WorldWideScience

Sample records for give users access

  1. Apollo: giving application developers a single point of access to public health models using structured vocabularies and Web services.

    Science.gov (United States)

    Wagner, Michael M; Levander, John D; Brown, Shawn; Hogan, William R; Millett, Nicholas; Hanna, Josh

    2013-01-01

    This paper describes the Apollo Web Services and Apollo-SV, its related ontology. The Apollo Web Services give an end-user application a single point of access to multiple epidemic simulators. An end user can specify an analytic problem-which we define as a configuration and a query of results-exactly once and submit it to multiple epidemic simulators. The end user represents the analytic problem using a standard syntax and vocabulary, not the native languages of the simulators. We have demonstrated the feasibility of this design by implementing a set of Apollo services that provide access to two epidemic simulators and two visualizer services.

  2. OPACs: The User and Subject Access.

    Science.gov (United States)

    Carson, Elizabeth

    1985-01-01

    This survey of the literature reveals user and professional opinions of changes in subject access features available for online public access catalogs. Highlights include expanded access to fields already incorporated into traditional MARC record, access to context of the record, and design of the user interface. Twenty-four references are cited.…

  3. Workshop AccessibleTV "Accessible User Interfaces for Future TV Applications"

    Science.gov (United States)

    Hahn, Volker; Hamisu, Pascal; Jung, Christopher; Heinrich, Gregor; Duarte, Carlos; Langdon, Pat

    Approximately half of the elderly people over 55 suffer from some type of typically mild visual, auditory, motor or cognitive impairment. For them interaction, especially with PCs and other complex devices is sometimes challenging, although accessible ICT applications could make much of a difference for their living quality. Basically they have the potential to enable or simplify participation and inclusion in their surrounding private and professional communities. However, the availability of accessible user interfaces being capable to adapt to the specific needs and requirements of users with individual impairments is very limited. Although there are a number of APIs [1, 2, 3, 4] available for various platforms that allow developers to provide accessibility features within their applications, today none of them provides features for the automatic adaptation of multimodal interfaces being capable to automatically fit the individual requirements of users with different kinds of impairments. Moreover, the provision of accessible user interfaces is still expensive and risky for application developers, as they need special experience and effort for user tests. Today many implementations simply neglect the needs of elderly people, thus locking out a large portion of their potential users. The workshop is organized as part of the dissemination activity for the European-funded project GUIDE "Gentle user interfaces for elderly people", which aims to address this situation with a comprehensive approach for the realization of multimodal user interfaces being capable to adapt to the needs of users with different kinds of mild impairments. As application platform, GUIDE will mainly target TVs and Set-Top Boxes, such as the emerging Connected-TV or WebTV platforms, as they have the potential to address the needs of the elderly users with applications such as for home automation, communication or continuing education.

  4. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2015-06-16

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes pre-determining an association of the restricted computer resource and computer-resource-proximal environmental information. Indicia of user-proximal environmental information are received from a user requesting access to the restricted computer resource. Received indicia of user-proximal environmental information are compared to associated computer-resource-proximal environmental information. User access to the restricted computer resource is selectively granted responsive to a favorable comparison in which the user-proximal environmental information is sufficiently similar to the computer-resource proximal environmental information. In at least some embodiments, the process further includes comparing user-supplied biometric measure and comparing it with a predetermined association of at least one biometric measure of an authorized user. Access to the restricted computer resource is granted in response to a favorable comparison.

  5. Demand access communications for TDRSS users

    Science.gov (United States)

    Zillig, David; Weinberg, Aaron; Mcomber, Robert

    1994-01-01

    The Tracking and Data Relay Satellite System (TDRSS) has long been used to provide reliable low and high-data rate relay services between user spacecraft in Earth orbit and the ground. To date, these TDRSS services have been implemented via prior scheduling based upon estimates of user needs and mission event timelines. While this approach may be necessary for large users that require greater amounts of TDRSS resources, TDRSS can potentially offer the planned community of smaller science missions (e.g., the small explorer missions), and other emerging users, the unique opportunity for services on demand. In particular, innovative application of the existing TDRSS Multiple Access (MA) subsystem, with its phased array antenna, could be used to implement true demand access services without modification to either the TDRSS satellites or the user transponder, thereby introducing operational and performance benefits to both the user community and the Space Network. In this paper, candidate implementations of demand access service via the TDRSS MA subsystem are examined in detail. Both forward and return link services are addressed and a combination of qualitative and quantitative assessments are provided. The paper also identifies further areas for investigation in this ongoing activity that is being conducted by GSFC/Code 531 under the NASA Code O Advanced Systems Program.

  6. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  7. Regional Disparities in Online Map User Access Volume and Determining Factors

    Science.gov (United States)

    Li, R.; Yang, N.; Li, R.; Huang, W.; Wu, H.

    2017-09-01

    The regional disparities of online map user access volume (use `user access volume' in this paper to indicate briefly) is a topic of growing interest with the increment of popularity in public users, which helps to target the construction of geographic information services for different areas. At first place we statistically analysed the online map user access logs and quantified these regional access disparities on different scales. The results show that the volume of user access is decreasing from east to the west in China as a whole, while East China produces the most access volume; these cities are also the crucial economic and transport centres. Then Principal Component Regression (PCR) is applied to explore the regional disparities of user access volume. A determining model for Online Map access volume is proposed afterwards, which indicates that area scale is the primary determining factor for regional disparities, followed by public transport development level and public service development level. Other factors like user quality index and financial index have very limited influence on the user access volume. According to the study of regional disparities in user access volume, map providers can reasonably dispatch and allocate the data resources and service resources in each area and improve the operational efficiency of the Online Map server cluster.

  8. Implementing Recommendations From Web Accessibility Guidelines: A Comparative Study of Nondisabled Users and Users With Visual Impairments.

    Science.gov (United States)

    Schmutz, Sven; Sonderegger, Andreas; Sauer, Juergen

    2017-09-01

    The present study examined whether implementing recommendations of Web accessibility guidelines would have different effects on nondisabled users than on users with visual impairments. The predominant approach for making Web sites accessible for users with disabilities is to apply accessibility guidelines. However, it has been hardly examined whether this approach has side effects for nondisabled users. A comparison of the effects on both user groups would contribute to a better understanding of possible advantages and drawbacks of applying accessibility guidelines. Participants from two matched samples, comprising 55 participants with visual impairments and 55 without impairments, took part in a synchronous remote testing of a Web site. Each participant was randomly assigned to one of three Web sites, which differed in the level of accessibility (very low, low, and high) according to recommendations of the well-established Web Content Accessibility Guidelines 2.0 (WCAG 2.0). Performance (i.e., task completion rate and task completion time) and a range of subjective variables (i.e., perceived usability, positive affect, negative affect, perceived aesthetics, perceived workload, and user experience) were measured. Higher conformance to Web accessibility guidelines resulted in increased performance and more positive user ratings (e.g., perceived usability or aesthetics) for both user groups. There was no interaction between user group and accessibility level. Higher conformance to WCAG 2.0 may result in benefits for nondisabled users and users with visual impairments alike. Practitioners may use the present findings as a basis for deciding on whether and how to implement accessibility best.

  9. Controlling user access to electronic resources without password

    Science.gov (United States)

    Smith, Fred Hewitt

    2017-08-22

    Described herein are devices and techniques for remotely controlling user access to a restricted computer resource. The process includes obtaining an image from a communication device of a user. An individual and a landmark are identified within the image. Determinations are made that the individual is the user and that the landmark is a predetermined landmark. Access to a restricted computing resource is granted based on the determining that the individual is the user and that the landmark is the predetermined landmark. Other embodiments are disclosed.

  10. User-Based Information Retrieval System Interface Evaluation: An Examination of an On-Line Public Access Catalog.

    Science.gov (United States)

    Hert, Carol A.; Nilan, Michael S.

    1991-01-01

    Presents preliminary data that characterizes the relationship between what users say they are trying to accomplish when using an online public access catalog (OPAC) and their perceptions of what input to give the system. Human-machine interaction is discussed, and appropriate methods for evaluating information retrieval systems are considered. (18…

  11. National Radiobiology Archives Distributed Access User`s Manual, Version 1.1. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    Smith, S.K.; Prather, J.C.; Ligotke, E.K.; Watson, C.R.

    1992-06-01

    This supplement to the NRA Distributed Access User`s manual (PNL-7877), November 1991, describes installation and use of Version 1.1 of the software package; this is not a replacement of the previous manual. Version 1.1 of the NRA Distributed Access Package is a maintenance release. It eliminates several bugs, and includes a few new features which are described in this manual. Although the appearance of some menu screens has changed, we are confident that the Version 1.0 User`s Manual will provide an adequate introduction to the system. Users who are unfamiliar with Version 1.0 may wish to experiment with that version before moving on to Version 1.1.

  12. Scaffolding the design of accessible eLearning content: a user-centered approach and cognitive perspective.

    Science.gov (United States)

    Catarci, Tiziana; De Giovanni, Loredana; Gabrielli, Silvia; Kimani, Stephen; Mirabella, Valeria

    2008-08-01

    There exist various guidelines for facilitating the design, preparation, and deployment of accessible eLearning applications and contents. However, such guidelines prevalently address accessibility in a rather technical sense, without giving sufficient consideration to the cognitive aspects and issues related to the use of eLearning materials by learners with disabilities. In this paper we describe how a user-centered design process was applied to develop a method and set of guidelines for didactical experts to scaffold their creation of accessible eLearning content, based on a more sound approach to accessibility. The paper also discusses possible design solutions for tools supporting eLearning content authors in the adoption and application of the proposed approach.

  13. Support Services for Remote Users of Online Public Access Catalogs.

    Science.gov (United States)

    Kalin, Sally W.

    1991-01-01

    Discusses the needs of remote users of online public access catalogs (OPACs). User expectations are discussed; problems encountered by remote-access users are examined, including technical problems and searching problems; support services are described, including instruction, print guides, and online help; and differences from the needs of…

  14. Enabling web users and developers to script accessibility with Accessmonkey.

    Science.gov (United States)

    Bigham, Jeffrey P; Brudvik, Jeremy T; Leung, Jessica O; Ladner, Richard E

    2009-07-01

    Efficient web access remains elusive for blind computer users. Previous efforts to improve web accessibility have focused on developer awareness, automated improvement, and legislation, but these approaches have left remaining concerns. First, while many tools can help produce accessible content, most are difficult to integrate into existing developer workflows and rarely offer specific suggestions that developers can implement. Second, tools that automatically improve web content for users generally solve specific problems and are difficult to combine and use on a diversity of existing assistive technology. Finally, although blind web users have proven adept at overcoming the shortcomings of the web and existing tools, they have been only marginally involved in improving the accessibility of their own web experience. In a step toward addressing these concerns, we have developed Accessmonkey, a common scripting framework that web users, web developers and web researchers can use to collaboratively improve accessibility. This framework advances the idea that Javascript and dynamic web content can be used to improve inaccessible content instead of being a cause of it. Using Accessmonkey, web users and developers on different platforms and with potentially different goals can collaboratively make the web more accessible. In this article, we first present the design of the Accessmonkey framework and offer several example scripts that demonstrate the utility of our approach. We conclude by discussing possible future extensions that will provide easy access to scripts as users browse the web and enable non-technical blind users to independently create and share improvements.

  15. National Radiobiology Archives Distributed Access user's manual

    International Nuclear Information System (INIS)

    Watson, C.; Smith, S.; Prather, J.

    1991-11-01

    This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems

  16. User's guide for remote access of the Performance Assessment Center

    International Nuclear Information System (INIS)

    Peterson, C.R.; Kostelnik, K.M.

    1991-03-01

    The Performance Assessment Center (PAC) was established by the Department of Energy's National Low-Level Waste Management Program to provide technical assistance to support the development of low-level radioactive waste disposal facilities. This user's manual provides guidance to remote users of the PAC. Information is presented on how remote users may most effectively access and use the systems available at the Performance Assessment Center in Idaho Falls, Idaho. Access requirements and operating procedures are presented to assist the first-time PAC user. This manual also provides brief descriptions of each code available on the system

  17. User Collaboration for Improving Access to Historical Texts

    Directory of Open Access Journals (Sweden)

    Clemens Neudecker

    2010-08-01

    Full Text Available The paper will describe how web-based collaboration tools can engage users in the building of historical printed text resources created by mass digitisation projects. The drivers for developing such tools will be presented, identifying the benefits that can be derived for both the user community and cultural heritage institutions. The perceived risks, such as new errors introduced by the users, and the limitations of engaging with users in this way will be set out with the lessons that can be learned from existing activities, such as the National Library of Australia's newspaper website which supports collaborative correction of Optical Character Recognition (OCR output. The paper will present the work of the IMPACT (Improving Access to Text project, a large-scale integrating project funded by the European Commission as part of the Seventh Framework Programme (FP7. One of the aims of the project is to develop tools that help improve OCR results for historical printed texts, specifically those works published before the industrial production of books from the middle of the 19th century. Technological improvements to image processing and OCR engine technology are vital to improving access to historic text, but engaging the user community also has an important role to play. Utilising the intended user can help achieve the levels of accuracy currently found in born-digital materials. Improving OCR results will allow for better resource discovery and enhance performance by text mining and accessibility tools. The IMPACT project will specifically develop a tool that supports collaborative correction and validation of OCR results and a tool to allow user involvement in building historical dictionaries which can be used to validate word recognition. The technologies use the characteristics of human perception as a basis for error detection.

  18. Prediction of users webpage access behaviour using association ...

    Indian Academy of Sciences (India)

    pages mainly depended on the support and lift measure whereas confidence assumed ... Apriori algorithm; association rules; data mining; MSNBC; web usage .... clustering was used in finding the user access patterns from web access log. .... satisfied the minimum support and confidence of 0.6% and 100% respectively.

  19. Enabling Accessibility Through Model-Based User Interface Development.

    Science.gov (United States)

    Ziegler, Daniel; Peissner, Matthias

    2017-01-01

    Adaptive user interfaces (AUIs) can increase the accessibility of interactive systems. They provide personalized display and interaction modes to fit individual user needs. Most AUI approaches rely on model-based development, which is considered relatively demanding. This paper explores strategies to make model-based development more attractive for mainstream developers.

  20. Switch Based Opportunistic Spectrum Access for General Primary User Traffic Model

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-06-18

    This letter studies cognitive radio transceiver that can opportunistically use the available channels of primary user (PU). Specifically, we investigate and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme, based on channel switching mechanism, applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. For these access schemes, we derive the exact analytical results for the novel performance metrics of average access time and average waiting time under general PU traffic models.

  1. Switch Based Opportunistic Spectrum Access for General Primary User Traffic Model

    KAUST Repository

    Gaaloul, Fakhreddine; Alouini, Mohamed-Slim; Radaydeh, Redha M.; Yang, Hong-Chuan

    2012-01-01

    This letter studies cognitive radio transceiver that can opportunistically use the available channels of primary user (PU). Specifically, we investigate and compare two different opportunistic channel access schemes. The first scheme applies when the secondary user (SU) has access to only one channel. The second scheme, based on channel switching mechanism, applies when the SU has access to multiple channels but can at a given time monitor and access only one channel. For these access schemes, we derive the exact analytical results for the novel performance metrics of average access time and average waiting time under general PU traffic models.

  2. Accessibility of hypertensive users to health units and treatment adherence

    Directory of Open Access Journals (Sweden)

    Natasha Marques Frota

    2013-09-01

    Full Text Available We aimed to analyze the accessibility of hypertensive users to the health system with focus on treatment adherence. A cross-sectional study with quantitative approach was conducted in four Family Health Basic Units of Fortaleza-CE, Brazil. The sample consisted of 400 users. Data collection happened through a form applied from May to August 2011. About 97.5% of users were older than 40 years, and 67.2% were female. The accessibility to the referral service occurred in 47.2% of users to secondary care, of which 101 (25.2% were referred to Emergency Units, and 88 (22.0% were admitted to Inpatient Units. Most hypertensive patients adhered to healthy habits, except the use of dietetic sweeteners (36.0% and physical exercise (35.0%. The hypertensive patients had good treatment adherence and difficulty in accessibility regarding counter-referral services to secondary and tertiary care services.

  3. Health Websites: Accessibility and Usability for American Sign Language Users

    Science.gov (United States)

    Kushalnagar, Poorna; Naturale, Joan; Paludneviciene, Raylene; Smith, Scott R.; Werfel, Emily; Doolittle, Richard; Jacobs, Stephen; DeCaro, James

    2015-01-01

    To date, there have been efforts towards creating better health information access for Deaf American Sign Language (ASL) users. However, the usability of websites with access to health information in ASL has not been evaluated. Our paper focuses on the usability of four health websites that include ASL videos. We seek to obtain ASL users’ perspectives on the navigation of these ASL-accessible websites, finding the health information that they needed, and perceived ease of understanding ASL video content. ASL users (N=32) were instructed to find specific information on four ASL-accessible websites, and answered questions related to: 1) navigation to find the task, 2) website usability, and 3) ease of understanding ASL video content for each of the four websites. Participants also gave feedback on what they would like to see in an ASL health library website, including the benefit of added captioning and/or signer model to medical illustration of health videos. Participants who had lower health literacy had greater difficulty in finding information on ASL-accessible health websites. This paper also describes the participants’ preferences for an ideal ASL-accessible health website, and concludes with a discussion on the role of accessible websites in promoting health literacy in ASL users. PMID:24901350

  4. Accessibility of dynamic web applications with emphasis on visually impaired users

    Directory of Open Access Journals (Sweden)

    Kingsley Okoye

    2014-09-01

    Full Text Available As the internet is fast migrating from static web pages to dynamic web pages, the users with visual impairment find it confusing and challenging when accessing the contents on the web. There is evidence that dynamic web applications pose accessibility challenges for the visually impaired users. This study shows that a difference can be made through the basic understanding of the technical requirement of users with visual impairment and addresses a number of issues pertinent to the accessibility needs for such users. We propose that only by designing a framework that is structurally flexible, by removing unnecessary extras and thereby making every bit useful (fit-for-purpose, will visually impaired users be given an increased capacity to intuitively access e-contents. This theory is implemented in a dynamic website for the visually impaired designed in this study. Designers should be aware of how the screen reading software works to enable them make reasonable adjustments or provide alternative content that still corresponds to the objective content to increase the possibility of offering faultless service to such users. The result of our research reveals that materials can be added to a content repository or re-used from existing ones by identifying the content types and then transforming them into a flexible and accessible one that fits the requirements of the visually impaired through our method (no-frill + agile methodology rather than computing in advance or designing according to a given specification.

  5. Guidelines for Making Web Content Accessible to All Users

    Science.gov (United States)

    Thompson, Terrill; Primlani, Saroj; Fiedor, Lisa

    2009-01-01

    The main goal of accessibility standards and guidelines is to design websites everyone can use. The "IT Accessibility Constituent Group" developed this set of draft guidelines to help EQ authors, reviewers, and staff and the larger EDUCAUSE community ensure that web content is accessible to all users, including those with disabilities. This…

  6. Considering User's Access Pattern in Multimedia File Systems

    Science.gov (United States)

    Cho, KyoungWoon; Ryu, YeonSeung; Won, Youjip; Koh, Kern

    2002-12-01

    Legacy buffer cache management schemes for multimedia server are grounded at the assumption that the application sequentially accesses the multimedia file. However, user access pattern may not be sequential in some circumstances, for example, in distance learning application, where the user may exploit the VCR-like function(rewind and play) of the system and accesses the particular segments of video repeatedly in the middle of sequential playback. Such a looping reference can cause a significant performance degradation of interval-based caching algorithms. And thus an appropriate buffer cache management scheme is required in order to deliver desirable performance even under the workload that exhibits looping reference behavior. We propose Adaptive Buffer cache Management(ABM) scheme which intelligently adapts to the file access characteristics. For each opened file, ABM applies either the LRU replacement or the interval-based caching depending on the Looping Reference Indicator, which indicates that how strong temporally localized access pattern is. According to our experiment, ABM exhibits better buffer cache miss ratio than interval-based caching or LRU, especially when the workload exhibits not only sequential but also looping reference property.

  7. User Management with LDAP(Light weight Directory Access Protocolfor access to technology and Information Services in Companies

    Directory of Open Access Journals (Sweden)

    José Teodoro Mejía Viteri

    2016-08-01

    Full Text Available This research aims to conduct an analysis of management services information and users with LDAP (Lightweight / Simplified Directory Access Protocol, their interaction with other technology services company, allowing it to be accessed through a single user and password. This study allowed us to collect information through a literature review on the LDAP service and its ability to interact with your user directory Open source technology services; also with Windows Server and Active Directory service is used by companies for their ease of management and access resources on Windows clients; is intended to provide an alternative for the implementation of each of the services required by public and private companies with tools free use and access to services for management and administration can be done by integrating or synchronizing with the directory LDAP.

  8. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  9. Effects of accessible website design on nondisabled users: age and device as moderating factors.

    Science.gov (United States)

    Schmutz, Sven; Sonderegger, Andreas; Sauer, Juergen

    2018-05-01

    This study examined how implementing recommendations from Web accessibility guidelines affects nondisabled people in different age groups using different technical devices. While recent research showed positive effects of implementing such recommendations for nondisabled users, it remains unclear whether such effects would apply to different age groups and kind of devices. A 2 × 2 × 2 design was employed with website accessibility (high accessibility vs. very low accessibility), age (younger adults vs. older adults) and type of device (laptop vs. tablet) as independent variables. 110 nondisabled participants took part in a usability test, in which performance and satisfaction were measured as dependent variables. The results showed that higher accessibility increased task completion rate, task completion time and satisfaction ratings of nondisabled users. While user age did not have any effects, users showed faster task completion time under high accessibility when using a tablet rather than a laptop. The findings confirmed previous findings, which showed benefits of accessible websites for nondisabled users. These beneficial effects may now be generalised to a wide age range and across different devices. Practitioner Summary: This work is relevant to the design of websites since it emphasises the need to consider the characteristics of different user groups. Accessible website design (aimed at users with disabilities) leads to benefits for nondisabled users across different ages. These findings provide further encouragement for practitioners to apply WCAG 2.0.

  10. NASA Access Mechanism - Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy F.; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited by factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  11. NASA access mechanism: Graphical user interface information retrieval system

    Science.gov (United States)

    Hunter, Judy; Generous, Curtis; Duncan, Denise

    1993-01-01

    Access to online information sources of aerospace, scientific, and engineering data, a mission focus for NASA's Scientific and Technical Information Program, has always been limited to factors such as telecommunications, query language syntax, lack of standardization in the information, and the lack of adequate tools to assist in searching. Today, the NASA STI Program's NASA Access Mechanism (NAM) prototype offers a solution to these problems by providing the user with a set of tools that provide a graphical interface to remote, heterogeneous, and distributed information in a manner adaptable to both casual and expert users. Additionally, the NAM provides access to many Internet-based services such as Electronic Mail, the Wide Area Information Servers system, Peer Locating tools, and electronic bulletin boards.

  12. System Design and Cataloging Meet the User: User Interfaces to Online Public Access Catalogs.

    Science.gov (United States)

    Yee, Martha M.

    1991-01-01

    Discusses features of online public access catalogs: (1) demonstration of relationships between records; (2) provision of entry vocabularies; (3) arrangement of multiple entries on the screen; (4) provision of access points; (5) display of single records; and (6) division of catalogs into separate files or indexes. User studies and other research…

  13. Security of social network credentials for accessing course portal: Users' experience

    Science.gov (United States)

    Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee

    2015-12-01

    Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.

  14. Financial accessibility and user fee reforms for maternal healthcare in five sub-Saharan countries: a quasi-experimental analysis.

