WorldWideScience

Sample records for continued access protect

  1. Accessing and disclosing protected resources

    DEFF Research Database (Denmark)

    Olesen, Henning; Khajuria, Samant

    2015-01-01

    Today, data is money. Whether it is private users' personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization measures to be deployed. Enabling...... advanced user controlled privacy is essential to realize the visions of 5G applications and services. For service providers and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user...... the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources and possibly give them control of how their data will be used by service providers....

  2. Accessing and disclosing protected resources

    DEFF Research Database (Denmark)

    Olesen, Henning; Khajuria, Samant

    2014-01-01

    TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers and enterpr......TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers...... and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user’s personal data have become an economic asset, not necessarily to the owners of these data, but to the service providers, whose...... business mod- els often includes the use of these data. In this paper we focus on the user – service provider interaction and discuss how recent technological progress, in particular the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources...

  3. 15 CFR 923.24 - Shorefront access and protection planning.

    Science.gov (United States)

    2010-01-01

    ... allowable under state law or constitutional provisions, and an identification of public areas meeting that... “beach” and a planning process for the protection of, and access to, public beaches and other public... access and protection that the State's planning process indicates is necessary. ...

  4. Approved but non-funded vaccines: accessing individual protection.

    Science.gov (United States)

    Scheifele, David W; Ward, Brian J; Halperin, Scott A; McNeil, Shelly A; Crowcroft, Natasha S; Bjornson, Gordean

    2014-02-07

    Funded immunization programs are best able to achieve high participation rates, optimal protection of the target population, and indirect protection of others. However, in many countries public funding of approved vaccines can be substantially delayed, limited to a portion of the at-risk population or denied altogether. In these situations, unfunded vaccines are often inaccessible to individuals at risk, allowing potentially avoidable morbidity and mortality to continue to occur. We contend that private access to approved but unfunded vaccines should be reconsidered and encouraged, with recognition that individuals have a prerogative to take advantage of a vaccine of potential benefit to them whether it is publicly funded or not. Moreover, numbers of "approved but unfunded" vaccines are likely to grow because governments will not be able to fund all future vaccines of potential benefit to some citizens. New strategies are needed to better use unfunded vaccines even though the net benefits will fall short of those of funded programs. Canada, after recent delays funding several new vaccine programs, has developed means to encourage private vaccine use. Physicians are required to inform relevant patients about risks and benefits of all recommended vaccines, publicly funded or not. Likewise, some provincial public health departments now recommend and promote both funded and unfunded vaccines. Pharmacists are key players in making unfunded vaccines locally available. Professional organizations are contributing to public and provider education about unfunded vaccines (e.g. herpes zoster, not funded in any province). Vaccine companies are gaining expertise with direct-to-consumer advertising. However, major challenges remain, such as making unfunded vaccines more available to low-income families and overcoming public expectations that all vaccines will be provided cost-free, when many other recommended personal preventive measures are user-pay. The greatest need is to

  5. Photovoltaic power without batteries for continuous cathodic protection

    Science.gov (United States)

    Muehl, W. W., Sr.

    1994-02-01

    The COASTSYSTA designed, installed, and started up on 20 Jan. 1990, a state-of-the-art stand alone photovoltaic powered impressed current cathodic protection system (PVCPSYS) not requiring any auxiliary/battery backup power for steel and iron submerged structures. The PVCPSYS installed on 775' of steel sheet piling of a Navy bulkhead is continuing to provide complete, continuous corrosion protection. This has been well documented by COASTSYSTA and verified on-site by the U.S. Army Civil Engineering Research Laboratory, Champaign, Illinois and the Navy Energy Program Office-Photovoltaic Programs, China Lake, California. The Department of Defense (DoD) Photovoltaic Review Committee and Sandia National Laboratories consider this successful and cost effective system a major advance in the application of photovoltaic power. The PVCPSYS uses only renewable energy and is environmentally clean. A patent is pending on the new technology. Other possible PVCPSYS applications are mothballed ships, docks, dams, locks, bridges, marinas, offshore structures, and pipelines. The initial cost savings by installing a PVCPSYS vs. a conventional CP system was in excess of $46,000.00.

  6. 77 FR 12284 - Access to Confidential Business Information; Protection Strategies Incorporated

    Science.gov (United States)

    2012-02-29

    ... Business Information; Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized its contractor, Protection Strategies Incorporated (PSI) of... Business Information (CBI). DATES: Access to the confidential data occurred on or about February 16, 2012...

  7. Protection of continued economic existence and major changes. 1. paper

    International Nuclear Information System (INIS)

    Backherms, J.

    1980-01-01

    On the issue of protecting continued economic existence according to Sect. 18 of the Atomic Energy Law, a difference is made between changes occurring in the environment of the plant, in the existing knowledge in science and technology, and changes occurring in the safety philosophy held by the authorities. In case of conditions being subsequently imposed because of a change in the existing knowledge in science and technology, the liability of the authorities to pay compensation is ruled out according to Sect. 18, para. 2 No. 3 of the Atomic Energy Law. The difference made between a change in the safety philosophy held by the authorities and a change in the existing knowledge in science and technology seems to be obvious. In the first case it is a matter of changing the legal evaluation of unchanged technological findings, in the legal evaluation, however, the licence granted has to have a lasting effect on principle. (HP) [de

  8. Eu accession to the ECHR: Enlarging the human rights protection in Europe

    Directory of Open Access Journals (Sweden)

    Krstić Ivana

    2016-01-01

    Full Text Available This paper deals with the importance of the EU accession to the ECHR, as the most significant regional instrument for human rights protection. The paper outlines the evolution of the idea of the accession to the ECHR, different stages of that process, as well as a Draft agreement which attempted to resolve some complex legal issues relating to the specific nature of the EU legal system. In the second part of this paper, the Opinion 2/13 of the CJEU from December 2014 has been analyzed, which basically interrupted the entire accession process. It is noted that currently the ECtHR has only an indirect constitutional control over the EU's legal order by examining laws of the Member States. The EU accession to the ECHR would allow examination of all acts and measures in the EU from the human rights perspective, including those over which the CJEU does not have full oversight function. Therefore, the authors argue that due to the establishment of legal certainty and external control over acts of the EU institutions, it is necessary to find a way for the continuation of the accession process, as soon as possible. There are two possible scenarios: a re-negotiation of the agreement on accession, or modification of the EU Treaties. Both solutions seem almost impossible in the created political milieu. However, there is a hope that negotiations will continue due to the influence of the Avotiņš judgment from May 2016 in which the ECtHR upheld the principle of equal protection from the Bosphorus case, pointing to the importance of maintaining mutual trust between two courts, as well as the need for the establishment of greater credibility and EU strengthening after Brexit.

  9. The continued movement for open access to peer-reviewed literature.

    Science.gov (United States)

    Liesegang, Thomas J

    2013-09-01

    To provide a current overview of the movement for open access to the peer review literature. Perspective. Literature review of recent advances in the open access movement with a personal viewpoint of the nuances of the movement. The open access movement is complex, with many different constituents. The idealists for the open access movement are seeking open access to the literature but also to the data that constitute the research within the manuscript. The business model of the traditional subscription journal is being scrutinized in relation to the surge in the number of open access journals. Within this environment authors should beware predatory practices. More government and funding agencies are mandating open access to their funded research. This open access movement will continue to be disruptive until a business model ensures continuity of the scientific record. A flood of open access articles that might enrich, but also might pollute or confuse, the medical literature has altered the filtering mechanism provided by the traditional peer review system. At some point there may be a shake-out, with some literature being lost in cyberspace. The open access movement is maturing and must be embraced in some format. The challenge is to establish a sustainable financial business model that will permit the use of digital technology but yet not endanger the decades-old traditional publication model and peer review system. Authors seem to be slower in adopting open access than the idealists in the movement. Copyright © 2013 Elsevier Inc. All rights reserved.

  10. Analytical resource assessment method for continuous (unconventional) oil and gas accumulations - The "ACCESS" Method

    Science.gov (United States)

    Crovelli, Robert A.; revised by Charpentier, Ronald R.

    2012-01-01

    The U.S. Geological Survey (USGS) periodically assesses petroleum resources of areas within the United States and the world. The purpose of this report is to explain the development of an analytic probabilistic method and spreadsheet software system called Analytic Cell-Based Continuous Energy Spreadsheet System (ACCESS). The ACCESS method is based upon mathematical equations derived from probability theory. The ACCESS spreadsheet can be used to calculate estimates of the undeveloped oil, gas, and NGL (natural gas liquids) resources in a continuous-type assessment unit. An assessment unit is a mappable volume of rock in a total petroleum system. In this report, the geologic assessment model is defined first, the analytic probabilistic method is described second, and the spreadsheet ACCESS is described third. In this revised version of Open-File Report 00-044 , the text has been updated to reflect modifications that were made to the ACCESS program. Two versions of the program are added as appendixes.

  11. 75 FR 47464 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-08-06

    ... Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies AGENCY: Copyright... nonsubstantial correction to its regulation announcing the prohibition against circumvention of technological... the final rule governing exemption to prohibition on circumvention of copyright protection systems for...

  12. Measuring patient-centered medical home access and continuity in clinics with part-time clinicians.

    Science.gov (United States)

    Rosland, Ann-Marie; Krein, Sarah L; Kim, Hyunglin Myra; Greenstone, Clinton L; Tremblay, Adam; Ratz, David; Saffar, Darcy; Kerr, Eve A

    2015-05-01

    Common patient-centered medical home (PCMH) performance measures value access to a single primary care provider (PCP), which may have unintended consequences for clinics that rely on part-time PCPs and team-based care. Retrospective analysis of 110,454 primary care visits from 2 Veterans Health Administration clinics from 2010 to 2012. Multi-level models examined associations between PCP availability in clinic, and performance on access and continuity measures. Patient experiences with access and continuity were compared using 2012 patient survey data (N = 2881). Patients of PCPs with fewer half-day clinic sessions per week were significantly less likely to get a requested same-day appointment with their usual PCP (predicted probability 17% for PCPs with 2 sessions/week, 20% for 5 sessions/week, and 26% for 10 sessions/week). Among requests that did not result in a same-day appointment with the usual PCP, there were no significant differences in same-day access to a different PCP, or access within 2 to 7 days with patients' usual PCP. Overall, patients had >92% continuity with their usual PCP at the hospital-based site regardless of PCP sessions/week. Patients of full-time PCPs reported timely appointments for urgent needs more often than patients of part-time PCPs (82% vs 71%; P Part-time PCP performance appeared worse when using measures focused on same-day access to patients' usual PCP. However, clinic-level same-day access, same-week access to the usual PCP, and overall continuity were similar for patients of part-time and full-time PCPs. Measures of in-person access to a usual PCP do not capture alternate access approaches encouraged by PCMH, and often used by part-time providers, such as team-based or non-face-to-face care.

  13. Impact of the 'Providing Access to Continued Education' Programme on Repeat Teenage Pregnancy in the Bahamas.

    Science.gov (United States)

    Sakharkar, V P; Frankson, M A; Sakharkar, P R

    2015-05-15

    To determine the relationship of determinants such as age, ethnicity, education and sexual behaviour with repeat teenage pregnancy and to determine the impact of 'Providing Access to Continued Education' (PACE) programme in reducing repeat teenage pregnancy amongst its participants in The Bahamas. This retrospective cohort study included 397 attendees of the Adolescent Health Centre (AHC). Eighty-eight out of 139 registered participants completed the PACE programme. Data on age, ethnicity, education, sexual behaviour and repeat pregnancy in two years were analysed for descriptive statistics, and association of demographic characteristics and participation in the PACE programme with repeat pregnancy using the Chi-squared test. Mean age of participants was 16.4 ± 1.1 years; median school grade and mean grade point average (GPA) was 11 and 1.97 ± 0.7, respectively. The mean age at the first sexual activity was 14.9 ± 1.2 years. The mean age and number of sexual partners were 21 ± 4.3 years and 2 ± 1, respectively. Overall, repeat pregnancy rate was 39%: 37.4% amongst PACE registered and 31.8% amongst PACE completed mothers. No significant difference was observed in repeat pregnancy between registered and non-registered as well as those who completed the programme and those who did not. The odds ratio of 0.525 suggested that completion of the PACE programme had a moderate protective effect on reducing repeat pregnancy. Age, ethnicity, education and sexual behaviour showed no association with repeat pregnancy. The PACE programme did not reduce repeat pregnancy rate significantly. However, completion of the programme offered a moderate protection.

  14. 42 CFR 3.208 - Continued protection of patient safety work product.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Continued protection of patient safety work product... GENERAL PROVISIONS PATIENT SAFETY ORGANIZATIONS AND PATIENT SAFETY WORK PRODUCT Confidentiality and Privilege Protections of Patient Safety Work Product § 3.208 Continued protection of patient safety work...

  15. Continuing dental education in radiation protection: monitoring the outcomes.

    Science.gov (United States)

    Absi, Eg; Drage, Na; Thomas, Hs; Newcombe, Rg; Nash, Es

    2009-03-01

    To evaluate an evolving radiation protection dental postgraduate course run in Wales between 2003 and 2007. We compared three standardized course series. Course content was enhanced in 2006 to target areas of weakness. In 2007, a single best answer multiple choice questionnaire instrument superseded a true/false format. Practitioners' performance was studied pre- and immediately post-training. 900 participants completed identical pre- and post-course validated multiple choice questionnaires. 809 (90%) paired morning-afternoon records, including those of 52 dental care professionals (DCPs), were analysed. Mean (standard error) pre- and post-course percentage scores for the three courses were 33.8 (0.9), 35.4 (1.4), 34.6 (1.0) and 63.6 (0.9), 59.0 (1.4), 69.5 (0.9). Pre-training, only 2.4%, 3.1% and 4.9% of participants achieved the pass mark compared to 57.7%, 48.4% and 65.9% post-training, indicating a rather greater pass rate and gain in the most recent series than earlier ones. In recent series, older more experienced candidates scored slightly higher; however, their gain from pre- to post-training was slightly less. Baseline levels of radiation protection knowledge remained very low but attending an approved course improved this considerably. Targeting areas of weaknesses produced higher scores. Current radiation protection courses may not be optimal for DCPs.

  16. Continuing training program in radiation protection in biological research centers

    International Nuclear Information System (INIS)

    Escudero, R.; Hidalgo, R.M.; Usera, F.; Macias, M.T.; Mirpuri, E.; Perez, J.; Sanchez, A.

    2008-01-01

    The use of ionizing radiation in biological research has many specific characteristics. A great variety of radioisotopic techniques involve unsealed radioactive sources, and their use not only carries a risk of irradiation, but also a significant risk of contamination. Moreover, a high proportion of researchers are in training and the labor mobility rate is therefore high. Furthermore, most newly incorporated personnel have little or no previous training in radiological protection, since most academic qualifications do not include training in this discipline. In a biological research center, in addition to personnel whose work is directly associated with the radioactive facility (scientific-technical personnel, operators, supervisors), there are also groups of support personnel The use of ionizing radiation in biological research has many specific characteristics. A great variety of radioisotopic techniques involve unsealed radioactive sources, and their use not only carries a risk of irradiation, but also a significant risk of contamination. Moreover, a high proportion of researchers are in training and the labor mobility rate is therefore high. Furthermore, most newly incorporated personnel have little or no previous training in radiological protection, since most academic qualifications do not include training in this discipline. In a biological research center, in addition to personnel whose work is directly associated with the radioactive facility (scientific-technical personnel, operators, supervisors), there are also groups of support personnel maintenance and instrumentation workers, cleaners, administrative personnel, etc. who are associated with the radioactive facility indirectly. These workers are affected by the work in the radioactive facility to varying degrees, and they therefore also require information and training in radiological protection tailored to their level of interaction with the installation. The aim of this study was to design a

  17. 7 CFR 1755.508 - Customer access location protection.

    Science.gov (United States)

    2010-01-01

    ... customer access locations are remote from the borrower's headquarters, use of maximum duty gas tube primary... 1 in. = 25.4 mm. (z) Grounding conductors shall be separated from non-telecommunications company... equivalent statement: “Call the telecommunications company if this connector or grounding conductor is loose...

  18. Data Transmission and Access Protection of Community Medical Internet of Things

    Directory of Open Access Journals (Sweden)

    Xunbao Wang

    2017-01-01

    Full Text Available On the basis of Internet of Things (IoT technologies, Community Medical Internet of Things (CMIoT is a new medical information system and generates massive multiple types of medical data which contain all kinds of user identity data, various types of medical data, and other sensitive information. To effectively protect users’ privacy, we propose a secure privacy data protection scheme including transmission protection and access control. For the uplink transmission data protection, bidirectional identity authentication and fragmented multipath data transmission are used, and for the downlink data protection, fine grained access control and dynamic authorization are used. Through theoretical analysis and experiment evaluation, it is proved that the community medical data can be effectively protected in the transmission and access process without high performance loss.

  19. Data Transmission and Access Protection of Community Medical Internet of Things

    OpenAIRE

    Wang, Xunbao; Chen, Fulong; Ye, Heping; Yang, Jie; Zhu, Junru; Zhang, Ziyang; Huang, Yakun

    2017-01-01

    On the basis of Internet of Things (IoT) technologies, Community Medical Internet of Things (CMIoT) is a new medical information system and generates massive multiple types of medical data which contain all kinds of user identity data, various types of medical data, and other sensitive information. To effectively protect users’ privacy, we propose a secure privacy data protection scheme including transmission protection and access control. For the uplink transmission data protection, bidirect...

  20. Legal liabilities in continuing education: protecting your institution and yourself.

    Science.gov (United States)

    Allington, G H; Cava, A

    1988-01-01

    Continuing medical education (CME) activities conducted by medical schools, institutions, or organizations contain inherent liability potentials that should be recognized. Three major areas for potential liability should be carefully regarded by individuals who supervise, organize, or plan educational programs. These are: 1) contract liability--specifically in contracts with hotels, i.e., cancellation clauses, warranties, and indemnifications; 2) liability for ensuring the health and safety of individuals, i.e., fire, security, hazards, emergency procedures, and alcohol at functions; and 3) appropriate and adequate insurance coverage.

  1. E-serials cataloging access to continuing and integrating resources via the catalog and the web

    CERN Document Server

    Cole, Jim

    2014-01-01

    This comprehensive guide examines the state of electronic serials cataloging with special attention paid to online capacities. E-Serials Cataloging: Access to Continuing and Integrating Resources via the Catalog and the Web presents a review of the e-serials cataloging methods of the 1990s and discusses the international standards (ISSN, ISBD[ER], AACR2) that are applicable. It puts the concept of online accessibility into historical perspective and offers a look at current applications to consider. Practicing librarians, catalogers and administrators of technical services, cataloging and serv

  2. On the Protection of Personal Data in the Access Control System

    Directory of Open Access Journals (Sweden)

    A. P. Durakovskiy

    2012-03-01

    Full Text Available The aim is to prove the qualification system of access control systems (ACS as an information system for personal data (ISPDn. Applications: systems of physical protection of facilities.

  3. Policy of Tariff Protection in the Light of WTO Accession

    Directory of Open Access Journals (Sweden)

    MSc. Burim Gashi

    2014-06-01

    Full Text Available Tariff rates are crucial instrument of trade policy. This paper covers several important issues related to the reforms of this area. First part of the paper explains the key features of tariffs as protection instrument: different policy takers and opposite economic interests; benefits and adverse effects; alternative measures of protection; dependence of tariff policy on the development priorities and the welfare effects, etc. This document explains main World Trade Organization requirements concerning protection policy such as primary role of tariffs, restricted set of non-tariff instruments, limited scope of safeguard measures, comparison on the legal development in the field until now, and an indication of further legislation changes necessary in the period of adjustment. It also gives main elements of the customs-reform strategy: choice and concentration of goals and priorities; criteria for preparation of the alternative scenarios; solving convergence problems; defining conditionality for alternative solutions and interdependence of relevant externalities. The goal of the paper is to give recommendation for trade policy reform in our country necessarily to become member of World Trade Organization.

  4. Credit-Card Bill Seeks to Protect Students but Could Limit Their Access to Credit

    Science.gov (United States)

    Field, Kelly

    2009-01-01

    Congress passed legislation last week that would shield students and other consumers from sudden spikes in interest rates and fees, but that could make it harder for young people to access credit to pay for college. The legislation would extend broad new consumer protections to all credit-card holders, offering special protections to college…

  5. Metropolitan natural area protection to maximize public access and species representation

    Science.gov (United States)

    Jane A. Ruliffson; Robert G. Haight; Paul H. Gobster; Frances R. Homans

    2003-01-01

    In response to widespread urban development, local governments in metropolitan areas in the United States acquire and protect privately-owned open space. We addressed the planner's problem of allocating a fixed budget for open space protection among eligible natural areas with the twin objectives of maximizing public access and species representation. Both...

  6. Access to, interest in and attitude toward e-learning for continuous education among Malaysian nurses.

    Science.gov (United States)

    Chong, Mei Chan; Francis, Karen; Cooper, Simon; Abdullah, Khatijah Lim; Hmwe, Nant Thin Thin; Sohod, Salina

    2016-01-01

    Continuous nursing education (CNE) courses delivered through e-learning is believed to be an effective mode of learning for nurses. Implementation of e-learning modules requires pre-assessment of infrastructure and learners' characteristics. Understanding the learners' needs and their perspectives would facilitate effective e-learning delivery by addressing the underlying issues and providing necessary support to learners. The aim of this study was to examine access to computer and Internet facilities, interest in and preferences regarding e-learning, and attitudes toward e-learning among nurses in Peninsular Malaysia. The study utilized a cross-sectional descriptive survey. Government hospitals and community clinics in four main regions of Peninsular Malaysia. A total of 300 registered nurses. Data were collected using questionnaires, which consisted of demographic and background items and questions on access to computer and Internet facilities, interest and preferences in e-learning, and attitudes toward e-learning. Descriptive analysis and a chi-squared test were used to identify associations between variables. Most Malaysian nurses had access to a personal or home computer (85.3%, n=256) and computer access at work (85.3%, n=256). The majority had Internet access at home (84%, n=252) and at work (71.8%, n=215); however, average hours of weekly computer use were low. Most nurses (83%, n=249) did not have an e-learning experience but were interested in e-learning activities. Most nurses displayed positive attitudes toward e-learning. Average weekly computer use and interest in e-learning were positively associated with attitudes toward e-learning. Study findings suggest that organizational support is needed to promote accessibility of information and communications technology (ICT) facilities for Malaysian nurses to motivate their involvement in e-learning. Copyright © 2015. Published by Elsevier Ltd.

  7. Radiation protection service for a nucleonic control system of continuous casting plant after events of accident

    International Nuclear Information System (INIS)

    Chakrabarti, Santanu; Massand, O.P.

    1998-01-01

    Extensive use of nucleonic control systems like level controllers was observed during radiation protection surveys in industries such as refineries, steel plants etc., located in the eastern region of India. There were two accidents at continuous casting plant in 1995 which affected the nucleonic control system installed in 1992. The authorities contacted Bhabha Atomic Research Centre (BARC) for radiation protection surveys for the involved nucleonic gauges. The present paper describes the radiation protection services rendered by BARC during such accidents. (author)

  8. Increasing Access and Usability of Remote Sensing Data: The NASA Protected Area Archive

    Science.gov (United States)

    Geller, Gary N.

    2004-01-01

    Although remote sensing data are now widely available, much of it at low or no-cost, many managers of protected conservation areas do not have the expertise or tools to view or analyze it. Thus access to it by the protected area management community is effectively blocked. The Protected Area Archive will increase access to remote sensing data by creating collections of satellite images of protected areas and packaging them with simple-to-use visualization and analytical tools. The user can easily locate the area and image of interest on a map, then display, roam, and zoom the image. A set of simple tools will be provided so the user can explore the data and employ it to assist in management and monitoring of their area. The 'Phase 1 ' version requires only a Windows-based computer and basic computer skills, and may be of particular help to protected area managers in developing countries.

  9. Continuing Professional Education in Open Access - a French-German Survey

    Directory of Open Access Journals (Sweden)

    Achim Oßwald

    2016-08-01

    Full Text Available While open access (OA has become a significant part of scientific communication and academic publishing, qualification issues have been out of focus in the OA community until recent years. Based on findings about the qualification for OA within university-based programs in France and Germany the authors surveyed continuing professional education activities regarding OA in both countries in the years 2012-2015. The results indicate that there are different types of events qualifying for OA and reveal a lack of coherent concepts for different target groups. Until now traditional presentation formats have been dominant. Formats for distance learning, like MOOCs or webinars, might serve different needs and interests.

  10. [Continuous access to healthcare, a bond of trust with the patient].

    Science.gov (United States)

    Mechali, Denis; Dehaudt, Sylvie; Pintir, Marie-Laure

    2015-10-01

    Working with vulnerable patients who are in precarious situations or sometimes do not speak French raises questions about the caregiver's role. A "Permanence d'Accès aux Soins de Santé" (Pass--Continuous Access to Healthcare) requires patient involvement in their healthcare, communicating honestly and taking into account the various difficulties they are faced with every day, using a holistic approach. A physician and two nurses share their points of view and their way of doing things to ensure that their patients find their unique place as the subject of their healthcare. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  11. 45 CFR 164.524 - Access of individuals to protected health information.

    Science.gov (United States)

    2010-10-01

    ... individual with access to the protected health information in the form or format requested by the individual, if it is readily producible in such form or format; or, if not, in a readable hard copy form or such other form or format as agreed to by the covered entity and the individual. (ii) The covered entity may...

  12. Unesco's Activities to Facilitate Access of Developing Countries to Protected Works.

    Science.gov (United States)

    Alam, A. M. N.

    1979-01-01

    Describes the operational activities of UNESCO to facilitate easy access of developing countries to works protected by copyright. Particular reference is made to collection of data, economic situation, formation of national copyright information centers, copyright data bank services, reprographic reproduction, preparation of model contracts,and…

  13. Development of a wireless protection against imitation system for identification and control of vehicle access

    Directory of Open Access Journals (Sweden)

    Aleksei A. Gavrishev

    2018-03-01

    Full Text Available This article deals with wireless systems for identification and control of vehicle access to protected objects. Known systems are considered. As a result, it has been established that one of the most promising approaches to identifying and controlling vehicle access to protected objects is the use of systems based on the "friend or foe" principle. Among these systems, there are "one-directional" and "bedirectional" identification and access control systems. "Bidirectional" systems are more preferable for questions of identification and access control. However, at present, these systems should have a reduced probability of recognizing the structure of the request and response signals because the potential attacker can easily perform unauthorized access to the radio channel of the system. On this basis, developed a wireless system identification and control vehicle access to protected objects based on the principle of "friend or foe", featuring increased protection from unauthorized access and jamming through the use of rewritable drives chaotic sequences. In addition, it’s proposed to use to identify the vehicle's RFID tag containing additional information about it. Are some specifications of the developed system (the possible frequency range of the request-response signals, the communication range, data rate, the size of the transmitted data, guidelines for choosing RFID. Also, with the help of fuzzy logic, was made the security assessment from unauthorized access request-response signals based on the system of "friend or foe", which are transferred via radio channel, developed systems and analogues. The security assessment of the developed system shows an adequate degree of protection against complex threats (view, spoofing, interception and jamming of traffic in comparison with known systems of this class. Among the main advantages of the developed system it’s necessary to mention increased security from unauthorized access and jamming

  14. Continuous Cash Benefit (BCP) for disabled individuals: access barriers and intersectoral gaps.

    Science.gov (United States)

    Vaitsman, Jeni; Lobato, Lenaura de Vasconcelos Costa

    2017-11-01

    The 1988 Constitution approved the Continuous Cash Benefit (BCP) directed to elders and disabled persons with a household per capita income of 25% of the minimum wage, and around 4 million people received this benefit in 2015. The design of BPC for disabled persons involves organizations of social security, social welfare and health. This paper discusses how some intersectoral coordination mechanisms gaps between these areas produce access barriers to potential beneficiaries. Results stem from a qualitative study performed with physicians, administrative staff and social workers from the National Institute of Social Security (INSS) and of the Social Welfare Reference Center (CRAS) in three municipalities of different Brazilian regions. Intersectoral coordination and cooperation are more structured at the Federal level. At the local level, they rely on informal and horizontal initiatives, which produce immediate but discontinuous solutions. The role of the CRAS remains contingent on the implementation. The need to establish institutionalized mechanisms for coordination and cooperation between social welfare, health and social insurance to improve the implementation and reduce barriers to access to the BCP is apparent.

  15. A Protective Mechanism for the Access Control System in the Virtual Domain

    Institute of Scientific and Technical Information of China (English)

    Jinan Shen; Deqing Zou; Hai Jin; Kai Yang; Bin Yuan; Weiming Li

    2016-01-01

    In traditional framework,mandatory access control (MAC) system and malicious software are run in kernel mode.Malicious software can stop MAC systems to be started and make it do invalid.This problem cannot be solved under the traditional framework if the operating system (OS) is comprised since malwares are running in ring0 level.In this paper,we propose a novel way to use hypervisors to protect kernel integrity and the access control system in commodity operating systems.We separate the access control system into three parts:policy management (PM),security server (SS) and policy enforcement (PE).Policy management and the security server reside in the security domain to protect them against malware and the isolation feather of the hypervisor can protect them from attacks.We add an access vector cache (AVC) between SS and PE in the guest OS,in order to speed up communication between the guest OS and the security domain.The policy enforcement module is retained in the guest OS for performance.The security of AVC and PE can be ensured by using a memory protection mechanism.The goal of protecting the OS kemel is to ensure the security of the execution path.We implement the system by a modified Xen hypervisor.The result shows that we can secure the security of the access control system in the guest OS with no overhead compared with modules in the latter.Our system offers a centralized security policy for virtual domains in virtual machine environments.

  16. Patients report better satisfaction with part-time primary care physicians, despite less continuity of care and access.

    Science.gov (United States)

    Panattoni, Laura; Stone, Ashley; Chung, Sukyung; Tai-Seale, Ming

    2015-03-01

    The growing number of primary care physicians (PCPs) reducing their clinical work hours has raised concerns about meeting the future demand for services and fulfilling the continuity and access mandates for patient-centered care. However, the patient's experience of care with part-time physicians is relatively unknown, and may be mediated by continuity and access to care outcomes. We aimed to examine the relationships between a physicians' clinical full-time equivalent (FTE), continuity of care, access to care, and patient satisfaction with the physician. We used a multi-level structural equation estimation, with continuity and access modeled as mediators, for a cross-section in 2010. The study included family medicine (n = 104) and internal medicine (n = 101) physicians in a multi-specialty group practice, along with their patient satisfaction survey responses (n = 12,688). Physician level FTE, continuity of care received by patients, continuity of care provided by physician, and a Press Ganey patient satisfaction with the physician score, on a 0-100 % scale, were measured. Access to care was measured as days to the third next-available appointment. Physician FTE was directly associated with better continuity of care received (0.172% per FTE, p part-time PCPs in practice redesign efforts and initiatives to meet the demand for primary care services.

  17. A scalable and continuous-upgradable optical wireless and wired convergent access network.

    Science.gov (United States)

    Sung, J Y; Cheng, K T; Chow, C W; Yeh, C H; Pan, C-L

    2014-06-02

    In this work, a scalable and continuous upgradable convergent optical access network is proposed. By using a multi-wavelength coherent comb source and a programmable waveshaper at the central office (CO), optical millimeter-wave (mm-wave) signals of different frequencies (from baseband to > 100 GHz) can be generated. Hence, it provides a scalable and continuous upgradable solution for end-user who needs 60 GHz wireless services now and > 100 GHz wireless services in the future. During the upgrade, user only needs to upgrade their optical networking unit (ONU). A programmable waveshaper is used to select the suitable optical tones with wavelength separation equals to the desired mm-wave frequency; while the CO remains intact. The centralized characteristics of the proposed system can easily add any new service and end-user. The centralized control of the wavelength makes the system more stable. Wired data rate of 17.45 Gb/s and w-band wireless data rate up to 3.36 Gb/s were demonstrated after transmission over 40 km of single-mode fiber (SMF).

  18. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    Science.gov (United States)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  19. Expanding Medicaid Access without Expanding Medicaid: Why Did Some Nonexpansion States Continue the Primary Care Fee Bump?

    Science.gov (United States)

    Wilk, Adam S; Evans, Leigh C; Jones, David K

    2018-02-01

    Six states that have rejected the Patient Protection and Affordable Care Act's (ACA) Medicaid expansion nonetheless extended the primary care "fee bump," by which the federal government increased Medicaid fees for primary care services up to 100 percent of Medicare fees during 2013-14. We conducted semistructured interviews with leaders in five of these states, as well as in three comparison states, to examine why they would continue a provision of the ACA that moderately expands access at significant state expense while rejecting the expansion and its large federal match, focusing on relevant economic, political, and procedural factors. We found that fee bump extension proposals were more successful where they were dissociated from major national policy debates, actionable with the input of relatively few stakeholder entities, and well aligned with preexisting policy-making structures and decision trends. Republican proposals to cap or reduce federal funding for Medicaid, if enacted, would compel states to contain program costs. In this context, states' established decision-making processes for updating Medicaid fee schedules, which we elucidate in this study, may shape the future of the Medicaid program. Copyright © 2018 by Duke University Press 2018.

  20. Highlights and Opportunities from Continuous Access to Gas Hydrates Sites at Ocean Networks Canada's NEPTUNE Observatory

    Science.gov (United States)

    Scherwath, M.; Heesemann, M.; Riedel, M.; Thomsen, L.; Roemer, M.; Chatzievangelou, D.; Purser, A.

    2017-12-01

    Since 2009 Ocean Networks Canada provides permanent access and continuous data in near real-time from two prominent gas hydrates research sites at the Northern Cascadia Margin, Barkley Canyon and Clayoquot Slope off Vancouver Island, through power and communication cables directly from shore. We show data highlights from the seafloor crawler Wally, the world's first internet operated vehicle, in a field of hydrate mounds and outcropping gas hydrates, and its co-located sonars and state-of-the-ocean sensors and Barkley Canyon. For example, spectacular views from the benthic communities and their changes over time are captured by video. At Clayoquot Slope highly active gas seep fields are monitored with a rotating multibeam sonar and various other environmental sensors. In addition, newly installed geodetic sensors as well as an instrumented borehole in that area are now online and provide additional data on subduction-related deformation and potential links to gas discharge. These show-case examples highlight the benefits of co-located experiments that enable interdisciplinary research and also the ability for high-power and -bandwidth long-term monitoring at remote seafloor locations, that over time will provide baselines for environmental monitoring together with natural variability and potential long-term trends.

  1. Access to Awareness for Faces during Continuous Flash Suppression Is Not Modulated by Affective Knowledge.

    Directory of Open Access Journals (Sweden)

    Milena Rabovsky

    Full Text Available It is a controversially debated topic whether stimuli can be analyzed up to the semantic level when they are suppressed from visual awareness during continuous flash suppression (CFS. Here, we investigated whether affective knowledge, i.e., affective biographical information about faces, influences the time it takes for initially invisible faces with neutral expressions to overcome suppression and break into consciousness. To test this, we used negative, positive, and neutral famous faces as well as initially unfamiliar faces, which were associated with negative, positive or neutral biographical information. Affective knowledge influenced ratings of facial expressions, corroborating recent evidence and indicating the success of our affective learning paradigm. Furthermore, we replicated shorter suppression durations for upright than for inverted faces, demonstrating the suitability of our CFS paradigm. However, affective biographical information did not modulate suppression durations for newly learned faces, and even though suppression durations for famous faces were influenced by affective knowledge, these effects did not differ between upright and inverted faces, indicating that they might have been due to low-level visual differences. Thus, we did not obtain unequivocal evidence for genuine influences of affective biographical information on access to visual awareness for faces during CFS.

  2. Analysing accessibility effects in a continuous treatment framework: the case of Copenhagen metro

    DEFF Research Database (Denmark)

    Pons Rotger, Gabriel Angel; Nielsen, Thomas Alexander Sick

    increases the probability of long commutes (> 4 km) - and decreases the probability of short commutes (men and women...... it is mainly women that are affected by the accessibility gain and commute longer distances in responses to proximity to the metro. Comparing older and younger commuters it is mainly the older commuters that respond to the increased accessibility offered by metro access – by commuting longer distances....... Comparing income groups a considerably stronger response to the increased accessibility is seen in the highest earning and presumably most skilled group. Comparing commuting responses to metro access grouped by the past commuting behavior of the responspondents indicate a positive effect of proximity...

  3. Radiological Protection and Quality Assurance in Health Sciences: Tele-Education for continued Postgraduate Training

    International Nuclear Information System (INIS)

    Alcaraz, M.; Chico, P.; Armero, D.; Saura Iniesta, A. M.; Vicente, V.

    2003-01-01

    The establishment of an inter departmental project, financed by the Spanish Ministry of Education, has made possible the development to specific didactic materials on Radiological Protection and Quality Assurance in Medical Radiodiagnostic Practices. These have been published as a manual and practical notebook. This material constitutes the grounding work for the first continuous tele-education training course via Internet that Spanish professionals exposed to ionising radiation are following. Interactive multimedia training and tele-education may become one of the alternatives that allow health science professionals to receive continuous training, provided that adequate content and aims had been established during undergraduate training. (Author) 18 refs

  4. The Regional Comprehensive Economic Partnership, Intellectual Property Protection, and Access to Medicines.

    Science.gov (United States)

    Townsend, Belinda; Gleeson, Deborah; Lopert, Ruth

    2016-11-01

    The inclusion of elevated standards of intellectual property (IP) protection in the recently negotiated Trans-Pacific Partnership (TPP) agreement has raised serious public health concerns regarding access to medicines. A lesser-known trade agreement under negotiation in the Asia-Pacific region is the Regional Comprehensive Economic Partnership (RCEP). Framed as an attempt to reassert ASEAN's position in response to the United States-led TPP, RCEP includes key players China and India as well as several low- and middle-income countries (LMICs). Leaked drafts of IP provisions proposed by Japan and South Korea raise similar concerns in the Asia-Pacific region. This article identifies TRIPS (Trade Related Aspects of Intellectual Property Rights agreement)-Plus provisions in leaked negotiating texts and examines their implications for LMICs that are not also parties to the TPP: Cambodia, Indonesia, Laos, Myanmar, the Philippines, Thailand, China, and India. We find that higher levels of IP protection delay the market entry of generic medicines, giving rise to increased costs to governments and reduced access to essential medicines. The article concludes that the public health community should recognize risks inherent in trade agreements that promote expansions of IP rights and engage with governments to ensure that public health is adequately and explicitly protected in trade and investment negotiations. © 2016 APJPH.

