repositories with a vast number of learning offers. Our infrastructure includes personalization strategies both at the query and the query results level. Query rewriting is based on learning and language preferences; rule-based and ranking...

  17. Evaluating Web Accessibility Metrics for Jordanian Universities

    Directory of Open Access Journals (Sweden)

    Israa Wahbi Kamal

    2016-07-01

    Full Text Available University web portals are considered one of the main access gateways for universities. Typically, they have a large candidate audience among the current students, employees, and faculty members aside from previous and future students, employees, and faculty members. Web accessibility is the concept of providing web content universal access to different machines and people with different ages, skills, education levels, and abilities. Several web accessibility metrics have been proposed in previous years to measure web accessibility. We integrated and extracted common web accessibility metrics from the different accessibility tools used in this study. This study evaluates web accessibility metrics for 36 Jordanian universities and educational institute websites. We analyze the level of web accessibility using a number of available evaluation tools against the standard guidelines for web accessibility. Receiver operating characteristic quality measurements is used to evaluate the effectiveness of the integrated accessibility metrics.

  18. Mechanisms that improve referential access.

    Science.gov (United States)

    Gernsbacher, M A

    1989-07-01

    Two mechanisms, suppression and enhancement, are proposed to improve referential access. Enhancement improves the accessibility of previously mentioned concepts by increasing or boosting their activation; suppression improves concepts' accessibility by decreasing or dampening the activation of other concepts. Presumably, these mechanisms are triggered by the informational content of anaphors. Six experiments investigated this proposal by manipulating whether an anaphoric reference was made with a very explicit, repeated name anaphor or a less explicit pronoun. Subjects read sentences that introduced two participants in their first clauses, for example, "Ann predicted that Pam would lose the track race," and the sentences referred to one of the two participants in their second clauses, "but Pam/she came in first very easily." While subjects read each sentence, the activation level of the two participants was measured by a probe verification task. The first two experiments demonstrated that explicit, repeated name anaphors immediately trigger the enhancement of their own antecedents and immediately trigger the suppression of other (nonantecedent) participants. The third experiment demonstrated that less explicit, pronoun anaphors also trigger the suppression of other nonantecedents, but they do so less quickly--even when, as in the fourth experiment, the semantic information to identify their antecedents occurs prior to the pronouns (e.g., "Ann predicted that Pam would lose the track race. But after winning the race, she..."). The fifth experiment demonstrated that more explicit pronouns--pronouns that match the gender of only one participant-trigger suppression more powerfully. A final experiment demonstrated that it is not only rementioned participants who improve their referential access by triggering the suppression of other participants; newly introduced participants do so too (e.g., "Ann predicted that Pam would lose the track race, but Kim..."). Thus, both

  19. Achieving Universal Access to Broadband

    Directory of Open Access Journals (Sweden)

    Morten FALCH

    2009-01-01

    Full Text Available The paper discusses appropriate policy measures for achieving universal access to broadband services in Europe. Access can be delivered by means of many different technology solutions described in the paper. This means a greater degree of competition and affects the kind of policy measures to be applied. The paper concludes that other policy measure than the classical universal service obligation are in play, and discusses various policy measures taking the Lisbon process as a point of departure. Available policy measures listed in the paper include, universal service obligation, harmonization, demand stimulation, public support for extending the infrastructure, public private partnerships (PPP, and others.

  20. Datamining on publicly accessible data

    OpenAIRE

    Pangrác, Jiří

    2016-01-01

    This bachelor thesis deals with the datamining methods on publicly accessible data. Data mining is a technique of mining potentially interesting relations from data. Analysis is carried out on data provided by Česká obchodní inspekce, the czech office for trade inspection, which are accessible to public. I am trying to find possible answers for some analytical questions asked. For the analysis itself, LISp-Miner system was used focusing on 4ft-Miner and CF-Miner procedures. Besides the actual...

  1. COORDINATE MEASURING MACHINE PROBING ACCESSIBILITY

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The accessibility of coordinate measuring machines (CMMs) in dimensional inspection is studied. The problem of computing the global accessibility cone is solved using a method of angle representation. Otherwise, the length and volume of probe are considered sufficiently so that all the feasible probe orientations could be determined for the inspection of a workpiece when a touch trigger probe is used and the shortcoming of abstracting a probe as an infinite half-line could be overcome completely. In the end, an example is given to explain the method.

  2. SCOAP3 and Open Access

    CERN Document Server

    Mele, Salvatore; D'Agostino, Dan; Dyas-Correia, Sharon

    2009-01-01

    SCOAP3 is an innovative Open Access initiative for publishing in high-energy physics. The model is viewed by many as a potential solution to multiple issues related to the financial crisis, the peer review system, scholarly communication, and the need to support institutional repositories. This installment of “The Balance Point” presents articles written by three Open Access advocates, outlining the SCOAP3 proposal, benefits of participation, and some of the roles libraries, publishers and scientists can play in making important changes to scholarly communication. Contributors discuss scalability and transferability issues of SCOAP3, as well as other matters of concern.

  3. Flexible access control for dynamic collaborative environments

    NARCIS (Netherlands)

    Dekker, Mari Antonius Cornelis

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect confident

  4. The Virginia Tech Open Access Subvention Fund

    OpenAIRE

    McMillan, Gail

    2013-01-01

    Let your journal articles be openly accessible. Don't hide your research behind a pay-wall that only the well-endowed researchers can access. Learn about the cooperative venture between the Library, the Provost, and the Office of Research that will fund open access scholarship. University Libraries, Virginia Tech, Open Access Week

  5. Educational Access in India. Country Policy Brief

    Science.gov (United States)

    Online Submission, 2009

    2009-01-01

    This Policy Brief describes and explains patterns of access to schools in India. It outlines policy and legislation on access to education and provides an analysis of access, vulnerability and exclusion. The quantitative data is supported by a review of research which explains the patterns of access and exclusion. It is based on findings from the…

  6. Accessing ITP: Accommodating the Disabled.

    Science.gov (United States)

    Stewart, R. Wayne

    The Information Technology Project (ITP) at Clayton College & State University (CCSU) (Georgia) focuses on information technology as a central part of teaching and learning, primarily through Universal Personal Information Technology Access (UPITA). UPITA equips each student and faculty member with a powerful multimedia notebook computer with…

  7. Market Access through Bound Tariffs

    DEFF Research Database (Denmark)

    Sala, Davide; Schröder, Philipp J.H.; Yalcin, Erdal

    WTO negotiations deal predominantly with bound - besides applied - tariff rates. But, how can reductions in tariffs ceilings, i.e. tariff rates that no exporter may ever actually be confronted with, generate market access? The answer to this question relates to the effects of tariff bindings on t...

  8. Market access through bound tariffs

    DEFF Research Database (Denmark)

    Sala, Davide; Schröder, Philipp J.H.; Yalcin, Erdal

    2010-01-01

    WTO negotiations deal predominantly with bound - besides applied - tariff rates. But, how can reductions in tariffs ceilings, i.e. tariff rates that no exporter may ever actually be confronted with, generate market access? The answer to this question relates to the effects of tariff bindings on t...

  9. Arts Accessibility for the Deaf.

    Science.gov (United States)

    Bergman, Eugene

    The booklet provides information and resources for cultural organizations and institutions interested in making the arts accessible to deaf citizens. Preliminary information includes a discussion of deafness in America and the deaf in the history of the arts and notes that the era of silent films was the golden age of cinema. Listed are 36…

  10. Remotely Accessible Management System (RAMS).

    Science.gov (United States)

    Wood, Rex

    Oakland Schools, an Intermediate School District for Administration, operates a Remotely Accessible Management System (RAMS). RAMS is composed of over 100 computer programs, each of which performs procedures on the files of the 28 local school districts comprising the constituency of Oakland Schools. This regional service agency covers 900 square…

  11. Wild Accessions and Mutant Resources

    DEFF Research Database (Denmark)

    Kawaguchi, Masayoshi; Sandal, Niels Nørgaard

    2014-01-01

    Lotus japonicus, Lotus burttii, and Lotus filicaulis are species of Lotus genus that are utilized for molecular genetic analysis such as the construction of a linkage map and QTL analysis. Among them, a number of mutants have been isolated from two wild accessions: L. japonicus Gifu B-129...

  12. Proximity Displays for Access Control

    Science.gov (United States)

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  13. The Inevitability of Open Access

    Science.gov (United States)

    Lewis, David W.

    2012-01-01

    Open access (OA) is an alternative business model for the publication of scholarly journals. It makes articles freely available to readers on the Internet and covers the costs associated with publication through means other than subscriptions. This article argues that Gold OA, where all of the articles of a journal are available at the time of…

  14. Open Access Publishing with Drupal

    Directory of Open Access Journals (Sweden)

    Nina McHale

    2011-10-01

    Full Text Available In January 2009, the Colorado Association of Libraries (CAL suspended publication of its print quarterly journal, Colorado Libraries, as a cost-saving measure in a time of fiscal uncertainty. Printing and mailing the journal to its 1300 members cost CAL more than $26,000 per year. Publication of the journal was placed on an indefinite hiatus until the editorial staff proposed an online, open access format a year later. The benefits to migrating to open access included: significantly lower costs; a green platform; instant availability of content; a greater level of access to users with disabilities; and a higher level of visibility of the journal and the association. The editorial staff chose Drupal, including the E-journal module, and while Drupal is notorious for its steep learning curve—which exacerbated delays to content that had been created before the publishing hiatus—the fourth electronic issue was published recently at coloradolibrariesjournal.org. This article will discuss both the benefits and challenges of transitioning to an open access model and the choice Drupal as a platform over other more established journal software options.

  15. Towards Trusted Network Access Control

    Science.gov (United States)

    Bente, Ingo; von Helden, Josef

    Network Access Control (NAC) solutions promise to significantly increase the security level of modern networks. In short, they allow to measure the integrity state of an endpoint that tries to get access to the network. Based upon the measurement results, which are compared to a defined NAC policy, access to the network can be allowed or denied. One problem of all currently available NAC solutions is referred to as the “lying endpoint” problem. Normally, special software components are responsible for gathering the relevant integrity information on the endpoint. If an attacker modifies those software components, an endpoint can lie about its current integrity state. Therefore, endpoints which are not compliant to the defined NAC policy can get access to the network. Those endpoints must be considered as potential threat. This paper summarizes a possible solution for the lying endpoint problem based upon the specifications of the Trusted Computing Group (TCG) and the results of the two research projects TNC@ FHH and Turaya. The goal is to develop an open source, TNC compatible NAC solution with full TPM support within a new research project: tNAC.

  16. Automated Computer Access Request System

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  17. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  18. Selective access and editing in a database

    Science.gov (United States)

    Maluf, David A. (Inventor); Gawdiak, Yuri O. (Inventor)

    2010-01-01

    Method and system for providing selective access to different portions of a database by different subgroups of database users. Where N users are involved, up to 2.sup.N-1 distinguishable access subgroups in a group space can be formed, where no two access subgroups have the same members. Two or more members of a given access subgroup can edit, substantially simultaneously, a document accessible to each member.

  19. The Stratified Economics of Open Access

    OpenAIRE

    John Willinsky

    2009-01-01

    There is a growing recognition within the academic community that ‘open access’ to research and scholarship can increase its value and reach. A variety of open access models have developed over the last twenty years, including author self-archiving, immediate (sponsored) open access, delayed open access, and article-processing-fee open access. Yet the economics of open access is being largely determined, at this point, by the interests of a stratified scholarly publishing market that can be r...

  20. Access to Scientific Publications: The Scientist's Perspective

    OpenAIRE

    Yegor Voronin; Askar Myrzahmetov; Alan Bernstein

    2011-01-01

    BACKGROUND: Scientific publishing is undergoing significant changes due to the growth of online publications, increases in the number of open access journals, and policies of funders and universities requiring authors to ensure that their publications become publicly accessible. Most studies of the impact of these changes have focused on the growth of articles available through open access or the number of open-access journals. Here, we investigated access to publications at a number of insti...

  1. Integration von Open Access Repositorien in Fachportale

    OpenAIRE

    Schaer, Philipp

    2008-01-01

    Open Access Repositorien sind Online Archive für frei im Internet zugängliche Publikationen im Volltext. Open Access Materialien oder die Open Access Repositorien selbst sind allerdings nur unzureichend in zentrale Fachportale (z.B. virtuelle Fachbibliotheken) eingebunden. Der Beitrag stellt SSOAR – Social Science Open Access Repository, einen disziplinären Open Access Volltextserver für die Sozialwissenschaften vor und zeigt wie dieser in das sozialwissenschaftliche Fachportal Sowiport...

  2. Access to what? Access, diversity and participation in India's schools

    OpenAIRE

    Juneja, Nalini

    2010-01-01

    India has witnessed substantial diversification of provision to basic education. Policy changes from 1980s onwards, has seen the creation of para-formal delivery systems and the inclusion in the system of non state providers. The Education Guarantee Scheme and the Alternate Initiatives in Education programmes have generated new pathways to access. The paper examines the different educational providers and looks at the spread of provision, the enrolment shares, the different structure, costs a...

  3. Accessing and disclosing protected resources

    DEFF Research Database (Denmark)

    Olesen, Henning; Khajuria, Samant

    2015-01-01

    Today, data is money. Whether it is private users' personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization measures to be deployed. Enabling...... advanced user controlled privacy is essential to realize the visions of 5G applications and services. For service providers and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user...... the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources and possibly give them control of how their data will be used by service providers....

  4. Right of access to energy

    International Nuclear Information System (INIS)

    Energy is essential for the development of our life and for the development of production capacity. However, a number of people worldwide without this living, specifically power. To the extent that increase energy needs for domestic, industrial and agricultural use, each day more indispensable need access to this recognition as a human right or fundamental respect is made, so some questions in this paper are required both denominations, being essential to consider the emergence and evolution of these. An analysis of the international protection they receive the right of access to energy services, although currently there are no international treaties that specifically recognize it also performs a number of initiatives that promote its preservation manifested and recognized in several abstractly legal instruments, such as declarations, covenants and conventions. (full text)

  5. Accessing the VO with Python

    Science.gov (United States)

    Plante, R.; Fitzpatrick, M.; Graham, M.; Tody, D.; Young, W.

    2014-05-01

    We introduce two products for accessing the VO from Python: PyVO and VOClient. PyVO is built on the widely-used Astropy package and is well suited for integrating automated access to astronomical data into highly customizable scripts and applications for data analysis in Python. VOClient is built on a collection of C-libraries and is well suited for integrating with multi-language analysis packages. It also provides a framework for integrating legacy software into the Python environment. In this demo, we will run through several examples demonstrate basic data discovery and retrieval of data. This includes finding archives containing data of interest (VO registry), retrieving datasets (SIA, SSA), and exploring (Cone Search, SLAP). VOClient features some extended capabilities including the ability to communicate to other desktop applications from a script using the SAMP protocol.

  6. Audio Interfaces for Improved Accessibility

    OpenAIRE

    Duarte, Carlos; Carrico, Lu&#;s

    2008-01-01

    This chapter focused on how endowing interfaces with audio interaction capabilities can improve their accessibility. To exemplify this outcome the development of several versions of a Digital Talking Book player was presented. This allowed us to show it is possible to maintain the same set of features while stripping the interface of visual components, and still keep it usable for the visually impaired population. The interface development concerns focused on both ends of the interaction spec...

  7. Enhancing Ocean Research Data Access

    Science.gov (United States)

    Chandler, Cynthia; Groman, Robert; Shepherd, Adam; Allison, Molly; Arko, Robert; Chen, Yu; Fox, Peter; Glover, David; Hitzler, Pascal; Leadbetter, Adam; Narock, Thomas; West, Patrick; Wiebe, Peter

    2014-05-01

    The Biological and Chemical Oceanography Data Management Office (BCO-DMO) works in partnership with ocean science investigators to publish data from research projects funded by the Biological and Chemical Oceanography Sections and the Office of Polar Programs Antarctic Organisms & Ecosystems Program at the U.S. National Science Foundation. Since 2006, researchers have been contributing data to the BCO-DMO data system, and it has developed into a rich repository of data from ocean, coastal and Great Lakes research programs. While the ultimate goal of the BCO-DMO is to ensure preservation of NSF funded project data and to provide open access to those data, achievement of those goals is attained through a series of related phases that benefits from active collaboration and cooperation with a large community of research scientists as well as curators of data and information at complementary data repositories. The BCO-DMO is just one of many intermediate data management centers created to facilitate long-term preservation of data and improve access to ocean research data. Through partnerships with other data management professionals and active involvement in local and global initiatives, BCO-DMO staff members are working to enhance access to ocean research data available from the online BCO-DMO data system. Continuing efforts in use of controlled vocabulary terms, development of ontology design patterns and publication of content as Linked Open Data are contributing to improved discovery and availability of BCO-DMO curated data and increased interoperability of related content available from distributed repositories. We will demonstrate how Semantic Web technologies (e.g. RDF/XML, SKOS, OWL and SPARQL) have been integrated into BCO-DMO data access and delivery systems to better serve the ocean research community and to contribute to an expanding global knowledge network.

  8. Open Access and Bakhtinian Dialogism

    OpenAIRE

    R.W. Vaagan

    2006-01-01

    The article explores Open Access in the context of recent contributions in communication and public relations theory, notably Bakhtinian dialogism. Increasingly since the 1960s communication and public relations theory have shifted their focus away from one-way, asymmetrical to two-way, symmetrical models, thereby progressing to more equitable and interactive, multi-level conceptual models of dialogic and polyphonic communication. It is in this context that Bakhtinian dialogism becomes highly...

  9. Open Access e Pubblica Amministrazione

    OpenAIRE

    Galimberti, Paola

    2007-01-01

    The speech tries to analyze how the tools offered by OA, open archives in particolar, can fulfil to the needs of accessibility and publicity of documents of the public administration, with reference to those surveys and those studies (grey literature) that now cannot find a chance for dissemination and remain invisible. Instead documents in open archives are electronics from their origin, especially with associated metadata that assure harvesting, searchability and interoperability.

  10. Worldwide open access: UK leadership?

    OpenAIRE

    Harnad, Stevan

    2013-01-01

    The web is destined to become humankind's cognitive commons, where digital knowledge is jointly created and freely shared. The UK has been a leader in the global movement toward open access (OA) to research but recently its leadership has been derailed by the joint influence of the publishing industry lobby from without and well-intentioned but premature and unhelpful over-reaching from within the OA movement itself. The result has been the extremely counterproductive ‘Finch Report’ followed ...

  11. Database access from the Web

    OpenAIRE

    Dean, Andrew S.

    1997-01-01

    Determining the best method for granting World Wide Web (Web) users access to remote relational databases is difficult. Choosing the best supporting Web/database link method for implementation requires an in-depth understanding of the methods available and the relationship between the link designer's goals and the underlying issues of Performance and Functionality, Cost, Development Time and Ease, Serviceability, Flexibility and Openness, Security, State and Session. This thesis examined exis...

  12. Support the Open Access Movement

    CERN Multimedia

    2005-01-01

    CERN's Executive Board recently endorsed a new policy of open access to the laboratory's results: Continuing CERN action on Open Access (OA) [http://cds.cern.ch/record/828991/files/open-2005-006.pdf]. What does this policy mean for you? CERN authors have two responsibilities: Submit your document to the CERN Document Server; Consider submitting future articles to an Open Access journal. Since 2001, Operational Circular No. 6 has required every CERN author (Staff member, Fellow, or any Associated member of personnel who is allowed to use CERN as his affiliation) to submit a copy of their scientific documents to the CERN Document Server (CDS). For some groups all approved documents are submitted by the secretary (see the Departments' policies at: http://library.cern.ch/cern_publications/cern_publication_policy.html). Each author should personally also ensure the submission of any other articles which are not added in this way, such as conference contributions and review articles. It is not sufficient to re...

  13. Access to IEEE Electronic Library

    CERN Multimedia

    2007-01-01

    From 2007, the CERN Library now offers readers online access to the complete IEEE Electronic Library (Institute of Electrical and Electronics Engineers). This new licence gives unlimited online access to all IEEE and IET (previously IEE) journals and proceedings as well as all current IEEE standards and selected archived ones. Some of the titles offer volumes back to 1913. This service currently represents more than 1,400,000 full-text articles! This leading engineering information resource replaces the previous service, a sub-product of the IEEE database called 'IEEE Enterprise', which offered online access to the complete collection of IEEE journals and proceedings, but with limited features. The service had become so popular that the CERN Working Group for Acquisitions recommended that the Library subscribe to the complete IEEE Electronic Library for 2007. Usage statistics for recent months showed there was a demand for the service from a large community of CERN users and we were aware that many users h...

  14. Accessing and disclosing protected resources

    DEFF Research Database (Denmark)

    Olesen, Henning; Khajuria, Samant

    2014-01-01

    TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers and enterpr......TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers...... and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user’s personal data have become an economic asset, not necessarily to the owners of these data, but to the service providers, whose...... business mod- els often includes the use of these data. In this paper we focus on the user – service provider interaction and discuss how recent technological progress, in particular the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources...

  15. Telerehabilitation Technologies: Accessibility and Usability

    Directory of Open Access Journals (Sweden)

    Michael Pramuka

    2009-09-01

    Full Text Available In the fields of telehealth and telemedicine, phone and/or video technologies are key to the successful provision of services such as remote monitoring and visits. How do these technologies affect service accessibility, effectiveness, quality, and usefulness when applied to rehabilitation services in the field of telerehabilitation? To answer this question, we provide a overview of the complex network of available technologies and discuss how they link to rehabilitation applications, services, and practices as well as to the telerehabilitation end-user. This white paper will first present the numerous professional considerations that shape the use of technology in telerehabilitation service and set it somewhat apart from telemedicine. It will then provide an overview of concepts essential to usability analysis; present a summary of various telerehabilitation technologies and their strengths and limitations, and consider how the technologies interface with end users’ clinical needs for service accessibility, effectiveness, quality, and usefulness. The paper will highlight a conceptual framework (including task analyses and usability issues that underlies a functional match between telerehabilitation technologies, clinical applications, and end-user capabilities for telerehabilitation purposes. Finally, we will discuss pragmatic issues related to user integration of telerehabilitation technology versus traditional face-to-face approaches. Key Words: Remote, Technology, Usability, Accessibility, Decision Factors, Decision Support

  16. Accessibility in the Smart City

    Directory of Open Access Journals (Sweden)

    Giuseppe Trieste

    2014-07-01

    Full Text Available FIABA is a cultural route for all, its aim is to promote a Global Accessibility and a Universal Usability through the removal of architectural, cultural, psychological and sensory barriers. FIABA is carrying out a real change and a cultural renewal in the name of equal opportunities. Respect for the environment in which we live is also a duty towards the younger generations to whom we must deliver a world in which free movement and the normal use of spaces are goals already achieved. There are millions of citizens who, because of their physical conditions are prisoners in their homes because there isn’t any elevator or any elevator maintenance. FIABA project aims at implementing “a Space for all” or “a landscape for all” following the path of the ONU Convention on the Rights of People with disabilities with an emphasis on architectural, cultural, and psychological barriers, the last ones in particular, create barriers to equal opportunities and they are often carriers of discrimination. The principle of accessibility is invoked in Article 9 of the Convention which confirms the principle that people have a right to live independently and participate fully in all spheres of life and thus States are required to take all necessary measures to ensure accessibility to physical environment, transport, information and communications, including systems and technologies of information and communication and other facilities and services open to the public, both in urban and rural areas.

  17. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  18. Grant-free Rateless Multiple Access: A Novel Massive Access Scheme for Internet of Things

    OpenAIRE

    Zhang, Zhaoyang; Wang, Xianbin; Zhang, Yu; Chen, Yan

    2016-01-01

    Rateless Multiple Access (RMA) is a novel non-orthogonal multiple access framework that is promising for massive access in Internet of Things (IoT) due to its high efficiency and low complexity. In the framework, after certain \\emph{registration}, each active user respectively transmits to the access point (AP) randomly based on an assigned random access control function (RACf) until receiving an acknowledgement (ACK). In this work, by exploiting the intrinsic access pattern of each user, we ...

  19. An Access Definition and Query Language : Towards a Unified Access Control Model

    OpenAIRE

    Sonnenbichler, Andreas

    2013-01-01

    In this work we suggest a meta access control model emulating established access control models by configuration and offering enhanced features like the delegation of rights, ego-centered roles, and decentralized administration. The suggested meta access control model is named \\'\\'Access Definition and Query Language\\'\\' (ADQL). ADQL is represented by a formal, context-free grammar allowing to express the targeted access control model, policies, facts, and access queries as a formal language.

  20. Self-Access Centers: Maximizing Learners’ Access to Center Resources

    Directory of Open Access Journals (Sweden)

    Mark W. Tanner

    2010-09-01

    Full Text Available Originally published in TESL-EJ March 2009, Volume 12, Number 4 (http://tesl-ej.org/ej48/a2.html. Reprinted with permission from the authors.Although some students have discovered how to use self-access centers effectively, the majority appear to be unaware of available resources. A website and database of materials were created to help students locate materials and use the Self-Access Study Center (SASC at Brigham Young University’s English Language Center (ELC more effectively. Students took two surveys regarding their use of the SASC. The first survey was given before the website and database were made available. A second survey was administered 12 weeks after students had been introduced to the resource. An analysis of the data shows that students tend to use SASC resources more autonomously as a result of having a web-based database. The survey results suggest that SAC managers can encourage more autonomous use of center materials by provided a website and database to help students find appropriate materials to use to learn English.

  1. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  2. Enterprise wide transparent information access

    International Nuclear Information System (INIS)

    The information management needs of the Department of Energy (DOE) represents a fertile domain for the development of highly sophisticated yet intuitive enterprise-wide computing solutions. These solutions must support business operations, research agendas, technology development efforts, decision support, and other application areas with a user base ranging from technical staff to the highest levels of management. One area of primary interest is in the Environmental Restoration and Waste Management Branch of DOE. In this arena, the issue of tracking and managing nuclear waste related to the long legacy of prior defense production and research programs is one of high visibility and great concern. The Tank Waste Information Network System (TWINS) application has been created by the Pacific Northwest Laboratory (PNL) for the DOE to assist in managing and accessing the information related to this mission. The TWINS solution addresses many of the technical issues faced by other efforts to provide integrated information access to a wide variety of stakeholders. TWINS provides secure transparent access to distributed heterogeneous multimedia information sources from around the DOE complex. The users interact with the information through a consistent user interface that presents the desired data in a common format regardless of the structure of the source information. The solutions developed by the TWINS project represent an integration of several technologies and products that can be applied to other mission areas within DOE and other government agencies. These solutions are now being applied to public and private sector problem domains as well. The successful integration and inter-operation of both commercial and custom modules into a flexible and extensible information architecture will help ensure that new problems facing DOE and other clients can be addressed more rapidly in the future by re-use of existing tools and techniques proven viable through the TWINS efforts

  3. A Linux Implementation of Temporal Access Controls

    OpenAIRE

    Chiang, Ken; Nguyen, Thuy D.; Irvine, Cynthia E.

    2007-01-01

    Control of access to information based upon temporal attributes can add another dimension to access control. To demonstrate the feasibility of operating system level support for temporal access controls, the Time Interval File Protection System (TIFPS), a prototype of the Time Interval Access Control (TIAC) model, has been implemented by modifying Linux extended attributes to include temporal metadata associated both with files and users. The Linux Security Module was used to provide hooks fo...

  4. Access to Local Agriculture and Weight Outcomes

    OpenAIRE

    Berning, Joshua P.

    2012-01-01

    Recent studies examine the impact of the built environment on health outcomes such as obesity. Several studies find for certain populations that access to unhealthy food has a positive effect on obesity, whereas access to healthy choices has a negative effect. Given the growth and popularity of locally grown food, we examine how individual weight outcomes are affected by access to direct-to-consumer local food. After controlling for potential endogeneity, we find that greater access to local ...

  5. Environment Implications of China's WTO Accession

    Institute of Scientific and Technical Information of China (English)

    Li Shantong; He Jianwu

    2006-01-01

    China's WTO accession will have important environmental implications. This article aims at providing environmental analysis of the impact of China's accession to the WTO, based on its final offer for WTO accession and a 53-sector, recursive dynamic computable general equilibrium (CGE) model of China. We try to provide some empirical evidences for policy makers to evaluate the effects of China's WTO accession from environmental prospective.

  6. Easing access for lifelong learners

    DEFF Research Database (Denmark)

    Müller, Romina; Remdisch, Sabine; Köhler, Katharina;

    2015-01-01

    Easing access to higher education (HE) for those engaging in lifelong learning has been a common policy objective across the European Union since the late 1990s. To reach this goal, the transition between vocational and academic routes must be simplified, but European countries are at different...... learning. The cases are at widely different stages, but the following factors were considered essential in all countries for opening universities: the establishment of transition paths from secondary education and working life into HE and links between HE, businesses and adult education from a national...

  7. An optically accessible pyrolysis microreactor

    Science.gov (United States)

    Baraban, J. H.; David, D. E.; Ellison, G. Barney; Daily, J. W.

    2016-01-01

    We report an optically accessible pyrolysis micro-reactor suitable for in situ laser spectroscopic measurements. A radiative heating design allows for completely unobstructed views of the micro-reactor along two axes. The maximum temperature demonstrated here is only 1300 K (as opposed to 1700 K for the usual SiC micro-reactor) because of the melting point of fused silica, but alternative transparent materials will allow for higher temperatures. Laser induced fluorescence measurements on nitric oxide are presented as a proof of principle for spectroscopic characterization of pyrolysis conditions.