    Science.gov (United States)

    Leone, Tiziana; Cetorelli, Valeria; Neal, Sarah; Matthews, Zoë

    2016-01-28

    Evidence on whether removing fees benefits the poorest is patchy and weak. The aim of this paper is to measure the impact of user fee reforms on the probability of giving birth in an institution or undergoing a caesarean section (CS) in Ghana, Burkina Faso, Zambia, Cameroon and Nigeria for the poorest strata of the population. Women's experience of user fees in 5 African countries. Using quasi-experimental regression analysis we tested the impact of user fee reforms on facilities' births and CS differentiated by wealth, education and residence in Burkina Faso and Ghana. Mapping of the literature followed by key informant interviews are used to verify details of reform implementation and to confirm and support our countries' choice. We analysed data from consecutive surveys in 5 countries: 2 case countries that experienced reforms (Ghana and Burkina Faso) by contrast with 3 that did not experience reforms (Zambia, Cameroon, Nigeria). User fee reforms are associated with a significant percentage of the increase in access to facility births (27 percentage points) and to a much lesser extent to CS (0.7 percentage points). Poor (but not the poorest), and non-educated women, and those in rural areas benefitted the most from the reforms. User fees reforms have had a higher impact in Burkina Faso compared with Ghana. Findings show a clear positive impact on access when user fees are removed, but limited evidence for improved availability of CS for those most in need. More women from rural areas and from lower socioeconomic backgrounds give birth in health facilities after fee reform. Speed and quality of implementation might be the key reason behind the differences between the 2 case countries. This calls for more research into the impact of reforms on quality of care. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  15. National Radiobiology Archives Distributed Access user's manual

    Energy Technology Data Exchange (ETDEWEB)

    Watson, C.; Smith, S. (Pacific Northwest Lab., Richland, WA (United States)); Prather, J. (Linfield Coll., McMinnville, OR (United States))

    1991-11-01

    This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems.

  16. Wheelchair users, access and exclusion in South African higher education.

    Science.gov (United States)

    Chiwandire, Desire; Vincent, Louise

    2017-01-01

    South Africa's Constitution guarantees everyone, including persons with disabilities, the right to education. A variety of laws are in place obliging higher education institutions to provide appropriate physical access to education sites for all. In practice, however, many buildings remain inaccessible to people with physical disabilities. To describe what measures South African universities are taking to make their built environments more accessible to students with diverse types of disabilities, and to assess the adequacy of such measures. We conducted semi-structured in-depth face-to-face interviews with disability unit staff members (DUSMs) based at 10 different public universities in South Africa. Challenges with promoting higher education accessibility for wheelchair users include the preservation and heritage justification for failing to modify older buildings, ad hoc approaches to creating accessible environments and failure to address access to toilets, libraries and transport facilities for wheelchair users. South African universities are still not places where all students are equally able to integrate socially. DUSMs know what ought to be done to make campuses more accessible and welcoming to students with disabilities and should be empowered to play a leading role in sensitising non-disabled members of universities, to create greater awareness of, and appreciation for, the multiple ways in which wheelchair user students continue to be excluded from full participation in university life. South African universities need to adopt a systemic approach to inclusion, which fosters an understanding of inclusion as a fundamental right rather than as a luxury.

  17. Comparison and Evaluation of End-User Interfaces for Online Public Access Catalogs.

    Science.gov (United States)

    Zumer, Maja

    End-user interfaces for the online public access catalogs (OPACs) of OhioLINK, a system linking major university and research libraries in Ohio, and its 16 member libraries, accessible through the Internet, are compared and evaluated from the user-oriented perspective. A common, systematic framework was used for the scientific observation of the…

  18. A Trusted Host's Authentication Access and Control Model Faced on User Action

    Institute of Scientific and Technical Information of China (English)

    ZHANG Miao; XU Guoai; HU Zhengming; YANG Yixian

    2006-01-01

    The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.

  19. Complication with Intraosseous Access: Scandinavian Users' Experience

    Directory of Open Access Journals (Sweden)

    Peter Hallas

    2013-09-01

    Full Text Available Introduction: Intraosseous access (IO is indicated if vascular access cannot be quickly established during resuscitation. Complication rates are estimated to be low, based on small patient series, model or cadaver studies, and case reports. However, user experience with IO use in real-life emergency situations might differ from the results in the controlled environment of model studies and small patient series. We performed a survey of IO use in real-life emergency situations to assess users’ experiences of complications.Methods: An online questionnaire was sent to Scandinavian emergency physicians, anesthesiologists and pediatricians.Results: 1,802 clinical cases of IO use was reported by n=386 responders. Commonly reported complications with establishing IO access were patient discomfort/pain (7.1%, difficulties with penetration of periosteum with IO needle (10.3%, difficulties with aspiration of bone marrow (12.3%, and bended/broken needle (4.0%. When using an established IO access the reported complications were difficulties with injection fluid and drugs after IO insertion (7.4%, slow infusion (despite use of pressure bag (8.8%, displacement after insertion (8.5%, and extravasation (3.7%. Compartment syndrome and osteomyelitis occurred in 0.6% and 0.4% of cases respectively.Conclusion: In users’ recollection of real-life IO use, perceived complications were more frequent than usually reported from model studies. The perceived difficulties with using IO could affect the willingness of medical staff to use IO. Therefore, user experience should be addressed both in education of how to use, and research and development of IOs. [West J Emerg Med. 2013;14(5:440–443.

  20. Accessing and disclosing protected resources

    DEFF Research Database (Denmark)

    Olesen, Henning; Khajuria, Samant

    2015-01-01

    Today, data is money. Whether it is private users' personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization measures to be deployed. Enabling...... advanced user controlled privacy is essential to realize the visions of 5G applications and services. For service providers and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user...... the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources and possibly give them control of how their data will be used by service providers....

  1. Design Strategies for Efficient Access to Mobile Device Users via Amazon Mechanical Turk

    OpenAIRE

    Jacques, Jason; Kristensson, Per Ola

    2017-01-01

    It is often challenging to access a pool of mobile device users and instruct them to perform an interactive task. Yet such data is often vital to provide design insight at various stages of the design process of a mobile application, service or system. We propose accessing a pool of mobile device users via the microtask market Amazon Mechanical Turk (MTurk). While mobile device users are still a minority on MTurk, they provide unique opportunities for requesters. Not only does catering to mob...

  2. ARM User Survey Report: Data Access, Quality, and Delivery

    Energy Technology Data Exchange (ETDEWEB)

    Mather, JH; Roeder, LR; Sivaraman, C

    2012-06-28

    The objective of this survey was to obtain user feedback to determine how users of the Atmospheric Radiation Measurement (ARM) Climate Research Facility Data Archive interact with the more than 2000 available types of datastreams. The survey also gathered information about data discovery and data quality. The Market and Competitive Analysis group at Pacific Northwest National Laboratory worked with web administrators to develop a landing page from which users could access the survey. A survey invitation was sent by ARM via email to about 6100 users on February 22, 2012. The invitation was also posted on the ARM website and Facebook page. Reminders were sent via e-mail and posted on Facebook while the survey was open, February 22-March 23, 2012.

  3. RURAL/URBAN RESIDENCE, ACCESS, AND PERCEIVED NEED FOR TREATMENT AMONG AFRICAN AMERICAN COCAINE USERS

    Science.gov (United States)

    BORDERS, TYRONE F.; BOOTH, BRENDA M.; STEWART, KATHARINE E.; CHENEY, ANN M.; CURRAN, GEOFFREY M.

    2014-01-01

    Objective To examine how rural/urban residence, perceived access, and other factors impede or facilitate perceived need for drug use treatment, a concept closely linked to treatment utilization. Study Design Two hundred rural and 200 urban African American cocaine users who were not receiving treatment were recruited via Respondent-Driven Sampling and completed a structured in-person interview. Bivariate and multivariate analyses were conducted to test the associations between perceived need and rural/urban residence, perceived access, and other predisposing (eg, demographics), enabling (eg, insurance), and health factors (eg, psychiatric distress). Principal Findings In bivariate analyses, rural relative to urban cocaine users reported lower perceived treatment need (37% vs 48%), availability, affordability, overall ease of access, and effectiveness, as well as lower perceived acceptability of residential, outpatient, self-help, and hospital-based services. In multivariate analyses, there was a significant interaction between rural/urban residence and the acceptability of religious counseling. At the highest level of acceptability, rural users had lower odds of perceived need (OR=.23); at the lowest level, rural users had higher odds of perceived need (OR=2.74) than urban users. Among rural users, the acceptability of religious counseling was negatively associated with perceived need (OR=.64). Ease of access was negatively associated (OR=.71) whereas local treatment effectiveness (OR=1.47) and the acceptability of hospital-based treatment (OR=1.29) were positively associated with perceived need among all users. Conclusions Our findings suggest rural/urban disparities in perceived need and access to drug use treatment. Among rural and urban cocaine users, improving perceptions of treatment effectiveness and expanding hospital-based services could promote treatment seeking. PMID:25213603

  4. Channel access delay and buffer distribution of two-user opportunistic scheduling schemes in wireless networks

    KAUST Repository

    Hossain, Md Jahangir

    2010-07-01

    In our earlier works, we proposed rate adaptive hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) and hybrid two-user scheduling (HTS) schemes. The proposed schemes are innovative in the sense that they include a second user in the transmission opportunistically using hierarchical modulations. As such the frequency of information access of the users increases without any degradation of the system spectral efficiency (SSE) compared to the classical opportunistic scheduling scheme. In this paper, we analyze channel access delay of an incoming packet at the base station (BS) buffer when our proposed TBS and HTS schemes are employed at the BS. Specifically, using a queuing analytic model we derive channel access delay as well as buffer distribution of the packets that wait at BS buffer for down-link (DL) transmission. We compare performance of the TBS and HTS schemes with that of the classical single user opportunistic schemes namely, absolute carrier-to-noise ratio (CNR)-based single user scheduling (ASS) and normalized CNR-based single user scheduling (NSS). For an independent and identically distributed (i.i.d.) fading environment, our proposed scheme can improve packet\\'s access delay performance compared to the ASS. Selected numerical results in an independent but non-identically distributed (i.n.d.) fading environment show that our proposed HTS achieves overall good channel access delay performance. © 2010 IEEE.

  5. Personalisation meets accessibility : towards the design of individual user interfaces for all. Position paper

    NARCIS (Netherlands)

    Cremers, A.H.M.; Neerincx, M.A.

    2004-01-01

    Current accessibility guidelines are composed to allow users with special needs to more easily and comfortably access the Internet. However, most of the guidelines are written with both a 'standard' device and a 'standard' use context in mind, which is the user sitting in front of a desktop

  6. Evaluating accessibility to Bangkok Metro Systems using multi-dimensional criteria across user groups

    Directory of Open Access Journals (Sweden)

    Duangporn Prasertsubpakij

    2012-07-01

    Full Text Available Metro systems act as fast and efficient transport systems for many modern metropolises; however, enhancing higher usage of such systems often conflicts with providing suitable accessibility options. The traditional approach of metro accessibility studies seems to be an ineffective measure to gage sustainable access in which the equal rights of all users are taken into account. Bangkok Metropolitan Region (BMR transportation has increasingly relied on the role of two mass rapid transport systems publicly called “BTS Skytrain” and “MRT Subway”, due to limited availability of land and massive road congestion; however, access to such transit arguably treats some vulnerable groups, especially women, the elderly and disabled people unfairly. This study constructs a multi-dimensional assessment of accessibility considerations to scrutinize how user groups access metro services based on BMR empirical case. 600 individual passengers at various stations were asked to rate the questionnaire that simultaneously considers accessibility aspects of spatial, feeder connectivity, temporal, comfort/safety, psychosocial and other dimensions. It was interestingly found by user disaggregated accessibility model that the lower the accessibility perceptions—related uncomfortable and unsafe environment conditions, the greater the equitable access to services, as illustrated by MRT — Hua Lumphong and MRT — Petchaburi stations. The study suggests that, to balance the access priorities of groups on services, policy actions should emphasize acceptably safe access for individuals, cost efficient feeder services connecting the metro lines, socioeconomic influences and time allocation. Insightful discussions on integrated approach balancing different dimensions of accessibility and recommendations would contribute to accessibility-based knowledge and potential propensity to use the public transits towards transport sustainability.

  7. 75 FR 4101 - Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior...

    Science.gov (United States)

    2010-01-26

    ... DEPARTMENT OF HOUSING AND URBAN DEVELOPMENT [Docket No. FR-5376-N-05] Enterprise Income Verification (EIV) System User Access Authorization Form and Rules of Behavior and User Agreement AGENCY... Access, Authorization Form and Rules Of Behavior and User Agreement. OMB Approval Number: 2577-New. Form...

  8. Towards a Two-Dimensional Framework for User Models

    NARCIS (Netherlands)

    Vrieze, P.T. de; Bommel, P. van; Klok, J.; Weide, Th.P. van der; Gensel, Jérôme; Sèdes, Florence; Martin, Hervé

    2003-01-01

    The focus of this paper is user modeling in the context of personalisation of information systems. Such a personalisation is essential to give users the feeling that the system is easily accessible. The way this adaptive personalization works is very dependent on the adaptation model that is

  9. An Accessible Video Player for Older People: Issues from a User Test

    OpenAIRE

    Villena, Johana M. Rosas; Ramos, Bruno C.; Fortes, Renata P.M.; Goularte, Rudinei

    2014-01-01

    There is a huge availability of videos that have been produced in a very fast and wide way, along with the popularity of Internet. This scenario should be carefully considered by the video authors since many users have different needs. It is important to keep in mind the accessibility requirements so that any user can overcome the barriers to access content regardless of their limitations imposed by either impairment or some temporary restriction. The current video players present barriers fo...

  10. National Radiobiology Archives Distributed Access User's Manual, Version 1. 1

    Energy Technology Data Exchange (ETDEWEB)

    Smith, S.K.; Prather, J.C.; Ligotke, E.K.; Watson, C.R.

    1992-06-01

    This supplement to the NRA Distributed Access User's manual (PNL-7877), November 1991, describes installation and use of Version 1.1 of the software package; this is not a replacement of the previous manual. Version 1.1 of the NRA Distributed Access Package is a maintenance release. It eliminates several bugs, and includes a few new features which are described in this manual. Although the appearance of some menu screens has changed, we are confident that the Version 1.0 User's Manual will provide an adequate introduction to the system. Users who are unfamiliar with Version 1.0 may wish to experiment with that version before moving on to Version 1.1.

  11. Automating testbed documentation and database access using World Wide Web (WWW) tools

    Science.gov (United States)

    Ames, Charles; Auernheimer, Brent; Lee, Young H.

    1994-01-01

    A method for providing uniform transparent access to disparate distributed information systems was demonstrated. A prototype testing interface was developed to access documentation and information using publicly available hypermedia tools. The prototype gives testers a uniform, platform-independent user interface to on-line documentation, user manuals, and mission-specific test and operations data. Mosaic was the common user interface, and HTML (Hypertext Markup Language) provided hypertext capability.

  12. Making Patron Data Work Harder: User Search Terms as Access Points?

    Directory of Open Access Journals (Sweden)

    Jason A. Clark

    2008-06-01

    Full Text Available Montana State University (MSU Libraries are experimenting with re-using patron-generated data to create browseable access points for the Electronic Theses and Dissertations (ETD collection. A beta QueryCatcher module logs recent search terms and the number of associated hits. These terms are used to create browseable lists and tagclouds which enhance access to the ETD collection. Gathering and reusing information about user behavior is an emerging trend in web application development. This article outlines MSU Libraries' reasoning for moving towards a user-generated model and provides a complete walkthrough of the steps in building the application and example code.

  13. The Searching Behavior of Remote Users: A Study of One Online Public Access Catalog (OPAC).

    Science.gov (United States)

    Kalin, Sally W.

    1991-01-01

    Describes a study that was conducted to determine whether the searching behavior of remote users of LIAS (Library Information Access System), Pennsylvania State University's online public access catalog (OPAC), differed from those using the OPAC within the library. Differences in search strategies and in user satisfaction are discussed. (eight…

  14. Authentication and Access: Accommodating Public Users in an Academic World

    Directory of Open Access Journals (Sweden)

    Lynne Weber

    2010-09-01

    Full Text Available In the fall of 2004, the Academic Computing Center, a division of the Information Technology Services Department (ITS at Minnesota State University, Mankato took over responsibility for the computers in the public areas of Memorial Library. For the first time, affiliated Memorial Library users were required to authenticate using a campus username and password, a change that effectively eliminated computer access for anyone not part of the university community. This posed a dilemma for the librarians. Because of its Federal Depository status, the library had a responsibility to provide general access to both print and online government publications for the general public. Furthermore, the library had a long tradition of providing guest access to most library resources, and there was reluctance to abandon the practice. Therefore the librarians worked with ITS to retain a small group of six computers that did not require authentication and were clearly marked for community use, along with several standup, open-access computers on each floor used primarily for searching the library catalog. The additional need to provide computer access to high school students visiting the library for research and instruction led to more discussions with ITS and resulted in a means of generating temporary usernames and passwords through a Web form. These user accommodations were implemented in the library without creating a written policy governing the use of open-access computers.

  15. Deaf New Zealand Sign Language users' access to healthcare.

    Science.gov (United States)

    Witko, Joanne; Boyles, Pauline; Smiler, Kirsten; McKee, Rachel

    2017-12-01

    The research described was undertaken as part of a Sub-Regional Disability Strategy 2017-2022 across the Wairarapa, Hutt Valley and Capital and Coast District Health Boards (DHBs). The aim was to investigate deaf New Zealand Sign Language (NZSL) users' quality of access to health services. Findings have formed the basis for developing a 'NZSL plan' for DHBs in the Wellington sub-region. Qualitative data was collected from 56 deaf participants and family members about their experiences of healthcare services via focus group, individual interviews and online survey, which were thematically analysed. Contextual perspective was gained from 57 healthcare professionals at five meetings. Two professionals were interviewed, and 65 staff responded to an online survey. A deaf steering group co-designed the framework and methods, and validated findings. Key issues reported across the health system include: inconsistent interpreter provision; lack of informed consent for treatment via communication in NZSL; limited access to general health information in NZSL and the reduced ability of deaf patients to understand and comply with treatment options. This problematic communication with NZSL users echoes international evidence and other documented local evidence for patients with limited English proficiency. Deaf NZSL users face multiple barriers to equitable healthcare, stemming from linguistic and educational factors and inaccessible service delivery. These need to be addressed through policy and training for healthcare personnel that enable effective systemic responses to NZSL users. Deaf participants emphasise that recognition of their identity as members of a language community is central to improving their healthcare experiences.

  16. Evaluation of perception on environmental movement: accessibility centered in the user

    Directory of Open Access Journals (Sweden)

    Éden Fernando Batista Ferreira

    2013-04-01

    Full Text Available Introduction: The discussion about accessibility in urban environments is observed in several studies,but the vast majority focuses attention on structural elements and not the user. Objective: This study proposes a method of assessing urban environmental movement, from the point of view of its users, to identify the relationship between perceived barriers and facilitators in the environment movement and aspects of the body functions and structures and the users’ participation in activities, which denotes the degree of accessibility of these people in this space. Method: It describes a case study in Belem, Para state, utilizing a method of assessing the perception of users, based on indicators of environmental factors, activity and participation, structure and functions of the body, highlighted by the International Classification of Functioning, Disability and Health – ICF. Results:The main finding of this study indicates that people’s perceptions about their environment directly influences the movement involved in their occupations. Conclusion: Studies with this content are relevant and necessary in our current society, because they reveal how changes in major urban centers influence the accessibility and involvement of people in their occupations, thereby directly interfering with their health, quality of life, and participation in society.

  17. Making LibrariesAccessible for Visually Impaired Users: Practical Advice For Librarians

    Directory of Open Access Journals (Sweden)

    Devney Hamilton

    2011-12-01

    Full Text Available This article provides an introduction to making university libraries accessible to visually impaired users. It includes a summary of how visually impaired students access information and how libraries can provide access to materials, devices and software, and staff support to ensure visually impaired students ’ equal opportunity to use the library. The practical advice for librarians are based on interviews with 18 visually impaired university students and professionals who specialize in media, library services and information retrieval.

  18. Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System

    Institute of Scientific and Technical Information of China (English)

    Wen-Min Li; Xue-Lei Li; Qiao-Yan Wen; Shuo Zhang; Hua Zhang

    2017-01-01

    In hybrid cloud computing, encrypted data access control can provide a fine-grained access method for orga-nizations to enact policies closer to organizational policies. This paper presents an improved CP-ABE (ciphertext-policy attribute-based encryption) scheme to construct an encrypted data access control solution that is suitable for mobile users in hybrid cloud system. In our improvement, we split the original decryption keys into a control key, a secret key and a set of transformation keys. The private cloud managed by the organization administrator takes charge of updating the transformation keys using the control key. It helps to handle the situation of flexible access management and attribute alteration. Meanwhile, the mobile user's single secret key remains unchanged as well as the ciphertext even if the data user's attribute has been revoked. In addition, we modify the access control list through adding the attributes with corresponding control key and transformation keys so as to manage user privileges depending upon the system version. Finally, the analysis shows that our scheme is secure, flexible and efficient to be applied in mobile hybrid cloud computing.

  19. Autonomy and Housing Accessibility Among Powered Mobility Device Users

    Science.gov (United States)

    Brandt, Åse; Lexell, Eva Månsson; Iwarsson, Susanne

    2015-01-01

    OBJECTIVE. To describe environmental barriers, accessibility problems, and powered mobility device (PMD) users’ autonomy indoors and outdoors; to determine the home environmental barriers that generated the most housing accessibility problems indoors, at entrances, and in the close exterior surroundings; and to examine personal factors and environmental components and their association with indoor and outdoor autonomy. METHOD. This cross-sectional study was based on data collected from a sample of 48 PMD users with a spinal cord injury (SCI) using the Impact of Participation and Autonomy and the Housing Enabler instruments. Descriptive statistics and logistic regression were used. RESULTS. More years living with SCI predicted less restriction in autonomy indoors, whereas more functional limitations and accessibility problems related to entrance doors predicted more restriction in autonomy outdoors. CONCLUSION. To enable optimized PMD use, practitioners must pay attention to the relationship between client autonomy and housing accessibility problems. PMID:26356666

  20. Comparison of trial participants and open access users of a web-based physical activity intervention regarding adherence, attrition, and repeated participation.

    Science.gov (United States)

    Wanner, Miriam; Martin-Diener, Eva; Bauer, Georg; Braun-Fahrländer, Charlotte; Martin, Brian W

    2010-02-10

    Web-based interventions are popular for promoting healthy lifestyles such as physical activity. However, little is known about user characteristics, adherence, attrition, and predictors of repeated participation on open access physical activity websites. The focus of this study was Active-online, a Web-based individually tailored physical activity intervention. The aims were (1) to assess and compare user characteristics and adherence to the website (a) in the open access context over time from 2003 to 2009, and (b) between trial participants and open access users; and (2) to analyze attrition and predictors of repeated use among participants in a randomized controlled trial compared with registered open access users. Data routinely recorded in the Active-online user database were used. Adherence was defined as: the number of pages viewed, the proportion of visits during which a tailored module was begun, the proportion of visits during which tailored feedback was received, and the time spent in the tailored modules. Adherence was analyzed according to six one-year periods (2003-2009) and according to the context (trial or open access) based on first visits and longest visits. Attrition and predictors of repeated participation were compared between trial participants and open access users. The number of recorded visits per year on Active-online decreased from 42,626 in 2003-2004 to 8343 in 2008-2009 (each of six one-year time periods ran from April 23 to April 22 of the following year). The mean age of users was between 38.4 and 43.1 years in all time periods and both contexts. The proportion of women increased from 49.5% in 2003-2004 to 61.3% in 2008-2009 (Popen access users. For open access users, adherence was similar during the first and the longest visits; for trial participants, adherence was lower during the first visits and higher during the longest visits. Of registered open access users and trial participants, 25.8% and 67.3% respectively visited Active

  1. User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns

    Directory of Open Access Journals (Sweden)

    Jennifer Golbeck

    2016-03-01

    Full Text Available Users share vast amounts of personal information online, but are they fully aware of what information they are sharing and with whom? In this paper, we focused on Facebook apps and set out to understand how concerned users are about privacy and how well-informed they are about what personal data apps can access. We found that initially, subjects were generally under-informed about what data apps could access from their profiles. After viewing additional information about these permissions, subjects’ concern about privacy on Facebook increased. Subjects’ understanding of what data apps were able to access increased, although even after receiving explicit information on the topic, many subjects still did not fully understand the extent to which apps could access their data.