  5. The Protection of Forest Biodiversity can Conflict with Food Access for Indigenous People

    Directory of Open Access Journals (Sweden)

    Olivia Sylvester

    2016-01-01

    Full Text Available International protected area (PA management policies recognise the importance of respecting Indigenous rights. However, little research has been conducted to evaluate how these policies are being enforced. We evaluated whether Indigenous rights to access traditional food were being respected in La Amistad Biosphere Reserve, Costa Rica. By examining land management documents, we found that PA regulations have the potential to restrict traditional food access because these regulations ban shifting agriculture and heavily restrict hunting; these regulations do not address the harvest of edible plants. By working with Bribri people, we found multiple negative impacts that PAs had on: health, nutrition, passing on cultural teachings to youth, quality of life, cultural identity, social cohesion and bonding, as well as on the land and non-human beings. We propose three steps to better support food access in PAs in Costa Rica and elsewhere. First, a right to food framework should inform PA management regarding traditional food harvesting. Second, people require opportunities to define what harvesting activities are traditional and sustainable and these activities should be respected in PA management. Third, harvesting regulations need to be clearly communicated by land managers to resource users so people have the necessary information to exercise their rights to access food.

  6. Problems of radiation protection at continuous service of industrial full-screen-X-ray-installations

    International Nuclear Information System (INIS)

    Krebs, K.

    1979-01-01

    A lot of usual product of high automatisized full-screen-X-ray-installations prove very susceptible to trouble when used in continuous 3-shift-working. Normal safeguards by rough industrial continuous use mostly abruptly lose their efficiency without announcement; this mainly by vibration, disadjustment, aerosols, dirts and thermal stress. The author explains this by illustrated samples of practice. Since for those installations neither physical controls of persons nor dose-alarm-systems are prescribed by law, the needed security regarding radiation protection seems not to be guaranteed. Therefore it is proposed to order the following by technical and legistical rules: 1. Screening has to be constructed and mounted resistant in mechanical and termical regards. 2. Safety-switches must work by constraint and in an primary way. 3. The reaching of the legally allowed dose-limit has to be recognized in an unmistakable way by alarm signal. These protections are the most urgent, since the continuous service of those X-ray-installations normally works without any further screening admist other production installations and operation is done by semiskilled operators who are not subjected to any physical or medical control. (author)

  7. A Novel Wound Retractor Combining Continuous Irrigation and Barrier Protection Reduces Incisional Contamination in Colorectal Surgery.

    Science.gov (United States)

    Papaconstantinou, Harry T; Ricciardi, Rocco; Margolin, David A; Bergamaschi, Roberto; Moesinger, Robert C; Lichliter, Warren E; Birnbaum, Elisa H

    2018-03-09

    Surgical site infection (SSI) remains a persistent and morbid problem in colorectal surgery. Key to its pathogenesis is the degree of intraoperative bacterial contamination at the surgical site. The purpose of this study was to evaluate a novel wound retractor at reducing bacterial contamination. A prospective multicenter pilot study utilizing a novel wound retractor combining continuous irrigation and barrier protection was conducted in patients undergoing elective colorectal resections. Culture swabs were collected from the incision edge prior to device placement and from the exposed and protected incision edge prior to device removal. The primary and secondary endpoints were the rate of enteric and overall bacterial contamination on the exposed incision edge as compared to the protected incision edge, respectively. The safety endpoint was the absence of serious device-related adverse events. A total of 86 patients were eligible for analysis. The novel wound retractor was associated with a 66% reduction in overall bacterial contamination at the protected incision edge compared to the exposed incision edge (11.9 vs. 34.5%, P contamination (9.5% vs. 33.3%, P contamination. Improved methods to counteract wound contamination represent a promising strategy for SSI prevention (NCT 02413879).

  8. Privacy and Security Issues Surrounding the Protection of Data Generated by Continuous Glucose Monitors.

    Science.gov (United States)

    Britton, Katherine E; Britton-Colonnese, Jennifer D

    2017-03-01

    Being able to track, analyze, and use data from continuous glucose monitors (CGMs) and through platforms and apps that communicate with CGMs helps achieve better outcomes and can advance the understanding of diabetes. The risks to patients' expectation of privacy are great, and their ability to control how their information is collected, stored, and used is virtually nonexistent. Patients' physical security is also at risk if adequate cybersecurity measures are not taken. Currently, data privacy and security protections are not robust enough to address the privacy and security risks and stymies the current and future benefits of CGM and the platforms and apps that communicate with them.

  9. Managing Profound Suffering at the End-of-Life: Should expanding access to continuous deep sedation be the priority?

    Directory of Open Access Journals (Sweden)

    Kirby, Jeffrey

    2015-01-01

    Full Text Available This paper argues that in addressing and managing profound suffering at the end-of-life, the priority should not be the legalization of physician-assisted suicide or voluntary active euthanasia in jurisdictions where these practices are not currently available. Rather, concerted efforts should be made by society and the healthcare provider community to expand patient access to proportionate distress-relieving sedation and continuous deep sedation.

  10. Remote and continuous gamma spectrometry for environmental radiation protection: state of the art technology and perspectives

    International Nuclear Information System (INIS)

    Van Put, Ph.; Lellis, C.; Debauche, A.; Lacroix, J-P.

    2004-01-01

    The instruments technologies for radiological protection of the environment have been considerably enhanced since the last 20 years. From very simple warning bells in the early 80s, the instruments have been sophisticated nowadays to a degree where their performances can be compared to the performances achieved in low level laboratories. This presentation will briefly overview the evolution of these instruments by comparing their technology, their methodology and their performances. Next, it will present the concepts of the state of the art technology in the field of continuous monitoring of the environment. A discussion will follow on the performances and the limitations of this technology. Finally, the presentation will highlight the future perspective of developments by taking into account recent progress in the field of radiation detectors, telecommunication and computer sciences among others. (authors)

  11. Accessibility

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2017-01-01

    This contribution is timely as it addresses accessibility in regards system hardware and software aligned with introduction of the Twenty-First Century Communications and Video Accessibility Act (CVAA) and adjoined game industry waiver that comes into force January 2017. This is an act created...... by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...... platforms; and games software. However, the CVAA has no legal status in the EU. This text succinctly introduces and questions implications, impact, and wider adoption. By presenting the full CVAA and game industry waiver the text targets to motivate discussions and further publications on the subject...

  12. Recreational potential as an indicator of accessibility control in protected mountain forest areas

    Institute of Scientific and Technical Information of China (English)

    Tomasz DUDEK

    2017-01-01

    The article presents research findings related to recreational use of forests located in protected mountainous areas with forestage of over 80%.The study was designed to identify recreational potential of the Carpathian national parks (Bieszczady National Park,Babia Góra National Park,Gorce National Park and Magura National Park;southern Poland) and to compare these findings with the actual number of visitors.The information received on the recreational potential of parks is important from the point of view of protection of natural resources and the financial situation of the parks.The calculated ratio may be an effective tool of management for park administration,that allows to reconcile statutory social and protective functions of national parks.The study determined the recreational potential of the forests with the use of recreational valorisation method designed for areas with varied terrain,and the evaluated factors included the stands of trees with their habitat and land relief.The permissible number of national park visitors,expressed as manhour/ha/year ranges from 19.31 in Bieszczady National Park (BG:19° 35′ E,49° 35′ N) to 32.06 in in Bieszczady National Park (B:22° 40′ E,49° 10′ N).In 3 out of 4 investigated parks,Magnra National Park (M:21°25′ E,49° 30′ N),Gorce National Park (G:20° 10′ E,49° 35′ N),B) recreation carrying capacity was not exceeded,whether or not the strictly protected area is taken into account.Only in BG was the recreation carrying capacity exceeded by nearly 24%,or by 85% if the strictly protected area is excluded from tourism-related exploitation.The presented procedure for monitoring access to mountain forests in national parks,from the viewpoint of natural resources conservation,can be applied in other mountainous areas covered with forests and exposed to tourist and recreational traffic,and in forests facing particular risk of recreational damage,e.g.in urban and suburban forests growing in areas

  13. Emerging tools for continuous nutrient monitoring networks: Sensors advancing science and water resources protection

    Science.gov (United States)

    Pellerin, Brian; Stauffer, Beth A; Young, Dwane A; Sullivan, Daniel J.; Bricker, Suzanne B.; Walbridge, Mark R; Clyde, Gerard A; Shaw, Denice M

    2016-01-01

    Sensors and enabling technologies are becoming increasingly important tools for water quality monitoring and associated water resource management decisions. In particular, nutrient sensors are of interest because of the well-known adverse effects of nutrient enrichment on coastal hypoxia, harmful algal blooms, and impacts to human health. Accurate and timely information on nutrient concentrations and loads is integral to strategies designed to minimize risk to humans and manage the underlying drivers of water quality impairment. Using nitrate sensors as an example, we highlight the types of applications in freshwater and coastal environments that are likely to benefit from continuous, real-time nutrient data. The concurrent emergence of new tools to integrate, manage and share large data sets is critical to the successful use of nutrient sensors and has made it possible for the field of continuous nutrient monitoring to rapidly move forward. We highlight several near-term opportunities for Federal agencies, as well as the broader scientific and management community, that will help accelerate sensor development, build and leverage sites within a national network, and develop open data standards and data management protocols that are key to realizing the benefits of a large-scale, integrated monitoring network. Investing in these opportunities will provide new information to guide management and policies designed to protect and restore our nation’s water resources.

  14. Editors View the Continuous Publication Model as a Satisfactory Alternative for Open Access LIS Journals

    Directory of Open Access Journals (Sweden)

    Richard Hayman

    2014-09-01

    Full Text Available A Review of: Cirasella, J., & Bowdoin, S. (2013. Just roll with it? Rolling volumes vs. discrete issues in open access library and information science journals. Journal of Librarianship and Scholarly Communication, 1(4. http://dx.doi.org/10.7710/2162-3309.1086 Abstract Objective – To understand the prevalence of, motivations for, and satisfaction with using a rolling-volume publishing model, as opposed to publishing discrete issues, across open access academic journals in library and information science. Design – A 12 question survey questionnaire. Setting – English-language, open access library and information science (LIS journals published in the United States of America. Subjects – A total of 21 open access LIS journals identified via the Directory of Open Access Journals that were actively publishing, and that also met the authors’ standard of scholarliness, which they established by identifying a journal’s peer-review process or other evidence of rigorous review. Based on responses, 12 journals published using discrete issues, while 9 published as rolling volumes or as rolling volumes with some discrete issues. Methods – In late 2011, the study’s authors invited lead editors or primary journal contacts to complete the survey. Survey participants were asked to identify whether their journal published in discrete issues, rolling volumes, or rolling volumes with occasional discrete issues, with the latter two categories combined as one for ease of results analysis. Survey logic split respondents into two groups, either discrete-issue or rolling-volume. Respondents in both categories were posed similar sets of questions, with the key difference being that the questions directed at each category accounted for the publication model the journals themselves identified as using. Editors from both groups were asked about the reasons for using the publication model they identified for their journal: within the survey tool, authors

  15. Variations in constitutive and inducible UV-B tolerance; dissecting photosystem II protection in Arabidopsis thaliana accessions.

    Science.gov (United States)

    Jansen, Marcel A K; Martret, Bénedicte Le; Koornneef, Maarten

    2010-01-01

    The rise in ultraviolet-B (UV-B) (280-315 nm) radiation levels, that is a consequence of stratospheric ozone layer depletion, has triggered extensive research on the effects of UV-B on plants. Plants raised under natural sunlight conditions are generally well protected from the potentially harmful effects of UV-B radiation. However, it is mostly unknown to which extent UV protection is constitutive and/or induced. In this study, we have analysed the role of constitutive and inducible protection responses in avoiding UV-B damage to photosystem II of photosynthesis. We have assayed the UV susceptibility of photosystem II in 224 Arabidopsis thaliana accessions from across the Northern hemisphere, and found a continuum of constitutive UV-protection levels, with some accessions being UV sensitive and others UV tolerant. Statistical analysis showed only very weak associations between constitutive UV tolerance and the geographic origin of accessions. Instead, most of the variance in constitutive UV-B protection of photosynthesis is present at the level of local Arabidopsis populations originating in the same geographic and climatic area. The variance in constitutive UV protection is, however, small compared to the amplitude of environmentally induced changes in UV protection. Thus, our data emphasise the importance of inducible responses for the protection of photosystem II against UV-B. Remarkably, the conditions that induce UV-protective responses vary; accessions from lower latitudes were found to switch-on UV defences more readily than those of higher latitudes. Such altered regulation of induction may comprise a suitable adaptation response when levels of a stressor are fluctuating in the short term, but predictable over longer periods.

  16. I/O Standard Based Thermal/Energy Efficient Green Communication For Wi-Fi Protected Access on FPGA

    DEFF Research Database (Denmark)

    Kumar, Tanesh; Pandey, Bishwajeet; Das, Teerath

    2014-01-01

    In this paper, we analyzed how does life and reliability of an integrated circuit is affected when it is operated in different regions under different temperatures. We have taken Fibonacci generator as our target circuit and LVCMOS as I/O standards. WPA and WPA2 (Wi-Fi Protected Access) key can...... be generated with Fibonacci generator. Here, thermal efficient green Fibonacci Generator is used to generate key for Wi-Fi Protected Access in order to make green communication possible under different room temperature. By analysis it is observed that at standard normal temperature (21degrees C), LVCMOS12 have...

  17. Continued Bullying Victimization from Childhood to Young Adulthood: a Longitudinal Study of Mediating and Protective Factors.

    Science.gov (United States)

    Brendgen, Mara; Poulin, François

    2018-01-01

    Bullying in schools has severe consequences for victims' adjustment. It is unclear, however, whether victims of school bullying continue to be victimized in other contexts during adulthood. Mediating processes through which peer victimization in school increases the risk of revictimization in adulthood, as well as protective factors, also need to be explored. This study examined 1) the longitudinal association between peer victimization in school and victimization at work during young adulthood, 2) the predictive link of reactive and proactive aggression and anxious-withdrawn behavior in childhood with victimization in school and at the workplace, 3) the potential mediating role of depression symptoms, and 4) the potential protective effect of friendship support. The study included 251 participants (61% females) followed from age 12 to age 22. Participants reported about their victimization in school from ages 12 to 17 and their workplace victimization at age 22. They also reported about their depression-related thoughts and feelings and about friendship support. Teachers rated reactive and proactive aggression and anxiety-withdrawal at age 12. Structural equation modeling revealed that anxiety-withdrawal at age 12 predicted peer victimization in school, which in turn predicted later victimization at work. The latter association was partially mediated by increased depression symptoms. However, friendship support counteracted (via a main effect) the link between school victimization and subsequent depression symptoms. Bullying victims may benefit from interventions aimed at reducing depression symptoms and fostering social skills to establish supportive friendships to help avoid the generation of new interpersonal stress such as workplace victimization in adulthood.

  18. Posing for awareness: proprioception modulates access to visual consciousness in a continuous flash suppression task.

    Science.gov (United States)

    Salomon, Roy; Lim, Melanie; Herbelin, Bruno; Hesselmann, Guido; Blanke, Olaf

    2013-06-03

    The rules governing the selection of which sensory information reaches consciousness are yet unknown. Of our senses, vision is often considered to be the dominant sense, and the effects of bodily senses, such as proprioception, on visual consciousness are frequently overlooked. Here, we demonstrate that the position of the body influences visual consciousness. We induced perceptual suppression by using continuous flash suppression. Participants had to judge the orientation a target stimulus embedded in a task-irrelevant picture of a hand. The picture of the hand could either be congruent or incongruent with the participants' actual hand position. When the viewed and the real hand positions were congruent, perceptual suppression was broken more rapidly than during incongruent trials. Our findings provide the first evidence of a proprioceptive bias in visual consciousness, suggesting that proprioception not only influences the perception of one's own body and self-consciousness, but also visual consciousness.

  19. Application of segmented dental panoramic tomography among children: positive effect of continuing education in radiation protection.

    Science.gov (United States)

    Pakbaznejad Esmaeili, Elmira; Waltimo-Sirén, Janna; Laatikainen, Tuula; Haukka, Jari; Ekholm, Marja

    2016-05-23

    Dental panoramic tomography is the most frequent examination among 7-12-year olds, according to the Radiation Safety and Nuclear Authority of Finland. At those ages, dental panoramic tomographs (DPTs) are mostly obtained for orthodontic reasons. Children's dose reduction by trimming the field size to the area of interest is important because of their high radiosensitivity. Yet, the majority of DPTs in this age group are still taken by using an adult programme and never by using a segmented programme. The purpose of the present study was to raise the awareness of dental staff with respect to children's radiation safety, to increase the application of segmented and child DPT programmes by further educating the whole dental team and to evaluate the outcome of the educational intervention. A five-step intervention programme, focusing on DPT field limitation possibilities, was carried out in community-based dental care as a part of mandatory continuing education in radiation protection. Application of segmented and child DPT programmes was thereafter prospectively followed up during a 1-year period and compared with our similar data from 2010 using a logistic regression analysis. Application of the child programme increased by 9% and the segmented programme by 2%, reaching statistical significance (odds ratios 1.68; 95% confidence interval 1.23-2.30; p-value radiation safety of children during dental panoramic tomography. Segmented and child DPT programmes can be applied successfully in dental practice for children.

  20. Radiation alarms and access control systems: Recommendations of the National Council on Radiation Protection and Measurements

    International Nuclear Information System (INIS)

    1986-01-01

    In facilities where radioactive materials are handled, or where radiation-producing equipment is used, the building, the equipment, and the associated safety procedures should be designed and developed together to provide a safe work environment. The specific combination of requirements for a given facility is defined by the operational radiation safety program. It should be emphasized that this report describes a range of alarm and access control systems that can provide an acceptable level of safety at many types of facilities. Depending on circumstances, the solutions offered may not be appropriate for certain facilities because they are to restrictive, not restrictive enough, or do not cover all circumstances. The document is offered as a starting point providing ideas that professional health physicists can adapt to meet the needs of a particular situation. Under no circumstances should this report be interpreted in ''cookbook'' fashion, with literal adherence to every recommendation demanded, nor should it be expected to provide adequate protection in every case without consideration of local conditions

  1. PROTECTING CHILDREN FROM ENVIRONMENTAL THREATS - A CONTINUING EDUCATION PROGRAM FOR NURSES OF THE AMERICAN NURSES FOUNDATION/ASSOCIATION

    Science.gov (United States)

    The American Nurses Association/Foundation will develop online, in print and pre conference continuing education (CE) children's environmental health protection programs to meet the objective of the program. The first CE program is on school environments, the second on home and ...

  2. 76 FR 69722 - Access to Confidential Business Information by Protection Strategies Incorporated

    Science.gov (United States)

    2011-11-09

    ... Business Information by Protection Strategies Incorporated AGENCY: Environmental Protection Agency (EPA... Control Act (TSCA) confidential business information and to provide notice that this contract has been extended until December 31, 2011. Protection Strategies Incorporated (PSI) has been the owner of Eagle...

  3. Welcome to the wild west: protecting access to cross border fertility care in the United States.

    Science.gov (United States)

    Mutcherson, Kimberley M

    2012-01-01

    As has been the case with other types of medical tourism, the phenomenon of cross border fertility care ("CBFC") has sparked concern about the lack of global or even national harmonization in the regulation of the fertility industry. The diversity of laws around the globe leads would-be parents to forum shop for a welcoming place to make babies. Focusing specifically on the phenomenon of travel to the United States, this Article takes up the question of whether there should be any legal barriers to those who come to the United States seeking CBFC. In part, CBFC suffers from the same general concerns raised about the use of fertility treatment in general, but it is possible to imagine a subset of arguments that would lead to forbidding or at least discouraging people from coming to the United States for CBFC, either as a matter of law or policy. This paper stands in opposition to any such effort and contemplates the moral and ethical concerns about CBFC and how, and if, those concerns warrant expression in law. Part I describes the conditions that lead some couples and individuals to leave their home countries to access fertility treatments abroad and details why the United States, with its comparatively liberal regulation of ART, has become a popular CBFC destination for travelers from around the world. Part II offers and refutes arguments supporting greater domestic control over those who seek to satisfy their desires for CBFC in the United States by reasserting the importance of the right of procreation while also noting appropriate concerns about justice and equality in the market for babies. Part III continues the exploration of justice by investigating the question of international cooperation in legislating against perceived wrongs. This Part concludes that consistent legislation across borders is appropriate where there is consensus about the wrong of an act, but it is unnecessary and inappropriate where there remain cultural conflicts about certain

  4. Access to healthcare and financial risk protection for older adults in Mexico: secondary data analysis of a national survey.

    Science.gov (United States)

    Doubova, Svetlana V; Pérez-Cuevas, Ricardo; Canning, David; Reich, Michael R

    2015-07-21

    While the benefits of Seguro Popular health insurance in Mexico relative to no insurance have been widely documented, little has been reported on its effects relative to the pre-existing Social Security health insurance. We analyse the effects of Social Security and Seguro Popular health insurances in Mexico on access to healthcare of older adults, and on financial risk protection to their households, compared with older adults without health insurance. Secondary data analysis was performed using the 2012 Mexican Survey of Health and Nutrition (ENSANUT). The study population comprised 18,847 older adults and 13,180 households that have an elderly member. The dependent variables were access to healthcare given the reported need, the financial burden imposed by health expenditures measured through catastrophic health-related expenditures, and using savings for health-related expenditures. Separate propensity score matching analyses were conducted for each comparison. The analysis for access was performed at the individual level, and the analysis for financial burden at the household level. In each case, matching on a wide set of relevant characteristics was achieved. Seguro Popular showed a protective effect against lack of access to healthcare for older adults compared with those with no insurance. The average treatment effect on the treated (ATET) was ascertained through using the nearest-neighbour matching (-8.1%, t-stat -2.305) analysis. However, Seguro Popular did not show a protective effect against catastrophic expenditures in a household where an older adult lived. Social Security showed increased access to healthcare (ATET -11.3%, t-stat -3.138), and protective effect against catastrophic expenditures for households with an elderly member (ATET -1.9%, t-stat -2.178). Seguro Popular increased access to healthcare for Mexican older adults. Social Security showed a significant protective effect against lack of access and catastrophic expenditures compared with

  5. 76 FR 60398 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2011-09-29

    ... ``access'' to copyrighted works, e.g., decryption or hacking of access controls such as passwords or serial... availability for use of copyrighted works is whether the measure supports a distribution model that benefits... work, those limitations may benefit the public by providing ``use-facilitating'' models that allow...

  6. Continuing training in radiological protection as an effective means of avoiding radiological accidents

    International Nuclear Information System (INIS)

    Lima, C.M.A.; Pelegrineli, S.Q.; Martins, G.; Lima, A.R.; Silva, F.C.A. da

    2017-01-01

    it is notorious that one of the main causes of radiological accidents is the lack of knowledge of radiological protection of workers. In order to meet the needs of professionals in acquiring a solid base in radiological protection and safety, was created in 2013, by the Casa Branca School / SP and technically supported by the company MAXIM Cursos, the 'Post-Graduation Course Lato Sensu de Radiological Protection in Medical, Industrial and Nuclear Applications', which offers a broad improvement in radiation protection. The course of 380 hours and duration of 18 months is divided into 13 modules, including theoretical classes, in person and online using the virtual classroom and practical training in radiation protection in general. In the end students should present a monograph, guided by a course teacher and reviewed by an Examining Bank. Five classes have been formed in these four years, totaling 92 students. In all, 51 monographs have been defended on topics of technical and scientific interest. For this, the Faculty consists of 25 professors, being 9 Doctors, 13 Masters and 3 Specialists in Radiological Protection

  7. TRIPS, the Doha declaration and paragraph 6 decision: what are the remaining steps for protecting access to medicines?

    Directory of Open Access Journals (Sweden)

    Lee Kelley

    2007-05-01

    Full Text Available Abstract Background The World Trade Organisation's Declaration on the TRIPS Agreement and Public Health (known as the Doha Declaration of 2001, and subsequent Decision on the Interpretation of Paragraph 6 reached in 2003, affirmed the flexibilities available under the Agreement on Trade Related Property Rights (TRIPS to member states seeking to protect public health. Despite these important clarifications, the actual implementation of these measures to improve access to medicines remains uncertain. There are also concerns that so-called TRIPS-plus measures within many regional and bilateral trade agreements are further undermining the capacity of the poor to access affordable medicines. Methods The paper reviews policy debates among governments, nongovernmental organisations and international organisations from 1995, and notably since 2003, surrounding access to medicines and trade agreements. The provisions for protecting public health provided by the Doha Declaration and Paragraph 6 Decision are reviewed in terms of challenges for implementation, along with measures to protect intellectual property rights (IPRs under selected regional and bilateral trade agreements. Results While provisions, in principle, were affirmed for member states under the TRIPS agreement to protect public health, numerous challenges remain. Implementation of the flexibilities has been hindered by lack of capacity in many LMICs. More intransigent have been stark inequalities in power and influence among trading nations, leaving LMICs vulnerable to pressures to permit the globalization of IPRs in order to protect broader trade and economic interests. Such inequalities are apparent in proposals or adopted TRIPS-plus measures which re-establish the primacy of trade over public health goals. Conclusion Despite being hailed as a "watershed in international trade", the Doha Declaration and Paragraph 6 decision have not resolved the problem of access to affordable medicines

  8. Bifurcations of edge states—topologically protected and non-protected—in continuous 2D honeycomb structures

    International Nuclear Information System (INIS)

    Fefferman, C L; Lee-Thorp, J P; Weinstein, M I

    2016-01-01

    Edge states are time-harmonic solutions to energy-conserving wave equations, which are propagating parallel to a line-defect or ‘edge’ and are localized transverse to it. This paper summarizes and extends the authors’ work on the bifurcation of topologically protected edge states in continuous two-dimensional (2D) honeycomb structures. We consider a family of Schrödinger Hamiltonians consisting of a bulk honeycomb potential and a perturbing edge potential. The edge potential interpolates between two different periodic structures via a domain wall. We begin by reviewing our recent bifurcation theory of edge states for continuous 2D honeycomb structures (http://arxiv.org/abs/1506.06111). The topologically protected edge state bifurcation is seeded by the zero-energy eigenstate of a one-dimensional Dirac operator. We contrast these protected bifurcations with (more common) non-protected bifurcations from spectral band edges, which are induced by bound states of an effective Schrödinger operator. Numerical simulations for honeycomb structures of varying contrasts and ‘rational edges’ (zigzag, armchair and others), support the following scenario: (a) for low contrast, under a sign condition on a distinguished Fourier coefficient of the bulk honeycomb potential, there exist topologically protected edge states localized transverse to zigzag edges. Otherwise, and for general edges, we expect long lived edge quasi-modes which slowly leak energy into the bulk. (b) For an arbitrary rational edge, there is a threshold in the medium-contrast (depending on the choice of edge) above which there exist topologically protected edge states. In the special case of the armchair edge, there are two families of protected edge states; for each parallel quasimomentum (the quantum number associated with translation invariance) there are edge states which propagate in opposite directions along the armchair edge. (paper)

  9. Bifurcations of edge states—topologically protected and non-protected—in continuous 2D honeycomb structures

    Science.gov (United States)

    Fefferman, C. L.; Lee-Thorp, J. P.; Weinstein, M. I.

    2016-03-01

    Edge states are time-harmonic solutions to energy-conserving wave equations, which are propagating parallel to a line-defect or ‘edge’ and are localized transverse to it. This paper summarizes and extends the authors’ work on the bifurcation of topologically protected edge states in continuous two-dimensional (2D) honeycomb structures. We consider a family of Schrödinger Hamiltonians consisting of a bulk honeycomb potential and a perturbing edge potential. The edge potential interpolates between two different periodic structures via a domain wall. We begin by reviewing our recent bifurcation theory of edge states for continuous 2D honeycomb structures (http://arxiv.org/abs/1506.06111). The topologically protected edge state bifurcation is seeded by the zero-energy eigenstate of a one-dimensional Dirac operator. We contrast these protected bifurcations with (more common) non-protected bifurcations from spectral band edges, which are induced by bound states of an effective Schrödinger operator. Numerical simulations for honeycomb structures of varying contrasts and ‘rational edges’ (zigzag, armchair and others), support the following scenario: (a) for low contrast, under a sign condition on a distinguished Fourier coefficient of the bulk honeycomb potential, there exist topologically protected edge states localized transverse to zigzag edges. Otherwise, and for general edges, we expect long lived edge quasi-modes which slowly leak energy into the bulk. (b) For an arbitrary rational edge, there is a threshold in the medium-contrast (depending on the choice of edge) above which there exist topologically protected edge states. In the special case of the armchair edge, there are two families of protected edge states; for each parallel quasimomentum (the quantum number associated with translation invariance) there are edge states which propagate in opposite directions along the armchair edge.

  10. The Protection of Information Bill and Access to Information in South ...

    African Journals Online (AJOL)

    The study concludes by arguing that the 2010 Information Protection Bill has received massive coverage due to the fact that it has a negative impact on the work of the journalists and the information society, in general. Conclusions and recommendations for further research are offered. Keywords: Protection of Information, ...

  11. Survey of International Rules and Practices Regarding Delineation of and Access to Regulated Areas for Radiation Protection - Final report

    International Nuclear Information System (INIS)

    Schieber, C.; Crouail, P.; Beltrami, L.-A.; Reaud, C.; Lehtinen, Maaret; Stritt, Nicolas; Thomas, Gareth

    2013-06-01

    European requirements for radiological protection, especially work on transposing the new EURATOM Directive on the basic radiological protection standards, are currently being revised. The Direction generale du travail (DGT - General Directorate of Labour) and the Autorite de Surete Nucleaire (ASN - Nuclear Safety Authority) therefore commissioned the Radiological Protection Standing Groups of experts (GPRAD and GPMED)1 to engage in a forward-looking debate on the delimitation of and access to regulated areas, within an ad hoc working group (called hereafter 'Classification of Area WG'). To fuel its debates, the 'Classification of Area WG' sought elements on international regulations and practices focusing on problem exposure situations in various areas of activity (nuclear, industrial, research, medical, transport and natural boosted). CEPN was entrusted with this study. This report presents a summary of rules applicable in seven countries in terms of delimitation of and access to regulated radiological protection areas. The countries are: Belgium, Spain, United States, Finland, United Kingdom, Sweden and Switzerland. Detailed sheets for each country can be found in the Annex. Based on these summaries, three countries have been selected to apply their rules and practices in force to a dozen or so particular cases put together by the 'Classification of Area WG' that are representative of exposure situations. The three countries are Finland, United Kingdom and Switzerland. The case studies applied to each country are presented in the second part of this report

  12. Multinational Experiment 7. Protecting Access to Space: Presentation to Senior Leaders

    Science.gov (United States)

    2013-07-08

    Multinational Experiment 7: Outcome 3: Space Access Briefing to SLS 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d...operations Consequence management Ship status during search & rescue Tele-medicine Broadband internet TV signal distribution Satellite radio Rural...military-usage • Significant economic & societal consequences Access to space at risk • Current approach unsustainable • Broad range of threats

  13. Protected diazonium salts: a continuous-flow preparation of triazenes including the anticancer compounds dacarbazine and mitozolomide

    OpenAIRE

    Schotten, Christiane; Aldmairi, Abdul Hadi; Sagatov, Yerbol; Shepherd, Martyn; Browne, Duncan L.

    2016-01-01

    Herein, we report a continuous-flow process for the preparation of triazenes, whereby diazonium salts are generated and converted into their masked or protected triazene derivatives. Key to realizing the process, which is applicable to a wide range of substrates, is the identification of solvent and reagent parameters that avoid fouling and clogging in the tubing used in these studies. The process has also been applied to prepare the antineoplastic agents mitozolomide and dacarbazine. We also...

  14. Hypertension and Cardiovascular Remodelling in Rats Exposed to Continuous Light: Protection by ACE-Inhibition and Melatonin

    Directory of Open Access Journals (Sweden)

    Fedor Simko

    2014-01-01

    Full Text Available Exposure of rats to continuous light attenuates melatonin production and results in hypertension development. This study investigated whether hypertension induced by continuous light (24 hours/day exposure induces heart and aorta remodelling and if these alterations are prevented by melatonin or angiotensin converting enzyme inhibitor captopril. Four groups of 3-month-old male Wistar rats (10 per group were treated as follows for six weeks: untreated controls, exposed to continuous light, light-exposed, and treated with either captopril (100 mg/kg/day or melatonin (10 mg/kg/day. Exposure to continuous light led to hypertension, left ventricular (LV hypertrophy and fibrosis, and enhancement of the oxidative load in the LV and aorta. Increase in systolic blood pressure by continuous light exposure was prevented completely by captopril and partially by melatonin. Both captopril and melatonin reduced the wall thickness and cross-sectional area of the aorta and reduced the level of oxidative stress. However, only captopril reduced LV hypertrophy development and only melatonin reduced LV hydroxyproline concentration in insoluble and total collagen in rats exposed to continuous light. In conclusion, captopril prevented LV hypertrophy development in the continuous light-induced hypertension model, while only melatonin significantly reduced fibrosis. This antifibrotic action of melatonin may be protective in hypertensive heart disease.

  15. Broadband Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Broadband Access. Worldwide market for broadband access $30 Billion! Over 200 million broadband subscribers worldwide! Various Competing Broadband access. Digital Subscriber line; Wireless; Optical Fiber.

  16. Education, training and continuous professional development in the radiological protection of patients

    International Nuclear Information System (INIS)

    Wagner, L.K.

    2001-01-01

    Education and training in the radiological protection of patients has to face many challenges. These stem from the interdisciplinary nature of the personnel involved, their varied backgrounds, the difficult to quantify risk and benefit considerations, concern for quality of the end product, changing attitudes as knowledge develops in fast growing areas of technology and the wide complexity of the equipment used. On the one hand there is a need for giving orientation about the medical exigencies and situations in clinical practice to the radiation protection regulators and, on the other, more and more clinicians without any training in radiation protection are getting involved in the use of high levels of radiation through angiographic procedures. It is hence no wonder that the deterministic effects of radiation have been observed in patients undergoing angiographic procedures. A review of the state of the art in education and training and identifying educational challenges is therefore needed. The medical training of physicians and support personnel in the health care use of ionizing or other radiation in patients is particularly challenging for many reasons, most of which are unique to health care. These include those described in the paper. (author)

  17. Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information

    Directory of Open Access Journals (Sweden)

    Raik Kuhlisch

    2017-07-01

    Full Text Available This article discusses potential clashes between different types of security policies that regulate resource access requests on clinical patient data in hospitals by employees. Attribute-based Access Control (ABAC is proposed as a proper means for such regulation. A proper representation of ABAC policies must include a handling of policy attributes among different policy types. In this article, we propose a semantic policy model with predefined policy conflict categories. A conformance verification function detects erroneous, clashing or mutually susceptible rules early during the policy planning phase. The model and conflicts are used in a conceptual application environment and evaluated in a technical experiment during an interoperability test event.

  18. 75 FR 43825 - Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control...

    Science.gov (United States)

    2010-07-27

    ... switching service on that cellphone to another wireless communication network. The access controls in... means, such as the use of screen capture software, exist that permit the making of lower-quality film... handsets to execute software applications, where circumvention is accomplished for the sole purpose of...

  19. Business continuity, emergency planning and special needs: How to protect the vulnerable.

    Science.gov (United States)

    Reilly, Daniel

    2015-01-01

    Emergencies and disasters affect all segments of the population. Some segments are more at risk during the emergency response and recovery efforts owing to vulnerabilities that increase the risk of harm. These vulnerabilities are due to individuals' disabilities, which must be incorporated into emergency and business continuity planning. Some disabilities are obvious, such as impaired vision, hearing or mobility, while other are less evident, but equally disabling, such as cognitive disorders, geographical or language isolation, and numerous age-related factors. Taken together when creating emergency or business continuity plans, the issues identified as disabilities can be grouped by functionality and termed as special needs. This paper will detail the identification of special needs populations, explain how these persons are vulnerable during the emergency or disaster response and recovery process, and provide examples of how to partner with individuals within identified special needs populations to improve the planning process.

  20. Do continued antidepressants protect against dementia in patients with severe depressive disorder?

    Science.gov (United States)

    Kessing, Lars Vedel; Forman, Julie Lyng; Andersen, Per Kragh

    2011-11-01

    Studies on humans show that depressive disorder is associated with an increased risk of developing cognitive dysfunction, and animal studies suggest that antidepressants may have neuroprotective abilities. On the basis of these observations, it was hypothesized that treatment with antidepressants may decrease the risk of developing dementia in patients with depression. We investigated whether continued treatment with antidepressants is associated with a decreased rate of dementia in a population of patients discharged from psychiatric healthcare service with a diagnosis of depression. We used register data on all prescribed antidepressants in all patients discharged from psychiatric healthcare service with a diagnosis of depression and with subsequent diagnoses of dementia in Denmark from 1995 to 2005. A total of 37 658 patients with a diagnosis of depression at their first psychiatric contact and who were exposed to antidepressants after discharge were included in the study. A total of 2007 patients (5.3%) were subsequently diagnosed with dementia of any kind. The rate of dementia decreased during periods of two or more prescriptions of older antidepressants compared with the period of only one prescription of older antidepressants [relative risk (RR)=0.83 (95% confidence interval (CI)=0.70-0.98)]. This finding was replicated with Alzheimer's disease as the outcome [RR=0.66 (95% CI=0.47-0.94)] but not with dementia of other kinds as the outcome [RR=0.88 (95% CI=0.73-1.06)]. In contrast, during periods of continued use of selective serotonin reuptake inhibitors or newer nonselective serotonin reuptake inhibitors, the rate of dementia was not decreased, regardless of the subtype of dementia. It was concluded that continued long-term treatment with older antidepressants is associated with a reduced rate of dementia in patients treated in psychiatric healthcare settings, whereas continued treatment with other kinds of antidepressants is not. Methodological reasons for

  1. Revolution in New Zealand's Radiation Protection Legislation and Evolution and Continual Improvement in its Regulatory Authority

    International Nuclear Information System (INIS)

    Smyth, V.

    2004-01-01

    The safe use of ionising radiation in New Zealand is regulated by the Radiation Protection Act 1965 and the Radiation Protection Regulations 1982, which are administered by the National Radiation Laboratory (NRL). This legislation is now out of date and creates difficulties for New Zealand in meeting international standards of radiation safety and security, and complying with obligations under international treaties. These problems can be addressed by new legislation that would change the powers and functions of the regulatory authority, and change the responsibilities of licensees under the Act. However historically NRL has provided radiation services as well as acting as regulatory authority. This has the potential to create a conflict of interest in making regulatory judgements. Over the preceding 50 years NRL has undergone an evolution that has resulted in a clarification of the regulatory functions, and development of a quality management system that is now accredited to ISO standards. This paper presents a possible structure of a new Act, and discusses the role of quality management in maintaining the independence of regulatory authority. (Author)

  2. Novel WRM-based architecture of hybrid PON featuring online access and full-fiber-fault protection for smart grid

    Science.gov (United States)

    Li, Xingfeng; Gan, Chaoqin; Liu, Zongkang; Yan, Yuqi; Qiao, HuBao

    2018-01-01

    In this paper, a novel architecture of hybrid PON for smart grid is proposed by introducing a wavelength-routing module (WRM). By using conventional optical passive components, a WRM with M ports is designed. The symmetry and passivity of the WRM makes it be easily integrated and very cheap in practice. Via the WRM, two types of network based on different ONU-interconnected manner can realize online access. Depending on optical switches and interconnecting fibers, full-fiber-fault protection and dynamic bandwidth allocation are realized in these networks. With the help of amplitude modulation, DPSK modulation and RSOA technology, wavelength triple-reuse is achieved. By means of injecting signals into left and right branches in access ring simultaneously, the transmission delay is decreased. Finally, the performance analysis and simulation of the network verifies the feasibility of the proposed architecture.