  8. An optically accessible pyrolysis microreactor

    Energy Technology Data Exchange (ETDEWEB)

    Baraban, J. H.; Ellison, G. Barney [Department of Chemistry and Biochemistry, University of Colorado, Boulder, Colorado 80309 (United States); David, D. E. [Integrated Instrument Development Facility, CIRES, University of Colorado, Boulder, Colorado 80309-0216 (United States); Daily, J. W. [Department of Mechanical Engineering, University of Colorado at Boulder, Boulder, Colorado 80309 (United States)

    2016-01-15

    We report an optically accessible pyrolysis micro-reactor suitable for in situ laser spectroscopic measurements. A radiative heating design allows for completely unobstructed views of the micro-reactor along two axes. The maximum temperature demonstrated here is only 1300 K (as opposed to 1700 K for the usual SiC micro-reactor) because of the melting point of fused silica, but alternative transparent materials will allow for higher temperatures. Laser induced fluorescence measurements on nitric oxide are presented as a proof of principle for spectroscopic characterization of pyrolysis conditions.

  9. Teach yourself visually Access 2013

    CERN Document Server

    McFedries, Paul

    2013-01-01

    The easy, visual way to learn this popular database program Part of the Office 2013 productivity suite, Access enables you to organize, present, analyze, and share data on a network or over the web. With this Visual guide to show you how, you'll master the fundamentals of this robust database application in no time. Clear, step-by-step instructions are illustrated with full-color screen shots that show exactly what you should see on your screen. Learn to enter new records; create, edit, and design tables and forms; develop queries that generate specific reports; add smart tags to y

  10. Head Access Piping System Desing

    OpenAIRE

    中大路 道彦; 一宮 正和; 向坊 隆一; 前田 清彦; 永田 敬

    1994-01-01

    PNC made design studies on loop type FBR plants:a 600 MWe class in '91, and a 1300 MWe class in '93 both with the "head access" primary piping system. This paper focuses on the features of the smaller plant at first and afterwards on the extension to the larger one. The contents of the paper consist of R/V wall protection mechanism, primary piping circuit, secondary piping circuit, plant layout and then, discusses the extension of the applicability of the wall protection mechanism, primary pi...

  11. 40 CFR 35.935-7 - Access.

    Science.gov (United States)

    2010-07-01

    ... ASSISTANCE Grants for Construction of Treatment Works-Clean Water Act § 35.935-7 Access. The grantee must insure that EPA and State representatives will have access to the project work whenever it is in... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Access. 35.935-7 Section...

  12. Open Access Publishing: What Authors Want

    Science.gov (United States)

    Nariani, Rajiv; Fernandez, Leila

    2012-01-01

    Campus-based open access author funds are being considered by many academic libraries as a way to support authors publishing in open access journals. Article processing fees for open access have been introduced recently by publishers and have not yet been widely accepted by authors. Few studies have surveyed authors on their reasons for publishing…

  13. Five Steps to an Accessible Classroom Website

    Science.gov (United States)

    Amundson, Linda

    2009-01-01

    When teachers or technology coordinators publish a website, they are providing a product for a diverse group of people. That's why website design should follow accessibility guidelines. Websites should be accessible to those with visual, hearing, movement, cognitive, and speech disabilities. Good design means greater accessibility for all. This…

  14. University Access, Inclusion and Social Justice

    Science.gov (United States)

    Hlalele, D.; Alexander, G.

    2012-01-01

    University access programmes inherently and inevitably provide students with a "label". Firstly, students are generally segregated and stigmatised as they are treated as a separate group that accessed university somewhat "illegitimately". Access programmes generally place more emphasis on academic development and in so doing seem to undermine the…

  15. 36 CFR 228.12 - Access.

    Science.gov (United States)

    2010-07-01

    ... Minerals § 228.12 Access. An operator is entitled to access in connection with operations, but no road... other means of access, including but not limited to off-road vehicles, be used until the operator has... forest surface resources, including measures to protect scenic values and to insure against erosion...

  16. Bibliography on Public Access to Legal Materials.

    Science.gov (United States)

    Reinertsen, Gail

    1986-01-01

    This annotated bibliography of literature on public access to legal information is categorized into three sections: public access to legal information and materials in law libraries, access in non-law libraries, and non-prison libraries' responsibility to provide legal information to prisoners. (CLB)

  17. Open access scholarly communication in Malaysia

    OpenAIRE

    Rhiza, Adni

    2011-01-01

    This paper reports on Open Access Scholarly Communication in Malaysia, investigating their use of open access repositories, advocacy undertaken, and reasons for contribution to global scholarship. The outcome wills very much in line with the stipulations willing Scholarly on Open access that will preserve and disseminate digital materials created by, or associated with the university.

  18. Advanced Call Center Supporting WAP Access

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Traditional call centers can be accessed via speech only, and the call center based on web provides both data and speech access, but it needs a powerful terminal-computer. By analyzing traditional call centers and call centers based on web, this paper presents the framework of an advanced call center supporting WAP access. A typical service is also described in detail.

  19. Strategies to improve smallholders' market access

    NARCIS (Netherlands)

    Tilburg, van A.; Schalkwyk, van H.D.

    2011-01-01

    Smallholders, especially in less developed countries, have encountered several challenges in gaining access to markets. Market access includes the ability to obtain necessary farm inputs and farm services, and the ability to deliver farm products to buyers. Market access was less of a problem in the

  20. Mobile and Accessible Learning for MOOCs

    Science.gov (United States)

    Sharples, Mike; Kloos, Carlos Delgado; Dimitriadis, Yannis; Garlatti, Serge; Specht, Marcus

    2015-01-01

    Many modern web-based systems provide a "responsive" design that allows material and services to be accessed on mobile and desktop devices, with the aim of providing "ubiquitous access." Besides offering access to learning materials such as podcasts and videos across multiple locations, mobile, wearable and ubiquitous…

  1. Energy access and sustainable development

    Science.gov (United States)

    Kammen, Daniel M.; Alstone, Peter; Gershenson, Dimitry

    2015-03-01

    With 1.4 billion people lacking electricity to light their homes and provide other basic services, or to conduct business, and all of humanity (and particularly the poor) are in need of a decarbonized energy system can close the energy access gap and protect the global climate system. With particular focus on addressing the energy needs of the underserved, we present an analytical framework informed by historical trends and contemporary technological, social, and institutional conditions that clarifies the heterogeneous continuum of centralized on-grid electricity, autonomous mini- or community grids, and distributed, individual energy services. We find that the current day is a unique moment of innovation in decentralized energy networks based on super-efficient end-use technology and low-cost photovoltaics, supported by rapidly spreading information technology, particularly mobile phones. Collectively these disruptive technology systems could rapidly increase energy access, contributing to meeting the Millennium Development Goals for quality of life, while simultaneously driving action towards low-carbon, Earth-sustaining, energy systems.

  2. Open Access Funds: A Canadian Library Survey

    Directory of Open Access Journals (Sweden)

    Leila Fernandez

    2011-07-01

    Full Text Available A survey of Canadian research libraries was conducted to determine the extent of funding support for open access publications in these institutions. Results indicate that there is substantial support for open access publishing, and a diversity of approaches is being used to fund open access resources. The reasons for funding support along with policy and promotional issues are explored. The broader implications of funding open access are discussed in the context of a changing scholarly publishing landscape. This paper will be especially relevant to Canadian academic libraries that are exploring options for funding open access publications.

  3. Access recirculation in a native fistula in spite of a seemingly adequate access flow

    NARCIS (Netherlands)

    Haas, Mark; Spargo, Benjamin H.; Wit, Ernst-Jan C.; Meehan, Shane M.

    2000-01-01

    True access recirculation (AR) measured by ultrasound dilution technique is usually absent in well-working shunts. It occurs with low access flows (Qa). High access flow rates are assumed to prevent AR. Two major exceptions to these rules are known: presence of intra-access strictures and inadverten

  4. 7 CFR 54.13 - Accessibility and refrigeration of products; access to establishments.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Accessibility and refrigeration of products; access to establishments. 54.13 Section 54.13 Agriculture Regulations of the Department of Agriculture (Continued...) Regulations Service § 54.13 Accessibility and refrigeration of products; access to establishments. (a)...

  5. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  6. Open Access and ORCID poster presentation

    DEFF Research Database (Denmark)

    Elbæk, Mikael Karstensen; Ekstrøm, Jeannette

    2014-01-01

    Open Access Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all...... peer review articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access...... you to submit your ORCID when you submit articles or apply for funding. DTU is a member of the international ORCID organization and you can register your ORCID through DTUBasen. We are here to help you answer allquestions related to ORCID....

  7. Access to efavirenz and amprenavir.

    Science.gov (United States)

    Gilden, D

    1998-10-01

    DuPont's new nonnucleoside analog, efavirenz (Sustiva), is embroiled in a controversy related to the high costs of the drug. DuPont has offered a 5 percent discount off of the current ADAP price, but several large ADAP programs are not including efavirenz yet. The company has committed to providing the drug free of charge to financially-needy patients, but only as a last resort. Recently, a new protease inhibitor called amprenavir (Agenerase) has been introduced by Glaxo Wellcome. Amprenavir is available from an expanded access program for patients who have failed one protease inhibitor and who fit into one of three treatment protocols. Problems with ingesting the drug are reviewed. Glaxo expects FDA approval for amprenavir in the near future. PMID:11365902

  8. Equal Access but Unequal Outcomes

    DEFF Research Database (Denmark)

    Jæger, Mads Meier

    2009-01-01

    with respect to Danish children's choice of secondary education. Denmark is well-suited for this study because access to secondary education is particularly meritocratic. The empirical analysis shows that all three channels through which cultural capital affects educational success are important....... conditions must hold: (1. parents must possess cultural capital, (2. they must transfer their cultural capital to children, and (3. children must absorb cultural capital and convert it into educational success. This research develops an empirical model that analyzes the significance of the three effects......This article argues that existing studies on cultural capital and educational success fail to distinguish the different channels through which cultural capital promotes educational success. Following Bourdieu, the article proposes that for cultural capital to promote educational success three...

  9. Architecture for Accessing Heterogeneous Databases

    Directory of Open Access Journals (Sweden)

    Mohd Kamir Yusof

    2012-02-01

    Full Text Available This paper presents the architecture for accessing heterogeneous databases. Two major processes in this architecture which are extracting SQL statement and ontology. The algorithms for extracting SQL statement was created and tested in order to improve time performance during searching and retrieving process. Ontology approach was implemented and combined with these algorithms. In ontology approach, web semantic was implemented in order to retrieve only relevant data from database. A prototype based on this architecture was developed using JAVA technology. JAVA technology was chosen because this technology have Jena library. This library is provide API and support SPARQL. Several experiments have been executed and tested. The result indicates this architecture able to improve web query processing in term of time. The result also indicates this architecture able to retrieve and displayed more relevant data to web users.

  10. Digital autonomous terminal access communications

    Science.gov (United States)

    Novacki, S.

    1987-01-01

    A significant problem for the Bus Monitor Unit is to identify the source of a given transmission. This problem arises from the fact that the label which identifies the source of the transmission as it is put into the bus is intercepted by the Digital Autonomous Terminal Access Communications (DATAC) terminal and removed from the transmission. Thus, a given subsystem will see only data associated with a label and never the identifying label itself. The Bus Monitor must identify the source of the transmission so as to be able to provide some type of error identification/location in the event that some problem with the data transmission occurs. Steps taken to alleviate this problem by modifications to the DATAC terminal are discussed.

  11. EPICS channel access using websocket

    International Nuclear Information System (INIS)

    Web technology is useful as a means of widely disseminating accelerator and beam status information. For this purpose, WebOPI was implemented by SNS as a web-based system using Ajax (asynchronous JavaScript and XML) with EPICS. On the other hand, it is often necessary to control the accelerator from different locations as well as the central control room during beam operation and maintenance. However, it is not realistic to replace the GUI-based operator interface (OPI) with a Web-based system using Ajax technology because of interactive performance issue. Therefore, as a next generation OPI over the web using EPICS Channel Access (CA), we developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force (IETF) for Web-based systems. WebSocket is a web technology that provides bidirectional, full-duplex communication channels over a single TCP connection. By utilizing Node.js and the WebSocket access library called Socket.IO, a WebSocket server was implemented. Node.js is a server-side JavaScript language built on the Google V8 JavaScript Engine. In order to construct the WebSocket server as an EPICS CA client, an add-on for Node.js was developed in C/C++ using the EPICS CA library, which is included in the EPICS base. As a result, for accelerator operation, Web-based client systems became available not only in the central control room but also with various types of equipment. (author)

  12. Open Access Makes an Impact

    Directory of Open Access Journals (Sweden)

    Alexander Böker

    2013-07-01

    Full Text Available Polymers published its first issue in December 2009. At that time, the editorial board and publisher were determined to lead the journal to become another MDPI success story, proving that open access publishing and high quality publications, ensured by a rigorous peer-review procedure, followed by fast publication of accepted manuscripts can be achieved. Three and a half years later, after more than 153,000 article downloads in 2012, the journal received its first impact factor (2012 JCR IF: 1.687. Today, Polymers is proud to be the number one open access journal in the category of “Polymer Science”. In order to achieve this, we relied on an editorial board with well-known members from the polymer community, a professional staff and a vision that there is room alongside the established “high impact” journals for publishing science. Recently, the editor in chief of Science, Bruce Alberts, wrote an editorial [1] in favor of the San Francisco Declaration on Research Assessment (DORA, which states that the impact factor must not be used as “a surrogate measure of the quality of individual research articles [2]”. Even though the impact factor certainly is so far the best available measure of the quality of a journal and its impact on the scientific community, when it comes to the single manuscripts published, “there is still no other way to evaluate the quality of scientific papers, but to read them [3]”. Therefore, Polymers celebrates its first impact factor with an appropriate critical distance towards bibliometric data and feels encouraged to continue on the chosen path. With this in mind, I encourage you, our readers, to continuously evaluate the scientific quality of the articles published in Polymers by reading, discussing and citing them.

  13. Perilous terra incognita--open-access journals.

    Science.gov (United States)

    Balon, Richard

    2014-04-01

    The author focuses on a new rapidly spreading practice of publication in open-access journals. The pros and cons of open-access journals are discussed. Publishing in these journals may be cost prohibitive for educators and junior faculty members. Some authors may be lured by the ease of publishing in open-access journals (and their, at times, inflated self-description, e.g., "international", "scientific"), and their possibly valuable contributions will escape the attention of Academic Psychiatry readership in the vast sea of open-access journals. The readership may be flooded with a large number of low-quality articles (maybe not even properly peer-reviewed) from open-access journals. It may take some time to sort out what is and what is not relevant and useful. Open-access publishing represents a problematic and controversial practice and may be associated with a conflict of interest for the editors and publishers of these journals.

  14. Holistic approaches to e-learning accessibility

    Directory of Open Access Journals (Sweden)

    Lawrie Phipps

    2006-12-01

    Full Text Available The importance of accessibility to digital e-learning resources is widely acknowledged. The World Wide Web Consortium Web Accessibility Initiative has played a leading role in promoting the importance of accessibility and developing guidelines that can help when developing accessible web resources. The accessibility of e-learning resources provides additional challenges. While it is important to consider the technical and resource related aspects of e-learning when designing and developing resources for students with disabilities, there is a need to consider pedagogic and contextual issues as well. A holistic framework is therefore proposed and described, which in addition to accessibility issues takes into account learner needs, learning outcomes, local factors, infrastructure, usability and quality assurance. The practical application and implementation of this framework is discussed and illustrated through the use of examples and case studies.

  15. Web Accessibility - A timely recognized challenge

    CERN Document Server

    Qadri, Jameel A

    2011-01-01

    Web Accessibility for disabled people has posed a challenge to the civilized societies that claim to uphold the principles of equal opportunity and nondiscrimination. Certain concrete measures have been taken to narrow down the digital divide between normal and disabled users of Internet technology. The efforts have resulted in enactment of legislations and laws and mass awareness about the discriminatory nature of the accessibility issue, besides the efforts have resulted in the development of commensurate technological tools to develop and test the Web accessibility. World Wide Web consortium's (W3C) Web Accessibility Initiative (WAI) has framed a comprehensive document comprising of set of guidelines to make the Web sites accessible to the users with disabilities. This paper is about the issues and aspects surrounding Web Accessibility. The details and scope are kept limited to comply with the aim of the paper which is to create awareness and to provide basis for in-depth investigation.

  16. Database Access through Java Technologies

    Directory of Open Access Journals (Sweden)

    Nicolae MERCIOIU

    2010-09-01

    Full Text Available As a high level development environment, the Java technologies offer support to the development of distributed applications, independent of the platform, providing a robust set of methods to access the databases, used to create software components on the server side, as well as on the client side. Analyzing the evolution of Java tools to access data, we notice that these tools evolved from simple methods that permitted the queries, the insertion, the update and the deletion of the data to advanced implementations such as distributed transactions, cursors and batch files. The client-server architectures allows through JDBC (the Java Database Connectivity the execution of SQL (Structured Query Language instructions and the manipulation of the results in an independent and consistent manner. The JDBC API (Application Programming Interface creates the level of abstractization needed to allow the call of SQL queries to any DBMS (Database Management System. In JDBC the native driver and the ODBC (Open Database Connectivity-JDBC bridge and the classes and interfaces of the JDBC API will be described. The four steps needed to build a JDBC driven application are presented briefly, emphasizing on the way each step has to be accomplished and the expected results. In each step there are evaluations on the characteristics of the database systems and the way the JDBC programming interface adapts to each one. The data types provided by SQL2 and SQL3 standards are analyzed by comparison with the Java data types, emphasizing on the discrepancies between those and the SQL types, but also the methods that allow the conversion between different types of data through the methods of the ResultSet object. Next, starting from the metadata role and studying the Java programming interfaces that allow the query of result sets, we will describe the advanced features of the data mining with JDBC. As alternative to result sets, the Rowsets add new functionalities that

  17. An electronically controlled automatic security access gate

    OpenAIRE

    Jonathan A. Enokela; Michael N. TYOWUAH

    2014-01-01

    The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF) transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is ...

  18. Open Access and DSpace Institutional Repository System

    OpenAIRE

    Çelik, Sönmez; Gürdal, Gültekin; Keten, Burcu; Türkfidanı, Ata; Kutlutürk, Levent

    2013-01-01

    The Open Access movement is a social movement in academia, dedicated to the principle of open access - to information - sharing for the common good and is being supported by many scientists, publishers, and researchers in the world, today. The software that is used to operate the institutional archive systems which are the basis of the Open Access, are divided into two forms of some free open source software and paid package programs which were developed by some corporates. DSpace, whose firs...

  19. Modelling Access Control For Healthcare Information Systems

    OpenAIRE

    Ferreira, Ana; Chadwick, David W; Antunes, Luis

    2007-01-01

    The widening use of Information Systems, which allow the collection, extraction, storage, management and search of information, is increasing the need for information security. After a user is successfully identified and authenticated to a system, he needs to be authorised to access the resources he/she requested. Access control is part of this last process that checks if a user can access those resources. This is particularly important in the healthcare environment where there is the need to...

  20. Evaluation of file access control implementations

    OpenAIRE

    Madar, Fatima Ali

    2005-01-01

    This thesis discusses two implementations of file access controls: the UNIX Permissions (UP) and the Access Control List (ACL). We will evaluate advantages and weaknesses in these two implementations. The criteria of evaluation are usefulness, security and manageability. The level of usefulness of systems was measured by evaluating user-surveys. The level of security was measured by comparing the implementations against well-established file access control models concerning privacy, inte...

  1. Advanced Call Center Supporting WAP Access

    Institute of Scientific and Technical Information of China (English)

    YUANXiao-hua; CHENJun-liang

    2001-01-01

    Traditional call centers can be accessed via speech only, and the call center based on web provides both da-ta and speech access,but it needs a powerful terminal-computer.By analyzing traditional call centers and call cen-ters based on web, this paper presents the framework of an advanced call center supporting WAP access.A typical service is also described in detail.

  2. Negotiating access into firms: obstacles and strategies

    OpenAIRE

    Laryea, Sam; Hughes, Will

    2011-01-01

    Researchers often experience difficulties with the negotiation of access into firms for the purpose of data collection. The question we explore is: What are the main obstacles associated with access negotiation into firms; and what strategies do researchers employ to increase their chances of success? Our research work on the tendering process of contractors took place between 2006 and 2008. We successfully negotiated access into four firms (two each in Ghana and the UK) to observe live ex...

  3. Aproximació al moviment "open access"

    OpenAIRE

    Keefer, Alice

    2005-01-01

    [eng] The article describes the background and current state of the open access (OA) movement. Its objectives --with roots in scientists' traditional desire to disseminate their works, in librarians' concerns about the serials crisis, and in technological advances-- were formally articulated in the Budapest Open Access Initiative (BOAI) declaration of 2002. This statement established two strategies for providing access to scientific information without any economic, technical, or legal obstac...

  4. Optical Subsystems for Next Generation Access Networks

    DEFF Research Database (Denmark)

    Lazaro, J.A; Polo, V.; Schrenk, B.;

    2011-01-01

    Recent optical technologies are providing higher flexibility to next generation access networks: on the one hand, providing progressive FTTx and specifically FTTH deployment, progressively shortening the copper access network; on the other hand, also opening fixed-mobile convergence solutions...... in next generation PON architectures. It is provided an overview of the optical subsystems developed for the implementation of the proposed NG-Access Networks....

  5. The LHC access system LACS and LASS

    CERN Document Server

    Ninin, P

    2005-01-01

    The LHC complex is divided into a number of zones with different levels of access controls.Inside the interlocked areas, the personnel protection is ensured by the LHC Access System.The system is made of two parts:the LHC Access Safety System and the LHC Access Control System. During machine operation,the LHC Access Safety System ensures the collective protection of the personnel against the radiation hazards arising from the operation of the accelerator by interlocking the LHC key safety elements. When the beams are off, the LHC Access Control System regulates the access to the accelerator and its many subsystems.It allows a remote, local or automatic operation of the access control equipment which verifies and identifies all users entering the controlled areas.The global architecture of the LHC Access System is now designed and is being validated to ensure that it meets the safety requirements for operation of the LHC.A pilot installation will be tested in the summer 2005 to validate the concept with the us...

  6. German Medical Science - "open access" ist erfolgreich

    OpenAIRE

    Müller, W.

    2008-01-01

    Im Portal German Medical Science (gemeinschaftlich betrieben von AWMF, DIMDI und ZB MED) werden zur Zeit 13 Zeitschriften und eine Schriftenreihe elektronisch mit freiem Zugriff ("open access") publiziert:

  7. BusinessUSA Resource Access API

    Data.gov (United States)

    General Services Administration — BusinessUSA connects businesses to government services and information. The API provides access to resource abstracts including programs, services, data, events,...

  8. Approaches to Open Access in Scientific Publishing

    CERN Document Server

    Harnad, J

    2008-01-01

    Approaches to scientific journal publishing that provide free access to all readers are challenging the standard subscription-based model. But in domains that have a well-functioning system of publicly accessible preprint repositories like arXiv, Open Access is already effectively available. In physics, such repositories have long coexisted constructively with refereed, subscription based journals. Trying to replace this by a system based on journals whose revenue is derived primarily from fees charged to authors is unlikely to provide a better guarantee of Open Access, and may be in conflict with the maintenance of high quality standards.

  9. [Reaching Target Groups--Shaping Accessibility].

    Science.gov (United States)

    Walter, U; Jahn, I

    2015-09-01

    This paper describes the public health discourse on the accessibility and access paths, theoretical approaches as well as factors influencing the utilisation of prevention and health promotion interventions, and requirements for their evaluation. Various projects funded by the German Federal Ministry of Education and Research address many aspects of accessibility and describe extensive experiences with access paths, approaches to information transfer, target group-driven supply chain design, etc. Recommendations for practice and research are given at the end of the article. PMID:24081569

  10. EASIER ACCESS TO STANDARDS DOCUMENTATION

    CERN Multimedia

    2001-01-01

    Many organizations issuing standards offer reduced prices for publications to their members. Paying a membership fee, even a site membership fee, can therefore be worthwhile - even if relatively few standards are needed. The Library is now exploring the possibility, in collaboration with the rest of the CERN community, of joining standards-issuing organizations. So why not share your costs with the rest of the organization wherever this can be done without violating copyright or access regulations? The Library now provides documentation and other member services from IPC, the Association Connecting Electronics Industries (http://www.ipc.org/html/fsabout.htm) at favourable prices for the entire CERN population. For more information, or if you are a member of any other organization which provides services which could be shared CERN-wide, please contact library.desk@cern.ch . We remind all users of international standards, that CERN has special agreements with ISO and IEC (see Bulletin 50/2000). You can order st...

  11. Agriculture: access to technology limited.

    Science.gov (United States)

    1997-01-01

    From country to country and even regionally, the roles of women in agriculture vary, but most of their labor is in unpaid subsistence production and their contributions tend to be underestimated, according to the results of the [UN] Secretary-General's report. Depending on circumstances, they have complementary roles with men, sharing or dividing tasks in the production of crops, care of animals, and forestry management. In sub-Saharan Africa, for example, women contribute 60-80% of labor in food production for both household consumption and sale, while in Malaysia the women account for only 35% of the agricultural labor force, and in Ireland the participation rate is only 10.4%. Although women make this important amount of labor contributions to agricultural production, "development policies tend to favor export crops to earn foreign exchange and the agricultural research tends to address the improvement of production and technologies for commercial production". This results in limited access for women to technical knowledge and innovations, including irrigation, machinery, farming techniques and extension services. This is strengthened by the fact that most of the extension services target farmers who own land and can obtain credit to invest in input and technology. PMID:12293737

  12. ACCESS Sub-system Performance

    Science.gov (United States)

    Kaiser, Mary Elizabeth; Morris, Matthew J.; Aldoroty, Lauren Nicole; Godon, David; Pelton, Russell; McCandliss, Stephan R.; Kurucz, Robert L.; Kruk, Jeffrey W.; Rauscher, Bernard J.; Kimble, Randy A.; Wright, Edward L.; Benford, Dominic J.; Gardner, Jonathan P.; Feldman, Paul D.; Moos, H. Warren; Riess, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, William Van Dyke; Sahnow, David J.; Lampton, Michael; Perlmutter, Saul

    2016-01-01

    ACCESS: Absolute Color Calibration Experiment for Standard Stars is a series of rocket-borne sub-orbital missions and ground-based experiments designed to leverage significant technological advances in detectors, instruments, and the precision of the fundamental laboratory standards used to calibrate these instruments to enable improvements in the precision of the astrophysical flux scale through the transfer of laboratory absolute detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass.A cross wavelength calibration of the astrophysical flux scale to this level of precision over this broad a bandpass is relevant for the data used to probe fundamental astrophysical problems such as the SNeIa photometry based measurements used to constrain dark energy theories.We will describe the strategy for achieving this level of precision, the payload and calibration configuration, present sub-system test data, and the status and preliminary performance of the integration and test of the spectrograph and telescope. NASA APRA sounding rocket grant NNX14AH48G supports this work.

  13. 47 CFR 15.609 - Marketing of Access BPL equipment.

    Science.gov (United States)

    2010-10-01

    ... Section 15.609 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL RADIO FREQUENCY DEVICES Access Broadband Over Power Line (Access BPL) § 15.609 Marketing of Access BPL equipment. The marketing of Access... consist of AC power line public utilities, Access BPL service providers and associates of Access...

  14. Formal Description of Trust-based Access Control

    Science.gov (United States)

    Xiaoning, Ma

    Different from traditional access control technologies, such as discretionary access control, mandatory access control, role-based access control, trust-based access control can solve the problem of uncertainty, risk and vulnerability coming from authorization. In this paper, strict definition and formal description of trust-based access control is defined.

  15. Availability, Access, Authenticity, and Persistence: Creating the Environment for Permanent Public Access to Electronic Government Information.

    Science.gov (United States)

    Barnum, George

    2002-01-01

    Discusses efforts by the Federal Depository Library Program to make information accessible more or mostly by electronic means. Topics include Web-based locator tools; collection development; digital archives; bibliographic metadata; and access tools and user interfaces. (Author/LRW)

  16. Open Access to Mexican Academic Production

    Science.gov (United States)

    Adame, Silvia I.; Llorens, Luis

    2016-01-01

    This paper presents a description of the metadata harvester software development. This system provides access to reliable and quality educational resources, shared by Mexican Universities through their repositories, to anyone with Internet Access. We present the conceptual and contextual framework, followed by the technical basis, the results and…

  17. Remote Access M\\"ossbauer Spectrometry

    CERN Document Server

    Silaev, A A; Postnikov, E B; Radchenko, V V; Silaev, A A

    2015-01-01

    The authors' design for a M\\"ossbauer spectroscopy unit accessed via the Internet is presented. The spectrometer's configuration, operational peculiarities, key specifications, and remote access procedures are described. More detailed educational, scientific, and technical information can be found at the project's official website http://www.efmsb.ru

  18. Open Access publicering på Metropol

    DEFF Research Database (Denmark)

    Azbi, Trine; Larsen, Bente; Møbjerg, Anna Christine Meinertz;

    2016-01-01

    Resultater af en afdækning og analyse af Open Access (OA) publicering på Professionshøjskolen Metropol......Resultater af en afdækning og analyse af Open Access (OA) publicering på Professionshøjskolen Metropol...