  2. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  3. Making Patron Data Work Harder: User Search Terms as Access Points?

    OpenAIRE

    Jason A. Clark

    2008-01-01

    Montana State University (MSU) Libraries are experimenting with re-using patron-generated data to create browseable access points for the Electronic Theses and Dissertations (ETD) collection. A beta QueryCatcher module logs recent search terms and the number of associated hits. These terms are used to create browseable lists and tagclouds which enhance access to the ETD collection. Gathering and reusing information about user behavior is an emerging trend in web application development. This ...

  4. Unofficial policy: access to housing, housing information and social services among homeless drug users in Hartford, Connecticut

    Directory of Open Access Journals (Sweden)

    Corbett A Michelle

    2007-03-01

    Full Text Available Abstract Background Much research has shown that the homeless have higher rates of substance abuse problems than housed populations and that substance abuse increases individuals' vulnerability to homelessness. However, the effects of housing policies on drug users' access to housing have been understudied to date. This paper will look at the "unofficial" housing policies that affect drug users' access to housing. Methods Qualitative interviews were conducted with 65 active users of heroin and cocaine at baseline, 3 and 6 months. Participants were purposively sampled to reflect a variety of housing statuses including homeless on the streets, in shelters, "doubled-up" with family or friends, or permanently housed in subsidized, unsubsidized or supportive housing. Key informant interviews and two focus group interviews were conducted with 15 housing caseworkers. Data were analyzed to explore the processes by which drug users receive information about different housing subsidies and welfare benefits, and their experiences in applying for these. Results A number of unofficial policy mechanisms limit drug users' access to housing, information and services, including limited outreach to non-shelter using homeless regarding housing programs, service provider priorities, and service provider discretion in processing applications and providing services. Conclusion Unofficial policy, i.e. the mechanisms used by caseworkers to ration scarce housing resources, is as important as official housing policies in limiting drug users' access to housing. Drug users' descriptions of their experiences working with caseworkers to obtain permanent, affordable housing, provide insights as to how access to supportive and subsidized housing can be improved for this population.

  5. User needs in television archive access

    DEFF Research Database (Denmark)

    Kirkegaard Lunn, Brian

    2009-01-01

    This paper presents a methodical approach for generating deep knowledge about users, as a prerequisite for design and construction of digital information access to cultural heritage information objects. We exemplify this methodical approach by reporting on an explorative study of information need...... topic or content; and 4) Muddled topic or content. Fourthly, the interviewees' needs consist of four phases: 1) Getting an overview of transmitted broadcasts; 2) Identification of borderline exemplars; 3) Selection of specific programmes; and 4) Verification of facts. The present paper presents novel...... research on characteristics of information needs in a television broadcast context. We demonstrate how one may go about generating knowledge which is imperative for the design and construction of future broadcast retrieval systems. Udgivelsesdato: 2009...

  6. Designing the OPAC User Interface to Improve Access and Retrieval.

    Science.gov (United States)

    Basista, Thomas; And Others

    1991-01-01

    Discussion of problems with retrieval of records in library online public access catalogs (OPACs) focuses on an ongoing research project at the Indiana University of Pennsylvania (IUP) that has been trying to improve subject retrieval vocabulary control using natural and thesaural language and on the design of a good graphical user interface.…

  7. Monitoring User-Based Accessibility Assessment in Urban Environments and in Public Buildings

    Directory of Open Access Journals (Sweden)

    Gintaras Stauskis

    2018-04-01

    Full Text Available The research features analysis of user-experience-based accessibility assessment and progress monitoring of buildings and public spaces; this analysis is used as a tool for facilitating the development of humane, socially sustainable and an inclusive urban environment. A group of users representing people with different kinds of disabilities, the elderly and families with children was created to assess the quality of access to various buildings with different functions and locations across Vilnius and in Singapore. A school, two hospitals, a rehab centre and two offices were selected for access monitoring in Vilnius City, while a hotel, a café and two metro stations with public squares were chosen for access assessment in Singapore. As the same method was principally applied to assess accessibility of selected buildings in Vilnius City in 2000 and 2017 and in Singapore in 2012, the article draws a comparative analysis of access levels in these two cities located in different global regions. The results show a definite improvement of access quality over time and also identify the critical aspects in this process. The segment of plot planning represents the lowest quality of access for all assessed building types as compared to the building segment and the external–internal element segments. The paper also draws conclusions that access improvement is a continuous process of implementing advanced urban policy instruments, and city planners can contribute to it by constantly analysing and presenting to public the monitoring data about the progress in access improvement. Comparing the assessment results between Vilnius City and Singapore – cities that are located in different global regions and in different socio-economic environments – provides a practical tool for benchmarking and setting the priorities for this process.

  8. Subject Access Problems of Different Types of OPAC Users Or, the Double Challenge.

    Science.gov (United States)

    Cochrane, Pauline A.

    1989-01-01

    Reviews the problems of users of online public access catalogs and argues that it is necessary to think of all searching problems as systems problems rather than user failures, and to concentrate research in the area of systems enhancements. A list of improved tools needed for subject searching in online catalogs is identified. (CLB)

  9. AquaUsers: Improving access to remotely sensed data for non-specialists

    Science.gov (United States)

    Clements, Oliver; Walker, Peter; Calton, Ben; Miller, Peter

    2015-04-01

    In recent years more and more complex remotely sensed data have been made available to the public by national and international agencies. These data are also reprocessed by different organisations to produce secondary products that are of specific need to a community. For instance the production of chlorophyll concentration maps from ocean colour data provided by NASA for the marine community. Providing access to such data has normally been focused on simply making the data available with appropriate metadata so that domain specialists can make use of it. One area that has seen significant investment, both of time and money, has been in the production of web based data portals. Primarily these have focused on spatial data. By providing a web map visualisation users are able to quickly assess both spatial coverage and data values. Data portal improvements have been possible thanks to advancements in back end data servers such as Thredds and ncWMS as well as improvements in front-end libraries for data visualisation including OpenLayers and D3. Data portals that make use of these technological advancements have aimed at improving the access and use of data by trained scientific domain specialists. There is now a push to improve access to these systems by non-scientific domain specialists through several European Commission funded projects, including OPEC and AquaUsers. These projects have improved upon an open source web GIS portal created by Plymouth Marine Laboratory [https://github.com/pmlrsg/GISportal]. We will present the latest version of our GIS portal, discuss the designs steps taken to achieve the latest build and share user stories as to how non-domain specialists are now able to utilise the system and get benefits from remotely sensed data. A first version was produced and disseminated to end users for feedback. At this stage the end users included government advisors, fish farmers and scientific groups with no specific GIS training or knowledge. This

  10. Impact of Users Identities and Access Conditions on Downlink Performance in Closed Small-Cell Networks

    KAUST Repository

    Radaydeh, Redha; Gaaloul, Fakhreddine; Alouini, Mohamed-Slim

    2015-01-01

    This paper investigates the effect of various operation parameters on the downlink user performance in overlaid small-cell networks. The case study considers closed-access small cells (e.g., femtocells), wherein only active authorized user

  11. Interoperable Access to NCAR Research Data Archive Collections

    Science.gov (United States)

    Schuster, D.; Ji, Z.; Worley, S. J.; Manross, K.

    2014-12-01

    The National Center for Atmospheric Research (NCAR) Research Data Archive (RDA) provides free access to 600+ observational and gridded dataset collections. The RDA is designed to support atmospheric and related sciences research, updated frequently where datasets have ongoing production, and serves data to 10,000 unique users annually. The traditional data access options include web-based direct archive file downloads, user selected data subsets and format conversions produced by server-side computations, and client and cURL-based APIs for routine scripted data retrieval. To enhance user experience and utility, the RDA now also offers THREDDS Data Server (TDS) access for many highly valued dataset collections. TDS offered datasets are presented as aggregations, enabling users to access an entire dataset collection, that can be comprised of 1000's of files, through a single virtual file. The OPeNDAP protocol, supported by the TDS, allows compatible tools to open and access these virtual files remotely, and make the native data file format transparent to the end user. The combined functionality (TDS/OPeNDAP) gives users the ability to browse, select, visualize, and download data from a complete dataset collection without having to transfer archive files to a local host. This presentation will review the TDS basics and describe the specific TDS implementation on the RDA's diverse archive of GRIB-1, GRIB-2, and gridded NetCDF formatted dataset collections. Potential future TDS implementation on in-situ observational dataset collections will be discussed. Illustrative sample cases will be used to highlight the end users benefits from this interoperable data access to the RDA.

  12. User-oriented information access by information need recontextualisation and articulation. Application in nuclear criticality safety

    International Nuclear Information System (INIS)

    Medini, Lionel

    2001-01-01

    This research thesis addresses the design methodology of a system of access to information which is based on an access to relevant information with respect to user needs. In a first part, the author addresses the various issues related to access to information and to information understanding. The next part addresses the involved methods and tools and presents the operational approach adopted for this research regarding access to information. Different disciplines are addressed (knowledge management, ergonomics and information science) and different technologies are used (W3 and XML, DVP, ActiveX, pdf format and the Adobe suite). In the core chapter, the author reports the design of a LMCE (a multi-user book of electronic knowledge) which allows both hypermedia navigation in knowledge diagrams and a construction of a document query. This design is based on a knowledge-management modelling to define diagrams, on ergonomics modelling for user profile identification, and on information science for a specific indexing of the information system. The prototype can be visualized with a web browser such as Internet Explorer 5. The author reports a first assessment and discusses the contribution of his approach to the problematic of access to information which is to be applied to nuclear criticality safety [fr

  13. Accessibility through user-centred and Inclusive Design processes

    DEFF Research Database (Denmark)

    Herriott, Richard

    2014-01-01

    This PhD dissertation addresses the subject of accessibility through user-centred and Inclusive Design processes (ID). The project takes as its starting point the observation that the concept of Inclusive Design is not adequately delimited. The supporting literature in the field of ID is structured...... around the fact that the needs of individuals with reduced capabilities compared to the norm (referred to for convenience as "the elderly and disabled") have not been properly addressed by standard design processes. In response to this fact, ID is a proposed design method to find more effective means...

  14. User experience with a health insurance coverage and benefit-package access: implications for policy implementation towards expansion in Nigeria.

    Science.gov (United States)

    Mohammed, Shafiu; Aji, Budi; Bermejo, Justo Lorenzo; Souares, Aurelia; Dong, Hengjin; Sauerborn, Rainer

    2016-04-01

    Developing countries are devising strategies and mechanisms to expand coverage and benefit-package access for their citizens through national health insurance schemes (NHIS). In Nigeria, the scheme aims to provide affordable healthcare services to insured-persons and their dependants. However, inclusion of dependants is restricted to four biological children and a spouse per user. This study assesses the progress of implementation of the NHIS in Nigeria, relating to coverage and benefit-package access, and examines individual factors associated with the implementation, according to users' perspectives. A retrospective, cross-sectional survey was done between October 2010 and March 2011 in Kaduna state and 796 users were randomly interviewed. Questions regarding coverage of immediate-family members and access to benefit-package for treatment were analysed. Indicators of coverage and benefit-package access were each further aggregated and assessed by unit-weighted composite. The additive-ordinary least square regression model was used to identify user factors that may influence coverage and benefit-package access. With respect to coverage, immediate-dependants were included for 62.3% of the users, and 49.6 rated this inclusion 'good' (49.6%). In contrast, 60.2% supported the abolishment of the policy restriction for non-inclusion of enrolees' additional children and spouses. With respect to benefit-package access, 82.7% of users had received full treatments, and 77.6% of them rated this as 'good'. Also, 14.4% of users had been refused treatments because they could not afford them. The coverage of immediate-dependants was associated with age, sex, educational status, children and enrolment duration. The benefit-package access was associated with types of providers, marital status and duration of enrolment. This study revealed that coverage of family members was relatively poor, while benefit-package access was more adequate. Non-inclusion of family members could

  15. Improving User Access to the Integrated Multi-Satellite Retrievals for GPM (IMERG) Products

    Science.gov (United States)

    Huffman, George; Bolvin, David; Nelkin, Eric; Kidd, Christopher

    2016-04-01

    The U.S. Global Precipitation Measurement mission (GPM) team has developed the Integrated Multi-satellitE Retrievals for GPM (IMERG) algorithm to take advantage of the international constellation of precipitation-relevant satellites and the Global Precipitation Climatology Centre surface precipitation gauge analysis. The goal is to provide a long record of homogeneous, high-resolution quasi-global estimates of precipitation. While expert scientific researchers are major users of the IMERG products, it is clear that many other user communities and disciplines also desire access to the data for wide-ranging applications. Lessons learned during the Tropical Rainfall Measuring Mission, the predecessor to GPM, led to some basic design choices that provided the framework for supporting multiple user bases. For example, two near-real-time "runs" are computed, the Early and Late (currently 5 and 15 hours after observation time, respectively), then the Final Run about 3 months later. The datasets contain multiple fields that provide insight into the computation of the complete precipitation data field, as well as diagnostic (currently) estimates of the precipitation's phase. In parallel with this, the archive sites are working to provide the IMERG data in a variety of formats, and with subsetting and simple interactive analysis to make the data more easily available to non-expert users. The various options for accessing the data are summarized under the pmm.nasa.gov data access page. The talk will end by considering the feasibility of major user requests, including polar coverage, a simplified Data Quality Index, and reduced data latency for the Early Run. In brief, the first two are challenging, but under the team's control. The last requires significant action by some of the satellite data providers.

  16. Creating Accessible Science Museums with User-Activated Environmental Audio Beacons (Ping!)

    Science.gov (United States)

    Landau, Steven; Wiener, William; Naghshineh, Koorosh; Giusti, Ellen

    2005-01-01

    In 2003, Touch Graphics Company carried out research on a new invention that promises to improve accessibility to science museums for visitors who are visually impaired. The system, nicknamed Ping!, allows users to navigate an exhibit area, listen to audio descriptions, and interact with exhibits using a cell phone-based interface. The system…

  17. Access to IEEE Electronic Library

    CERN Multimedia

    2007-01-01

    From 2007, the CERN Library now offers readers online access to the complete IEEE Electronic Library (Institute of Electrical and Electronics Engineers). This new licence gives unlimited online access to all IEEE and IET (previously IEE) journals and proceedings as well as all current IEEE standards and selected archived ones. Some of the titles offer volumes back to 1913. This service currently represents more than 1,400,000 full-text articles! This leading engineering information resource replaces the previous service, a sub-product of the IEEE database called 'IEEE Enterprise', which offered online access to the complete collection of IEEE journals and proceedings, but with limited features. The service had become so popular that the CERN Working Group for Acquisitions recommended that the Library subscribe to the complete IEEE Electronic Library for 2007. Usage statistics for recent months showed there was a demand for the service from a large community of CERN users and we were aware that many users h...

  18. SoNeUCON_{ABC}Pro: an access control model for social networks with translucent user provenance

    OpenAIRE

    González Manzano, Lorena; Slaymaker, Mark; Fuentes García Romero de Tejada, José María de; Vayenas, Dimitris

    2018-01-01

    Proceedings of: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017 Web-Based Social Networks (WBSNs) are used by millions of people worldwide. While WBSNs provide many benefits, privacy preservation is a concern. The management of access control can help to assure data is accessed by authorized users. However, it is critical to provide sufficient flexibility so that a rich set of conditions may be imposed by users. In this paper we coi...

  19. Virtual reality for accessibility assessment of a built environment for a wheelchair user

    OpenAIRE

    MOUSSAOUI, Abdelhak; PRUSKI, Alain; MAAOUI, Choubeila

    2012-01-01

    The aging world population requires more attention to the autonomy of individuals. The impaired physical abilities need changes in the built environment for an optimal use. Due to physical limitations, aged persons frequently become users of a wheelchair which also leads to limitations in accessing their homes. This paper describes a tool for evaluating mobility and grasping, thus allowing housing professionals to assess the needed changes in terms of accessibility. This tool, which uses the ...

  20. Optical code division multiple access secure communications systems with rapid reconfigurable polarization shift key user code

    Science.gov (United States)

    Gao, Kaiqiang; Wu, Chongqing; Sheng, Xinzhi; Shang, Chao; Liu, Lanlan; Wang, Jian

    2015-09-01

    An optical code division multiple access (OCDMA) secure communications system scheme with rapid reconfigurable polarization shift key (Pol-SK) bipolar user code is proposed and demonstrated. Compared to fix code OCDMA, by constantly changing the user code, the performance of anti-eavesdropping is greatly improved. The Pol-SK OCDMA experiment with a 10 Gchip/s user code and a 1.25 Gb/s user data of payload has been realized, which means this scheme has better tolerance and could be easily realized.

  1. Open Access Complements Interlibrary Loan Services, but Additional User Education is

    Directory of Open Access Journals (Sweden)

    Richard Hayman

    2016-03-01

    15% of articles requested (n=170 were filled using a gold OA source, and that another 30 article requests (~2.6% were filled with materials available in the public domain. This leads to the conclusion that the majority of article requests are filled using green OA sources. As the library also includes OA collections within its electronic resources, staff filled 13% of ILL article requests (n=152 using journals and repositories from these sources. Another 16% of article requests were filled using a combination of various online open repositories, including subject repositories (n=83, institutional repositories (n=84, or national or consortial repositories (n=16. The author includes a similar breakdown of fulfillment rates and sources for the other main categories explored – books and book chapters, theses and dissertations, conference papers, and reports – representing a combined 27% of all OA ILL requests. Regarding this content, it is noteworthy that overall open access requests for these material categories has dropped across each category when compared to the author’s previous study, with the exception of report requests, which more than doubled compared to that previous study. The study includes a brief overview of the user status for users making the various open access requests, with undergraduate students (n=283 and graduate students (n=807 combined making 70% of all requests. Subject areas are also briefly examined, with ILL requests coming from 63 different schools or departments across the library system. The top 15 are reported, with Psychology being the top requester (n=198, followed closely by Engineering & Technology (n=182. The author notes that 7 of the top 15 are STEM or health science disciplines. Conclusion – The rate of ILL requests for OA materials shows that library users continue to struggle with information retrieval. The researcher concludes that in many cases, making an ILL request is easier for the user than completing a thorough

  2. Accessibility to Specialized Public Oral Health Services from the Perspective of Brazilian Users

    Science.gov (United States)

    de Castro, Ricardo Dias; Rangel, Marianne de Lucena; da Silva, Marcos André Azevedo; de Lucena, Brunna Thaís Lucwu; Cavalcanti, Alessandro Leite; Bonan, Paulo Rogério Ferreti; Oliveira, Julyana de Araújo

    2016-01-01

    The Specialized Dental Clinics (SDCs) represent the first government initiative in Latin America aimed at providing specialized oral health services. This study sought to evaluate the organizational accessibility to specialized oral health care services in Brazil and to understand the factors that may be associated with accessibility from the user’s perspective. This epidemiological, cross-sectional and quantitative study was conducted by means of interviews with individuals who sought specialized public oral health services in the city of João Pessoa, Paraíba, Brazil, and consisted of a sample of 590 individuals. Users expressed a favorable view of the classification and resolutive nature of specialized services offered by Brazilian public health. The binary logistic regression analysis revealed weak points highlighting the difficulty involved in obtaining such treatments leading to unfavorable evaluations. In the resolutive nature item, difficulty in accessing the location, queues and lack of materials and equipment were highlighted as statistically significant unfavorable aspects. While many of the users considered the service to be resolutive, weaknesses were mentioned that need to be detected to promote improvements and to prevent other health models adopted worldwide from reproducing the same flaws. PMID:27775584

  3. Capacity bounds for the 2-user Gaussian IM-DD optical multiple-access channel

    KAUST Repository

    Al-Ebraheemy, Omer M. S.

    2016-11-01

    Optical wireless communications (OWC) is a potential solution for coping with the mismatch between the users growing demand for higher data-rates and the wireless network capabilities. In this paper, a multi-user OWC scenario is studied from an in formation-theoretic perspective. The studied network consists of two users communicating simultaneously with one access point using OWC, thus establishing an optical uplink channel. The capacity of this network is an important metric which reflects the highest possible communication rates that can be achieved over this channel. Capacity outer and inner bounds are derived, and are shown to be fairly tight in the high signal-to-noise ratio regime. © 2016 IEEE.

  4. SAM: Secure Access of Media Independent Information Service with User Anonymity

    Directory of Open Access Journals (Sweden)

    Li Guangsong

    2010-01-01

    Full Text Available Seamless handover across different access technologies is very important in the future wireless networks. To optimize vertical handover in heterogeneous networks, IEEE 802.21 standard defines Media Independent Handover (MIH services. The MIH services can be a new target to attackers, which will be the main concern for equipment vendors and service providers. In this paper, we focus specifically on security of Media Independent Information Service (MIIS and present a new access authentication scheme with user anonymity for MIIS. The protocol can be used to establish a secure channel between the mobile node and the information server. Security and performance of the protocol are also analyzed in this paper.

  5. fNIRS suggests increased effort during executive access in ecstasy polydrug users.

    Science.gov (United States)

    Roberts, C A; Montgomery, C

    2015-05-01

    Ecstasy use is associated with cognitive impairment, believed to result from damage to 5-HT axons. Neuroimaging techniques to investigate executive dysfunction in ecstasy users provide a more sensitive measure of cognitive impairment than behavioural indicators. The present study assessed executive access to semantic memory in ecstasy polydrug users and non-users. Twenty ecstasy polydrug users and 20 non-user controls completed an oral variant of the Chicago Word Fluency Test (CWFT), whilst the haemodynamic response to the task was measured using functional near-infrared spectroscopy (fNIRS). There were no between-group differences in many background measures including measures of sleep and mood state (anxiety, arousal, hedonic tone). No behavioural differences were observed on the CWFT. However, there were significant differences in oxy-Hb level change at several voxels relating to the left dorsolateral prefrontal cortex (DLPFC) and right medial prefrontal cortex (PFC) during the CWFT, indicating increased cognitive effort in ecstasy users relative to controls. Regression analyses showed that frequency of ecstasy use, total lifetime dose and amount used in the last 30 days was significant predictors of oxy-Hb increase at several voxels after controlling for alcohol and cannabis use indices. The results suggest that ecstasy users show increased activation in the PFC as a compensatory mechanism, to achieve equivalent performance to non-users. These findings are in agreement with much of the literature in the area which suggests that ecstasy may be a selective serotonin neurotoxin in humans.

  6. The Composition and Activities of Internet Users of China%中国网民构成与行为分析

    Institute of Scientific and Technical Information of China (English)

    王恩海

    2005-01-01

    The paper gives an overall analysis on Chinese Internet users' demographic structure and Internet behaviors. According to the survey result published in Jan, 2005 by China Internet Network Information Center(CNNIC), the paper makes it clear that who are the Internet users, when do they access Internet,where do they use Internet, how do they access Internet and what are they doing on Internet.

  7. The NCAR Research Data Archive's Hybrid Approach for Data Discovery and Access

    Science.gov (United States)

    Schuster, D.; Worley, S. J.