  3. Trends in access to health services and financial protection in China between 2003 and 2011: a cross-sectional study.

    Science.gov (United States)

    Meng, Qun; Xu, Ling; Zhang, Yaoguang; Qian, Juncheng; Cai, Min; Xin, Ying; Gao, Jun; Xu, Ke; Boerma, J Ties; Barber, Sarah L

    2012-03-03

    In the past decade, the Government of China initiated health-care reforms to achieve universal access to health care by 2020. We assessed trends in health-care access and financial protection between 2003, and 2011, nationwide. We used data from the 2003, 2008, and 2011 National Health Services Survey (NHSS), which used multistage stratified cluster sampling to select 94 of 2859 counties from China's 31 provinces and municipalities. The 2011 survey was done with a subset of the NHSS sampling frame to monitor key indicators after the national health-care reforms were announced in 2009. Three sets of indicators were chosen to measure trends in access to coverage, health-care activities, and financial protection. Data were disaggregated by urban or rural residence and by three geographical regions: east, central, and west, and by household income. We examined change in equity across and within regions. The number of households interviewed was 57,023 in 2003, 56,456 in 2008, and 18,822 in 2011. Response rates were 98·3%, 95·0%, and 95·5%, respectively. The number of individuals interviewed was 193,689 in 2003, 177,501 in 2008, and 59,835 in 2011. Between 2003 and 2011, insurance coverage increased from 29·7% (57,526 of 193,689) to 95·7% (57,262 of 59,835, pservices and insurance coverage across and within regions. However, these increases have not been accompanied by reductions in catastrophic health expenses. With the achievement of basic health-services coverage, future challenges include stronger risk protection, and greater efficiency and quality of care. None. Copyright © 2012 Elsevier Ltd. All rights reserved.

  4. Commercial Policy Uncertainty, the Expected Cost of Protection, and Market Access

    NARCIS (Netherlands)

    J.F. François (Joseph); W. Martin (William)

    1998-01-01

    textabstractProtection unconstrained by rules often varies substantially over time. Rules-based disciplines like OECD industrial tariff bindings negotiated under GATT since 1947 and new Uruguay Round bindings on agricultural and services trade and on developing country industrial tariffs, constrain

  5. Continuing dental education in radiation protection: knowledge retention following a postgraduate course.

    Science.gov (United States)

    Absi, E G; Drage, N A; Thomas, H S; Newcombe, R G; Cowpe, J

    2011-08-01

    To evaluate medium-term knowledge retention of dental personnel following attendance at a postgraduate course in radiation protection. Knowledge was measured using identical pre- and post-course validated single best-answer multiple-choice instruments, administered immediately before and after training and at follow-up at 6 or 12 months. These comprise 16 questions each with 5 choices. The range of possible scores was from 0 to 16, and scores were scaled to percentages. Participants were predominantly dental practitioners, but a minority consisted of dental care professionals (dental nurses, hygienists and therapists). Of 285 participants, 272 (95.4%) completed both pre- and post-course questionnaires. One hundred and seventeen (43%) of these also completed the follow-up test, but only 109 (40%) individuals could be linked to the original course. Mean (standard deviation) pre-, post-course and follow-up-corrected percentage scores were 39.1 (16.1), 74.6 (16.9) and 58.9 (22.7), respectively. There was attrition in knowledge at follow-up: the average increase in adjusted score after training was 35.5 points, but only 56% of this was retained at follow-up. Paired t-tests confirmed that the mean score at follow-up was firmly intermediate between the pre- and post-course scores. Of the 109 participants, 7 (6%) achieved a satisfactory score pre-training, 82 (75%) immediately post-training and 41 (38%) at follow-up. There were gross differences between the levels of performance achieved for the eight subject areas tested. Immediate post-course assessments have indicated that current postgraduate courses in radiation protection are effective. However, a substantial amount of knowledge is lost by 6-12 months following course attendance. To achieve long-term knowledge retention, early or repeated reinforcement may be necessary. © 2011 John Wiley & Sons A/S.

  6. PROBLEMS IN TESTING DIGITAL PROTECTIVE RELAY FOR IMMUNITY TO INTENTIONAL DESTRUCTIVE ELECTROMAGNETIC IMPACTS. CONTINUATION OF THE THEME

    Directory of Open Access Journals (Sweden)

    Vladimir I. Gurevich

    2015-12-01

    Full Text Available The article is the continuation of the theme highlighted in the previous article with same title. The new article evaluates the results of digital protective relays (DPR testing for immunity to the E1 component of High-altitude Electromagnetic Pulse (HEMP and to Intentional Electromagnetic Interferences (IEMI impacts, conducted by some independent American organizations; discusses the features of relay protection devices as well as clarifies and supplements the procedure for testing these devices. Due to methodology errors during the DPR tests conducted by mentioned organizations earlier, they cannot be considered as satisfactory and their results as meaningful. At the moment there are no reliable data on the level of DPR immunity to IDEI, which suggests that the test should be conducted further.

  7. Promoting employee health by integrating health protection, health promotion, and continuous improvement: a longitudinal quasi-experimental intervention study.

    Science.gov (United States)

    von Thiele Schwarz, Ulrica; Augustsson, Hanna; Hasson, Henna; Stenfors-Hayes, Terese

    2015-02-01

    To test the effects of integrating health protection and health promotion with a continuous improvement system (Kaizen) on proximal employee outcomes (health promotion, integration, and Kaizen) and distal outcomes (workability, productivity, self-rated health and self-rated sickness absence). Twelve units in a county hospital in Sweden were randomized to control or intervention groups using a quasiexperimental study design. All staff (approximately 500) provided self-ratings in questionnaires at baseline, and a 12- and 24-month follow-up (response rate, 79% to 87.5%). There was a significant increase in the proximal outcomes over time in the intervention group compared with the control group, and a trend toward improvement in the distal outcomes workability and productivity. Integration seems to promote staff engagement in health protection and promotion, as well as to improve their understanding of the link between work and health.

  8. Do continued antidepressants protect against dementia in patients with severe depressive disorder?

    DEFF Research Database (Denmark)

    Kessing, Lars Vedel; Forman, Julie Lyng; Andersen, Per Kragh

    2011-01-01

    may decrease the risk of developing dementia in patients with depression. We investigated whether continued treatment with antidepressants is associated with a decreased rate of dementia in a population of patients discharged from psychiatric healthcare service with a diagnosis of depression. We used...... register data on all prescribed antidepressants in all patients discharged from psychiatric healthcare service with a diagnosis of depression and with subsequent diagnoses of dementia in Denmark from 1995 to 2005. A total of 37 658 patients with a diagnosis of depression at their first psychiatric contact......Studies on humans show that depressive disorder is associated with an increased risk of developing cognitive dysfunction, and animal studies suggest that antidepressants may have neuroprotective abilities. On the basis of these observations, it was hypothesized that treatment with antidepressants...

  9. Impact of continued use of profenofos on soil as a consequence of cotton crop protection

    International Nuclear Information System (INIS)

    Tejada, A.W.; Bayot, R.G.; Quintana, B.B.; Austria, L.M.; Bobiles, S.C.; Villanueva, A.G.R.

    2001-01-01

    The same area was used since the project started in 1995 in the study to determine the impact of continued use of profenofos on soil properties in a cotton field. The effect on microbial population was minimal. Total bacterial, Bacillus and fungal counts generally decreased during the first spraying but recovered after the succeeding applications of profenofos. Basal respiration was not affected by profenofos treatment. Substrate induced respiration was not affected in the first spraying but was stimulated after the second and third sprayings. Movement of profenofos in the soil was slow when the soil was maintained at field capacity. It is easily degraded in the soil. The differences in organic volatiles, cumulative percent mineralization and bound residue formation of 14 C-2,4-D in untreated soil and farmer's field soil previously treated with cypermethrin, isoprocarb and profenofos were not statistically significant. (author)

  10. A Novel Technique Using a Protection Filter During Fibrin Sheath Removal for Implanted Venous Access Device Dysfunction

    Energy Technology Data Exchange (ETDEWEB)

    Sotiriadis, Charalampos; Hajdu, Steven David [University Hospital of Lausanne, Cardiothoracic and Vascular Unit, Department of Radiology (Switzerland); Degrauwe, Sophie [University Hospital of Lausanne, Department of Cardiology (Switzerland); Barras, Heloise; Qanadli, Salah Dine, E-mail: salah.qanadli@chuv.ch [University Hospital of Lausanne, Cardiothoracic and Vascular Unit, Department of Radiology (Switzerland)

    2016-08-15

    With the increased use of implanted venous access devices (IVADs) for continuous long-term venous access, several techniques such as percutaneous endovascular fibrin sheath removal, have been described, to maintain catheter function. Most standard techniques do not capture the stripped fibrin sheath, which is subsequently released in the pulmonary circulation and may lead to symptomatic pulmonary embolism. The presented case describes an endovascular technique which includes stripping, capture, and removal of fibrin sheath using a novel filter device. A 64-year-old woman presented with IVAD dysfunction. Stripping was performed using a co-axial snare to the filter to capture the fibrin sheath. The captured fragment was subsequently removed for visual and pathological verification. No immediate complication was observed and the patient was discharged the day of the procedure.

  11. Course on Radiological Protection and Quality Assurance in Radiology. Tele-education course: A Possible Solution to continued Postgraduate training

    International Nuclear Information System (INIS)

    Alcaraz, M.; Chico, P.; Saura Iniesta, A.; Armero, D.; Vicente, V.

    2004-01-01

    The creation of an interdepartmental project subsidised by the Spanish Ministry of Education has made it possible to create a series of specific didactic materials on Radiological Protection and Quality Assurance in Medical Radiodiagnostic Practices, leading to the publication of a specific manual and practical notebook. As a result, this material now constitutes the working basis for those professionals exposed to ionising radiation who are following the first continuous tele-education training course in Spanish via the Internet on this subject. Interactive multimedia training and tele-education may become one of the alternatives that allow health science professionals to receive continuous training, if adequate content and aims have been established during undergraduate training. (Author) 18 refs

  12. Species protection, the changing informal economy, and the politics of access to the bushmeat trade in the Democratic Republic of Congo.

    Science.gov (United States)

    De Merode, Emmanuel; Cowlishaw, Guy

    2006-08-01

    Our understanding of the linkages between the bushmeat trade and the wider informal economy is limited. This lack of knowledge is particularly problematic for conservation under conditions of political instability, when the informal economy can be highly dynamic and impacts on wildlife populations can be severe. To explore these interlinked processes, we conducted a study of the bushmeat trade in Garamba National Park, Democratic Republic of Congo, through a combination of market surveys, semistructured interviews, and direct observation. We focused on the sale of protected and unprotected species in urban and rural markets, and the bushmeat commodity chains that supplied these markets, under conditions of political stability and armed conflict. During peacetime, protected species from the park (predominantly elephant and buffalo) rarely appeared in the rural markets, but they comprised more than half of all bushmeat sales in the urban markets. This pattern reflected differences in the rural and urban commodity chains. Automatic weapons were urban trade. The use of such weapons was discouraged by the traditional chiefs, who administered the village markets. During wartime, the sales of protected species in the urban markets increased fivefold because the military officers fled, leaving behind an open-access system that led to a massive increase in the exploitation of protected species. In contrast, the rural markets remained relatively stable because of the continued authority of the village chiefs. Our results indicate that sociopolitical factors can be an important determinant of species offtake and, therefore, that knowledge of the bushmeat commodity chain can be vital to controlling theprocesses that drive species extraction. In addition, our findings suggest that traditional authorities can be potentially valuable partners for bushmeat management.

  13. Autonomous Information Unit for Fine-Grain Data Access Control and Information Protection in a Net-Centric System

    Science.gov (United States)

    Chow, Edward T.; Woo, Simon S.; James, Mark; Paloulian, George K.

    2012-01-01

    As communication and networking technologies advance, networks will become highly complex and heterogeneous, interconnecting different network domains. There is a need to provide user authentication and data protection in order to further facilitate critical mission operations, especially in the tactical and mission-critical net-centric networking environment. The Autonomous Information Unit (AIU) technology was designed to provide the fine-grain data access and user control in a net-centric system-testing environment to meet these objectives. The AIU is a fundamental capability designed to enable fine-grain data access and user control in the cross-domain networking environments, where an AIU is composed of the mission data, metadata, and policy. An AIU provides a mechanism to establish trust among deployed AIUs based on recombining shared secrets, authentication and verify users with a username, X.509 certificate, enclave information, and classification level. AIU achieves data protection through (1) splitting data into multiple information pieces using the Shamir's secret sharing algorithm, (2) encrypting each individual information piece using military-grade AES-256 encryption, and (3) randomizing the position of the encrypted data based on the unbiased and memory efficient in-place Fisher-Yates shuffle method. Therefore, it becomes virtually impossible for attackers to compromise data since attackers need to obtain all distributed information as well as the encryption key and the random seeds to properly arrange the data. In addition, since policy can be associated with data in the AIU, different user access and data control strategies can be included. The AIU technology can greatly enhance information assurance and security management in the bandwidth-limited and ad hoc net-centric environments. In addition, AIU technology can be applicable to general complex network domains and applications where distributed user authentication and data protection are

  14. Remote and continuous gamma spectrometry for environmental radiation protection: A review of potential applications

    International Nuclear Information System (INIS)

    Put, Ph. V.; Debauche, A.; Lacroix, J-P.; Lellis, C. D.; Delecaut, G.

    2006-01-01

    than for seawater due to the fact that it has been measured in a 25-litres shielded vessel. This indicated that placing the detection system in an infinite medium offers clearly a better sensitivity. From now, the use of this tool is to detect routine and accidental releases of nuclear installations (power station, reprocessing plant, radioisotopes production). An example is the HYDROTELERAY measurement stations network that monitors continuously the radioactivity level of the French rivers for the benefit of the IRSN. Following the 'zero-release' policy, industries are at present concerned by the continuous surveillance of the effluents generated by their activities. As an illustration, the 99mTc concentration observed in a water purification plant collecting sewage water from hospitals clearly shows the days when the nuclear medicine department is operational. Let's also mention the psychological importance that represents this control in the sector of drinking water and in the sector of fish farms that use warm water directly supplied from a nuclear power plant third loop. The interest of these systems is also demonstrated following incidents involving nuclear driven submarines in the Mediterranean Sea and the threats of malignity acts by natural resources radiological contamination ('dirty bombs'). Such an instrument finds also some uses in research applications as in the fields of pollutants dispersion modeling, hydrogeology, oil prospecting etc

  15. Social franchising of TB care through private GPs in Myanmar: an assessment of treatment results, access, equity and financial protection.

    Science.gov (United States)

    Lönnroth, Knut; Aung, Tin; Maung, Win; Kluge, Hans; Uplekar, Mukund

    2007-05-01

    This article assesses whether social franchising of tuberculosis (TB) services in Myanmar has succeeded in providing quality treatment while ensuring equity in access and financial protection for poor patients. Newly diagnosed TB patients receiving treatment from private general practitioners (GPs) belonging to the franchise were identified. They were interviewed about social conditions, health seeking and health care costs at the time of starting treatment and again after 6 months follow-up. Routine data were used to ascertain clinical outcomes as well as to monitor trends in case notification. The franchisees contributed 2097 (21%) of the total 9951 total new sputum smear-positive pulmonary cases notified to the national TB programme in the study townships. The treatment success rate for new smear-positive cases was 84%, close to the World Health Organization target of 85% and similar to the treatment success of 81% in the national TB programme in Myanmar. People from the lower socio-economic groups represented 68% of the TB patients who access care in the franchise. Financial burden related to direct and indirect health care costs for tuberculosis was high, especially among the poor. Patients belonging to lower socio-economic groups incurred on average costs equivalent to 68% of annual per capita household income, with a median of 28%. However, 83% of all costs were incurred before starting treatment in the franchise, while 'shopping' for care. During treatment in the franchise, the cost of care was relatively low, corresponding to a median proportion of annual per capita income of 3% for people from lower socio-economic groups. This study shows that highly subsidized TB care delivered through a social franchise scheme in the private sector in Myanmar helped reach the poor with quality services, while partly protecting them from high health care expenditure. Extended outreach to others parts of the private sector may reduce diagnostic delay and patient costs

  16. Tanning Salon Compliance Rates in States With Legislation to Protect Youth Access to UV Tanning.

    Science.gov (United States)

    Williams, Melissa S; Buhalog, Brittany; Blumenthal, Laura; Stratman, Erik J

    2018-01-01

    The US Food and Drug Administration has classified tanning beds as carcinogenic. Most states have enacted legislation to prevent or create barriers for minors accessing tanning establishments. Determining tanning salon compliance with legislation would provide an indication of the influence of legislation at preventing exposure to the carcinogen in minors. To investigate compliance rates in the 42 states and the District of Columbia with legislation restricting tanning bed use in minors and to identify differences in compliance based on population, regional location, salon ownership, age group being regulated, and time since the law was enacted. This investigation was a cross-sectional telephone survey conducted between February 1, 2015, and April 30, 2016, by callers posing as minors attempting to schedule a tanning appointment. The setting was tanning salons in the 42 states and the District of Columbia that currently have legislation restricting tanning bed use in minors. Included in the study were 427 tanning salons, 10 randomly selected from each state or territory with tanning legislation. Overall compliance of tanning salons with state tanning legislation and differences in compliance based on community population, regional location, independent vs chain tanning salon, age group being regulated, and time since the law was enacted. Of the 427 tanning salons surveyed, overall noncompliance with state legislation was 37.2% (n = 159). There were more noncompliant tanning salons in rural locations (45.5%; 95% CI, 37.5%-53.7%; P = .009), southern regions of the United States (49.4%; 95% CI, 41.4%-57.4%; P = .001), independently owned salons (43.9%; 95% CI, 37.3%-50.6%; P = .003), states with younger age groups being regulated (53.5%; 95% CI, 45.7%-61.2%; P legislation aimed at limiting tanning bed use among US minors is unsatisfactory, indicating that additional efforts to enforce the laws and education of the harmful effects of UV tanning are

  17. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Dome Reef, 1989 - 2003 (NODC Accession 0002809)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  18. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Alligator Reef, 2005 - 2007 (NODC Accession 0019351)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  19. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Grecian Rocks, 2005 - 2007 (NODC Accession 0039973)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  20. Continuous bottom temperature measurements in strategic areas of the Florida Reef Track at Tennessee Reef, 1990 - 2004 (NODC Accession 0002749)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  1. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Triumph Reef, 1990 - 2006 (NODC accession 0013166)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  2. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Grecian Rocks, 1990 - 2005 (NODC Accession 0011143)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  3. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Cape Florida, 2005 - 2006 (NODC Accession 0014185)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  4. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Looe Iselin, 2006 - 2007 (NODC Accession 0039240)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  5. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Bullard Bank, 1992 - 2005 (NODC Accession 0010426)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  6. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Cape Florida, 1996 - 2005 (NODC Accession 0002788)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  7. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Sprigger Bank, 1992 - 2006 (NODC accession 0013114)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  8. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Long Key, 2008 - 2010 (NODC Accession 0093063)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  9. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Smith Shoal, 1998 - 2006 (NODC Accession 0014121)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  10. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Looe Buoy, 1988 - 2004 (NODC Accession 0002616)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  11. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Dome Reef, 2006 - 2007 (NODC Accession 0029107)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  12. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Dome Reef, 2005 - 2006 (NODC Accession 0014268)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  13. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Dome Reef, 2007 (NODC Accession 0093023)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  14. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Triumph Reef, 1990 - 2006 (NODC Accession 0013166)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  15. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Grecian Rocks, 2007 - 2010 (NODC Accession 0093026)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  16. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at 7-mile Bridge (NODC Accession 0002750)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  17. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Bullard Bank, 2005 - 2007 (NODC Accession 0039881)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  18. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Wellwood, 2006 - 2009 (NODC Accession 0093067)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  19. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  20. From Access to Excess: Changing Roles and Relationships for Distance Education, Continuing Education, and Academic Departments in American Universities

    Science.gov (United States)

    Ashcroft, Judy Copeland

    2013-01-01

    In American universities, early distance education needed both continuing education and academic departments for establishing institutional cooperation, developing quality standards, adapting to change, and finding a funding model. Today, the Internet and the need for additional revenue are driving new distance education models.

  1. Actual legal questions and problems of the free access to information, especially in the environmental protection; Aktuelle Rechtsfragen und Probleme des freien Informationszugangs, insbesondere im Umweltschutz

    Energy Technology Data Exchange (ETDEWEB)

    Schroeder, Meinhard (ed.)

    2010-07-01

    Within the 26th Trier colloquium on the law governing environmental protection and technology at 5th to 7th September, 2010 in Trier (Federal Republic of Germany), the following lectures were held: (1) The environmental law in the light of federalism and Europeanization (Hans-Juergen Papier); (2) Information rights in the EU (Astrid Epiney); (3) Environmental policy by freedom of information (Friedrich Schoch); (4) The legal framework for the opening of the access to information as well as the appearance of accessible information under special consideration of the environmental information Directive 2003/4/EG and its implementation in the German Law (Joern Axel Kaemmerer); (5) The utilization of electronic media: REACh data bases, publication of authorizing procedures in the Internet and geo data mediation such as google maps (Indra Spiecker); (6) Protection position of companies in the right of access to information. The protection of business secrets and commercial confidentialities as well as application dossiers in the European and German law (Matthias Rossi); (7) Limited protection of business secrets and commercial confidentialities as a part of genetic engineering legal approval procedures (Hartwig Stiebler); (8) The NRW pipeline cadastre (Alexander Schink); (9) Legal protection by European and national courts under consideration of the European Ombudsman in his function in securing the access of information (Sabine Schlacke).

  2. Process measures or patient reported experience measures (PREMs) for comparing performance across providers? A study of measures related to access and continuity in Swedish primary care.

    Science.gov (United States)

    Glenngård, Anna H; Anell, Anders

    2018-01-01

    Aim To study (a) the covariation between patient reported experience measures (PREMs) and registered process measures of access and continuity when ranking providers in a primary care setting, and (b) whether registered process measures or PREMs provided more or less information about potential linkages between levels of access and continuity and explaining variables. Access and continuity are important objectives in primary care. They can be measured through registered process measures or PREMs. These measures do not necessarily converge in terms of outcomes. Patient views are affected by factors not necessarily reflecting quality of services. Results from surveys are often uncertain due to low response rates, particularly in vulnerable groups. The quality of process measures, on the other hand, may be influenced by registration practices and are often more easy to manipulate. With increased transparency and use of quality measures for management and governance purposes, knowledge about the pros and cons of using different measures to assess the performance across providers are important. Four regression models were developed with registered process measures and PREMs of access and continuity as dependent variables. Independent variables were characteristics of providers as well as geographical location and degree of competition facing providers. Data were taken from two large Swedish county councils. Findings Although ranking of providers is sensitive to the measure used, the results suggest that providers performing well with respect to one measure also tended to perform well with respect to the other. As process measures are easier and quicker to collect they may be looked upon as the preferred option. PREMs were better than process measures when exploring factors that contributed to variation in performance across providers in our study; however, if the purpose of comparison is continuous learning and development of services, a combination of PREMs and

  3. A U.S. Perspective on Nuclear Liability: A Continuing Impediment to International Trade and Public Protection

    International Nuclear Information System (INIS)

    Brown, O. F.

    2008-01-01

    More than two decades after the 1986 events at Chernobyl demonstrated nuclear power plant accidents can have cross-border consequences, there still is not a unified international legal regime for liability associated with nuclear accidents. This continues to present an impediment to international nuclear trade and protection of the public. Liability potentially associated with international nuclear commerce remains a labyrinth of statutes and treaties not yet interpreted by the courts. Countries with a majority of the world's 439 operating nuclear power plants are not yet parties to any nuclear liability convention in force. The global Vienna Convention on Civil Liability for Nuclear Damage now covers only about 73 operating nuclear power plants; the regional Paris Convention on Third Party Liability in the Field of Nuclear Energy now covers about 126; and, the Joint Protocol that links those two Conventions covers only about 68. The best solution would be for more countries to join the United States (with 104 operating nuclear power plants) in ratifying the Convention on Supplementary Compensation for Nuclear Damage (CSC) adopted by the International Atomic Energy Agency (IAEA) in 1997. As soon as the CSC enters into force, it will cover more nuclear power plants than either the Vienna or Paris Convention. This presentation also provides an update on insurance coverage in the United States for acts of terrorism.(author)

  4. A global survey of clinicians' awareness, accessibility, utilization of e-continuous education, and quality of clinical blood use: policy considerations

    Directory of Open Access Journals (Sweden)

    Smit Sibinga CT

    2017-07-01

    Full Text Available Cees Th Smit Sibinga,1 Maruff A Oladejo,2 Olamide Hakeem Adejumo,3 Quentin Eichbaum,4 Midori Kumagawa,5 Shuichi Kino,5 Sima Zolfaghari,6 Silvano Wendel,7 Gordana Rasovic,8 Namjil Erdenebayar,9 Maya Makhmudova,10 Loyiso Mpuntsha,11 Charlotte Ingram,11 Bakyt B Kharabaev,12 Isaac Kajja,13 Zainab Mukhtar Hussain Sanji,14 Maria M M Satti15 1IQM Consulting for International Development of Quality Management in Transfusion Medicine, University of Groningen, Groningen, the Netherlands; 2Department of Educational Management, University of Lagos, Lagos, 3Olabisi Onabanjo University Teaching Hospital, Sagamu, Nigeria; 4Department of Pathology, Microbiology and Immunology, Vanderbilt University Medical Center, Nashville, TN, USA; 5Japanese Red Cross Hokkaido Block Blood Center, Japan; 6IBTO, Tehran, Iran; 7Blood Bank, Hospital Sirio Libanês, Sao Paulo, Brazil; 8Montenegro National Blood Transfusion Center, Podgorica, Montenegro; 9National Center for Transfusion Medicine, Ulaanbaatar, Mongolia; 10Consultant IQM Consulting, Tashkent, Uzbekistan; 11South Africa National Blood Transfusion Service, Johannesburg, South Africa; 12National Blood Transfusion Service, Bishkek, Kyrgyzstan; 13Department of Orthopedics, Mulago Hospital, Makerere University, Uganda; 14Consultant, Dow University of Health Sciences, Karachi, Pakistan; 15National Blood Transfusion Service, Khartoum, Sudan Introduction: Clinical use of blood has shown the least developed part in the vein-to-vein transfusion chain. This global study was carried out in order to investigate the level of awareness, accessibility and utilization of continuous e-learning and education, and quality of blood use among blood prescribing clinicians and nurses.Approach: Descriptive ex post facto survey design.Methods: A total of 264 purposively selected blood prescribing clinicians and nurses from the four Human Development Index (HDI groups of countries (low, medium, high, and very high participated in this study

  5. [Pain control by continuous infusion of morphine using subarachnoid catheter access to the port--a report of a home death case].

    Science.gov (United States)

    Kawagoe, Koh; Matsuura, Shinobu

    2008-12-01

    This is a case of a 50s male with cecal cancer suffering from severe pain caused by osteolytic metastasis to the lumbar vertebra, right iliac bone, and the head of the right femur. The pain was palliated by continuous infusion of morphine using a subarachnoid catheter that had access to the subcutaneous "Port". The maximum dose of morphine used a day was 384 mg, which corresponded to 57,600 mg/day of oral morphine. Sixty eight days after the start of home hospice care, the patient died at home because of diffuse peritonitis caused by intestinal rupture.

  6. The effect of cooking and washing rice on the bio-accessibility of As, Cu, Fe, V and Zn using an on-line continuous leaching method.

    Science.gov (United States)

    Horner, Nolan S; Beauchemin, Diane

    2013-01-03

    A previously developed method based on continuous on-line leaching with artificial gastro-intestinal fluids was used to determine the bio-accessible fraction of As, Cu, Fe, V and Zn in brown and white rice from California by inductively coupled mass spectrometry (ICP-MS). Saliva generally accounted for the largest percentage of total element leached in comparison to gastric and intestinal juices. Arsenic speciation analysis was performed on the saliva and gastric juice leachates using ion exchange chromatography coupled to ICP-MS. The four most toxic species of As (As(III), monomethylarsonic acid (MMA), dimethylarsinic acid (DMA) and As(V)), as well as Cl(-) in the gastric juice leachate, were successfully separated within 5.5min using a simple nitric acid gradient. While cooking rice had relatively little effect on total bio-accessibility, a change in species from As(V) and DMA to As(III) was observed for both types of rice. On the other hand, washing the rice with doubly deionized water prior to cooking removed a large percentage of the total bio-accessible fraction of As, Cu, Fe, V and Zn. Copyright © 2012 Elsevier B.V. All rights reserved.

  7. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: A privacy-protecting remote access system for health-related research and evaluation☆

    Science.gov (United States)

    Jones, Kerina H.; Ford, David V.; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J.; Heaven, Martin L.; Thayer, Daniel S.; McNerney, Cynthia L.; Lyons, Ronan A.

    2014-01-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. PMID:24440148

  8. A case study of the Secure Anonymous Information Linkage (SAIL) Gateway: a privacy-protecting remote access system for health-related research and evaluation.

    Science.gov (United States)

    Jones, Kerina H; Ford, David V; Jones, Chris; Dsilva, Rohan; Thompson, Simon; Brooks, Caroline J; Heaven, Martin L; Thayer, Daniel S; McNerney, Cynthia L; Lyons, Ronan A

    2014-08-01

    With the current expansion of data linkage research, the challenge is to find the balance between preserving the privacy of person-level data whilst making these data accessible for use to their full potential. We describe a privacy-protecting safe haven and secure remote access system, referred to as the Secure Anonymised Information Linkage (SAIL) Gateway. The Gateway provides data users with a familiar Windows interface and their usual toolsets to access approved anonymously-linked datasets for research and evaluation. We outline the principles and operating model of the Gateway, the features provided to users within the secure environment, and how we are approaching the challenges of making data safely accessible to increasing numbers of research users. The Gateway represents a powerful analytical environment and has been designed to be scalable and adaptable to meet the needs of the rapidly growing data linkage community. Copyright © 2014 The Aurthors. Published by Elsevier Inc. All rights reserved.

  9. 40 CFR 264.34 - Access to communications or alarm system.

    Science.gov (United States)

    2010-07-01

    ... FACILITIES Preparedness and Prevention § 264.34 Access to communications or alarm system. (a) Whenever... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 264.34 Section 264.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID...

  10. 40 CFR 265.34 - Access to communications or alarm system.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 25 2010-07-01 2010-07-01 false Access to communications or alarm system. 265.34 Section 265.34 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) SOLID..., STORAGE, AND DISPOSAL FACILITIES Preparedness and Prevention § 265.34 Access to communications or alarm...

  11. Protecting Sudan’s children

    Directory of Open Access Journals (Sweden)

    Julia Freedson

    2007-07-01

    Full Text Available The protection and well-being of children in Sudan are at a crucial juncture. While children in the South are enjoying improved security and access to services, those in Darfur continue to face appalling levels of violence and denial of basic services. Protection of children must be at the forefront of efforts to bring peace and stability to Sudan.

  12. Evaluation of an open access software for calculating glucose variability parameters of a continuous glucose monitoring system applied at pediatric intensive care unit.

    Science.gov (United States)

    Marics, Gábor; Lendvai, Zsófia; Lódi, Csaba; Koncz, Levente; Zakariás, Dávid; Schuster, György; Mikos, Borbála; Hermann, Csaba; Szabó, Attila J; Tóth-Heyn, Péter

    2015-04-24

    Continuous Glucose Monitoring (CGM) has become an increasingly investigated tool, especially with regards to monitoring of diabetic and critical care patients. The continuous glucose data allows the calculation of several glucose variability parameters, however, without specific application the interpretation of the results is time-consuming, utilizing extreme efforts. Our aim was to create an open access software [Glycemic Variability Analyzer Program (GVAP)], readily available to calculate the most common parameters of the glucose variability and to test its usability. The GVAP was developed in MATLAB® 2010b environment. The calculated parameters were the following: average area above/below the target range (Avg. AUC-H/L); Percentage Spent Above/Below the Target Range (PATR/PBTR); Continuous Overall Net Glycemic Action (CONGA); Mean of Daily Differences (MODD); Mean Amplitude of Glycemic Excursions (MAGE). For verification purposes we selected 14 CGM curves of pediatric critical care patients. Medtronic® Guardian® Real-Time with Enlite® sensor was used. The reference values were obtained from Medtronic®(')s own software for Avg. AUC-H/L and PATR/PBTR, from GlyCulator for MODD and CONGA, and using manual calculation for MAGE. The Pearson and Spearman correlation coefficients were above 0.99 for all parameters. The initial execution took 30 minutes, for further analysis with the Windows® Standalone Application approximately 1 minute was needed. The GVAP is a reliable open access program for analyzing different glycemic variability parameters, hence it could be a useful tool for the study of glycemic control among critically ill patients.

  13. Experience of developing and introduction of the integrated systems for accounting, control and physical protection of nuclear materials under conditions of continuously operating production

    International Nuclear Information System (INIS)

    Filatov, O.N.; Rogachev, V.E.

    2003-01-01

    The improvements of the integrated systems for accounting, control and physical protection (ACPP) of nuclear materials under conditions practically continuous production cycle are described. As a result of development and introduction of the improved means and technologies the developed systems realized successfully the requirements of reliable ACPP of nuclear materials [ru

  14. Duties and tasks of local government and NGOS in protection of the environment in the process of the accession of Serbia to the EU

    Directory of Open Access Journals (Sweden)

    Pendić Zoran R.

    2014-01-01

    Full Text Available Local self-government (LSG, and the municipal police (MP and civil society organizations (CSOs, which operate on the territory of the local self-government, play an important role in the definition and implementation of programs for environmental protection within the territory of LSG. LSG, MP and CSOs need to improve their knowledge for the implementation of Serbian legislation in the field of environmental protection, which must be, at the end of the process of Serbia's accession to the European Union (EU, fully compliant with relevant legislation of the EU. The paper presents the theses of tasks for the LSG, MP and CSOs related to environmental protection, with special emphasis on the protection of drinking water sources, which are located in the territory of the local self-government.

  15. Feasibility and Acceptability of Brighter Bites: A Food Co-Op in Schools to Increase Access, Continuity and Education of Fruits and Vegetables Among Low-Income Populations.

    Science.gov (United States)

    Sharma, Shreela; Helfman, Lisa; Albus, Katherine; Pomeroy, Mike; Chuang, Ru-Jye; Markham, Christine

    2015-08-01

    Intake of fruits and vegetables (F&V) continues to be low in children in the United States. The purpose of this study was to conduct a pilot feasibility evaluation of Brighter Bites, a school-based food co-op to provide access to fresh F&V and nutrition education to low-income children and their families. Brighter Bites is a 16-week school-based food co-op consisting of: (1) Weekly distribution of 50-60 servings of fresh F&V; (2) Weekly bilingual parent handouts and recipe demonstrations; and (3) implementing CATCH, a coordinated school health program in schools. Brighter Bites was pilot tested using a pre-post evaluation design in one charter school in Houston, TX, USA (n = 57 3rd grade parent-child dyads; 94.1 % Hispanic, 91 % low-income). Evaluation, at baseline, midpoint, and post-intervention, included self-reported child and parent surveys on psychosocial factors, dietary habits and mealtime practices. Pearson's Chi square test, Fisher's exact-test or paired t test were used to determine changes pre- to post-intervention (at p food, less sugary drinks with meals, more children asking for F&V as snacks. Process data showed 98 % retention rate and high parent acceptability of program components. Brighter Bites is a promising strategy to increase F&V access and education in low-income populations using existing infrastructure of schools and food banks.

  16. Radiation protection practices and related continuing professional education in dental radiography: A survey of practitioners in the North-east of England

    International Nuclear Information System (INIS)

    Davies, Ceri; Grange, Stuart; Trevor, Margaret M.

    2005-01-01

    Purpose: To establish the level of implementation of recommendations from the National Radiological Protection Board, relating to best radiation protection practice in dental radiography within general dental practices in the North-east of England. To survey the opinion of practitioners on the availability of related post-graduate courses in the region. Methods: A postal survey in the form of a self-reported questionnaire was mailed to all practices in the North-east of England in November 2000. The questionnaire, consisting of closed and open-ended questions, was to be completed where possible by the resident radiation protection supervisor. Results: Two hundred and sixteen practices responded to the questionnaire, a response rate of 53%. The survey revealed variation in the standards of application of best radiation protection practice. Some 23% of practitioners had not attended any post-graduate courses on radiation protection since qualifying. Post-graduate education provision on radiation protection in the region was considered insufficient by 51% of respondents. Conclusions: It is concluded that a significant proportion of practices were not making full use of opportunities to reduce dose to their patients. In addition, a small number of practices had untrained staff acting as the Radiation Protection Supervisor. A significant proportion of practitioners had not been updated in radiation protection practices within a 5-year period, and this may account for the failure to implement best radiographic practice. Over half felt that there was insufficient availability of post-graduate courses in radiation protection. The regional provision of continuing professional education in this field may need development

  17. US Environmental Protection Agency National Coastal Assessment for Hawaii 2002: Water Quality, Fish Taxon, Sediment Chemistry Data (NODC Accession 0061250)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — In 2002, the Environmental Protection Agency (EPA) Environmental Monitoring and Assessment Program (EMAP) National Coastal Assessment (NCA), in conjunction with...

  18. Protective

    Directory of Open Access Journals (Sweden)

    Wessam M. Abdel-Wahab

    2013-10-01

    Full Text Available Many active ingredients extracted from herbal and medicinal plants are extensively studied for their beneficial effects. Antioxidant activity and free radical scavenging properties of thymoquinone (TQ have been reported. The present study evaluated the possible protective effects of TQ against the toxicity and oxidative stress of sodium fluoride (NaF in the liver of rats. Rats were divided into four groups, the first group served as the control group and was administered distilled water whereas the NaF group received NaF orally at a dose of 10 mg/kg for 4 weeks, TQ group was administered TQ orally at a dose of 10 mg/kg for 5 weeks, and the NaF-TQ group was first given TQ for 1 week and was secondly administered 10 mg/kg/day NaF in association with 10 mg/kg TQ for 4 weeks. Rats intoxicated with NaF showed a significant increase in lipid peroxidation whereas the level of reduced glutathione (GSH and the activity of superoxide dismutase (SOD, catalase (CAT, glutathione S-transferase (GST and glutathione peroxidase (GPx were reduced in hepatic tissues. The proper functioning of the liver was also disrupted as indicated by alterations in the measured liver function indices and biochemical parameters. TQ supplementation counteracted the NaF-induced hepatotoxicity probably due to its strong antioxidant activity. In conclusion, the results obtained clearly indicated the role of oxidative stress in the induction of NaF toxicity and suggested hepatoprotective effects of TQ against the toxicity of fluoride compounds.