  19. Our Foundation: Understanding and Promoting Youth Access.

    Science.gov (United States)

    Gardner, Carrie

    2001-01-01

    Examines how libraries can encourage and increase youth access to information. Discusses the role of the school library media center; law, illegal information, and censorship; parental rights; information policy; and promoting youth access before a challenge occurs in the library. (AEF)

  20. Open Access and Civic Scientific Information Literacy

    Science.gov (United States)

    Zuccala, Alesia

    2010-01-01

    Introduction: We examine how residents and citizens of The Netherlands perceive open access to acquire preliminary insight into the role it might play in cultivating civic scientific literacy. Open access refers to scientific or scholarly research literature available on the Web to scholars and the general public in free online journals and…

  1. On Flat Objects of Finitely Accessible Categories

    Directory of Open Access Journals (Sweden)

    Septimiu Crivei

    2013-01-01

    Full Text Available Flat objects of a finitely accessible additive category are described in terms of some objects of the associated functor category of , called strongly flat functors. We study closure properties of the class of strongly flat functors, and we use them to deduce the known result that every object of a finitely accessible abelian category has a flat cover.

  2. Correlates of Access to Business Research Databases

    Science.gov (United States)

    Gottfried, John C.

    2010-01-01

    This study examines potential correlates of business research database access through academic libraries serving top business programs in the United States. Results indicate that greater access to research databases is related to enrollment in graduate business programs, but not to overall enrollment or status as a public or private institution.…

  3. Including Language Access into Medicaid ACO Design.

    Science.gov (United States)

    Gershon, Rachel; Morris, Lisa; Ferguson, Warren

    2016-09-01

    Quality health care relies upon communication in a patient's preferred language. Language access in health care occurs when individuals are: (1) Welcomed by providers regardless of language ability; and (2) Offered quality language services as part of their care. Federal law generally requires access to health care and quality language services for deaf and Limited English Proficient (LEP) patients in health care settings, but these patients still find it hard to access health care and quality language services.Meanwhile, several states are implementing Medicaid Accountable Care Organization (ACO) initiatives to reduce health care costs and improve health care quality. Alternative payment methods used in these initiatives can give Accountable Care Organizations more flexibility to design linguistically accessible care, but they can also put ACOs at increased financial risk for the cost of care. If these new payment methods do not account for differences in patient language needs, ACO initiatives could have the unintended consequence of rewarding ACOs who do not reach out to deaf and LEP communities or offer quality language services.We reviewed public documents related to Medicaid ACO initiatives in six states. Some of these documents address language access. More could be done, however, to pay for language access efforts. This article describes Medicaid ACO initiatives and explores how different payment tools could be leveraged to reward ACOs for increased access to care and quality language services. We find that a combination of payment tools might be helpful to encourage both access and quality. PMID:27587453

  4. Web browser accessibility using open source software

    NARCIS (Netherlands)

    Obrenovic, Z.; Ossenbruggen, J.R. van

    2007-01-01

    A Web browser provides a uniform user interface to different types of information. Making this interface universally accessible and more interactive is a long term goal still far from being achieved. Universally accessible browsers require novel interaction modalities and additional functionalities,

  5. Easy Access: Auditing the System Network

    Science.gov (United States)

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  6. Health Care Access among Deaf People

    Science.gov (United States)

    Kuenburg, Alexa; Fellinger, Paul; Fellinger, Johannes

    2016-01-01

    Access to health care without barriers is a clearly defined right of people with disabilities as stated by the UN Convention on the Rights of People with Disabilities. The present study reviews literature from 2000 to 2015 on access to health care for deaf people and reveals significant challenges in communication with health providers and gaps in…

  7. Calculating True Computer Access in Schools.

    Science.gov (United States)

    Slovacek, Simeon P.

    1992-01-01

    Discusses computer access in schools; explains how to determine sufficient quantities of computers; and describes a formula that illustrates the relationship between student access hours, the number of computers in a school, and the number of instructional hours in a typical school week. (six references) (LRW)

  8. Open Access Publishing - Strengths and Strategies

    Science.gov (United States)

    Rasmussen, Martin

    2010-05-01

    The journal crisis and the demand for free accessibility to the results of publicly funded research were the main drivers of the Open Access movement since the late 1990's. Besides many academic institutions that support the different ways of Open Access publishing, there is a growing number of publishing houses that are specialized on this new access and business model of scholarly literature. The lecture provides an overview of the different kinds of Open Access publishing, discusses the variety of underlying business models, names the advantages and potentials for researches and the public, and overcomes some objections against Open Access. Besides the increased visibility and information supply, the topic of copyrights and exploitation rights will be discussed. Furthermore, it is a central aim of the presentation to show that Open Access does not only support full peer-review, but also provides the potential for even enhanced quality assurance. The financing of business models based on open accessible literature is another important part to be outlined in the lecture.

  9. Access control and service-oriented architectures

    NARCIS (Netherlands)

    Leune, C.J.

    2007-01-01

    Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the

  10. Librarians and Libraries Supporting Open Access Publishing

    Science.gov (United States)

    Richard, Jennifer; Koufogiannakis, Denise; Ryan, Pam

    2009-01-01

    As new models of scholarly communication emerge, librarians and libraries have responded by developing and supporting new methods of storing and providing access to information and by creating new publishing support services. This article will examine the roles of libraries and librarians in developing and supporting open access publishing…

  11. Open access publishing in physics gains momentum

    CERN Multimedia

    2006-01-01

    "The first meeting of European particle physics funding agencies took place today at CERN to establish a consortium for Open Access publishing in particle physics, SCOAP3. This is the first time an antire scientific field is exploring the conversion of its reader-paid journals into an author-paid Open Access format." (1 page)

  12. Particle physicists want to expand open access

    CERN Multimedia

    Kaiser, Jocelyn

    2006-01-01

    "Particle physicists have come up with a novel way to promote free, immediate access to journal articles. Led by CERN, the gian lab near Geneva, Switzerland, they want to raise at least $6 million a year to begin buying open access to all published papers in their field." (1 page)

  13. National Radiobiology Archives Distributed Access user's manual

    International Nuclear Information System (INIS)

    This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems

  14. 40 CFR 35.6710 - Records access.

    Science.gov (United States)

    2010-07-01

    ... ASSISTANCE Cooperative Agreements and Superfund State Contracts for Superfund Response Actions Records Requirements Under A Cooperative Agreement § 35.6710 Records access. (a) Recipient requirements. The recipient... records access described in 40 CFR 31.36(i)(10). Other Administrative Requirements for...

  15. 77 FR 26213 - Access Authorization Fees

    Science.gov (United States)

    2012-05-03

    ...; 68 FR 58792, 58800. 2. In Sec. 11.15: i. Add paragraph (e) introductory text; ii. Revise paragraphs... Reconciliation Act of 1990 sec. 6101 (42 U.S.C. 2214). Federal Register Citation: November 30, 2010; 75 FR 73935... the Material Access Authorization Program (MAAP) and the Information Access Authority Program...

  16. 36 CFR 1275.26 - Access procedures.

    Science.gov (United States)

    2010-07-01

    ... present during, each search necessary to comply with an authorized access under § 1275.32 or § 1275.34. (e) Only NARA archivists shall conduct searches necessary to comply with authorized accesses under §§ 1275... documentary Presidential historical materials shall be provided to comply with a subpoena or other...

  17. Open Access, Education Research, and Discovery

    Science.gov (United States)

    Furlough, Michael

    2010-01-01

    Background/Context: The open access movement has successfully drawn attention to economic and political aspects of scholarly communication through a significant body of commentary that debates the merits of open access and the potential damage it may do to scholarly publishing. Researchers within the field of education research, notably John…

  18. 34 CFR 300.613 - Access rights.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 2 2010-07-01 2010-07-01 false Access rights. 300.613 Section 300.613 Education... § 300.613 Access rights. (a) Each participating agency must permit parents to inspect and review any... pursuant to § 300.510, and in no case more than 45 days after the request has been made. (b) The right...

  19. Successful Access Rate and Risk Factor of Vascular Access Surgery in Arm for Dialysis

    OpenAIRE

    Yoo, Dae Woo; Yoon, Myunghee; Jun, Hee Jae

    2014-01-01

    Purpose: Preservation of adequate vascular access is of vital importance for patients undergoing chronic dialysis in renal failure. The aim of this study is to evaluate the successful access rate and risk factors of arteriovenous fistula (AVF) in the arm for dialysis at a single center. Materials and Methods: Patients undergoing vascular access operation between January 2006 and December 2011 were retrospectively identified. Results: A total of 362 vascular access operations were performed. T...

  20. [The publishing industry against open access journals].

    Science.gov (United States)

    Camargo Junior, Kenneth Rochel de

    2012-12-01

    Open-access journal publishing has significantly grown in recent years. Restricted access publications have, in turn, increasing access costs as they benefit from a unique economic model in which relevant work and essential inputs are provided free of charge to vendors who have a captive market that has almost no competition. An additional issue typical of industries that work under the copyright regime is that the oligopoly market structure of the publishing industry which in turn further contributes to increase their products' prices. Mandatory open-access policies, as determined by the NIH, constitute a threat to this business model and are being challenged by the industry on several fronts, including the passage of legislation to undermine these initiatives. The purpose of this commentary article was to review key aspects of this confrontation and to suggest potential strategies for encouraging open-access publishing in Brazil.

  1. Energy access. Current situation, challenges and outlook

    International Nuclear Information System (INIS)

    Globally over 1.3 billion people do not have access to electricity and 2.6 billion people rely on the traditional use of biomass for cooking. Energy access is one of the major challenges of the 21. century as it is a lever for both economic and human development, at individual and national level. Moreover, energy access represents a high-potential market and offers a lot of opportunities for private companies and industrials. In this publication, ENEA lays out the current situation of energy access (actors, actual and future needs, existing technological solutions, markets). The publication addresses the main issues energy access has to face: energy price, equipment financing, distribution, scale-up, and environmental performances

  2. Surveillance and Monitoring of Dialysis Access

    Directory of Open Access Journals (Sweden)

    Lalathaksha Kumbar

    2012-01-01

    Full Text Available Vascular access is the lifeline of a hemodialysis patient. Currently arteriovenous fistula and graft are considered the permanent options for vascular access. Monitoring and surveillance of vascular access are an integral part of the care of hemodialysis patient. Although different techniques and methods are available for identifying access dysfunction, the scientific evidence for the optimal methodology is lacking. A small number of randomized controlled trials have been performed evaluating different surveillance techniques. We performed a study of the recent literature published in the PUBMED, to review the scientific evidence on different methodologies currently being used for surveillance and monitoring and their impact on the care of the dialysis access. The limited randomized studies especially involving fistulae and small sample size of the published studies with conflicting results highlight the need for a larger multicentered randomized study with hard clinical end points to evaluate the optimal surveillance strategy for both fistula and graft.

  3. Accessibility: global gateway to health literacy.

    Science.gov (United States)

    Perlow, Ellen

    2010-01-01

    Health literacy, cited as essential to achieving Healthy People 2010's goals to "increase quality and years of healthy life" and to "eliminate health disparities," is defined by Healthy People as "the degree to which individuals have the capacity to obtain, process, and understand basic health information and services needed to make appropriate health decisions." Accessibility, by definition, the aforementioned "capacity to obtain," thus is health literacy's primary prerequisite. Accessibility's designation as the global gateway to health literacy is predicated also on life's realities: global aging and climate change, war and terrorism, and life-extending medical and technological advances. People with diverse access needs are health professionals' raison d'être. However, accessibility, consummately cross-cultural and universal, is virtually absent as a topic of health promotion and practice research and scholarly discussion of health literacy and equity. A call to action to place accessibility in its rightful premier position on the profession's agenda is issued.

  4. Open Access Scholarly Publications as OER

    Directory of Open Access Journals (Sweden)

    Terry Anderson

    2013-06-01

    Full Text Available This paper presents the rationale, common practices, challenges, and some personal anecdotes from a journal editor on the production, use, and re-use of peer-reviewed scholarly articles as open educational resources (OER. The scholarly and professional discourse related to open educational resources has largely focused on open learning objects, courseware, and textbooks. However, especially in graduate education, articles published in scholarly journals are often a major component of the course content in formal education. In addition, open access journal articles are critical to expanding access to knowledge by scholars in the developing world and in fostering citizen science, by which everyone has access to the latest academic information and research results. In this article, I highlight some of the challenges, economic models, and evidence for quality of open access journal content and look at new affordances provided by the Net for enhanced functionality, access, and distribution.In the 17 years since I graduated with a doctorate degree, the climate and acceptance of open access publishing has almost reversed itself. I recall a conversation with my PhD supervisor in which he argued that publishing online was not a viable option as the product would not have permanency, scholarly recognition, or the prestige of a paper publication. His comments reflect the confusion between online resources and those described as open access, but as well illustrate the change in academic acceptance and use of open access products during the past decade. The evolution from paper to online production and consumption is a disruptive technology in which much lower cost and increased accessibility of online work opens the product to a completely new group of potential users. In the case of OER these consumers are primarily students, but certainly access to scholars from all parts of the globe and the availability to support citizen science (Silvertown, 2009

  5. Financing low carbon energy access in Africa

    International Nuclear Information System (INIS)

    Modern energy access in Africa is critical to meeting a wide range of developmental challenges including poverty reduction and the Millennium Development Goals (MDGs). Despite having a huge amount and variety of energy resources, modern energy access in the continent is abysmal, especially Sub-Saharan Africa. Only about 31% of the Sub-Saharan African population have access to electricity while traditional biomass energy accounts for over 80% of energy consumption in many Sub-Saharan African countries. With energy use per capita among the lowest in the world, there is no doubt that Africa will need to increase its energy consumption to drive economic growth and human development. Africa also faces a severe threat from global climate change with vulnerabilities in several key areas or sectors in the continent including agriculture, water supply, energy, etc. Low carbon development provides opportunities for African countries to improve and expand access to modern energy services while also building low-emission and climate-resilient economies. However, access to finance from different sources will be critical in achieving these objectives. This paper sets out to explore the financial instruments available for low carbon energy access in Africa including the opportunities, markets and risks in low carbon energy investments in the continent. - Highlights: ► Access to finance will be critical to achieving low carbon energy access in Africa. ► Domestic finance will be important in leveraging private finance. ► Private sector participation in modern and clean energy in Africa is still low. ► Many financing mechanisms exist for low carbon energy access in Africa. ► The right institutional frameworks are critical to achieving low carbon energy access in Africa.

  6. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  7. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  8. Lexical semantic access and letter access are involved in different aspects of reading

    DEFF Research Database (Denmark)

    Poulsen, Mads

    Purpose: This study investigated the effects of lexical access speed and letter access speed on reading fluency and reading comprehension. We hypothesized that 1) letter access speed would correlate with reading fluency but not comprehension, while 2) lexical access speed would influence reading...... comprehension. For readers who are struggling with recoding, most of the reading effort is probably tied up with recoding, leaving little to be explained by lexical access. Therefore we expected that 3) lexical access speed would primarily predict reading fluency for readers who were no longer struggling...... with recoding. Method: 85 Grade 5 students completed tasks of reading accuracy, fluency, and comprehension. In addition they were tested on isolated letter naming and isolated picture naming tasks as measures of letter and lexical access speed. All items in both naming tasks were unique. Parallel serial rapid...

  9. BEACON FRAME MANIPULATION TO MITIGATE ROGUE ACCESS POINTS: CASE OF ANDROID SMARTPHONE ROGUE ACCESS POINTS

    Directory of Open Access Journals (Sweden)

    Thambo Nyathi

    2015-11-01

    Full Text Available The use of wireless devices to access corporate network resources is now part of the norm within corporate environments. When wireless users need to connect to a network they hardly question the source of their connectivity. Mobile phones, particularly smartphones allow users to access network resources. These harmless looking wireless devices can be a source of major threats if configured to be so. The Internet is awash with mobile apps capable of performing packet sniffing. These applications, coupled with the capability of the smartphone to be configured as an access point, can present a Smartphone Rogue Access Point. Access Points advertise their availability using what is called a beacon frame. This research paper proposes a solution which restructures this beacon frame to include an Authentic Access Point Value which can be used to defend against Rogue Access Points.

  10. Beacon Frame Manipulation to Mitigate Rogue Access Points: Case of Android Smartphone Rogue Access Points

    Directory of Open Access Journals (Sweden)

    Thambo Nyathi

    2014-02-01

    Full Text Available The use of wireless devices to access corporate network resources is now part of the norm within corporate environments. When wireless users need to connect to a network they hardly question the source of their connectivity. Mobile phones, particularly smartphones allow users to access network resources. These harmless looking wireless devices can be a source of major threats if configured to be so. The Internet is awash with mobile apps capable of performing packet sniffing. These applications, coupled with the capability of the smartphone to be configured as an access point, can present a Smartphone Rogue Access Point. Access Points advertise their availability using what is called a beacon frame. This research paper proposes a solution which restructures this beacon frame to include an Authentic Access Point Value which can be used to defend against Rogue Access Points.

  11. Access control and personal identification systems

    CERN Document Server

    Bowers, Dan M

    1988-01-01

    Access Control and Personal Identification Systems provides an education in the field of access control and personal identification systems, which is essential in selecting the appropriate equipment, dealing intelligently with vendors in purchases of the equipment, and integrating the equipment into a total effective system. Access control devices and systems comprise an important part of almost every security system, but are seldom the sole source of security. In order for the goals of the total system to be met, the other portions of the security system must also be well planned and executed

  12. Open Access Policy for CERN Physics Publications

    CERN Multimedia

    2014-01-01

    CERN is committed to Open Access. It represents one of the values written in our Convention sixty years ago and is increasingly important for our Member States.   In the last edition of the Bulletin, this article described how CERN is doing with regards to open access publishing today. On Thursday this week, the Open Access Policy for CERN Physics Publications* was endorsed by the Scientific Information Policy Board (SIPB) and approved by the Director-General the same day . For any clarifications regarding the policy, please contact the Scientific Information Service library.desk@cern.ch. * A French version of the policy will be made available shortly.

  13. Architectures for a quantum random access memory

    OpenAIRE

    Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo

    2008-01-01

    A random access memory, or RAM, is a device that, when interrogated, returns the content of a memory location in a memory array. A quantum RAM, or qRAM, allows one to access superpositions of memory sites, which may contain either quantum or classical information. RAMs and qRAMs with n-bit addresses can access 2^n memory sites. Any design for a RAM or qRAM then requires O(2^n) two-bit logic gates. At first sight this requirement might seem to make large scale quantum versions of such devices ...

  14. Accessibility percolation on n-trees

    OpenAIRE

    Nowak, Stefan; Krug, Joachim

    2013-01-01

    Accessibility percolation is a new type of percolation problem inspired by evolutionary biology. To each vertex of a graph a random number is assigned and a path through the graph is called accessible if all numbers along the path are in ascending order. For the case when the random variables are independent and identically distributed, we derive an asymptotically exact expression for the probability that there is at least one accessible path from the root to the leaves in an $n$-tree. This p...

  15. String Analysis for Dynamic Field Access

    DEFF Research Database (Denmark)

    Madsen, Magnus; Andreasen, Esben

    2014-01-01

    In JavaScript, and scripting languages in general, dynamic field access is a commonly used feature. Unfortunately, current static analysis tools either completely ignore dynamic field access or use overly conservative approximations that lead to poor precision and scalability. We present new string...... domains to reason about dynamic field access in a static analysis tool. A key feature of the domains is that the equal, concatenate and join operations take Ο(1) time. Experimental evaluation on four common JavaScript libraries, including jQuery and Prototype, shows that traditional string domains...

  16. Capital--its application, access and attitudes.

    Science.gov (United States)

    Bohlmann, R C

    1996-01-01

    Access to capital for group or network development is generally through one of three sources: current revenue, borrowing, or outside investors. Groups often have not planned well for their financial future, and consequently when integration or managed care opportunities arise, they can be without the necessary funds. This article addresses the acquisition of capital in the context of application (need), access (resources), and attitudes (concerns). Determining capital needs is the starting point, followed by investigating institutional resources, and then investigating the attitudes of the group toward accessing the needed capital. PMID:10159459

  17. M2M massive wireless access

    DEFF Research Database (Denmark)

    Zanella, Andrea; Zorzi, Michele; Santos, André F.;

    2013-01-01

    In order to make the Internet of Things a reality, ubiquitous coverage and low-complexity connectivity are required. Cellular networks are hence the most straightforward and realistic solution to enable a massive deployment of always connected Machines around the globe. Nevertheless, a paradigm...... shift in the conception and design of future cellular networks is called for. Massive access attempts, low-complexity and cheap machines, sporadic transmission and correlated signals are among the main properties of this new reality, whose main consequence is the disruption of the development...... Access Reservation, Coded Random Access and the exploitation of multiuser detection in random access. Additionally, we will show how the properties of machine originated signals, such as sparsity and spatial/time correlation can be exploited. The end goal of this paper is to provide motivation...

  18. CDC STATE System Tobacco Legislation - Youth Access

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1995-2016. Centers for Disease Control and Prevention (CDC). State Tobacco Activities Tracking and Evaluation (STATE) System. Legislation—Youth Access. The STATE...

  19. Minnesota Walk-In Access Sites

    Data.gov (United States)

    Minnesota Department of Natural Resources — The Minnesota Walk-In Access site (WIA) GIS data represents areas of private land that have been made open to the public for the purpose of walk-in (foot travel)...

  20. Environmental Research Division's Data Access Program (ERDDAP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — ERDDAP (the Environmental Research Division's Data Access Program) is a data server that gives you a simple, consistent way to download subsets of scientific...

  1. Open Access publishing in physics gains momentum

    CERN Multimedia

    2006-01-01

    The first meeting of European particle physics funding agencies took place on 3 November at CERN to establish a consortium for Open Access publishing in particle physics, SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). Open Access could transform the academic publishing world, with a great impact on research. The traditional model of research publication is funded through reader subscriptions. Open Access will turn this model on its head by changing the funding structure of research results, without increasing the overall cost of publishing. Instead of demanding payment from readers, publications will be distributed free of charge, financed by funding agencies via laboratories and the authors. This new concept will bring greater benefits and broaden opportunities for researchers and funding agencies by providing unrestricted distribution of the results of publicly funded research. The meeting marked a positive step forward, with international support from laboratories, fundin...

  2. Open Access to essential health care information

    Directory of Open Access Journals (Sweden)

    Pandey Manoj

    2004-12-01

    Full Text Available Abstract Open Access publishing is a valuable resource for the synthesis and distribution of essential health care information. This article discusses the potential benefits of Open Access, specifically in terms of Low and Middle Income (LAMI countries in which there is currently a lack of informed health care providers – mainly a consequence of poor availability to information. We propose that without copyright restrictions, Open Access facilitates distribution of the most relevant research and health care information. Furthermore, we suggest that the technology and infrastructure that has been put in place for Open Access could be used to publish download-able manuals, guides or basic handbooks created by healthcare providers in LAMI countries.

  3. Accessible Near-Earth Objects (NEOs)

    Science.gov (United States)

    Barbee, Brent W.

    2015-01-01

    Near Earth Objects (NEOs) are asteroids and comets whose orbits are in close proximity to Earth's orbit; specifically, they have perihelia less than 1.3 astronomical units. NEOs particularly near Earth asteroids (NEAs) are identified as potential destinations for future human exploration missions. In this presentation I provide an overview of the current state of knowledge regarding the astrodynamical accessibility of NEAs according to NASA's Near Earth Object Human Space Flight Accessible Targets Study (NHATS). I also investigate the extremes of NEA accessibility using case studies and illuminate the fact that a space-based survey for NEOs is essential to expanding the set of known accessible NEAs for future human exploration missions.

  4. Decision Analysis of Dynamic Spectrum Access Rules

    Energy Technology Data Exchange (ETDEWEB)

    Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

    2011-12-01

    A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

  5. UCL preparations for Federated Access Management

    OpenAIRE

    Stone, M

    2008-01-01

    A case study on UCL's preparations for federated access to electronic library resources using Shibboleth technology. Describes the context of UCL Library Services, the decision-making process, practical considerations, current plans, and the user experience

  6. A Conceptual Framework of Mapping Access to Health Care across EU Countries: The Patient Access Initiative.

    Science.gov (United States)

    Souliotis, Kyriakos; Hasardzhiev, Stanimir; Agapidaki, Eirini

    2016-01-01

    Research evidence suggests that access to health care is the key influential factor for improved population health outcomes and health care system sustainability. Although the importance of addressing barriers in access to health care across European countries is well documented, little has been done to improve the situation. This is due to different definitions, approaches and policies, and partly due to persisting disparities in access within and between European countries. To bridge this gap, the Patient Access Partnership (PACT) developed (a) the '5As' definition of access, which details the five critical elements (adequacy, accessibility, affordability, appropriateness, and availability) of access to health care, (b) a multi-stakeholders' approach for mapping access, and (c) a 13-item questionnaire based on the 5As definition in an effort to address these obstacles and to identify best practices. These tools are expected to contribute effectively to addressing access barriers in practice, by suggesting a common framework and facilitating the exchange of knowledge and expertise, in order to improve access to health care between and within European countries. PMID:27237814

  7. Compulsory licensing and access to drugs

    OpenAIRE

    Stavropoulou, C; Valletti, T.

    2015-01-01

    Compulsory licensing allows the use of a patented invention without the owner's consent, with the aim of improving access to essential drugs. The pharmaceutical sector argues that, if broadly used, it can be detrimental to innovation. We model the interaction between a company in the North that holds the patent for a certain drug and a government in the South that needs to purchase it. We show that both access to drugs and pharmaceutical innovation depend largely on the Southern country's abi...

  8. Tariff-Tax Reforms and Market Access

    DEFF Research Database (Denmark)

    Kreickemeier, Udo; Raimondos-Møller, Pascalis

    2006-01-01

    Reducing tariffs and increasing consumption taxes is a standard IMF advice to countries that want to open up their economy without hurting government finances. Indeed, theoretical analysis of such a tariff-tax reform shows an unambiguous increase in welfare and government revenues. The present pa...... efficient proposal to follow both as far as it concerns market access and welfare.JEL code: F13, H20.Keywords: Market access; tariff reform, consumption tax reform....

  9. SMES' SECTOR ACCESS TO FINANCE: AN OVERVIEW

    OpenAIRE

    Roman Angela

    2011-01-01

    Through their contribution to the creation of added value and new jobs, the small and medium enterprises (SMEs) have a significant role in the economic and social development of a country. However, these enterprises are facing numerous obstacles that limit their performance, growth and development. Among the difficulties faced by SMEs, the access to finance is often reported as a major obstacle to the deployment and expansion of their activity. The access to finance is crucial for efficient a...

  10. Disk access controller for Multi 8 computer

    International Nuclear Information System (INIS)

    After having presented the initial characteristics and weaknesses of the software provided for the control of a memory disk coupled with a Multi 8 computer, the author reports the development and improvement of this controller software. He presents the different constitutive parts of the computer and the operation of the disk coupling and of the direct access to memory. He reports the development of the disk access controller: software organisation, loader, subprograms and statements

  11. Should access to credit be a right?

    OpenAIRE

    Hudon, Marek

    2009-01-01

    Discussion on financial ethics increasingly includes the problem of exclusion of the poorer segments of society from the financial system and access to credit. This paper explores the ethical dimensions surrounding the concept of a human right to credit. If access to credit is directly instrumental to economic development, poverty reduction and the improved welfare of all citizens, then one can proclaim, as Nobel Prize Laureate M. Yunus has done, that it is a moral necessity to establish cred...

  12. Single access retroperitoneoscopic adrenalectomy: initial experience

    OpenAIRE

    Beiša, Virgilijus; Kildušis, Edvinas; Strupas, Kęstutis

    2011-01-01

    Today, endoscopic adrenalectomy has become a gold standard in endocrine surgery. To minimize the morbidity and improve cosmesis, single access retroperitoneoscopic adrenalectomy (SARA) has been developed as an alternative to traditional multiport laparoscopy and single port access (SPA) surgery, potentially exploiting even more the already proven benefits of minimally invasive surgery. We applied the SARA technique to adrenalectomy using the posterior retroperitoneal approach. The aim is to h...

  13. Travel Time Variability and Airport Accessibility

    OpenAIRE

    Koster, P.R.; Kroes, E.P.; Verhoef, E.T.

    2010-01-01

    This discussion paper resulted in a publication in Transportation Research Part B: Methodological (2011). Vol. 45(10), pages 1545-1559. This paper analyses the cost of access travel time variability for air travelers. Reliable access to airports is important since it is likely that the cost of missing a flight is high. First, the determinants of the preferred arrival times at airports are analyzed, including trip purpose, type of airport, flight characteristics, travel experience, type of che...

  14. Design of Reversible Random Access Memory

    OpenAIRE

    Mamun, Md. Selim Al; Hossain, Syed Monowar

    2013-01-01

    Reversible logic has become immensely popular research area and its applications have spread in various technologies for their low power consumption. In this paper we proposed an efficient design of random access memory using reversible logic. In the way of designing the reversible random access memory we proposed a reversible decoder and a write enable reversible master slave D flip-flop. All the reversible designs are superior in terms of quantum cost, delay and garbage outputs compared to ...