    2013-12-01

    The NCAR Research Data Archive (RDA http://rda.ucar.edu) maintains a variety of data discovery and access capabilities for it's 600+ dataset collections to support the varying needs of a diverse user community. In-house developed and standards-based community tools offer services to more than 10,000 users annually. By number of users the largest group is external and access the RDA through web based protocols; the internal NCAR HPC users are fewer in number, but typically access more data volume. This paper will detail the data discovery and access services maintained by the RDA to support both user groups, and show metrics that illustrate how the community is using the services. The distributed search capability enabled by standards-based community tools, such as Geoportal and an OAI-PMH access point that serves multiple metadata standards, provide pathways for external users to initially discover RDA holdings. From here, in-house developed web interfaces leverage primary discovery level metadata databases that support keyword and faceted searches. Internal NCAR HPC users, or those familiar with the RDA, may go directly to the dataset collection of interest and refine their search based on rich file collection metadata. Multiple levels of metadata have proven to be invaluable for discovery within terabyte-sized archives composed of many atmospheric or oceanic levels, hundreds of parameters, and often numerous grid and time resolutions. Once users find the data they want, their access needs may vary as well. A THREDDS data server running on targeted dataset collections enables remote file access through OPENDAP and other web based protocols primarily for external users. In-house developed tools give all users the capability to submit data subset extraction and format conversion requests through scalable, HPC based delayed mode batch processing. Users can monitor their RDA-based data processing progress and receive instructions on how to access the data when it is

  8. User Practices in Keyword and Boolean Searching on an Online Public Access Catalog.

    Science.gov (United States)

    Ensor, Pat

    1992-01-01

    Discussion of keyword and Boolean searching techniques in online public access catalogs (OPACs) focuses on a study conducted at Indiana State University that examined users' attitudes toward searching on NOTIS (Northwestern Online Total Integrated System). Relevant literature is reviewed, and implications for library instruction are suggested. (17…

  9. On Low-Complexity Full-diversity Detection In Multi-User MIMO Multiple-Access Channels

    KAUST Repository

    Ismail, Amr

    2014-01-28

    Multiple-input multiple-output (MIMO) techniques are becoming commonplace in recent wireless communication standards. This newly introduced dimension (i.e., space) can be efficiently used to mitigate the interference in the multi-user MIMO context. In this paper, we focus on the uplink of a MIMO multiple access channel (MAC) where perfect channel state information (CSI) is only available at the destination. We provide new sufficient conditions for a wide range of space-time block codes (STBC)s to achieve full-diversity under partial interference cancellation group decoding (PICGD) with or without successive interference cancellation (SIC) for completely blind users. Interference cancellation (IC) schemes for two and three users are then provided and shown to satisfy the full-diversity criteria. Beside the complexity reduction due to the fact that PICGD enables separate decoding of distinct users without sacrificing the diversity gain, further reduction of the decoding complexity may be obtained. In fact, thanks to the structure of the proposed schemes, the real and imaginary parts of each user\\'s symbols may be decoupled without any loss of performance. Our new IC scheme is shown to outperform recently proposed two-user IC scheme especially for high spectral efficiency while requiring significantly less decoding complexity.

  10. Application-Defined Decentralized Access Control

    Science.gov (United States)

    Xu, Yuanzhong; Dunn, Alan M.; Hofmann, Owen S.; Lee, Michael Z.; Mehdi, Syed Akbar; Witchel, Emmett

    2014-01-01

    DCAC is a practical OS-level access control system that supports application-defined principals. It allows normal users to perform administrative operations within their privilege, enabling isolation and privilege separation for applications. It does not require centralized policy specification or management, giving applications freedom to manage their principals while the policies are still enforced by the OS. DCAC uses hierarchically-named attributes as a generic framework for user-defined policies such as groups defined by normal users. For both local and networked file systems, its execution time overhead is between 0%–9% on file system microbenchmarks, and under 1% on applications. This paper shows the design and implementation of DCAC, as well as several real-world use cases, including sandboxing applications, enforcing server applications’ security policies, supporting NFS, and authenticating user-defined sub-principals in SSH, all with minimal code changes. PMID:25426493

  11. 77 FR 73455 - Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access...

    Science.gov (United States)

    2012-12-10

    ... Manager at [email protected]us.army.mil . References: Department of Defense Instruction number 8520.2... DEPARTMENT OF DEFENSE Department of the Army Transportation Workers Identification Card (TWIC) Removal for Commercial Users To Access Electronic Transportation Acquisition (ETA) AGENCY: Department of...

  12. 15 CFR Appendix A to Part 950 - Schedule of User Fees for Access to NOAA Environmental Data

    Science.gov (United States)

    2010-01-01

    ... NOAA Environmental Data A Appendix A to Part 950 Commerce and Foreign Trade Regulations Relating to..., App. A Appendix A to Part 950—Schedule of User Fees for Access to NOAA Environmental Data Name of product/data/publication/information/service Current fee New fee NOAA National Data Centers Standard User...

  13. How to give your users the LIS services they want

    CERN Document Server

    Pantry, Sheila

    2009-01-01

    With the challenges of a constantly changing job market, shifting information-seeking behaviour and a vast array of resources continually being produced, library and information services need to constantly keep one step, or more, ahead of their users. This text helps in understanding users of the services - the what, why, where, when, how and who.

  14. Accessibility Trends among Academic Library and Library School Web Sites in the USA and Canada

    Science.gov (United States)

    Schmetzke, Axel; Comeaux, David

    2009-01-01

    This paper focuses on the accessibility of North American library and library school Web sites for all users, including those with disabilities. Web accessibility data collected in 2006 are compared to those of 2000 and 2002. The findings of this follow-up study continue to give cause for concern: Despite improvements since 2002, library and…

  15. Inequities in accessibility to and utilisation of maternal health services in Ghana after user-fee exemption: a descriptive study.

    Science.gov (United States)

    Ganle, John K; Parker, Michael; Fitzpatrick, Raymond; Otupiri, Easmon

    2014-11-01

    Inequities in accessibility to, and utilisation of maternal healthcare services impede progress towards attainment of the maternal health-related Millennium Development Goals. The objective of this study is to examine the extent to which maternal health services are utilised in Ghana, and whether inequities in accessibility to and utilization of services have been eliminated following the implementation of a user-fee exemption policy, that aims to reduce financial barriers to access, reduce inequities in access, and improve access to and use of birthing services. We analyzed data from the 2007 Ghana Maternal Health Survey for inequities in access to and utilization of maternal health services. In measuring the inequities, frequency tables and cross-tabulations were used to compare rates of service utilization by region, residence and selected socio-demographic variables. Findings show marginal increases in accessibility to and utilisation of skilled antenatal, delivery and postnatal care services following the policy implementation (2003-2007). However, large gradients of inequities exist between geographic regions, urban and rural areas, and different socio-demographic, religious and ethnic groupings. More urban women (40%) than rural, 53% more women in the highest wealth quintile than women in the lowest, 38% more women in the best performing region (Central Region) than the worst (Upper East Region), and 48% more women with at least secondary education than those with no formal education, accessed and used all components of skilled maternal health services in the five years preceding the survey. Our findings raise questions about the potential equity and distributional benefits of Ghana's user-fee exemption policy, and the role of non-financial barriers or considerations. Exempting user-fees for maternal health services is a promising policy option for improving access to maternal health care, but might be insufficient on its own to secure equitable access to

  16. Cross-National User Priorities for Housing Provision and Accessibility — Findings from the European innovAge Project

    Directory of Open Access Journals (Sweden)

    Maria Haak

    2015-03-01

    Full Text Available To develop an innovative information and communication technology (ICT tool intended to help older people in their search for optimal housing solutions, a first step in the development process is to gain knowledge from the intended users. Thus the aim of this study was to deepen the knowledge about needs and expectations about housing options as expressed and prioritized by older people, people ageing with disabilities and professionals. A participatory design focus was adopted; 26 people with a range of functional limitations representing the user perspective and 15 professionals with a variety of backgrounds, participated in research circles that were conducted in four European countries. An additional 20 experts were invited as guests to the different research circle meetings. Three themes illustrating cross-national user priorities for housing provision and accessibility were identified: “Information barrier: accessible housing”, “Information barrier: housing adaptation benefits”, and “Cost barrier: housing adaptations”. In conclusion, early user involvement and identification of cross-national differences in priorities and housing options will strengthen the development of a user-friendly ICT tool that can empower older people and people with disabilities to be more active consumers regarding housing provision.

  17. A User-Centered Approach to Adaptive Hypertext Based on an Information Relevance Model

    Science.gov (United States)

    Mathe, Nathalie; Chen, James

    1994-01-01

    Rapid and effective to information in large electronic documentation systems can be facilitated if information relevant in an individual user's content can be automatically supplied to this user. However most of this knowledge on contextual relevance is not found within the contents of documents, it is rather established incrementally by users during information access. We propose a new model for interactively learning contextual relevance during information retrieval, and incrementally adapting retrieved information to individual user profiles. The model, called a relevance network, records the relevance of references based on user feedback for specific queries and user profiles. It also generalizes such knowledge to later derive relevant references for similar queries and profiles. The relevance network lets users filter information by context of relevance. Compared to other approaches, it does not require any prior knowledge nor training. More importantly, our approach to adaptivity is user-centered. It facilitates acceptance and understanding by users by giving them shared control over the adaptation without disturbing their primary task. Users easily control when to adapt and when to use the adapted system. Lastly, the model is independent of the particular application used to access information, and supports sharing of adaptations among users.

  18. On Low-Complexity Full-diversity Detection In Multi-User MIMO Multiple-Access Channels

    KAUST Repository

    Ismail, Amr; Alouini, Mohamed-Slim

    2014-01-01

    Multiple-input multiple-output (MIMO) techniques are becoming commonplace in recent wireless communication standards. This newly introduced dimension (i.e., space) can be efficiently used to mitigate the interference in the multi-user MIMO context. In this paper, we focus on the uplink of a MIMO multiple access channel (MAC) where perfect channel state information (CSI) is only available at the destination. We provide new sufficient conditions for a wide range of space-time block codes (STBC)s to achieve full-diversity under partial interference cancellation group decoding (PICGD) with or without successive interference cancellation (SIC) for completely blind users. Interference cancellation (IC) schemes for two and three users are then provided and shown to satisfy the full-diversity criteria. Beside the complexity reduction due to the fact that PICGD enables separate decoding of distinct users without sacrificing the diversity gain, further reduction of the decoding complexity may be obtained. In fact, thanks to the structure of the proposed schemes, the real and imaginary parts of each user's symbols may be decoupled without any loss of performance. Our new IC scheme is shown to outperform recently proposed two-user IC scheme especially for high spectral efficiency while requiring significantly less decoding complexity.

  19. A Comparison of Mobile and Fixed Device Access on User Engagement Associated With Women, Infants, and Children (WIC) Online Nutrition Education.

    Science.gov (United States)

    Brusk, John J; Bensley, Robert J

    2016-11-15

    Online health education has expanded its reach due to cost-effective implementation and demonstrated effectiveness. However, a limitation exists with the evaluation of online health education implementations and how the impact of the system is attenuated by the extent to which a user engages with it. Moreover, the current online health education research does not consider how this engagement has been affected by the transition from fixed to mobile user access over the last decade. This paper focuses on comparing the impact mobile versus fixed devices have on user engagement key performance indicators (KPI) associated with the wichealth website (.org), an Internet-based parent-child feeding intervention offered to clients associated with the US Department of Agriculture's Special Supplemental Nutrition Program for Women, Infants, and Children (WIC). Data were collected from 612,201 nutrition education lessons completed by 305,735 unique WIC participants in 21 states over a 1-year period. Data consisted of system-collected measures, profile items, and items from an exit survey administered at the conclusion of each lesson. User engagement was defined based on 3 KPIs associated with usage of the wichealth website: number of link views, link view time, and progression in stage of readiness to change. Independent samples t tests were used to compare KPIs between fixed only and mobile only device users and paired samples t tests were used to compare KPIs within users who completed at least one lesson each on both a fixed and mobile device. A logistic regression was performed to estimate the odds of KPI performance thresholds in the independent samples study group given access device type while controlling for confounding of user characteristics associated with these KPIs. Analysis of 8 user characteristics (lessons completed, race, ethnicity, language, state of residence, pregnancy status, beginning stage of change, and preferred nutrition education method) were

  20. The Effect of Transport Accessibility on the Social Inclusion of Wheelchair Users: A Mixed Method Analysis

    Directory of Open Access Journals (Sweden)

    Raquel Velho

    2016-06-01

    Full Text Available In recent years the accessibility of London buses has improved with the introduction of ramps and wheelchair priority areas. These advances are meant to remove physical barriers to entering the bus, but new conflicts have arisen particularly over the physical space aboard. We aimed to research the barriers faced by wheelchair users in public transport using a mixed methods approach to establish the breadth of issues faced by wheelchair users. To this end we quantified the push-force used alight a bus and a study to understand the coping mechanisms used by people to propel up a ramp. This quantitative approach found push forces which resulted in a load of 2 to 3 times body weight being transferred through people’s shoulders, forces which can be directly linked to shoulder injury. This could disable the user further, preventing them from being able to push their wheelchair. Alongside the quantitative study, we conducted qualitative research comprising of a number of in-depth interviews with wheelchair users about the barriers they face in public transport. Our main claim, highlighted through this interdisciplinary collaboration, is that proposed ‘solutions’ to accessibility, such as ramps, often generate problems of their own. These barriers can affect the life of wheelchair users, impacting on their confidence and causing social isolation. These can be long-term in nature or immediate.

  1. The benefit of the European User Community from transnational access to national radiation facilities

    DEFF Research Database (Denmark)

    Barrier, Elise; Manuel Braz Fernandes, Francisco; Bujan, Maya

    2014-01-01

    Transnational access (TNA) to national radiation sources is presently provided via programmes of the European Commission by BIOSTRUCT-X and CALIPSO with a major benefit for scientists from European countries. Entirely based on scientific merit, TNA allows all European scientists to realise synchr...... development of the research infrastructure of photon science. Taking into account the present programme structure of HORIZON2020, the European Synchrotron User Organization (ESUO) sees considerable dangers for the continuation of this successful collaboration in the future....... synchrotron radiation experiments for addressing the Societal Challenges promoted in HORIZON2020. In addition, by TNA all European users directly take part in the development of the research infrastructure of facilities. The mutual interconnection of users and facilities is a strong prerequisite for future...

  2. Wheelchair users, access and exclusion in South African higher education

    Directory of Open Access Journals (Sweden)

    Desire Chiwandire

    2017-09-01

    Conclusion: South African universities are still not places where all students are equally able to integrate socially. DUSMs know what ought to be done to make campuses more accessible and welcoming to students with disabilities and should be empowered to play a leading role in sensitising non-disabled members of universities, to create greater awareness of, and appreciation for, the multiple ways in which wheelchair user students continue to be excluded from full participation in university life. South African universities need to adopt a systemic approach to inclusion, which fosters an understanding of inclusion as a fundamental right rather than as a luxury.

  3. Lexical-Access Ability and Cognitive Predictors of Speech Recognition in Noise in Adult Cochlear Implant Users

    OpenAIRE

    Kaandorp, Marre W.; Smits, Cas; Merkus, Paul; Festen, Joost M.; Goverts, S. Theo

    2017-01-01

    Not all of the variance in speech-recognition performance of cochlear implant (CI) users can be explained by biographic and auditory factors. In normal-hearing listeners, linguistic and cognitive factors determine most of speech-in-noise performance. The current study explored specifically the influence of visually measured lexical-access ability compared with other cognitive factors on speech recognition of 24 postlingually deafened CI users. Speech-recognition performance was measured with ...

  4. Resource Discovery and Universal Access: Understanding Enablers and Barriers from the User Perspective

    OpenAIRE

    Beyene, Wondwossen

    2016-01-01

    Resource discovery tools are keys to explore, find , and retrieve resources from multitudes of collections hosted by library and information systems. Modern resource discovery tools provide facet - rich interfaces that provide multiple alternatives to ex pose resources for their potential users and help them navigate to the resources they need. This paper examines one of those tools from the perspective of universal access, ...

  5. Monitoring Accessibility Services in Digital Television

    Directory of Open Access Journals (Sweden)

    Francisco Utray

    2012-01-01

    Full Text Available This paper addresses methodology and tools applied to the monitoring of accessibility services in digital television at a time when the principles of accessibility and design are being considered in all new audiovisual media communication services. The main objective of this research is to measure the quality and quantity of existing accessibility services offered by digital terrestrial television (DTT. The preliminary results, presented here, offer the development of a prototype for automatic monitoring and a methodology for obtaining quality measurements, along with the conclusions drawn by initial studies carried out in Spain. The recent approval of the UN Convention on the Rights of Persons with Disabilities gives special relevance to this research because it provides valuable guidelines to help set the priorities to improve services currently available to users.

  6. Model Based User's Access Requirement Analysis of E-Governance Systems

    Science.gov (United States)

    Saha, Shilpi; Jeon, Seung-Hwan; Robles, Rosslin John; Kim, Tai-Hoon; Bandyopadhyay, Samir Kumar

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  7. CSTEM User Manual

    Science.gov (United States)

    Hartle, M.; McKnight, R. L.

    2000-01-01

    This manual is a combination of a user manual, theory manual, and programmer manual. The reader is assumed to have some previous exposure to the finite element method. This manual is written with the idea that the CSTEM (Coupled Structural Thermal Electromagnetic-Computer Code) user needs to have a basic understanding of what the code is actually doing in order to properly use the code. For that reason, the underlying theory and methods used in the code are described to a basic level of detail. The manual gives an overview of the CSTEM code: how the code came into existence, a basic description of what the code does, and the order in which it happens (a flowchart). Appendices provide a listing and very brief description of every file used by the CSTEM code, including the type of file it is, what routine regularly accesses the file, and what routine opens the file, as well as special features included in CSTEM.

  8. PHOTO ENCODING OF ANALOG WATER METER FOR USER ACCESS AND PAYMENT SYSTEM

    OpenAIRE

    GODFREY A. MILLS; MOSES A. ACQUAH; APPAH BREMANG

    2012-01-01

    This paper presents design reconfiguration of analog water meter to provide remote access to user water consumption and billing records, payments, and meter device monitoring using photo-encoding as the detecting method for water consumption, a PIC18F2423 microcontroller for data processing, and SMS (short message service) technology for data transportation. To validate the system design, an analog water meter was converted into a digital equivalent and interfaced to the cellular network to t...

  9. No Code Required Giving Users Tools to Transform the Web

    CERN Document Server

    Cypher, Allen; Lau, Tessa; Nichols, Jeffrey

    2010-01-01

    Revolutionary tools are emerging from research labs that enable all computer users to customize and automate their use of the Web without learning how to program. No Code Required takes cutting edge material from academic and industry leaders - the people creating these tools -- and presents the research, development, application, and impact of a variety of new and emerging systems. *The first book since Web 2.0 that covers the latest research, development, and systems emerging from HCI research labs on end user programming tools *Featuring contributions from the creators of Adobe's Zoet

  10. Access to highly active antiretroviral therapy (HAART) for injecting drug users in the WHO European Region 2002-2004

    DEFF Research Database (Denmark)

    Donoghoe, Martin C; Bollerup, Annemarie R; Lazarus, Jeff

    2007-01-01

    Providing equitable access to highly active antiretroviral treatment (HAART) to injecting drug users (IDUs) is both feasible and desirable. Given the evidence that IDUs can adhere to HAART as well as non-IDUs and the imperative to provide universal and equitable access to HIV/AIDS treatment for all...... who need it, here we examine whether IDUs in the 52 countries in the WHO European Region have equitable access to HAART and whether that access has changed over time between 2002 and 2004. We consider regional and country differences in IDU HAART access; examine preliminary data regarding...

  11. Choice in maternity care: associations with unit supply, geographic accessibility and user characteristics

    Science.gov (United States)

    2012-01-01

    Background Despite national policies to promote user choice for health services in many European countries, current trends in maternity unit closures create a context in which user choice may be reduced, not expanded. Little attention has been paid to the potential impact of closures on pregnant women’s choice of maternity unit. We study here how pregnant women’s choices interact with the distance they must travel to give birth, individual socioeconomic characteristics and the supply of maternity units in France in 2003. Results Overall, about one-third of women chose their maternity units based on proximity. This proportion increased steeply as supply was constrained. Greater distances between the first and second closest maternity unit were strongly associated with increasing preferences for proximity; when these distances were ≥ 30 km, over 85% of women selected the closest unit (revealed preference) and over 70% reported that proximity was the reason for their choice (expressed preference). Women living at a short distance to the closest maternity unit appeared to be more sensitive to increases in distance between their first and second closest available maternity units. The preference for proximity, expressed and revealed, was related to demographic and social characteristics: women from households in the manual worker class chose a maternity unit based on its proximity more often and also went to the nearest unit when compared with women from professional and managerial households. These sociodemographic associations held true after adjusting for supply factors, maternal age and socioeconomic status. Conclusions Choice seems to be arbitrated in both absolute and relative terms. Taking changes in supply into consideration and how these affect choice is an important element for assessing the real impact of maternity unit closures on pregnant women’s experiences. An indicator measuring the proportion of women for whom the distance between the first

  12. Achievable Rate of a Cognitive MIMO Multiple Access Channel With Multi-Secondary Users

    KAUST Repository

    Sboui, Lokman; Ghazzai, Hakim; Rezki, Zouheir; Alouini, Mohamed-Slim

    2015-01-01

    We study the secondary sum-rate of an underlay cognitive multiple access channel consisting of a primary user and multiple secondary users (SUs) communicating with a common destination. We propose a particular linear precoding and SU selection scheme that maximize the cognitive sum-rate. This scheme is based on space alignment strategy allowing SUs to share the spectrum without interfering with each other. We derive the optimal power allocation for each selected SU after applying perfect or imperfect successive interference cancellation. Numerical results show that the proposed scheme provides a significant sum-rate improvement as the number of SUs increases. In addition, it achieves almost the same performance as an exhaustive search selection, mainly in low and high power ranges. © 1997-2012 IEEE.

  13. Achievable Rate of a Cognitive MIMO Multiple Access Channel With Multi-Secondary Users

    KAUST Repository

    Sboui, Lokman

    2015-03-01

    We study the secondary sum-rate of an underlay cognitive multiple access channel consisting of a primary user and multiple secondary users (SUs) communicating with a common destination. We propose a particular linear precoding and SU selection scheme that maximize the cognitive sum-rate. This scheme is based on space alignment strategy allowing SUs to share the spectrum without interfering with each other. We derive the optimal power allocation for each selected SU after applying perfect or imperfect successive interference cancellation. Numerical results show that the proposed scheme provides a significant sum-rate improvement as the number of SUs increases. In addition, it achieves almost the same performance as an exhaustive search selection, mainly in low and high power ranges. © 1997-2012 IEEE.

  14. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zhou Yajian; Li Jiandong; Liu Kai

    2002-01-01

    A novel Multiple Access Control (MAC) protocol - User-dependent Perfect-scheduling Multiple Access (UPMA) protocol, which supports joint transmission of voice and data packets,is proposed. By this protocol, the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals (MTs)can be perfectly scheduled by means of polling. Meanwhile, a unique frame structure is designed to guarantee Quality of Service (QoS) in voice traffic supporting. An effective collision resolution algorithm is also proposed to guarantee rapid channel access for activated MTs. Finally, performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  15. SierraDNA – Demonstrating the Usefulness of Direct ILS Database Access

    Directory of Open Access Journals (Sweden)

    James Padgett

    2015-10-01

    Full Text Available Innovative Interface’s Sierra(™ Integrated Library System (ILS brings with it a Database Navigator Application (SierraDNA - in layman's terms SierraDNA gives Sierra sites read access to their ILS database. Unlike the closed use cases produced by vendor supplied APIs, which restrict Libraries to limited development opportunities, SierraDNA enables sites to publish their own APIs and scripts based upon custom SQL code to meet their own needs and those of their users and processes. In this article we give examples showing how SierraDNA can be utilized to improve Library services. We highlight three example use cases which have benefited our users, enhanced online security and improved our back office processes. In the first use case we employ user access data from our electronic resources proxy server (WAM to detect hacked user accounts. Three scripts are used in conjunction to flag user accounts which are being hijacked to systematically steal content from our electronic resource provider’s websites. In the second we utilize the reading histories of our users to augment our search experience with an Amazon style “People who borrowed this book also borrowed…these books” feature. Two scripts are used together to determine which other items were borrowed by borrowers of the item currently of interest. And lastly, we use item holds data to improve our acquisitions workflow through an automated demand based ordering process. Our explanation and SQL code should be of direct use for adoption or as examples for other Sierra customers willing to exploit their ILS data in similar ways, but the principles may also be useful to non-Sierra sites that also wish to enhancement security, user services or improve back office processes.