  19. A Microstrip Patch-Fed Short Backfire Antenna for the Tracking and Data Relay Satellite System-Continuation (TDRSS-C) Multiple Access (MA) Array

    Science.gov (United States)

    Nessel, James A.; Kory, Carol L.; Lambert, Kevin M.; Acosta, Roberto J.

    2006-01-01

    Short Backfire Antennas (SBAs) are widely utilized for mobile satellite communications, tracking, telemetry, and wireless local area network (WLAN) applications due to their compact structure and excellent radiation characteristics [1-3]. Typically, these SBA s consist of an excitation element (i.e., a half-wavelength dipole), a reflective bottom plane, a planar sub-reflector located above the "exciter", and an outer circular rim. This configuration is capable of achieving gains on the order of 13-15 dBi, but with relatively narrow bandwidths (approx.3%-5%), making it incompatible with the requirements of the next generation enhanced Tracking and Data Relay Satellite System-Continuation (TDRSS-C) Multiple Access (MA) array [1]. Several attempts have been made to enhance the bandwidth performance of the common dipole-fed SBA by employing various other feeding mechanisms (e.g., waveguide, slot) with moderate success [4-5]. In this paper, a novel method of using a microstrip patch is employed for the first time to excite an SBA. The patch element is fed via two H-shaped slots electromagnetically coupled to a broadband hybrid coupler to maintain a wide bandwidth, as well as provide for dual circular polarization capabilities.

  20. Report: EPA Could Improve Physical Access and Service Continuity/Contingency Controls for Financial and Mixed-Financial Systems Located at its Research Triangle Park Campus

    Science.gov (United States)

    Report #2006-P-00005, December 14, 2005. Controls needed to be improved in areas such as visitor access to facilities, use of contractor access badges, and general physical access to the NCC, computer rooms outside the NCC, and media storage rooms.

  1. Variations in constitutive and inducible UV-B tolerance; dissecting photosystem II protection in Arabidopsis thaliana accessions

    NARCIS (Netherlands)

    Jansen, M.A.K.; LeMartret, B.; Koornneef, M.

    2010-01-01

    The rise in ultraviolet-B (UV-B) (280–315 nm) radiation levels, that is a consequence of stratospheric ozone layer depletion, has triggered extensive research on the effects of UV-B on plants. Plants raised under natural sunlight conditions are generally well protected from the potentially harmful

  2. Ready access to functionally embellished cis-hydrindanes and cis-decalins: protecting group-free total syntheses of (±)-Nootkatone and (±)-Noreremophilane.

    Science.gov (United States)

    Handore, Kishor L; Seetharamsingh, B; Reddy, D Srinivasa

    2013-08-16

    A simple and efficient synthesis of functionalized cis-hydrindanes and cis-decalins was achieved using a sequential Diels-Alder/aldol approach in a highly diastereoselective manner. The scope of this method was tested with a variety of substrates and was successfully applied to the synthesis of two natural products in racemic form. The highlights of the present work provide ready access to 13 new cis-hydrindanes/cis-decalins, a protecting group-free total synthesis of an insect repellent Nootkatone, and the first synthesis of a Noreremophilane using the shortest sequence.

  3. Study on the rules and practices in force abroad regarding the delimitation and access to regulated areas for radiation protection purposes. Final report - Appendices. Report no. 313

    International Nuclear Information System (INIS)

    Schieber, C.; Crouail, P.; Beltrami, L.A.; Reaud, C.

    2013-06-01

    Within the frame of a reviewing of European requirements in the field of radiation protection, this report presents a synthesis of rules which are applicable in seven countries (Belgium, Spain, United States, Finland, United-Kingdom, Sweden and Switzerland; a detailed report for each of these countries is provided in appendix) in the field of delimitation and access to regulated areas for radiation protection purposes. A synthesis is proposed for each country. Three countries are then selected (Finland, United Kingdom and Switzerland) and their rules and practices are applied to cases which correspond to representative exposure situations: a room with a glove box, a hall with hot spots, a parking of temporary warehousing (packages of used fuels), intermittent use of an X ray generator, use of an intense radiation beam, workshop being dismantled, laboratory in which radioactive iodine 131 is handled, and use of a mobile industrial radiography device

  4. Development of a continuous motorcycle protection barrier system using computer simulation and full-scale crash testing.

    Science.gov (United States)

    Atahan, Ali O; Hiekmann, J Marten; Himpe, Jeffrey; Marra, Joseph

    2018-07-01

    Road restraint systems are designed to minimize the undesirable effects of roadside accidents and improve safety of road users. These systems are utilized at either side or median section of roads to contain and redirect errant vehicles. Although restraint systems are mainly designed against car, truck and bus impacts there is an increasing pressure by the motorcycle industry to incorporate motorcycle protection systems into these systems. In this paper development details of a new and versatile motorcycle barrier, CMPS, coupled with an existing vehicle barrier is presented. CMPS is intended to safely contain and redirect motorcyclists during a collision event. First, crash performance of CMPS design is evaluated by means of a three dimensional computer simulation program LS-DYNA. Then full-scale crash tests are used to verify the acceptability of CMPS design. Crash tests were performed at CSI proving ground facility using a motorcycle dummy in accordance with prEN 1317-8 specification. Full-scale crash test results show that CMPS is able to successfully contain and redirect dummy with minimal injury risk on the dummy. Damage on the barrier is also minimal proving the robustness of the CMPS design. Based on the test findings and further review by the authorities the implementation of CMPS was recommended at highway system. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Continuing education in radiation protection in the nuclear fuel cycle: The case of Nuclear Industries of Brazil

    International Nuclear Information System (INIS)

    Souza Pereira, W. de; Kelecom, A.

    2014-01-01

    This paper describes the pedagogical and technical concept that guided training in radiation protection implemented by the Indústrias Nucleares do Brasil (INB; Nuclear Industries of Brazil) to maintain the competence of its technical staff to perform activities with exposure to radiation, the staff responsible for the supervision of this work and as a form of dissemination of knowledge to the staff not involved in the use of ionizing radiation. The groups of workers to be trained are here described, as well as the level of training, the frequency and types of training, the profile of trainers, the training programs, the forms of assessment and recording of training. It also describes the first general training performed in 2004. After this initial training no other general training was realized, and the option was to train small groups of workers, to avoid stopping the production as it occurred when general training was executed. The overall training was conducted in three units: the Uranium Concentration Unit (URA) under production in the city of Caetité, state of Bahia, the Ore Treatment Unit (UTM) undergoing decommissioning at Poços de Caldas, state of Minas Gerais and the Unit of Heavy Minerals (UMP), at Buena, state of Rio de Janeiro. In the initial training at URA 79 workers were trained, distributed in 6 classes (average of 13 students per class); each class had nine hours training and the grades obtained ranged from 7.5 to 10. At UTM, 200 employees were trained distributed in 9 classes (average of 22 students per class); their notes ranged from 8.8 to 10. Finally, at UMP 151 employees were trained, in 5 classes (average of 31 students per class); their grades ranged from 8.6 to 9.0. That year, a total of 180 hours were spent for training 430 employees, with no effective rebuke. Currently employees are trained when they arrive at their Units, and all along the year in small classes, as the general training has been definitely abolished. (author)

  6. A simple method using on-line continuous leaching and ion exchange chromatography coupled to inductively coupled plasma mass spectrometry for the speciation analysis of bio-accessible arsenic in rice.

    Science.gov (United States)

    Horner, Nolan S; Beauchemin, Diane

    2012-03-02

    A simple method for the speciation analysis of bio-accessible arsenic (As) in rice was developed using a continuous on-line leaching method to release the bio-accessible fraction. The continuous on-line leaching method has several advantages over commonly used batch methods including quicker and easier sample preparation, reduced risk of contamination and access to real time leaching data. The bio-accessibility of As in the samples was monitored using inductively coupled plasma mass spectrometry (ICP-MS). Results from a certified reference material as well as cooked and uncooked white rice showed that the majority of As was leached by saliva. Results obtained using the continuous on-line leaching method were comparable to those obtained using a batch method. Speciation analysis of the saliva leachate was performed using ion exchange chromatography coupled to ICP-MS. The four most toxic forms of As (As(III), monomethylarsonic acid (MMA), dimethylarsinic acid (DMA) and As(V)) were clearly separated within 5 min in a single chromatographic run. Over 92% of bio-accessible As in the certified reference material and uncooked white rice sample was in the form of DMA and As(V), whereas it was present as DMA and As(III) in the cooked white rice. Copyright © 2011 Elsevier B.V. All rights reserved.

  7. Does Medicaid Insurance Confer Adequate Access to Adult Orthopaedic Care in the Era of the Patient Protection and Affordable Care Act?

    Science.gov (United States)

    Labrum, Joseph T; Paziuk, Taylor; Rihn, Theresa C; Hilibrand, Alan S; Vaccaro, Alexander R; Maltenfort, Mitchell G; Rihn, Jeffrey A

    2017-06-01

    A current appraisal of access to orthopaedic care for the adult patient receiving Medicaid is important, since Medicaid expansion was written into law by the Patient Protection and Affordable Care Act (PPACA). (1) Do orthopaedic practices provide varying access to orthopaedic care for simulated patients with Medicaid insurance versus private insurance in a blinded survey? (2) What are the surveyed state-by-state Medicaid acceptance rates for adult orthopaedic practices in the current era of Medicaid expansion set forth by the PPACA? (3) Do surveyed rates of access to orthopaedic care in the adult patient population vary across practice setting (private vs academic) or vary with different Medicaid physician reimbursement rates? (4) Are there differences in the surveyed Medicaid acceptance rates for adult orthopaedic practices in states that have expanded Medicaid coverage versus states that have foregone expansion? Simulated Patient Survey: We performed a telephone survey study of orthopaedic offices in four states with Medicaid expansion. In the survey, the caller assumed a fictitious identity as a 38-year-old male who experienced an ankle fracture 1 day before calling, and attempted to secure an appointment within 2 weeks. During initial contact, the fictitious patient reported Medicaid insurance status. One month later, the fictitious patient contacted the same orthopaedic practice and reported private insurance coverage status. National Orthopaedic Survey: Private and academic orthopaedic practices operating in each state in the United States were called and asked to complete a survey assessing their practice model of Medicaid insurance acceptance. State reimbursement rates for three different Current Procedural Terminology (CPT ®) codes were collected from state Medicaid agencies. Results Simulated Patient Survey: Offices were less likely to accept Medicaid than commercial insurance (30 of 64 [47%] versus 62 of 64 [97%]; odds ratio [OR], 0.0145; 95% CI, 0

  8. Physical, chemical, and biological data as part of continuous monitoring in the Mobile-Tensaw Delta in 2003 and 2004 (NODC Accession 0117321)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Continuous monitoring data that includes water temperature, conductivity, salinity, water level, dissolved oxygen, turbidity, pressure, and resistivity collected on...

  9. Reconfiguring the Law of Non-Refoulement: Procedural and Substantive Barriers for Those Seeking to Access Surrogate International Human Rights Protection

    Directory of Open Access Journals (Sweden)

    Mark R. von Sternberg

    2014-12-01

    Full Text Available Both geographic and normative constraints restrict access to surrogate international human rights protection for those seeking a haven from serious human rights abuses. Primary among territorial restrictions has been the fall-out from the US Supreme Court’s decision in Sale v. Haitian Council Centers in which the court explicitly ruled that nothing in US statutory law, or in the 1951 Convention on Refugees or its 1967 Protocol, precluded the interdiction of Haitian refugees in international waters and their return to the country of origin without an effective interview on their protection clams. This ruling is in transparent contradiction to the general international law norm of non-refoulement according to modern scholarship and emerging case law. This paper concludes that Sale should be overturned by statute as should related pre-screening practices. A new standard of “jurisdiction” should be adopted which does not depend on territorial access to a signatory state but on whether the state is exercising power in fact. Similar concerns exist with respect to safe third country agreements which often offend the international customary right of the asylum seeker to choose where his or her claim will be filed. This paper argues that the right of choice should be recognized and onward travel and admission to the country of destination allowed. This result is especially called for where return of the alien by the country of first contact raises serious concerns under the law of non-refoulement. Imbalances noted in this paper include those generated by the new terrorism related grounds of inadmissibility in theUnited States and the summary denial of children’s asylum claims flowing from gang violence.Other questions are raised in this paper concerning work authorization and detention of asylum seekers. Access to an employment authorization document for those filing colorable claims should be recognized by statute to render US practice

  10. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at the Bahia Honda Bridge, 2005 - 2007 (NODC Accession 0039226)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  11. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract, at the M/V ELPIS Restoration Site, 2006 - 2007 (NODC Accession 0039899)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  12. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Sand Key Lighthouse, 1990 - 2005 (NODC Accession 0012769)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  13. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at the M/V Alec Owen Maitland restoration site, 2006 - 2007 (NODC Accession 0039987)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  14. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Key West Channel, 2005 - 2007 (NODC Accession 0039986)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  15. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Boca Grande Channel, 2004-2006 (NODC Accession 0014184)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  16. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at the Pillar Coral Forest site, 2006 (NODC accession 0040039)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  17. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at the M/V Alec Owen Maitland restoration site, 2004 - 2006 (NODC Accession 0010585)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  18. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Boca Grande Channel, 2007 - 2008 and 2012 (NODC Accession 0093019)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  19. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Card Sound Bridge, 2004 - 2006 (NODC Accession 0014266)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  20. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Sand Key Lighthouse, 2005 - 2007 (NODC Accession 0040080)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  1. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at 9-Ft Shoal, 2007-2010 (NODC Accession 0092549)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  2. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Ball Buoy Reef, 1990 - 1998 (NODC Accession 0002781)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  3. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract, at the M/V ELPIS Restoration Site, 2004 - 2006 (NODC Accession 0010576)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  4. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Bicentennial Coral Head, 1998 - 2006 (NODC Accession 0039481)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  5. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at the Broad Creek site, 2006 - 2007 (NODC Accession 0039880)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  6. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Looe Iselin, 2004-2006 (NODC Accession 0014271)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  7. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at the M/V Alec Owen Maitland Restoration site, 2006 - 2007 (NODC Accession 0039987)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  8. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Key West Channel, 2007 - 2010 and 2011 - 2012 (NODC Accession 0093028)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  9. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Bahia Honda Bridge, 2007-2011 (NODC Accession 0093018)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  10. Continuous bottom temperature measurements in strategic atreas of the Florida Reef Tract at the New Ground Shoal site, 1992 - 2006 (NODC Accession 0012845)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  11. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Key West Channel, 1991 - 2005 (NODC Accession 0012739)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  12. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Snake Creek Bridge, 1989 - 2005 (NODC accession 0013148)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  13. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Harbor Key Bank, 1992 - 1997 (NODC Accession 0013553)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  14. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Hen and Chickens Reef, 2006 - 2007 (NODC Accession 0020554)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  15. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Hen and Chickens Reef, 1989 - 2006 (NODC Accession 0011144)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  16. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at the Pillar Coral Forest site, 1996 - 2006 (NODC accession 0013096)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  17. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Sand Key Lighthouse, 2007 - 2010 (NODC Accession 0093065)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  18. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at 7-mile Bridge, 2005 - 2007 (NODC Accession 0039469)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  19. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at 7-mile Bridge, 2007-2010 (NODC Accession 0092548)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  20. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Carysfort Reef, 2006-2010 (NODC Accession 0093022)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  1. Continuous bottom temperature measurements in strategic areas of the Western Sambo Reef, Western Sambo Reef Buoy 16 and Jacquelyn L Grounding Site, 1990 - 2005 (NODC Accession 0014120)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  2. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at the New Ground Shoal site, 1992 - 2006 (NODC Accession 0012845)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  3. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at the Bahia Honda Bridge, 1990 - 2004 (NODC Accession 0002772)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  4. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at M/V ELPIS Restoration Site, 2007 - 2011 (NODC Accession 0093024)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  5. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Looe Key-Back Reef, 2008 and 2011 - 2012 (NODC Accession 0093064)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  6. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Alligator Reef, 2007-2010 (NODC Accession 0093017)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  7. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at 9-FT Shoal, 2005-2007 (NODC Accession 0039533)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  8. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Tennessee Reef, 2004-2006 (NODC Accession 0014272)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  9. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Bicentennial Coral Head, 2006 - 2007 (NODC Accession 0039817)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  10. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Boca Grande Channel, 2006 - 2007 (NODC Accession 0039818)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  11. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Snake Creek Bridge, 1989 - 2005 (NODC Accession 0013148)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  12. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Long Key, 2005-2006 (NODC Accession 0014269)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  13. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Bicentennial Coral Head, 2007-2009 (NODC Accession 0090835)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  14. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at the Broad Creek site, 2007-2009 (NODC Accession 0093020)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  15. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Sombrero Reef Lighthouse, 1991-2005 (NODC Accession 0013726)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  16. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Looe Key Back Reef, 2004-2006 (NODC Accession 0014270)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  17. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Hen and Chickens Reef, 2007 - 2011 (NODC Accession 0093027)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  18. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at the Pillar Coral Forest site, 1996 - 2006 (NODC Accession 0013096)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  19. Protected Areas

    Data.gov (United States)

    Kansas Data Access and Support Center — This dataset shows the boundaries of properties in Kansas in public or institutional ownership that contain ecological resources that merit some level of protection....

  20. "If he could speak, he would be able to point out who does those things to him": Experiences of violence and access to child protection among children with disabilities in Uganda and Malawi.

    Directory of Open Access Journals (Sweden)

    Lena Morgon Banks

    Full Text Available There is growing evidence that children with disabilities face an increased risk of violence globally. While child protection mechanisms to prevent and respond to violence-including formal government systems and more informal programmes and activities run by local communities or NGOs-are slowly becoming operationalised in low- and- middle-income countries, little is known about whether existing mechanisms are disability-inclusive. The aim of this study is to provide a better understanding of children with disabilities' experiences of violence and their access to available child protection mechanisms in low resource settings.This study was conducted in Kasungu and Mulanje districts in Malawi and Kamuli district in Uganda between October-December 2015. In-depth, semi-structured interviews were conducted with approximately 20 purposively selected child/caregiver pairs in each country (43 pairs total. Interviews with key informants involved in the provision of child protection and disability support were also conducted. All interviews were recorded, transcribed and coded in NVivo. Thematic Analysis, complemented by constant comparison as described in Grounded Theory, was used to analyse the data.Almost all children with disabilities reported experiencing violence, with verbal abuse and bullying the most common forms. Very few of these children sought recourse through available child protection mechanisms. Some of the key factors impeding access to child protection for children with disabilities included: lack of local government disability-inclusive planning and budgeting; centralization of limited disability and social protection services; financial barriers to seeking and receiving care; and stigma and negative attitudes toward disabilities.Children with disabilities face both high levels of violence and high barriers to accessing available child protection mechanisms. There is an urgent need to ensure that all efforts to prevent and respond to

  1. "If he could speak, he would be able to point out who does those things to him": Experiences of violence and access to child protection among children with disabilities in Uganda and Malawi.

    Science.gov (United States)

    Banks, Lena Morgon; Kelly, Susan A; Kyegombe, Nambusi; Kuper, Hannah; Devries, Karen

    2017-01-01

    There is growing evidence that children with disabilities face an increased risk of violence globally. While child protection mechanisms to prevent and respond to violence-including formal government systems and more informal programmes and activities run by local communities or NGOs-are slowly becoming operationalised in low- and- middle-income countries, little is known about whether existing mechanisms are disability-inclusive. The aim of this study is to provide a better understanding of children with disabilities' experiences of violence and their access to available child protection mechanisms in low resource settings. This study was conducted in Kasungu and Mulanje districts in Malawi and Kamuli district in Uganda between October-December 2015. In-depth, semi-structured interviews were conducted with approximately 20 purposively selected child/caregiver pairs in each country (43 pairs total). Interviews with key informants involved in the provision of child protection and disability support were also conducted. All interviews were recorded, transcribed and coded in NVivo. Thematic Analysis, complemented by constant comparison as described in Grounded Theory, was used to analyse the data. Almost all children with disabilities reported experiencing violence, with verbal abuse and bullying the most common forms. Very few of these children sought recourse through available child protection mechanisms. Some of the key factors impeding access to child protection for children with disabilities included: lack of local government disability-inclusive planning and budgeting; centralization of limited disability and social protection services; financial barriers to seeking and receiving care; and stigma and negative attitudes toward disabilities. Children with disabilities face both high levels of violence and high barriers to accessing available child protection mechanisms. There is an urgent need to ensure that all efforts to prevent and respond to violence against

  2. Bromine catalyzed conversion of S-tert-butyl groups into versatile and, for self-assembly processes accessible, acetyl-protected thiols.

    Science.gov (United States)

    Blaszczyk, Alfred; Elbing, Mark; Mayor, Marcel

    2004-10-07

    The facile and efficient conversion of a tert-butyl protecting group to an acetyl protecting group for thiols by catalytic amounts of bromine in acetyl chloride and the presence of acetic acid has been developed. The fairly mild reaction conditions are of particular interest for new protecting group strategies for sulfur functionalised target structures. Copyright 2004 The Royal Society of Chemistry

  3. Remote Network Access (RNA)

    National Research Council Canada - National Science Library

    2002-01-01

    .... Remote Network Access (RNA) includes or is associated with all communication devices/software, firewalls, intrusion detection systems and virus protection applications to ensure security of the OIG, DoD, Network from remote...

  4. Estimation of the bio-accessible fraction of Cr, As, Cd and Pb in locally available bread using on-line continuous leaching method coupled to inductively coupled plasma mass spectrometry.

    Science.gov (United States)

    Lamsal, Ram P; Beauchemin, Diane

    2015-03-31

    A previously developed, efficient and simple on-line leaching method was used to assess the maximum bio-accessible fraction (assuming no synergistic effect from other food and beverage) of potentially toxic elements (Cr, As, Cd and Pb) in whole wheat brown and white bread samples. Artificial saliva, gastric juice and intestinal juice were successively pumped into a mini-column, packed with bread (maintained at 37 °C) connected on-line to the nebulizer of an inductively coupled plasma mass spectrometry (ICP-MS) instrument equipped with a collision-reaction interface (CRI) using hydrogen as reaction gas to minimize carbon- and chlorine-based polyatomic interferences. In contrast to the conventional batch method to which it was compared, this approach provides real-time monitoring of potentially toxic elements that are continuously released during leaching. Mass balance for both methods was verified at the 95% confidence level. Results obtained from the whole wheat brown and white bread showed that the majority of Cr, Cd and Pb was leached by gastric juice but, in contrast, the majority of As was leached by saliva. While there was higher total content for elements in whole wheat bread than in white bread, a higher percentage of elements were bio-accessible in white bread than in whole wheat bread. Both the on-line and batch methods indicate that 40-98% of toxic elements in bread samples are bio-accessible. While comparison of total analyte concentrations with provisional tolerable daily intake values may indicate some serious health concern for children, when accounting for the bio-accessibility of these elements, bread consumption is found to be safe for all ages. Copyright © 2015 Elsevier B.V. All rights reserved.

  5. Continuing Medical Education

    African Journals Online (AJOL)

    Continuing Medical Education. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 25, No 9 (2007) >. Log in or Register to get access to full text downloads.

  6. The possibility of increasing the efficiency of accessible coal deposits by optimizing dimensions of protective pillars or the scope of exploitation

    Science.gov (United States)

    Bańka, Piotr; Badura, Henryk; Wesołowski, Marek

    2017-11-01

    One of the ways to protect objects exposed to the influences of mining exploitation is establishing protective pillars for them. Properly determined pillar provides effective protection of the object for which it was established. Determining correct dimensions of a pillar requires taking into account contradictory requirements. Protection measures against the excessive influences of mining exploitation require designing the largest possible pillars, whereas economic requirements suggest a maximum reduction of the size of resources left in the pillar. This paper presents algorithms and programs developed for determining optimal dimensions of protective pillars for surface objects and shafts. The issue of designing a protective pillar was treated as a nonlinear programming task. The objective function are the resources left in a pillar while nonlinear limitations are the deformation values evoked by the mining exploitation. Resources in the pillar may be weighted e.g. by calorific value or by the inverse of output costs. The possibility of designing pillars of any polygon shape was taken into account. Because of the applied exploitation technologies the rectangular pillar shape should be considered more advantageous than the oval one, though it does not ensure the minimization of resources left in a pillar. In this article there is also presented a different approach to the design of protective pillars, which instead of fixing the pillar boundaries in subsequent seams, the length of longwall panels of the designed mining exploitation is limited in a way that ensures the effective protection of an object while maximizing the extraction ratio of the deposit.

  7. Continuity of Business Plans for Animal Disease Outbreaks: Using a Logic Model Approach to Protect Animal Health, Public Health, and Our Food Supply

    Directory of Open Access Journals (Sweden)

    Heather Allen

    2013-04-01

    Full Text Available Foreign animal diseases can have a devastating impact on the American economy and agriculture system, while significantly disrupting the food supply chain, and affecting animal health and public health. Continuity of business during an animal disease outbreak aims to mitigate these agriculture-related losses by facilitating normal business operations through the managed movement of non-infected animals and non-contaminated animal products. During a foreign animal disease outbreak, there are competing objectives of trying to control and contain the outbreak while allowing non-infected premises to continue normal business operations to the greatest extent possible. Using a logic model approach, this article discusses the importance of continuity of business planning during an animal disease outbreak, providing a detailed and transparent theoretical framework for continuity of business planning for animal agriculture stakeholders. The logic model provides a basis for continuity of business planning, which is rapidly gaining focus and interest in the animal emergency management community. This unique logic model offers a framework for effective planning and subsequent evaluation of continuity of business plans and processes, by identifying explicit stakeholders, inputs, and activities, alongside the desired outputs and outcomes of such planning.

  8. Archives: Continuing Medical Education

    African Journals Online (AJOL)

    Items 51 - 88 of 88 ... Archives: Continuing Medical Education. Journal Home > Archives: Continuing Medical Education. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register · Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives. 51 - 88 of 88 ...

  9. US Environmental Protection Agency National Coastal Assessment for American Samoa 2004: water quality, sediment grain, and chemistry data (NODC Accession 0000455)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — In 2004, the Environmental Protection Agency (EPA) Environmental Monitoring and Assessment Program (EMAP) National Coastal Assessment (NCA), coordinated through the...

  10. Recommendation for the continued development of the Radiation Protection Program of the Federal Minister for Environmental, Nature Conservation and Nuclear Safety (BMU)

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    During the last 5 years, this catalogue of topics served as a reference source for promoting research topics in radiation protection. The topics receiving support are listed. During the time between 1986 and 1990, a total of 222 projects have been supported at an overall expense of about 160 million DM. Research results show that considerable progress has been made in population protection and that of occupationally exposed individuals. SSK is submitting a request for radiation protection research programs to be supported by the Federal Minister for the Environment (BMU). All major previously and supplementary recommended research topics are divided into 10 subject areas. A brief survey of supplementary recommended topics is given. A detailed description of all so far supported research topics and of those to be promoted in future are listed together with respective substantiations. The proposals for new research topics - as far as they lie within the authority of BMU - were formulated by the SSK and its committees. (orig./DG) [de

  11. [Inequalities in access to and utilization of dental care in Brazil: an analysis of the Telephone Survey Surveillance System for Risk and Protective Factors for Chronic Diseases (VIGITEL 2009)].

    Science.gov (United States)

    Peres, Marco A; Iser, Betine Pinto Moehlecke; Boing, Antonio Fernando; Yokota, Renata Tiene de Carvalho; Malta, Deborah Carvalho; Peres, Karen Glazer

    2012-01-01

    This study aimed to evaluate access to and utilization of various types of dental services by individuals 18 years or older in Brazil's State capitals. We gathered data from the Telephone Survey Surveillance System for Risk and Protective Factors for Chronic Diseases (VIGITEL) in 2009 (n = 54,367). More than half of the target population reported the need for dental treatment in the previous year; of these, 15.2% lacked access to dental services when needed. The private sector provided 61.1% of all dental appointments. The share of services provided by the Unified National Health System (SUS) ranged from 6.2% in the Federal District to 35.2% in Boa Vista, in the North. Multivariate Poisson regression models showed higher prevalence of dental treatment needs among women, middle-aged adults, and individuals with more schooling. Lack of access to dental care was more frequent among women, young adults, less educated individuals, and among lightener-skinned blacks. Our findings highlight sharp inequalities in the use of and access to dental services in the Brazilian State capitals.

  12. 10 CFR 73.60 - Additional requirements for physical protection at nonpower reactors.

    Science.gov (United States)

    2010-01-01

    ... nonpower reactors. 73.60 Section 73.60 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION... requirements for physical protection at nonpower reactors. Each nonpower reactor licensee who, pursuant to the... perform their duties. (6) Prior to entry into a material access area, packages shall be searched for...

  13. Protective factors and predictors of vulnerability to chronic stress: a comparative study of 4 communities after 7 years of continuous rocket fire.

    Science.gov (United States)

    Gelkopf, Marc; Berger, Rony; Bleich, Avraham; Silver, Roxane Cohen

    2012-03-01

    Many communities across the world are chronically exposed to extreme violence. Responses of residents from a city and rural community in Southern Israel, both exposed to 7 years of daily mortar fire, were compared to residents from demographically, socio-economically and geographically comparable non-exposed control samples to examine protective factors and predictors of vulnerability to chronic war-related attacks. Samples from a highly exposed city (Sderot) and a highly exposed rural community region (Otef Aza), along with a demographically comparable comparison non-exposed city (Ofakim) and non-exposed rural community region (Hevel Lachish), were obtained in 2007 using Random Digit Dialing. In total, 740 individuals (81.8% participation rate) were interviewed about trauma exposure, mental health, functioning and health care utilization. In the highly exposed city of Sderot, 97.8% of residents had been in close proximity to falling rockets; in the highly exposed rural community region of Otef Aza, 95.5% were similarly exposed. Despite exposure to chronic rocket attacks, residents of Otef Aza evidenced little symptomatology: only one person (1.5%) reported symptoms consistent with probable posttraumatic stress disorder (PTSD) and functioning levels did not differ from those of non-exposed communities. In contrast, posttraumatic stress (PTS), distress, functional impairment and health care utilization were substantially higher in the highly exposed city of Sderot than the other three communities. Lack of resources was associated with increased vulnerability among city residents; predictors of PTS across all samples included being female, older, directly exposed to rockets, history of trauma, suffering economic loss, and lacking social support. Increased community solidarity, sense of belonging and confidence in authorities may have served a protective function for residents of rural communities, despite the chronic attacks to which they were exposed. Copyright

  14. Results of the combined U.S. Multicenter Pivotal Study and the Continuing Access Study of the Nit-Occlud PDA device for percutaneous closure of patent ductus arteriosus.

    Science.gov (United States)

    Moore, John W; Greene, Jessica; Palomares, Salvadore; Javois, Alexander; Owada, Carl Y; Cheatham, John P; Hoyer, Mark H; Jones, Thomas K; Levi, Daniel S

    2014-12-01

    This study aimed to compare the efficacy and safety of the Nit-Occlud PDA device (PFM Medical, Cologne, Germany) to benchmarks designed as objective performance criteria (OPC). The Nit-Occlud PDA is a nitinol coil-type patent ductus arteriosus (PDA) occluder with a reverse cone configuration, which is implanted using a controlled delivery system. Patients with closure (clinical and echocardiographic), and safety criteria incidence of adverse events (serious and of total). The Pivotal Study enrolled patients between November 1, 2002 and October 31, 2005, and the Continuing Access Study enrolled additional patients between September 1, 2006 and October 31, 2007. A total of 357 patients were enrolled, and 347 had successful device implantations. After 12 months, 96.8% had complete echocardiographic closure (OPC = 85%) and 98.1% had clinical closure (OPC = 95%). There were no deaths or serious adverse events (OPC = 1%). The total adverse event rate was 4.7% (OPC = 6%). Composite success was 95.1% in the study patients (OPC = 80%). Closure of small- and medium-sized PDA with the Nit-Occlud PDA is effective and safe when compared with OPC. Copyright © 2014 American College of Cardiology Foundation. Published by Elsevier Inc. All rights reserved.

  15. Solutions Network Formulation Report. Landsat Data Continuity Mission Simulated Data Products for Bureau of Land Management and Environmental Protection Agency Abandoned Mine Lands Decision Support

    Science.gov (United States)

    Estep, Leland

    2007-01-01

    Presently, the BLM (Bureau of Land Management) has identified a multitude of abandoned mine sites in primarily Western states for cleanup. These sites are prioritized and appropriate cleanup has been called in to reclaim the sites. The task is great in needing considerable amounts of agency resources. For instance, in Colorado alone there exists an estimated 23,000 abandoned mines. The problem is not limited to Colorado or to the United States. Cooperation for reclamation is sought at local, state, and federal agency level to aid in identification, inventory, and cleanup efforts. Dangers posed by abandoned mines are recognized widely and will tend to increase with time because some of these areas are increasingly used for recreation and, in some cases, have been or are in the process of development. In some cases, mines are often vandalized once they are closed. The perpetrators leave them open, so others can then access the mines without realizing the danger posed. Abandoned mine workings often fill with water or oxygen-deficient air and dangerous gases following mining. If the workings are accidentally entered into, water or bad air can prove fatal to those underground. Moreover, mine residue drainage negatively impacts the local watershed ecology. Some of the major hazards that might be monitored by higher-resolution satellites include acid mine drainage, clogged streams, impoundments, slides, piles, embankments, hazardous equipment or facilities, surface burning, smoke from underground fires, and mine openings.

  16. Continuous auditing & continuous monitoring : Continuous value?

    NARCIS (Netherlands)

    van Hillo, Rutger; Weigand, Hans; Espana, S; Ralyte, J; Souveyet, C

    2016-01-01

    Advancements in information technology, new laws and regulations and rapidly changing business conditions have led to a need for more timely and ongoing assurance with effectively working controls. Continuous Auditing (CA) and Continuous Monitoring (CM) technologies have made this possible by

  17. Open access

    NARCIS (Netherlands)

    Valkenburg, P.M.

    2015-01-01

    Open access week Van 19 tot en met 25 oktober 2015 vond wereldwijd de Open Access Week plaats. Tijdens deze week werden er over de hele wereld evenementen georganiseerd waar open access een rol speelt. Ook in Nederland zijn er diverse symposia, workshops en debatten georganiseerd zoals het debat in

  18. Long distance high power optical laser fiber break detection and continuity monitoring systems and methods

    Science.gov (United States)

    Rinzler, Charles C.; Gray, William C.; Faircloth, Brian O.; Zediker, Mark S.

    2016-02-23

    A monitoring and detection system for use on high power laser systems, long distance high power laser systems and tools for performing high power laser operations. In particular, the monitoring and detection systems provide break detection and continuity protection for performing high power laser operations on, and in, remote and difficult to access locations.

  19. Continuous digital health

    NARCIS (Netherlands)

    Van Halteren, Aart; Gay, Vaĺerie

    2015-01-01

    A transformation is underway regarding how we deal with our health, not only because mobile Internet technology has made it possible to have continuous access to personal health information, but also because breaking the trend of ever-growing healthcare costs is increasingly necessary. Connectivity,

  20. Continuing Medical Education

    African Journals Online (AJOL)

    A review article willintroduce readers to the educational subject matter, along with one-page summarises (in print) of additional articles that may be accessed in full online. We will continue to offer topical and up-to-date CME material. Readers are encouraged to register with samj.org.za to receive future notifications of new ...

  1. Structural and Community Change Outcomes of the Connect-to-Protect Coalitions: Trials and Triumphs Securing Adolescent Access to HIV Prevention, Testing, and Medical Care.

    Science.gov (United States)

    Miller, Robin Lin; Reed, Sarah J; Chiaramonte, Danielle; Strzyzykowski, Trevor; Spring, Hannah; Acevedo-Polakovich, Ignacio D; Chutuape, Kate; Cooper-Walker, Bendu; Boyer, Cherrie B; Ellen, Jonathan M

    2017-09-01

    Connect to Protect (C2P), a 10-year community mobilization effort, pursued the dual aims of creating communities competent to address youth's HIV-related risks and removing structural barriers to youth health. We used Community Coalition Action Theory (CCAT) to examine the perceived contributions and accomplishments of 14 C2P coalitions. We interviewed 318 key informants, including youth and community leaders, to identify the features of coalitions' context and operation that facilitated and undermined their ability to achieve structural change and build communities' capability to manage their local adolescent HIV epidemic effectively. We coded the interviews using an a priori coding scheme informed by CCAT and scholarship on AIDS-competent communities. We found community mobilization efforts like C2P can contribute to addressing the structural factors that promote HIV-risk among youth and to community development. We describe how coalition leadership, collaborative synergy, capacity building, and local community context influence coalitions' ability to successfully implement HIV-related structural change, demonstrating empirical support for many of CCAT's propositions. We discuss implications for how community mobilization efforts might succeed in laying the foundation for an AIDS-competent community. © Society for Community Research and Action 2017.

  2. Access Control of Web and Java Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.; Johnson, Bryan

    2011-01-01

    Cyber security has gained national and international attention as a result of near continuous headlines from financial institutions, retail stores, government offices and universities reporting compromised systems and stolen data. Concerns continue to rise as threats of service interruption, and spreading of viruses become ever more prevalent and serious. Controlling access to application layer resources is a critical component in a layered security solution that includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. In this paper we discuss the development of an application-level access control solution, based on an open-source access manager augmented with custom software components, to provide protection to both Web-based and Java-based client and server applications.

  3. Flexible Access Control for Dynamic Collaborative Environments

    NARCIS (Netherlands)

    Dekker, M.A.C.

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect

  4. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  5. Continuous Problem of Function Continuity

    Science.gov (United States)

    Jayakody, Gaya; Zazkis, Rina

    2015-01-01

    We examine different definitions presented in textbooks and other mathematical sources for "continuity of a function at a point" and "continuous function" in the context of introductory level Calculus. We then identify problematic issues related to definitions of continuity and discontinuity: inconsistency and absence of…

  6. EnviroAtlas - Accessibility Characteristics in the Conterminous U.S. Web Service

    Data.gov (United States)

    U.S. Environmental Protection Agency — This EnviroAtlas web service includes maps that illustrate factors affecting transit accessibility, and indicators of accessibility. Accessibility measures how...