  15. Access control issues in social networks

    OpenAIRE

    Carreras Coch, Anna; Rodríguez Luna, Eva; Delgado Mercè, Jaime; Maroñas Borras, Xavier

    2010-01-01

    Social Networks, as the main axis of Web 2.0, are creating a number of interesting challenges to the research and standardisation communities. In this paper, we analyse the current and future use of access control policies in Social Networks. Subsequently, two main issues are addressed: the interoperability amongst systems using different policy languages and the lack of elements in the existing policy languages when trying to express Social Networks’ access control. In part...

  16. Photonic-assisted ultrafast THz wireless access

    DEFF Research Database (Denmark)

    Yu, Xianbin; Chen, Ying; Galili, Michael;

    THz technology has been considered feasible for ultrafast wireless data communi- cation, to meet the increasing demand on next-generation fast wireless access, e.g., huge data file transferring and fast mobile data stream access. This talk reviews recent progress in high-speed THz wireless...... communications enabled by photonics technologies, as well as the needed technical breakthroughs for achieving ultrafast data rates beyond 100Gbit/s...

  17. EARS: Electronic Access to Reference Service.

    OpenAIRE

    Weise, F O; Borgendale, M

    1986-01-01

    Electronic Access to Reference Service (EARS) is a front end to the Health Sciences Library's electronic mail system, with links to the online public catalog. EARS, which became operational in September 1984, is accessed by users at remote sites with either a terminal or microcomputer. It is menu-driven, allowing users to request: a computerized literature search, reference information, a photocopy of a journal article, or a book. This paper traces the history of EARS and discusses its use, i...

  18. Determinants of Internet access in Colombia

    OpenAIRE

    Botello Peñaloza, Héctor Alberto

    2016-01-01

    Objective: to identify the determinants of Internet access in Colombian homes during 2013.Methodology: Socioeconomic characteristics were incorporated within a discrete choice model in order to estimate the probability of Internet access in Colombian households. It was based on microdata from the quality of life survey conducted by DANE (The National Administrative Department of Statistics).Results: a marked increase in the use of Internet in Colombia was found: in 2007, 17% of Colombians had...

  19. Corporate Social Responsibility and Access to Finance

    OpenAIRE

    Cheng, Beiting; Ioannou, Ioannis; Serafeim, Georgios

    2012-01-01

    In this paper, we investigate whether superior performance on corporate social responsibility (CSR) strategies leads to better access to finance. We hypothesize that better access to finance can be attributed to a) reduced agency costs due to enhanced stakeholder engagement and b) reduced informational asymmetry due to increased transparency. Using a large cross-section of firms, we find that firms with better CSR performance face significantly lower capital constraints. Moreover, we provide ...

  20. Open access and scholarly communication, part 4

    CERN Document Server

    Eden, Brad

    2009-01-01

    This fourth e-book on the subject of open access in the academic field includes a Latin American case study on open access penetration, a paper from Germany on the promotion of OA illustrated by a project at the University of Konstanz, and a case study on OA at Bioline International, a non-profit scholarly publications aggregator, distributor, publisher and publishing assistance service.

  1. Metrics and Evaluation Models for Accessible Television

    DEFF Research Database (Denmark)

    Li, Dongxiao; Looms, Peter Olaf

    2014-01-01

    The adoption of the UN Convention on the Rights of Persons with Disabilities (UN CRPD) in 2006 has provided a global framework for work on accessibility, including information and communication technologies and audiovisual content. One of the challenges facing the application of the UN CRPD...... and evaluation models for access service provision, the paper identifies options that could facilitate the evaluation of UN CRPD outcomes and suggests priorities for future research in this area....

  2. Flexible And Secure Access To Computing Clusters

    OpenAIRE

    Jan Meizner; Maciej Malawski; Marian Bubak

    2010-01-01

    The investigation presented in this paper was prompted by the need to provide a manageablesolution for secure access to computing clusters with a federated authentication framework.This requirement is especially important for scientists who need direct access to computingnodes in order to run their applications (e.g. chemical or medical simulations) with proprietary,open-source or custom-developed software packages. Our existing software, whichenables non-Web clients to use Shibboleth-secured...

  3. Open Access kortlægning 2011

    DEFF Research Database (Denmark)

    Elbæk, Mikael; Hansen, Tove Juul; Larsen, Asger V.;

    Denne rapport viser, at det faglige domæne er en meget stærk faktor i forhold til, hvor stor en andel af forskningsoutputtet, der er open access. Rapporten viser, at der er forskelle mellem universiteterne som ikke alene kan forklares med faglige faktorer, men forklaringerne må findes andre steder......, det kunne være lokale procedurer, kultur eller strukturer (politikker). Dette tager rapporten dog ikke stilling til. Andelen af gylden open access ligger relativt stabilt på tværs af universiteterne, med en andel mellem 6 – 10 % af den samlede publicering i peer reviewede tidsskrifter. Dermed er grøn...... open access den væsentligste faktor som adskiller universiteternes samlede open access andel. Endvidere viser rapporten, at der er et meget stort uudnyttet open access potentiale på alle universiteterne. Faktisk kunne mere end 5.000 flere BFI-pointgivende artikler være open access, dvs. at 71 % af det...

  4. Assessment method of accessibility conditions: how to make public buildings accessible?

    Science.gov (United States)

    Andrade, Isabela Fernandes; Ely, e Vera Helena Moro Bins

    2012-01-01

    The enforcement of accessibility today has faced several difficulties, such as intervention in historic buildings that now house public services and cultural activities, such as town halls, museums and theaters and should allow access, on equal terms to all people. The paper presents the application of a method for evaluating the spatial accessibility conditions and their results. For this, we sought to support the theoretical foundation about the main issue involved and legislation. From the method used--guided walks--it was possible to identify the main barriers to accessibility in historic buildings. From the identified barriers, possible solutions are presented according to the four components of accessibility: spatial orientation, displacement, use and communication. It is hoped also that the knowledge gained in this research contributes to an improvement of accessibility legislation in relation to the listed items.

  5. Open Access - Ein Wundermittel? Wissenschaft, Gesellschaft, Demokratie, Digital Divide

    OpenAIRE

    Herb, Ulrich

    2007-01-01

    Claims for Open Access are mostly underpinned with a)science-related (Open Access accelerates scientific communication) b) financial (Open Access alleviates the serials crisis), c) social (Open Access reduces the Digital Divide), d) democracy-related (Open Access facilitates participation) and socio-political (Open Access levels disparities) arguments. Using sociological concepts and notions this contribution analyses some of the presumptions mentioned. Naiveties as the assu...

  6. Biometric Alternatives to CAPTCHA: Exploring Accessible Interface Options

    OpenAIRE

    Foley, Anita

    2012-01-01

    In the computing domain the relationship between accessibility and security is a complex and evolving one; accessibility attempts to ensure that as wide a range of individuals as possible are granted access to systems, whereas security attempts to restrict access only to individuals who are entitled to access those systems. A key security concern is to determine whether or not the system is being accessed by a software agent or a real human being, and a number of approaches have been develope...

  7. Morphophysiological characterization of giant missionary grass accessions

    Directory of Open Access Journals (Sweden)

    Cristiano Reschke Lajús

    2011-11-01

    Full Text Available In this study, the phenotypic diversity of five accessions of giant missionary grass (Axonopus jesuiticus × A. scoparius was evaluated by using morphophysiological traits. Accessions V 14337, V 14403, V 14404, V 14405 and V 14406 are hybrids derived from spontaneous crossing that occurred in Vale do Itajaí, Santa Catarina, Brazil. Plants were cultivated in greenhouse and evaluated at 60, 90, 120, 150, 180, 210 and 240 days of growth. Variation was observed for dry matter production, phenology and morphological traits, showing the possibility of selection. Flowering started at 210 days of growth and only in accessions V 14337 and V 14404. The Mahalanobis distance among accessions ranged from 35.64 (V 14403 and V 14405 to 183.38 (V 14337 and V 14405, and three groups were formed, based on 17 vegetative morphophysiological traits evaluated in plants with 180 days of growth: G1 (V 14403, V 14405, G2 (V 14406 and G3 (V 14337, V 14404. Group I presented the greatest dry matter production of stolon and aboveground, which were the traits with the largest relative contribution to genetic divergence, 38.67% and 38.31%, respectively. Accessions V 14403 and V 14405 are the most promising for agronomic evaluations that address their records as forage cultivars.

  8. Access to Space Interactive Design Web Site

    Science.gov (United States)

    Leon, John; Cutlip, William; Hametz, Mark

    2000-01-01

    The Access To Space (ATS) Group at NASA's Goddard Space Flight Center (GSFC) supports the science and technology community at GSFC by facilitating frequent and affordable opportunities for access to space. Through partnerships established with access mode suppliers, the ATS Group has developed an interactive Mission Design web site. The ATS web site provides both the information and the tools necessary to assist mission planners in selecting and planning their ride to space. This includes the evaluation of single payloads vs. ride-sharing opportunities to reduce the cost of access to space. Features of this site include the following: (1) Mission Database. Our mission database contains a listing of missions ranging from proposed missions to manifested. Missions can be entered by our user community through data input tools. Data is then accessed by users through various search engines: orbit parameters, ride-share opportunities, spacecraft parameters, other mission notes, launch vehicle, and contact information. (2) Launch Vehicle Toolboxes. The launch vehicle toolboxes provide the user a full range of information on vehicle classes and individual configurations. Topics include: general information, environments, performance, payload interface, available volume, and launch sites.

  9. Public Interest in Accessing the INIS Collection

    International Nuclear Information System (INIS)

    Since its creation in 1970, the International Nuclear Information System (INIS) has collected and provided access to more than 3.8 million bibliographic references to publications, documents, technical reports, non‐copyrighted documentation, and other grey literature, as well as over a million full texts. Overall, there are 800 GB of data in the INIS repository. Public interest in accessing this collection has been remarkable. This year alone, there were more than one million sessions and almost two million page views. During the same period, there were 1.6 million full text document downloads. The INIS collection consists of seven types of literature – computer media, patents, books, reports, journal articles, miscellaneous and audio‐visuals. This paper provides an overview of the INIS collection subject coverage, and the distribution of different types of grey literature. It also provides INIS repository access statistics based on Google Analytics and other Web search data pertaining to public interest in accessing these different types of literature and the uniqueness of the collection. As one of the world's largest collections of published information on the peaceful uses of nuclear science and technology, INIS represents an extraordinary example of world cooperation. 154 INIS members share and allow access to their valuable nuclear information resources, preserving them for future generations and offering a freely available nuclear knowledge repository. (author)

  10. NESDIS OSPO Data Access Policy and CRM

    Science.gov (United States)

    Seybold, M. G.; Donoho, N. A.; McNamara, D.; Paquette, J.; Renkevens, T.

    2012-12-01

    The Office of Satellite and Product Operations (OSPO) is the NESDIS office responsible for satellite operations, product generation, and product distribution. Access to and distribution of OSPO data was formally established in a Data Access Policy dated February, 2011. An extension of the data access policy is the OSPO Customer Relationship Management (CRM) Database, which has been in development since 2008 and is reaching a critical level of maturity. This presentation will provide a summary of the data access policy and standard operating procedure (SOP) for handling data access requests. The tangential CRM database will be highlighted including the incident tracking system, reporting and notification capabilities, and the first comprehensive portfolio of NESDIS satellites, instruments, servers, applications, products, user organizations, and user contacts. Select examples of CRM data exploitation will show how OSPO is utilizing the CRM database to more closely satisfy the user community's satellite data needs with new product promotions, as well as new data and imagery distribution methods in OSPO's Environmental Satellite Processing Center (ESPC). In addition, user services and outreach initiatives from the Satellite Products and Services Division will be highlighted.

  11. Ad Hoc Access Gateway Selection Algorithm

    Science.gov (United States)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  12. Venous access: options, approaches and issues

    Energy Technology Data Exchange (ETDEWEB)

    Asch, M.R. [Univ. of Toronto, Mount Sinai Hospital, Dept. of Medical Imaging, Toronto, Ontario (Canada)

    2001-06-01

    Venous access is an essential part of medical practice. It is needed to obtain blood samples to make the diagnosis and to administer fluids or medicines as part of treatment. Although relatively new in the history of medicine, the placement and maintenance of the various venous access devices now occupies a significant portion of many vascular and interventional radiology practices. Thus, it is important to have a thorough understanding of these devices and their uses. The first long-term venous access devices were used in 1973. These were placed via a surgical cut-down on the subclavian vein. In 1982, the first subcutaneous implantable ports were described. These procedures were initially performed by surgeons, but over the last 5-10 years, both the insertion and management of these devices has shifted to interventional radiologists. Peripherally inserted central catheter (PICC) lines have almost completely supplanted the use of standard central lines (Fig. 1). A number of factors have facilitated this - namely, ready and less expensive room access, outpatient procedure and radiologists' accessibility and familiarity with image-guidance procedures and catheters and guide wires. (author)

  13. Open Access Publishing in Particle Physics

    CERN Document Server

    2007-01-01

    Particle Physics, often referred to as High Energy Physics (HEP), spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-Web era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peerreview system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs...

  14. Access to surgical assistance: challenges and perspectives

    Directory of Open Access Journals (Sweden)

    Maria Fernanda do Prado Tostes

    2016-01-01

    Full Text Available Objective to characterize the access to surgical assistance in Brazil. Method documentary study, with a quantitative approach, developed from information of the Caixa Preta da Saúde [Health Black Box] database, of the Brazilian Medical Association. Results in the one-year period 3773 cases related to health care in Brazil were recorded. There were 458 (12.3% records on surgical assistance. Of these, most, 339 (74.1%, involved the lack of access in all regions of Brazil. The main access constraint was the prolonged waiting time for surgery. Other constraints were the excessive waiting for medical appointment with experts, doing examinations and cancellation of surgeries. Conclusion the access to surgical assistance, by users of the Brazilian health system, is not widely guaranteed, reinforcing the need for integrated governmental actions, organization of the health care network, management of health care and human resources to overcome the challenges imposed to achieve the Universal Access to Health and Universal Health Coverage.

  15. Airport Surface Access and Mobile Apps

    Directory of Open Access Journals (Sweden)

    Luis Martin-Domingo

    2015-02-01

    Full Text Available Purpose: Airport Surface Access faces two main opposite issues: (1 cars, being the main transport mode, contribute to the increasing level of congestion and pollution of cities; and (2 simultaneously, parking fees are one important source of airports commercial revenue, creating a dilemma for airports when facing the problem. Following the recent trend of air passengers travelling with Smartphone (78% in 2013, the purpose of this paper is to monitor the adoption of mobile Applications (Apps by airports and to analyze if the information and functions provided in those Apps can help to overcome the above two issues. Design/methodology/approach: 31 iPhone App of some of the largest European airports were evaluated in the lab using the evaluation model of Destinations Mobile Applications (Scolari and Fernández-Cavia 2014 adapted for for the Airport Surface Access on Airport Apps Findings and Originality/value: The Apps evaluated provided a very limited functionality to help passengers to plan and book their trips to/from the airports on public transports and gave high priority to parking information and services. Originality/value: Although Airport Surface Access has been a widely researched, the originality of this paper is the analysis of airport mobile Apps as a potential tool for airports to deal with the surface airport access problems.Access, Airports, Mobile Internet, Commercial Revenues

  16. Access Control Management for SCADA Systems

    Science.gov (United States)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  17. The Ambient Networks Heterogeneous Access Selection Architecture

    CERN Document Server

    Pentikousis, Kostas; Gebert, Jens; Galache, José Antonio; Blume, Oliver; Pääkkönen, Pekka

    2011-01-01

    Forthcoming wireless communications will be characterized by the ubiquity of multiaccess. Despite the inherently increased complexity, end-users should be able to take advantage of the most suitable access network. Thus, access selection in an environment with different overlapping radio technologies is of central interest and an architecture is needed that performs equally well on single- and multi-operator scenarios, considers several parameters, and respects the principle of layering. In this paper, we introduce the Ambient Networks heterogeneous access selection architecture explaining how it meets such requirements. We present the essential architectural components and explain their interactions. We illustrate how the proposed architecture works in practice and discuss recent results form our prototype-based validation.

  18. Open Access Data Sharing in Genomic Research

    Directory of Open Access Journals (Sweden)

    Stacey Pereira

    2014-08-01

    Full Text Available The current emphasis on broad sharing of human genomic data generated in research in order to maximize utility and public benefit is a significant legacy of the Human Genome Project. Concerns about privacy and discrimination have led to policy responses that restrict access to genomic data as the means for protecting research participants. Our research and experience show, however, that a considerable number of research participants agree to open access sharing of their genomic data when given the choice. General policies that limit access to all genomic data fail to respect the autonomy of these participants and, at the same time, unnecessarily limit the utility of the data. We advocate instead a more balanced approach that allows for individual choice and encourages informed decision making, while protecting against the misuse of genomic data through enhanced legislation.

  19. Accessible collaborative learning using mobile devices

    Directory of Open Access Journals (Sweden)

    Mike Wald

    2014-09-01

    Full Text Available This paper describes accessible collaborative learning using mobile devices with mobile enhancements to Synote, the freely available, award winning, open source, web based application that makes web hosted recordings easier to access, search, manage, and exploit for all learners, teachers and other users. Notes taken live during lectures using Twitter on any mobile device can be automatically uploaded into Synote and synchronised with a recording of the lecture. Syntalk, a mobile speech recognition application enables synchronized live verbal contributions from the class to also be captured on Synote through captions. Synote Mobile has been developed as an accessible cross device and cross browser HTML5 version of Synote. Synote Discussion supports commenting on Synote’s Synmark notes stored as discussions in its own database and published as Linked data so they are available for Synote or other systems to use.

  20. Research-based standards for accessible housing

    DEFF Research Database (Denmark)

    Helle, Tina; Iwarsson, Susanne; Brandt, Åse

    2010-01-01

    Since standards for accessible housing seldom are manifestly based on research and vary cross nationally, it is important to examine if there exists any scientific evidence, supporting these standards. Thus, one aim of this study was to review the literature in search of such scientific evidence....... Another aim was to explore the potential impact of different standards, in terms of prevalence of accessibility problems among groups of common older persons, characterized by their combinations of different functional limitations. Methods: Guided by the question: What research with the potential...... to inform research-based accessibility standards is available?, a descriptive literature review was conducted. The studies should be empirically based, published during 1990 to 2010, target adult persons, published in peer reviewed journals or, as architectural competitions, PhD-thesis or conference...

  1. Freeing up access to CERN technology

    CERN Multimedia

    Joannah Caborn Wengler

    2012-01-01

    In line with CERN’s principle of maximising the dissemination of knowledge to society, the Knowledge Transfer (KT) Group has launched a new collaborative initiative to share the products of CERN’s scientific and technological labours: Easy Access IP, where IP stands for intellectual property.   CERN has a whole portfolio of dissemination channels designed and implemented by the KT Group, with Easy Access IP being the latest addition. “Inspired by the UK’s Easy Access Innovation initiative, our scheme involves making some of CERN's technologies available royalty-free and through a more agile licensing process,” explains Giovanni Anelli, head of the Group. “This approach seems to be an appropriate model for CERN, where the ultimate goal of technology transfer is not to generate income but to transfer knowledge to external partners.” The new scheme, as the name suggests, is designed to make it easier for industry and othe...

  2. Observer Access to the Cherenkov Telescope Array

    CERN Document Server

    Knödlseder, Jürgen; Boisson, Catherine; Brau-Nogué, Sylvie; Deil, Christoph; Khélifi, Bruno; Mayer, Michael; Walter, Roland

    2015-01-01

    The Cherenkov Telescope Array (CTA), a ground-based facility for very-high-energy (VHE) gamma-ray astronomy, will operate as an open observatory, serving a wide scientific community to explore and to study the non-thermal universe. Open community access is a novelty in this domain, putting a challenge on the implementation of services that make VHE gamma-ray astronomy as accessible as any other waveband. We present here the design of the CTA Observer Access system that comprises support of scientific users, dissemination of data and software, tools for scientific analysis, and the system to submit observing proposals. We outline the scientific user workflows and provide the status of the current developments.

  3. Remote computer access through Android mobiles

    Directory of Open Access Journals (Sweden)

    Jaya Bharathi Chintalapati

    2012-09-01

    Full Text Available In this paper, we will present the process to access the computers with the help of android mobile phones. This process is based on VNC (virtual network computing technique. So to work on this, we must install VNC server on our computer connected with Wi-Fi network. The user can access and perform operation through the range of Wi-Fi platforms like Linux, Mac, windows etc. The image of the desktop is compressed before it is transmitted to the cellular phone. There are several functions provided so as to ease the viewing on cell-phones. There is shortcut function that can be used to quickly access the frequently used area. Current key assignments can be viewed using guidance function. A user can view two areas simultaneously using a twin view function. The prototype is already implemented using java and tested on a java based cellular phone.

  4. Accessing diabetes care in rural Uganda

    DEFF Research Database (Denmark)

    Nielsen, Jannie; Bahendeka, Silver K.; Bygbjerg, Ib Christian;

    2016-01-01

    Non-communicable diseases including type 2 diabetes (T2D) are increasing rapidly in most Sub-Saharan African (SSA) countries like Uganda. Little attention has been given to how patients with T2D try to achieve treatment when the availability of public health care for their disease is limited......, as is the case in most SSA countries. In this paper we focus on the landscape of availability of care and the therapeutic journeys of patients within that landscape. Based on fieldwork in south-western Uganda including 10 case studies, we explore the diabetes treatment options in the area and what it takes...... to access the available treatment. We analyse the resources patients need to use the available treatment options, and demonstrate that the patients’ journeys to access and maintain treatment are facilitated by the knowledge and support of their therapy management groups. Patients access treatment more...

  5. CALCEPH: Planetary ephemeris files access code

    Science.gov (United States)

    Gastineau, M.; Laskar, J.; Manche, H.; Fienga, A.

    2015-05-01

    CALCEPH accesses binary planetary ephemeris files, including INPOPxx, JPL DExxx ,and SPICE ephemeris files. It provides a C Application Programming Interface (API) and, optionally, a Fortran 77 or 2003 interface to be called by the application. Two groups of functions enable the access to the ephemeris files, single file access functions, provided to make transition easier from the JPL functions, such as PLEPH, to this library, and many ephemeris file at the same time. Although computers have different endianess (order in which integers are stored as bytes in computer memory), CALCEPH can handles the binary ephemeris files with any endianess by automatically swaps the bytes when it performs read operations on the ephemeris file.

  6. Monitoring Accessibility Services in Digital Television

    Directory of Open Access Journals (Sweden)

    Francisco Utray

    2012-01-01

    Full Text Available This paper addresses methodology and tools applied to the monitoring of accessibility services in digital television at a time when the principles of accessibility and design are being considered in all new audiovisual media communication services. The main objective of this research is to measure the quality and quantity of existing accessibility services offered by digital terrestrial television (DTT. The preliminary results, presented here, offer the development of a prototype for automatic monitoring and a methodology for obtaining quality measurements, along with the conclusions drawn by initial studies carried out in Spain. The recent approval of the UN Convention on the Rights of Persons with Disabilities gives special relevance to this research because it provides valuable guidelines to help set the priorities to improve services currently available to users.

  7. Internet Access from CERN GSM subscriptions

    CERN Multimedia

    IT Department

    2008-01-01

    The data service on GSM subscriptions has been improved, allowing CERN users to access the Internet directly. A CERN GSM subscription with data option now allows you to connect to the Internet from a mobile phone or a PC equipped with a GSM modem. The previous access (CERN intranet) still exists. To get access to the new service, you will find all the information on configurations at: http://cern.ch/gprs The use of this service on the Sunrise network is charged on a flat-rate basis (no extra charge related to the volume of downloaded data). Depending on your CERN subscription type (standard or master), you can also connect to foreign GSM data networks (roaming), but this is strongly discouraged, except where absolutely necessary, due to international roaming charges. Telecom Section, IT/CS

  8. Flexible And Secure Access To Computing Clusters

    Directory of Open Access Journals (Sweden)

    Jan Meizner

    2010-01-01

    Full Text Available The investigation presented in this paper was prompted by the need to provide a manageablesolution for secure access to computing clusters with a federated authentication framework.This requirement is especially important for scientists who need direct access to computingnodes in order to run their applications (e.g. chemical or medical simulations with proprietary,open-source or custom-developed software packages. Our existing software, whichenables non-Web clients to use Shibboleth-secured services, has been extended to providedirect SSH access to cluster nodes using the Linux Pluggable Authentication Modules mechanism.This allows Shibboleth users to run the required software on clusters. Validationand performance comparison with existing SSH authentication mechanisms confirm that thepresented tools satisfy the stated requirements.

  9. Quantum Game Theory and Open Access Publishing

    CERN Document Server

    Hanauske, M; Dugall, B; Bernius, Steffen; Dugall, Berndt; Hanauske, Matthias

    2006-01-01

    The digital revolution of the information age and in particular the sweeping changes of scientific communication brought about by computing and novel communication technology, potentiate global, high grade scientific information for free. The arXiv for example is the leading scientific communication platform, mainly for mathematics and physics, where everyone in the world has free access on. While in some scientific disciplines the open access way is successfully realized, other disciplines (e.g. humanities and social sciences) dwell on the traditional path, even though many scientists belonging to these communities approve the open access principle. In this paper we try to explain these different publication patterns by using a game theoretical approach. Based on the assumption, that the main goal of scientists is the maximization of their reputation, we model different possible game settings, namely a zero sum game, the prisoners' dilemma case and a version of the stag hunt game, that show the dilemma of sc...

  10. Assessment of access selection and transmit diversity in (non) cosited multi-access networks

    NARCIS (Netherlands)

    Litjens, R.; Berggren, F.

    2007-01-01

    Multi-access networks integrate a number of radio accesses (RAS) over which a data flow may be transmitted. Considering the possibility of multi-radio transmit diversity (MRTD), where a given flow may be assigned multiple RAS either in parallel or in a switched mode, we investigate mechanisms for jo

  11. Assessing Accessibility: How Accessible Are Online Courses for Students with Disabilities?

    Science.gov (United States)

    Massengale, Lindsey R.; Vasquez, Eleazar, III

    2016-01-01

    Delivering course material in a manner that is accessible to all students including those with disabilities is important in the online environment. This article presents an analysis focusing on the accessibility of six courses presented through the Webcourses platform. Six professors volunteered one course for analysis. The tool used for analyzing…

  12. Performance analysis of multichannel medium access control algorithms for opportunistic spectrum access

    NARCIS (Netherlands)

    Pawelczak, P.; Pollin, S.; So, H.-S.W.; Bahai, A.R.S.; Prasad, R.V.; Hekmat, R.

    2009-01-01

    In this paper, different control channel (CC) implementations for multichannel medium access control (MAC) algorithms are compared and analyzed in the context of opportunistic spectrum access (OSA) as a function of spectrum-sensing performance and licensed user activity. The analysis is based on a d

  13. Hybrid Lyot Coronagraph for the ACCESS Mission

    Science.gov (United States)

    Trauger, J.; ACCESS Science and Engineering Team

    2010-10-01

    We report the design and fabrication of hybrid focal-plane masks for Lyot coronagraphy, supported this year by NASA's Technology Demonstration for Exoplanet Missions (TDEM) program. These masks are composed of thickness-profiled metallic and dielectric thin films, and manufactured by vacuum deposition on a glass substrate. Hybrid masks are in principle band-limited in both the real and imaginary parts of the complex amplitude characteristics, providing the theoretical basis for mathematically perfect starlight suppression. Together with a deformable mirror for control of wavefront phase, these masks achieve contrast levels of 2e-10 at inner working angles of 3 lambda/D, over spectral bandwidths of 20% or more, and with throughput efficiencies of 60%. We evaluate the science potential of these coronagaph masks in the context of ACCESS, a representative exoplanet mission concept. ACCESS is one of four medium-class concepts studied in 2008-2009 under NASA's Astrophysics Strategic Mission Concepts Study program. In a nutshell, the ACCESS study seeks the most capable medium-class coronagraphic mission that is possible with high-readiness telescope, instrument, and spacecraft technologies available today. The ACCESS study compared the performance of four major coronagraph architectures. It defined a conceptual space observatory platform as the "level playing field" for comparisons among coronagraph types. And it used laboratory validation of the representative coronagraph types as a second "level playing field" for assessing coronagraph hardware readiness. ACCESS identifies a class of scientifically compelling mission concepts built upon mature (TRL6+) subsystem technologies, and evaluates science reach of a medium-class coronagraph mission. Using current high-TRL technologies, the ACCESS minimum science program surveys the nearest 120+ AFGK stars for exoplanet systems, and surveys the majority of those for exozodiacal dust to the level of 1 zodi at 3 AU. Discoveries are

  14. Ultrasound Evaluation Before and After Hemodialysis Access

    Directory of Open Access Journals (Sweden)

    Daryoush Saedi

    2009-01-01

    Full Text Available   "nThe basic concept of hemodialysis access is to make a route to the central circulation in CRF patients. Vascular access procedures and subsequent complications represent a major cause of morbidity, hospitalization and cost for hemodialysis patients. Native arteriovenous fistulas (AVFs are preferable to synthetic arteriovenous grafts because they are associated with a lower frequency of thrombosis and infection, as well as greater longevity. AVFs that are never usable and early graft failures are associated with the common problem of inadequate vessel (artery or vein selection. The surgeon’s preoperative physical examination is the primary basis for AVF versus graft selection. Only palpable veins are considered for construction of AVFs, and the more proximal draining venous anatomy is not known prior to the operation. Physical examination is the traditional surgical evaluation performed prior to hemodialysis access placement. Palpation and inspection are difficult in obese arms, and few patients have vessels that are visible throughout their entire course. Patients with end-stage renal disease have often had multiple venipunctures and numerous intravenous lines placed and thus have an increased likelihood of venous stenosis or occlusion. Central vein problems are difficult to detect at visual inspection. By colour Doppler analysis vessels can be assessed for size, stenosis, and occlusion. US mapping assists in surgical planning and is especially valuable in patients who are difficult surgical cases (eg, obesity, diabetes, history of prior access, elderly women.  "nThis lecture contains two separate sections: 1-Vascular mapping prior to access placement and 2-Fistula maturity by US evaluation. Ultrasonography (US is an excellent modality for hemodialysis access evaluation because it is  readily available, non-invasive and inexpensive. It avoids the risks associated with iodinated contrast material and ionizing radiation.   