  16. End User Evaluations

    Science.gov (United States)

    Jay, Caroline; Lunn, Darren; Michailidou, Eleni

    As new technologies emerge, and Web sites become increasingly sophisticated, ensuring they remain accessible to disabled and small-screen users is a major challenge. While guidelines and automated evaluation tools are useful for informing some aspects of Web site design, numerous studies have demonstrated that they provide no guarantee that the site is genuinely accessible. The only reliable way to evaluate the accessibility of a site is to study the intended users interacting with it. This chapter outlines the processes that can be used throughout the design life cycle to ensure Web accessibility, describing their strengths and weaknesses, and discussing the practical and ethical considerations that they entail. The chapter also considers an important emerging trend in user evaluations: combining data from studies of “standard” Web use with data describing existing accessibility issues, to drive accessibility solutions forward.

  17. Online Public Access Catalog User Studies: A Review of Research Methodologies, March 1986-November 1989.

    Science.gov (United States)

    Seymour, Sharon

    1991-01-01

    Review of research methodologies used in studies of online public access catalog (OPAC) users finds that a variety of research methodologies--e.g., surveys, transaction log analysis, interviews--have been used with varying degrees of expertise. It is concluded that poor research methodology resulting from limited training and resources limits the…

  18. An Accessible User Interface for Geoscience and Programming

    Science.gov (United States)

    Sevre, E. O.; Lee, S.

    2012-12-01

    The goal of this research is to develop an interface that will simplify user interaction with software for scientists. The motivating factor of the research is to develop tools that assist scientists with limited motor skills with the efficient generation and use of software tools. Reliance on computers and programming is increasing in the world of geology, and it is increasingly important for geologists and geophysicists to have the computational resources to use advanced software and edit programs for their research. I have developed a prototype of a program to help geophysicists write programs using a simple interface that requires only simple single-mouse-clicks to input code. It is my goal to minimize the amount of typing necessary to create simple programs and scripts to increase accessibility for people with disabilities limiting fine motor skills. This interface can be adapted for various programming and scripting languages. Using this interface will simplify development of code for C/C++, Java, and GMT, and can be expanded to support any other text based programming language. The interface is designed around the concept of maximizing the amount of code that can be written using a minimum number of clicks and typing. The screen is split into two sections: a list of click-commands is on the left hand side, and a text area is on the right hand side. When the user clicks on a command on the left hand side the applicable code is automatically inserted at the insertion point in the text area. Currently in the C/C++ interface, there are commands for common code segments that are often used, such as for loops, comments, print statements, and structured code creation. The primary goal is to provide an interface that will work across many devices for developing code. A simple prototype has been developed for the iPad. Due to the limited number of devices that an iOS application can be used with, the code has been re-written in Java to run on a wider range of devices

  19. Perceived efficacy of herbal remedies by users accessing primary healthcare in Trinidad

    Directory of Open Access Journals (Sweden)

    Gomes Natalie

    2007-02-01

    Full Text Available Abstract Background The increasing global popularity of herbal remedies requires further investigation to determine the probable factors driving this burgeoning phenomenon. We propose that the users' perception of efficacy is an important factor and assessed the perceived efficacy of herbal remedies by users accessing primary health facilities throughout Trinidad. Additionally, we determined how these users rated herbal remedies compared to conventional allopathic medicines as being less, equally or more efficacious. Methods A descriptive cross-sectional study was undertaken at 16 randomly selected primary healthcare facilities throughout Trinidad during June-August 2005. A de novo, pilot-tested questionnaire was interviewer-administered to confirmed herbal users (previous or current. Stepwise multiple regression analysis was done to determine the influence of predictor variables on perceived efficacy and comparative efficacy with conventional medicines. Results 265 herbal users entered the study and cited over 100 herbs for the promotion of health/wellness and the management of specific health concerns. Garlic was the most popular herb (in 48.3% of the sample and was used for the common cold, cough, fever, as 'blood cleansers' and carminatives. It was also used in 20% of hypertension patients. 230 users (86.8% indicated that herbs were efficacious and perceived that they had equal or greater efficacy than conventional allopathic medicines. Gender, ethnicity, income and years of formal education did not influence patients' perception of herb efficacy; however, age did (p = 0.036. Concomitant use of herbs and allopathic medicines was relatively high at 30%; and most users did not inform their attending physician. Conclusion Most users perceived that herbs were efficacious, and in some instances, more efficacious than conventional medicines. We suggest that this perception may be a major contributing factor influencing the sustained and increasing

  20. Access Denied! Contrasting Data Access in the United States and Ireland

    Directory of Open Access Journals (Sweden)

    Grogan Samuel

    2016-07-01

    Full Text Available The ability of an Internet user to access data collected about himself as a result of his online activity is a key privacy safeguard. Online, data access has been overshadowed by other protections such as notice and choice. This paper describes attitudes about data access. 873 US and Irish Internet users participated in a survey designed to examine views on data access to information held by online companies and data brokers. We observed low levels of awareness of access mechanisms along with a high desire for access in both participant groups. We tested three proposed access systems in keeping with industry programs and regulatory proposals. User response was positive. We conclude that access remains an important privacy protection that is inadequately manifested in practice. Our study provides insight for lawmakers and policymakers, as well as computer scientists who implement these systems.

  1. User guide to JINR server of scientific publications JDS

    International Nuclear Information System (INIS)

    Filozova, I.A.; Zaikina, T.N.; Musul'manbekov, Zh.Zh.; Semenov, R.N.; Shestakova, G.V.

    2011-01-01

    In the framework of the international program OAI (Open Access Initiative) the digital open access archive-repository JINR Document Server (JDS) is built up. The main goal of the JDS is to collect at the JINR site all the publications of JINR researchers. The documents deposited in the repository are preprints, journal articles, books, conference papers, conference announcements, theses, annual reports, etc. Currently, the retrospective publications of JINR authors up to 1956 are deposited. The JDS, being an integrated digital library system, gives users an opportunity to deposit manuscripts in self-archiving mode, create personal catalogs, subscribe to alerts and RSS, send comments and arrange discussions on submitted papers

  2. Meth mouth severity in response to drug-use patterns and dental access in methamphetamine users.

    Science.gov (United States)

    Brown, Ronni E; Morisky, Donald E; Silverstein, Steven J

    2013-06-01

    Meth mouth is the rapid development of tooth decay in methamphetamine users. Our study questioned whether drug-use patterns and dental care access are risk factors affecting the severity of meth mouth. Participants received dental examinations, and the number of decayed, missing and filled teeth (DMFT) were counted and used to measure meth mouth severity.

  3. The TJ-II Relational Database Access Library: A User's Guide

    International Nuclear Information System (INIS)

    Sanchez, E.; Portas, A. B.; Vega, J.

    2003-01-01

    A relational database has been developed to store data representing physical values from TJ-II discharges. This new database complements the existing TJ-EI raw data database. This database resides in a host computer running Windows 2000 Server operating system and it is managed by SQL Server. A function library has been developed that permits remote access to these data from user programs running in computers connected to TJ-II local area networks via remote procedure cali. In this document a general description of the database and its organization are provided. Also given are a detailed description of the functions included in the library and examples of how to use these functions in computer programs written in the FORTRAN and C languages. (Author) 8 refs

  4. A University Web Portal redesign applying accessibility patterns. Breaking Down Barriers for Visually Impaired Users

    Directory of Open Access Journals (Sweden)

    Hernán Sosa

    2015-08-01

    Full Text Available Definitely, the WWW and ICTs have become the preferred media for the interaction between society and its citizens, and public and private organizations have today the possibility of deploying their activities through the Web. In particular, university education is a domain where the benefits of these technological resources can strongly contribute in caring for students. However, most university Web portals are inaccessible to their user community (students, professors, and non-teaching staff, between others, since these portals do not take into account the needs of people with different capabilities. In this work, we propose an accessibility pattern driven process to the redesign of university Web portals, aiming to break down barriers for visually impaired users. The approach is implemented to a real case study: the Web portal of Universidad Nacional de la Patagonia Austral (UNPA. The results come from applying accessibility recommendations and evaluation tools (automatic and manual from internationally recognized organizations, to both versions of the Web portal: the original and the redesign one.

  5. User-Centered Design, Experience, and Usability of an Electronic Consent User Interface to Facilitate Informed Decision-Making in an HIV Clinic.

    Science.gov (United States)

    Ramos, S Raquel

    2017-11-01

    Health information exchange is the electronic accessibility and transferability of patient medical records across various healthcare settings and providers. In some states, patients have to formally give consent to allow their medical records to be electronically shared. The purpose of this study was to apply a novel user-centered, multistep, multiframework approach to design and test an electronic consent user interface, so patients with HIV can make more informed decisions about electronically sharing their health information. This study consisted of two steps. Step 1 was a cross-sectional, descriptive, qualitative study that used user-centric design interviews to create the user interface. This informed Step 2. Step 2 consisted of a one group posttest to examine perceptions of usefulness, ease of use, preference, and comprehension of a health information exchange electronic consent user interface. More than half of the study population had college experience, but challenges remained with overall comprehension regarding consent. The user interface was not independently successful, suggesting that in addition to an electronic consent user interface, human interaction may also be necessary to address the complexities associated with consenting to electronically share health information. Comprehension is key factor in the ability to make informed decisions.

  6. Secure access to patient's health records using SpeechXRays a mutli-channel biometrics platform for user authentication.

    Science.gov (United States)

    Spanakis, Emmanouil G; Spanakis, Marios; Karantanas, Apostolos; Marias, Kostas

    2016-08-01

    The most commonly used method for user authentication in ICT services or systems is the application of identification tools such as passwords or personal identification numbers (PINs). The rapid development in ICT technology regarding smart devices (laptops, tablets and smartphones) has allowed also the advance of hardware components that capture several biometric traits such as fingerprints and voice. These components are aiming among others to overcome weaknesses and flaws of password usage under the prism of improved user authentication with higher level of security, privacy and usability. To this respect, the potential application of biometrics for secure user authentication regarding access in systems with sensitive data (i.e. patient's data from electronic health records) shows great potentials. SpeechXRays aims to provide a user recognition platform based on biometrics of voice acoustics analysis and audio-visual identity verification. Among others, the platform aims to be applied as an authentication tool for medical personnel in order to gain specific access to patient's electronic health records. In this work a short description of SpeechXrays implementation tool regarding eHealth is provided and analyzed. This study explores security and privacy issues, and offers a comprehensive overview of biometrics technology applications in addressing the e-Health security challenges. We present and describe the necessary requirement for an eHealth platform concerning biometric security.

  7. The Live Access Server Scientific Product Generation Through Workflow Orchestration

    Science.gov (United States)

    Hankin, S.; Calahan, J.; Li, J.; Manke, A.; O'Brien, K.; Schweitzer, R.

    2006-12-01

    The Live Access Server (LAS) is a well-established Web-application for display and analysis of geo-science data sets. The software, which can be downloaded and installed by anyone, gives data providers an easy way to establish services for their on-line data holdings, so their users can make plots; create and download data sub-sets; compare (difference) fields; and perform simple analyses. Now at version 7.0, LAS has been in operation since 1994. The current "Armstrong" release of LAS V7 consists of three components in a tiered architecture: user interface, workflow orchestration and Web Services. The LAS user interface (UI) communicates with the LAS Product Server via an XML protocol embedded in an HTTP "get" URL. Libraries (APIs) have been developed in Java, JavaScript and perl that can readily generate this URL. As a result of this flexibility it is common to find LAS user interfaces of radically different character, tailored to the nature of specific datasets or the mindset of specific users. When a request is received by the LAS Product Server (LPS -- the workflow orchestration component), business logic converts this request into a series of Web Service requests invoked via SOAP. These "back- end" Web services perform data access and generate products (visualizations, data subsets, analyses, etc.). LPS then packages these outputs into final products (typically HTML pages) via Jakarta Velocity templates for delivery to the end user. "Fine grained" data access is performed by back-end services that may utilize JDBC for data base access; the OPeNDAP "DAPPER" protocol; or (in principle) the OGC WFS protocol. Back-end visualization services are commonly legacy science applications wrapped in Java or Python (or perl) classes and deployed as Web Services accessible via SOAP. Ferret is the default visualization application used by LAS, though other applications such as Matlab, CDAT, and GrADS can also be used. Other back-end services may include generation of Google

  8. MLF user program

    International Nuclear Information System (INIS)

    Kamiyama, Takashi; Ikeda, Yujiro

    2008-01-01

    The user program of J-PARC/MLF is overviewed. Since MLF will be one of the major neutron facilities in the world, an international standard system for the user program is expected. It is also expected to establish a system to promote users from industries. The MLF user program is based on the IUPAP recommendation on the selection of proposals. Both open and closed accesses, biannual, regular, rapid accesses, etc. will be provided. All the features in the system are being introduced to maximize both scientific and engineering outputs from MLF. (author)

  9. CaWingz user's guide

    International Nuclear Information System (INIS)

    Cha, Ben-chin.

    1994-01-01

    This document assumes that you have read and understood the Wingz user's manuals. CaWingz is an external Wingz program which, when combined with a set of script files, provides easy-to-use EPICS channel access interface functions for Wingz users. The external function run allows Wingz user to invoke any Unix processor within caWingz. Few additional functions for accessing static database field and monitoring of value change event is available for EPICS users after release 3.11. The functions, script files, and usage are briefly described in this document. The script files supplied here serve as examples only. Users are responsible for generating their own spreadsheet and script files. CaWingz communicates with IOC through channel access function calls

  10. Presto 2.9 user's guide.

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Joseph

    2008-05-01

    Presto is a Lagrangian, three-dimensional explicit, transient dynamics code that is used to analyze solids subjected to large, suddenly applied loads. The code is designed for a parallel computing environment and for problems with large deformations, nonlinear material behavior, and contact. Presto also has a versatile element library that incorporates both continuum elements and structural elements. This user's guide describes the input for Presto that gives users access to all the current functionality in the code. The environment in which Presto is built allows it to be coupled with other engineering analysis codes. Using a concept called scope, the input structure reflects the fact that Presto can be used in a coupled environment. The user's guide describes how scope is implemented from the outermost to the innermost scopes. Within a given scope, the descriptions of input commands are grouped based on functionality of the code. For example, all material input command lines are described in a chapter of the user's guide for all the material models that can be used in Presto.

  11. Presto 4.18 user's guide.

    Energy Technology Data Exchange (ETDEWEB)

    Spencer, Benjamin Whiting

    2010-09-01

    Presto is a Lagrangian, three-dimensional explicit, transient dynamics code that is used to analyze solids subjected to large, suddenly applied loads. The code is designed for a parallel computing environment and for problems with large deformations, nonlinear material behavior, and contact. Presto also has a versatile element library that incorporates both continuum elements and structural elements. This user's guide describes the input for Presto that gives users access to all the current functionality in the code. The environment in which Presto is built allows it to be coupled with other engineering analysis codes. Using a concept called scope, the input structure reflects the fact that Presto can be used in a coupled environment. The user's guide describes how scope is implemented from the outermost to the innermost scopes. Within a given scope, the descriptions of input commands are grouped based on functionality of the code. For example, all material input command lines are described in a chapter of the user's guide for all the material models that can be used in Presto.

  12. User-generated online health content: a survey of Internet users in the United Kingdom.

    Science.gov (United States)

    O'Neill, Braden; Ziebland, Sue; Valderas, Jose; Lupiáñez-Villanueva, Francisco

    2014-04-30

    The production of health information has begun to shift from commercial organizations to health care users themselves. People increasingly go online to share their own health and illness experiences and to access information others have posted, but this behavior has not been investigated at a population level in the United Kingdom. This study aims to explore access and production of user-generated health content among UK Internet users and to investigate relationships between frequency of use and other variables. We undertook an online survey of 1000 UK Internet users. Descriptive and multivariate statistical analyses were used to interpret the data. Nearly one-quarter of respondents (23.7%, 237/1000) reported accessing and sharing user-generated health content online, whereas more than 20% (22.2%, 222/1000) were unaware that it was possible to do this. Respondents could be divided into 3 groups based on frequency of use: rare users (78.7%, 612/778) who accessed and shared content less than weekly, users (13.9%, 108/778) who did so weekly, and superusers (7.5%, 58/778) who did so on a daily basis. Superusers were more likely to be male (Puser-generated online health content, only a minority of respondents reported doing so frequently. As this type of content proliferates, superusers are likely to shape the health information that others access. Further research should assess the effect of user-generated online content on health outcomes and use of health services by Internet users.

  13. Email based remote access and surveillance system for smart home infrastructure

    Directory of Open Access Journals (Sweden)

    Pooshkar Rajiv

    2016-09-01

    Full Text Available With the rapid rise of Internet of Things in public domain, people expect fast, reliable and on-demand home security via the Internet. However, existing remote home surveillance systems place a very rigid constraint on authentication and require customized hardware and software. In this paper we have proposed an ingenious and reliable internet based, home access system for smart homes that can be easily deployed on generic hardware. The proposed architecture uses popular email service providers to notify and update the user about the home access. It sends an email to the owner with the attached picture of the person who is at the door. It also incorporates a protected mechanism to give access of the door to a remote user by responding to that email. It essentially means that we can view and give access to the person at our door via sending and receiving an email. Furthermore, an image processing based mechanism has also been incorporated to provide access without email, to few selected personnel who are trusted by the owner. It works by capturing and comparing the visitor's image with the stored images in the database. Perceptual hashing or fingerprint matching algorithm is used for comparison purposes. Similarity percentage based on hamming distance was evaluated, and the similarity threshold for providing access was set. The simulations were performed in rigorous environment. The efficiency of the hashing algorithm was found to be 97% at the similarity threshold of 95%. The results validate that the average latency is only 155 ms with low standard deviation. The CPU utilization remained quite low with a minimum value of 10 MHz and a maximum value of 30 MHz when the payload size of the sent mail was increased to 1500 kB. Thus, the proposed system can be used for developing a larger low power infrastructure.

  14. Proof-of-Concept System for Opportunistic Spectrum Access in Multi-user Decentralized Networks

    Directory of Open Access Journals (Sweden)

    Sumit J. Darak

    2016-09-01

    Full Text Available Poor utilization of an electromagnetic spectrum and ever increasing demand for spectrum have led to surge of interests in opportunistic spectrum access (OSA based paradigms like cognitive radio and unlicensed LTE. In OSA for decentralized networks, frequency band selection from wideband spectrum is a challenging task since secondary users (SUs do not share any information with each other. In this paper, a new decision making policy (DMP has been proposed for OSA in the multi-user decentralized networks. First contribution is an accurate characterization of frequency bands using Bayes-UCB algorithm. Then, a novel SU orthogonization scheme using Bayes-UCB algorithm is proposed replacing randomization based scheme. At the end, USRP testbed has been developed for analyzing the performance of DMPs using real radio signals. Experimental results show that the proposed DMP offers significant improvement in spectrum utilization, fewer subband switching and collisions compared to other DMPs.

  15. Characterization and Optimization of LDPC Codes for the 2-User Gaussian Multiple Access Channel

    Directory of Open Access Journals (Sweden)

    Declercq David

    2007-01-01

    Full Text Available We address the problem of designing good LDPC codes for the Gaussian multiple access channel (MAC. The framework we choose is to design multiuser LDPC codes with joint belief propagation decoding on the joint graph of the 2-user case. Our main result compared to existing work is to express analytically EXIT functions of the multiuser decoder with two different approximations of the density evolution. This allows us to propose a very simple linear programming optimization for the complicated problem of LDPC code design with joint multiuser decoding. The stability condition for our case is derived and used in the optimization constraints. The codes that we obtain for the 2-user case are quite good for various rates, especially if we consider the very simple optimization procedure.

  16. ARCAS (ACACIA Regional Climate-data Access System) -- a Web Access System for Climate Model Data Access, Visualization and Comparison

    Science.gov (United States)

    Hakkarinen, C.; Brown, D.; Callahan, J.; hankin, S.; de Koningh, M.; Middleton-Link, D.; Wigley, T.

    2001-05-01

    A Web-based access system to climate model output data sets for intercomparison and analysis has been produced, using the NOAA-PMEL developed Live Access Server software as host server and Ferret as the data serving and visualization engine. Called ARCAS ("ACACIA Regional Climate-data Access System"), and publicly accessible at http://dataserver.ucar.edu/arcas, the site currently serves climate model outputs from runs of the NCAR Climate System Model for the 21st century, for Business as Usual and Stabilization of Greenhouse Gas Emission scenarios. Users can select, download, and graphically display single variables or comparisons of two variables from either or both of the CSM model runs, averaged for monthly, seasonal, or annual time resolutions. The time length of the averaging period, and the geographical domain for download and display, are fully selectable by the user. A variety of arithmetic operations on the data variables can be computed "on-the-fly", as defined by the user. Expansions of the user-selectable options for defining analysis options, and for accessing other DOD-compatible ("Distributed Ocean Data System-compatible") data sets, residing at locations other than the NCAR hardware server on which ARCAS operates, are planned for this year. These expansions are designed to allow users quick and easy-to-operate web-based access to the largest possible selection of climate model output data sets available throughout the world.

  17. LNS users primer for accessing government sites on the ARPA network. [MIT. -->. ANL, BNL, LBL, and New York Univ. Courant Inst

    Energy Technology Data Exchange (ETDEWEB)

    Kannel, M.

    1979-06-01

    This primer was developed as part of the study conducted by the Laboratory for Nuclear Science (LNS) on the feasibility of networks for computer resource sharing. The primer is an instructinal guide for the LNS user who would like to access and use computers at other government sites on the ARPA network. The format is a series of scenarios of actual recorded on-line terminal sessions' showing the novice user how to access the foreign site, obtain help documentation, run a simple program, and transfer files to and from the foreign site. Access to the ARPA network in these scenarios is via Multics or the Massachusetts Institute of Technology Terminal Interface Processor. The foreign government sites accessed are the computing facilities at Argonne National Laboratory, Brookhaven National Laboratory, Lawrence Livermore Laboratory, and New York University Courant Institute. This technique of auditing actual terminal sessions as a teaching aid can be extended to include other computing facilities as well as other networks.

  18. ERINDA Scientific Results: Transnational Access Activities and Scientific Visits

    CERN Document Server

    Hambsch, Franz-Josef

    2014-01-01

    This paper gives an overview of the Transnational Access Activities and Scientific visits within the FP7 project ERINDA (European Research Infrastructures for Nuclear Data). It highlights the fact that nearly 3200 data - taking hours for external users were made available in the partner installations and 104 man weeks for scientific visits to par tner institutes. This is much more than the 2500 beam hours and 80 weeks promised in the Description of Work of the project.