  7. Continuity and Change.

    Science.gov (United States)

    Istance, David

    1985-01-01

    Examines issues related to continuity in education and educational change. Indicates that although schools must be responsive to changing social and economic conditions (and contribute to them), they must also be protected against fluctuating swings of educational fashion and safeguard their long-term mission, even when buffeted by short-term…

  8. Open Access

    Science.gov (United States)

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  9. Open access

    African Journals Online (AJOL)

    Prof. Dennis Ocholla

    The argument that access to information is an instrumental and individual as well as ... and Dean School of Information Studies, University of Wisconsin, Milwaukee, USA. ... to scholarly publications and can be in any digital format, including text, movies and ... language barriers, censorship, lack of access to the Internet and ...

  10. 40 CFR 52.2179 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.2179 Section 52.2179 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) South Dakota § 52.2179 Visibility protection...

  11. 40 CFR 52.1606 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1606 Section 52.1606 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) New Jersey § 52.1606 Visibility protection...

  12. 40 CFR 52.1236 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1236 Section 52.1236 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Minnesota § 52.1236 Visibility protection. (a...

  13. 40 CFR 52.1488 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1488 Section 52.1488 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Nevada § 52.1488 Visibility protection. (a...

  14. 40 CFR 52.2383 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.2383 Section 52.2383 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Vermont § 52.2383 Visibility protection. (a...

  15. 40 CFR 52.2498 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.2498 Section 52.2498 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Washington § 52.2498 Visibility protection...

  16. 40 CFR 52.2304 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.2304 Section 52.2304 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Texas § 52.2304 Visibility protection. (a...

  17. 40 CFR 52.1387 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1387 Section 52.1387 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Montana § 52.1387 Visibility protection. (a...

  18. 40 CFR 52.1831 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1831 Section 52.1831 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) North Dakota § 52.1831 Visibility protection...

  19. 40 CFR 52.2533 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.2533 Section 52.2533 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) West Virginia § 52.2533 Visibility protection...

  20. 40 CFR 52.1183 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1183 Section 52.1183 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Michigan § 52.1183 Visibility protection. (a...

  1. 40 CFR 52.1531 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1531 Section 52.1531 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) New Hampshire § 52.1531 Visibility protection...

  2. 40 CFR 52.2452 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.2452 Section 52.2452 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Virginia § 52.2452 Visibility protection. (a...

  3. 40 CFR 52.1033 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1033 Section 52.1033 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Maine § 52.1033 Visibility protection. (a...

  4. 40 CFR 52.1339 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.1339 Section 52.1339 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED) APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS (CONTINUED) Missouri § 52.1339 Visibility protection. (a...

  5. Business continuity

    International Nuclear Information System (INIS)

    Breunhoelder, Gert

    2002-01-01

    This presentation deals with the following keypoints: Information Technology (IT) Business Continuity and Recovery essential for any business; lessons learned after Sept. 11 event; Detailed planning, redundancy and testing being the key elements for probability estimation of disasters

  6. Continuous tokamaks

    International Nuclear Information System (INIS)

    Peng, Y.K.M.

    1978-04-01

    A tokamak configuration is proposed that permits the rapid replacement of a plasma discharge in a ''burn'' chamber by another one in a time scale much shorter than the elementary thermal time constant of the chamber first wall. With respect to the chamber, the effective duty cycle factor can thus be made arbitrarily close to unity minimizing the cyclic thermal stress in the first wall. At least one plasma discharge always exists in the new tokamak configuration, hence, a continuous tokamak. By incorporating adiabatic toroidal compression, configurations of continuous tokamak compressors are introduced. To operate continuous tokamaks, it is necessary to introduce the concept of mixed poloidal field coils, which spatially groups all the poloidal field coils into three sets, all contributing simultaneously to inducing the plasma current and maintaining the proper plasma shape and position. Preliminary numerical calculations of axisymmetric MHD equilibria in continuous tokamaks indicate the feasibility of their continued plasma operation. Advanced concepts of continuous tokamaks to reduce the topological complexity and to allow the burn plasma aspect ratio to decrease for increased beta are then suggested

  7. Access Contested

    International Development Research Centre (IDRC) Digital Library (Canada)

    Transforming Global Information and Communication Markets: The Political Economy of ... 8 Control and Resistance: Attacks on Burmese Opposition Media 153 ...... “Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet,” in Access ...

  8. Accessing memory

    Science.gov (United States)

    Yoon, Doe Hyun; Muralimanohar, Naveen; Chang, Jichuan; Ranganthan, Parthasarathy

    2017-09-26

    A disclosed example method involves performing simultaneous data accesses on at least first and second independently selectable logical sub-ranks to access first data via a wide internal data bus in a memory device. The memory device includes a translation buffer chip, memory chips in independently selectable logical sub-ranks, a narrow external data bus to connect the translation buffer chip to a memory controller, and the wide internal data bus between the translation buffer chip and the memory chips. A data access is performed on only the first independently selectable logical sub-rank to access second data via the wide internal data bus. The example method also involves locating a first portion of the first data, a second portion of the first data, and the second data on the narrow external data bus during separate data transfers.

  9. Forbidden Access

    CERN Multimedia

    C. Colloca TS/FM

    2004-01-01

    TS/FM group informs you that, for the replacement of the door of the main entrance at bldg. 500, the access will be closed to the public between 19 and 30 July 2004. Access to the Main Building complex will be assured at any time through both of the side doors and from bldg. 64. For more information, please contact 73273. C. Colloca TS/FM

  10. Continuous Dropout.

    Science.gov (United States)

    Shen, Xu; Tian, Xinmei; Liu, Tongliang; Xu, Fang; Tao, Dacheng

    2017-10-03

    Dropout has been proven to be an effective algorithm for training robust deep networks because of its ability to prevent overfitting by avoiding the co-adaptation of feature detectors. Current explanations of dropout include bagging, naive Bayes, regularization, and sex in evolution. According to the activation patterns of neurons in the human brain, when faced with different situations, the firing rates of neurons are random and continuous, not binary as current dropout does. Inspired by this phenomenon, we extend the traditional binary dropout to continuous dropout. On the one hand, continuous dropout is considerably closer to the activation characteristics of neurons in the human brain than traditional binary dropout. On the other hand, we demonstrate that continuous dropout has the property of avoiding the co-adaptation of feature detectors, which suggests that we can extract more independent feature detectors for model averaging in the test stage. We introduce the proposed continuous dropout to a feedforward neural network and comprehensively compare it with binary dropout, adaptive dropout, and DropConnect on Modified National Institute of Standards and Technology, Canadian Institute for Advanced Research-10, Street View House Numbers, NORB, and ImageNet large scale visual recognition competition-12. Thorough experiments demonstrate that our method performs better in preventing the co-adaptation of feature detectors and improves test performance.

  11. Continuity theory

    CERN Document Server

    Nel, Louis

    2016-01-01

    This book presents a detailed, self-contained theory of continuous mappings. It is mainly addressed to students who have already studied these mappings in the setting of metric spaces, as well as multidimensional differential calculus. The needed background facts about sets, metric spaces and linear algebra are developed in detail, so as to provide a seamless transition between students' previous studies and new material. In view of its many novel features, this book will be of interest also to mature readers who have studied continuous mappings from the subject's classical texts and wish to become acquainted with a new approach. The theory of continuous mappings serves as infrastructure for more specialized mathematical theories like differential equations, integral equations, operator theory, dynamical systems, global analysis, topological groups, topological rings and many more. In light of the centrality of the topic, a book of this kind fits a variety of applications, especially those that contribute to ...

  12. Accessible Knowledge - Knowledge on Accessibility

    DEFF Research Database (Denmark)

    Kirkeby, Inge Mette

    2015-01-01

    Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...

  13. Open access

    CERN Document Server

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder consent, and many authors, musicians, filmmakers, and other creators who depend on royalties are understandably unwilling to give their consent. But for 350 years, scholars have written peer-reviewed journal articles for impact, not for money, and are free to consent to open access without losing revenue. In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. Distilling a decade of Suber's influential writing and thinking about open access, this is the indispe...

  14. Continuation calculus

    NARCIS (Netherlands)

    Geron, B.; Geuvers, J.H.; de'Liguoro, U.; Saurin, A.

    2013-01-01

    Programs with control are usually modeled using lambda calculus extended with control operators. Instead of modifying lambda calculus, we consider a different model of computation. We introduce continuation calculus, or CC, a deterministic model of computation that is evaluated using only head

  15. Continuous bottom temperature measurements in strategic areas of the Florida Reef Tract at Looe Key Iselin, from 2011-07-15 to 2014-08-31 (NODC Accession 0122162)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The purpose of this project is to document bottom seawater temperature in strategic areas of the Florida Reef Tract on a continuing basis and make that information...

  16. Currents, temperature, and salinity data recorded continuously from May 12, 2010 to December 16, 2010 from the surface to 1000 meters at a coastal location near the 1600 meters isobath off SW Oahu, Hawaii (NODC Accession 0072305)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The dataset contains ADCP Workhorse Long Ranger current records from 50 to 950m depth and Seabird CTD at 20, 80, 130, 230, 500, 850, and 1000m, recorded continuously...

  17. Access French

    CERN Document Server

    Grosz, Bernard

    2014-01-01

    Access is the major new language series designed with the needs of today's generation of students firmly in mind. Whether learning for leisure or business purposes or working towards a curriculum qualification, Access French is specially designed for adults of all ages and gives students a thorough grounding in all the skills required to understand, speak, read and write contemporary French from scratch. The coursebook consists of 10 units covering different topic areas, each of which includes Language Focus panels explaining the structures covered and a comprehensive glossary. Learning tips

  18. Convention on the physical protection of nuclear material. Status list as of 12 September 2000. Signature, ratification, acceptance, approval, accession or succession. Declarations/reservations made upon expressing consent to be bound and objections thereto. Declarations/reservations made upon signature

    International Nuclear Information System (INIS)

    2000-01-01

    This document contains signatures, ratifications, acceptance, approval, accession or succession of the Convention on the physical protection of nuclear material as well as declarations/reservations made upon expressing consent to be bound and objections thereto and declarations made upon signature

  19. Continuation calculus

    Directory of Open Access Journals (Sweden)

    Bram Geron

    2013-09-01

    Full Text Available Programs with control are usually modeled using lambda calculus extended with control operators. Instead of modifying lambda calculus, we consider a different model of computation. We introduce continuation calculus, or CC, a deterministic model of computation that is evaluated using only head reduction, and argue that it is suitable for modeling programs with control. It is demonstrated how to define programs, specify them, and prove them correct. This is shown in detail by presenting in CC a list multiplication program that prematurely returns when it encounters a zero. The correctness proof includes termination of the program. In continuation calculus we can model both call-by-name and call-by-value. In addition, call-by-name functions can be applied to call-by-value results, and conversely.

  20. Access to Information and Privacy | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    As a Crown corporation, IDRC is subject to Canada's laws on access to information and privacy protection. The following resources will help you learn more about IDRC and the access to information and privacy acts, including instructions for submitting an access to information or privacy act (ATIP) request. IDRC and ATIP ...

  1. Gaining Access.

    Science.gov (United States)

    Wand, Sean; Thermos, Adam C.

    1998-01-01

    Explains the issues to consider before a college decides to purchase a card-access system. The benefits of automation, questions involving implementation, the criteria for technology selection, what typical card technology involves, privacy concerns, and the placement of card readers are discussed. (GR)

  2. [Light protection: principles of UV protection].

    Science.gov (United States)

    Stege, H; Mang, R

    2006-05-01

    UV radiation is responsible for the induction of epithelial and melanocytic skin cancer, photoaging, and photodermatoses. UV protection is necessary to prevent damage caused by non-physiologic exposure. UV protection includes not only reduction of sun exposure but also use of sun protective filters, UV protective clothes, DNA repair enzymes, and antioxidant supplementation. Consumers are uncertain about the possibilities and limitations of commercial sun protection measures. Dermatologists must explain protective measures to the general public which continues to believe that UV-tanned skin is healthy. The sunscreen market is a highly competitive but lucrative market. The range of products with different designations and promises makes difficult for both consumers and dermatologists to determine what is sensible UV protection.

  3. Journals in the Time of Google: While the Struggle over Open Access Plays Out, Librarians, Vendors, and Publishers Continue to Trade within a Market Dominated by All Things Electronic

    Science.gov (United States)

    Van Orsdel, Lee C.; Born, Kathleen

    2006-01-01

    This article, based on the Periodicals Prices Survey of 2006, evaluates the changing trends of electronic periodical marketplace in 2006 and indicates what to expect in 2007. The 2005-2006 academic year was one of competing realities: the buying and selling of electronic journals continued apace, while the posting and crawling of every kind of…

  4. 40 CFR 52.2781 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.2781 Section 52.2781 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED... protection. (a) The requirements of section 169A of the Clean Air Act are not met, because the plan does not...

  5. 40 CFR 52.2132 - Visibility protection.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 4 2010-07-01 2010-07-01 false Visibility protection. 52.2132 Section 52.2132 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS (CONTINUED... protection. (a) The requirements of section 169A of the Clean Air Act are not met, because the plan does not...

  6. Summary of radiation protection in exploitation

    International Nuclear Information System (INIS)

    Garcier, Yves; Guers, Rene; Bidard, Francoise; Colson, Philippe; Gonin, Michele; Delabre, Herve; Hemidy, Pierre-Yves; Corgnet, Bruno; Perrin, Marie-Claire; Phan Hoang, Long; Abela, Gonzague; Crepieux, Virginie; Guyot, Pierre; Haranger, Didier; Warembourg, Philippe

    2004-01-01

    This document proposes a large and detailed overview of notions and practices regarding radiation protection in relationship with an NPP exploitation framework. It presents the main notions: matter structure, radioactivity, interactions between matter and radiations, types of ionizing radiation, magnitudes and measurement units, exposure modes, main principles of radiation protection, means of protection against internal and external exposures. The second part proposes an overview of the origin of radiological risks in a nuclear power plant. This origin can be found in fission products, activation products, actinides, designed protections, or circuit contaminations. These radiological risks are more precisely identified and described in terms of detection and prevention (internal exposure risk, contamination risk, iodine-related risk, alpha radiation-related risk, access to the reactor building). The next part addresses the medical and radiological follow-up of exposed workers by a special medical control, by an individual exposure control, by a specific control of female personnel, and by attention to exceptional exposures. Measurement means are presented (detection principles, installation continuous control, workspaces control, personnel contamination control, follow-up of individual dose) as well as collective and individual protection means. The management of radiation protection is addressed through a presentation of decision and management structures for radiation protection, and of EDF objectives and ambitions in this domain. The organization of radiation protection during exploitation is described: responsibilities for radiation protection in a nuclear power station, requirements for workers, preparation of interventions in controlled zone, work execution in controlled zone, zone controls and radiological cleanness of installations. The two last chapters address issues and practices of radiation protection in the case of deconstruction or dismantling, and

  7. Coral reef ecosystem marine protected area monitoring in Fagamalo, American Samoa: comprehensive assessment of coral demography (adult and juvenile corals) from belt transect surveys from 2015-10-26 to 2015-11-13 (NCEI Accession 0166380)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — In 2010 the village of Fagamalo, Tutuila, American Samoa, designated a no-take Marine Protected Area that sees the protection of 2.25 square kilometers of ocean....

  8. 40 CFR 1065.150 - Continuous sampling.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Continuous sampling. 1065.150 Section... ENGINE-TESTING PROCEDURES Equipment Specifications § 1065.150 Continuous sampling. You may use continuous sampling techniques for measurements that involve raw or dilute sampling. Make sure continuous sampling...

  9. Continuous venovenous haemodialysis

    DEFF Research Database (Denmark)

    Jensen, Dorte Møller; Bistrup, C; Pedersen, R S

    1996-01-01

    A simple three-pump-based system for the performance of continuous venovenous haemodialysis is described. The method employs access to the circulation via a double-lumen catheter, and by means of a standard extracorporeal peristaltic pump the blood is circulated through a haemofiltration filter....... Standard solutions for peritoneal dialysis are administered in a single-pass manner countercurrent to the blood flow. To control the dialysate flow through the filter, two separate pumps designed for intravenous infusion are used. Anticoagulation is achieved by means of continuous heparin infusion....... This three-pump system is effective in controlling the fluid balance and the level of azotemia. Furthermore, this system makes haemodialysis possible in spite of severe haemodynamic instability. The system is easy to use and inexpensive. 3 patients participated in the study....

  10. Blueprints for Disaster: Balancing Secrecy and Transparency of Government Continuity Plans

    Science.gov (United States)

    2016-09-01

    ISO/IEC 31010:2009; COSO 2004; and OCEG “Red Book” 2.0: 2009. Institute of Risk Management , “ Risk Management Standards,” accessed June 26, 2015...Information Act (FOIA), protective security, risk management , Presidential Policy Directive 21 (PPD-21), National Security Presidential Directive 51 (NSPD...BLUEPRINTS FOR DISASTER: BALANCING SECRECY AND TRANSPARENCY OF GOVERNMENT CONTINUITY PLANS Stephen Scott Vollbrecht State Risk Manager for

  11. Personal Protective Equipment

    National Research Council Canada - National Science Library

    1998-01-01

    ... of personal protective equipment A safety program for new employees is a necessary part of any orientation program An on-going safety program should be used to motivate employees to continue to use...

  12. 40 CFR 205.57-8 - Continued testing.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Continued testing. 205.57-8 Section 205.57-8 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) NOISE ABATEMENT PROGRAMS TRANSPORTATION EQUIPMENT NOISE EMISSION CONTROLS Medium and Heavy Trucks § 205.57-8 Continued...

  13. Access Denied! Contrasting Data Access in the United States and Ireland

    Directory of Open Access Journals (Sweden)

    Grogan Samuel

    2016-07-01

    Full Text Available The ability of an Internet user to access data collected about himself as a result of his online activity is a key privacy safeguard. Online, data access has been overshadowed by other protections such as notice and choice. This paper describes attitudes about data access. 873 US and Irish Internet users participated in a survey designed to examine views on data access to information held by online companies and data brokers. We observed low levels of awareness of access mechanisms along with a high desire for access in both participant groups. We tested three proposed access systems in keeping with industry programs and regulatory proposals. User response was positive. We conclude that access remains an important privacy protection that is inadequately manifested in practice. Our study provides insight for lawmakers and policymakers, as well as computer scientists who implement these systems.

  14. [Cerebral protection].

    Science.gov (United States)

    Cattaneo, A D

    1993-09-01

    Cerebral protection means prevention of cerebral neuronal damage. Severe brain damage extinguishes the very "human" functions such as speech, consciousness, intellectual capacity, and emotional integrity. Many pathologic conditions may inflict injuries to the brain, therefore the protection and salvage of cerebral neuronal function must be the top priorities in the care of critically ill patients. Brain tissue has unusually high energy requirements, its stores of energy metabolites are small and, as a result, the brain is totally dependent on a continuous supply of substrates and oxygen, via the circulation. In complete global ischemia (cardiac arrest) reperfusion is characterized by an immediate reactive hyperemia followed within 20-30 min by a delayed hypoperfusion state. It has been postulated that the latter contributes to the ultimate neurologic outcome. In focal ischemia (stroke) the primary focus of necrosis is encircled by an area (ischemic penumbra) that is underperfused and contains neurotoxic substances such as free radicals, prostaglandins, calcium, and excitatory neurotransmitters. The variety of therapeutic effort that have addressed the question of protecting the brain reflects their limited success. 1) Barbiturates. After an initial enthusiastic endorsement by many clinicians and years of vigorous controversy, it can now be unequivocally stated that there is no place for barbiturate therapy following resuscitation from cardiac arrest. One presumed explanation for this negative statement is that cerebral metabolic suppression by barbiturates (and other anesthetics) is impossible in the absence of an active EEG. Conversely, in the event of incomplete ischemia EEG activity in usually present (albeit altered) and metabolic suppression and hence possibly protection can be induced with barbiturates. Indeed, most of the animal studies led to a number of recommendations for barbiturate therapy in man for incomplete ischemia. 2) Isoflurane. From a cerebral

  15. Continuous Non-malleable Codes

    DEFF Research Database (Denmark)

    Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus

    2014-01-01

    or modify it to the encoding of a completely unrelated value. This paper introduces an extension of the standard non-malleability security notion - so-called continuous non-malleability - where we allow the adversary to tamper continuously with an encoding. This is in contrast to the standard notion of non...... is necessary to achieve continuous non-malleability in the split-state model. Moreover, we illustrate that none of the existing constructions satisfies our uniqueness property and hence is not secure in the continuous setting. We construct a split-state code satisfying continuous non-malleability. Our scheme...... is based on the inner product function, collision-resistant hashing and non-interactive zero-knowledge proofs of knowledge and requires an untamperable common reference string. We apply continuous non-malleable codes to protect arbitrary cryptographic primitives against tampering attacks. Previous...

  16. Open versus Controlled-Access Data | Office of Cancer Genomics

    Science.gov (United States)

    OCG employs stringent human subjects’ protection and data access policies to protect the privacy and confidentiality of the research participants. Depending on the risk of patient identification, OCG programs data are available to the scientific community in two tiers: open or controlled access. Both types of data can be accessed through its corresponding OCG program-specific data matrix or portal. Open-access Data

  17. Applications of cathodic protection for the protection of aqueous and soil corrosion of power plant components

    International Nuclear Information System (INIS)

    Sinha, A.K.; Mitra, A.K.; Bhakta, U.C.; Sanyal, S.K.

    2000-01-01

    Power plant components exposed to environments such as water and soil are susceptible to severe corrosion. Many times the effect of corrosion in power plant components can be catastrophic. The problem is aggravated for underground pipelines due to additional factors such as large network of pipelines, proximity to earth mat, high voltage transmission lines, corrosive chemicals, inadequate approach etc. Other components such as condenser water boxes, internals of pipelines, clarifier bridge structures, cooling water inlet gates and pipes etc. which are in continuous contact with water, are subjected to severe corrosion. The nature and locations of all such components are at places which are not accessible for routine maintenance and hence they require long term reliable protection against corrosion. Experience has shown that anti-corrosive coatings are inadequate in preventing corrosion and due to their location regular maintenance coatings are also not feasible. Under such circumstances the applications of cathodic protection provides a long term solution the design of cathodic protection, for such applications differs from the commonly employed cathodic protection for cross-country pipelines and submerged structures due to other complexities in the plant region and maintenance of the applied system. The present paper intends to discuss the applications of cathodic protection with suitable anti-corrosive coatings for protection of various power plant components and the specific features of each type of application. (author)

  18. Radiation protection zoning

    International Nuclear Information System (INIS)

    2015-01-01

    Radiation being not visible, the zoning of an area containing radioactive sources is important in terms of safety. Concerning radiation protection, 2 work zones are defined by regulations: the monitored zone and the controlled zone. The ministerial order of 15 may 2006 settles the frontier between the 2 zones in terms of radiation dose rates, the rules for access and the safety standards in both zones. Radioprotection rules and the name of the person responsible for radiation protection must be displayed. The frontier between the 2 zones must be materialized and marked with adequate equipment (specific danger signs and tapes). Both zones are submitted to selective entrance, the access for the controlled zone is limited because of the radiation risk and of the necessity of confining radioactive contamination while the limitation of the access to the monitored zone is due to radiation risk only. (A.C.)

  19. Communicating with adolescents | Campbell | Continuing Medical ...

    African Journals Online (AJOL)

    Continuing Medical Education. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 25, No 5 (2007) >. Log in or Register to get access to full text downloads.

  20. Whistleblower Protection

    Science.gov (United States)

    The Whistleblower Protection Enhancement Act of 2012 (WPA) and the Whistleblower Protection Act of 1989 Enhanced by the Act of 2012 provides protection rights for Federal employees against retaliation for whistleblowing activities.

  1. Accessibility and inclusion informational

    Directory of Open Access Journals (Sweden)

    Mônica Sena de Souza

    2013-06-01

    Full Text Available Introduction: Discusses the role of information professionals in meeting the informational demands of people with disabilities in the information society. The librarian is crucial for the effectiveness and success in the informational inclusion of people with disabilities, considering also continuing education for their professional qualification.Objective: To provide reflections on the role of the librarian in serving users with disabilities, highlighting the need for improvement in information units, identified in the scientific literature with regard to accessibility.Methodology: Literature search, based on a review of literature in books and scientific papers, highlighting the main authors: Adams (2000, Mazzoni (2001 and Sassaki (1997, 2002, 2005.Results: The lack of informational access for people with disabilities hampers their social and political participation, hence, reduces its condition of citizenship.Conclusion: The librarian responsible for seeking continuing education, greater involvement in the events of the area and the constant search for job training, which will reflect on the best service the information needs of users with disabilities.

  2. Security Support in Continuous Deployment Pipeline

    DEFF Research Database (Denmark)

    Ullah, Faheem; Raft, Adam Johannes; Shahin, Mojtaba

    2017-01-01

    Continuous Deployment (CD) has emerged as a new practice in the software industry to continuously and automatically deploy software changes into production. Continuous Deployment Pipeline (CDP) supports CD practice by transferring the changes from the repository to production. Since most of the CDP...... penetration tools. Our findings indicate that the applied tactics improve the security of the major components (i.e., repository, continuous integration server, main server) of a CDP by controlling access to the components and establishing secure connections....

  3. Rehabilitation Nursing and the Accessibility of the Person With Disability

    Directory of Open Access Journals (Sweden)

    Luís Ribeiro

    2017-04-01

    Full Text Available An inclusive society leads all citizens to participate in community life, without any discrimination, but often citizens with reduced or conditioned mobility face barriers of a different nature. The condition of person with disability is arduous and unequal, even protected by legislation, but it is essential effectiveness in its application, which also involves the Rehabilitation Nurse. Objectives: Reflect on the rights of persons with disabilities and on the role of professionals in the overall rehabilitation action, particularly the rehabilitation nurses; Mobilize strategies for the promotion of accessibility. Methodology: Descriptive study using specific legislation, official websites and sources on rehabilitation, nursing and rehabilitation nursing. Results: The legislation is oriented towards the protection of the citizen with reduced or conditioned mobility. But barriers exist and changes are needed in people and society, and the professional has a relevant role in its implementation. Nurses in general and rehabilitation specialists in particular should advocate for the conditions necessary for the enjoyment of accessibility by developing specific strategies. Conclusions: Continuous monitoring is required for equal opportunities and accessibility, which involves the attitude of people, responsible entities and professionals. Rehabilitation nurses must assert themselves as an integral part of this mission.

  4. Radiation protection

    International Nuclear Information System (INIS)

    Koelzer, W.

    1975-01-01

    Physical and radiological terms, quantities, and units. Basic principles of radiation protection (ICRP, IAEA, EURATOM, FRG). Biological effects of ionizing radiation. Objectives of practical radiation protection. (HP) [de

  5. Measuring Access to Learning Opportunities.

    Science.gov (United States)

    Hawley, Willis D., Ed.; Ready, Timothy, Ed.

    This study examined the continued relevance and adequacy of the Elementary and Secondary School Civil Rights Compliance Report (E&S Survey) as a tool for enforcing civil rights laws in education, monitoring quality of access to learning opportunities, and research on other current issues of educational policy and practice. The Committee on…

  6. Health and radiation protection management

    International Nuclear Information System (INIS)

    Huhn, A.; Vargas, M.; Lorenzetti, J.; Lança, L.

    2017-01-01

    Quality management and continuous improvement systems are becoming part of daily health services, including radiodiagnostic services, which are designed to meet the needs of users, operating in an environment where the differential is due to the competence and quality of the services provided. The objective of this study is to show the scope of the management of health services, especially radiodiagnosis and radiological protection. Method: Exploratory and descriptive study, based on a review of the literature on the subject. Results: Radiodiagnosis has demonstrated the need for efficient management, especially because ionizing radiation is present in this environment and it is imperative that the professionals working in this area are aware of the need to perform adequate radiological protection for themselves and for users. Conclusion: Universal access to information has changed the attitude of the user and the user has become more demanding in his choices, wanting to understand, express, interact and choose the best quality service in view of the various options available in the market

  7. Between strong continuity and almost continuity

    Directory of Open Access Journals (Sweden)

    J.K. Kohli

    2010-04-01

    Full Text Available As embodied in the title of the paper strong and weak variants of continuity that lie strictly between strong continuity of Levine and almost continuity due to Singal and Singal are considered. Basic properties of almost completely continuous functions (≡ R-maps and δ-continuous functions are studied. Direct and inverse transfer of topological properties under almost completely continuous functions and δ-continuous functions are investigated and their place in the hier- archy of variants of continuity that already exist in the literature is out- lined. The class of almost completely continuous functions lies strictly between the class of completely continuous functions studied by Arya and Gupta (Kyungpook Math. J. 14 (1974, 131-143 and δ-continuous functions defined by Noiri (J. Korean Math. Soc. 16, (1980, 161-166. The class of almost completely continuous functions properly contains each of the classes of (1 completely continuous functions, and (2 al- most perfectly continuous (≡ regular set connected functions defined by Dontchev, Ganster and Reilly (Indian J. Math. 41 (1999, 139-146 and further studied by Singh (Quaestiones Mathematicae 33(2(2010, 1–11 which in turn include all δ-perfectly continuous functions initi- ated by Kohli and Singh (Demonstratio Math. 42(1, (2009, 221-231 and so include all perfectly continuous functions introduced by Noiri (Indian J. Pure Appl. Math. 15(3 (1984, 241-250.

  8. Access to continued professional education among health workers ...

    African Journals Online (AJOL)

    Results: Fifty-seven healthcare workers participated of whom 47 (82.5%) were nurses, 8 (14.0%) were either medical assistants or clinical officers, and one laboratory technician and a dental therapist. At the time of the study, 50(87.7%) were prescribers and 54 (94.7%) had ever issued a prescription for medications.

  9. Physical protection

    International Nuclear Information System (INIS)

    Myers, D.A.

    1989-01-01

    Physical protection is defined and its function in relation to other functions of a State System of Accounting for and Control of Nuclear Materials is described. The need for a uniform minimum international standard for physical protection as well as the need for international cooperation in physical protection is emphasized. The IAEA's INFCIRC/225/Rev. 1 (Annex 1) is reviewed. The Convention on the Physical Protection of Nuclear Material (Annex 2) is discussed. Photographs show examples of typical physical protection technology (Annex 3)

  10. Diplomatic Protection

    OpenAIRE

    Režná, Jana

    2006-01-01

    Final thesis Topic: Diplomatic protection Thesis supervisor: JUDr. Vladimír Balaš, CSc. Student: Marek Čermák Thesis on the topic of diplomatic protection deals with the granting of exercise of diplomatic protection by the states and is divided into seven chapters which follow each other. The first chapter describes the diplomatic protection and its historical foundations. The second chapter focuses on the possibility of exercise of diplomatic protection in respect of natural persons and the ...

  11. Protecting privacy in data release

    CERN Document Server

    Livraga, Giovanni

    2015-01-01

    This book presents a comprehensive approach to protecting sensitive information when large data collections are released by their owners. It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not explicitly released but potentially vulnerable due to a release of other data, and the enforcement of owner-defined access restrictions to the released data. It is also the first book with a complete examination of how to enforce dynamic read and write access authorizations on released data, applicable to the emerging data outsou

  12. Physical protection of power reactors

    International Nuclear Information System (INIS)

    Darby, J.L.

    1979-01-01

    Sandia Laboratories has applied a systematic approach to designing physical protection systems for nuclear facilities to commercial light-water reactor power plants. A number of candidate physical protection systems were developed and evaluated. Focus is placed on the design of access control subsystems at each of three plant layers: the protected area perimeter, building surfaces, and vital areas. Access control refers to barriers, detectors, and entry control devices and procedures used to keep unauthorized personnel and contraband out of the plant, and to control authorized entry into vital areas within the plant

  13. Continuous-variable quantum games

    International Nuclear Information System (INIS)

    Li Hui; Du Jiangfeng; Massar, Serge

    2002-01-01

    We investigate the quantization of games in which the players can access to a continuous set of classical strategies, making use of continuous-variable quantum systems. For the particular case of the Cournot's duopoly, we find that, even though the two players both act as 'selfishly' in the quantum game as they do in the classical game, they are found to virtually cooperate due to the quantum entanglement between them. We also find that the original Einstein-Podolksy-Rosen state contributes to the best profits that the two firms could ever attain. Moreover, we propose a practical experimental setup for the implementation of such quantum games

  14. 33 CFR 135.401 - Access to vessel, Certificates of Financial Responsibility.

    Science.gov (United States)

    2010-07-01

    ... HOMELAND SECURITY (CONTINUED) MARINE POLLUTION FINANCIAL RESPONSIBILITY AND COMPENSATION OFFSHORE OIL POLLUTION COMPENSATION FUND Access, Denial, and Detention § 135.401 Access to vessel, Certificates of...

  15. Software for radiation protection

    International Nuclear Information System (INIS)

    Graffunder, H.

    2002-01-01

    The software products presented are universally usable programs for radiation protection. The systems were designed in order to establish a comprehensive database specific to radiation protection and, on this basis, model in programs subjects of radiation protection. Development initially focused on the creation of the database. Each software product was to access the same nuclide-specific data; input errors and differences in spelling were to be excluded from the outset. This makes the products more compatible with each other and able to exchange data among each other. The software products are modular in design. Functions recurring in radiation protection are always treated the same way in different programs, and also represented the same way on the program surface. The recognition effect makes it easy for users to familiarize with the products quickly. All software products are written in German and are tailored to the administrative needs and codes and regulations in Germany and in Switzerland. (orig.) [de

  16. ROMANIA'S EU ACCESSION. GAINS AND LOSSES (I

    Directory of Open Access Journals (Sweden)

    Caba Stefan

    2012-07-01

    Full Text Available EU accession has brought, as expected, many changes in economic, social and cultural domains. An important chapter is the trade dynamics and how this dynamic has been modified over time by changes in the legal status of Romania's relations with certain trading partners. In this paper we present data on trade with countries with which Romania has concluded trade agreements before accession. Data presentation and analysis continues in "Romania's EU accession. Gains and losses (II".

  17. The LHC access system LACS and LASS

    CERN Document Server

    Ninin, P

    2005-01-01

    The LHC complex is divided into a number of zones with different levels of access controls.Inside the interlocked areas, the personnel protection is ensured by the LHC Access System.The system is made of two parts:the LHC Access Safety System and the LHC Access Control System. During machine operation,the LHC Access Safety System ensures the collective protection of the personnel against the radiation hazards arising from the operation of the accelerator by interlocking the LHC key safety elements. When the beams are off, the LHC Access Control System regulates the access to the accelerator and its many subsystems.It allows a remote, local or automatic operation of the access control equipment which verifies and identifies all users entering the controlled areas.The global architecture of the LHC Access System is now designed and is being validated to ensure that it meets the safety requirements for operation of the LHC.A pilot installation will be tested in the summer 2005 to validate the concept with the us...

  18. Protecting patron privacy

    CERN Document Server

    Beckstrom, Matthew

    2015-01-01

    In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research-if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount

  19. 29 CFR 1917.92 - Respiratory protection.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Respiratory protection. 1917.92 Section 1917.92 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) MARINE TERMINALS Personal Protection § 1917.92 Respiratory protection. (See § 1917.1(a)(2)(x...

  20. Fishing Access Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — The Vermont Fish & Wildlife Department maintains developed fishing access areas. These sites provide public access to waters in Vermont for shore fishing...

  1. Accessibility and sensory experiences

    DEFF Research Database (Denmark)

    Ryhl, Camilla

    2010-01-01

    and accessibility. Sensory accessibility accommodates aspects of a sensory disability and describes architectural design requirements needed to ensure access to architectural experiences. In the context of architecture accessibility has become a design concept of its own. It is generally described as ensuring...... physical access to the built environment by accommodating physical disabilities. While the existing concept of accessibility ensures the physical access of everyone to a given space, sensory accessibility ensures the choice of everyone to stay and be able to participate and experience....

  2. Environmental protection

    International Nuclear Information System (INIS)

    Klinda, J.; Lieskovska, Z.

    1998-01-01

    In this chapter environmental protection in the Slovak Republic in 1997 are reviewed. The economics of environmental protection, state budget, Slovak state environmental fund, economic instruments, environmental laws, environmental impact assessment, environmental management systems, and environmental education are presented

  3. Designing physical protection technology for insider protection

    International Nuclear Information System (INIS)

    Trujillo, A.A.; Waddoups, I.G.

    1986-01-01

    Since its inception, the nuclear industry has been engaged in providing protection against an insider threat. Although insider protection activities have been fairly successful in the past, present societal conditions require increased protection to further minimize the existence of an insider or the consequences of an insider-perpetrated incident. Integration of insider protection techniques into existing administrative and operational procedures has resulted in economic and operational impacts. Future increases in insider protection may result in even greater impacts, so we must proceed wisely as new approaches are developed. Increased emphasis on background investigations, security clearances, human reliability programs, security awareness activities, and the development of technology to address the insider threat are evidence of continuing concern in this area. Experience ranging from operational test and evaluation of developmental equipment to conceptual designs for new facilities has led to the development of general principles and conclusions for mitigating the insider threat while minimizing adverse impacts on site operations. Important principles include real-time monitoring of personnel and material and requiring that the physical protection and material control and accounting systems to be much more coordinated and integrated than in the past

  4. 76 FR 36863 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-06-23

    ... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... for Gulfstream GVI airplanes. 1. The applicant must ensure electronic system security protection for... that effective electronic system security protection strategies are implemented to protect the airplane...

  5. Innovative protection cookbook

    International Nuclear Information System (INIS)

    Lambert, D.L.

    2002-01-01

    Full text: A large portion of the international community relies on expert judgment and military expertise to form the protection strategy of weapons-grade nuclear materials. This approach can be less than effectual for two primary reasons. First, much of the nuclear material that needs the most protection is not in a static form and located in easily secured storage locations. Some of the most effective measures for protection of in-process material are administrative and procedural in nature. There are basic protection differences between countries just like there are differences in baking bread. However, the necessary steps to produce bread are basically the same around the world. Certain ingredients are required to give it flavor, make it rise, and have a certain texture. So it is in the development of protection systems. A measure of intrusion detection, some access controls and searches, a pinch of computerized accounting, a layer of delay barriers, and a smidgen of armed response--and the basis for a 'cookbook' is born. Any and all protection systems can begin with simple elements that can be just as effective as the most sophisticated modern components. This paper will describe some of those simple, but effective, innovative protection measures. (author)

  6. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  7. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  8. Publishing in open access era: focus on respiratory journals.

    Science.gov (United States)

    Dai, Ni; Xu, Dingyao; Zhong, Xiyao; Li, Li; Ling, Qibo; Bu, Zhaode

    2014-05-01

    We have entered an open access publishing era. The impact and significance of open access is still under debate after two decades of evolution. Open access journals benefit researchers and the general public by promoting visibility, sharing and communicating. Non-mainstream journals should turn the challenge of open access into opportunity of presenting best research articles to the global readership. Open access journals need to optimize their business models to promote the healthy and continuous development.