  15. Performance estimates for personnel access control systems

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, R. G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems.

  16. Access Control in Data Management Systems

    CERN Document Server

    Ferrari, Elena

    2010-01-01

    Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary,

  17. Editorial: Making GIScience Research More Open Access

    CERN Document Server

    Jiang, Bin

    2013-01-01

    This is the editorial for the special issue on "data-intensive geospatial computing", which I guest edited with the International Journal of Geographical Information Science (Taylor & Francis). As remarked in the editorial, the special issue is particularly special in the sense that all source and data are published together with the published papers. This editorial elaborates on scholarly communication, with particular attention to publishing data alongside papers and the emergence of open access journals, in order to make our research more open access.

  18. TCP Performance Enhancement for UMTS Access Network

    DEFF Research Database (Denmark)

    Hu, Liang

    2008-01-01

    is between UMTS access network and Internet. The split proxy divides the bandwidth delay product into two parts, resulting in two TCP connections with smaller bandwidth delay products. Simulation results show, the split TCP proxy can significantly improve the TCP performance under high bit rate DCH channel......We aim at optimize the TCP performance over UMTS access network challenged by the large delay bandwidth product that is mainly caused by the latency from the link layer ARQ retransmissions and diversity technique at physical layer. We propose to place a split TCP proxy at GGSN nodes which...

  19. Access 2007 forms and reports for dummies

    CERN Document Server

    Underdahl, Brian

    2013-01-01

    Do you have tons and tons of data on your computer but you're not quite sure how to make heads or tails of them-or even organize them? Are you using Access as spreadsheet rather than what it was really meant for? If you have trouble finding meaning in your data, then Access 2007 Forms & Reports for Dummies let you discover the wonders of this highly useful program. This no-nonsense guide gets right down to business by showing you the easy way to use this powerful tool. It gets you started with selective, targeted queries; forms that improve efficiency; and reports that communicate-while sparin

  20. Database theory and SQL practice using Access

    International Nuclear Information System (INIS)

    This book introduces database theory and SQL practice using Access. It is comprised of seven chapters, which give description of understanding database with basic conception and DMBS, understanding relational database with examples of it, building database table and inputting data using access 2000, structured Query Language with introduction, management and making complex query using SQL, command for advanced SQL with understanding conception of join and virtual table, design on database for online bookstore with six steps and building of application with function, structure, component, understanding of the principle, operation and checking programming source for application menu.

  1. High Optical Access Trap 2.0.

    Energy Technology Data Exchange (ETDEWEB)

    Maunz, Peter Lukas Wilhelm [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-01-26

    The High Optical Access (HOA) trap was designed in collaboration with the Modular Universal Scalable Ion-trap Quantum Computer (MUSIQC) team, funded along with Sandia National Laboratories through IARPA's Multi Qubit Coherent Operations (MQCO) program. The design of version 1 of the HOA trap was completed in September 2012 and initial devices were completed and packaged in February 2013. The second version of the High Optical Access Trap (HOA-2) was completed in September 2014 and is available at IARPA's disposal.

  2. CytoJournal joins 'open access' philosophy

    Directory of Open Access Journals (Sweden)

    Shidham Vinod B

    2004-07-01

    Full Text Available Abstract Welcome to CytoJournal! We would like to introduce you to your journal, one that is run by and for the scientific cytopathology community with incontestable benefits of Open Access, and support from Cytopathology Foundation, Inc. http://www.cytopathology-foundation.org/index.htmlCytoJournal is a peer-reviewed, PubMed indexed, online journal, publishing research in the field of cytopathology and related areas, with world wide free access. Authors submitting to CytoJournal retain the copyright to their hard earned work.

  3. Starting an open access journal in Iceland

    OpenAIRE

    Watson, Ian

    2009-01-01

    To access full text version of this article. Please click on the hyperlink "View/Open" at the bottom of this page The Bifröst Journal of Social Science / Tímarit um félagsvísindi is one of Iceland’s first open access journals and the first to use Open Journal Systems software. This article summarizes lessons learned from the first three years of the journal’s operation, including issues connected to funding, staffing, peer review, printing, bibliographic formats, and the future of open acc...

  4. [Ultrasound-guided peripheral venous access].

    Science.gov (United States)

    Fuzier, Régis; Rougé, Pierre; Pierre, Sébastien

    2016-02-01

    International guidelines advocate the use of first-line ultrasound for central venous catheter, particularly for the internal jugular vein. The role of ultrasound in peripheral venous access remains questionable. In some specific situations, such as pediatrics, obesity and patients with poor venous network, problems to cannulate peripheral vein may occur. Success rate of peripheral intravenous access increases with the diameter of the vein and for a depth of the vein between 0.3 and 1.5 cm. The type of puncture (long-axis or short-axis) and the type of catheters have little influence on the success rate. Specific considerations have to be taken concerning infection control.

  5. Accessibility of GI for Public Participation

    DEFF Research Database (Denmark)

    Arleth, Mette; Campagna, Michele

    2005-01-01

    critical factors for success or failure of the applications. First part of the study therefore consists of a mapping of the level of accessibility of GI in the two countries as a comparative analysis. The focus of the mapping is mainly on the use of geographic information as support to citizens......The paper reports an ongoing comparative study on the accessibility of Geographic Information at public authorities’ websites in Denmark and Italy. The purpose of the study is twofold; to give an idea of the latest development and diffusion of GI on public authorities websites, and to identify...

  6. The Right of Access to Court

    OpenAIRE

    Sokol Mëngjesi; Klodjan Skënderaj

    2015-01-01

    Every person has the right to address the court in order to protect his legal rights, freedom and interests. Access to justice is an important aspect of due process, the absence of which makes inexistent the discussion for respecting the principle of due legal process. Access to the court is a right guaranteed by the Constitution, international acts and is specifically interpreted by the European Court of Human Rights.The right to address the court is not an absolute right. This right can be ...

  7. Validation of Housing Standards Addressing Accessibility

    DEFF Research Database (Denmark)

    Helle, Tina

    2013-01-01

    no mobility device (n = 10) or who used a wheelchair (n = 10) or a rollator (n = 10). The setting was a kitchen designed according to present housing standards. The participants prepared lunch in the kitchen. Accessibility problems were assessed by observation and self-report. Differences between the three...... participant groups were examined. Performing well-known kitchen activities was associated with accessibility problems for all three participant groups, in particular those using a wheelchair. The overall validity of the housing standards examined was poor. Observing older people interacting with realistic...

  8. Streaming movies, media, and instant access

    CERN Document Server

    Dixon, Wheeler Winston

    2013-01-01

    Film stocks are vanishing, but the iconic images of the silver screen remain -- albeit in new, sleeker formats. Today, viewers can instantly stream movies on televisions, computers, and smartphones. Gone are the days when films could only be seen in theaters or rented at video stores: movies are now accessible at the click of a button, and there are no reels, tapes, or discs to store. Any film or show worth keeping may be collected in the virtual cloud and accessed at will through services like Netflix, Hulu, and Amazon Instant.The movies have changed, and we are changing with them.

  9. Bibliography on open access in Latin America and the Caribbean

    OpenAIRE

    Babini, Dominique

    2012-01-01

    Bibliography on open access in Latin America and the Caribbean. Selection mainly based on open access publications describing open access initiatives in Latin America and the Caribbean. Prepared for UNESCO-Latin America and the Caribbean Section of the UNESCO-GOAP Global Open Access Portal.

  10. Information, communication, travel behaviour and accessibility.

    NARCIS (Netherlands)

    Wee, van B.; Chorus, C.; Geurs, K.T.

    2013-01-01

    Over the past two decades many papers have been published on the impact of Information and Communication Technologies (ICT) on travel behavior, but the literature focusing on the impact of ICT on accessibility is relatively scarce. In this paper we give an overview of the impact of ICT on four compo

  11. Compulsory licensing and access to drugs.

    Science.gov (United States)

    Stavropoulou, Charitini; Valletti, Tommaso

    2015-01-01

    Compulsory licensing allows the use of a patented invention without the owner's consent, with the aim of improving access to essential drugs. The pharmaceutical sector argues that, if broadly used, it can be detrimental to innovation. We model the interaction between a company in the North that holds the patent for a certain drug and a government in the South that needs to purchase it. We show that both access to drugs and pharmaceutical innovation depend largely on the Southern country's ability to manufacture a generic version. If the manufacturing cost is too high, compulsory licensing is not exercised. As the cost decreases, it becomes a credible threat forcing prices down, but reducing both access and innovation. When the cost is low enough, the South produces its own generic version and access reaches its highest value, despite a reduction in innovation. The global welfare analysis shows that the overall impact of compulsory licensing can be positive, even when accounting for its impact on innovation. We also consider the interaction between compulsory licensing and the strength of intellectual property rights, which can have global repercussions in other markets beyond the South. PMID:24408475

  12. Patents and access to essential drugs.

    Science.gov (United States)

    Loff, Bebe

    2003-01-01

    This paper provides a brief overview of historical developments in patent law including its recent incorporation into world trade law. The impact of patents on access to essential drugs will be discussed. The relationship between intellectual property rights and the right to health will be considered. PMID:12886793

  13. Technology Adoption: Influence of Availability and Accessibility

    Science.gov (United States)

    McConnell, William Stewart

    2009-01-01

    Farmers are small business leaders using available technology to remain competitive. The availability of technology is dependent on the suppliers' use of the marketing mix 4Ps theory--product, price, placement, and promotion. The purpose of this study was to determine how the relation between availability and accessibility influences the adoption…

  14. The economics of the limited access order

    NARCIS (Netherlands)

    van Besouw, Bram; Ansink, Erik; van Bavel, Bas

    2015-01-01

    Violence and coercion are key to understanding economic and social interactions in any society. This premise was used by North et al. (2009) to distinguish three `patterns of social organization' that societies have used to solve the problem of violence. We model one of these, the `limited access or

  15. Research Grants Program Office Open Access Policy

    OpenAIRE

    Research Grant Program Office (RGPO)

    2014-01-01

    This is the Open Access Policy for all research funded through the Research Grants Program Office in the University of California Office of the President. Specifically, it applies to all research funded through UC Research Initiatives (UCRI), the California Breast Cancer Prevention Program (CBCRP), the Tobacco-Related Disease Research Program (TRDRP), and the California HIV/AIDS Research Program (CHRP).  

  16. Role-based access control in retrospect

    NARCIS (Netherlands)

    Franqueira, Virginia N.L.; Wieringa, Roel

    2012-01-01

    Role-Based Access Control (RBAC) has been a success in terms of the amount of research that went into it, its uptake in international standards, and its adoption by major software vendors. Yet, RBAC remains complex to implement in user organizations. In this paper we review the state of the art of R

  17. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  18. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  19. Evaluating Web accessibility at different processing phases

    Science.gov (United States)

    Fernandes, N.; Lopes, R.; Carriço, L.

    2012-09-01

    Modern Web sites use several techniques (e.g. DOM manipulation) that allow for the injection of new content into their Web pages (e.g. AJAX), as well as manipulation of the HTML DOM tree. This has the consequence that the Web pages that are presented to users (i.e. after browser processing) are different from the original structure and content that is transmitted through HTTP communication (i.e. after browser processing). This poses a series of challenges for Web accessibility evaluation, especially on automated evaluation software. This article details an experimental study designed to understand the differences posed by accessibility evaluation after Web browser processing. We implemented a Javascript-based evaluator, QualWeb, that can perform WCAG 2.0 based accessibility evaluations in the two phases of browser processing. Our study shows that, in fact, there are considerable differences between the HTML DOM trees in both phases, which have the consequence of having distinct evaluation results. We discuss the impact of these results in the light of the potential problems that these differences can pose to designers and developers that use accessibility evaluators that function before browser processing.

  20. Making Archival and Special Collections More Accessible

    Science.gov (United States)

    Renspie, Melissa, Comp.; Shepard, Linda, Comp.; Childress, Eric, Comp.

    2015-01-01

    Revealing hidden assets stewarded by research institutions so they can be made available for research and learning locally and globally is a prime opportunity for libraries to create and deliver new value. "Making Archival and Special Collections More Accessible" collects important work OCLC Research has done to help achieve the…

  1. Troubling Clarity: The Politics of Accessible Language.

    Science.gov (United States)

    Lather, Patti

    1996-01-01

    Using feminist and postmodern theories, argues that transparent or "accessible" language is not innocent, but is part of a discourse of power. Reflects on an experimental approach to writing about research that results in a multiply coded, multivoiced text that speaks to multiple audiences. (SK)

  2. Quantum game theory and open access publishing

    Science.gov (United States)

    Hanauske, Matthias; Bernius, Steffen; Dugall, Berndt

    2007-08-01

    The digital revolution of the information age and in particular the sweeping changes of scientific communication brought about by computing and novel communication technology, potentiate global, high grade scientific information for free. The arXiv, for example, is the leading scientific communication platform, mainly for mathematics and physics, where everyone in the world has free access on. While in some scientific disciplines the open access way is successfully realized, other disciplines (e.g. humanities and social sciences) dwell on the traditional path, even though many scientists belonging to these communities approve the open access principle. In this paper we try to explain these different publication patterns by using a game theoretical approach. Based on the assumption, that the main goal of scientists is the maximization of their reputation, we model different possible game settings, namely a zero sum game, the prisoners’ dilemma case and a version of the stag hunt game, that show the dilemma of scientists belonging to “non-open access communities”. From an individual perspective, they have no incentive to deviate from the Nash equilibrium of traditional publishing. By extending the model using the quantum game theory approach it can be shown, that if the strength of entanglement exceeds a certain value, the scientists will overcome the dilemma and terminate to publish only traditionally in all three settings.

  3. Access to Effective Teaching for Disadvantaged Students.

    OpenAIRE

    Eric Isenberg; Jeffrey Max; Philip Gleason; Liz Potamites; Robert Santillano; Heinrich Hock; Michael Hansen

    2013-01-01

    This study explores the disparity in access to effective teachers in 29 school districts across the country, revealing that disadvantaged students receive poorer-quality instruction, on average, compared with other students. Mathematica conducted the studies for the Institute of Education Sciences.

  4. Access to Medicines : Common problems, common solutions?

    NARCIS (Netherlands)

    Stephens, P.N.

    2015-01-01

    This thesis investigates four cross-cutting controversies in access to medicines – aspects of pharmaceutical R&D, equity, generics policy and scale up. Chapter 2 describes the state of pharmaceutical research and development (R&D). It finds that failure rates remain high with the probability of mark

  5. File access prediction using neural networks.

    Science.gov (United States)

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.

  6. Direct access : Lessons learnt from the Netherlands

    NARCIS (Netherlands)

    Northcott, A.; Brocklehurst, P.; Jerkovic-Cosic, K.; Reinders, J. J.; McDermott, I.; Tickle, M.

    2013-01-01

    Objective To use a qualitative approach to examine the perceptions of policy makers, general dental practitioners, dental hygienists, dental students and dental hygiene students in the Netherlands following the introduction of a direct access policy in 2006. Methods Semi-structured interviews and fo

  7. Improving Open Access through Prior Learning Assessment

    Science.gov (United States)

    Yin, Shuangxu; Kawachi, Paul

    2013-01-01

    This paper explores and presents new data on how to improve open access in distance education through using prior learning assessments. Broadly there are three types of prior learning assessment (PLAR): Type-1 for prospective students to be allowed to register for a course; Type-2 for current students to avoid duplicating work-load to gain…

  8. Moving beyond the Amalgam: Restructuring Access Services

    Science.gov (United States)

    Austin, Brice

    2010-01-01

    At least since the early 1990s, academic libraries have been merging Circulation and various other related functions into a single department typically labeled "Access Services." In many cases, however, that merger has proven to be administrative rather than functional, with minimal integration of common workflows. This article describes a…

  9. Village Green Project: Web-accessible Database

    Science.gov (United States)

    The purpose of this web-accessible database is for the public to be able to view instantaneous readings from a solar-powered air monitoring station located in a public location (prototype pilot test is outside of a library in Durham County, NC). The data are wirelessly transmitte...

  10. Access to Finance for Smallholder Farmers

    OpenAIRE

    International Finance Corporation

    2014-01-01

    The percentage of smallholders with access to finance is equally difficult to quantify. According to estimates, even promising approaches to expanding smallholder lending, such as value chain finance, are reaching fewer than 10 percent of smallholders, primarily those in well-established value chains dedicated to higher value cash crops. International Finance Corporation (IFC) has been eng...

  11. Discussing the logsum as an accessibility indicator

    NARCIS (Netherlands)

    Geurs, Karst; Wee, van Bert; Rietveld, Piet

    2013-01-01

    In recent years the so called Logsum as an accessibility measure increasingly received attention. The advantages of the logsum measure (LM) are discussed in literature, but to the best of our knowledge no systematic discussions on limitations exist. The fist aim of this paper is to fill this gap. Ou

  12. Access and Indigency: Lessons from Morristown.

    Science.gov (United States)

    Conable, Gordon M.

    1992-01-01

    Discussion of the present deterioration in public services focuses on indigent and homeless library patrons and the Kreimer v. Morristown litigation. Issues of access and intellectual freedom are addressed, First Amendment rights are discussed, and implications of this case for libraries' roles as public forums are examined. (five references) (LRW)

  13. Sociocritical Matters: Migrant Students' College Access

    Science.gov (United States)

    Núñez, Anne-Marie; Gildersleeve, Ryan Evely

    2016-01-01

    Migrant students face many educational, economic, social, and cultural challenges to college access. Anti-bilingual, anti-affirmative action, and anti-immigrant policies also constrain their postsecondary pathways. With these issues in mind, this article draws on quantitative and qualitative research to examine the influence of a residential…

  14. Optical access: networks and components (overview)

    Science.gov (United States)

    Mynbaev, Djafar K.

    2004-09-01

    The exponential gtowth of traffic delivered to an individual customer both for business and personal needs puts tremendous pressure on the telecommunications networks. Because the development of the long-haul and metro networks has advanced rapidly and their capacity much eceeds demand, tremendous pressure now falls in the local networks to provide customers with access to the global telecom infrastructure. Building a broadband access network enabling fast delivery of high-volume traffic is the current task of network operators. A brief review of broadband access networks brings us to the conclusion that only wired optical networks can serve as an immediate and future solution to the "last-mile" problem. After discussin goptical access network classification, we focus mainly on passive optical networks (PON) because PON is a major technology today. From the network standpoint, we discuss the principle of PON operation, architectures, topologies, protocols and standards, design issues, and network management and services. We also discuss the main problems with PON and the use of WDM technology. From the hardware standpoint, we consider both active and passive components. We analyze the structure and elements of these components, including their technical characteristics.

  15. A Solution to Optimizing Access Networks

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    This article describes the present situation of Access Networks (AN), enumerates a few problems in the development of AN, and brings forward an optimizing solution to AN; then describes its architecture, indicates the applied the characteristics and prospect of the concentrated monitoring and managing systems in the AN based on the CORBA architecture.

  16. Satcom access in the evolved packet core

    NARCIS (Netherlands)

    Cano, M.D.; Norp, A.H.J.; Popova, M.P.

    2012-01-01

    Satellite communications (Satcom) networks are increasingly integrating with terrestrial communications networks, namely Next Generation Networks (NGN). In the area of NGN the Evolved Packet Core (EPC) is a new network architecture that can support multiple access technologies. When Satcom is consid

  17. Web Design for Accessibility: Policies and Practice.

    Science.gov (United States)

    Foley, Alan; Regan, Bob

    2002-01-01

    Discusses Web design for people with disabilities and outlines a process-based approach to accessibility policy implementation. Topics include legal mandates; determining which standards apply to a given organization; validation, or evaluation of the site; site architecture; navigation; and organizational needs. (Author/LRW)

  18. CERN Confirms commitment to Open Access

    CERN Multimedia

    2005-01-01

    The CERN Library Information desk.At a meeting on the Wednesday before Easter, the Executive Committee endorsed a policy of open access to all the laboratory's results, as expressed in the document ‘Continuing CERN action on Open Access' (http://cds.cern.ch/record/828991/files/open-2005-006.pdf), released by its Scientific Information Policy Board (SIPB) earlier in the month. "This underlines CERN's commitment to sharing the excitement of fundamental research with as wide an audience as possible", said Guido Altarelli, current SIPB chairman. Open Access to scientific knowledge is today the goal of an increasing component of the worldwide scientific community. It is a concept, made possible by new electronic tools, which would bring enormous benefits to all readers by giving them free access to research results. CERN has implicitly supported such moves from its very beginning. Its Convention (http://cds.cern.ch/record/330625/files/cm-p00046871.pdf), adopted in 1953, requires openness, stipulating that "......

  19. Performance Analysis of VPN Remote Access Tunnels

    Directory of Open Access Journals (Sweden)

    Dymora Paweł

    2014-09-01

    Full Text Available The purpose of the study is to analyze the efficiency of communication with the server using the methods of secure remote access, as well as checking and comparing the quality of services provided by the server depending on the method of secure remote connection. The article focuses on VPN technology implemented in the latest Windows Server 2012 R2 operating system.

  20. Multilevel Access to our Cultural Heritage (MACH)

    NARCIS (Netherlands)

    Broek, van den Egon L.; Kok, Thijs; Kersen, van J.

    2005-01-01

    Most search engines utilize keywords to retrieve information (e.g., Google). However, when one accesses a specific domain such as art and is a layperson in this field, how to retrieve information? Without the knowledge of artist's name, the period he lived in, the art movement he was affiliated with

  1. Il quadrants for information access technology

    NARCIS (Netherlands)

    Olthof, W.; Willems, J.

    2008-01-01

    Information Access Technology is used for indexing and classifying information so it canbe stored and retrieved in a supported way. Information Logistics needs this technology in order to support the knowledge worker with the right information without him having to spend a lot of time searching for

  2. Direct data access protocols benchmarking on DPM

    Science.gov (United States)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Mancinelli, Valentina

    2015-12-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring information about any data access protocol to the same monitoring infrastructure that is used to monitor the Xrootd deployments. Our goal is to evaluate under which circumstances the HTTP-based protocols can be good enough for batch or interactive data access. In this contribution we show and discuss the results that our test systems have collected under the circumstances that include ROOT analyses using TTreeCache and stress tests on the metadata performance.

  3. Screening Capsicum accessions for capsaicinoids content.

    Science.gov (United States)

    Antonious, George F; Jarret, Robert L

    2006-01-01

    Ninety Capsicum accessions selected from the USDA Capsicum germplasm collection were screened for their capsaicinoids content using gas hromatography with nitrogen phosphorus detection (GC/NPD). Fresh fruits of Capsicum chinense, C. frutescens, C. baccatum, C. annuum, and C. pubescens were extracted with methanol and analyzed for capsaicin, dihydrocapsaicin, and nordihydrocapsaicin. Mass spectrometry of the fruit crude extracts indicated that the molecular ions at m/z 305, 307, and 293, which correspond to capsaicin, dihydrocapsaicin, and nordihydrocapsaicin, respectively, have a common benzyl cation fragment at m/z 137 that can be used for monitoring capsaicinoids in pepper fruit extracts. Capsaicin and dihydrocapsaicin were the dominant capsaicinoids detected. Capsaicin concentrations were typically greater than dihydrocapsaicin. Concentrations of total capsaicinoids varied from not detectable to 11.2 mg fruit(-1). Statistical analysis revealed that accession PI-441624 (C. chinense) had the highest capsaicin content (2.9 mg g(-1) fresh fruit) and accession PI-497984 (C. frutescens) had the highest dihydrocapsaicin content (2.3 mg g(-1) fresh fruit). Genebank accessions PI-439522 (C. frutescens) and PI-497984 contained the highest concentrations of total capsaicinoids. PMID:16785178

  4. Continuing CERN action on Open Access

    OpenAIRE

    Altarelli, Guido

    2005-01-01

    Open Access (OA) is an idea that would change the publishing landscape to bring benefits to all readers and authors. New publishing models based on electronic dissemination and OA are emerging. Active measures taken by CERN at this time could have an important impact on the wider adoption of OA principles.

  5. Public sector information access policies in Europe

    NARCIS (Netherlands)

    Welle Donker, F.M.

    2010-01-01

    In the digital age geo-information has become embedded in our daily lives, such as navigation systems, community platforms, real estate information and weather forecasts. Everybody uses geo-information for their day-to-day decision making. Therefore, access to geo-information is of vital importance

  6. Making Your Website More Accessible. Tips

    Science.gov (United States)

    Arnone, Marilyn

    2007-01-01

    Employing Universal Design for Learning (UDL) principles, such as multiple means of representation (of content), multiple means of engagement (motivation) and multiple means of expression (sharing the results of research, for example), will put one on the right path toward increasing accessibility for all learners. In this article, the author…

  7. Relationship between Learning Outcomes and Online Accesses

    Science.gov (United States)

    Suanpang, Pannee; Petocz, Peter; Reid, Anna

    2004-01-01

    This paper reports on a study carried out in Thailand investigating the relationship between students' use of an e-learning system and their learning outcomes in a course on Business Statistics. The results show a clear relationship between accesses to the e-learning system, as measured by number of "hits", and outcomes, as measured by final…

  8. Direct Access to Working Memory Contents

    NARCIS (Netherlands)

    Bialkova, S.E.; Oberauer, K.

    2010-01-01

    Abstract. In two experiments participants held in working memory (WM) three digits in three different colors, and updated individual digits with the results of arithmetic equations presented in one of the colors. In the memory-access condition, a digit from WM had to be used as the first number in t

  9. Optimizing the next generation optical access networks

    DEFF Research Database (Denmark)

    Amaya Fernández, Ferney Orlando; Soto, Ana Cardenas; Tafur Monroy, Idelfonso

    2009-01-01

    Several issues in the design and optimization of the next generation optical access network (NG-OAN) are presented. The noise, the distortion and the fiber optic nonlinearities are considered to optimize the video distribution link in a passive optical network (PON). A discussion of the effect of...

  10. Atom-Role-Based Access Control Model

    Science.gov (United States)

    Cai, Weihong; Huang, Richeng; Hou, Xiaoli; Wei, Gang; Xiao, Shui; Chen, Yindong

    Role-based access control (RBAC) model has been widely recognized as an efficient access control model and becomes a hot research topic of information security at present. However, in the large-scale enterprise application environments, the traditional RBAC model based on the role hierarchy has the following deficiencies: Firstly, it is unable to reflect the role relationships in complicated cases effectively, which does not accord with practical applications. Secondly, the senior role unconditionally inherits all permissions of the junior role, thus if a user is under the supervisor role, he may accumulate all permissions, and this easily causes the abuse of permission and violates the least privilege principle, which is one of the main security principles. To deal with these problems, we, after analyzing permission types and role relationships, proposed the concept of atom role and built an atom-role-based access control model, called ATRBAC, by dividing the permission set of each regular role based on inheritance path relationships. Through the application-specific analysis, this model can well meet the access control requirements.

  11. 77 FR 26149 - Access Authorization Fees

    Science.gov (United States)

    2012-05-03

    ....S.C. 2214). Federal Register Citation: October 10, 2003; 68 FR 58792, 58800. 0 2. In Sec. 11.15: 0 i...). Federal Register Citation: November 30, 2010; 75 FR 73935, 73941. 0 4. In Sec. 25.17: 0 i. Add paragraph... Program (MAAP) and the Information Access Authority Program (IAAP). The amended cost is due to an...

  12. 77 FR 37553 - Access Authorization Fees

    Science.gov (United States)

    2012-06-22

    ... Program (MAAP) and the Information Access Authority Program (IAAP). DATES: The effective date for the direct final rule published in the Federal Register on May 3, 2012 (77 FR 26149) is confirmed as June 22...: On May 3, 2012 (77 FR 26149), the NRC published a direct final rule amending its regulations at...

  13. Heterogeneity in the WTP for recreational access

    DEFF Research Database (Denmark)

    Campbell, Danny; Vedel, Suzanne Elizabeth; Thorsen, Bo Jellesmark;

    2014-01-01

    In this study we have addressed appropriate modelling of heterogeneity in willingness to pay (WTP) for environmental goods, and have demonstrated its importance using a case of forest access in Denmark. We compared WTP distributions for four models: (1) a multinomial logit model, (2) a mixed logi...

  14. Predictive access control for distributed computation

    DEFF Research Database (Denmark)

    Yang, Fan; Hankin, Chris; Nielson, Flemming;

    2013-01-01

    We show how to use aspect-oriented programming to separate security and trust issues from the logical design of mobile, distributed systems. The main challenge is how to enforce various types of security policies, in particular predictive access control policies — policies based on the future...