  19. Extended spectrum SWIR camera with user-accessible Dewar

    Science.gov (United States)

    Benapfl, Brendan; Miller, John Lester; Vemuri, Hari; Grein, Christoph; Sivananthan, Siva

    2017-02-01

    Episensors has developed a series of extended short wavelength infrared (eSWIR) cameras based on high-Cd concentration Hg1-xCdxTe absorbers. The cameras have a bandpass extending to 3 microns cutoff wavelength, opening new applications relative to traditional InGaAs-based cameras. Applications and uses are discussed and examples given. A liquid nitrogen pour-filled version was initially developed. This was followed by a compact Stirling-cooled version with detectors operating at 200 K. Each camera has unique sensitivity and performance characteristics. The cameras' size, weight and power specifications are presented along with images captured with band pass filters and eSWIR sources to demonstrate spectral response beyond 1.7 microns. The soft seal Dewars of the cameras are designed for accessibility, and can be opened and modified in a standard laboratory environment. This modular approach allows user flexibility for swapping internal components such as cold filters and cold stops. The core electronics of the Stirlingcooled camera are based on a single commercial field programmable gate array (FPGA) that also performs on-board non-uniformity corrections, bad pixel replacement, and directly drives any standard HDMI display.

  20. Profex: a graphical user interface for the Rietveld refinement program BGMN

    OpenAIRE

    Doebelin, Nicola; Kleeberg, Reinhard

    2015-01-01

    Profex is a graphical user interface for the Rietveld refinement program BGMN. Its interface focuses on preserving BGMN’s powerful and flexible scripting features by giving direct access to BGMN input files. Very efficient workflows for single or batch refinements are achieved by managing refinement control files and structure files, by providing dialogues and shortcuts for many operations, by performing operations in the background, and by providing import filters for CIF and XML crystal str...

  1. Thus Spake the OPAC User.

    Science.gov (United States)

    Markey, Karen

    1983-01-01

    Findings of focused-group interviews conducted for OCLC study of library users and online public access catalogs (OPACs) indicate users like OPACs, have problems finding right subject heading, envision features to improve subject access, want access to more than books, and want OPACs to provide new services. Eight references are listed. (EJS)

  2. Louisiana coastal GIS network: Graphical user interface for access to spatial data

    Science.gov (United States)

    Hiland, Matteson; McBride, Randolph A.; Davis, Donald; Braud, Dewitt; Streiffer, Henry; Jones, Farrell; Lewis, Anthony; Williams, S.

    1991-01-01

    Louisiana's coastal wetlands support a large percentage of the nation's seafood and fur industries, vast deposits of oil and natural gas, habitat for thousands of species of plants and animals, winter nesting grounds and migratory paths for numerous waterfowl, and many recreational resources enjoyed by residents and tourists. Louisiana's wetlands also have the highest rates of coastal erosion and wetland loss in the nation. While numerous studies across many disciplines have been conducted on both local and regional scales, no complete inventory exists for this information. The Louisiana Coastal Geographic Information System Network (LCGISN) is currently being developed to facilitate access to existing data for coastal zone planners, managers, and researchers. The Louisiana Geological Survey (LGS), in cooperation with the LSU Department of Geography and Anthropology, the Computer Aided Design and Geographic Information Systems Research Laboratory (CADGIS), and others, is pursuing this project under the terms of a cooperative agreement with the U.S. Geological Survey. LCGISN is an automated system for searching and retrieving geographic, cartographic, and bibliographic data. By linking original programming with an existing GIS software package and an industry standard relational database management system, LCGISN will provide the capability for users to search for data references by interactively defining the area of interest on a displayed map/image reference background. Several agencies will be networked to provide easy access to a wide variety of information. LCGISN, with its headquarters at LGS, will serve as the central node on the network, providing data format conversions, projection and datum transformations, and storage of several of the most commonly used data sets. Thematic mapper data, USGS 7.5-minute quadrangle map boundaries, political and legal boundaries, major transportation routes, and other digital data will provide a base map to aid the user in

  3. Virtual Mission Operations Center -Explicit Access to Small Satellites by a Net Enabled User Base

    Science.gov (United States)

    Miller, E.; Medina, O.; Paulsen, P.; Hopkins, J.; Long, C.; Holloman, K.

    2008-08-01

    The Office of Naval Research (ON R), The Office of the Secr etary of Defense (OSD) , Th e Operationally Responsive Space Off ice (ORS) , and th e National Aeronautics and Space Administration (NASA) are funding the development and integration of key technologies and new processes that w ill allow users across th e bread th of operations the ab ility to access, task , retr ieve, and collaborate w ith data from various sensors including small satellites v ia the Intern et and the SIPRnet. The V irtual Mission Oper ations Center (VMO C) facilitates the dynamic apportionmen t of space assets, allows scalable mission man agement of mu ltiple types of sensors, and provid es access for non-space savvy users through an intu itive collaborative w eb site. These key technologies are b eing used as experimentation pathfinders fo r th e Do D's Operationally Responsiv e Sp ace (O RS) initiative and NASA's Sensor W eb. The O RS initiative seeks to provide space assets that can b e rapid ly tailored to meet a commander's in telligen ce or commun ication needs. For the DoD and NASA the V MO C provid es ready and scalab le access to space b ased assets. To the commercial space sector the V MO C may provide an analog to the innovativ e fractional ownersh ip approach represen ted by FlexJet. This pap er delves in to the technology, in tegration, and applicability of th e V MO C to th e DoD , NASA , and co mmer cial sectors.

  4. Community Impact of Pharmacy-Randomized Intervention to Improve Access to Syringes and Services for Injection Drug Users

    Science.gov (United States)

    Crawford, Natalie D.; Amesty, Silvia; Rivera, Alexis V.; Harripersaud, Katherine; Turner, Alezandria; Fuller, Crystal M.

    2014-01-01

    Objectives: In an effort to reduce HIV transmission among injection drug users (IDUs), New York State deregulated pharmacy syringe sales in 2001 through the Expanded Syringe Access Program by removing the requirement of a prescription. With evidence suggesting pharmacists' ability to expand their public health role, a structural, pharmacy-based…

  5. Connecting Satellite-Based Precipitation Estimates to Users

    Science.gov (United States)

    Huffman, George J.; Bolvin, David T.; Nelkin, Eric

    2018-01-01

    Beginning in 1997, the Merged Precipitation Group at NASA Goddard has distributed gridded global precipitation products built by combining satellite and surface gauge data. This started with the Global Precipitation Climatology Project (GPCP), then the Tropical Rainfall Measuring Mission (TRMM) Multi-satellite Precipitation Analysis (TMPA), and recently the Integrated Multi-satellitE Retrievals for the Global Precipitation Measurement (GPM) mission (IMERG). This 20+-year (and on-going) activity has yielded an important set of insights and lessons learned for making state-of-the-art precipitation data accessible to the diverse communities of users. Merged-data products critically depend on the input sensors and the retrieval algorithms providing accurate, reliable estimates, but it is also important to provide ancillary information that helps users determine suitability for their application. We typically provide fields of estimated random error, and recently reintroduced the quality index concept at user request. Also at user request we have added a (diagnostic) field of estimated precipitation phase. Over time, increasingly more ancillary fields have been introduced for intermediate products that give expert users insight into the detailed performance of the combination algorithm, such as individual merged microwave and microwave-calibrated infrared estimates, the contributing microwave sensor types, and the relative influence of the infrared estimate.

  6. User internface for rail traffic control system

    OpenAIRE

    Križaj, Blaž

    2013-01-01

    The thesis represents a solution to the problem of remote access to a server application, its management, and graphical user interface (GUI) build above console application. The TRIS Server operates in the UNIX environment without a graphical user interface as a service. Access to the application, archive files and management without graphical user interface is user unfriendly, as it requires knowledge of UNIX environment and Bash scripting language. Remote access via the internet represen...

  7. Giving Speaking Practice in Self-Access Mode a Chance

    Directory of Open Access Journals (Sweden)

    Kerstin Dofs

    2012-12-01

    Full Text Available Finding resources and activities which will interest students and promote speaking in a self-access resource can be challenging. This article describes how the School of English at Christchurch Polytechnic Institute of Technology (CPIT, Christchurch, New Zealand, works to enable speaking practice in their Language Self Access Centre (LSAC. The activities which students are encouraged to do were produced consequent to research and an examination of good practice world- wide within the field of autonomy in language learning. The article will explore some basic design principles and conditions which were followed with the aim of creating maximal “comprehensible outputs” for speaking (Anderson, Maclean & Lynch, 2004, and, at the same time, creating conditions for these speaking tasks which would optimise development of autonomous language use (Thornbury, 2005. This is followed by an analysis of how the resources provided in a designated speaking area in the LSAC fulfil these principles and conditions, and how they may foster autonomous learning.

  8. IMAGE User Manual

    Energy Technology Data Exchange (ETDEWEB)

    Stehfest, E; De Waal, L; Oostenrijk, R.

    2010-09-15

    This user manual contains the basic information for running the simulation model IMAGE ('Integrated Model to Assess the Global Environment') of PBL. The motivation for this report was a substantial restructuring of the source code for IMAGE version 2.5. The document gives concise content information about the submodels, tells the user how to install the program, describes the directory structure of the run environment, shows how scenarios have to be prepared and run, and gives insight in the restart functionality.

  9. Black Open Access in Ukraine: Analysis of Downloading Sci-Hub Publications by Ukrainian Internet Users

    OpenAIRE

    Nazarovets, Serhii

    2018-01-01

    Introduction. High subscription fees to scholarly research journals provoke researchers to use illegal channels of access to scientific information. Analysis of statistical data on downloads of scholarly research papers by Ukrainian Internet users from illegal web resource can help to define gaps in information provision at the institutional or the state level for each scientific field. Problem Statement. To conduct an analysis of behavior and geography of downloads of scholarly research p...

  10. Learning and mastery behaviours as risk factors to abandonment in a paediatric user of advanced single-switch access technology.

    Science.gov (United States)

    Brian, Leung; Jessica A, Brian; Tom, Chau

    2013-09-01

    The present descriptive case study documents the behaviours of a child single-switch user in the community setting and draws attention to learning and mastery behaviours as risk factors to single-switch abandonment. Our observations were interpreted in the context of a longer term school-based evaluation of an advanced single-switch access technology with a nine year-old user with severe spastic quadriplegic cerebral palsy. The child completed 25 experiment sessions averaging a rate of three sessions every two weeks. During each session he worked on several blocks of single-switch computer activity using his vocal cord vibration switch. Despite high levels of single-switch sensitivity and specificity that suggested a good fit between the participant and the technology, the participant perceived a lower proficiency level of his own abilities, demonstrated impatience and intolerance to interaction errors, and was apprehensive of making mistakes when using his switch in public. The benefit of gaining some degree of independent physical access might not necessarily enhance resilience to interaction errors or bouts of poor task performance. On the other hand, the participant's behaviours were consistent with those of a typically developing child learning or mastering any new skill or task. Implications for Rehabilitation The attitude and behaviour of a paediatric switch user towards skill development can be risk factors to abandonment of an access technology, despite successful clinical trial with the device. Children with severe disabilities can be associated with the same types of skill development behaviour patterns and achievement motivation as their typically developing peers. Empirical observations of the case participant's switch use behaviours suggest that user training could be adaptive in order to account for individual differences in skill development and achievement motivation.

  11. Give the people what they want: studying end-user needs for enhancing the web

    Directory of Open Access Journals (Sweden)

    Tak Yeon Lee

    2016-11-01

    Full Text Available End-user programming (EUP is a common approach for helping ordinary people create small programs for their professional or daily tasks. Since end-users may not have programming skills or strong motivation for learning them, tools should provide what end-users want with minimal costs of learning –i.e., they must decrease the barriers to entry. However, it is often hard to address these needs, especially for fast-evolving domains such as the Web. To better understand these existing and ongoing challenges, we conducted two formative studies with Web users –a semi-structured interview study, and a Wizard-of-Oz study. The interview study identifies challenges that participants have with their daily experiences on the Web. The Wizard-of-Oz study investigates how participants would naturally explain three computational tasks to an interviewer acting as a hypothetical computer agent. These studies demonstrate a disconnect between what end-users want and what existing EUP systems support, and thus open the door for a path towards better support for end user needs. In particular, our findings include: (1 analysis of challenges that end-users experience on the Web with solutions; (2 seven core functionalities of EUP for addressing these challenges; (3 characteristics of non-programmers describing three common computation tasks; (4 design implications for future EUP systems.

  12. Barriers to Access to Sterile Syringes as Perceived by Pharmacists and Injecting Drug Users: Implications for Harm Reduction in Lebanon.

    Science.gov (United States)

    Ghaddar, Ali; Nassar, Karine; Elsoury, Ghadier

    2017-09-19

    Access to sterile syringes to injecting drug users (IDU) reduces sharing behavior and prevents the transmission of HIV. To describe the barriers to access to sterile syringes for IDUs in Lebanon from the perspectives of pharmacists and IDUs. in this qualitative study conducted in Lebanon, data were collected from 72 syringe purchase tests at pharmacies, 64 interviewees with pharmacists and 2 focus groups with injecting drug users. Two independent researchers analyzed the verbatim transcripts. Results revealed that pharmacists often deny access to sterile syringes to IDUs who are frequently stigmatized and intimidated at pharmacies. While no large gender differences in pharmacists' attitudes and practices were observed, inequalities in syringe access were noticed with men IDUs more often denied purchase. Pharmacists had several barriers to sell syringes to IDUs including fear of disease spread, increased drug use, inappropriately discarded syringes, staff and customer safety, and business concerns. IDUs had several challenges to purchase syringes including stigmatization, intimidation, physical harassment, concern to reveal identity, fear of arrest and syringe price abuse. Identifying the barriers to and facilitators of access to sterile syringes to IDUs is important to guide the development of efficient policies. Findings implicate the importance of empowering IDUs to purchase syringes at pharmacies through reducing the negative attitude towards IDUs and strengthening pharmacists' role in the promotion of health of IDUs. Findings also suggest that the habit of syringe sharing would decrease if the legal and cultural barriers to access are reduced.

  13. Personal lifelong user model clouds

    DEFF Research Database (Denmark)

    Dolog, Peter; Kay, Judy; Kummerfeld, Bob

    This paper explores an architecture for very long term user modelling, based upon personal user model clouds. These ensure that the individual's applications can access their model whenever it is needed. At the same time, the user can control the use of their user model. So, they can ensure...... which combines both. Finally we discuss implications of our approach for consistency and freshness of the user model information....... it is accessed only when and where they wish, by applications that they wish. We consider the challenges of representing user models so that they can be reused by multiple applications. We indicate potential synergies between distributed and centralised user modelling architectures, proposing an architecture...

  14. Version II of the users manual for the Tuff Data Base Interface

    International Nuclear Information System (INIS)

    Welch, E.P.; Satter, B.J.; Langkopf, B.S.; Zeuch, D.H.

    1987-05-01

    The Nevada Nuclear Waste Storage Investigations (NNWSI) Project, managed by the Nevada Operations Office of the US Department of Energy, is investigating the feasibility of locating a repository at Yucca Mountain on and adjacent to the Nevada Test Site (NTS) in southern Nevada. A part of this investigation includes obtaining physical properties from laboratory tests on samples from Yucca Mountain and from field tests at Yucca Mountain. A computerized data base has been developed to store this data in a centralized location. The data base is stored on the Cyber 170/855 computer at Sandia using the System 2000 Data Base Management software. A user-friendly interface, the Tuff Data Base Interface (the Interface), allows NNWSI participants to retrieve data from the Tuff Data Base. The Interface gives users flexibility to retrieve portions of the Data Base related to their interests. This report gives basic instructions on accessing the Sandia computing system and explains how to use the Interface. 18 figs., 5 tabs

  15. User Types in Online Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2011-08-01

    Full Text Available Online applications are presented in the context of information society. Online applications characteristics are analyzed. Quality characteristics are presented in relation to online applications users. Types of users for AVIO application are presented. Use cases for AVIO application are identified. The limitations of AVIO application are defined. Types of users in online applications are identified. The threedimensional matrix of access to the online application resources is built. The user type-oriented database is structured. Access management of the fields related to the database tables is analyzed. The classification of online applications users is done.

  16. Version I of the users manual for the Tuff Data Base Interface

    International Nuclear Information System (INIS)

    Langkopf, B.S.; Satter, B.J.; Welch, E.P.

    1985-04-01

    The Nevada Nuclear Waste Storage Investigations (NNWSI) project, managed by the Nevada Operations Office of the US Department of Energy, is investigating the feasibility of locating a repository at Yucca Mountain on and adjacent to the Nevada Test Site (NTS) in southern Nevada. A part of this investigation includes obtaining physical properties from laboratory tests on samples from Yucca Mountain and field tests of the in situ tuffs at Yucca Mountain. A computerized data base has been developed to store this data in a centralized location. The data base is stored on the Cyber 170/855 computer at Sandia using the System 2000 Data Base Management software. A user-friendly interface, the Tuff Data Base Interface, is being developed to allow NNWSI participants to retrieve information from the Tuff Data Base directly. The Interface gives NNWSI users a great deal of flexibility in retrieving portions of the Data Base. This report is an interim users manual for the Tuff Data Base Interface, as of August 1984. It gives basic instructions on accessing the Sandia computing system and explains the Interface on a question-by-question basis

  17. Recommending access control decisions to social media users

    OpenAIRE

    Misra, Gaurav; Such, Jose M.

    2017-01-01

    Social media has become an integral part of the Internet and has revolutionized interpersonal communication. The lines of separation between content creators and content consumers have blurred as normal users have platforms such as social media sites, blogs and microblogs at their disposal on which they can create and consume content as well as have the opportunity to interact with other users. This change has also led to several well documented privacy problems for the users. The privacy pro...

  18. Assessing mouse alternatives to access to computer: a case study of a user with cerebral palsy.

    Science.gov (United States)

    Pousada, Thais; Pareira, Javier; Groba, Betania; Nieto, Laura; Pazos, Alejandro

    2014-01-01

    The purpose of this study is to describe the process of assessment of three assistive devices to meet the needs of a woman with cerebral palsy (CP) in order to provide her with computer access and use. The user has quadriplegic CP, with anarthria, using a syllabic keyboard. Devices were evaluated through a three-step approach: (a) use of a questionnaire to preselect potential assistive technologies, (b) use of an eTAO tool to determine the effectiveness of each devised, and (c) a conducting semi-structured interview to obtain qualitative data. Touch screen, joystick, and trackball were the preselected devices. The best device that met the user's needs and priorities was joystick. The finding was corroborated by both the eTAO tool and the semi-structured interview. Computers are a basic form of social participation. It is important to consider the special needs and priorities of users and to try different devices when undertaking a device-selection process. Environmental and personal factors have to be considered, as well. This leads to a need to evaluate new tools in order to provide the appropriate support. The eTAO could be a suitable instrument for this purpose. Additional research is also needed to understand how to better match devices with different user populations and how to comprehensively evaluate emerging technologies relative to users with disabilities.

  19. Developing a useful, user-friendly website for cancer patient follow-up: users' perspectives on ease of access and usefulness.

    Science.gov (United States)

    Bartlett, Y K; Selby, D L; Newsham, A; Keding, A; Forman, D; Brown, J; Velikova, G; Wright, P

    2012-11-01

    UK cancer survival has improved, leading to an increase in review patients and pressure on clinics. Use of the Internet for information exchange between patients and healthcare staff may provide a useful adjunct or alternative to traditional follow-up. This study aimed to develop and evaluate a website for use in follow-up cancer care in terms of usability, feasibility and acceptability. A website was developed and underwent iterative amendment following patient usability testing in focus groups. Patients on follow-up completed a Computer and Internet Usage Questionnaire. Internet users consented to a randomised crossover study to complete paper and online questionnaires, browse the website and participate in a website evaluation interview. Patient website use was tracked. Usability: Website changes were made following patient testing (n= 21). Patients would have liked a 'personalized' website with links to their clinical team, out with the scope of this study. Feasibility: The majority of participants (65%) had Internet access. Age remained a differentiating factor. Acceptability: Final evaluation (n= 103) was positive although many would like to maintain face-to-face hospital contact. User involvement in website design can ensure patient needs are met. A website model for follow-up will suit some patients but others will prefer clinical contact. © 2012 Blackwell Publishing Ltd.

  20. Spatial Release From Masking in Simulated Cochlear Implant Users With and Without Access to Low-Frequency Acoustic Hearing

    Directory of Open Access Journals (Sweden)

    Ben Williges

    2015-12-01

    Full Text Available For normal-hearing listeners, speech intelligibility improves if speech and noise are spatially separated. While this spatial release from masking has already been quantified in normal-hearing listeners in many studies, it is less clear how spatial release from masking changes in cochlear implant listeners with and without access to low-frequency acoustic hearing. Spatial release from masking depends on differences in access to speech cues due to hearing status and hearing device. To investigate the influence of these factors on speech intelligibility, the present study measured speech reception thresholds in spatially separated speech and noise for 10 different listener types. A vocoder was used to simulate cochlear implant processing and low-frequency filtering was used to simulate residual low-frequency hearing. These forms of processing were combined to simulate cochlear implant listening, listening based on low-frequency residual hearing, and combinations thereof. Simulated cochlear implant users with additional low-frequency acoustic hearing showed better speech intelligibility in noise than simulated cochlear implant users without acoustic hearing and had access to more spatial speech cues (e.g., higher binaural squelch. Cochlear implant listener types showed higher spatial release from masking with bilateral access to low-frequency acoustic hearing than without. A binaural speech intelligibility model with normal binaural processing showed overall good agreement with measured speech reception thresholds, spatial release from masking, and spatial speech cues. This indicates that differences in speech cues available to listener types are sufficient to explain the changes of spatial release from masking across these simulated listener types.

  1. Experiences of Fast Queue health care users in primary health care facilities in eThekwini district, South AfricaExperiences of Fast Queue health care users in primary health care facilities in eThekwini district, South Africa

    Directory of Open Access Journals (Sweden)

    Dudu G. Sokhela

    2013-07-01

    Full Text Available Background: Comprehensive Primary Health Care (PHC, based on the principles of accessibility, availability, affordability, equity and acceptability, was introduced in South Africa to address inequalities in health service provision. Whilst the Fast Queue was instrumental in the promotion of access to health care, a major goal of the PHC approach, facilities were not prepared for the sudden influx of clients. Increased access resulted in long waiting times and queues contributing to dissatisfaction with the service which could lead to missed appointments and non-compliance with established treatment plans.Objectives: Firstly to describe the experiences of clients using the Fast Queue strategy to access routine healthcare services and secondly, to determine how the clients’ experiences led to satisfaction or dissatisfaction with the Fast Queue service.Method: A descriptive qualitative survey using content analysis explored the experiences of the Fast Queue users in a PHC setting. Setting was first identified based on greatest number using the Fast Queue and geographic diversity and then a convenience sample of health care users of the Fast Queue were sampled individually along with one focus group of users who accessed the Queue monthly for medication refills. The same interview guide questions were used for both individual interviews and the one focus group discussion. Five clinics with the highest number of attendees during a three month period and a total of 83 health care users of the Fast Queue were interviewed. The average participant was female, 31 years old, single and unemployed.Results: Two themes with sub-themes emerged: health care user flow and communication, which highlights both satisfaction and dissatisfaction with the fast queue and queue marshals, could assist in directing users to the respective queues, reduce waiting time and keep users satisfied with the use of sign posts where there is a lack of human resources

  2. Overall satisfaction of health care users with the quality of and access to health care services: a cross-sectional study in six Central and Eastern European countries.