  9. Protective relay

    International Nuclear Information System (INIS)

    Lim, Mu Ji; Jung, Hae Sang

    1974-10-01

    This book is divided into two chapters, which deals with protective relay. The first chapter deals with the basic knowledge of relay on development of relay, classification of protective relay, rating of protective relay general structure of protective relay, detecting of ground protection, about point of contact, operating relay and trip relaying. The second chapter is about structure and explanation of relay on classification by structure such as motor type and moving-coil type, explanation of other relays over current relay, over voltage relay, short voltage relay, relay for power, relay for direction, test of over voltage relay, test of short voltage relay and test of directional circuit relay.

  10. Protecting knowledge

    DEFF Research Database (Denmark)

    Sofka, Wolfgang; de Faria, Pedro; Shehu, Edlira

    2018-01-01

    Most firms use secrecy to protect their knowledge from potential imitators. However, the theoretical foundations for secrecy have not been well explored. We extend knowledge protection literature and propose theoretical mechanisms explaining how information visibility influences the importance...... of secrecy as a knowledge protection instrument. Building on mechanisms from information economics and signaling theory, we postulate that secrecy is more important for protecting knowledge for firms that have legal requirements to reveal information to shareholders. Furthermore, we argue that this effect...... and a firm's investment in fixed assets. Our findings inform both academics and managers on how firms balance information disclosure requirements with the use of secrecy as a knowledge protection instrument....

  11. Environment protection and energy politics

    International Nuclear Information System (INIS)

    Grawe, J.

    1993-01-01

    The lecture first deals with the aims and legal basis in German and European law of environment protection with regard to energy politics. It then goes to deal with European regulations for environment protection and their effects on the energy supply: Air pollution abatement, tax for the protection of the climate, internalisation of external costs. The following European energy-political measures impinge on environment protection: Sponsored projects, least-cost planning, third-party access to the public electricity supply. The discrepancy between European and national policies can be lessened or resolved by the following means: Harmonisation, subsidiarity principle, and scope for entrepreneurial solutions. (orig.) [de

  12. JISC Open Access Briefing Paper

    OpenAIRE

    Swan, Alma

    2005-01-01

    What Open Access is. What Open Access is not. How is Open Access provided? Open Access archives or repositories. Open Access journals. Why should authors provide Open Access to their work? Further information and resources

  13. Probabilistic assessment methodology for continuous-type petroleum accumulations

    Science.gov (United States)

    Crovelli, R.A.

    2003-01-01

    The analytic resource assessment method, called ACCESS (Analytic Cell-based Continuous Energy Spreadsheet System), was developed to calculate estimates of petroleum resources for the geologic assessment model, called FORSPAN, in continuous-type petroleum accumulations. The ACCESS method is based upon mathematical equations derived from probability theory in the form of a computer spreadsheet system. ?? 2003 Elsevier B.V. All rights reserved.

  14. Vascular access for home haemodialysis.

    Science.gov (United States)

    Al Shakarchi, Julien; Day, C; Inston, N

    2018-03-01

    Home haemodialysis has been advocated due to improved quality of life. However, there are very little data on the optimum vascular access for it. A retrospective cohort study was carried on all patients who initiated home haemodialysis between 2011 and 2016 at a large university hospital. Access-related hospital admissions and interventions were used as primary outcome measures. Our cohort consisted of 74 patients. On initiation of home haemodialysis, 62 individuals were using an arteriovenous fistula as vascular access, while the remaining were on a tunnelled dialysis catheter. Of the 12 patients who started on a tunnelled dialysis catheter, 5 were subsequently converted to either an arteriovenous fistula ( n = 4) or an arteriovenous graft ( n = 1). During the period of home haemodialysis use, four arteriovenous fistula failed or thrombosed with patients continuing on home haemodialysis using an arteriovenous graft ( n = 3) or a tunnelled dialysis catheter ( n = 1). To maintain uninterrupted home haemodialysis, interventional rates were 0.32 per arteriovenous fistula/arteriovenous graft access-year and 0.4 per tunnelled dialysis catheter access-year. Hospital admission rates for patients on home haemodialysis were 0.33 per patient-year. Our study has shown that home haemodialysis can be safely and independently performed at home within a closely managed home haemodialysis programme. The authors also advocate the use of arteriovenous fistulas for this cohort of patients due to both low complication and intervention rates.

  15. An Attribute Based Access Control Framework for Healthcare System

    Science.gov (United States)

    Afshar, Majid; Samet, Saeed; Hu, Ting

    2018-01-01

    Nowadays, access control is an indispensable part of the Personal Health Record and supplies for its confidentiality by enforcing policies and rules to ensure that only authorized users gain access to requested resources in the system. In other words, the access control means protecting patient privacy in healthcare systems. Attribute-Based Access Control (ABAC) is a new access control model that can be used instead of other traditional types of access control such as Discretionary Access Control, Mandatory Access Control, and Role-Based Access Control. During last five years ABAC has shown some applications in both recent academic fields and industry purposes. ABAC by using user’s attributes and resources, makes a decision according to an access request. In this paper, we propose an ABAC framework for healthcare system. We use the engine of ABAC for rendering and enforcing healthcare policies. Moreover, we handle emergency situations in this framework.

  16. Completely continuous and weakly completely continuous abstract ...

    Indian Academy of Sciences (India)

    An algebra A is called right completely continuous (right weakly completely continuous) ... Moreover, some applications of these results in group algebras are .... A linear subspace S(G) of L1(G) is said to be a Segal algebra, if it satisfies the.

  17. 49 CFR 193.2905 - Protective enclosures.

    Science.gov (United States)

    2010-10-01

    ... ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY LIQUEFIED NATURAL GAS FACILITIES... surrounded by a protective enclosure: (1) Storage tanks; (2) Impounding systems; (3) Vapor barriers; (4...

  18. National Sessions of Radiation Protection

    International Nuclear Information System (INIS)

    Sociedad Argentina de Radioproteccion

    2012-01-01

    The Radioprotection Argentine Society (SAR) was organized the National Sessions on Radiation Protection 2012 in order to continue the exchange in the radiation protection community in the country, on work areas that present a challenge to the profession. The new recommendations of the ICRP and the IAEA Safety Standards (2011), among others, includes several topics that are necessary to develop. The SAR wants to encourage different organizations from Argentina, to submit projects that are developing in order to strengthen radiation protection.

  19. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  20. Professional Access 2013 programming

    CERN Document Server

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  1. Access 2010 Programmer's Reference

    CERN Document Server

    Hennig, Teresa; Griffith, Geoffrey L

    2010-01-01

    A comprehensive guide to programming for Access 2010 and 2007. Millions of people use the Access database applications, and hundreds of thousands of developers work with Access daily. Access 2010 brings better integration with SQL Server and enhanced XML support; this Wrox guide shows developers how to take advantage of these and other improvements. With in-depth coverage of VBA, macros, and other programming methods for building Access applications, this book also provides real-world code examples to demonstrate each topic.: Access is the leading database that is used worldwide; While VBA rem

  2. Access inequalities addressed by audit.

    Science.gov (United States)

    Singh, Rajiv; Pentland, Brian

    2005-08-01

    The Disability Discrimination Act (1995) protects disabled people from discrimination in access to services, facilities and goods as well as in education and employment. All hospitals have an inherent duty to enable access to services but this will now be enshrined in law. As the health sector has most contact with disability, it may be expected that most hospitals would already be in a good position to comply with the Act, especially one treating many patients with disability. However we identified many problems in a rehabilitation hospital setting by means of a simple access audit in March 2004. Recommendations were set out and by March 2005 considerable improvements had been made costing Pound 100,000. Although many necessary changes will be expensive, not all problems identified require costly correction. Many simply involve a change in staff attitudes and practices. We recommend that all hospitals start to identify the changes needed under the Act by means of a simple access audit that can be carried out by hospital staff with no specialist equipment.

  3. Right of access to energy

    International Nuclear Information System (INIS)

    Delgado Triana, Yanelys; Fariñas Wong, Ernesto Yoel

    2015-01-01

    Energy is essential for the development of our life and for the development of production capacity. However, a number of people worldwide without this living, specifically power. To the extent that increase energy needs for domestic, industrial and agricultural use, each day more indispensable need access to this recognition as a human right or fundamental respect is made, so some questions in this paper are required both denominations, being essential to consider the emergence and evolution of these. An analysis of the international protection they receive the right of access to energy services, although currently there are no international treaties that specifically recognize it also performs a number of initiatives that promote its preservation manifested and recognized in several abstractly legal instruments, such as declarations, covenants and conventions. (full text)

  4. Open access in the critical care environment.

    Science.gov (United States)

    South, Tabitha; Adair, Brigette

    2014-12-01

    Open access has become an important topic in critical care over the last 3 years. In the past, critical care had restricted access and set visitation guidelines to protect patients. This article provides a review of the literature related to open access in the critical care environment, including the impact on patients, families, and health care providers. The ultimate goal is to provide care centered on patients and families and to create a healing environment to ensure safe passage of patients through their hospital stays. This outcome could lead to increased patient/family satisfaction. Copyright © 2014 Elsevier Inc. All rights reserved.

  5. Observations on physical protection methods for protecting against unauthorized acts by an insider

    International Nuclear Information System (INIS)

    Ericson, D.M.; Goldman, L.A.; Lobner, R.R.

    1983-01-01

    Two basic approaches have evolved over the past several years for physical protection against sabotage by insiders. One, area-type physical protection, involves the use of access controls at area boundaries. Current practices at nuclear power plants generally fall into this category. The second, component-level physical protection, involves hardware at individual components as well as access controls at the boundary. The area-type physical protection concepts include team, area, and operational zoning. Team zoning requires the formation of multiperson teams that must be used to gain access to vital areas. Area zoning divides the plant into two or more zones, each of which is operated and maintained by separate, dedicated teams. Operational zoning is a closed-loop access control system that permits an initial vital area access, but blocks access to certain other vital areas until the operability of equipment in the first area is verified by test or inspection. Component-level physical protection is also a closed-loop system in which both area and component access are monitored. Each of the above measures can provide effective protection against an insider in certain instances, but each has weaknesses that must be recognized. An approach for protection against the insider is to take the most promising features of each of the above physical protection measures and supplement these capabilities with damage control and design changes as appropriate for a particular plant

  6. Radiation Protection

    International Nuclear Information System (INIS)

    Loos, M.

    2002-01-01

    Major achievements of SCK-CEN's Radiation Protection Department in 2001 are described. The main areas for R and D of the department are enviromnental remediation, emergency planning, radiation protection research, low-level radioactvity measurements, safeguards and physics measurements, decision strategy research and policy support and social sciences in nuclear research. Main achievements for 2001 in these areas are reported

  7. Sun protection

    Science.gov (United States)

    ... sun exposure. The start of summer is when UV rays can cause the most skin damage. Use sun protection, even on cloudy days. Clouds and haze don't protect you from the sun. Avoid surfaces that reflect light, such as water, sand, concrete, snow, and areas ...

  8. 14 CFR 153.5 - Aviation safety inspector airport access.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 3 2010-01-01 2010-01-01 false Aviation safety inspector airport access... TRANSPORTATION (CONTINUED) AIRPORTS AIRPORT OPERATIONS Aviation Safety Inspector Access § 153.5 Aviation safety... must grant Aviation Safety Inspectors bearing FAA Form 110A free and uninterrupted access to public-use...

  9. Providing Continuous Assurance

    NARCIS (Netherlands)

    Kocken, Jonne; Hulstijn, Joris

    2017-01-01

    It has been claimed that continuous assurance can be attained by combining continuous monitoring by management, with continuous auditing of data streams and the effectiveness of internal controls by an external auditor. However, we find that in existing literature the final step to continuous

  10. Overview: Routes to Open Access

    OpenAIRE

    Tullney, Marco; van Wezenbeek, Wilma

    2017-01-01

    Slides of an overview presentation given at a CESAER workshop on Open Access, February 2nd, 2017, in Brussels Cover major routes to more open access as discussed in the Task Force Open Science of CESAER: (national) open access strategies open access mandates open access incentives open access awareness open access publishing open access infrastructure

  11. Utilization of information communication technology (ICT) - Based training / learning for capacity building in radiation protection framework

    International Nuclear Information System (INIS)

    Oluyemi, I.O.D.

    2008-01-01

    Full text: Radiation protection is the science of protecting people and the environment from the harmful effects of ionizing radiation, which includes both particle radiation and high energy electromagnetic radiation. It includes occupational radiation protection, which is the protection of workers; medical radiation protection, which is the protection of patients; and public radiation protection, which is about protection of individual members of the public, and of the population as a whole. ICT has made possible the development of e-learning and several Virtual Learning Environments (VLEs) which can support a wide range of capacity building requirements, ranging from under-graduate and post-graduate programmes, continuing professional development courses, right through to short subject specific and research courses, thereby eliminating the problems of conventional forms of training / learning, some of which are: limited access, cost effectiveness and language / cultural barriers. This paper focuses on the utilization of these ICT-based training / learning for capacity building in radiation protection framework and concludes with suggestions on implementation strategies. (author)

  12. Black holes by analytic continuation

    CERN Document Server

    Amati, Daniele

    1997-01-01

    In the context of a two-dimensional exactly solvable model, the dynamics of quantum black holes is obtained by analytically continuing the description of the regime where no black hole is formed. The resulting spectrum of outgoing radiation departs from the one predicted by the Hawking model in the region where the outgoing modes arise from the horizon with Planck-order frequencies. This occurs early in the evaporation process, and the resulting physical picture is unconventional. The theory predicts that black holes will only radiate out an energy of Planck mass order, stabilizing after a transitory period. The continuation from a regime without black hole formation --accessible in the 1+1 gravity theory considered-- is implicit in an S matrix approach and provides in this way a possible solution to the problem of information loss.

  13. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  14. Design for Accessibility

    DEFF Research Database (Denmark)

    Herriott, Richard

    2012-01-01

    A report on how nine rail builder, operators and transport designers deal with design for accessibility......A report on how nine rail builder, operators and transport designers deal with design for accessibility...

  15. Information on Open Access

    African Journals Online (AJOL)

    Open Access (OA), defined most simply, means free full text online. There are over 130 Open Access journals hosted on the AJOL website. You can find a full list of these journals here: OA journals on AJOL ...

  16. Access Customized Forms

    OpenAIRE

    Cosma Emil; Jeflea Victor

    2010-01-01

    By using Word, Excel or PowerPoint one can automate routine operations using the VBA language (Visual Basic for Applications). This language is also used in Access, allowing access to data stored in tables or queries. Thus, Access and VBA resources can be used together. Access is designed for programming forms and reports (among other things), so there won’t be found any of the VBA editor’s specific forms.

  17. Making Astronomy Accessible

    Science.gov (United States)

    Grice, Noreen A.

    2011-05-01

    A new semester begins, and your students enter the classroom for the first time. You notice a student sitting in a wheelchair or walking with assistance from a cane. Maybe you see a student with a guide dog or carrying a Braille computer. Another student gestures "hello” but then continues hand motions, and you realize the person is actually signing. You wonder why another student is using an electronic device to speak. Think this can't happen in your class? According to the U.S. Census, one out of every five Americans has a disability. And some disabilities, such as autism, dyslexia and arthritis, are considered "invisible” disabilities. This means you have a high probability that one of your students will have a disability. As an astronomy instructor, you have the opportunity to reach a wide variety of learners by using creative teaching strategies. I will share some suggestions on how to make astronomy and your part of the universe more accessible for everyone.

  18. Accessing Electronic Journals.

    Science.gov (United States)

    McKay, Sharon Cline

    1999-01-01

    Discusses issues librarians need to consider when providing access to electronic journals. Topics include gateways; index and abstract services; validation and pay-per-view; title selection; integration with OPACs (online public access catalogs)or Web sites; paper availability; ownership versus access; usage restrictions; and services offered…

  19. Open access and beyond

    Directory of Open Access Journals (Sweden)

    Das Chhaya

    2006-09-01

    Full Text Available Abstract Uncensored exchange of scientific results hastens progress. Open Access does not stop at the removal of price and permission barriers; still, censorship and reading disabilities, to name a few, hamper access to information. Here, we invite the scientific community and the public to discuss new methods to distribute, store and manage literature in order to achieve unfettered access to literature.

  20. Radiation protection

    International Nuclear Information System (INIS)

    1989-01-01

    A NRPB leaflet in the 'At-a-Glance' series explains in a simple but scientifically accurate way what radiation is, the biological effects and the relative sensitivity of different parts of the human body. The leaflet then discusses radiation protection principles, radiation protection in the UK and finally the effectiveness of this radiation protection as judged by a breakdown of the total dose received by an average person in the UK, a heavy consumer of Cumbrian seafood, an average nuclear industry worker and an average person in Cornwall. (UK)

  1. Access 2013 for dummies

    CERN Document Server

    Ulrich Fuller, Laurie

    2013-01-01

    The easy guide to Microsoft Access returns with updates on the latest version! Microsoft Access allows you to store, organize, view, analyze, and share data; the new Access 2013 release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. Access 2013 For Dummies covers all the new features of the latest version of Accessand serves as an ideal reference, combining the latest Access features with the basics of building usable databases. You'll learn how to create an app from the Welcome screen, get support

  2. Pro Access 2010 Development

    CERN Document Server

    Collins, Mark

    2011-01-01

    Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for Applications (VBA) tools for Access applications, integrate Access with SharePoint and other business systems, and much more. Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, co

  3. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  4. Sevoflurane improves gaseous exchange and exerts protective ...

    African Journals Online (AJOL)

    mice, and exerted protective effects against acute LPS-induced lung injury. ... This is an Open Access article that uses a funding model which does not charge readers .... field microscope [20]. ... by Tukey's test were used for statistical analysis.

  5. PUBLIC ACCESS TO PRIVATE LAND IN SCOTLAND

    African Journals Online (AJOL)

    David

    The Forum's work led to advice to the Scottish Government concluding that ... respect of the facilitation and upholding of access rights. This is ...... particular protection of a person's rights in respect of private and family life and the home under ... jurisprudence emphasising the necessity of a balancing-of-interests approach.

  6. The Open Access Movement in Latin America. A continuation of the historic clashes between the capitalistic-driven forces against the socializing forces of information and knowledge sharing = El Movimiento Acceso Abierto (Open Access) en Latinoamérica. Una continuación de los históricos ataques de las fuerzas capitalistas contra las de la socialización del compartimento de información y conocimiento. Una opinión personal

    OpenAIRE

    Muela-Meza, Zapopan Martín

    2005-01-01

    This presentation intends to give a Latin America-wide account of the development of the Web-based Open Access movement. It provides a historical account of the class struggles between the capitalistic-driven appropriators of information-knowledge and the socializing and commonalizing forces, and it employs that as a framework to analyse the overall OA movement. It argues the capitalistic-driven pay-per-access publishing system is an irrational framework which should be put aside. It calls fo...

  7. Taboos and forest governance: informal protection of hot spot dry forest in southern Madagascar.

    Science.gov (United States)

    Tengö, Maria; Johansson, Kristin; Rakotondrasoa, Fanambinantsoa; Lundberg, Jakob; Andriamaherilala, Jean-Aimé; Rakotoarisoa, Jean-Aimé; Elmqvist, Thomas

    2007-12-01

    In the dry forest of southern Madagascar, a region of global conservation priority, formally protected areas are nearly totally absent. We illustrate how the continued existence of unique forest habitats in the Androy region is directly dependent on informal institutions, taboos, regulating human behavior. Qualitative interviews to map and analyze the social mechanisms underlying forest protection have been combined with vegetation analyses of species diversity and composition. Of 188 forest patches, 93% were classified as protected, and in Southern Androy all remaining forest patches larger than 5 ha were protected. Eight different types of forests, with a gradient of social fencing from open access to almost complete entry prohibitions, were identified. Transgressions were well enforced with strong sanctions of significant economic as well as religious importance. Analyses of species diversity between protected and unprotected forests were complicated because of size differences and access restrictions. However, since, for example, in southern Androy >90% of the total remaining forest cover is protected through taboos, these informal institutions represent an important, and presently the only, mechanism for conservation of the highly endemic forest species. We conclude that social aspects, such as local beliefs and legitimate sanctioning systems, need to be analyzed and incorporated along with biodiversity studies for successful conservation.

  8. Protective clothing

    International Nuclear Information System (INIS)

    Malet, J.C.; Regnier, J.

    1979-01-01

    The present operational and intervention suits are described. Research work is currently in progress to improve the performance of the existing suits and to develop more resistant protective clothing. (author)

  9. Radiation protection

    International Nuclear Information System (INIS)

    Ures Pantazi, M.

    1994-01-01

    This work define procedures and controls about ionizing radiations. Between some definitions it found the following topics: radiation dose, risk, biological effects, international radioprotection bodies, workers exposure, accidental exposure, emergencies and radiation protection

  10. Open Access @ DTU

    DEFF Research Database (Denmark)

    Ekstrøm, Jeannette

    Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all peer review...... articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access and related topics...... such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc....

  11. Three essays on access pricing

    Science.gov (United States)

    Sydee, Ahmed Nasim

    access pricing with congestion and in which investments in infrastructure are lumpy. To fix ideas, the model is formulated in the context of airport infrastructure investments, which captures both the element of congestion and the lumpiness involved in infrastructure investments. The optimal investment program suggests how many units of capacity should be installed and at which times. Because time is continuous in the model, the discounted cost -- despite the lumpiness of capacity additions -- can be made to vary continuously by varying the time a capacity addition is made. The main results that emerge from the analysis can be described as follows: First, the global demand for air travel rises with time and experiences an upward jump whenever a capacity addition is made. Second, the access price is constant and stays at the basic level when the system is not congested. When the system is congested, a congestion surcharge is imposed on top of the basic level, and the congestion surcharge rises with the level of congestion until the next capacity addition is made at which time the access price takes a downward jump. Third, the individual demand for air travel is constant before congestion sets in and after the last capacity addition takes place. During a time interval in which congestion rises, the individual demand for travel is below the level that prevails when there is no congestion and declines as congestion worsens. The third essay contains a model of access pricing for natural gas transmission pipelines, both when pipeline operators are regulated and when they behave strategically. The high sunk costs involved in building a pipeline network constitute a serious barrier of entry, and competitive behaviour in the transmission pipeline sector cannot be expected. Most of the economic analyses of access pricing for natural gas transmission pipelines are carried out from the regulatory perspective, and the access price paid by shippers are cost-based. The model formalized

  12. Employment protection

    OpenAIRE

    Stefano Scarpetta

    2014-01-01

    Laws on hiring and firing are intended to protect workers from unfair behavior by employers, to counter imperfections in financial markets that limit workers’ ability to insure themselves against job loss, and to preserve firm-specific human capital. But by imposing costs on firms’ adaptation to changes in demand and technology, employment protection legislation may reduce not only job destruction but also job creation, hindering the efficient allocation of labor and productivity growth....

  13. Environmental protection

    International Nuclear Information System (INIS)

    Martinez, A.S.

    1987-01-01

    The question of environment protection related to the use of nuclear energy aiming to power generation, based on the harmonic concept of economic and industrial development, preserving the environment, is discussed. A brief study of environmental impacts for some energy sources, including nuclear energy, to present the systems of a nuclear power plant which aim at environmental protection, is done. (M.C.K.) [pt

  14. Radiation protection

    International Nuclear Information System (INIS)

    Koelzer, W.

    1976-01-01

    The lecture is divided into five sections. The introduction deals with the physical and radiological terms, quantities and units. Then the basic principles of radiological protection are discussed. In the third section attention is paid to the biological effects of ionizing radiation. The fourth section deals with the objectives of practical radiological protection. Finally the emergency measures are discussed to be taken in radiation accidents. (HP) [de

  15. Copyright protection

    OpenAIRE

    Plchotová, Gabriela

    2011-01-01

    The aim of this thesis is to offer a straightforward manual to anyone who authors their own original work or who utilises the original work of other creators. As such, it is necessary to briefly and clearly explain the historical development and essential terms of authorship as a concept and the origin of the need for copyright protection. Furthermore, this thesis includes chapters on copyright protection development specifically in the Czech Republic and the current definition of related law...

  16. Accessibility of antiretroviral therapy in Ghana: convenience of access.

    Science.gov (United States)

    Addo-Atuah, Joyce; Gourley, Dick; Gourley, Greta; White-Means, Shelley I; Womeodu, Robin J; Faris, Richard J; Addo, Nii Akwei

    2012-01-01

    The convenience of accessing antiretroviral therapy (ART) is important for initial access to care and subsequent adherence to ART. We conducted a qualitative study of people living with HIV/AIDS (PLWHA) and ART healthcare providers in Ghana in 2005. The objective of this study was to explore the participants' perceived convenience of accessing ART by PLWHA in Ghana. The convenience of accessing ART was evaluated from the reported travel and waiting times to receive care, the availability, or otherwise, of special considerations, with respect to the waiting time to receive care, for those PLWHA who were in active employment in the formal sector, the frequency of clinic visits before and after initiating ART, and whether the PLWHA saw the same or different providers at each clinic visit (continuity of care). This qualitative study used in-depth interviews based on Yin's case-study research design to collect data from 20 PLWHA and 24 ART healthcare providers as study participants. • Reported travel time to receive ART services ranged from 2 to 12 h for 30% of the PLWHA. • Waiting time to receive care was from 4 to 9 h. • While known government workers, such as teachers, were attended to earlier in some of the centres, this was not a consistent practice in all the four ART centres studied. • The PLWHA corroborated the providers' description of the procedure for initiating and monitoring ART in Ghana. • PLWHA did not see the same provider every time, but they were assured that this did not compromise the continuity of their care. Our study suggests that convenience of accessing ART is important to both PLWHA and ART healthcare providers, but the participants alluded to other factors, including open provider-patient communication, which might explain the PLWHA's understanding of the constraints under which they were receiving care. The current nation-wide coverage of the ART programme in Ghana, however, calls for the replication of this study to identify

  17. Radiological protection

    International Nuclear Information System (INIS)

    Azorin N, J.; Azorin V, J. C.

    2010-01-01

    This work is directed to all those people related with the exercise of the radiological protection and has the purpose of providing them a base of knowledge in this discipline so that they can make decisions documented on technical and scientist factors for the protection of the personnel occupationally exposed, the people in general and the environment during the work with ionizing radiations. Before de lack of a text on this matter, this work seeks to cover the specific necessities of our country, providing a solid presentation of the radiological protection, included the bases of the radiations physics, the detection and radiation dosimetry, the radiobiology, the normative and operational procedures associates, the radioactive wastes, the emergencies and the transport of the radioactive material through the medical and industrial applications of the radiations, making emphasis in the relative particular aspects to the radiological protection in Mexico. The book have 16 chapters and with the purpose of supplementing the given information, are included at the end four appendixes: 1) the radioactive waste management in Mexico, 2-3) the Mexican official standards related with the radiological protection, 4) a terms glossary used in radiological protection. We hope this book will be of utility for those people that work in the investigation and the applications of the ionizing radiations. (Author)

  18. CEBAF - environmental protection program plan

    International Nuclear Information System (INIS)

    1995-01-01

    An important objective in the successful operation of the Continuous Electron Beam Accelerator Facility (CEBAF) is to ensure protection of the public and the environment. To meet this objective, the Southeastern Universities Research Association, Inc., (SURA) is committed to working with the US Department of Energy (DOE) to develop, implement, and manage a sound and workable environmental protection program at CEBAF. This environmental protection plan includes information on environmental monitoring, long-range monitoring, groundwater protection, waste minimization, and pollution prevention awareness program plan

  19. Personal continuous route pattern mining

    Institute of Scientific and Technical Information of China (English)

    Qian YE; Ling CHEN; Gen-cai CHEN

    2009-01-01

    In the daily life, people often repeat regular routes in certain periods. In this paper, a mining system is developed to find the continuous route patterns of personal past trips. In order to count the diversity of personal moving status, the mining system employs the adaptive GPS data recording and five data filters to guarantee the clean trips data. The mining system uses a client/server architecture to protect personal privacy and to reduce the computational load. The server conducts the main mining procedure but with insufficient information to recover real personal routes. In order to improve the scalability of sequential pattern mining, a novel pattern mining algorithm, continuous route pattern mining (CRPM), is proposed. This algorithm can tolerate the different disturbances in real routes and extract the frequent patterns. Experimental results based on nine persons' trips show that CRPM can extract more than two times longer route patterns than the traditional route pattern mining algorithms.

  20. Politics, investor protection and competition

    NARCIS (Netherlands)

    Perotti, E.; Volpin, P.

    2007-01-01

    External finance is critical for less established entrepreneurs, so poor investor protection can hinder competition. We model how lobbying by incumbents may reduce access to finance in countries where politicians are less accountable to voters. In a broad cross-section of countries and industries,

  1. Open Access Data Sharing in Genomic Research

    Directory of Open Access Journals (Sweden)

    Stacey Pereira

    2014-08-01

    Full Text Available The current emphasis on broad sharing of human genomic data generated in research in order to maximize utility and public benefit is a significant legacy of the Human Genome Project. Concerns about privacy and discrimination have led to policy responses that restrict access to genomic data as the means for protecting research participants. Our research and experience show, however, that a considerable number of research participants agree to open access sharing of their genomic data when given the choice. General policies that limit access to all genomic data fail to respect the autonomy of these participants and, at the same time, unnecessarily limit the utility of the data. We advocate instead a more balanced approach that allows for individual choice and encourages informed decision making, while protecting against the misuse of genomic data through enhanced legislation.

  2. A evolução do sistema internacional de propriedade intelectual: proteção patentária para o setor farmacêutico e acesso a medicamentos Evolution of the international intellectual property rights system: patent protection for the pharmaceutical industry and access to medicines

    Directory of Open Access Journals (Sweden)

    Gabriela Costa Chaves

    2007-02-01

    Full Text Available O artigo discute a evolução do sistema internacional de direitos de propriedade intelectual em três fases e as implicações para saúde pública, especialmente para a implementação de políticas de acesso a medicamentos. Durante a primeira fase, caracterizada pelas Convenções de Paris e de Berna, os países signatários determinavam os campos tecnológicos que seriam protegidos ou não. Na segunda fase, com a implementação do Acordo TRIPS pela OMC, os países são obrigados a garantir proteção patentária a todos os campos tecnológicos, inclusive para a indústria farmacêutica. Dentro das suas respectivas legislações nacionais, os países também têm a oportunidade de implementar o acesso às flexibilidades do TRIPS para medicamentos. Com a terceira fase, caracterizada pela negociação e assinatura de acordos comerciais bilaterais e regionais, os países terão que implementar medidas TRIPS-plus que podem ter implicações negativas para as flexibilidades do TRIPS e para políticas de acesso a medicamentos. Os autores concluem que a proposta atual de sistema internacional de direitos de propriedade intelectual favorece os direitos dos detentores de patentes, que deveriam estar em equilíbrio com os direitos à saúde para a população.This article discusses the evolution of the international intellectual property rights system in three phases and the implications for public health, especially for the implementation of policies for access to medicines. During the first phase, characterized by the Paris and Berne Convention, signatory countries defined which technological fields should be protected (or not. Under the second phase, with the enforcement of the WTO TRIPS Agreement, countries are obliged to grant patent protection for all technological fields, including for the pharmaceutical industry. Within their national legislations, countries also have the opportunity to implement access to TRIPS flexibilities for medicines

  3. Business Continuity Management Plan

    Science.gov (United States)

    2014-12-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA MBA PROFESSIONAL REPORT BUSINESS CONTINUITY MANAGEMENT PLAN December 2014......maximum 200 words) Navy Supply Systems Command (NAVSUP) lacks a business process framework for the development of Business Continuity Management

  4. Colorectal cancer screening | Schneider | Continuing Medical ...

    African Journals Online (AJOL)

    Continuing Medical Education. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 27, No 5 (2009) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register · Download this PDF file. The PDF file you selected should ...

  5. More about ... Immunology | Singh | Continuing Medical Education

    African Journals Online (AJOL)

    Continuing Medical Education. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 30, No 8 (2012) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register · Download this PDF file. The PDF file you selected should ...

  6. A Continuous, Fluorogenic Sirtuin 2 Deacylase Assay

    DEFF Research Database (Denmark)

    Galleano, Iacopo; Schiedel, Matthias; Jung, Manfred

    2016-01-01

    and kinetic insight regarding sirtuin inhibitors, it is important to have access to efficient assays. In this work, we report readily synthesized fluorogenic substrates enabling enzyme-economical evaluation of SIRT2 inhibitors in a continuous assay format as well as evaluation of the properties of SIRT2...

  7. The Continuity Project, Fall 1997 Report.

    Science.gov (United States)

    Wasilko, Peter J.

    The Continuity Project is a research, development, and technology transfer initiative aimed at creating a "Library of the Future" by combining features of an online public access catalog (OPAC) and a campus wide information system (CWIS) with advanced facilities drawn from such areas as artificial intelligence (AI), knowledge…

  8. Screening for diabetic retinopathy | Rice | Continuing Medical ...

    African Journals Online (AJOL)

    Continuing Medical Education. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 31, No 4 (2013) >. Log in or Register to get access to full text downloads. Username, Password, Remember me, or Register · Download this PDF file. The PDF file you selected should ...

  9. Chemists, Access, Statistics

    Science.gov (United States)

    Holmes, Jon L.

    2000-06-01

    IP-number access. Current subscriptions can be upgraded to IP-number access at little additional cost. We are pleased to be able to offer to institutions and libraries this convenient mode of access to subscriber only resources at JCE Online. JCE Online Usage Statistics We are continually amazed by the activity at JCE Online. So far, the year 2000 has shown a marked increase. Given the phenomenal overall growth of the Internet, perhaps our surprise is not warranted. However, during the months of January and February 2000, over 38,000 visitors requested over 275,000 pages. This is a monthly increase of over 33% from the October-December 1999 levels. It is good to know that people are visiting, but we would very much like to know what you would most like to see at JCE Online. Please send your suggestions to JCEOnline@chem.wisc.edu. For those who are interested, JCE Online year-to-date statistics are available. Biographical Snapshots of Famous Chemists: Mission Statement Feature Editor: Barbara Burke Chemistry Department, California State Polytechnic University-Pomona, Pomona, CA 91768 phone: 909/869-3664 fax: 909/869-4616 email: baburke@csupomona.edu The primary goal of this JCE Internet column is to provide information about chemists who have made important contributions to chemistry. For each chemist, there is a short biographical "snapshot" that provides basic information about the person's chemical work, gender, ethnicity, and cultural background. Each snapshot includes links to related websites and to a biobibliographic database. The database provides references for the individual and can be searched through key words listed at the end of each snapshot. All students, not just science majors, need to understand science as it really is: an exciting, challenging, human, and creative way of learning about our natural world. Investigating the life experiences of chemists can provide a means for students to gain a more realistic view of chemistry. In addition students

  10. Smarandache Continued Fractions

    OpenAIRE

    Ibstedt, H.

    2001-01-01

    The theory of general continued fractions is developed to the extent required in order to calculate Smarandache continued fractions to a given number of decimal places. Proof is given for the fact that Smarandache general continued fractions built with positive integer Smarandache sequences baving only a finite number of terms equal to 1 is convergent. A few numerical results are given.

  11. Plants under continuous light

    NARCIS (Netherlands)

    Velez Ramirez, A.I.; Ieperen, van W.; Vreugdenhill, D.; Millenaar, F.F.

    2011-01-01

    Continuous light is an essential tool for understanding the plant circadian clock. Additionally, continuous light might increase greenhouse food production. However, using continuous light in research and practice has its challenges. For instance, most of the circadian clock-oriented experiments

  12. Radiation protection

    International Nuclear Information System (INIS)

    Jain, Aman; Sharma, Shivam; Parasher, Abhishek

    2014-01-01

    Radiation dose measurement, field of radiobiology, is considered to be critical factor for optimizing radiation protection to the health care practitioners, patients and the public. This lead to equipment that has dose - area product meters permanently installed. In many countries and even institution, the range of equipment is vast and with the opportunity for radiation protection and dose recording varies considerably. Practitioners must move with the changed demands of radiation protection but in many cases without assistance of modern advancements in technology Keeping the three basic safety measures Time, Dose and Shielding we can say 'Optimum dose is safe dose' instead of 'No dose is safe dose'. The purpose enclosed within the title 'Radiation Protection'. The use of radiation is expanding widely everyday around the world and crossing boundaries of medical imaging, diagnostic and. The way to get the ''As low as reasonably achievable' is only achievable by using methodology of radiation protection and to bring the concern of general public and practitioners over the hazards of un-necessary radiation dose. Three basic principles of radiation protection are time, distance and shielding. By minimizing the exposure time increasing the distance and including the shielding we can reduce the optimum range of dose. The ability of shielding material to attenuate radiation is generally given as half value layer. This is the thickness of the material which will reduce the amount of radiation by 50%. Lab coat and gloves must be worn when handling radioactive material or when working in a labeled radiation work area. Safety glasses or other appropriate splash shields should be used when handling radioactive material. 1. Reached to low dose level to occupational workers, public as per prescribed dose limit. 2. By mean of ALARA principle we achieved the protection from radiation besides us using the radiation for our benefit

  13. Machine Protection

    International Nuclear Information System (INIS)

    Schmidt, R

    2014-01-01

    The protection of accelerator equipment is as old as accelerator technology and was for many years related to high-power equipment. Examples are the protection of powering equipment from overheating (magnets, power converters, high-current cables), of superconducting magnets from damage after a quench and of klystrons. The protection of equipment from beam accidents is more recent. It is related to the increasing beam power of high-power proton accelerators such as ISIS, SNS, ESS and the PSI cyclotron, to the emission of synchrotron light by electron–positron accelerators and FELs, and to the increase of energy stored in the beam (in particular for hadron colliders such as LHC). Designing a machine protection system requires an excellent understanding of accelerator physics and operation to anticipate possible failures that could lead to damage. Machine protection includes beam and equipment monitoring, a system to safely stop beam operation (e.g. dumping the beam or stopping the beam at low energy) and an interlock system providing the glue between these systems. The most recent accelerator, the LHC, will operate with about 3 × 10 14 protons per beam, corresponding to an energy stored in each beam of 360 MJ. This energy can cause massive damage to accelerator equipment in case of uncontrolled beam loss, and a single accident damaging vital parts of the accelerator could interrupt operation for years. This article provides an overview of the requirements for protection of accelerator equipment and introduces the various protection systems. Examples are mainly from LHC, SNS and ESS

  14. 28 CFR 700.11 - Request for access to records.

    Science.gov (United States)

    2010-07-01

    ... more acceptable forms of identification (such as a driver's license or credit card) bearing his name... OR INFORMATION OF THE OFFICE OF INDEPENDENT COUNSEL Protection of Privacy and Access to Individual...

  15. Need an Information Security in Access Control System?

    Directory of Open Access Journals (Sweden)

    V. R. Petrov

    2011-12-01

    Full Text Available The purpose of this paper is the general problems of information security in access control system. The field of using is the in project of reconstruction Physical protection system.