  15. Research Investigation of Information Access Methods

    Science.gov (United States)

    Heinrichs, John H.; Sharkey, Thomas W.; Lim, Jeen-Su

    2006-01-01

    This study investigates the satisfaction of library users at Wayne State University who utilize alternative information access methods. The LibQUAL+[TM] desired and perceived that satisfaction ratings are used to determine the user's "superiority gap." By focusing limited library resources to address "superiority gap" issues identified by each…

  16. Sign Compute Resolve for Random Access

    DEFF Research Database (Denmark)

    Goseling, Jasper; Stefanovic, Cedomir; Popovski, Petar

    2014-01-01

    We present an approach to random access that is based on three elements: physical-layer network coding, signature codes and tree splitting. Upon occurrence of a collision, physical-layer network coding enables the receiver to decode the sum of the information that was transmitted by the individua...

  17. Trial access to Cambridge University Press ebooks

    CERN Multimedia

    CERN Library

    2011-01-01

    From 1 August till 31 October, CERN users are invited to enjoy a trial access to all Cambridge University Press electronic books: http://ebooks.cambridge.org/. Please don't hesitate to send feedback to library.desk@cern.ch.

  18. PUBLIC ACCESS TO PRIVATE LAND IN SCOTLAND

    Directory of Open Access Journals (Sweden)

    David L Carey Miller

    2012-08-01

    Full Text Available This article attempts to understand the radical reform of Scottish land law in its provision for a general right of public access to private land introduced in 2003 as part of land reform legislation, an important aspect of the initial agenda of the Scottish Parliament revived in 1999. The right is to recreational access for a limited period and the right to cross land. Access can be taken only on foot or by horse or bicycle. As a starting point clarification of the misunderstood pre-reform position is attempted. The essential point is that Scots common law does not give civil damages for a simple act of trespass (as English law does but only a right to obtain removal of the trespasser. Under the reforms the longstanding Scottish position of landowners allowing walkers access to the hills and mountains becomes a legal right. A critical aspect of the new right is that it is one of responsible access; provided a landowner co-operates with the spirit and system of the Act access can be denied on the basis that it is not being exercised responsibly. But the onus is on the landowner to show that the exercise of the right is not responsible.Although the right applies to all land a general exception protects the privacy of a domestic dwelling. Early case law suggests that the scope of this limit depends upon particular circumstances although reasonable 'garden ground' is likely to be protected. There are various particular limits such as school land.Compliance with the protection of property under the European Convention on Human Rights is discussed. The article emphasises the latitude, open to nations, for limitations to the right of ownership in land in the public interest. The extent of the Scottish access inroad illustrates this. This leads to the conclusion that 'land governance' – the subject of the Potchefstroom Conference at which the paper was initially presented – largely remains a matter for domestic law; the lex situs concept is alive

  19. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  20. No access to LHC from 7 to 13 January 2008

    CERN Multimedia

    ST Department

    2007-01-01

    From 7 to 13 January 2008, tests of the LHC access system will be carried out to validate its role in the operational safety of the LHC. During this period, no access will be permitted to the controlled zones of LHC: service zones, experimental areas and tunnels. Access to the machine shafts and the tunnels will only be possible for emergency interventions coordinated with the CCC operators or for fire brigade interventions. The biometric access card integrated with the dosimeter, as issued by Bldg. 55, must be used to access these areas during this period. Access to the experimental caverns will be managed by the respective technical coordinator. After the tests, the access system will be restored to installation mode, i.e. access will again be possible using the CERN access cards for authorised personnel. Please communicate this information to your contractors. Thank you in advance for your comprehension and collaboration. Pierre Ninin - "LHC Access" project leader

  1. Notified Access: Extending Remote Memory Access Programming Models for Producer-Consumer Synchronization

    KAUST Repository

    Belli, Roberto

    2015-05-01

    Remote Memory Access (RMA) programming enables direct access to low-level hardware features to achieve high performance for distributed-memory programs. However, the design of RMA programming schemes focuses on the memory access and less on the synchronization. For example, in contemporary RMA programming systems, the widely used producer-consumer pattern can only be implemented inefficiently, incurring in an overhead of an additional round-trip message. We propose Notified Access, a scheme where the target process of an access can receive a completion notification. This scheme enables direct and efficient synchronization with a minimum number of messages. We implement our scheme in an open source MPI-3 RMA library and demonstrate lower overheads (two cache misses) than other point-to-point synchronization mechanisms for each notification. We also evaluate our implementation on three real-world benchmarks, a stencil computation, a tree computation, and a Colicky factorization implemented with tasks. Our scheme always performs better than traditional message passing and other existing RMA synchronization schemes, providing up to 50% speedup on small messages. Our analysis shows that Notified Access is a valuable primitive for any RMA system. Furthermore, we provide guidance for the design of low-level network interfaces to support Notified Access efficiently.

  2. Speed control system for an access gate

    Science.gov (United States)

    Bzorgi, Fariborz M.

    2012-03-20

    An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

  3. External access to ALICE controls conditions data

    Science.gov (United States)

    Jadlovský, J.; Jadlovská, A.; Sarnovský, J.; Jajčišin, Š.; Čopík, M.; Jadlovská, S.; Papcun, P.; Bielek, R.; Čerkala, J.; Kopčík, M.; Chochula, P.; Augustinus, A.

    2014-06-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead - users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data - an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  4. OpenAPC. Open-Access-Publikationskosten als Open Data

    OpenAIRE

    Tullney, Marco

    2015-01-01

    Präsentationsfolien zum Vortrag „OpenAPC. Open-Access-Publikationskosten als Open Data“ in der Session „Ausgestaltung eines wissenschaftsadäquaten APC-Marktes: Grundsätze, Finanzierungsansätze und Management“ der Open-Access-Tage 2015 in Zürich (https://www.open-access.net/community/open-access-tage/open-access-tage-2015-zuerich/programm/#c1974)

  5. Potential Accessibility of Web-based mathematical information resources

    OpenAIRE

    Centelles Velilla, Miquel; Ribera, Mireia; Rodríguez Santiago, Inmaculada

    2014-01-01

    This paper presents a research concerning the conversion of non-accessible web pages containing mathematical formulae into accessible versions through an OCR (Optical Character Recognition) tool. The objective of this research is twofold. First, to establish criteria for evaluating the potential accessibility of mathematical web sites, i.e. the feasibility of converting non-accessible (non-MathML) math sites into accessible ones (Math-ML). Second, to propose a data model and a mechanism to pu...

  6. Accessibility, land use and transport. Accessibility evaluation of land-use and transport developments and policy strategies

    NARCIS (Netherlands)

    Geurs, Karst Teunis

    2006-01-01

    How can accessibility be defined? How useful are different accessibility approaches in evaluating land-use and transport policy strategies? How can the economic benefits associated with accessibility changes be measured? What are the accessibility benefits of having a public transport service availa

  7. Access granted! barriers endure: determinants of difficulties accessing specialist care when required in Ontario, Canada

    OpenAIRE

    Harrington, Daniel W.; Wilson, Kathi; Rosenberg, Mark; Bell, Scott

    2013-01-01

    Background In the Canadian context, health care services are governed by the Canada Health Act, which ensures that primary care doctors, specialists, hospitals and dental surgeries are covered through provincial health insurance plans. This ensures access to medically necessary health care services for all Canadians regardless of ability to pay. Despite this important piece of legislation, research has shown persistent inequalities in access between and within socio-demographic groups, and ge...

  8. Housing Accessibility Methodology Targeting Older People

    DEFF Research Database (Denmark)

    Helle, Tina

    Older people have more functional limitations than younger people and they form a segment of the population that is more dependent on mobility devices than other age groups. Since they spend most of their time at home, their dwelling is an important environmental arena for performing everyday...... research, practice and policy in a global context for the benefit of the health and well-being of older people with functional limitations. Moreover, the results provide new knowledge and invite reflections on central concepts and methodology relevant to psychometrics and research on person-environment fit....... activities. Barriers in the environment can limit or hinder activity performance. Therefore, older people are sensitive to the accessibility of the environment. To ensure housing accessibility, it is critical that professionals are provided with valid and reliable assessment instruments to identify...

  9. National Radiobiology Archives distributed access programmer's guide

    International Nuclear Information System (INIS)

    The National Radiobiology Archives is a comprehensive effort to gather, organize, and catalog original data, representative specimens, and supporting materials related to significant radiobiology studies. This provides researchers with information for analyses which compare or combine results of these and other studies and with materials for analysis by advanced molecular biology techniques. This Programmer's Guide document describes the database access software, NRADEMO, and the subset loading script NRADEMO/MAINT/MAINTAIN, which comprise the National Laboratory Archives Distributed Access Package. The guide is intended for use by an experienced database management specialist. It contains information about the physical and logical organization of the software and data files. It also contains printouts of all the scripts and associated batch processing files. It is part of a suite of documents published by the National Radiobiology Archives

  10. Training and certification in dialysis access.

    Science.gov (United States)

    Ross, John; Dolmatch, Bart; Gallichio, Michael; Gallieni, Maurizio; Slakey, Douglas; Vesely, Tom; Davidson, Ingemar

    2014-10-01

    Decreasing and eliminating the gaps in knowledge, skills, and effective communication are the mainstays for a successful dialysis access training program curriculum and at the core of the human factors training philosophy. Many of these skills can be learned in the simulation environment. Education and training will reduce gaps in knowledge and technical skills, before exposing patients to procedure-related risk. For dialysis access, a reliable workplace environment depends upon a culture where safety and accountability are balanced to recognize the human contribution to success or failure in the complex care of patients with end-stage renal disease. Rigorous testing and certification adds value to the participants and validates the training program. PMID:25362979

  11. The equal accessibility to patient complaint measures

    DEFF Research Database (Denmark)

    Birkeland, Søren

    the actual complaint pattern a review was conducted on a 1-year General Practice care complaint sample (2007). Data were extracted on patient gender, age, and affiliation with labor market (if available). Interpreter use or family name presence on the Family Government Agency’s list of foreign names was used......The equal accessibility to patient complaint measures – a Danish perspective Like the Danish Healthcare Act (Para 2) basically prescribes a right to easy, equal access to healthcare, a Complaint Act (Para 2) entitles patients to file a complaint (about health professional conduct, informed consent...... as the only available proxy for foreign extraction. Among the 428 patient complaints, patient gender distribution was 248 females and 180 males. Ages were 0-14 years: 42; 15-40 years 133; 41-64 years: 172; 65- years: 81. 171 patients were outside labor force; 127 were employed and self-employed; 130 were...

  12. A Review of Packet Reservation Multiple Access

    Directory of Open Access Journals (Sweden)

    Varsha Sharma

    2011-05-01

    Full Text Available The rapid technological advances and innovations of the past few decades have pushed wireless communication from concept to reality. The popularity of wireless communication systems can be seen almost everywhere in the form of cellular networks, WLANs, and WPANs. Packet-switched technology has been demonstrated as effective in cellular radio systems with short propagation delay, not only for data, but also for voice transmission. In fact, packet voice can efficiently exploit speech on-off activity to improve bandwidth utilization over time division multiple access (TDMA. Such an approach has been first suggested in the packet reservation multiple-access (PRMA technique, an adaptation of the reservation ALOHA protocol to the cellular environment. PRMA can be viewed as a combination of TDMA and slotted ALOHA protocols. Recently modified versions of the PRMA protocol have been the subject of extensive research. This paper reviews a number of variations of PRMA protocol in literature.

  13. Open Access Transmission and Renewable Energy Technologies

    Energy Technology Data Exchange (ETDEWEB)

    Porter, K.

    1996-09-01

    In April 1996, the Federal Regulatory Commission (PERC) approved Orders 888 and 889 and released a draft rule for public comment on capacity reservation tariffs (CRTs). Order No. 888 requires electric utilities to file transmission tariffs that would allow transmission access to third parties who want to conduct wholesale transactions, and Order No. 889 requires transmission-owning utilities to set up open access, same-time information systems (OASIS), using commercial software and Internet protocols. This paper discusses these Orders in detail, as well as some of the issues before FERC with implications for renewables, which include: transmission pricing; transmission terms and conditions; reassignment of transmission capacity; defining state and FERC jurisdiction over transmission and distribution; the pricing of ancillary services; and the adoption and implementation of independent system operators.

  14. Access to the Palais des Nations

    CERN Multimedia

    Relations with the Host States Service

    2004-01-01

    The United Nations Office at Geneva (UNOG) has informed CERN of very strict rules concerning access to the Palais des Nations that have recently come into effect in the framework of tightened security measures. Access is henceforth restricted to persons visiting the Palais on official business or for a guided tour. The presentation of a CERN card is no longer sufficient for such purposes. Those concerned must go either to the reception area at the Pregny entrance in the case of one-off visits or to the villa "Les Feuillantines" to be issued with an identity badge. UNOG wishes to thank the members of the CERN personnel and the beneficiaries of the Pension Fund for their understanding. Relations with the Host States Service http://www.cern.ch/relations/ Tel. 72848

  15. Accessibility & Inclusivity in the Astronomical Community

    Science.gov (United States)

    Gilbert, Lauren; Shanahan, J.; Monkiewicz, Jacqueline A.; Noel-Storr, Jacob; Murphy, Nicholas Arnold

    2016-06-01

    Nearly one in five Americans have a disability. However, in a 2013 survey, fewer than 2% of AAS members identified as having a disability. Persons with disabilities are dramatically underrepresented in STEM fields and astronomy in particular. Though the Americans with Disabilities Act has been law for 25 years, few astronomy departments have implemented full universal design and structures for accessibility for students. Our field which often sees itself as pushing the limits can offer an environment for enhanced stigmatization and discrimination based on disability. Indeed, many current structures place undue burden to those who are excluded. Instead, we aspire to a way of working together that does not require disclosure of disability, and where diverse needs are being met with each of our interactions and activities. A mindset of diverse access makes the experience of learning, working, and collaborating stronger for all.

  16. [Innovative medicines and market access agreements].

    Science.gov (United States)

    Toumi, M; Zard, J; Duvillard, R; Jommi, C

    2013-09-01

    Market Access Agreements (MAA) for drugs have emerged in response to the need to control health expenditures, as well as to the uncertainty about the true benefit of a drug. It is possible to group MAA in two types of agreements: financial agreements and outcome-based agreements. MAA is a growing trend and is shifting towards conditional access. However, the willingness to use these contracts and their implementation differ across countries, and some are still resistant to put them in place. The MAA challenges to overcome encompass the complexity of the schemes, the administrative burden and the difficulty of evaluating MAA. It is likely that these agreements might experience further evolution in the future to become a faster pathway for therapeutic innovations, at a fair price.

  17. A Theorem on Grid Access Control

    Institute of Scientific and Technical Information of China (English)

    XU ZhiWei(徐志伟); BU GuanYing(卜冠英)

    2003-01-01

    The current grid security research is mainly focused on the authentication of grid systems. A problem to be solved by grid systems is to ensure consistent access control. This problem is complicated because the hosts in a grid computing environment usually span multiple autonomous administrative domains. This paper presents a grid access control model, based on asynchronous automata theory and the classic Bell-LaPadula model. This model is useful to formally study the confidentiality and integrity problems in a grid computing environment. A theorem is proved, which gives the necessary and sufficient conditions to a grid to maintain confidentiality.These conditions are the formalized descriptions of local (node) relations or relationship between grid subjects and node subjects.

  18. Making Access to Astronomical Software More Efficient

    CERN Document Server

    Grosbol, P

    2010-01-01

    Access to astronomical data through archives and VO is essential but does not solve all problems. Availability of appropriate software for analyzing the data is often equally important for the efficiency with which a researcher can publish results. A number of legacy systems (e.g. IRAF, MIDAS, Starlink, AIPS, Gipsy), as well as others now coming online are available but have very different user interfaces and may no longer be fully supported. Users may need multiple systems or stand-alone packages to complete the full analysis which introduces significant overhead. The OPTICON Network on `Future Astronomical Software Environments' and the USVAO have discussed these issues and have outlined a general architectural concept that solves many of the current problems in accessing software packages. It foresees a layered structure with clear separation of astronomical code and IT infrastructure. By relying on modern IT concepts for messaging and distributed execution, it provides full scalability from desktops to cl...

  19. Channel Access Client Toolbox for Matlab

    International Nuclear Information System (INIS)

    This paper reports on MATLAB Channel Access (MCA) Toolbox--MATLAB [1] interface to EPICS Channel Access (CA) client library. We are developing the toolbox for SPEAR3 accelerator controls, but it is of general use for accelerator and experimental physics applications programming. It is packaged as a MATLAB toolbox to allow easy development of complex CA client applications entirely in MATLAB. The benefits include: the ability to calculate and display parameters that use EPICS process variables as inputs, availability of MATLAB graphics tools for user interface design, and integration with the MATLABbased accelerator modeling software - Accelerator Toolbox [2-4]. Another purpose of this paper is to propose a feasible path to a synergy between accelerator control systems and accelerator simulation codes, the idea known as on-line accelerator model

  20. The "Free from Housing Accessibility Problems" App.

    Science.gov (United States)

    Jonsson, Oskar; Slaug, Björn; Haak, Maria; Mårtensson, Knut; Schmidt, Steven M; Oswald, Frank; Rimland, Joseph M; Tomsone, Signe; Svensson, Torbjörn; Iwarsson, Susanne

    2016-01-01

    The present study concerns the development of a computerized tool targeting housing accessibility issues. A user-centered approach involving professionals from the housing sector and senior citizens from four European countries resulted in a fully functional prototype of a mobile application (app) including an apartment database. The app raises awareness on housing accessibility and has the potential to support decision making and strengthen all citizens regardless of functional capacity to be more active in their endeavors for a satisfying housing solution. Further refinements and additional features are needed to enhance the potential benefits; they include addressing potential challenges facing senior citizens, developing interactive features that allow users to provide input and adapting to different national contexts to make the app applicable for the European market. PMID:27534351

  1. A new perspective on the access process

    DEFF Research Database (Denmark)

    Bergenholtz, Henning; Gouws, Rufus

    2010-01-01

    Only 10 or 15 years ago, you had to spend hours, days or even weeks in libraries to find data of many kinds. Today, one has access to data at your desks at home. Therefore, the biggest problem for a real information society is not that you do not have access to the needed data, but that you cannot...... find it or that it takes so long to find it that you quit the search before finding the result. This is clearly shown by a Google search where you get so many results that can lead to a case of information stress or even worse information death. An easy search route and a short search time...

  2. Direct data access protocols benchmarking on DPM

    CERN Document Server

    Furano, Fabrizio; Keeble, Oliver; Mancinelli, Valentina

    2015-01-01

    The Disk Pool Manager is an example of a multi-protocol, multi-VO system for data access on the Grid that went though a considerable technical evolution in the last years. Among other features, its architecture offers the opportunity of testing its different data access frontends under exactly the same conditions, including hardware and backend software. This characteristic inspired the idea of collecting monitoring information from various testbeds in order to benchmark the behaviour of the HTTP and Xrootd protocols for the use case of data analysis, batch or interactive. A source of information is the set of continuous tests that are run towards the worldwide endpoints belonging to the DPM Collaboration, which accumulated relevant statistics in its first year of activity. On top of that, the DPM releases are based on multiple levels of automated testing that include performance benchmarks of various kinds, executed regularly every day. At the same time, the recent releases of DPM can report monitoring infor...

  3. Accessible haptic technology for drug design applications.

    Science.gov (United States)

    Zonta, Nicola; Grimstead, Ian J; Avis, Nick J; Brancale, Andrea

    2009-02-01

    Structure-based drug design is a creative process that displays several features that make it closer to human reasoning than to machine automation. However, very often the user intervention is limited to the preparation of the input and analysis of the output of a computer simulation. In some cases, allowing human intervention directly in the process could improve the quality of the results by applying the researcher intuition directly into the simulation. Haptic technology has been previously explored as a useful method to interact with a chemical system. However, the need of expensive hardware and the lack of accessible software have limited the use of this technology to date. Here we are reporting the implementation of a haptic-based molecular mechanics environment aimed for interactive drug design and ligand optimization, using an easily accessible software/hardware combination. PMID:19048316

  4. Stepwise Approach to Accessible MOOC Development.

    Science.gov (United States)

    Draffan, E A; Wald, Mike; Dickens, Kate; Zimmermann, Gottfried; Kelle, Sebastian; Miesenberger, Klaus; Petz, Andrea

    2015-01-01

    Developing resources for online learning in its many guises and more recently for MOOCs has been discussed across the educational sector, usually by individuals working for one institution or organisation. Rarely are there discussions that highlight the issues of collaborative working on content that is delivered over a period of weeks for a wide range of abilities and skills. In particular there is a reluctance to face the issues presented by barriers to access for those with disabilities and even the issues that could arise should an academic be unable to access the development platform to present content. This paper aims to approach these issues by providing guidance in a series of practical steps that highlight an inclusive design approach. PMID:26294477

  5. Accessing International Funding for Climate Change Adaptation

    DEFF Research Database (Denmark)

    Christiansen, Lars; Ray, Aaron D.; Smith, Joel B.;

    The primary aim of this guidebook is to provide countries participating in the Technology Needs Assessment (TNA) Project with practical guidance that will help them secure financing for adaptation technology transfer project profiles identified in their Technology Action Plans (TAPs). The TNA...... project is being implemented by United Nations Environment Programme (UNEP) on behalf of the Global Environment Facility (GEF). This guidebook provides a number of concrete tools and recommendations that will help TNA countries identify and access funding to implement their TAPs, such as: • An overview...... of international public funding sources dedicated to adaptation investments (Chapter 3) • Seven fundamental eligibility criteria for accessing international public funding and guidance on how to apply these concepts to project ideas (Chapter 3) • A template (built on the abovementioned seven fundamental...

  6. Environmental implications of China's WTO accession

    International Nuclear Information System (INIS)

    China's accession to the WTO in 2001 completed the country's entry into the global economy. We investigate environmental implications of WTO-accession. There are several hypotheses in this area: The scale hypothesis says that production is scaled up and in turn, pollution increases. The composition hypothesis says that composition of industries changes and pollution reflects the new composition. The technique hypothesis says that production methods become cleaner and pollution decreases. We analyze the relative strength of the hypotheses by means of an environmental CGE-model, and in the case of air pollution find support for a composition effect in favor of clean industries. Thanks to the composition effect, emissions to air of greenhouse gases fall. Emissions of particles and SO2 also fall, but emissions of NOx and VOC rise. Since particle and SO2-emissions fall we estimate that public health improves (author)

  7. VHDL IMPLEMENTATION OF TEST ACCESS PORT CONTROLLER

    Directory of Open Access Journals (Sweden)

    MANPREET KAUR

    2012-06-01

    Full Text Available In this paper, an implementation of IEEE 1149.7 standard is used for designing Test Access Port (TAP Controller and testing of interconnects is done using boundary scan. By c-JTAG the pin count gets reduced which increases the performance and simplifies the connection between devices. TAP Controller is a synchronous Moore type finite state machine that is changed when the TMS and TCK signals of the test access port gets change. This controls the sequence operation of the circuitry conveyed by JTAG and c-JTAG. JTAGmainly used four pins with TAP and fifth pin is for optional use in Boundary scan. But c-JTAG uses only two pins with TAP. In this approach TDI and TDO gets multiplexed by using class T4 and T5 of c-JTAG. Various instructions are used for testing interconnects using IEEE 1149.7 standard (std.

  8. Safety testing for LHC access system

    CERN Document Server

    Valentini, F; Ninin, P; Scibile, S

    2008-01-01

    In the domain of Safety Real-Time Systems the problem of testing represents always a big effort in terms of time, costs and efficiency to guarantee an adequate coverage degree. Exhaustive tests may, in fact, not be practicable for large and distributed systems. This paper describes the testing process followed during the validation of the CERN's LHC Access System [1], responsible for monitoring and preventing physical risks for the personnel accessing the underground areas. In the paper we also present a novel strategy for the testing problem, intended to drastically reduce the time for the test patterns generation and execution. In particular, we propose a methodology for blackbox testing that relies on the application of Model Checking techniques. Model Checking is a formal method from computer science, commonly adopted to prove correctness of system’s models through an automatic system’s state space exploration against some property formulas.

  9. Web Accessibility Theory and Practice: An Introduction for University Faculty

    Directory of Open Access Journals (Sweden)

    David A. Bradbard

    2010-01-01

    Full Text Available Web accessibility is the practice of making Web sites accessible to all, particularly those with disabilities. As the Internet becomes a central part of post-secondary instruction, it is imperative that instructional Web sites be designed for accessibility to meet the needs of disabled students. The purpose of this article is to introduce Web accessibility to university faculty in theory and practice. With respect to theory, this article first reviews empirical studies, highlights legal mandates related to Web accessibility, overviews the standards related to Web accessibility, and reviews authoring and evaluation tools available for designing accessible Web sites. With respect to practice, the article presents two diaries representing the authors’ experiences in making their own Web sites accessible. Finally, based on these experiences, we discuss the implications of faculty efforts to improve Web accessibility.

  10. Making Visual Maps Accessible to the Blind

    OpenAIRE

    Buzzi, Maria Claudia; Buzzi, Marina; Leporini, Barbara; Martusciello, Loredana

    2011-01-01

    Visual maps deliver content in a simple and effective way. They can be useful for various purposes in areas such as street guidance, surrounding information, and education. However, sightless persons are unable to explore visual maps and risk being cut off from several multimedia Web applications. In this paper, starting from accessibility issues of map-based applications, we discuss possible interaction modalities and devices to use for truly achieving usage perspectives desired by blind peo...

  11. Accessible Content Generation for the Learning Disabled

    Directory of Open Access Journals (Sweden)

    Zainab Pirani

    2014-06-01

    Full Text Available The research for this paper was conducted to explore the various aspects of Learning Disabled students and how the student-centered learning environments have been influenced and aided by educational technology. The educational content material which plays the important role in the field of educational technology has to be transformed in the way accessible to the LD learner. This paper provides the guidelines for the same as well provides the comparative analysis in support of th guidelines provided.

  12. Teachers and Access to Schooling in Ghana

    OpenAIRE

    Seidu, Alhassan; Adzahlie-Mensah, Vincent

    2010-01-01

    This paper provides insights about the specific impact teachers’ actions and attitudes can have on access to schooling. The paper reports how teachers’ irregular attendance, lateness and absenteeism as well as misuse of instructional hours and indiscriminate use of corporal punishment contribute to pupils’ irregular attendance and dropping out. It also reports how poor supervision by head teachers contribute to irregular teacher attendance, punctuality and absenteeism, and how these in turn i...

  13. The Internet accessible mathematical computation framework

    Institute of Scientific and Technical Information of China (English)

    Paul S. Wang; Simon Gray; Norbert Kajler; Dongdai Lin; Weidong Liao; Xiao Zou

    2004-01-01

    The Internet Accessible Mathematical Computation (IAMC) framework aims to make it easy to supply mathematical computing powers over the Internet/Web. The protocol-based IAMC framework enables developers to create interoperable clients and servers easily and independently. Presented are conceptual and experimental work on the IAMC framework architecture and major components: the Mathematical Computation Protocol (MCP), a client prototype (Dragonfly), a server prototype (Starfish), a mathematical encoding converter (XMEC), and an open mathematical compute engine interface (OMEI).

  14. Evaluating accessible adaptable e-learning

    OpenAIRE

    Douce, Christopher; Porch, Wendy

    2009-01-01

    Two different approaches can increase the accessibility of digital educational materials: content that has been built with the widest possible set of users in mind (universal design), or content that has been designed in such a way that it can be personalised to individual user needs and preferences (personalised design). This paper outlines a number of approaches that could be used to evaluate the provision of learning materials that have been adapted to or chosen for individual learners. A ...

  15. Web services interface to EPICS channel access

    Institute of Scientific and Technical Information of China (English)

    DUAN Lei; SHEN Liren

    2008-01-01

    Web services is used in Experimental Physics and Industrial Control System (EPICS). Combined with EPICS Channel Access protocol, Web services' high usability, platform independence and language independence can be used to design a fully transparent and uniform software interface layer, which helps us complete channel data acquisition, modification and monitoring functions. This software interface layer, a cross-platform of cross-language,has good interopcrability and reusability.

  16. Museum audio guides as an accessibility enhancer

    OpenAIRE

    Martins, Cláudia Susana Nunes

    2012-01-01

    Accessibility to museums is enhanced by various types of cultural mediation, such as the use of audio guides, which consist of a means for innovative mediation put forth to make the museum visit more autonomous and simultaneously replace the traditional guided visit. Their use is integrated in the tendency for museum democratisation felt in Europe between the 60s and the 80s of the 20th century, especially with the development of educational services at museums and their opening to schools. I...

  17. Distributed Access View Integrated Database (DAVID) system

    Science.gov (United States)

    Jacobs, Barry E.

    1991-01-01

    The Distributed Access View Integrated Database (DAVID) System, which was adopted by the Astrophysics Division for their Astrophysics Data System, is a solution to the system heterogeneity problem. The heterogeneous components of the Astrophysics problem is outlined. The Library and Library Consortium levels of the DAVID approach are described. The 'books' and 'kits' level is discussed. The Universal Object Typer Management System level is described. The relation of the DAVID project with the Small Business Innovative Research (SBIR) program is explained.