    Science.gov (United States)

    Stepurko, Tetiana; Pavlova, Milena; Groot, Wim

    2016-08-02

    The measurement of consumer satisfaction is an essential part of the assessment of health care services in terms of service quality and health care system responsiveness. Studies across Europe have described various strategies health care users employ to secure services with good quality and quick access. In Central and Eastern European countries, such strategies also include informal payments to health care providers. This paper analyzes the satisfaction of health care users with the quality of and access to health care services. The study focuses on six Central and Eastern European countries (Bulgaria, Hungary, Lithuania, Poland, Romania and Ukraine). We use data on past experience with health care use collected in 2010 through uniform national surveys in these countries. Based on these data, we carry out a multi-country analysis to investigate factors associated with the satisfaction of health care users in the six countries. The results indicate that about 10-14 % of the service users are not satisfied with the quality of, or access to health care services they used in the preceding year. However, significant differences across countries and services are observed, e.g. the highest level of dissatisfaction with access to outpatient services (16.4 %) is observed among patients in Lithuania, while in Poland, the level of dissatisfaction with quality of outpatient and inpatient services are much lower than dissatisfaction with access. The study also analyses the association of users' satisfaction with factors such as making informal payments, inability to pay and relative importance of service attributes stated by the service users. These multi-country findings provide evidence for health policy making in the Central and Eastern European countries. Although the average rates of satisfactions per country are relatively high, the results suggest that there is ample room for improvements. Specifically, many service-users still report dissatisfaction especially those

  3. Automated Computer Access Request System

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  4. Lexical-Access Ability and Cognitive Predictors of Speech Recognition in Noise in Adult Cochlear Implant Users.

    Science.gov (United States)

    Kaandorp, Marre W; Smits, Cas; Merkus, Paul; Festen, Joost M; Goverts, S Theo

    2017-01-01

    Not all of the variance in speech-recognition performance of cochlear implant (CI) users can be explained by biographic and auditory factors. In normal-hearing listeners, linguistic and cognitive factors determine most of speech-in-noise performance. The current study explored specifically the influence of visually measured lexical-access ability compared with other cognitive factors on speech recognition of 24 postlingually deafened CI users. Speech-recognition performance was measured with monosyllables in quiet (consonant-vowel-consonant [CVC]), sentences-in-noise (SIN), and digit-triplets in noise (DIN). In addition to a composite variable of lexical-access ability (LA), measured with a lexical-decision test (LDT) and word-naming task, vocabulary size, working-memory capacity (Reading Span test [RSpan]), and a visual analogue of the SIN test (text reception threshold test) were measured. The DIN test was used to correct for auditory factors in SIN thresholds by taking the difference between SIN and DIN: SRT diff . Correlation analyses revealed that duration of hearing loss (dHL) was related to SIN thresholds. Better working-memory capacity was related to SIN and SRT diff scores. LDT reaction time was positively correlated with SRT diff scores. No significant relationships were found for CVC or DIN scores with the predictor variables. Regression analyses showed that together with dHL, RSpan explained 55% of the variance in SIN thresholds. When controlling for auditory performance, LA, LDT, and RSpan separately explained, together with dHL, respectively 37%, 36%, and 46% of the variance in SRT diff outcome. The results suggest that poor verbal working-memory capacity and to a lesser extent poor lexical-access ability limit speech-recognition ability in listeners with a CI.

  5. Admission Control and Interference Management in Dynamic Spectrum Access Networks

    Directory of Open Access Journals (Sweden)

    Jorge Martinez-Bauset

    2010-01-01

    Full Text Available We study two important aspects to make dynamic spectrum access work in practice: the admission policy of secondary users (SUs to achieve a certain degree of quality of service and the management of the interference caused by SUs to primary users (PUs. In order to limit the forced termination probability of SUs, we evaluate the Fractional Guard Channel reservation scheme to give priority to spectrum handovers over new arrivals. We show that, contrary to what has been proposed, the throughput of SUs cannot be maximized by configuring the reservation parameter. We also study the interference caused by SUs to PUs. We propose and evaluate different mechanisms to reduce the interference, which are based on simple spectrum access algorithms for both PUs and SUs and channel repacking algorithms for SUs. Numerical results show that the reduction can be of one order of magnitude or more with respect to the random access case. Finally, we propose an adaptive admission control scheme that is able to limit simultaneously the forced termination probability of SUs and what we define as the probability of interference. Our scheme does not require any configuration parameters beyond the probability objectives. Besides, it is simple to implement and it can operate with any arrival process and distribution of the session duration.

  6. Impact of Users Identities and Access Conditions on Downlink Performance in Closed Small-Cell Networks

    KAUST Repository

    Radaydeh, Redha

    2015-05-26

    This paper investigates the effect of various operation parameters on the downlink user performance in overlaid small-cell networks. The case study considers closed-access small cells (e.g., femtocells), wherein only active authorized user equipments (UEs) can be served, and each of which is allocated single downlink channel at a time. On the other hand, the macrocell base station can unconditionally serve macrocell UEs that exist inside its coverage space. The available channels can be shared simultaneously in the macrocell network and the femtocell network. Moreover, a channel can be reused only at the macrocell base station. The analysis provides quantitative approaches to model UEs identities, their likelihoods of being active, and their likelihoods of producing interference, considering UEs classifications, locations, and access capabilities. Moreover, it develops models for various interference sources observed from effective interference femtocells, considering femtocells capacities and operation conditions. The associated formulations to describe a desired UE performance and the impact of the number of available channels as well as the adopted channel assignment approach are thoroughly investigated. The results are generally presented for any channel models of interference sources as well as the desired source of the served UE. Moreover, specific channel models are then adopted, for which generalized closedform analytical results for the desired UE outage probability performance are obtained. Numerical and simulation results are presented to further clarify the main outcomes of the developed analysis.

  7. Using mobile technologies to give health students access to learning resources in the UK community setting.

    Science.gov (United States)

    Walton, Graham; Childs, Susan; Blenkinsopp, Elizabeth

    2005-12-01

    This article describes a project which explored the potential for mobile technologies to give health students in the community access to learning resources. The purpose included the need to identify possible barriers students could face in using mobile technologies. Another focus was to assess the students perceptions of the importance of being able to access learning resources in the community. This 1-year project used two main approaches for data collection. A review of the literature on mobile technologies in the health context was conducted. This was used in a systematic way to identify key issues and trends. The literature review was used to inform the design and production of a questionnaire. This was distributed to and completed by a group of community health students at Northumbria University, UK. The questionnaire was piloted and there was a 100% completion rate with 49 returned forms. The literature review indicated that most mobile technology applications were occurring in the US. At the time of the review the most prevalent mobile technologies were PDAs, laptops, WAP phones and portable radios with use being concentrated around doctors in the acute sector. A range of advantages and disadvantages to the technology were discovered. Mobile technologies were mainly being used for clinical rather than learning applications. The students showed a low level of awareness of the technology but placed great importance to accessing learning resources from the community. Significant development and changes are taking place in mobile technologies. Since the data collection for this work was completed in 2004 podcasting and videocasting have become significant in mobile learning for health professionals. Librarians will need to address the relevance and implications of m-learning for their practice. Care and consideration needs to be given on the time and resources librarians allocate for the necessary development work around mobile technologies. Collaboration and

  8. Accessibility observations of visually impaired users using the South African National Accessibility Portal

    CSIR Research Space (South Africa)

    Coetzee, L

    2008-05-01

    Full Text Available . Improving web site accessibility has proven to be a challenging task with a myriad of standards, accessibility testing tools and few technical guides for implementation. This paper presents the South African National Accessibility Portal (NAP), which is used...

  9. Graphical User Interfaces and Library Systems: End-User Reactions.

    Science.gov (United States)

    Zorn, Margaret; Marshall, Lucy

    1995-01-01

    Describes a study by Parke-Davis Pharmaceutical Research Library to determine user satisfaction with the graphical user interface-based (GUI) Dynix Marquis compared with the text-based Dynix Classic Online Public Access Catalog (OPAC). Results show that the GUI-based OPAC was preferred by endusers over the text-based OPAC. (eight references) (DGM)

  10. Single-centre experience with Renal PatientView, a web-based system that provides patients with access to their laboratory results.

    Science.gov (United States)

    Woywodt, Alexander; Vythelingum, Kervina; Rayner, Scott; Anderton, John; Ahmed, Aimun

    2014-10-01

    Renal PatientView (RPV) is a novel, web-based system in the UK that provides patients with access to their laboratory results, in conjunction with patient information. To study how renal patients within our centre access and use RPV. We sent out questionnaires in December 2011 to all 651 RPV users under our care. We collected information on aspects such as the frequency and timing of RPV usage, the parameters viewed by users, and the impact of RPV on their care. A total of 295 (45 %) questionnaires were returned. The predominant users of RPV were transplant patients (42 %) followed by pre-dialysis chronic kidney disease patients (37 %). Forty-two percent of RPV users accessed their results after their clinic appointments, 38 % prior to visiting the clinic. The majority of patients (76 %) had used the system to discuss treatment with their renal physician, while 20 % of patients gave permission to other members of their family to use RPV to monitor results on their behalf. Most users (78 %) reported accessing RPV on average 1-5 times/month. Most patients used RPV to monitor their kidney function, 81 % to check creatinine levels, 57 % to check potassium results. Ninety-two percent of patients found RPV easy to use and 93 % felt that overall the system helps them in taking care of their condition; 53 % of patients reported high satisfaction with RPV. Our results provide interesting insight into use of a system that gives patients web-based access to laboratory results. The fact that 20 % of patients delegate access to relatives also warrants further study. We propose that online access to laboratory results should be offered to all renal patients, although clinicians need to be mindful of the 'digital divide', i.e. part of the population that is not amenable to IT-based strategies for patient empowerment.

  11. Key Based Mutual Authentication (KBMA Mechanism for Secured Access in MobiCloud Environment

    Directory of Open Access Journals (Sweden)

    Donald A. Cecil

    2016-01-01

    Full Text Available Mobile Cloud Computing (MCC fuels innovation in Mobile Computing and opens new pathways between mobile devices and infrastructures. There are several issues in MCC environment as it integrates various technologies. Among all issues, security lies on the top where many users are not willing to adopt the cloud services. This paper focuses on the authentication. The objective of this paper is to provide a mechanism for authenticating all the entities involved in accessing the cloud services. A mechanism called Key Based Mutual Authentication (KBMA is proposed which is divided into two processes namely registration and authentication. Registration is a one-time process where the users are registered for accessing the cloud services by giving the desired unique information. Authentication process is carried out mutually to verify the identities of Device and Cloud Service Provider (CSP. Scyther tool is used for analysing the vulnerability in terms of attacks. The result claims show that the proposed mechanism is resilient against various attacks.

  12. User interface user's guide for HYPGEN

    Science.gov (United States)

    Chiu, Ing-Tsau

    1992-01-01

    The user interface (UI) of HYPGEN is developed using Panel Library to shorten the learning curve for new users and provide easier ways to run HYPGEN for casual users as well as for advanced users. Menus, buttons, sliders, and type-in fields are used extensively in UI to allow users to point and click with a mouse to choose various available options or to change values of parameters. On-line help is provided to give users information on using UI without consulting the manual. Default values are set for most parameters and boundary conditions are determined by UI to further reduce the effort needed to run HYPGEN; however, users are free to make any changes and save it in a file for later use. A hook to PLOT3D is built in to allow graphics manipulation. The viewpoint and min/max box for PLOT3D windows are computed by UI and saved in a PLOT3D journal file. For large grids which take a long time to generate on workstations, the grid generator (HYPGEN) can be run on faster computers such as Crays, while UI stays at the workstation.

  13. A novel clustering and supervising users' profiles method

    Institute of Scientific and Technical Information of China (English)

    Zhu Mingfu; Zhang Hongbin; Song Fangyun

    2005-01-01

    To better understand different users' accessing intentions, a novel clustering and supervising method based on accessing path is presented. This method divides users' interest space to express the distribution of users' interests, and directly to instruct the constructing process of web pages indexing for advanced performance.

  14. The AAS Working Group on Accessibility and Disability (WGAD) Year 1 Highlights and Database Access

    Science.gov (United States)

    Knierman, Karen A.; Diaz Merced, Wanda; Aarnio, Alicia; Garcia, Beatriz; Monkiewicz, Jacqueline A.; Murphy, Nicholas Arnold

    2017-06-01

    The AAS Working Group on Accessibility and Disability (WGAD) was formed in January of 2016 with the express purpose of seeking equity of opportunity and building inclusive practices for disabled astronomers at all educational and career stages. In this presentation, we will provide a summary of current activities, focusing on developing best practices for accessibility with respect to astronomical databases, publications, and meetings. Due to the reliance of space sciences on databases, it is important to have user centered design systems for data retrieval. The cognitive overload that may be experienced by users of current databases may be mitigated by use of multi-modal interfaces such as xSonify. Such interfaces would be in parallel or outside the original database and would not require additional software efforts from the original database. WGAD is partnering with the IAU Commission C1 WG Astronomy for Equity and Inclusion to develop such accessibility tools for databases and methods for user testing. To collect data on astronomical conference and meeting accessibility considerations, WGAD solicited feedback from January AAS attendees via a web form. These data, together with upcoming input from the community and analysis of accessibility documents of similar conferences, will be used to create a meeting accessibility document. Additionally, we will update the progress of journal access guidelines and our social media presence via Twitter. We recommend that astronomical journals form committees to evaluate the accessibility of their publications by performing user-centered usability studies.

  15. Performance analysis of quantum access network using code division multiple access model

    International Nuclear Information System (INIS)

    Hu Linxi; Yang Can; He Guangqiang

    2017-01-01

    A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of the code. Recently, the chaotic phase shifters were proposed to guarantee the orthogonality by different chaotic signals and spread the spectral content of the quantum states. In this letter, we propose to implement the code division multiple access quantum network by using chaotic phase shifters and synchronization. Due to the orthogonality of the different chaotic phase shifter, every pair of users can faithfully transmit quantum information through a common channel and have little crosstalk between different users. Meanwhile, the broadband spectra of chaotic signals efficiently help the quantum states to defend against channel loss and noise. (paper)

  16. Privacy notice for dummies? Towards European guidelines on how to give "clear and comprehensive information" on the cookies' use in order to protect the internet users' right to online privacy

    NARCIS (Netherlands)

    Luzak, J.A.

    2014-01-01

    The reviewed ePrivacy Directive aims at ensuring internet users’ online privacy by requiring users to give informed consent to the gathering, storing, and processing of their data by internet service providers, e.g., through the cookies’ use. However, it is hardly possible to talk about an

  17. CAPTCHA: Impact on User Experience of Users with Learning Disabilities

    Directory of Open Access Journals (Sweden)

    Ruti Gafni

    2016-12-01

    Full Text Available CAPTCHA is one of the most common solutions to check if the user trying to enter a Website is a real person or an automated piece of software. This challenge-response test, implemented in many Internet Websites, emphasizes the gaps between accessibility and security on the Internet, as it poses an obstacle for the learning-impaired in the reading and comprehension of what is presented in the test. Various types of CAPTCHA tests have been developed in order to address accessibility and security issues. The objective of this study is to investigate how the differences between various CAPTCHA tests affect user experience among populations with and without learning disabilities. A questionnaire accompanied by experiencing five different tests was administered to 212 users, 60 of them with learning disabilities. Response rates for each test and levels of success were collected automatically. Findings suggest that users with learning disabilities have more difficulties in solving the tests, especially those with distorted texts, have more negative attitudes towards the CAPTCHA tests, but the response time has no statistical difference from users without learning disabilities. These insights can help to develop and implement solutions suitable for many users and especially for population with learning disabilities.

  18. Representing Graphical User Interfaces with Sound: A Review of Approaches

    Science.gov (United States)

    Ratanasit, Dan; Moore, Melody M.

    2005-01-01

    The inability of computer users who are visually impaired to access graphical user interfaces (GUIs) has led researchers to propose approaches for adapting GUIs to auditory interfaces, with the goal of providing access for visually impaired people. This article outlines the issues involved in nonvisual access to graphical user interfaces, reviews…

  19. Accessibility information in New Delhi for "EasenAccess" Android-based app for persons with disability: an observational study.

    Science.gov (United States)

    Agarwal, Yashovardhan

    2018-06-14

    The World Health Organization and the World Bank's "World Report on Disability" reported that over 1 billion people have various kinds of disability worldwide while Indian Census 2011 reported about 26 million in India. The United Nations Convention states, "The Rights of Persons with Disabilities (PwD) include accessibility to Information, Transportation, Environment, Communication Technology and Services". This article takes forward the reason of making the "EasenAccess" (EnA) Android-based app to empower PwD with wheelchair-accessibility information, communication sentences and sending SOS signals with location. A survey of 25 most frequented places in New Delhi by common people and tourist with chosen 12 parameters in comparison the Government of India's survey of 100 most important buildings nationally. A statistical analysis and recommendations about areas for improvement, for the Government of India. EasenAccess helps millions of PwD to enable them with freedom of movement for employment and socio-economic activities to lead an independent lifestyle. EasenAccess increases government's access to information about lacunae, gives them an easy way to tabulate the places where more accessibility needs updating, and helps the government in facilitating information flow to the PwD. Implication for Rehabilitation The Rights of Persons with Disability Act in 2016 covers both the concepts of Universal Design of products, environments and programs; and accessibility. We are exploring with them the ways technology can help bridge the gap between rehabilitation and accessibility. In the higher income countries such as the UK or USA, it is normal for a person to receive training when being given a wheelchair to prevent future injuries. Frequently, even with this, training people develop upper limb injuries, due in part to the high, repetitive loads needed to push a wheelchair. This training is given as part of a package of rehabilitation, which also normally includes

  20. Web Accessibility and Guidelines

    Science.gov (United States)

    Harper, Simon; Yesilada, Yeliz

    Access to, and movement around, complex online environments, of which the World Wide Web (Web) is the most popular example, has long been considered an important and major issue in the Web design and usability field. The commonly used slang phrase ‘surfing the Web’ implies rapid and free access, pointing to its importance among designers and users alike. It has also been long established that this potentially complex and difficult access is further complicated, and becomes neither rapid nor free, if the user is disabled. There are millions of people who have disabilities that affect their use of the Web. Web accessibility aims to help these people to perceive, understand, navigate, and interact with, as well as contribute to, the Web, and thereby the society in general. This accessibility is, in part, facilitated by the Web Content Accessibility Guidelines (WCAG) currently moving from version one to two. These guidelines are intended to encourage designers to make sure their sites conform to specifications, and in that conformance enable the assistive technologies of disabled users to better interact with the page content. In this way, it was hoped that accessibility could be supported. While this is in part true, guidelines do not solve all problems and the new WCAG version two guidelines are surrounded by controversy and intrigue. This chapter aims to establish the published literature related to Web accessibility and Web accessibility guidelines, and discuss limitations of the current guidelines and future directions.

  1. [The social value of teeth and access to dental health services].

    Science.gov (United States)

    Fonseca, Luciara Leão Viana; Nehmy, Rosa Maria Quadros; Mota, Joaquim Antônio César

    2015-10-01

    Oral healthcare provided by the Unified Health System (SUS) faces the challenge of attending the epidemiological profile of Brazil's adult population. Qualitative research using semi-structured interviews was conducted to understand the experiences, expectations and perception of SUS users to services in Diamantina, State of Minas Gerais, and content analysis was used to assess the data. Discussion of the results was based on dialogue between the symbolic interactionism of Goffman and Bourdieu's concept of habitus. The results show that the users did not give importance to dental care during childhood and adolescence because care was unknown to them. There was no offer of treatment besides dental extraction. Today, they value teeth and suffer the embarrassment caused by rotten teeth. However, access to dental restoration via SUS is not possible. For their children, they perceive better access to information and care, but for specialized procedures there are barriers. They express resignation both in relation to the poor state of the teeth and the difficulties of access to dental care, which can be understood by the constant exclusion experienced by them in the past, shaping their actions in the present. It was concluded that oral health in SUS should incorporate the social value and the aesthetic dimension of teeth as a social right.

  2. Experiences of Fast Queue health care users in primary health care facilities in eThekwini district, South Africa.

    Science.gov (United States)

    Sokhela, Dudu G; Makhanya, Nonhlanhla J; Sibiya, Nokuthula M; Nokes, Kathleen M

    2013-07-05

    Comprehensive Primary Health Care (PHC), based on the principles of accessibility, availability, affordability, equity and acceptability, was introduced in South Africa to address inequalities in health service provision. Whilst the Fast Queue was instrumental in the promotion of access to health care, a major goal of the PHC approach, facilities were not prepared for the sudden influx of clients. Increased access resulted in long waiting times and queues contributing to dissatisfaction with the service which could lead to missed appointments and non-compliance with established treatment plans. Firstly to describe the experiences of clients using the Fast Queue strategy to access routine healthcare services and secondly, to determine how the clients' experiences led to satisfaction or dissatisfaction with the Fast Queue service. A descriptive qualitative survey using content analysis explored the experiences of the Fast Queue users in a PHC setting. Setting was first identified based on greatest number using the Fast Queue and geographic diversity and then a convenience sample of health care users of the Fast Queue were sampled individually along with one focus group of users who accessed the Queue monthly for medication refills. The same interview guide questions were used for both individual interviews and the one focus group discussion. Five clinics with the highest number of attendees during a three month period and a total of 83 health care users of the Fast Queue were interviewed. The average participant was female, 31 years old, single and unemployed. Two themes with sub-themes emerged: health care user flow and communication, which highlights both satisfaction and dissatisfaction with the fast queue and queue marshals, could assist in directing users to the respective queues, reduce waiting time and keep users satisfied with the use of sign posts where there is a lack of human resources. Effective health communication strategies contribute to positive

  3. Experiences of Fast Queue health care users in primary health care facilities in eThekwini district, South Africa

    Directory of Open Access Journals (Sweden)

    Dudu G. Sokhela

    2013-07-01

    Full Text Available Background: Comprehensive Primary Health Care (PHC, based on the principles of accessibility, availability, affordability, equity and acceptability, was introduced in South Africa to address inequalities in health service provision. Whilst the Fast Queue was instrumental in the promotion of access to health care, a major goal of the PHC approach, facilities were not prepared for the sudden influx of clients. Increased access resulted in long waiting times and queues contributing to dissatisfaction with the service which could lead to missed appointments and non-compliance with established treatment plans. Objectives: Firstly to describe the experiences of clients using the Fast Queue strategy to access routine healthcare services and secondly, to determine how the clients’ experiences led to satisfaction or dissatisfaction with the Fast Queue service. Method: A descriptive qualitative survey using content analysis explored the experiences of the Fast Queue users in a PHC setting. Setting was first identified based on greatest number using the Fast Queue and geographic diversity and then a convenience sample of health care users of the Fast Queue were sampled individually along with one focus group of users who accessed the Queue monthly for medication refills. The same interview guide questions were used for both individual interviews and the one focus group discussion. Five clinics with the highest number of attendees during a three month period and a total of 83 health care users of the Fast Queue were interviewed. The average participant was female, 31 years old, single and unemployed. Results: Two themes with sub-themes emerged: health care user flow and communication, which highlights both satisfaction and dissatisfaction with the fast queue and queue marshals, could assist in directing users to the respective queues, reduce waiting time and keep users satisfied with the use of sign posts where there is a lack of human resources

  4. Enterprise Dynamic Access Control (EDAC)

    National Research Council Canada - National Science Library

    Fernandez, Richard

    2005-01-01

    .... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...