  16. An Operational Foundation for Delimited Continuations

    DEFF Research Database (Denmark)

    Biernacka, Malgorzata; Biernacki, Dariusz; Danvy, Olivier

    2004-01-01

    We present an abstract machine and a reduction semantics for the lambda-calculus extended with control operators that give access to delimited continuations in the CPS hierarchy. The abstract machine is derived from an evaluator in continuation-passing style (CPS); the reduction semantics (i.......e., a small-step operational semantics with an explicit representation of evaluation contexts) is constructed from the abstract machine; and the control operators are the shift and reset family. We also present new applications of delimited continuations in the CPS hierarchy: finding list prefixes...

  17. Machine Protection

    CERN Document Server

    Schmidt, R

    2014-01-01

    The protection of accelerator equipment is as old as accelerator technology and was for many years related to high-power equipment. Examples are the protection of powering equipment from overheating (magnets, power converters, high-current cables), of superconducting magnets from damage after a quench and of klystrons. The protection of equipment from beam accidents is more recent. It is related to the increasing beam power of high-power proton accelerators such as ISIS, SNS, ESS and the PSI cyclotron, to the emission of synchrotron light by electron–positron accelerators and FELs, and to the increase of energy stored in the beam (in particular for hadron colliders such as LHC). Designing a machine protection system requires an excellent understanding of accelerator physics and operation to anticipate possible failures that could lead to damage. Machine protection includes beam and equipment monitoring, a system to safely stop beam operation (e.g. dumping the beam or stopping the beam at low energy) and an ...

  18. Migrants' access to healthcare

    DEFF Research Database (Denmark)

    Norredam, Marie

    2011-01-01

    There are strong pragmatic and moral reasons for receiving societies to address access to healthcare for migrants. Receiving societies have a pragmatic interest in sustaining migrants' health to facilitate integration; they also have a moral obligation to ensure migrants' access to healthcare...... according to international human rights principles. The intention of this thesis is to increase the understanding of migrants' access to healthcare by exploring two study aims: 1) Are there differences in migrants' access to healthcare compared to that of non-migrants? (substudy I and II); and 2) Why...... are there possible differences in migrants' access to healthcare compared to that of non-migrants? (substudy III and IV). The thesis builds on different methodological approaches using both register-based retrospective cohort design, cross-sectional design and survey methods. Two different measures of access were...

  19. Barriers to accessing urethroplasty.

    Science.gov (United States)

    Consolo, Michael J; Syed, Kirin K; Robison, Christopher; McFadden, Jacob; Shalowitz, David I; Brown, Gordon A; Sussman, David O; Figler, Bradley D

    2016-01-01

    Urethroplasty is an effective treatment for men with anterior urethral strictures, but is utilized less frequently than ineffective treatments such as internal urethrotomy. We sought to identify provider-level barriers to urethroplasty. An anonymous online survey was emailed to all Mid-Atlantic American Urological Association members. Six scenarios in which urethroplasty was the most appropriate treatment were presented. Primary outcome was recommendation for urethroplasty in ≥ three clinical scenarios. Other factors measured include practice zip code, urethroplasty training, and proximity to a urethroplasty surgeon. Multivariate logistic regression identified factors associated with increased likelihood of urethroplasty recommendation. Of 670 members emailed, 109 (16%) completed the survey. Final analysis included 88 respondents. Mean years in practice was 17.2. Most respondents received formal training in urethroplasty: 43 (49%) in residency, 5 (6%) in fellowship, and 10 (11%) in both; 48 respondents (55%) had a urethroplasty surgeon in their practice, whereas 18 (20%) had a urethroplasty surgeon within 45 minutes of his or her primary practice location. The only covariate that was associated with an increased likelihood of recommending urethroplasty in ≥ three scenarios was formal urethroplasty training. Most members (68%) reported no barriers to referring patients for urethroplasty; the most common barriers cited were long distance to urethroplasty surgeon (n 5 13, 15%) and concern about complications (n 5 8, 9%). Urethroplasty continues to be underutilized in men with anterior urethral strictures, potentially due to lack of knowledge dissemination and access to a urethroplasty surgeon. Appropriate urethroplasty utilization may increase with greater exposure to urethroplasty in training.

  20. 29 CFR 1926.150 - Fire protection.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 8 2010-07-01 2010-07-01 false Fire protection. 1926.150 Section 1926.150 Labor... (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Fire Protection and Prevention § 1926.150 Fire protection. (a) General requirements. (1) The employer shall be responsible for the development of a fire...

  1. 29 CFR 1926.760 - Fall protection.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 8 2010-07-01 2010-07-01 false Fall protection. 1926.760 Section 1926.760 Labor... (CONTINUED) SAFETY AND HEALTH REGULATIONS FOR CONSTRUCTION Steel Erection § 1926.760 Fall protection. (a... protection from fall hazards in accordance with paragraph (a)(1) of this section. (c) Controlled Decking Zone...

  2. 49 CFR 236.384 - Cross protection.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Cross protection. 236.384 Section 236.384 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL RAILROAD ADMINISTRATION... and Tests § 236.384 Cross protection. Cross protection shall be tested at least once every six months...

  3. 29 CFR 1915.154 - Respiratory protection.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Respiratory protection. 1915.154 Section 1915.154 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR... (PPE) § 1915.154 Respiratory protection. Respiratory protection for shipyard employment is covered by...

  4. Judgement in achieving protection against radiation

    International Nuclear Information System (INIS)

    Taylor, L.S.

    1980-01-01

    This article includes the following topics: Ionizing radiation as a toxic agent; value judgement in establishing protection standards; origin of radiation protection standards; numerical radiation protection standards; exposure of populations; the proportional dose-effect relationship; assumptions involved in the proportional dose-effect relationship and a continued need for value judgement

  5. 40 CFR 191.15 - Individual protection requirements.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 24 2010-07-01 2010-07-01 false Individual protection requirements. 191.15 Section 191.15 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) RADIATION... Individual protection requirements. (a) Disposal systems for waste and any associated radioactive material...

  6. Access Data Analysis Cookbook

    CERN Document Server

    Bluttman, Ken

    2008-01-01

    This book offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Whether you use Access 2007 or an earlier version, this book will teach you new methods to query data, different ways to move data in and out of Access, how to calculate answers to financial and investment issues, how to jump beyond SQL by manipulating data with VBA, and more.

  7. Strategic Accessibility Competition

    OpenAIRE

    Bacchiega, Emanuele; Randon, Emanuela; Zirulia, Lorenzo

    2010-01-01

    We analyze the effect of competition in market-accessibility enhancement among quality-differentiated firms. Firms are located in regions with different ex-ante transport costs to reach the final market. We characterize the equilibrium of the two-stage game in which firms first invest to improve market accessibility and then compete in prices. Efforts in accessibility improvement crucially depend on the interplay between the willingness to pay for the quality premium of the median consumer an...

  8. Are PDF Documents Accessible?

    Directory of Open Access Journals (Sweden)

    Mireia Ribera Turró

    2008-09-01

    Full Text Available Adobe PDF is one of the most widely used formats in scientific communications and in administrative documents. In its latest versions it has incorporated structural tags and improvements that increase its level of accessibility. This article reviews the concept of accessibility in the reading of digital documents and evaluates the accessibility of PDF according to the most widely established standards.

  9. Open Access Monitor - DK

    DEFF Research Database (Denmark)

    Svendsen, Michael; Hansen, Lars Asger Juel; Andersen, Dorte

    2017-01-01

    Open Access Monitor - DK (OAM-DK) is a 2-year DEFF funded [DEFF.2016-0018] national project running in 2017-2018 with the aim of collecting, documenting and administrating Open Access publishing costs. OAM-DK is lead by Copenhagen University Library under the Royal Danish Library with participation...... of all Danish University Libraries. This poster presents the first results of Open Access costs related to 2015 publications at the The University of Copenhagen....

  10. Radiological protection: A topical and a continual task

    International Nuclear Information System (INIS)

    Urban, M.; Koelzer, W.

    1988-09-01

    This colloquium has been organized by the KfK on the occasion of the retirement of the head of the Safety Department (Hauptabteilung Sicherheit) of Karlsruhe Nuclear Research Center. Individual subject analyses of seven of the papers presented are available in the database. (HP) [de

  11. Machine Protection

    International Nuclear Information System (INIS)

    Zerlauth, Markus; Schmidt, Rüdiger; Wenninger, Jörg

    2012-01-01

    The present architecture of the machine protection system is being recalled and the performance of the associated systems during the 2011 run will be briefly summarized. An analysis of the causes of beam dumps as well as an assessment of the dependability of the machine protection systems (MPS) itself is being presented. Emphasis will be given to events that risked exposing parts of the machine to damage. Further improvements and mitigations of potential holes in the protection systems will be evaluated along with their impact on the 2012 run. The role of rMPP during the various operational phases (commissioning, intensity ramp up, MDs...) will be discussed along with a proposal for the intensity ramp up for the start of beam operation in 2012

  12. Machine Protection

    CERN Document Server

    Zerlauth, Markus; Wenninger, Jörg

    2012-01-01

    The present architecture of the machine protection system is being recalled and the performance of the associated systems during the 2011 run will be briefly summarized. An analysis of the causes of beam dumps as well as an assessment of the dependability of the machine protection systems (MPS) itself is being presented. Emphasis will be given to events that risked exposing parts of the machine to damage. Further improvements and mitigations of potential holes in the protection systems will be evaluated along with their impact on the 2012 run. The role of rMPP during the various operational phases (commissioning, intensity ramp up, MDs...) will be discussed along with a proposal for the intensity ramp up for the start of beam operation in 2012.

  13. Machine Protection

    Energy Technology Data Exchange (ETDEWEB)

    Zerlauth, Markus; Schmidt, Rüdiger; Wenninger, Jörg [European Organization for Nuclear Research, Geneva (Switzerland)

    2012-07-01

    The present architecture of the machine protection system is being recalled and the performance of the associated systems during the 2011 run will be briefly summarized. An analysis of the causes of beam dumps as well as an assessment of the dependability of the machine protection systems (MPS) itself is being presented. Emphasis will be given to events that risked exposing parts of the machine to damage. Further improvements and mitigations of potential holes in the protection systems will be evaluated along with their impact on the 2012 run. The role of rMPP during the various operational phases (commissioning, intensity ramp up, MDs...) will be discussed along with a proposal for the intensity ramp up for the start of beam operation in 2012.

  14. 76 FR 10529 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-02-25

    ... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... electronic system security protection for the aircraft control domain and airline information domain from... identified and assessed, and that effective electronic system security protection strategies are implemented...

  15. Decision Analysis of Dynamic Spectrum Access Rules

    Energy Technology Data Exchange (ETDEWEB)

    Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

    2011-12-01

    A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

  16. Demystifying Open Access

    International Nuclear Information System (INIS)

    Mele, Salvatore

    2007-01-01

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  17. OGIS Access System

    Data.gov (United States)

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  18. Access 2013 bible

    CERN Document Server

    Alexander, Michael

    2013-01-01

    A comprehensive reference to the updated and new features of Access 2013 As the world's most popular database management tool, Access enables you to organize, present, analyze, and share data as well as build powerful database solutions. However, databases can be complex. That's why you need the expert guidance in this comprehensive reference. Access 2013 Bible helps you gain a solid understanding of database purpose, construction, and application so that whether you're new to Access or looking to upgrade to the 2013 version, this well-rounded resource provides you with a th

  19. Web Accessibility and Guidelines

    Science.gov (United States)

    Harper, Simon; Yesilada, Yeliz

    Access to, and movement around, complex online environments, of which the World Wide Web (Web) is the most popular example, has long been considered an important and major issue in the Web design and usability field. The commonly used slang phrase ‘surfing the Web’ implies rapid and free access, pointing to its importance among designers and users alike. It has also been long established that this potentially complex and difficult access is further complicated, and becomes neither rapid nor free, if the user is disabled. There are millions of people who have disabilities that affect their use of the Web. Web accessibility aims to help these people to perceive, understand, navigate, and interact with, as well as contribute to, the Web, and thereby the society in general. This accessibility is, in part, facilitated by the Web Content Accessibility Guidelines (WCAG) currently moving from version one to two. These guidelines are intended to encourage designers to make sure their sites conform to specifications, and in that conformance enable the assistive technologies of disabled users to better interact with the page content. In this way, it was hoped that accessibility could be supported. While this is in part true, guidelines do not solve all problems and the new WCAG version two guidelines are surrounded by controversy and intrigue. This chapter aims to establish the published literature related to Web accessibility and Web accessibility guidelines, and discuss limitations of the current guidelines and future directions.

  20. Workplace Accommodations for Pregnant Employees: Associations With Women's Access to Health Insurance Coverage After Childbirth.

    Science.gov (United States)

    Jou, Judy; Kozhimannil, Katy B; Blewett, Lynn A; McGovern, Patricia M; Abraham, Jean M

    2016-06-01

    This study evaluates the associations between workplace accommodations for pregnancy, including paid and unpaid maternity leave, and changes in women's health insurance coverage postpartum. Secondary analysis using Listening to Mothers III, a national survey of women ages 18 to 45 years who gave birth in U.S. hospitals during 2011 to 2012 (N = 700). Compared with women without access to paid maternity leave, women with access to paid leave were 0.4 times as likely to lose private health insurance coverage, 0.3 times as likely to lose public health coverage, and 0.3 times as likely to become uninsured after giving birth. Workplace accommodations for pregnant employees are associated with health insurance coverage via work continuity postpartum. Expanding protections for employees during pregnancy and after childbirth may help reduce employee turnover, loss of health insurance coverage, and discontinuity of care.

  1. Access for All! Neuro-architecture and Equal Enjoyment of Public Facilities

    Directory of Open Access Journals (Sweden)

    Victoria Gillen

    2015-09-01

    Full Text Available Since the enactment of the Americans with Disabilities Act (ADA, 1990, many impaired Americans are no longer disabled by socially condoned conditions in the built environment. However, many people with cognitive and neurological impairments continue to face significant barriers to access, due to disabling environmental hyper-sensitivity and sensory processing disorders. These people are equally protected under the ADA, therefore mitigation is required. Neuroarchitecture, where consideration of the impact of the built environment on the central nervous system informs design paradigms, must complement current ADA compliance guidelines. This paper serves to open the topic to discussion, and is a call for attention, and action, for the removal of these generally unrecognized barriers to access and the equal use and enjoyment of public facilities.

  2. Physical protection

    International Nuclear Information System (INIS)

    Myre, W.C.; DeMontmollin, J.M.

    1989-01-01

    Serious concern about physical protection of nuclear facilities began around 1972. R and D was initiated at Sandia National Laboratories which had developed techniques to protect weapons for many years. Special vehicles, convoy procedures, and a communications system previously developed for weapons shipments were improved and extended for shipments of other sensitive materials. Barriers, perimeter alarms, portal and internal control systems were developed, tested, and published in handbooks and presented at symposia. Training programs were initiated for U.S. and foreign personnel. Containment and surveillance techniques were developed for the IAEA. Presently emphasis is on computer security, active barriers, and techniques to prevent theft or sabotage by ''insiders''

  3. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  4. 77 FR 42339 - Improving Contracting Officers' Access to Relevant Integrity Information

    Science.gov (United States)

    2012-07-18

    ... contracting officers' access to relevant information about contractor business ethics in the Federal Awardee... ability to evaluate the business ethics of prospective contractors and protect the Government from...

  5. Access to scientific publications: the scientist's perspective.

    Directory of Open Access Journals (Sweden)

    Yegor Voronin

    Full Text Available BACKGROUND: Scientific publishing is undergoing significant changes due to the growth of online publications, increases in the number of open access journals, and policies of funders and universities requiring authors to ensure that their publications become publicly accessible. Most studies of the impact of these changes have focused on the growth of articles available through open access or the number of open-access journals. Here, we investigated access to publications at a number of institutes and universities around the world, focusing on publications in HIV vaccine research--an area of biomedical research with special importance to the developing world. METHODS AND FINDINGS: We selected research papers in HIV vaccine research field, creating: 1 a first set of 50 most recently published papers with keywords "HIV vaccine" and 2 a second set of 200 articles randomly selected from those cited in the first set. Access to the majority (80% of the recently published articles required subscription, while cited literature was much more accessible (67% freely available online. Subscriptions at a number of institutions around the world were assessed for providing access to subscription-only articles from the two sets. The access levels varied widely, ranging among institutions from 20% to 90%. Through the WHO-supported HINARI program, institutes in low-income countries had access comparable to that of institutes in the North. Finally, we examined the response rates for reprint requests sent to corresponding authors, a method commonly used before internet access became widespread. Contacting corresponding authors with requests for electronic copies of articles by email resulted in a 55-60% success rate, although in some cases it took up to 1.5 months to get a response. CONCLUSIONS: While research articles are increasingly available on the internet in open access format, institutional subscriptions continue to play an important role. However

  6. Absolutism on Access and Confidentiality: Principled or Irresponsible?

    Science.gov (United States)

    Sheerin, William E.

    1991-01-01

    Discusses issues involved in public access to library materials and facilities and patron confidentiality. Topics discussed include children's access to adult materials; parents' right to know about their children's materials; First and Fourth Amendment protections; the Library Bill of Rights; and American Library Association (ALA) documents that…

  7. 42 CFR 51.42 - Access to facilities and residents.

    Science.gov (United States)

    2010-10-01

    ... REQUIREMENTS APPLICABLE TO THE PROTECTION AND ADVOCACY FOR INDIVIDUALS WITH MENTAL ILLNESS PROGRAM Access to... such monitoring have access to the minor or adult with a legal guardian. The system shall take no... request, by the P&A system when: (1) An incident is reported or a complaint is made to the P&A system; (2...

  8. 76 FR 56499 - Financial Access Activities; Comment Request.

    Science.gov (United States)

    2011-09-13

    ... development of sustainable financial services and products related to accounts? Are there opportunities for... Wall Street Reform and Consumer Protection Act (the Act), to expand access to mainstream financial... develop and provide account products and services that are appropriate and accessible for low- and...

  9. Negotiating Protection

    DEFF Research Database (Denmark)

    Bille, Mikkel

    efficacy. Some informants, for example, adopt an orthodox scriptural Islamic approach to protection and denounce certain material registers as un-Islamic and materialistic leftovers from an ignorant past, and rather prescribe Qur'anic remembrance. For other informants the very physicality of such contested...

  10. Protection Myopia

    DEFF Research Database (Denmark)

    Laursen, Keld; Salter, Ammon; Li, Cher

    from having an orientation towards legal appropriability, we conjecture that protection myopia may lead some firms to allocate too much attention to legal appropriability, in particular when the behavioral and structural contingencies are unfavorable. Examining a panel of three successive waves...

  11. 75 FR 56096 - Access to Confidential Business Information by Industrial Economics Incorporated

    Science.gov (United States)

    2010-09-15

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8845-1] Access to Confidential Business Information by Industrial Economics Incorporated AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. SUMMARY: EPA has authorized contractor, Industrial Economics Incorporated (IEI) of...

  12. 75 FR 8330 - Access to Confidential Business Information by Eastern Research Group

    Science.gov (United States)

    2010-02-24

    ... ENVIRONMENTAL PROTECTION AGENCY [EPA-HQ-OPPT-2003-0004; FRL-8812-4] Access to Confidential Business Information by Eastern Research Group AGENCY: Environmental Protection Agency (EPA). ACTION: Notice. [[Page 8331

  13. Cutting Out Continuations

    DEFF Research Database (Denmark)

    Bahr, Patrick; Hutton, Graham

    2016-01-01

    In the field of program transformation, one often transforms programs into continuation-passing style to make their flow of control explicit, and then immediately removes the resulting continuations using defunctionalisation to make the programs first-order. In this article, we show how these two...... transformations can be fused together into a single transformation step that cuts out the need to first introduce and then eliminate continuations. Our approach is calculational, uses standard equational reasoning techniques, and is widely applicable....

  14. Support the Open Access Movement

    CERN Multimedia

    2005-01-01

    CERN's Executive Board recently endorsed a new policy of open access to the laboratory's results: Continuing CERN action on Open Access (OA) [http://cds.cern.ch/record/828991/files/open-2005-006.pdf]. What does this policy mean for you? CERN authors have two responsibilities: Submit your document to the CERN Document Server; Consider submitting future articles to an Open Access journal. Since 2001, Operational Circular No. 6 has required every CERN author (Staff member, Fellow, or any Associated member of personnel who is allowed to use CERN as his affiliation) to submit a copy of their scientific documents to the CERN Document Server (CDS). For some groups all approved documents are submitted by the secretary (see the Departments' policies at: http://library.cern.ch/cern_publications/cern_publication_policy.html). Each author should personally also ensure the submission of any other articles which are not added in this way, such as conference contributions and review articles. It is not sufficient to re...

  15. Accessibility of public services

    NARCIS (Netherlands)

    Poort, J.P.; Groot, I.; Kok, L.; de Graaf, D.; Hof, B.J.F.

    2005-01-01

    The accessibility of certain products and services to all people, irrespective of their income, age, health and geographical location is considered to be of great social importance. Think for instance of health care, education, electricity, and sanitation. Accessibility can be secured in a variety

  16. Market Access and Welfare

    DEFF Research Database (Denmark)

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    2015-01-01

    Well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. The present paper proposes a new set of tariff reforms that can achieve both...

  17. Standards and Access.

    Science.gov (United States)

    Fox, Tom

    1993-01-01

    Argues that easy claims about the relationship between language mastery and academic or economic access (made by both conservative commentators on education and mainstream writing teachers) are false and obscure real social and political boundaries, such as racism, sexism, elitism, and homophobia, that really do prevent access. (SR)

  18. Radiation protection in a university TRIGA reactor

    International Nuclear Information System (INIS)

    Tschurlovits, M. . Author

    2004-01-01

    Radiation protection in a university institute operating a research reactor and other installations has different constraints as a larger facility. This is because the legal requirements apply in full, but the potential of exposure is low, and accesses has to be made available for students, but also for temporary workers. Some of the problems in practical radiation protection are addressed and solutions are discussed. In addition, experience with national radiation protection legislation recently to be issued is addressed and discussed. (author)

  19. A remark on accessibility

    International Nuclear Information System (INIS)

    Wu, Xinxing; Wang, Jianjun

    2016-01-01

    Highlights: • Obtain some characteristics of accessibility and Kato’s chaos. • Answer negatively a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. • A dynamical system is indecomposable if and only if it is weakly transitive. - Abstract: This note obtains some characteristics of accessibility and Kato’s chaos. Applying these results, an accessible dynamical system whose product system is not accessible is constructed, giving a negative answer to a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. Besides, it is proved that every transitive interval self-map is accessible.

  20. Topological Photonics for Continuous Media

    Science.gov (United States)

    Silveirinha, Mario

    Photonic crystals have revolutionized light-based technologies during the last three decades. Notably, it was recently discovered that the light propagation in photonic crystals may depend on some topological characteristics determined by the manner how the light states are mutually entangled. The usual topological classification of photonic crystals explores the fact that these structures are periodic. The periodicity is essential to ensure that the underlying wave vector space is a closed surface with no boundary. In this talk, we prove that it is possible calculate Chern invariants for a wide class of continuous bianisotropic electromagnetic media with no intrinsic periodicity. The nontrivial topology of the relevant continuous materials is linked with the emergence of edge states. Moreover, we will demonstrate that continuous photonic media with the time-reversal symmetry can be topologically characterized by a Z2 integer. This novel classification extends for the first time the theory of electronic topological insulators to a wide range of photonic platforms, and is expected to have an impact in the design of novel photonic systems that enable a topologically protected transport of optical energy. This work is supported in part by Fundacao para a Ciencia e a Tecnologia Grant Number PTDC/EEI-TEL/4543/2014.

  1. Ethical decisions in endof- life care | Norval | Continuing Medical ...

    African Journals Online (AJOL)

    Continuing Medical Education. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 21, No 5 (2003) >. Log in or Register to get access to full text downloads.

  2. Paediatric triage in South Africa: Where are we? | Buys | Continuing ...

    African Journals Online (AJOL)

    Continuing Medical Education. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 31, No 1 (2013) >. Log in or Register to get access to full text downloads.

  3. Continuous-variable quantum erasure correcting code

    DEFF Research Database (Denmark)

    Lassen, Mikael Østergaard; Sabuncu, Metin; Huck, Alexander

    2010-01-01

    We experimentally demonstrate a continuous variable quantum erasure-correcting code, which protects coherent states of light against complete erasure. The scheme encodes two coherent states into a bi-party entangled state, and the resulting 4-mode code is conveyed through 4 independent channels...

  4. Marginalized Student Access to Technology Education

    Science.gov (United States)

    Kurtcu, Wanda M.

    2017-01-01

    The purpose of this paper is to investigate how a teacher can disrupt an established curriculum that continues the cycle of inequity of access to science, technology, engineering, and math (STEM) curriculum by students in alternative education. For this paper, I will focus on the technology components of the STEM curriculum. Technology in the…

  5. Accessing adolescent sexual and reproductive health services ...

    African Journals Online (AJOL)

    Adolescent sexual and reproductive health access continues to dominate the development agenda since the historic 1994 Cairo Conference and becomes a huge public health concern for the increasing diverse of undocumented adolescents who have become an important component as irregular migration patterns and ...

  6. 40 CFR 130.5 - Continuing planning process.

    Science.gov (United States)

    2010-07-01

    ... QUALITY PLANNING AND MANAGEMENT § 130.5 Continuing planning process. (a) General. Each State shall establish and maintain a continuing planning process (CPP) as described under section 303(e)(3)(A)-(H) of... 40 Protection of Environment 21 2010-07-01 2010-07-01 false Continuing planning process. 130.5...

  7. 19 CFR 191.153 - Continuous Customs custody.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Continuous Customs custody. 191.153 Section 191.153 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) DRAWBACK Merchandise Exported From Continuous Customs Custody § 191.153...

  8. Alkali metal protective garment and composite material

    Science.gov (United States)

    Ballif, III, John L.; Yuan, Wei W.

    1980-01-01

    A protective garment and composite material providing satisfactory heat resistance and physical protection for articles and personnel exposed to hot molten alkali metals, such as sodium. Physical protection is provided by a continuous layer of nickel foil. Heat resistance is provided by an underlying backing layer of thermal insulation. Overlying outer layers of fireproof woven ceramic fibers are used to protect the foil during storage and handling.

  9. Mars Technology Program Planetary Protection Technology Development

    Science.gov (United States)

    Lin, Ying

    2006-01-01

    The objectives of the NASA Planetary Protection program are to preserve biological and organic conditions of solar-system bodies for future scientific exploration and to protect the Earth from potential hazardous extraterrestrial contamination. As the exploration of solar system continues, NASA remains committed to the implementation of planetary protection policy and regulations. To fulfill this commitment, the Mars Technology Program (MTP) has invested in a portfolio of tasks for developing necessary technologies to meet planetary protection requirements for the next decade missions.

  10. Healing Arts Radiation Protection Act

    International Nuclear Information System (INIS)

    1984-07-01

    The Healing Arts Radiation Protection Act is concerned with regulating the registration, installation, operation, inspection and safety of X-ray machines. The Act provides for the establishment of the Healing Arts Radiation Protection Commission which is responsible for reporting on all the above matters to the Ontario Minister of Health. In addition the board is responsible for the continuing development of an X-ray safety code and for the submission of an annual report of their activities to the minister

  11. Enhancing Ocean Research Data Access

    Science.gov (United States)

    Chandler, Cynthia; Groman, Robert; Shepherd, Adam; Allison, Molly; Arko, Robert; Chen, Yu; Fox, Peter; Glover, David; Hitzler, Pascal; Leadbetter, Adam; Narock, Thomas; West, Patrick; Wiebe, Peter

    2014-05-01

    The Biological and Chemical Oceanography Data Management Office (BCO-DMO) works in partnership with ocean science investigators to publish data from research projects funded by the Biological and Chemical Oceanography Sections and the Office of Polar Programs Antarctic Organisms & Ecosystems Program at the U.S. National Science Foundation. Since 2006, researchers have been contributing data to the BCO-DMO data system, and it has developed into a rich repository of data from ocean, coastal and Great Lakes research programs. While the ultimate goal of the BCO-DMO is to ensure preservation of NSF funded project data and to provide open access to those data, achievement of those goals is attained through a series of related phases that benefits from active collaboration and cooperation with a large community of research scientists as well as curators of data and information at complementary data repositories. The BCO-DMO is just one of many intermediate data management centers created to facilitate long-term preservation of data and improve access to ocean research data. Through partnerships with other data management professionals and active involvement in local and global initiatives, BCO-DMO staff members are working to enhance access to ocean research data available from the online BCO-DMO data system. Continuing efforts in use of controlled vocabulary terms, development of ontology design patterns and publication of content as Linked Open Data are contributing to improved discovery and availability of BCO-DMO curated data and increased interoperability of related content available from distributed repositories. We will demonstrate how Semantic Web technologies (e.g. RDF/XML, SKOS, OWL and SPARQL) have been integrated into BCO-DMO data access and delivery systems to better serve the ocean research community and to contribute to an expanding global knowledge network.

  12. Generalized analytic continuation

    CERN Document Server

    Ross, William T

    2002-01-01

    The theory of generalized analytic continuation studies continuations of meromorphic functions in situations where traditional theory says there is a natural boundary. This broader theory touches on a remarkable array of topics in classical analysis, as described in the book. This book addresses the following questions: (1) When can we say, in some reasonable way, that component functions of a meromorphic function on a disconnected domain, are "continuations" of each other? (2) What role do such "continuations" play in certain aspects of approximation theory and operator theory? The authors use the strong analogy with the summability of divergent series to motivate the subject. In this vein, for instance, theorems can be described as being "Abelian" or "Tauberian". The introductory overview carefully explains the history and context of the theory. The authors begin with a review of the works of Poincaré, Borel, Wolff, Walsh, and Gončar, on continuation properties of "Borel series" and other meromorphic func...

  13. How You Can Protect Public Access Computers "and" Their Users

    Science.gov (United States)

    Huang, Phil

    2007-01-01

    By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…

  14. Protecting access to water from urban sprawl, climate change in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-05-13

    May 13, 2011 ... Water is scarce for residents on the edge of South Asia's expanding cities. ... and a changing climate affect water security in peri-urban South Asia and find fair and sustainable ... Villages in Nepal prepare for weather extremes.

  15. Protecting Biodiversity: National Laws Regulating Access to Genetic ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This book is the first to compare such laws and policies across a range of countries in ... and developing worlds, including Argentina, Canada, Colombia, Costa Rica, ... conservation, the environment, intellectual property, and related issues; ...

  16. Physical protection of nuclear installations

    International Nuclear Information System (INIS)

    Toepfer, K.

    1989-01-01

    This contribution investigates the possible danger and the legal basis of physical protection and explains the current, integrated system provided for, as well as the underlying possible scenarios of an assault: (1) by a violent crowd of aggressors outside the installation, (2) by a small group of aggressors outside the installation, (3) by a person allowed to enter (internal assault). The physical protection system supplements the internal safety measures to enhance protection against hypothetical and possible acts of terrorism or other criminal assault. The system covers external and internal controlled areas, access monitoring, physical protection control room and service, security checks of the personnel, and activities to disclose sabotage. Some reflections on the problem field between security controls and the constitutional state conclude this contribution. (orig./HSCH) [de

  17. Protective articles

    International Nuclear Information System (INIS)

    Wardley, R.B.

    1983-01-01

    This patent specification describes an article affording protection against radiation, and especially against X-rays comprising at least one flexible layer of lead filled material in an envelope of, or sandwiched between two layers of a knitted, woven or non-woven fabric preferably of synthetic fibrous material, carrying on its outer surface a coating of flexible polyurethane. The outer fabric provides a resilient, extremely tough and cut resistant covering for the relatively soft lead filled material. (author)

  18. Eye Protection

    OpenAIRE

    Pashby, Tom

    1986-01-01

    Eye injuries frequently occur in the home, at work and at play. Many result in legally blind eyes, and most are preventable. Awareness of potential hazards is essential to preventing eye injuries, particularly in children. In addition, protective devices must be used appropriately. We have developed eye protectors that have proved effective in reducing both the overall incidence and the severity of sports eye injuries.

  19. Pediatric vascular access

    International Nuclear Information System (INIS)

    Donaldson, James S.

    2006-01-01

    Pediatric interventional radiologists are ideally suited to provide vascular access services to children because of inherent safety advantages and higher success from using image-guided techniques. The performance of vascular access procedures has become routine at many adult interventional radiology practices, but this service is not as widely developed at pediatric institutions. Although interventional radiologists at some children's hospitals offer full-service vascular access, there is little or none at others. Developing and maintaining a pediatric vascular access service is a challenge. Interventionalists skilled in performing such procedures are limited at pediatric institutions, and institutional support from clerical staff, nursing staff, and technologists might not be sufficiently available to fulfill the needs of such a service. There must also be a strong commitment by all members of the team to support such a demanding service. There is a slippery slope of expected services that becomes steeper and steeper as the vascular access service grows. This review is intended primarily as general education for pediatric radiologists learning vascular access techniques. Additionally, the pediatric or adult interventional radiologist seeking to expand services might find helpful tips. The article also provides education for the diagnostic radiologist who routinely interprets radiographs containing vascular access devices. (orig.)

  20. Radiation Protection. Chapter 3

    Energy Technology Data Exchange (ETDEWEB)

    Carlsson, S. T. [Department of Diagnostic Radiology, Uddevalla Hospital, Uddevalla (Sweden); Le Heron, J. C. [Division of Radiation, Transport and Waste Safety, International Atomic Energy Agency, Vienna (Austria)

    2014-12-15

    Medical exposure is the largest human-made source of radiation exposure, accounting for more than 95% of radiation exposure. Furthermore, the use of radiation in medicine continues to increase worldwide — more machines are accessible to more people, the continual development of new technologies and new techniques adds to the range of procedures available in the practice of medicine, and the role of imaging is becoming increasingly important in day to day clinical practice. The introduction of hybrid imaging technologies, such as positron emission tomography/computed tomography (PET/CT) and single photon emission computed tomography (SPECT)/CT, means that the boundaries between traditional nuclear medicine procedures and X ray technologies are becoming blurred. Worldwide, the total number of nuclear medicine examinations is estimated to be about 35 million per year.

  1. Access 2010 for dummies

    CERN Document Server

    Ulrich Fuller, Laurie

    2010-01-01

    A friendly, step-by-step guide to the Microsoft Office database application Access may be the least understood and most challenging application in the Microsoft Office suite. This guide is designed to help anyone who lacks experience in creating and managing a database learn to use Access 2010 quickly and easily. In the classic For Dummies tradition, the book provides an education in Access, the interface, and the architecture of a database. It explains the process of building a database, linking information, sharing data, generating reports, and much more.As the Micr

  2. Archives: Continuing Medical Education

    African Journals Online (AJOL)

    Items 1 - 50 of 88 ... AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL · AJOL's Partners · Terms and Conditions of Use · Contact AJOL · News. OTHER RESOURCES... for Researchers · for Journals · for Authors · for Policy Makers · about Open Access ...

  3. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  4. CameraCast: flexible access to remote video sensors

    Science.gov (United States)

    Kong, Jiantao; Ganev, Ivan; Schwan, Karsten; Widener, Patrick

    2007-01-01

    New applications like remote surveillance and online environmental or traffic monitoring are making it increasingly important to provide flexible and protected access to remote video sensor devices. Current systems use application-level codes like web-based solutions to provide such access. This requires adherence to user-level APIs provided by such services, access to remote video information through given application-specific service and server topologies, and that the data being captured and distributed is manipulated by third party service codes. CameraCast is a simple, easily used system-level solution to remote video access. It provides a logical device API so that an application can identically operate on local vs. remote video sensor devices, using its own service and server topologies. In addition, the application can take advantage of API enhancements to protect remote video information, using a capability-based model for differential data protection that offers fine grain control over the information made available to specific codes or machines, thereby limiting their ability to violate privacy or security constraints. Experimental evaluations of CameraCast show that the performance of accessing remote video information approximates that of accesses to local devices, given sufficient networking resources. High performance is also attained when protection restrictions are enforced, due to an efficient kernel-level realization of differential data protection.

  5. Radiation protection in nuclear medicine

    International Nuclear Information System (INIS)

    Seeburrun, V.

    2013-04-01

    Radiation protection in nuclear medicine in this project is concerned with the reduction of doses to workers, patients and members of the public. Protection of workers is achieved by adopting good personal habits, good housekeeping, proper use of personal protective devices and equipment, attend training and have continuous education. Exposure to radiation of workers and the members of the public are minimised by proper management of radioactive waste and safe transport of radioactive material. The design and shielding of a nuclear medicine department shall further provide for the protection of the worker, the patient and the general public. Protection of patient is achieved by justifying the procedure, delivering the minimum radiation dose possible to the patient while obtaining the best image quality and applying guidance levels. Special considerations shall be given to pregnant and breast-feeding patients. Quality assurance programme through image quality, radiopharmaceutical quality and patient records on nuclear medicine procedures shall provide assurance to the patient. (au)

  6. Roundabouts and access management.

    Science.gov (United States)

    2014-03-01

    Transportation engineers and planners are becoming more interested in using roundabouts to address access : management and safety concerns in the transportation system. While roundabouts are being used increasingly in a : variety of contexts, existin...

  7. Market Access and Welfare

    DEFF Research Database (Denmark)

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    According to the literature, well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. Such conflict between welfare and market access...... objectives of trade policy is problematic and calls for finding alternative tariff reform rules that can achieve both objectives at the same time. The present paper contributes to this aim by using a new set of tariff reforms that are based on local optimality. Using such reforms it is shown that market...... access and consumer welfare will always be weakly compatible, in the sense that reforms based on each objective have the same signed effect on the other objective. For strong compatibility, whereby both objectives increase as a result of a locally optimal tariff reform, we derive both a necessary...

  8. KAUST Open Access policy

    KAUST Repository

    Baessa, Mohamed A.

    2017-01-01

    The library plays a critical role in facilitating open access for their researchers, from managing a repository to providing support and information on the OA publication process to their authors. Janis Tyhurst and Dr Imad

  9. Access to the city

    DEFF Research Database (Denmark)

    Andreasen, Manja Hoppe; Møller-Jensen, Lasse

    2017-01-01

    This paper is concerned with access to the city for urban residents living in the periphery of Dar es Salaam, Tanzania. The paper presents an analysis of the mobility practices of residents and investigates the mobility constraints they experience in relation to the limited accessibility provided...... mobility and access to the city for residents in the periphery. Regular mobility is an ingrained part of residents' livelihood strategies. The majority of households rely on one or more members regularly travelling to central parts of the city in relation to their livelihood activities. The analysis...... by road and traffic conditions and highlights how accessibility problems of peripheral settlements are not easily understood separately from the general dysfunctions of the overall mobility system of city....