  18. ATTITUDES OF MACEDONIAN FARMERS TOWARDS EU ACCESSION

    OpenAIRE

    Kotevska, Ana; Martinovska-Stojcheska, Aleksandra; Ohlmer, Bo; Dimitrievski, Dragi

    2012-01-01

    Macedonia is a candidate-country for EU membership since 2005. The EU integrative process, without doubt, will have impact on the Macedonian economy and particularly on the agricultural sector, as being one of the most significant in terms of GDP contribution and workforce employer. So far, farmer's attitudes and intentions with regard to the EU integration and accession were not much investigated. In this sense, the objective of the paper is to provide understanding of the Macedonian farmers...

  19. [Open access :an opportunity for biomedical research].

    OpenAIRE

    Duchange, Nathalie; Autard, Delphine; Pinhas, Nicole

    2008-01-01

    International audience Open access within the scientific community depends on the scientific context and the practices of the field. In the biomedical domain, the communication of research results is characterised by the importance of the peer reviewing process, the existence of a hierarchy among journals and the transfer of copyright to the editor. Biomedical publishing has become a lucrative market and the growth of electronic journals has not helped lower the costs. Indeed, it is diffic...

  20. Access to flexible working and informal care

    OpenAIRE

    Bryan, Mark L.

    2011-01-01

    We use matched employer-employee data to explore the relationship between employees' access to flexible working arrangements and the amount of informal care they provide to sick or elderly friends and relatives. Flexitime and the ability to reduce working hours are each associated with about 10% more hours of informal care, with effects concentrated among full-time workers providing small amounts of care. The wider workplace environment beyond formal flexible work also appears to facilitate c...

  1. Spatiotemporal accessible solitons in fractional dimensions

    Science.gov (United States)

    Zhong, Wei-Ping; Belić, Milivoj R.; Malomed, Boris A.; Zhang, Yiqi; Huang, Tingwen

    2016-07-01

    We report solutions for solitons of the "accessible" type in globally nonlocal nonlinear media of fractional dimension (FD), viz., for self-trapped modes in the space of effective dimension 2 functions that include Gegenbauer polynomials, associated Laguerre polynomials, and associated Legendre functions. The validity of these solutions is verified by direct simulations. The model can be realized in various physical settings emulated by FD spaces; in particular, it applies to excitons trapped in quantum wells.

  2. Studying Media Access andControl Protocols

    OpenAIRE

    Mohammed, Alalelddin Fuad Yousif

    2010-01-01

    This thesis project’s goal is to enable undergraduate students to gain insight into media access and control protocols based upon carrying out laboratory experiments. The educational goal is to de-mystifying radio and other link and physical layer communication technologies as the students can follow packets from the higher layers down through the physical layer and back up again. The thesis fills the gap between the existing documentation for the Universal Software Radio Peripheral (USRP) re...

  3. Introducing lightweight access points into Eduroam network

    OpenAIRE

    Divjak, Blaž

    2012-01-01

    In the begining wireless networks were convenient but now they are mission critical. Eduroam wireless network was launched in 2003. It enabled mobility in academic and educational sphere. At the begining Eduroam covered small parts of faculties and schools, but it evolved and is now covering large campuses and student dorms. Large wireless networks bring new challenges for their maintainers. For efficient control and provisioning of wireless access points a new solution was needed. In this th...

  4. An introduction to direct access storage devices

    CERN Document Server

    Sierra, Hugh M

    2012-01-01

    This book presents an exposition of the technology, design, organization, and structure of direct access storage devices (disk drives). It includes a discussion of the evolution of the technology (magnetic recording) and an assessment of other storage technologies, including optical recording. Examples of codes used in past implementations of disk drives as well as an application of disk drive usage dictated by reliability considerations are also included. The presentation assumes a minimum knowledge of magnetic recording, servomechanism design, and coding.

  5. Funding the Way to Open Access

    Institute of Scientific and Technical Information of China (English)

    Robert Terry

    2005-01-01

    The Wellcome Trust supports open access publishing via the author pays model and through the deposition of peer reviewed papers into PubMed Central. The costs of disseminating research and the author pays model should be seen as part of research costs and is estimated to be approximately 1% -2% of the grant funding budget. A PubMed Central version of the article adds value to the article through additional functions especially provide links between the literature and the data.

  6. Access to the scientific literature in India

    OpenAIRE

    Gaulé, Patrick

    2009-01-01

    This paper uses an evidence-based approach to assess the difficulties faced by developing country scientists in accessing the scientific literature. I compare backward citations patterns of Swiss and Indian scientists in a database of 43'150 scientific papers published by scientists from either country in 2007. Controlling for fields and quality with citing journal fixed effects, I find that Indian scientists (1) have shorter references lists (2) are more likely to cite articles from open acc...

  7. Types of Open Access Publishers in Scopus

    OpenAIRE

    David Solomon

    2013-01-01

    This study assessed characteristics of publishers who published 2010 open access (OA) journals indexed in Scopus. Publishers were categorized into six types; professional, society, university, scholar/researcher, government, and other organizations. Type of publisher was broken down by number of journals/articles published in 2010, funding model, location, discipline and whether the journal was born or converted to OA. Universities and societies accounted for 50% of the journals and 43% of th...

  8. Natural Language Access to Enterprise Data

    OpenAIRE

    Waltinger, Ulli; Siemens AG; Tecuci, Dan; Siemens Corporation; Olteanu, Mihaela; Siemens AG; Mocanu, Vlad; Siemens AG; Sullivan, Sean; Siemens Energy Inc.

    2014-01-01

    This paper describes USI Answers — a natural language question answering system for enterprise data. We report on the progress towards the goal of offering easy access to enterprise data to a large number of business users, most of whom are not familiar with the specific syntax or semantics of the underlying data sources. Additional complications come from the nature of the data, which comes both as structured and unstructured. The proposed solution allows users to express questions in natura...

  9. Performance indicators for SMEs accessing EU funds

    OpenAIRE

    Popa Adina-Simona

    2013-01-01

    Being the best supporters of national economies Small and Medium Sized Enterprises are actively searching alternative sources of finance for sustaining their goals and their performances. European Union is sustaining the SMEs access to finance by direct funding: grants from the European Commission and indirect funding: financial intermediaries in the SMEs origin country. Considering the importance of SMEs for national and European economy we will analyze the relationship between the EU fundin...

  10. Public Access to Information for Development

    OpenAIRE

    Victoria L. Lemieux; Stephanie E. Trapnell

    2016-01-01

    With more than 100 right to information (RTI) laws—also called freedom of information or access to information laws—now in place globally, the groundwork has been laid to advance more transparent, accountable, and inclusive governance as a pathway to poverty reduction and economic development. This guide explores the historical development of RTI laws, the factors that drive passage and effective implementation of these laws, the operation of the laws, and the impact of these laws in differen...

  11. A Directory Service for Perspective Access Networks

    OpenAIRE

    Goodell, Geoffrey Lewis; Roussopoulos, Mema; Bradner, Scott O.

    2006-01-01

    Network fragmentation occurs when the accessibility of a network-based resource to an observer is a function of how the observer is connected to the network. In the context of the Internet, network fragmentation is well-known and occurs in many situations, including an increasing preponderance of network address translation, firewalls, and virtual private networks. Recently, however, new threats to Internet consistency have received media attention. Alternative namespaces have emerged as the ...

  12. Full Access for all Team Members?

    OpenAIRE

    Bogaerde, Beppie van den; Gils, G. van; Lange, R. de

    2008-01-01

    - Job control – both Deaf and hearing are satisfied with amount of job control - Job demands – both Deaf and hearing find that they can meet the jobs demands - Job strain – both Deaf and hearing experience stress from time pressure and work planning issues - Language use is not a strain factor - Access to information is felt to be sufficient, although the information streams are different for Deaf and hearing employees - Deaf employees receive much information from their deaf colleagues - Hea...

  13. Open Access publishing in physics gains momentum

    CERN Multimedia

    2006-01-01

    "As if inventing the World-Wide Web were not revolutionary enough, the European Organisation for Nuclear Research (CERN) is now on its way to unleashing a paradigm shift in the world of academic publishing. For the first time ever, an entire scientific field is exploring the possibility of converting its reader-paid journals into an author-pai Open Access format." (1 page)

  14. Distributed Access Control Policies for Spectrum Sharing

    OpenAIRE

    Baldini, Gianmarco; NAI-FOVINO Igor; Trombetta, Alberto; Braghin, Stefano

    2012-01-01

    Cognitive Radio (CR) is a novel wireless communication technology that allows for adaptive configuration of the reception parameters of a terminal, based on the information collected from the environment. Cognitive radio (CR) technology can be used in innovative spectrum management approaches like spectrum sharing, where radio frequency spectral bands can be shared among various users through a dynamic exclusive-use spectrum access model. Spectrum sharing can be applied to various...

  15. Citation Analysis in the Open Access World

    OpenAIRE

    Brody, Tim

    2004-01-01

    Recent reports by the UK Parliament Committee on Science and Technology and the US House Appropriations Committee have recommended mandating that researchers provide Open Access (OA) to their research articles by self-archiving them free for all on the Web. OA is now firmly on the agenda for funding agencies, universities, libraries and publishers. What is needed now is objective, quantitative evidence of the benefits of OA to research authors, their institutions, their funders and to researc...

  16. Access to complementary medicine via general practice.

    OpenAIRE

    Thomas, K.J.; Nicholl, J P; Fall, M.

    2001-01-01

    BACKGROUND: The popularity of complementary medicine continues to be asserted by the professional associations and umbrella organisations of these therapies. Within conventional medicine there are also signs that attitudes towards some of the complementary therapies are changing. AIM: To describe the scale and scope of access to complementary therapies (acupuncture, chiropractic, homoeopathy, hypnotherapy, medical herbalism, and osteopathy) via general practice in England. DESIGN OF STUDY: A ...

  17. Measurement Error in Access to Markets

    OpenAIRE

    Javier Escobal; Sonia Laszlo

    2005-01-01

    Studies in the microeconometric literature increasingly utilize distance to or time to reach markets or social services as determinants of economic issues. These studies typically use self-reported measures from survey data, often characterized by non-classical measurement error. This paper is the first validation study of access to markets data. New and unique data from Peru allow comparison of self-reported variables with scientifically calculated variables. We investigate the determinants ...

  18. Positioning hospitals for improved access to capital.

    Science.gov (United States)

    Ponton, Kevin T; Sandrick, Karen M

    2002-11-01

    Hospitals need to actively position themselves in the next 18 to 24 months to ensure continued access to financing. Hospitals need to shift their focus from investment income to operations. Hospitals should recognize the importance of balance-sheet liquidity to institutional investors. Not-for-profit hospitals should focus on both sides of the balance sheet. Healthcare executives need to develop effective leadership and investor-relations skills. PMID:12656030

  19. GRAPPA: Grid Access Portal for Physics Applications

    OpenAIRE

    Engh, D.; Smallen, S.; Gieraltowski, J.; Fang, L.; Gardner, R.; Gannon, D.; Bramley, R.

    2003-01-01

    Grappa is a Grid portal effort designed to provide physicists convenient access to Grid tools and services. The ATLAS analysis and control framework, Athena, was used as the target application. Grappa provides basic Grid functionality such as resource configuration, credential testing, job submission, job monitoring, results monitoring, and preliminary integration with the ATLAS replica catalog system, MAGDA. Grappa uses Jython to combine the ease of scripting with the power of java-based too...

  20. Qualified market access and inter-disciplinarity

    OpenAIRE

    Walton, Andrew; Herzog, Lisa

    2014-01-01

    This note offers reflections on qualified market access (QMA)—the practice of linking trade agreements to values such as human rights, labour standards, or environmental protection. This idea has been suggested by political theorists as a way of fulfilling our duties to the global poor and of making the global economic system more just, and it has influenced a number of concrete policies, such as European Union (EU) trade policies. Yet, in order to assess its merits tout court, different pers...

  1. A nationwide access management service - Athens

    OpenAIRE

    Johnson, Mike; Zedlewski, Edward J.

    2001-01-01

    The Athens service enables secure access to online services for universities and colleges throughout the UK and overseas. The key features include "single password sign-on" to multiple resources and fully distributed management of user accounts. The service is used by all UK higher education institutions and many users in allied sectors. Use of Athens has now reached "critical mass", with over 800,000 accounts at more than 300 institutions, 100 National Health Service Trusts and most Scandi...

  2. Rural Broadband Internet Access Supply and Demand

    OpenAIRE

    Stenberg, Peter L.; Morehart, Mitchell J.

    2009-01-01

    Internet use has grown rapidly over the last 15 years and so has its integration into the rural economy. Connecting to the Internet via high-speed technology such as DSL lines, cable, satellite, and wireless networks increases bandwidth and makes the Internet much more useful to businesses, households, and governments. Rural households are almost as likely as urban households to use the Internet. Broadband Internet access in rural areas has been less prevalent than in much more densely popula...

  3. Grey Literature in Russia : Acquisition, Access, Perspectives

    OpenAIRE

    Zemskov, Andrei (NPLS&T); Komov, V. (NPLS&T); Miakova, Natalia (NPLS&T); GreyNet, Grey Literature Network Service

    1994-01-01

    Publishing of "grey" literature in the countries of the former USSR has reduced to that of 1930 and libraries acquisition decreased accordingly. To compensate the decrease our Library has established direct contacts with major institutes and organizations. Subject scope of "grey" literature has been transferred from fundamental science over to practice. To fascilitate access to the collections of "grey" literature Russian National Public Library for Science and Technology has been maintaining...

  4. Complication with Intraosseous Access: Scandinavian Users' Experience

    Directory of Open Access Journals (Sweden)

    Peter Hallas

    2013-09-01

    Full Text Available Introduction: Intraosseous access (IO is indicated if vascular access cannot be quickly established during resuscitation. Complication rates are estimated to be low, based on small patient series, model or cadaver studies, and case reports. However, user experience with IO use in real-life emergency situations might differ from the results in the controlled environment of model studies and small patient series. We performed a survey of IO use in real-life emergency situations to assess users’ experiences of complications.Methods: An online questionnaire was sent to Scandinavian emergency physicians, anesthesiologists and pediatricians.Results: 1,802 clinical cases of IO use was reported by n=386 responders. Commonly reported complications with establishing IO access were patient discomfort/pain (7.1%, difficulties with penetration of periosteum with IO needle (10.3%, difficulties with aspiration of bone marrow (12.3%, and bended/broken needle (4.0%. When using an established IO access the reported complications were difficulties with injection fluid and drugs after IO insertion (7.4%, slow infusion (despite use of pressure bag (8.8%, displacement after insertion (8.5%, and extravasation (3.7%. Compartment syndrome and osteomyelitis occurred in 0.6% and 0.4% of cases respectively.Conclusion: In users’ recollection of real-life IO use, perceived complications were more frequent than usually reported from model studies. The perceived difficulties with using IO could affect the willingness of medical staff to use IO. Therefore, user experience should be addressed both in education of how to use, and research and development of IOs. [West J Emerg Med. 2013;14(5:440–443.

  5. Globalisation and schooling: equity and access issues

    Science.gov (United States)

    Zajda, Joseph

    2011-03-01

    This review essay focuses on the prominence given to globalisation and discourses of globalisation in education reforms and pedagogy, as well as the way conceptual thinking in this area has changed and developed, due to competing ideologies, forces of globalisation and political, economic and cultural transformations. It analyses and evaluates the shifts in methodological approaches to globalisation and its effects on education policy and pedagogy. It focuses on forces of globalisation, ideology, social inequality and implications for equity and access to quality education.

  6. Access to Credit and Comparative Advantage

    OpenAIRE

    Egger, Peter; Keuschnigg, Christian

    2011-01-01

    Access to external funds is crucial for the entry and expansion of entrepreneurial firms and the sectors they predominantly arise in. This paper reports four important results. First, comparative advantage is shaped by factor endowments as well as fundamental determinants of corporate finance. In particular, a larger equity ratio of firms and tough governance standards relax finance constraints, lead to entry of firms at the lower bound of the productivity distribution, and create an endogeno...

  7. Performance analysis of WCDMA wireless access standard

    Institute of Scientific and Technical Information of China (English)

    FU Haiyang; SHEN Hui; LU Suhua

    2007-01-01

    Based on the transmitting power of a mobile station and the maximum cell capacity,the analysis of a wideband code-division multiple access(WCDMA) standard and the comparison of the corresponding parameters with CDMA2000 or evolution-data only(EV-DO) are given in this paper.The result proves that the mobile station of WCDMA cannot provide the required transmitting power on the specified frequency band and data rate.and the symmetrical capacity in an up-downlink cannot meet the requirement of a mobile Intemet.It is questionable for the International Telecommunication Union(ITU) to select the frequency band of 2 GHz for vehicular mobile telecommunication and unreasonable to distribute it over the downlink and uplink channels symmetrically.Only CDMA2000 1X EV-DO or enhanced data rate for GSM evolution(EDGE),which adopts the Time Division Multiple Access(TDMA) mode.can provide the high-speed data rate for a wireless access.

  8. Internet access for everybody: The satellite solution

    Science.gov (United States)

    Wittig, Manfred

    2009-01-01

    The use of the Internet has been grown tremendously within the last decade to more than one billion subscribers. The other five billion people on Earth cannot enjoy the possibilities offered by the Internet. The digital divide is everywhere: in the developing as well as in the developed part of the world. In the developing countries basic communication needs (voice, IP access) need to be provided to a large population not living in cities. In the developed part of the world people residing outside the large cities, on the nice country side, have still difficulties to get broadband access. The reason being, that the investment to install the network infrastructure to this minority part of the population is a major part of the total investment for the network. The benefit for the telecom operators is marginal to get these customers on board. In this paper an analysis of the Internet and satellite development is being presented and based on these historical data a prediction of a possible evolution of satellite communications and broadband access is performed. One result is that the capacity of the GEO ring at the Ka-band alone would allow to provide to each individual on Earth in 2050 (assumed to be 10 billion people) a monthly capacity of about 1 Gbyte for a charge of 1$ per month.

  9. Migration Performance for Legacy Data Access

    Directory of Open Access Journals (Sweden)

    Kam Woods

    2008-12-01

    Full Text Available We present performance data relating to the use of migration in a system we are creating to provide web access to heterogeneous document collections in legacy formats. Our goal is to enable sustained access to collections such as these when faced with increasing obsolescence of the necessary supporting applications and operating systems. Our system allows searching and browsing of the original files within their original contexts utilizing binary images of the original media. The system uses static and dynamic file migration to enhance collection browsing, and emulation to support both the use of legacy programs to access data and long-term preservation of the migration software. While we provide an overview of the architectural issues in building such a system, the focus of this paper is an in-depth analysis of file migration using data gathered from testing our software on 1,885 CD-ROMs and DVDs. These media are among the thousands of collections of social and scientific data distributed by the United States Government Printing Office (GPO on legacy media (CD-ROM, DVD, floppy disk under the Federal Depository Library Program (FDLP over the past 20 years.

  10. Entrance C - Meyrin site: new access conditions

    CERN Multimedia

    2013-01-01

    Entrance C on the Meyrin site, which drivers of motorised vehicles can use Mondays to Fridays from 7 a.m. to 9 a.m. and from 5 p.m. to 7 p.m., has been altered to include a turnstile to allow cyclists and pedestrians to use their access card to get in and out of the site from 6 a.m. until 10 p.m.   The following video illustrates how to use the new turnstile: A new type of entrance gate fitted with a number plate reader similar to that installed at the entrance to the Prévessin site should, once fully tested, allow drivers of motorised vehicles to access the site. For the time being, the conditions of use of Entrance C remain unchanged. Further information on the entry into force of new arrangements will be issued in due course. For further information about CERN entrances: CERN opening hours CERN control access GS Department

  11. An integrated solution for remote data access

    Science.gov (United States)

    Sapunenko, Vladimir; D'Urso, Domenico; dell'Agnello, Luca; Vagnoni, Vincenzo; Duranti, Matteo

    2015-12-01

    Data management constitutes one of the major challenges that a geographically- distributed e-Infrastructure has to face, especially when remote data access is involved. We discuss an integrated solution which enables transparent and efficient access to on-line and near-line data through high latency networks. The solution is based on the joint use of the General Parallel File System (GPFS) and of the Tivoli Storage Manager (TSM). Both products, developed by IBM, are well known and extensively used in the HEP computing community. Owing to a new feature introduced in GPFS 3.5, so-called Active File Management (AFM), the definition of a single, geographically-distributed namespace, characterised by automated data flow management between different locations, becomes possible. As a practical example, we present the implementation of AFM-based remote data access between two data centres located in Bologna and Rome, demonstrating the validity of the solution for the use case of the AMS experiment, an astro-particle experiment supported by the INFN CNAF data centre with the large disk space requirements (more than 1.5 PB).

  12. Achieving Open Access to Conservation Science

    Science.gov (United States)

    Fuller, Richard A; Lee, Jasmine R; Watson, James E M

    2014-01-01

    Conservation science is a crisis discipline in which the results of scientific enquiry must be made available quickly to those implementing management. We assessed the extent to which scientific research published since the year 2000 in 20 conservation science journals is publicly available. Of the 19,207 papers published, 1,667 (8.68%) are freely downloadable from an official repository. Moreover, only 938 papers (4.88%) meet the standard definition of open access in which material can be freely reused providing attribution to the authors is given. This compares poorly with a comparable set of 20 evolutionary biology journals, where 31.93% of papers are freely downloadable and 7.49% are open access. Seventeen of the 20 conservation journals offer an open access option, but fewer than 5% of the papers are available through open access. The cost of accessing the full body of conservation science runs into tens of thousands of dollars per year for institutional subscribers, and many conservation practitioners cannot access pay-per-view science through their workplace. However, important initiatives such as Research4Life are making science available to organizations in developing countries. We urge authors of conservation science to pay for open access on a per-article basis or to choose publication in open access journals, taking care to ensure the license allows reuse for any purpose providing attribution is given. Currently, it would cost $51 million to make all conservation science published since 2000 freely available by paying the open access fees currently levied to authors. Publishers of conservation journals might consider more cost effective models for open access and conservation-oriented organizations running journals could consider a broader range of options for open access to nonmembers such as sponsorship of open access via membership fees. Obtención de Acceso Abierto a la Ciencia de la Conservación Resumen La ciencia de la conservación es una

  13. NOAA Climate Data Records Access for Applications

    Science.gov (United States)

    Stachniewicz, J. S.; Cecil, D.; Hollingshead, A.; Newport, B. J.; Wunder, D.

    2015-12-01

    There are many potential uses of NOAA Climate Data Records (CDRs) for decision-making and catastrophic risk management assessment activities in the federal, state, and local government and private sectors, in addition to their traditional uses by the academic/scientific community. There is growing interest in using NOAA CDRs for such applications and straightforward access to the data is essential if these applications are to be successful. User engagement activities determine the types of data that users need, as well as the spatial and temporal subsets. This talk will present the access methods currently available and in development. Alternate representations and sources of some CDRs will also be discussed. Recent improvements include: 1. CDR information web page 2. Dataset types, sizes, growth, latency, grid/swath 3. Dataset discovery, data access, and sub-setting. 4. Knowing our users and their needs. 5. Known uses of some CDRs. 6. Migration to CLASS. 7. Other representations - GeoTIFF, Obs4MIPS 8. Cloud applications - Google, Microsoft

  14. Low latency memory access and synchronization

    Energy Technology Data Exchange (ETDEWEB)

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

    2010-10-19

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  15. Multilingual Access to Cultural Heritage Resources

    Directory of Open Access Journals (Sweden)

    Irina Oberländer-Târnoveanu

    2005-09-01

    Full Text Available For the visitor to the ARENA Portal for Archaeological Records of Europe Networked Access, the first option is to choose the language of the interface: Danish, English, Icelandic, Polish, Norwegian or Romanian. These are the languages of the six partners in the European project developed between 2001 and 2004. We expect a significant number of visitors from these countries, which made the choice of each respective mother tongue a natural one. Is the option of several languages just a courtesy for our public? It is more than that - it is a tool to facilitate access to multilingual archaeological information. Before we were ready for visitors to our sites, we had to understand each other, to index our digital resources using common terms, to find the right equivalents for archaeological realities described in several languages, to explain the concepts behind the words. Language is related to culture, identity and memory. There is a growing concern about the dominance of English as a global language of communication, while probably the majority of known languages are in danger of disappearing and cultural diversity is menaced. If we wish to make cultural heritage resources accessible to more people and to share knowledge, language is a key. My article is an attempt to address these issues. I will explore the role of language in scientific communication, multilingualism on the Internet, language policies, and also have a closer look at terminological tools for cultural heritage, especially for archaeology.

  16. Accessing the nanostructural analysis network organisation (NANO)

    International Nuclear Information System (INIS)

    Full text: As a Major National Research Facility (MNRF), NANO unites five Australian microscopy and microanalysis centres to form the peak Australian facility for nanometric analysis of the structure and chemistry of materials. NANO is headquartered at the Australian Key Centre for Microscopy and Microanalysis at the University of Sydney and involves the Centres for Microscopy and Microanalysis at the Universities of Queensland and Western Australia, the Electron Microscope Unit at the University of New South Wales and the Microanalytical Research Centre at the University of Melbourne. Together these major centres maintain a wide range of complementary instrumentation for the characterisation of nanostructure. NANO links them into a co-ordinated national facility with unified charges and booking systems. The facility will provide open access to a wide range of present and future partners involving local and international linkages. For this reason, NANO is designed to allow the incorporation of other groups as additional nodes. All Australian researchers are eligible to apply for support to use NANO through the Travel and Access Program (NANO-TAP), which will support basic travel and accommodation costs as well as instrument time. Access to the national grid may involve on-site presence at a particular node or remote telemicroscopy. Both passive (observation) and active (operation) modes of telemicroscopy are available. This presentation will address the NANO-TAP application procedure, the use of remote telemicroscopy and the formation of additional nodes. Copyright (2003) Australian Microbeam Analysis Society

  17. [Accessible health information: a question of age?].

    Science.gov (United States)

    Loos, E F

    2012-04-01

    Aging and digitalisation are important trends which have their impact on information accessibility. Accessible information about products and services is of crucial importance to ensure that all citizens can participate fully as active members of society. Senior citizens who have difficulties using new media run the risk of exclusion in today's information society. Not all senior citizens, however, encounter problems with new media. Not by a long shot. There is much to be said for 'aged heterogeneity', the concept that individual differences increase as people age. In two explorative qualitative case studies related to accessible health information--an important issue for senior citizens--that were conducted in the Netherlands, variables such as gender, education level and frequency of internet use were therefore included in the research design. In this paper, the most important results of these case studies will be discussed. Attention will be also paid to complementary theories (socialisation, life stages) which could explain differences in information search behaviour when using old or new media. PMID:22642049

  18. Optimal access to large databases via networks

    Energy Technology Data Exchange (ETDEWEB)

    Munro, J.K.; Fellows, R.L.; Phifer, D. Carrick, M.R.; Tarlton, N.

    1997-10-01

    A CRADA with Stephens Engineering was undertaken in order to transfer knowledge and experience about access to information in large text databases, with results of queries and searches provided using the multimedia capabilities of the World Wide Web. Data access is optimized by the use of intelligent agents. Technology Logic Diagram documents published for the DOE facilities in Oak Ridge (K-25, X-10, Y-12) were chosen for this effort because of the large number of technologies identified, described, evaluated, and ranked for possible use in the environmental remediation of these facilities. Fast, convenient access to this information is difficult because of the volume and complexity of the data. WAIS software used to provide full-text, field-based search capability can also be used, through the development of an appropriate hierarchy of menus, to provide tabular summaries of technologies satisfying a wide range of criteria. The menu hierarchy can also be used to regenerate dynamically many of the tables that appeared in the original hardcopy publications, all from a single text database of the technology descriptions. Use of the Web environment permits linking many of the Technology Logic Diagram references to on-line versions of these publications, particularly the DOE Orders and related directives providing the legal requirements that were the basis for undertaking the Technology Logic Diagram studies in the first place.

  19. Switching Hats: From Accessibility to Possibility

    Directory of Open Access Journals (Sweden)

    Sarah McGann

    2009-11-01

    Full Text Available Neil is a sporty, outdoorsy sort of bloke. He spends verylittle time at home, preferring to golf, surf, go to the footy and hang out with his mates: You can tell just by looking inside his house—a huge TV in the darkened lounge, and golf equipment, surf boards and motorbike gear fill up the room. That was before last October. Now, in June, Neil is a paraplegic, his house is inaccessible and his boys-toys are in the way. For Neil, his home, previously an inwardly focused place to sleep and store, will become the centre of his world (when he can eventually get into it. Initially, accessibility is the key problem to be solved. To this end the architectural advisor from the rehabilitation unit proposed formulaic adjustments to the bathroom to allow for wheelchair access. However, accessibility is only one facet of the problem. This environment, relatively unimportant before,now needs to enable and inspire the occupant both physically and emotionally. As physical abilities dramatically change the spatial practices of everyday life also change.The home environment is ever more important to support and help heal emotional scarring after a life-changing event.In the context of shorter hospital and rehabilitation stays,the home provides a vital extension to the healthcare system. Therefore it is important that architectural advice given to enable this move considers the holistic qualities ofdesign thinking rather than be restricted to short-term solutions.