  10. Critical Access Hospitals (CAH)

    Science.gov (United States)

    ... for Success Am I Rural? Evidence-based Toolkits Economic Impact Analysis Tool Community Health Gateway Sustainability Planning ... hospitals and improve access to healthcare by keeping essential services in rural communities. To accomplish this goal, ...

  11. Access/AML -

    Data.gov (United States)

    Department of Transportation — The AccessAML is a web-based internet single application designed to reduce the vulnerability associated with several accounts assinged to a single users. This is a...

  12. Access road reclamation

    International Nuclear Information System (INIS)

    Manson, T.; Blok, M.

    1997-01-01

    A general review of the measures involved in restoring abandoned access road sites in British Columbia was presented. Permits and licences are needed for the use of crown land for roads used by the petroleum and natural gas industry for exploration activities. However, the regulatory framework for road site reclamation is not well developed. The nature of access road reclamation is very site-specific. Some of the issues that are considered for all reclamation projects include slope stability, water control, revegetation, soil rehabilitation, access management and monitoring. The primary objective of reclaiming access road sites is to return the site to conditions that are equal or better than pre-disturbance conditions. Restoration measures must be approved by BC Environment and by the Department of Fisheries and Oceans where federal fisheries responsibilities are involved. 54 refs., 5 tabs., 3 figs

  13. Time dependent accessibility

    OpenAIRE

    Kaza, Nikhil

    2015-01-01

    Many place based accessibility studies ignore the time component. Relying on theoretical frameworks that treat distance between two fixed points as constant, these methods ignore the diurnal and seasonal changes in accessibility. Network distances between two nodes are dependent on the network structure and weight distribution on the edges. These weights can change quite frequently and the network structure itself is subject to modification because of availability and unavailability of links ...

  14. The universal access handbook

    CERN Document Server

    Stephanidis, Constantine

    2009-01-01

    In recent years, the field of Universal Access has made significant progress in consolidating theoretical approaches, scientific methods and technologies, as well as in exploring new application domains. Increasingly, professionals in this rapidly maturing area require a comprehensive and multidisciplinary resource that addresses current principles, methods, and tools. Written by leading international authorities from academic, research, and industrial organizations and nonmarket institutions, The Universal Access Handbook covers the unfolding scientific, methodological, technological, and pol

  15. Accessible Geoscience - Digital Fieldwork

    Science.gov (United States)

    Meara, Rhian

    2017-04-01

    Accessible Geoscience is a developing field of pedagogic research aimed at widening participation in Geography, Earth and Environmental Science (GEES) subjects. These subjects are often less commonly associated with disabilities, ethnic minorities, low income socio-economic groups and females. While advancements and improvements have been made in the inclusivity of these subject areas in recent years, access and participation of disabled students remains low. While universities are legally obligated to provide reasonable adjustments to ensure accessibility, the assumed incompatibility of GEES subjects and disability often deters students from applying to study these courses at a university level. Instead of making reasonable adjustments if and when they are needed, universities should be aiming to develop teaching materials, spaces and opportunities which are accessible to all, which in turn will allow all groups to participate in the GEES subjects. With this in mind, the Swansea Geography Department wish to enhance the accessibility of our undergraduate degree by developing digital field work opportunities. In the first instance, we intend to digitise three afternoon excursions which are run as part of a 1st year undergraduate module. Each of the field trips will be digitized into English- and Welsh-medium formats. In addition, each field trip will be digitized into British Sign Language (BSL) to allow for accessibility for D/deaf and hard of hearing students. Subtitles will also be made available in each version. While the main focus of this work is to provide accessible fieldwork opportunities for students with disabilities, this work also has additional benefits. Students within the Geography Department will be able to revisit the field trips, to revise and complete associated coursework. The use of digitized field work should not replace opportunities for real field work, but its use by the full cohort of students will begin to "normalize" accessible field

  16. CERN access cards

    CERN Multimedia

    HR Department

    2007-01-01

    Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.

  17. Sandia Laboratories plutonium protection system

    International Nuclear Information System (INIS)

    Bernard, E.A.; Miyoshi, D.S.; Gutierrez, F.D.

    1977-01-01

    Sandia Laboratories is developing an improved plutonium protection system (PPS) to demonstrate new concepts for enhancing special nuclear materials safeguards. PPS concepts include separation of functions, real-time item accountability and improved means for control of materials, activities and personnel access. Physical barriers and a secure communications network are designed into the system to offer greater protection against sabotage, diversion and theft attempts. Prototype systems are being constructed at Hanford, Washington and Albuquerque, New Mexico and will be subjected to a comprehensive testing and evaluation program

  18. Concepts of radiation protection

    International Nuclear Information System (INIS)

    2013-01-01

    This seventh chapter presents the concepts and principles of safety and radiation protection, emergency situations; NORM and TENORM; radiation protection care; radiation protection plan; activities of the radiation protection service; practical rules of radiation protection and the radiation symbol

  19. Employing human rights frameworks to realize access to an HIV cure.

    Science.gov (United States)

    Meier, Benjamin Mason; Gelpi, Adriane; Kavanagh, Matthew M; Forman, Lisa; Amon, Joseph J

    2015-01-01

    The scale of the HIV pandemic - and the stigma, discrimination and violence that surrounded its sudden emergence - catalyzed a public health response that expanded human rights in principle and practice. In the absence of effective treatment, human rights activists initially sought to protect individuals at high risk of HIV infection. With advances in antiretroviral therapy, activists expanded their efforts under international law, advocating under the human right to health for individual access to treatment. As a clinical cure comes within reach, human rights obligations will continue to play a key role in political and programmatic decision-making. Building upon the evolving development and implementation of the human right to health in the global response to HIV, we outline a human rights research agenda to prepare for HIV cure access, investigating the role of human rights law in framing 1) resource allocation, 2) international obligations, 3) intellectual property and 4) freedom from coercion. The right to health is widely recognized as central to governmental, intergovernmental and non-governmental responses to the pandemic and critical both to addressing vulnerability to infection and to ensuring universal access to HIV prevention, treatment, care and support. While the advent of an HIV cure will raise new obligations for policymakers in implementing the right to health, the resolution of past debates surrounding HIV prevention and treatment may inform claims for universal access.

  20. Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network

    Directory of Open Access Journals (Sweden)

    Wang Feng

    2017-01-01

    Full Text Available With the continuous development of wireless networks, the amount of privacy services in heterogeneous mobile networks is increasing, such as information storage, user access, and so on. Access control security issues for heterogeneous mobile radio network, this paper proposes a dynamic migration access control technology based on heterogeneous network. Through the system architecture of the mutual trust system, we can understand the real-time mobile node failure or abnormal state. To make the service can be terminated for the node. And adopt the 802.1X authentication way to improve the security of the system. Finally, it by combining the actual running test data, the trust update algorithm of the system is optimized to reduce the actual security threats in the environment. Experiments show that the system’s anti-attack, the success rate of access, bit error rate is in line with the expected results. This system can effectively reduce the system authentication information is illegally obtained after the network security protection mechanism failure and reduce the risk of user data leakage.

  1. Trieste will continue

    International Nuclear Information System (INIS)

    1968-01-01

    Trieste will continue to be the home of the International Centre for Theoretical Physics for the foreseeable future. An agreement signed in Vienna during December between the Italian Government and the Agency brought this assurance. (author)

  2. Nocturnal continuous glucose monitoring

    DEFF Research Database (Denmark)

    Bay, Christiane; Kristensen, Peter Lommer; Pedersen-Bjergaard, Ulrik

    2013-01-01

    Abstract Background: A reliable method to detect biochemical nocturnal hypoglycemia is highly needed, especially in patients with recurrent severe hypoglycemia. We evaluated reliability of nocturnal continuous glucose monitoring (CGM) in patients with type 1 diabetes at high risk of severe...

  3. Continual improvement plan

    Science.gov (United States)

    1994-01-01

    NASA's approach to continual improvement (CI) is a systems-oriented, agency-wide approach that builds on the past accomplishments of NASA Headquarters and its field installations and helps achieve NASA's vision, mission, and values. The NASA of the future will fully use the principles of continual improvement in every aspect of its operations. This NASA CI plan defines a systematic approach and a model for continual improvement throughout NASA, stressing systems integration and optimization. It demonstrates NASA's constancy of purpose for improvement - a consistent vision of NASA as a worldwide leader in top-quality science, technology, and management practices. The CI plan provides the rationale, structures, methods, and steps, and it defines NASA's short term (1-year) objectives for improvement. The CI plan presents the deployment strategies necessary for cascading the goals and objectives throughout the agency. It also provides guidance on implementing continual improvement with participation from top leadership and all levels of employees.

  4. Vascular Access in Children

    International Nuclear Information System (INIS)

    Krishnamurthy, Ganesh; Keller, Marc S.

    2011-01-01

    Establishment of stable vascular access is one of the essential and most challenging procedures in a pediatric hospital. Many clinical specialties provide vascular service in a pediatric hospital. At the top of the “expert procedural pyramid” is the pediatric interventional radiologist, who is best suited and trained to deliver this service. Growing awareness regarding the safety and high success rate of vascular access using image guidance has led to increased demand from clinicians to provide around-the-clock vascular access service by pediatric interventional radiologists. Hence, the success of a vascular access program, with the pediatric interventional radiologist as the key provider, is challenging, and a coordinated multidisciplinary team effort is essential for success. However, there are few dedicated pediatric interventional radiologists across the globe, and also only a couple of training programs exist for pediatric interventions. This article gives an overview of the technical aspects of pediatric vascular access and provides useful tips for obtaining vascular access in children safely and successfully using image guidance.

  5. Risk and Protective Factors for Suicide in Patients with Alcoholism

    Directory of Open Access Journals (Sweden)

    Leo Sher

    2006-01-01

    Full Text Available Alcoholism is associated with a high risk for suicidal behavior. Up to 40% of persons with alcoholism attempt suicide at some time and 7% end their lives by committing suicide. Risk factors include being male, older than 50 years of age, living alone, being unemployed, poor social support, interpersonal losses, continued drinking, consumption of a greater amount of alcohol when drinking, a recent alcohol binge, previous alcohol treatment, a family history of alcoholism, a history of comorbid substance abuse (especially cocaine, a major depressive episode, serious medical illness, suicidal communication, and prior suicidal behavior. Suicidal behavior is especially frequent in patients with comorbid alcoholism and major depression. However, all patients with alcoholism should be evaluated for suicide risk. Understanding of risk and vulnerability to suicidal behavior in alcoholism still outweighs our knowledge of protective factors and resilience. Knowledge of protective factors for suicide may help to prevent and/or predict suicidal behavior. Protective factors for suicide in alcoholism are quite varied and include an individual's biological and behavioral characteristics, as well as attributes of the environment and culture. Protective factors include effective clinical care for psychiatric (including alcoholism and drug abuse and physical disorders, easy access to a variety of clinical interventions and support for seeking help, restricted access to highly lethal means of suicide, strong connections to family and community support, skills in problem solving and conflict resolution, cultural and religious beliefs that discourage suicide and support self-preservation. Future studies are necessary to determine which interventions may reduce suicidal behavior in alcoholism.

  6. Branching trajectory continual integral

    International Nuclear Information System (INIS)

    Maslov, V.P.; Chebotarev, A.M.

    1980-01-01

    Heuristic definition of the Feynman continual integral over branching trajectories is suggested which makes it possible to obtain in the closed form the solution of the Cauchy problem for the model Hartree equation. A number of properties of the solution is derived from an integral representation. In particular, the quasiclassical asymptotics, exact solution in the gaussian case and perturbation theory series are described. The existence theorem for the simpliest continual integral over branching trajectories is proved [ru

  7. Environmental protection

    International Nuclear Information System (INIS)

    Hull, A.P.

    1979-01-01

    Environmental Studies and Internal Dosimetry projects include: Environmental Protection; 1977 Environmental Monitoring Report; Sewage Sludge Disposal on the Sanitary Landfill; Radiological Analyses of Marshall Islands Environmental Samples, 1974 to 1976; External Radiation Survey and Dose Predictions for Rongelap, Utirik, Rongerik, Ailuk, and Wotje Atolls; Marshall Islands - Diet and Life Style Study; Dose Reassessment for Populations on Rongelap and Utirik Following Exposure to Fallout from BRAVO Incident (March 1, 1954); Whole Body Counting Results from 1974 to 1979 for Bikini Island Residents; Dietary Radioactivity Intake from Bioassay Data, a Model Applied to 137 Cs Intake by Bikini Island Residents; and External Exposure Measurements at Bikini Atoll

  8. Radiation protection

    International Nuclear Information System (INIS)

    Kamalaksh Shenoy, K.

    2013-01-01

    Three main pillars underpin the IAEA's mission: Safety and Security - The IAEA helps countries to upgrade their infrastructure for nuclear and radiation safety and security, and to prepare for and respond to emergencies. Work is keyed to international conventions, the development of international standards and the application of these standards. The aim is to protect people and the environment from the harmful effects of exposure to ionizing radiation. Science and Technology - The IAEA is the world's focal point for mobilizing peaceful applications of nuclear science and technology for critical needs in developing countries. The work contributes to alleviating poverty, combating disease and pollution of the environment and to other goals of sustainable development. Safeguards and Verification - The IAEA is the nuclear inspectorate, with more than four decades of verification experience. Inspectors work to verify that nuclear material and activities are not diverted towards military purposes. Quantities and Units: Dose equivalent is the product of absorbed dose of radiation and quality factor (Q). For absorbed dose in rads, dose equivalent is in rems. If absorbed dose is in gray, the dose equivalent is in sievert. Quality factor is defined without reference to any particular biological end point. Quality factors are recommended by committees such as the International Commission on Radiological Protection (ICRP) or the National Council on Radiation Protection and Measurements (NCRP), based on experimental RBE values but with some judgment exercised. Effective Dose Equivalent: It is the sum of the weighted dose equivalents for all irradiated tissues, in which the weighting factors represent the different risks of each tissue to mortality from cancer and hereditary effects. Committed dose equivalent: It is the integral over 50 years of dose equivalent following the intake of a radionuclide. Collective effective dose equivalent: It is a quantity for a population and is

  9. Protecting Antarctica

    Science.gov (United States)

    Carlowicz, Michael

    House Science Committee Chairman Robert Walker (R-Pa.) has introduced a bill into Congress to give the United States the legislative authority to implement the 1991 Environmental Protocol to the Antarctic Treaty. That protocol established rules and principles to shield the Antarctic environment from human spoilage—placing limits on the discharge of pollutants, protecting plant and animal life, and requiring environmental impact assessments before new activities and programs are launched. The protocol also forbids prospecting or developing of mineral resources except for scientific research.

  10. CSchema: A Downgrading Policy Language for XML Access Control

    Institute of Scientific and Technical Information of China (English)

    Dong-Xi Liu

    2007-01-01

    The problem of regulating access to XML documents has attracted much attention from both academic and industry communities.In existing approaches, the XML elements specified by access policies are either accessible or inac-cessible according to their sensitivity.However, in some cases, the original XML elements are sensitive and inaccessible, but after being processed in some appropriate ways, the results become insensitive and thus accessible.This paper proposes a policy language to accommodate such cases, which can express the downgrading operations on sensitive data in XML documents through explicit calculations on them.The proposed policy language is called calculation-embedded schema (CSchema), which extends the ordinary schema languages with protection type for protecting sensitive data and specifying downgrading operations.CSchema language has a type system to guarantee the type correctness of the embedded calcula-tion expressions and moreover this type system also generates a security view after type checking a CSchema policy.Access policies specified by CSchema are enforced by a validation procedure, which produces the released documents containing only the accessible data by validating the protected documents against CSchema policies.These released documents are then ready tobe accessed by, for instance, XML query engines.By incorporating this validation procedure, other XML processing technologies can use CSchema as the access control module.

  11. Designing radiation protection signs

    International Nuclear Information System (INIS)

    Rodriguez, M.A.; Richey, C.L.

    1995-01-01

    Entry into hazardous areas without the proper protective equipment is extremely dangerous and must be prevented whenever possible. Current postings of radiological hazards at the Rocky Flats Environmental Technology Site (RFETS) do not incorporate recent findings concerning effective warning presentation. Warning information should be highly visible, quickly, and easily understood. While continuing to comply with industry standards (e.g., Department of Energy (DOE) guidelines), these findings can be incorporated into existing radiological sign design, making them more effective in terms of usability and compliance. Suggestions are provided for designing more effective postings within stated guidelines

  12. MOFAC : model for fine grained access control

    OpenAIRE

    2014-01-01

    M.Sc. (Computer Science) Computer security is a key component in any computer system. Traditionally computers were not connected to one another. This centralized configuration made the implementation of computer security a relatively easy task. The closed nature of the system limited the number of unknown factors that could cause security breaches. The users and their access rights were generally well defined and the system was protected from outside threats through simple, yet effective c...

  13. VIRTUAL ENVIRONMENT FOR CONTINUING MEDICAL EDUCATION

    Directory of Open Access Journals (Sweden)

    Sorana D. BOLBOACA

    2007-01-01

    Full Text Available The rapid development of communication and information technologies lead to the changes in continuing medical education by offering the possibility to move up-to-date medical information through Internet to the physicians. The main goal of this study was to create a virtual space for continuing medical education. In this context, a number of computer-assisted tools for instruction, evaluation and utilization in daily activity have been developed and integrated into a unitary system. The main imposed specifications of the system were accessibility, integrity, availability, and security.This report describes the characteristics of tables design and organization, and of system integration. The security level was imposed for assuring the accessibility of each physician to medical information useful in his or her activity and the knowledge database development.

  14. Radiation protection issues for EPR reactor

    International Nuclear Information System (INIS)

    Miniere, D.; Le Guen, B.; Beneteau, Y.; Le Guen, B.

    2008-01-01

    As part of the EPR (European Pressurized Reactor) project being deployed at Flamanville, EDF has pro actively made the decision to focus on radiation protection Radiation Protection aspects right from the start of the design phase, as it has done with nuclear safety. The approach adopted for managing Radiation Protection-significant activities has been to include all involved stakeholders - designers, licensee and contractor companies - in the three successive phases, starting with a survey among workers and designers, followed by a proposal review, and finally ending with the decision-making phase entrusted to an ALARA committee. The Radiation Protection target set by EDF for this new reactor is to engage in an effort of continuous improvement and optimisation, through benchmarking with the best performing plants of the fleet. The collective dose target is currently set at 0.35 Man Sv/year per unit. In addition to other aspects, efforts will focus on shortening the duration of the highest-dose jobs, with a new challenge being set for work performed in the reactor building during normal operations, the aim being to improve plant availability. The plan is for work to be performed 7 days prior to shutting down the reactor and 3 days afterwards, in order to make logistical arrangements for forthcoming jobs. Without this reduction, the estimated drop is currently 4.5% of annual dose. For this purpose, two areas have been set up in the E.P.R.'s reactor building: one no-go area for containing leaks from the primary circuit, and one accessible area for normal operations, separated from the no-go area by purpose-built ventilation equipment and facilities. To offer protection against radioactive flux (neutrons and high energy), Radiation Protection studies have resulted in the installation of a concrete floor and of nuclear shielding at the outlets of primary circuit pipes. Steam generator bunkers and pumps have also been reinforced. All these measures will ensure that the

  15. Ad Hoc Access Gateway Selection Algorithm

    Science.gov (United States)

    Jie, Liu

    With the continuous development of mobile communication technology, Ad Hoc access network has become a hot research, Ad Hoc access network nodes can be used to expand capacity of multi-hop communication range of mobile communication system, even business adjacent to the community, improve edge data rates. For mobile nodes in Ad Hoc network to internet, internet communications in the peer nodes must be achieved through the gateway. Therefore, the key Ad Hoc Access Networks will focus on the discovery gateway, as well as gateway selection in the case of multi-gateway and handover problems between different gateways. This paper considers the mobile node and the gateway, based on the average number of hops from an average access time and the stability of routes, improved gateway selection algorithm were proposed. An improved gateway selection algorithm, which mainly considers the algorithm can improve the access time of Ad Hoc nodes and the continuity of communication between the gateways, were proposed. This can improve the quality of communication across the network.

  16. Food protection

    International Nuclear Information System (INIS)

    Gummer, Selwyn; Campbell-Savours, D.N.; Maxwell-Hyslop, R.

    1987-01-01

    The motion is to consolidate the Food Protection (Emergency Prohibitions) (England) (No 2) Order 1987 and seven subsequent amendment orders, into one order. The orders are those under which restrictions on the movement of sheep as a result of the Chernobyl accident are carried out. A debate lasting more than two hours followed and this is reported verbatim. Much of the early part of the debate concerns a telex message allegedly from the chief scientist of the radiochemical institute saying that meat contaminated by radiation after Chernobyl was sold in Britain. Both the source and the content of the telex were found not to be as alleged. In particular, the allegation that 10kg lambs had gone to market. The minister pointed out that these lambs were not big enough to be sold. The debate broadened into a more general discussion as to levels of contamination in sheep and the government diligence or otherwise in protecting the public. The motion was agreed to. (U.K.)

  17. Does debtor protection really protect debtors? Evidence from the small business credit market

    NARCIS (Netherlands)

    Berger, A.N.; Cerqueiro, G.M.; Penas, M.F.

    2011-01-01

    This paper analyzes how different levels of debtor protection across US states affect small firms’ access to credit, as well as the price and non-price terms of their loans. We use an individual-specific measure of debtor protection that has its maximum value when the borrower’s home equity is lower

  18. 78 FR 42071 - Updates to Protective Action Guides Manual: Protective Action Guides (PAGs) and Planning Guidance...

    Science.gov (United States)

    2013-07-15

    ... Guides Manual: Protective Action Guides (PAGs) and Planning Guidance for Radiological Incidents AGENCY... guidance ``PAG Manual: Protective Action Guides (PAGs) and Planning Guidance for Radiological Incidents... ``anonymous access'' system, which means the EPA will not know your identity or contact information unless you...

  19. Radiation safety and vascular access: attitudes among cardiologists worldwide

    Energy Technology Data Exchange (ETDEWEB)

    Vidovich, Mladen I., E-mail: miv@uic.edu [Department of Medicine, Division of Cardiology, University of Illinois at Chicago, Chicago, Illinois (United States); Khan, Asrar A. [Department of Medicine, Division of Cardiology, University of Illinois at Chicago, Chicago, Illinois (United States); Xie, Hui [Division of Epidemiology and Biostatistics and Cancer Center, University of Illinois at Chicago, Chicago, Illinois (United States); Shroff, Adhir R. [Department of Medicine, Division of Cardiology, University of Illinois at Chicago, Chicago, Illinois (United States)

    2015-03-15

    Objectives: To determine opinions and perceptions of interventional cardiologists on the topic of radiation and vascular access choice. Background: Transradial approach for cardiac catheterization has been increasing in popularity worldwide. There is evidence that transradial access (TRA) may be associated with increasing radiation doses compared to transfemoral access (TFA). Methods: We distributed a questionnaire to collect opinions of interventional cardiologists around the world. Results: Interventional cardiologists (n = 5332) were contacted by email to complete an on-line survey from September to October 2013. The response rate was 20% (n = 1084). TRA was used in 54% of percutaneous coronary interventions (PCIs). Most TRAs (80%) were performed with right radial access (RRA). Interventionalists perceived that TRA was associated with higher radiation exposure compared to TFA and that RRA was associated with higher radiation exposure that left radial access (LRA). Older interventionalists were more likely to use radiation protection equipment and those who underwent radiation safety training gave more importance to ALARA (as low as reasonably achievable). Nearly half the respondents stated they would perform more TRA if the radiation exposure was similar to TFA. While interventionalists in the United States placed less importance to certain radiation protective equipment, European operators were more concerned with physician and patient radiation. Conclusions: Interventionalists worldwide reported higher perceived radiation doses with TRA compared to TFA and RRA compared to LRA. Efforts should be directed toward encouraging consistent radiation safety training. Major investment and application of novel radiation protection tools and radiation dose reduction strategies should be pursued. - Highlights: • We examined radiation safety and arterial access practices among 1000 cardiologists. • Radial access is perceived as having higher radiation dose compared to

  20. Youth access to tobacco.

    Science.gov (United States)

    Rigotti, N A

    1999-01-01

    To start smoking, young people need a supply of tobacco products. Reducing youth access to tobacco is a new approach to preventing tobacco use that has been a focus of federal, state, and local tobacco control efforts over the past decade. All 50 states ban tobacco sales to minors, but compliance is poor because laws are not enforced. Consequently, young people have little trouble obtaining tobacco products. Commercial sources of tobacco (stores and vending machines) are important for underage smokers, who often purchase their own cigarettes. Underage youths also obtain tobacco from noncommercial sources such as friends, relatives, older adolescents, and adults. Educating retailers about tobacco sales laws has not produced long-term improvement in their compliance. Active enforcement of tobacco sales laws changes retailer behavior, but whether this reduces young people's access to tobacco or their tobacco use is not clear. The effectiveness of new local, state, and federal actions that aim to reduce youth access to tobacco remains to be determined. Can enforcing tobacco sales laws reduce young people's access to tobacco? If so, will this prevent or delay the onset of their tobacco use? How will youths' sources of tobacco change as commercial sources are restricted? What are the social (noncommercial) sources of tobacco for minors and how can youths' access to tobacco from these sources be reduced? What is the impact of the new federal policies aimed at reducing youth access to tobacco? Do new state and local laws that ban youth possession or use of tobacco have a net positive or negative impact on youth attitudes, access to tobacco, or tobacco use? What is the relative effectiveness and cost-effectiveness of efforts to reduce the supply of tobacco compared to those that aim to reduce demand for tobacco? Will either work alone or are both necessary to achieve reductions in youth smoking?

  1. 7 CFR 53.15 - Accessibility to livestock.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Accessibility to livestock. 53.15 Section 53.15... AGRICULTURAL MARKETING ACT OF 1946 AND THE EGG PRODUCTS INSPECTION ACT (CONTINUED) LIVESTOCK (GRADING, CERTIFICATION, AND STANDARDS) Regulations Service § 53.15 Accessibility to livestock. (a) The applicant shall...

  2. University access for social justice: a capabilities perspective ...

    African Journals Online (AJOL)

    University access for social justice: a capabilities perspective. M Wilson-Strydom. Abstract. The closely related, but often contradictory, issues of increasing access to university and improving students' chances of success in their university studies have been and continue to be an important research focus within higher ...

  3. Determined to Learn: Accessing Education despite Life-Threatening Disasters

    Science.gov (United States)

    SchWeber, Claudine

    2008-01-01

    The "right to education" proclaimed by the 1948 Universal Declaration of Human Rights requires access to learning as well as the support systems. Since access can be interrupted by various circumstances, the possibility of providing continuity despite external dangers by using online distance education, offers an intriguing and valuable…

  4. 49 CFR 633.15 - Access to information.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Access to information. 633.15 Section 633.15 Transportation Other Regulations Relating to Transportation (Continued) FEDERAL TRANSIT ADMINISTRATION, DEPARTMENT OF TRANSPORTATION PROJECT MANAGEMENT OVERSIGHT Project Management Oversight Services § 633.15 Access to information. A recipient of FTA...

  5. 45 CFR 2490.150 - Program accessibility: Existing facilities.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 4 2010-10-01 2010-10-01 false Program accessibility: Existing facilities. 2490.150 Section 2490.150 Public Welfare Regulations Relating to Public Welfare (Continued) JAMES MADISON... ACTIVITIES CONDUCTED BY THE JAMES MADISON MEMORIAL FELLOWSHIP FOUNDATION § 2490.150 Program accessibility...

  6. Ecology of Access to Educational Material in Developing World ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Ecology of Access to Educational Material in Developing World Universities. The longstanding crisis of the developing world library is coming to an end, but not in the way most observers anticipated. Resource scarcity, limited holdings and poor infrastructure remain the norm. Debates of access to print materials continue to ...

  7. Fire protection for telecommunications central offices

    International Nuclear Information System (INIS)

    McKenna, L.A. Jr.

    1990-01-01

    The provision of continuous, uninterrupted telecommunications service is vital to modern life. In order to provide uninterrupted service to customers, a service continuity program has been in place with AT and T for many years. This program integrates many different protection strategies and plans, each designed to mitigate one of the many threats to service continuity. The fire protection program implemented within AT and T is a part of this service continuity program. In the design of this program, a number of unusual problems had to be addressed due to the service continuity requirements. Typical solutions to fire protection problems (ignition prevention, detection, and suppression) which are embodied in building and fire prevention codes are inadequate to provide service continuity. This presentation outlines the basic arrangement of a telecommunications central office, the specific fire protection problems encountered, the fire protection philosophy developed through the use of a systems approach, and the implementation of the fire protection program. Special emphasis is placed on the strategies employed in lieu of more traditional fire protection schemes and the stimuli for selecting them

  8. 40 CFR 1400.5 - Internet access to certain off-site consequence analysis data elements.

    Science.gov (United States)

    2010-07-01

    ... consequence analysis data elements. 1400.5 Section 1400.5 Protection of Environment ENVIRONMENTAL PROTECTION... UNDER THE CLEAN AIR ACT SECTION 112(r)(7); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.5 Internet access to certain off...

  9. Continuous infusion of chemotherapy: focus on 5-fluorouracil and fluorodeoxyuridine

    NARCIS (Netherlands)

    Poorter, R. L.; Bakker, P. J.; Veenhof, C. H.

    1998-01-01

    Continuous infusion of chemotherapy is one of the developments to try to improve the treatment of metastatic cancer. There is a sound theoretical rationale to deliver cytotoxic drugs as a continuous infusion. Furthermore, the development of reliable venous access devices and portable infusion pumps

  10. Radiation protection and environmental protection

    International Nuclear Information System (INIS)

    Xie Zi; Dong Liucan; Zhang Yongxing

    1994-01-01

    A collection of short papers is presented which review aspects of research in radiation and environmental protection carried out by the Chinese Institute of Atomic Energy in 1991. The topics covered are: the analysis of Po 210 in the gaseous effluent of coal-fired boilers; the determination of natural radionuclide levels in various industrial waste slags and management countermeasures; assessment of the collective radiation dose from natural sources for the Chinese population travelling by water; the preliminary environmental impact report for the multipurpose heavy water research reactor constructed by China for the Islamic Republic of Algeria. (UK)

  11. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  12. Chemical Data Access Tool

    Data.gov (United States)

    U.S. Environmental Protection Agency — This tool is intended to aid individuals interested in learning more about chemicals that are manufactured or imported into the United States. Health and safety...

  13. Open access to scientific publishing

    Directory of Open Access Journals (Sweden)

    Janne Beate Reitan

    2016-12-01

    Full Text Available Interest in open access (OA to scientific publications is steadily increasing, both in Norway and internationally. From the outset, FORMakademisk has been published as a digital journal, and it was one of the first to offer OA in Norway. We have since the beginning used Open Journal Systems (OJS as publishing software. OJS is part of the Public Knowledge Project (PKP, which was created by Canadian John Willinsky and colleagues at the Faculty of Education at the University of British Columbia in 1998. The first version of OJS came as an open source software in 2001. The programme is free for everyone to use and is part of a larger collective movement wherein knowledge is shared. When FORMakademisk started in 2008, we received much help from the journal Acta Didactic (n.d. at the University of Oslo, which had started the year before us. They had also translated the programme to Norwegian. From the start, we were able to publish in both Norwegian and English. Other journals have used FORMakademisk as a model and source of inspiration when starting or when converting from subscription-based print journals to electronic OA, including the Journal of Norwegian Media Researchers [Norsk medietidsskrift]. It is in this way that the movement around PKP works and continues to grow to provide free access to research. As the articles are OA, they are also easily accessible to non-scientists. We also emphasise that the language should be readily available, although it should maintain a high scientific quality. Often there may be two sides of the same coin. We on the editorial team are now looking forward to adopting the newly developed OJS 3 this spring, with many new features and an improved design for users, including authors, peer reviewers, editors and readers.

  14. Enterprise Dynamic Access Control (EDAC)

    National Research Council Canada - National Science Library

    Fernandez, Richard

    2005-01-01

    .... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...

  15. Corruption in the health care sector: A barrier to access of orthopaedic care and medical devices in Uganda.

    Science.gov (United States)

    Bouchard, Maryse; Kohler, Jillian C; Orbinski, James; Howard, Andrew

    2012-05-03

    Globally, injuries cause approximately as many deaths per year as HIV/AIDS, tuberculosis and malaria combined, and 90% of injury deaths occur in low- and middle- income countries. Given not all injuries kill, the disability burden, particularly from orthopaedic injuries, is much higher but is poorly measured at present. The orthopaedic services and orthopaedic medical devices needed to manage the injury burden are frequently unavailable in these countries. Corruption is known to be a major barrier to access of health care, but its effects on access to orthopaedic services is still unknown. A qualitative case study of 45 open-ended interviews was conducted to investigate the access to orthopaedic health services and orthopaedic medical devices in Uganda. Participants included orthopaedic surgeons, related healthcare professionals, industry and government representatives, and patients. Participants' experiences in accessing orthopaedic medical devices were explored. Thematic analysis was used to analyze and code the transcripts. Analysis of the interview data identified poor leadership in government and corruption as major barriers to access of orthopaedic care and orthopaedic medical devices. Corruption was perceived to occur at the worker, hospital and government levels in the forms of misappropriation of funds, theft of equipment, resale of drugs and medical devices, fraud and absenteeism. Other barriers elicited included insufficient health infrastructure and human resources, and high costs of orthopaedic equipment and poverty. This study identified perceived corruption as a significant barrier to access of orthopaedic care and orthopaedic medical devices in Uganda. As the burden of injury continues to grow, the need to combat corruption and ensure access to orthopaedic services is imperative. Anti-corruption strategies such as transparency and accountability measures, codes of conduct, whistleblower protection, and higher wages and benefits for workers could be

  16. Corruption in the health care sector: A barrier to access of orthopaedic care and medical devices in Uganda

    Directory of Open Access Journals (Sweden)

    Bouchard Maryse

    2012-05-01

    Full Text Available Abstract Background Globally, injuries cause approximately as many deaths per year as HIV/AIDS, tuberculosis and malaria combined, and 90% of injury deaths occur in low- and middle- income countries. Given not all injuries kill, the disability burden, particularly from orthopaedic injuries, is much higher but is poorly measured at present. The orthopaedic services and orthopaedic medical devices needed to manage the injury burden are frequently unavailable in these countries. Corruption is known to be a major barrier to access of health care, but its effects on access to orthopaedic services is still unknown. Methods A qualitative case study of 45 open-ended interviews was conducted to investigate the access to orthopaedic health services and orthopaedic medical devices in Uganda. Participants included orthopaedic surgeons, related healthcare professionals, industry and government representatives, and patients. Participants’ experiences in accessing orthopaedic medical devices were explored. Thematic analysis was used to analyze and code the transcripts. Results Analysis of the interview data identified poor leadership in government and corruption as major barriers to access of orthopaedic care and orthopaedic medical devices. Corruption was perceived to occur at the worker, hospital and government levels in the forms of misappropriation of funds, theft of equipment, resale of drugs and medical devices, fraud and absenteeism. Other barriers elicited included insufficient health infrastructure and human resources, and high costs of orthopaedic equipment and poverty. Conclusions This study identified perceived corruption as a significant barrier to access of orthopaedic care and orthopaedic medical devices in Uganda. As the burden of injury continues to grow, the need to combat corruption and ensure access to orthopaedic services is imperative. Anti-corruption strategies such as transparency and accountability measures, codes of conduct

  17. Corruption in the health care sector: A barrier to access of orthopaedic care and medical devices in Uganda

    Science.gov (United States)

    2012-01-01

    Background Globally, injuries cause approximately as many deaths per year as HIV/AIDS, tuberculosis and malaria combined, and 90% of injury deaths occur in low- and middle- income countries. Given not all injuries kill, the disability burden, particularly from orthopaedic injuries, is much higher but is poorly measured at present. The orthopaedic services and orthopaedic medical devices needed to manage the injury burden are frequently unavailable in these countries. Corruption is known to be a major barrier to access of health care, but its effects on access to orthopaedic services is still unknown. Methods A qualitative case study of 45 open-ended interviews was conducted to investigate the access to orthopaedic health services and orthopaedic medical devices in Uganda. Participants included orthopaedic surgeons, related healthcare professionals, industry and government representatives, and patients. Participants’ experiences in accessing orthopaedic medical devices were explored. Thematic analysis was used to analyze and code the transcripts. Results Analysis of the interview data identified poor leadership in government and corruption as major barriers to access of orthopaedic care and orthopaedic medical devices. Corruption was perceived to occur at the worker, hospital and government levels in the forms of misappropriation of funds, theft of equipment, resale of drugs and medical devices, fraud and absenteeism. Other barriers elicited included insufficient health infrastructure and human resources, and high costs of orthopaedic equipment and poverty. Conclusions This study identified perceived corruption as a significant barrier to access of orthopaedic care and orthopaedic medical devices in Uganda. As the burden of injury continues to grow, the need to combat corruption and ensure access to orthopaedic services is imperative. Anti-corruption strategies such as transparency and accountability measures, codes of conduct, whistleblower protection, and higher

  18. Continuing Education in Research Ethics for the Clinical Nurse.

    Science.gov (United States)

    Jeffers, Brenda Recchia

    2002-01-01

    Review of professional nursing statements, federal policy, and recommendations for protection of human research subjects resulted in a topic and content outline for research ethics training for nurses. Suggestions for continuing education programs on research ethics were formulated. (SK)

  19. Continuous Markovian Logics

    DEFF Research Database (Denmark)

    Mardare, Radu Iulian; Cardelli, Luca; Larsen, Kim Guldstrand

    2012-01-01

    Continuous Markovian Logic (CML) is a multimodal logic that expresses quantitative and qualitative properties of continuous-time labelled Markov processes with arbitrary (analytic) state-spaces, henceforth called continuous Markov processes (CMPs). The modalities of CML evaluate the rates...... of the exponentially distributed random variables that characterize the duration of the labeled transitions of a CMP. In this paper we present weak and strong complete axiomatizations for CML and prove a series of metaproperties, including the finite model property and the construction of canonical models. CML...... characterizes stochastic bisimilarity and it supports the definition of a quantified extension of the satisfiability relation that measures the "compatibility" between a model and a property. In this context, the metaproperties allows us to prove two robustness theorems for the logic stating that one can...

  20. Protective clothing

    International Nuclear Information System (INIS)

    Winnett, G.F.

    1979-01-01

    A protective suit used for isolating its wearer from radioactively contaminated areas is described in three parts. The first part includes the covering for the wearer's head, arms and upper body and at the waist is releasably fitted around an opening into the contaminated area. The second part includes the legs of the suit and is releasably connectible to the first part of the suit to enclose the wearer who is then supplied with air through an umbilical pipe. A further part surrounds the second part and is releasably connectible to it, enclosing a space between the parts. This further part is also releasably connectible to the opening at the waist to prevent egress from the contaminated area. The releasable connections between the parts may be bayonet type fittings or may be rotating T-shaped projections which engage in T-shaped grooves. (author)