  20. Achieving Open Access to Conservation Science

    Science.gov (United States)

    Fuller, Richard A; Lee, Jasmine R; Watson, James E M

    2014-01-01

    Conservation science is a crisis discipline in which the results of scientific enquiry must be made available quickly to those implementing management. We assessed the extent to which scientific research published since the year 2000 in 20 conservation science journals is publicly available. Of the 19,207 papers published, 1,667 (8.68%) are freely downloadable from an official repository. Moreover, only 938 papers (4.88%) meet the standard definition of open access in which material can be freely reused providing attribution to the authors is given. This compares poorly with a comparable set of 20 evolutionary biology journals, where 31.93% of papers are freely downloadable and 7.49% are open access. Seventeen of the 20 conservation journals offer an open access option, but fewer than 5% of the papers are available through open access. The cost of accessing the full body of conservation science runs into tens of thousands of dollars per year for institutional subscribers, and many conservation practitioners cannot access pay-per-view science through their workplace. However, important initiatives such as Research4Life are making science available to organizations in developing countries. We urge authors of conservation science to pay for open access on a per-article basis or to choose publication in open access journals, taking care to ensure the license allows reuse for any purpose providing attribution is given. Currently, it would cost $51 million to make all conservation science published since 2000 freely available by paying the open access fees currently levied to authors. Publishers of conservation journals might consider more cost effective models for open access and conservation-oriented organizations running journals could consider a broader range of options for open access to nonmembers such as sponsorship of open access via membership fees. Obtención de Acceso Abierto a la Ciencia de la Conservación Resumen La ciencia de la conservación es una

  1. Organizing Data to Support Diverse Access Patterns

    Science.gov (United States)

    Jelenak, A.; Habermann, T.; Knox, L.; Pourmal, E.

    2014-12-01

    Many Earth Science archives are currently structured as the data are collected or calculated: individual files hold results for single time slices. This approach is easy to write while data are being collected or calculated and is optimized for viewing the data in latitude/longitude slices (maps or images) or animations of a series of these maps. It also works well for spatial comparisons of values at the same time. Several groups have recently explored approaches to reorganizing data in order to optimize access for analysis of climate variations, i.e. temporal changes at a given location. One approach, termed "data rods", takes this reorganization to the opposite end of the organization spectrum with a file for each grid cell time series. An alternative in the middle of the organization spectrum offers flexible access that can support either map or time series views. This approach takes advantage of chunking to divide the data into three-dimensional blocks, i.e. two-dimensional latitude/longitude tiles with a time dimension. This chunking approach is implemented as a core capability of the HDF5 file format and its tools and offers a number of advantages: improved multi-use case data access, integrated data compression, expanding or shrinking data dimensions, adding or deleting data, and simplifying data management by decreasing the number of files in each collection. We will provide real-world examples of these benefits using data products from current data archives.

  2. Open Access to Content and Financial Innovation

    Directory of Open Access Journals (Sweden)

    Wesley Mendes-Da-Silva

    2015-08-01

    Full Text Available Over the last twenty years the world has experienced significant growth in the supply of knowledge as a result of the advent of the Internet and there has been a drastic reduction in the cost of acquiring or constructing relevant information. This has meant that various industries, like banks, commerce and even the public management sector have undergone a reconfiguration process. Similarly, universities and the publishers of scientific periodicals need to reflect on their future. After all, who is prepared to pay for content that can be freely accessed? In the wake of the change in the technological paradigm that characterizes communication, and driven by financial crises, we find the topic of Financial Innovation (Lerner, 2006. But this topic was already on the agenda even before the Internet appeared on the scene (Miller, 1986. At the beginning of May 2013, when we started putting together the Journal of Financial Innovation (JoFI an article entitled “Free-for-all”, which was published in the important British publication, The Economist, discussed the growth of open access scientific journals. At the time the British magazine stressed the practice adopted in the UK, which established open access journals as being the destination for research results. In essence, what is intended is to constitute a quality publication route without readers or authors being burdened with high costs, an area that is still responsible for large portions of the billionaire publishing market around the world. 

  3. Mapping urban accessibility: gamifying the citizens’ experience

    Directory of Open Access Journals (Sweden)

    Catia Prandi

    2015-12-01

    Full Text Available In this paper we present the design process and some interesting field t rial r esults of two d ifferent game applications, designed and developed in order to extend and motivate the community of mPASS. mPASS is an urban accessibility mapping system that allows citizens to collect reliable data about barriers and facilities via crowdsourcing and crowdsensing and it uses these data to calculate accessible paths. On the one hand mPASS needs to collect a sufficiently dense, detailed and trustworthy amount of data. On the other hand, the community interested in obtaining accessible paths is not big enough to reach the critical mass of information needed by the system in order to provide effective services. To overcome this problem, we investigated gamification strategies in designing two mobile applications targeting young adults walkers, aimed to enlarge the data contributors community. The design process and field t rial results of both games are presented, highlighting the design decisions resulted from feedback sessions, focus groups and experience prototyping.

  4. Molecular characterization of autochthonous Turkish fig accessions

    Energy Technology Data Exchange (ETDEWEB)

    Caliskan, O.; Polat, A. A.; Celikkol, P.; Bakir, M.

    2012-11-01

    Turkey is one of the main genetic centers for fig tree, Ficus carica L. The genetic variabilities of 76 fig accessions from Hatay province of Turkey were evaluated by analysis of 10 simple sequence repeats (SSR) loci. The number of alleles revealed by SSR analysis ranged from 3 to 12 alleles per locus with a mean value of 6.8. A total of 68 alleles were detected by SSR and the average heterozygosity was higher than the expected one. In addition, seven random amplified polymorphic DNA (RAPD) primers detected a total of 68 clear and reproducible bands, 55 of which were polymorphic, so it was possible to effectively characterize these fig accessions with either marker techniques. In both marker systems, Mantels correlation between similarity scores and cophenetic values was moderately high (0.90 for RAPD and 0.87 for SSR), which demonstrated that the clustering patterns fitted the data well. The clusters obtained using these types of markers were independent. This study indicated that there is great genetic variability among local fig accessions, making them a valuable genetic source for incorporation into potential breeding programs especially for table fig selections. (Author) 35 refs.

  5. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  6. Context-Based E-Health System Access Control Mechanism

    Science.gov (United States)

    Al-Neyadi, Fahed; Abawajy, Jemal H.

    E-Health systems logically demand a sufficiently fine-grained authorization policy for access control. The access to medical information should not be just role-based but should also include the contextual condition of the role to access data. In this paper, we present a mechanism to extend the standard role-based access control to incorporate contextual information for making access control decisions in e-health application. We present an architecture consisting of authorisation and context infrastructure that work cooperatively to grant access rights based on context-aware authorization policies and context information.

  7. Open access journals – what publishers offer, what researchers want

    CERN Document Server

    Dallmeier-Tiessen, Suenje; Goerner, Bettina; Hyppoelae, Jenni; Igo-Kemenes, Peter; Kahn, Deborah; Lamber, Simon; Lengenfelder, Anja; Leonard, Chris; Mele, Salvatore; Nowicka, Malgorzata; Polydoratou, Panayiota; Ross, David; Ruiz-Perez, Sergio; Schimmer, Ralf; Swaisland, Mark; van der Stelt, Wim

    2011-01-01

    The SOAP (Study of Open Access Publishing) project has analyzed the current supply and demand situation in the open access journal landscape. Starting from the Directory of Open Access Journals, several sources of data were considered, including journal websites and direct inquiries within the publishing industry to comprehensively map the present supply of online peer-reviewed OA journals. The demand for open access publishing is summarised, as assessed through a large-scale survey of researchers' opinions and attitudes. Some forty thousand answers were collected across disciplines and around the world, reflecting major support for the idea of open access, while highlighting drivers of and barriers to open access publishing.

  8. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    Attribute-based access control (ABAC) and role-based access control (RBAC) are currently the two most popular access control models. Yet, they both have known limitations and offer features com- plimentary to each other. Due to this fact, integration of RBAC and ABAC has recently emerged as an im......Attribute-based access control (ABAC) and role-based access control (RBAC) are currently the two most popular access control models. Yet, they both have known limitations and offer features com- plimentary to each other. Due to this fact, integration of RBAC and ABAC has recently emerged...

  9. The Market Access Society launches a new journal

    OpenAIRE

    Toumi, Mondher

    2013-01-01

    Welcome to the Journal of Market Access and Health Policy!The Journal of Market Access and Health Policy (JMAHP) is the first peer-reviewed journal solely dedicated to Market Access. JMAHP is an Open Access Journal and the official organ of the Market Access Society (MAS). It aims at conveying transparency and consolidating knowledge around the market access research area, engaging in a forum of debate to support an international dialogue, with the overall goal to be the reference desk in mar...

  10. Open Access and the Developing World

    Institute of Scientific and Technical Information of China (English)

    Subbiah Arunachalam

    2006-01-01

    Till about 15 years ago, almost all information exchange among scientists and scholars was mediated by print and even then researchers in the developing countries were at a great disadvantage as their libraries did not have the resources to subscribe in comparison with even a small fraction of journals libraries in advanced countries. But the Internet and the Word Wide Web initially exacerbated the gap between the rich and the poor countries, as many poor countries were slow to acquire these technologies and the infrastructure (especially bandwidth). Soon it became clear that thanks to these technologies we now have the unprecedented opportunity of having a level playing field in the matter of accessing scientific and scholarly information. Transforming this opportunity into reality is entirely in the hands of the researchers themselves. Imagine a word where every scientist places his/her research papers, which (s)he wants to give away so others can read and make use of, in a public archive. Anyone anywhere in the world, of course having an Internet connection, can access, download, and read those papers. This is a win-win situation for all: the reader gets to read what he wants to read at very little cost; the author gains greater visibility for his work and the work reported is likely to have greater impact than if it were to be made available only through a toll-access journal. Although the logic is so simple, in reality such archives were not coming up for a very long time. In spite of the fact that computer scientists and physicists had shown about 15 years ago the great advantages of such archives. Recent studies by Alma Swan and others have shown that a very large proportion of scientists are not aware of open access and therefore what we need is focused advocacy. Even among those who know of OA, many are not depositing their papers in archives but say they would if they are asked by their bosses or their funding agencies. Clearly the ball is in the court of

  11. Identity And Access Management e Federazione

    Directory of Open Access Journals (Sweden)

    Virginia Calabritto

    2012-07-01

    Full Text Available ItLa rete telematica è in costante crescita e così i servizi online che, in modo sempre più penetrante, rappresentano un aspetto della nostra quotidianità. I servizi in rete si distinguono in servizi ad accesso libero e servizi ad accesso controllato. Ogni giorno studenti, ricercatori e docenti accedono a contenuti e servizi (risorse ad accesso controllato con modalità diverse, la più diffusa è l'utilizzo dell‘informazione utenza/password, informazione diversa per ciascuna risorsa. Da questo punto di vista l’ampia disponibilità di risorse in rete crea all’utente, ma non solo a lui, diversi problemi, non ultimo quello della memorizzazione di un numero sempre più ampio di coppie utenza/password.L’articolo è teso ad illustrare, nel dettaglio, scenario e problematiche per passare quindi ad accennare alle tecnologie che possono costituire una soluzione, ovvero, l'Identity Management, il Single Sign On e le federazioni di infrastrutture di autenticazione e autorizzazione e, quindi, a degli esempi tra cui IDEM, la prima federazione italiana di Infrastrutture di Autenticazione e Autorizzazione, che coinvolge gli enti della comunità scientifica ed accademica e i fornitori di servizi.EnThe Internet is constantly growing, therefore on-line services, are becoming part of our daily life in a more and more pervasive manner. The network services are divided into two types of access: free access and controlled access. Every day students, researchers and teachers access content and services (resources through controlled access using different modes, e.g using user / password information which is different for each resource. From this perspective, the large availability of networked resources generates many problems for the users, last but not least the inconvenience of storing an increasing number of user / password.The article aims to illustrate, in detail, the context and the problems related to the management of a digital identiy in the

  12. Phylogenetic diversity of fungal communities in areas accessible and not accessible to tourists in Naracoorte Caves.

    Science.gov (United States)

    Adetutu, Eric M; Thorpe, Krystal; Bourne, Steven; Cao, Xiangsheng; Shahsavari, Esmaeil; Kirby, Greg; Ball, Andrew S

    2011-01-01

    The fungal diversity in areas accessible and not accessible to tourists at UNESCO World Heritage-listed Naracoorte Caves was investigated with culture-dependent and culture-independent techniques for assistance in cave management protocol development. The caves were selected based on tourist numbers and configurations: Stick Tomato (open, high numbers), Alexandra (lockable openings, high numbers) and Strawhaven (control; no access). Culture-based survey revealed Ascomycota dominance irrespective of sampling area with Microascales (Trichurus sp.) being most frequently isolated. Some Hypocreales-like sequences belonging to Fusarium sp., Trichoderma sp. and Neonectria sp. (Stick Tomato) were cultured only from areas not accessible to tourists. These orders also were detected by DGGE assay irrespective of sampling area. The predominance of Ascomycota (especially Microascales) suggested their important ecological roles in these caves. Culture-independent analysis showed higher Shannon fungal diversity values (from ITS-based DGGE profiles) in tourist-accessible areas of these caves than in inaccessible areas with the fungal community banding patterns being substantially different in Stick Tomato Cave. Further investigations are needed to determine the cause of the differences in the fungal communities of Stick Tomato Cave, although cave-related factors such as use, configuration and sediment heterogeneity might have contributed to these differences. PMID:21642344

  13. Access to Parks for Youth as an Environmental Justice Issue: Access Inequalities and Possible Solutions

    Directory of Open Access Journals (Sweden)

    Alessandro Rigolon

    2014-04-01

    Full Text Available Although repeated contact with nature helps foster mental and physical health among young people, their contact with nature has been diminishing over the last few decades. Also, low-income and ethnic minority children have even less contact with nature than white middle-income children. In this study, we compared accessibility to play in parks for young people from different income and racial backgrounds in Denver, Colorado. Park access for children and youth was measured using a geographic information system (GIS. Each neighborhood was classified according to income level, residential density, and distance from downtown; and then each park was classified based on formal and informal play, and level of intimacy. Comparisons between neighborhoods show that that low-income neighborhoods have the lowest access and high-income neighborhoods have the highest access to parks, and that differences are even higher for parks with play amenities and high levels of intimacy. To overcome this issue, the paper proposes a framework for action to improve access to parks for low-income children and youth and to help planners, decision makers and advocacy groups prioritize park investments.

  14. Transcatheter aortic valve implantation: the transfemoral access route is the default access.

    Science.gov (United States)

    Stortecky, Stefan; O'Sullivan, Crochan J; Buellesfeld, Lutz; Windecker, Stephan; Wenaweser, Peter

    2013-09-10

    Transcatheter aortic valve implantation (TAVI) is a widely accepted alternative to surgical aortic valve replacement (SAVR) among non-operable patients or selected high-risk patients with degenerative, severe aortic stenosis. TAVI is considered less invasive when compared with SAVR; however, there remain significant differences between different TAVI access routes. The transfemoral approach is considered the least invasive access route, and can be performed as a fully percutaneous procedure in a spontaneously breathing patient under local anaesthesia and mild sedation only. Moreover, transfemoral TAVI patients are typically transferred to coronary care rather than to an intensive care unit after the procedure, and benefit from early ambulation and a reduction in overall length of hospital stay. Considering these patient-specific and health-economic advantages, several TAVI centres follow the least invasive strategy for their patients and have implemented the transfemoral access route as the default access in their institutions. This article provides an overview on the prerequisites for a successful transfemoral TAVI procedure, describes the procedural advantages compared to alternative access routes, and highlights differences in clinical outcomes. PMID:24025952

  15. On the golden road Open access publishing in particle physics

    CERN Document Server

    CERN. Geneva; Yeomans, Joanne

    2007-01-01

    The particle physics community has over the last 15 years achieved so-called full green open access through the wide dissemination ofpreprints via arXiv, a central subject repository managed by Cornell University. However, green open access does not alleviate the economical difficulties of libraries as these still are expected to offer access to versions of record of the peer-reviewed literature. For this reason the particle physics community is now addressing the issue of gold open access by converting a set of the existing core journals to open access. A working party works now to bring together funding agencies, laboratories and libraries into a single consortium, called SCOAP3 (Sponsoring Consortium for Open access Publishing in Particle Physics). This consortium will engage with publishers towards building a sustainable model for open access publishing. In this model, subscription fees from multiple institutions are replaced with contracts with publishers of open access journals where the SCOAP3 consorti...

  16. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  17. From the editor's desk: Benefits of open-access publishing

    OpenAIRE

    Heller, Matthew; Moshiri, Mariam; Bhargava, Puneet

    2015-01-01

    Open-access publishing, which removes monetary and legal restrictions from Internet reading, provides benefits for readers and publishers alike. Radiology Case Reports has used an open-access publishing model from its inception.

  18. Walk-In Hunting Access (WIHA) Fall 2011

    Data.gov (United States)

    Kansas Data Access and Support Center — This shapefile represents the private lands leased by the Kansas Department of Wildlife, Parks and Tourism (KDWPT) for fall 2011 public hunting access through the...

  19. Walk-In Hunting Access (WIHA) Fall 2008

    Data.gov (United States)

    Kansas Data Access and Support Center — This shapefile represents the private lands leased by the Kansas Department of Wildlife and Parks for fall 2008 public hunting access through the Walk-In Hunting...

  20. 28 CFR 16.41 - Requests for access to records.

    Science.gov (United States)

    2010-07-01

    ... the Government Printing Office's World Wide Web site (which can be found at http://www.access.gpo.gov... accessed electronically at the Government Printing Office's World Wide Web site (which can be found at...

  1. Walk-In Hunting Access (WIHA) Fall 2009

    Data.gov (United States)

    Kansas Data Access and Support Center — This shapefile represents the private lands leased by the Kansas Department of Wildlife and Parks for fall 2009 public hunting access through the Walk-In Hunting...

  2. Walk-In Hunting Access (WIHA) Fall 2010

    Data.gov (United States)

    Kansas Data Access and Support Center — This shapefile represents the private lands leased by the Kansas Department of Wildlife and Parks for fall 2010 public hunting access through the Walk-In Hunting...

  3. On the golden road : Open access publishing in particle physics

    CERN Document Server

    CERN. Geneva

    2007-01-01

    The particle physics community has over the last 15 years achieved so-called full green open access through the wide dissemination ofpreprints via arXiv, a central subject repository managed by Cornell University. However, green open access does not alleviate the economical difficulties of libraries as these still are expected to offer access to versions of record of the peer-reviewed literature. For this reason the particle physics community is now addressing the issue of gold open access by converting a set of the existing core journals to open access. A working party works now to bring together funding agencies, laboratories and libraries into a single consortium, called SCOAP3 (Sponsoring Consortium for Open access Publishing in Particle Physics). This consortium will engage with publishers towards building a sustainable model for open access publishing. In this model, subscription fees from multiple institutions are replaced with contracts with publishers of open access journals where the SCOAP3 consort...

  4. Improving Access to Foundational Energy Performance Data

    Energy Technology Data Exchange (ETDEWEB)

    Studer, D.; Livingood, W.; Torcellini, P.

    2014-08-01

    Access to foundational energy performance data is key to improving the efficiency of the built environment. However, stakeholders often lack access to what they perceive as credible energy performance data. Therefore, even if a stakeholder determines that a product would increase efficiency, they often have difficulty convincing their management to move forward. Even when credible data do exist, such data are not always sufficient to support detailed energy performance analyses, or the development of robust business cases. One reason for this is that the data parameters that are provided are generally based on the respective industry norms. Thus, for mature industries with extensive testing standards, the data made available are often quite detailed. But for emerging technologies, or for industries with less well-developed testing standards, available data are generally insufficient to support robust analysis. However, even for mature technologies, there is no guarantee that the data being supplied are the same data needed to accurately evaluate a product?s energy performance. To address these challenges, the U.S. Department of Energy funded development of a free, publically accessible Web-based portal, the Technology Performance Exchange(TM), to facilitate the transparent identification, storage, and sharing of foundational energy performance data. The Technology Performance Exchange identifies the intrinsic, technology-specific parameters necessary for a user to perform a credible energy analysis and includes a robust database to store these data. End users can leverage stored data to evaluate the site-specific performance of various technologies, support financial analyses with greater confidence, and make better informed procurement decisions.

  5. Frontier HED Science accessible on NIF

    International Nuclear Information System (INIS)

    With the advent of high-energy-density (HED) experimental facilities, such as high-energy lasers and fast Z-pinch pulsed-power facilities, millimeter-scale quantities of matter can be placed in extreme states of density, temperature, and/or velocity. With the commissioning of the NIF laser facility in the very near future, regimes experimentally accessible will be pushed to even higher densities and pressures. This is enabling the emergence of a new class of experimental science, wherein the properties of matter and the processes that occur under the most extreme physical conditions can be examined in the laboratory. Areas particularly suitable to laboratory astrophysics include the study of opacities relevant to stellar interiors, equations of state relevant to planetary interiors, strong shock-driven nonlinear hydrodynamics and radiative dynamics relevant to supernova explosions and subsequent evolution, protostellar jets and high Mach number flows, radiatively driven molecular clouds, nonlinear photoevaporation front dynamics, and photoionized plasmas relevant to accretion disks around compact objects such as black holes and neutron stars. In the area of materials science and condensed matter physics, material properties such as phase, elastic coefficients such as shear modulus, Peierls stress, and transport coefficients such as thermal diffusivity can be accessed at considerably higher densities and pressure than any existing data. In the field of nonlinear optical phenomena, NIF will be an unparalleled setting for studying the nonlinear interactions of a ''statistical ensemble'' of 100 high power beams in large volumes of plasma. In the area of nuclear physics, nuclear reaction rates in dense, highly screened plasmas and on ignition implosions, reactions from excited nuclear states via multi-hit reactions should be possible. A selection from this frontier HED science accessible on NIF will be presented

  6. Point & Counterpoint Is CC BY the Best Open Access License?

    OpenAIRE

    Sanford Thatcher; Klaus Graf

    2012-01-01

    The only aim of scholarly communication should be the widest possible distribution of knowledge and scholarly results. In order for this to be possible, published research—which scholars give away for free to publishers—should be open access. And in this context, “gratis” open access (free to access) isn’t enough; only “libre” open access, which removes permission barriers, allows the widest distribution of knowledge.

  7. Open versus Controlled-Access Data | Office of Cancer Genomics

    Science.gov (United States)

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  8. Optical technologies in extended-reach access networks

    DEFF Research Database (Denmark)

    Wong, Elaine; Amaya Fernández, Ferney Orlando; Tafur Monroy, Idelfonso

    2009-01-01

    The merging of access and metro networks has been proposed as a solution to lower the unit cost of customer bandwidth. This paper reviews some of the recent advances and challenges in extended-reach optical access networks.......The merging of access and metro networks has been proposed as a solution to lower the unit cost of customer bandwidth. This paper reviews some of the recent advances and challenges in extended-reach optical access networks....

  9. Authentication Issues in Multi-Service Residential Access Networks

    OpenAIRE

    Rossebo, Judith; Ronan, John; Walsh, Kristian

    2003-01-01

    Multi-service residential access networks allow residential customers to choose amongst a variety of service offerings, over a range of Core Networks and subject to user requirements such as QoS, mobility, cost and availability. These issues place requirements on authentication for network access, with a need for mutual authentication of the residential gateway (RG) to the local access point (LAP). The EU-IST project TORRENT is building a testbed providing for multi-service residential access...

  10. Public coastal access in Nova Scotia's coastal strategy

    OpenAIRE

    Joshua Kelly Mackintosh

    2011-01-01

    Public coastal access is an issue that affects coastal communities and coastal populations worldwide. One such place where public coastal access is of particular relevance is the Province of Nova Scotia, Canada where the government is developing a provincial Coastal Strategy to address priority coastal management issues, one of which is public coastal access. This study examines best practices in public coastal access in selected US States and their potential application in study areas in Nov...

  11. Resource description and access 2013 revision

    CERN Document Server

    2013-01-01

    This e-book contains the 2013 Revision of RDA: Resource Description and Access, and includes the July 2013 Update. This e-book offers links within the RDA text and the capability of running rudimentary searches of RDA, but please note that this e-book does not have the full range of content or functionality provided by the subscription product RDA Toolkit. Included: A full accumulation of RDA- the revision contains a full set of all current RDA instructions. It replaces the previous version of RDA Print as opposed to being an update packet to that version. RDA has gone through many changes sin

  12. Mobile App to Assess Universal Access Compliance.

    Science.gov (United States)

    Fransolet, Colette

    2016-01-01

    In terms of local legislation, South Africa has a handful of regulations that indirectly require Universal Access, which is then in itself largely described as facilities for people with disabilities. The most predominant set of regulations is the South African National Building Regulations, with a specific code which is deemed to satisfy standard titled South African National Standard (SANS) 10400 Part S: Facilities for Persons with Disabilities. Revised in 2011, this building regulation offers some technical guidelines specific to built infrastructure, and largely for people with functional mobility limitations. The description of the term "functional mobility limitations" in the context of this paper refers to people who make use of mobility aids to assist with their functionality in an environment, for example people who use walking aids (sticks, canes or walkers) and people who use wheelchairs. Albeit lacking in specifics around the requirements for other areas of functional limitations, including people who are blind, people who are deaf, and people with cognitive limitations, the SANS 10400 Part S is, to date, the most effective regulatory requirement in the country to assist with making facilities more accessible. With only a few experts in South Africa working in the field, the ability to offer clients Universal Access Reviews in terms of basic compliance with the SANS 10400 Part S is limited by two major factors. Firstly, the costs associated with employing experts in the field to review infrastructure is mostly too exorbitant for clients to carry. Secondly, the amount of time taken to perform reviews onsite and then collate the information into a coherent report for the client is far too long. These aspects result in a gap between clients wanting to meet the requirements, and being able to have the work completed in a reasonable amount of time. To overcome the challenge of larger institutions and organizations wanting to have their facilities reviewed in

  13. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  14. Youth tobacco access: trends and policy implications

    OpenAIRE

    Gendall, Philip; Hoek, Janet; Marsh, Louise; Edwards, Richard; Healey, Benjamin

    2014-01-01

    Objective We examined whether the supply routes via which New Zealand adolescents aged 14–15 years accessed tobacco had changed during a period of dynamic policy activity. Setting We analysed data from seven consecutive years (2006–2012) of the New Zealand Action on Smoking and Health (ASH) Year 10 survey, a nationwide cross-sectional annual survey. Participants All New Zealand schools teaching Year 10 students are invited to participate in the survey; school-level participation rates have ra...

  15. Open-access microcavities for chemical sensing

    Science.gov (United States)

    Vallance, Claire; Trichet, Aurelien A. P.; James, Dean; Dolan, Philip R.; Smith, Jason M.

    2016-07-01

    The recent development of open-access optical microcavities opens up a number of intriguing possibilities in the realm of chemical sensing. We provide an overview of the different possible sensing modalities, with examples of refractive index sensing, optical absorption measurements, and optical tracking and trapping of nanoparticles. The extremely small mode volumes within an optical microcavity allow very small numbers of molecules to be probed: our current best detection limits for refractive index and absorption sensing are around 105 and 102 molecules, respectively, with scope for further improvements in the future.

  16. Accessibility: Definition, Labeling, and CVAA impact

    DEFF Research Database (Denmark)

    Brooks, Tony

    by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...... platforms; and games software. However, the CVAA has no legal status in the EU. This text succinctly introduces and questions implications, impact, and wider adoption. By presenting the full CVAA and game industry waiver the text targets to motivate discussions and further publications on the subject...

  17. Access to Housing in Urban China.

    Science.gov (United States)

    Logan, John R; Fang, Yiping; Zhang, Zhanxin

    2009-12-01

    Like income inequality, housing inequality in urban China is strongly affected by state policies that give preferential treatment to insiders. In this case, the key policies are related to their residence status, which involves not only their migration history but also their legal position. Using data from the Chinese census of 2000 for eight large cities, this study shows how residence status affects access to various pathways to housing. In addition to the well-known marginal housing situation of the recent 'floating population', it documents surprising advantages for migrants with urban registration status and persistent disadvantages for rural migrants regardless of how long they have lived in the city. PMID:23976818

  18. Text转换为Access MDB

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    Text文件类型在很多软件中都为一般应用程序与数据库之间架起一座桥梁,你可以使用Text ISAM驱动程序和SQL来把Text文件转换成Access MDB数据库文件。首先为文本文件创建一个SCHEMA.INI文件,然后使用下面的代码来实现转换:

  19. Unequal Access to Employment, Unequal Capabilities

    OpenAIRE

    Farvaque, Nicolas

    2013-01-01

    Introduction Access to employment is a dynamical process. The extent of freedom of choice and opportunity sets people have is crucial in this process. Going from school to work indeed is a matter of having opportunities and of making choices. But this process is also constrained by existing structures and by other people’s choices in the labour market. Being able to get a job is not an individual search issue only: it involves recruiters’ forms of judgement on the candidate’s qualities, and l...

  20. Radio resource allocation and dynamic spectrum access

    CERN Document Server

    Benmammar , Badr

    2013-01-01

    We are currently witnessing an increase in telecommunications norms and standards given the recent advances in this field. The increasing number of normalized standards paves the way for an increase in the range of services available for each consumer. Moreover, the majority of available radio frequencies have already been allocated. This explains the emergence of cognitive radio (CR) - the sharing of the spectrum between a primary user and a secondary user.In this book, we will present the state of the art of the different techniques for spectrum access using cooperation and competit