  5. Removing user fees for health services: A multi-epistemological perspective on access inequities in Senegal.

    Science.gov (United States)

    Mladovsky, Philipa; Ba, Maymouna

    2017-09-01

    Plan Sésame (PS) is a user fee exemption policy launched in 2006 to provide free access to health services to Senegalese citizens aged 60 and over. Analysis of a large household survey evaluating PS echoes findings of other studies showing that user fee removal can be highly inequitable. 34 semi-structured interviews and 19 focus group discussions with people aged 60 and over were conducted in four regions in Senegal (Dakar, Diourbel, Matam and Tambacounda) over a period of six months during 2012. They were analysed to identify underlying causes of exclusion from/inclusion in PS and triangulated with the household survey. The results point to three steps at which exclusion occurs: (i) not being informed about PS; (ii) not perceiving a need to use health services under PS; and (iii) inability to access health services under PS, despite having the information and perceived need. We identify lay explanations for exclusion at these different steps. Some lay explanations point to social exclusion, defined as unequal power relations. For example, poor access to PS was seen to be caused by corruption, patronage, poverty, lack of social support, internalised discrimination and adverse incorporation. Other lay explanations do not point to social exclusion, for example: poor implementation; inadequate funding; high population demand; incompetent bureaucracy; and PS as a favour or moral obligation to friends or family. Within a critical realist paradigm, we interpret these lay explanations as empirical evidence for the presence of the following hidden underlying causal mechanisms: lacking capabilities; mobilisation of institutional bias; and social closure. However, social constructionist perspectives lead us to critique this paradigm by drawing attention to contested health, wellbeing and corruption discourses. These differences in interpretation lead to subsequent differential policy recommendations. This demonstrates the need for the adoption of a "multi

  6. What drives Users' Website Registration?

    NARCIS (Netherlands)

    T. Li (Ting); P.A. Pavlou (Paul)

    2013-01-01

    textabstractUser registration is an important prerequisite for the success of many websites by enabling users to gain access to domain information and personalized content. It is not always desirable for users, however, because they need to disclose personal information. This paper examines what

  7. What Can Nature Teach Us About Improving Earth Science Data Access?

    Science.gov (United States)

    Young, S.

    2012-12-01

    Humans have collected earth observations data for centuries, helping us understand present conditions, allowing us to forecast the future, and giving us a window billions of years into the past. In the last 40 years the collection of earth observations data has increased on a truly massive and accelerating scale. Our abilities to collect new data have outpaced our abilities to access and use the data in all the ways users may expect. Mobile technology is a prime example. Smart telephones and tablet devices are proliferating rapidly; by 2016 there likely will be more smartphones than PCs on the planet. Earth data providers need to plan for and evolve to meet the needs, expectations, and capabilities of vast new numbers of mobile users. These users will not only consume data; many of them will also want to provide data via crowdsourcing or "citizen science" efforts. Can we channel the desire to provide citizen data in ways that help to ground-truth other observations, enrich the observations base, and improve data quality? Innovation will be key to meeting such challenges. Is it possible to innovate by studying the past? Does the earth system itself hold lessons that we can apply? We will examine what nature can teach us to foster sustainable innovation in our information technologies. Simplicity enables complexity; understanding complexity requires a return to simplicity. This presentation describes several user scenarios and examples of simplicity-complexity interactions to illustrate the connections with earth science data access.

  8. Factors that help injecting drug users to access and benefit from services: A qualitative study

    Directory of Open Access Journals (Sweden)

    sheard Laura

    2007-10-01

    Full Text Available Abstract Background International research shows that injecting drug users (IDUs can encounter many barriers when they try to access drug treatment and other services. However, the existing literature is mostly quantitative and does not consider the kinds of factors that injectors themselves identify as enabling them to access and benefit from services. Responding to this gap in knowledge, our paper explores IDUs' own suggestions for improving service engagement and their reports of other factors enabling them to seek help. Methods Semi-structured qualitative interviews were conducted with 75 current illicit drug injectors in three geographically diverse areas of West Yorkshire, England. Recruitment was through needle exchange programmes, with additional snowball sampling to ensure inclusivity of gender, ethnicity and primary drug injected. Transcribed data were analysed thematically using Framework. Results Although participants were often satisfied with current access to services, they made three broad suggestions for improving engagement. These were: providing more services (more providers and more forms of support; better operation of existing services (including better communication systems and more flexibility around individual needs; and staffing-related improvements (particularly, less judgemental and more understanding staff attitudes. Other factors identified as important enablers of help seeking were: having supporting relationships (particularly with family members; personal circumstances/life events (especially becoming a parent; and an injector's state of mind (such as feeling motivated and positive. Conclusion A range of practical suggestions for improving IDUs' access to drug treatment and other services are identified.

  9. Full-Text Linking: Affiliated versus Nonaffiliated Access in a Free Database.

    Science.gov (United States)

    Grogg, Jill E.; Andreadis, Debra K.; Kirk, Rachel A.

    2002-01-01

    Presents a comparison of access to full-text articles from a free bibliographic database (PubSCIENCE) for affiliated and unaffiliated users. Found that affiliated users had access to more full-text articles than unaffiliated users had, and that both types of users could increase their level of access through additional searching and greater…

  10. Easing Internet access of health information for elderly users

    NARCIS (Netherlands)

    Alpay, L.L.; Toussaint, P.J.; Ezendam, N.P.M.; Rövekamp, T.A.J.M.; Graafmans, W.C.; Westendorp, R.G.J.

    2004-01-01

    Elderly users are increasingly becoming active consumers of Internet technologies. Developing websites dedicated to this user group presents several design issues (such as that of 'design for all', participatory design, patient empowerment and cognitive usability assessment methods). SeniorGezond is

  11. From Web accessibility to Web adaptability.

    Science.gov (United States)

    Kelly, Brian; Nevile, Liddy; Sloan, David; Fanou, Sotiris; Ellison, Ruth; Herrod, Lisa

    2009-07-01

    This article asserts that current approaches to enhance the accessibility of Web resources fail to provide a solid foundation for the development of a robust and future-proofed framework. In particular, they fail to take advantage of new technologies and technological practices. The article introduces a framework for Web adaptability, which encourages the development of Web-based services that can be resilient to the diversity of uses of such services, the target audience, available resources, technical innovations, organisational policies and relevant definitions of 'accessibility'. The article refers to a series of author-focussed approaches to accessibility through which the authors and others have struggled to find ways to promote accessibility for people with disabilities. These approaches depend upon the resource author's determination of the anticipated users' needs and their provision. Through approaches labelled as 1.0, 2.0 and 3.0, the authors have widened their focus to account for contexts and individual differences in target audiences. Now, the authors want to recognise the role of users in determining their engagement with resources (including services). To distinguish this new approach, the term 'adaptability' has been used to replace 'accessibility'; new definitions of accessibility have been adopted, and the authors have reviewed their previous work to clarify how it is relevant to the new approach. Accessibility 1.0 is here characterised as a technical approach in which authors are told how to construct resources for a broadly defined audience. This is known as universal design. Accessibility 2.0 was introduced to point to the need to account for the context in which resources would be used, to help overcome inadequacies identified in the purely technical approach. Accessibility 3.0 moved the focus on users from a homogenised universal definition to recognition of the idiosyncratic needs and preferences of individuals and to cater for them. All of

  12. A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

    Directory of Open Access Journals (Sweden)

    Masakatsu Nishigaki

    2007-04-01

    Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

  13. Artificial intelligence techniques for modeling database user behavior

    Science.gov (United States)

    Tanner, Steve; Graves, Sara J.

    1990-01-01

    The design and development of the adaptive modeling system is described. This system models how a user accesses a relational database management system in order to improve its performance by discovering use access patterns. In the current system, these patterns are used to improve the user interface and may be used to speed data retrieval, support query optimization and support a more flexible data representation. The system models both syntactic and semantic information about the user's access and employs both procedural and rule-based logic to manipulate the model.

  14. User's guide of DETRAS system-2. Setup of DETRAS system and its startup

    International Nuclear Information System (INIS)

    Yamaguchi, Yukichi

    2007-01-01

    DETRAS system is a PWR reactor simulator system for operation training whose distinguished feature is that it can be operated from the remote place of the simulator site. The document which is the second one of a series of three volumes of the user's guide of DETRAS describes a startup procedure of the DETRAS system over the simulator area, the local network involving the simulator and then gives explanation about the procedure of remote access for startup and shutdown of the simulator outside of the simulator area. (author)

  15. Web accessibility standards and disability: developing critical perspectives on accessibility.

    Science.gov (United States)

    Lewthwaite, Sarah

    2014-01-01

    Currently, dominant web accessibility standards do not respect disability as a complex and culturally contingent interaction; recognizing that disability is a variable, contrary and political power relation, rather than a biological limit. Against this background there is clear scope to broaden the ways in which accessibility standards are understood, developed and applied. Commentary. The values that shape and are shaped by legislation promote universal, statistical and automated approaches to web accessibility. This results in web accessibility standards conveying powerful norms fixing the relationship between technology and disability, irrespective of geographical, social, technological or cultural diversity. Web accessibility standards are designed to enact universal principles; however, they express partial and biopolitical understandings of the relation between disability and technology. These values can be limiting, and potentially counter-productive, for example, for the majority of disabled people in the "Global South" where different contexts constitute different disabilities and different experiences of web access. To create more robust, accessible outcomes for disabled people, research and standards practice should diversify to embrace more interactional accounts of disability in different settings. Implications for Rehabilitation Creating accessible experiences is an essential aspect of rehabilitation. Web standards promote universal accessibility as a property of an online resource or service. This undervalues the importance of the user's intentions, expertize, their context, and the complex social and cultural nature of disability. Standardized, universal approaches to web accessibility may lead to counterproductive outcomes for disabled people whose impairments and circumstances do not meet Western disability and accessibility norms. Accessible experiences for rehabilitation can be enhanced through an additional focus on holistic approaches to

  16. BlindSense: An Accessibility-inclusive Universal User Interface for Blind People

    Directory of Open Access Journals (Sweden)

    A. Khan

    2018-04-01

    Full Text Available A large number of blind people use smartphone-based assistive technology to perform their common activities. In order to provide a better user experience the existing user interface paradigm needs to be revisited. A new user interface model has been proposed in this paper. A simplified, semantically consistent, and blind-friendly adaptive user interface is provided. The proposed solution is evaluated through an empirical study on 63 blind people leveraging an improved user experience in performing common activities on a smartphone.

  17. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  18. Ensuring Energy Efficient 5G User Equipment by Technology Evolution and Reuse

    DEFF Research Database (Denmark)

    Lauridsen, Mads; Berardinelli, Gilberto; Sørensen, Troels Bundgaard

    2014-01-01

    the features’ pros and cons in achieving high performance in terms of data rate and/or latency while limiting their effect on the UE power consumption. Based on the discussion we give general recommendations for an energy efficient 5G design in the context of a previously proposed RAT concept.......Research on fifth generation (5G) radio access technology (RAT) is ramping up, with the goal of significantly improving user data rates and latency compared to previous radio generations. While energy efficiency (EE) of the user equipment (UE) was not a key optimization parameter for the current...... standards, it is anticipated to become a distinguishing factor for 5G. In this paper, we analyze established and emerging technological solutions for features such as waveform, frame structure, duplexing and multiple antenna transmission from an EE perspective. Our contribution is to identify and discuss...

  19. Signature-based User Authentication

    OpenAIRE

    Hámorník, Juraj

    2015-01-01

    This work aims on missing handwritten signature authentication in Windows. Result of this work is standalone software that allow users to log into Windows by writing signature. We focus on security of signature authentification and best overall user experience. We implemented signature authentification service that accept signature and return user access token if signature is genuine. Signature authentification is done by comparing given signature to signature patterns by their similarity. Si...

  20. National Geothermal Data System: Open Access to Geoscience Data, Maps, and Documents

    Science.gov (United States)

    Caudill, C. M.; Richard, S. M.; Musil, L.; Sonnenschein, A.; Good, J.

    2014-12-01

    The U.S. National Geothermal Data System (NGDS) provides free open access to millions of geoscience data records, publications, maps, and reports via distributed web services to propel geothermal research, development, and production. NGDS is built on the US Geoscience Information Network (USGIN) data integration framework, which is a joint undertaking of the USGS and the Association of American State Geologists (AASG), and is compliant with international standards and protocols. NGDS currently serves geoscience information from 60+ data providers in all 50 states. Free and open source software is used in this federated system where data owners maintain control of their data. This interactive online system makes geoscience data easily discoverable, accessible, and interoperable at no cost to users. The dynamic project site http://geothermaldata.org serves as the information source and gateway to the system, allowing data and applications discovery and availability of the system's data feed. It also provides access to NGDS specifications and the free and open source code base (on GitHub), a map-centric and library style search interface, other software applications utilizing NGDS services, NGDS tutorials (via YouTube and USGIN site), and user-created tools and scripts. The user-friendly map-centric web-based application has been created to support finding, visualizing, mapping, and acquisition of data based on topic, location, time, provider, or key words. Geographic datasets visualized through the map interface also allow users to inspect the details of individual GIS data points (e.g. wells, geologic units, etc.). In addition, the interface provides the information necessary for users to access the GIS data from third party software applications such as GoogleEarth, UDig, and ArcGIS. A redistributable, free and open source software package called GINstack (USGIN software stack) was also created to give data providers a simple way to release data using

  1. Phases and Steps in the Access to Data in Information Tools

    DEFF Research Database (Denmark)

    Bergenholtz, Henning; Bothma, Theo; Gouws, Rufus

    2015-01-01

    route and access time, but not access structure. This term is not only ill defined – it is less relevant, because each user has different access routes, and also the same user makes use of different routes in different cases. We describe four experiments in a case study with one test person how...... the different access processes in different user situations take place. This test person is trying to solve different accounting information needs in different user situations. The aim of this paper is to compare and contrast the access process terminology of lexicography and information science, to systematize...... the terms in a logical structure and to show how these disciplines complement one another by providing clearer definitions to describe the different access processes....

  2. Information users and usability in the digital age

    CERN Document Server

    Chowdhury, G G

    2013-01-01

    Gives an overview of the necessary issues relating to information users and the usability of information services in the digital world, including user-centred design, and the characteristics and behaviour of information users. This book helps readers understand why information users and the usability of information services are important.

  3. Accessible Website Content Guidelines for Users with Intellectual Disabilities

    NARCIS (Netherlands)

    Karreman, Joyce; van der Geest, Thea; Buursink, Esmee

    2007-01-01

    Background: The W3C Web Accessibility Initiative has issued guidelines for making websites better and easier to access for people with various disabilities (W3C Web Accessibility Initiative guidelines 1999). - Method: The usability of two versions of a website (a non-adapted site and a site that was

  4. Customization of user interfaces to reduce errors and enhance user acceptance.

    Science.gov (United States)

    Burkolter, Dina; Weyers, Benjamin; Kluge, Annette; Luther, Wolfram

    2014-03-01

    Customization is assumed to reduce error and increase user acceptance in the human-machine relation. Reconfiguration gives the operator the option to customize a user interface according to his or her own preferences. An experimental study with 72 computer science students using a simulated process control task was conducted. The reconfiguration group (RG) interactively reconfigured their user interfaces and used the reconfigured user interface in the subsequent test whereas the control group (CG) used a default user interface. Results showed significantly lower error rates and higher acceptance of the RG compared to the CG while there were no significant differences between the groups regarding situation awareness and mental workload. Reconfiguration seems to be promising and therefore warrants further exploration. Copyright © 2013 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  5. Overview of Graphical User Interfaces.

    Science.gov (United States)

    Hulser, Richard P.

    1993-01-01

    Discussion of graphical user interfaces for online public access catalogs (OPACs) covers the history of OPACs; OPAC front-end design, including examples from Indiana University and the University of Illinois; and planning and implementation of a user interface. (10 references) (EA)

  6. Which Users Should Be the Focus of Mobile Personal Health Records? Analysis of User Characteristics Influencing Usage of a Tethered Mobile Personal Health Record.

    Science.gov (United States)

    Lee, Guna; Park, Joong Yeol; Shin, Soo-Yong; Hwang, Jong Su; Ryu, Hyeon Jeong; Lee, Jae Ho; Bates, David W

    2016-05-01

    This study was conducted to analyze the usage pattern of a hospital-tethered mobile personal health records (m-PHRs) application named My Chart in My Hand (MCMH) and to identify user characteristics that influence m-PHR usage. Access logs to MCMH and its menus were collected for a total of 18 months, from August 2011 to January 2013. Usage patterns between users without a patient identification number (ID) and users with a patient ID were compared. Users with a patient ID were divided into light and heavy user groups by the median number of monthly access. Multiple linear regression models were used to assess MCMH usage pattern by characteristics of MCMH user with a patient ID. The total number of MCMH logins was 105,603, and the median number of accesses was 15 times. Users (n = 7,096) mostly accessed the "My Chart" menu, but "OPD [outpatient department] Service Support" and "Health Management" menus were also frequently used. Patients with chronic diseases, experience of hospital visits including emergency room and OPD, and age group of 0-19 years were more frequently found among users with a patient ID (n = 2,186) (p < 0.001). A similar trend was found in the heavy user group (n = 1,123). Submenus of laboratory result, online appointment, and medication lists that were accessed mostly by users with a patient ID were associated with OPD visit and chronic diseases. This study showed that focuses on patients with chronic disease and more hospital visits and empowerment functions in a tethered m-PHR would be helpful to pursue the extensive use.

  7. Diagonal Eigenvalue Unity (DEU) code for spectral amplitude coding-optical code division multiple access

    Science.gov (United States)

    Ahmed, Hassan Yousif; Nisar, K. S.

    2013-08-01

    Code with ideal in-phase cross correlation (CC) and practical code length to support high number of users are required in spectral amplitude coding-optical code division multiple access (SAC-OCDMA) systems. SAC systems are getting more attractive in the field of OCDMA because of its ability to eliminate the influence of multiple access interference (MAI) and also suppress the effect of phase induced intensity noise (PIIN). In this paper, we have proposed new Diagonal Eigenvalue Unity (DEU) code families with ideal in-phase CC based on Jordan block matrix with simple algebraic ways. Four sets of DEU code families based on the code weight W and number of users N for the combination (even, even), (even, odd), (odd, odd) and (odd, even) are constructed. This combination gives DEU code more flexibility in selection of code weight and number of users. These features made this code a compelling candidate for future optical communication systems. Numerical results show that the proposed DEU system outperforms reported codes. In addition, simulation results taken from a commercial optical systems simulator, Virtual Photonic Instrument (VPI™) shown that, using point to multipoint transmission in passive optical network (PON), DEU has better performance and could support long span with high data rate.

  8. NESDIS OSPO Data Access Policy and CRM

    Science.gov (United States)

    Seybold, M. G.; Donoho, N. A.; McNamara, D.; Paquette, J.; Renkevens, T.

    2012-12-01

    The Office of Satellite and Product Operations (OSPO) is the NESDIS office responsible for satellite operations, product generation, and product distribution. Access to and distribution of OSPO data was formally established in a Data Access Policy dated February, 2011. An extension of the data access policy is the OSPO Customer Relationship Management (CRM) Database, which has been in development since 2008 and is reaching a critical level of maturity. This presentation will provide a summary of the data access policy and standard operating procedure (SOP) for handling data access requests. The tangential CRM database will be highlighted including the incident tracking system, reporting and notification capabilities, and the first comprehensive portfolio of NESDIS satellites, instruments, servers, applications, products, user organizations, and user contacts. Select examples of CRM data exploitation will show how OSPO is utilizing the CRM database to more closely satisfy the user community's satellite data needs with new product promotions, as well as new data and imagery distribution methods in OSPO's Environmental Satellite Processing Center (ESPC). In addition, user services and outreach initiatives from the Satellite Products and Services Division will be highlighted.

  9. Primary user localisation and uplink resource allocation in orthogonal frequency division multiple access cognitive radio systems

    KAUST Repository

    Nam, Haewoon

    2015-05-21

    In cognitive radio networks, secondary users (SUs) can share spectrum with primary users (PUs) under the condition that no interference is caused to the PUs. To evaluate the interference imposed to the PUs, the cognitive systems discussed in the literature usually assume that the channel state information (CSI) of the link from a secondary transmitter to a primary receiver (interference link) is known at the secondary transmitter. However, this assumption may often be impractical in cognitive radio systems, since the PUs need to be oblivious to the presence of the SUs. The authors first discuss PU localisation and then introduce an uplink resource allocation algorithm for orthogonal frequency division multiple access-based cognitive radio systems, where relative location information between primary and SUs is used instead of CSI of the interference link to estimate the interference. Numerical and simulation results show that it is indeed effective to use location information as a part of resource allocation and thus a near-optimal capacity is achieved. © The Institution of Engineering and Technology 2015.

  10. Access/AML -

    Data.gov (United States)

    Department of Transportation — The AccessAML is a web-based internet single application designed to reduce the vulnerability associated with several accounts assinged to a single users. This is a...

  11. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  12. DIRAC: Secure web user interface

    International Nuclear Information System (INIS)

    Casajus Ramo, A; Sapunov, M

    2010-01-01

    Traditionally the interaction between users and the Grid is done with command line tools. However, these tools are difficult to use by non-expert users providing minimal help and generating outputs not always easy to understand especially in case of errors. Graphical User Interfaces are typically limited to providing access to the monitoring or accounting information and concentrate on some particular aspects failing to cover the full spectrum of grid control tasks. To make the Grid more user friendly more complete graphical interfaces are needed. Within the DIRAC project we have attempted to construct a Web based User Interface that provides means not only for monitoring the system behavior but also allows to steer the main user activities on the grid. Using DIRAC's web interface a user can easily track jobs and data. It provides access to job information and allows performing actions on jobs such as killing or deleting. Data managers can define and monitor file transfer activity as well as check requests set by jobs. Production managers can define and follow large data productions and react if necessary by stopping or starting them. The Web Portal is build following all the grid security standards and using modern Web 2.0 technologies which allow to achieve the user experience similar to the desktop applications. Details of the DIRAC Web Portal architecture and User Interface will be presented and discussed.

  13. A novel asynchronous access method with binary interfaces

    Directory of Open Access Journals (Sweden)

    Torres-Solis Jorge

    2008-10-01

    Full Text Available Abstract Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches. Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation.

  14. SLIMS--a user-friendly sample operations and inventory management system for genotyping labs.

    Science.gov (United States)

    Van Rossum, Thea; Tripp, Ben; Daley, Denise

    2010-07-15

    We present the Sample-based Laboratory Information Management System (SLIMS), a powerful and user-friendly open source web application that provides all members of a laboratory with an interface to view, edit and create sample information. SLIMS aims to simplify common laboratory tasks with tools such as a user-friendly shopping cart for subjects, samples and containers that easily generates reports, shareable lists and plate designs for genotyping. Further key features include customizable data views, database change-logging and dynamically filled pre-formatted reports. Along with being feature-rich, SLIMS' power comes from being able to handle longitudinal data from multiple time-points and biological sources. This type of data is increasingly common from studies searching for susceptibility genes for common complex diseases that collect thousands of samples generating millions of genotypes and overwhelming amounts of data. LIMSs provide an efficient way to deal with this data while increasing accessibility and reducing laboratory errors; however, professional LIMS are often too costly to be practical. SLIMS gives labs a feasible alternative that is easily accessible, user-centrically designed and feature-rich. To facilitate system customization, and utilization for other groups, manuals have been written for users and developers. Documentation, source code and manuals are available at http://genapha.icapture.ubc.ca/SLIMS/index.jsp. SLIMS was developed using Java 1.6.0, JSPs, Hibernate 3.3.1.GA, DB2 and mySQL, Apache Tomcat 6.0.18, NetBeans IDE 6.5, Jasper Reports 3.5.1 and JasperSoft's iReport 3.5.1.

  15. Safety for Users

    CERN Multimedia

    HR Department

    2008-01-01

    CERN welcomes more than 8000 Users every year. The PH Department as host to these scientific associates requires the highest safety standards. The PH Safety Office has published a Safety Flyer for Users. Important safety topics and procedures are presented. Although the Flyer is intended primarily to provide safety information for Users, the PH Safety Office invites all those on the CERN sites to keep a copy of the flyer as it gives guidance in matters of safety and explains what to do in the event of an emergency. Link: http://ph-dep.web.cern.ch/ph-dep/Safety/SafetyOffice.html PH-Safety Office PH Department

  16. Safety for Users

    CERN Multimedia

    HR Department

    2008-01-01

    CERN welcomes more than 8000 Users every year. The PH Department as host to these scientific associates requires the highest safety standards. The PH Safety Office has published a safety flyer for Users. Important safety topics and procedures are presented. Although the flyer is intended primarily to provide safety information for Users, the PH Safety Office invites all those on the CERN sites to keep a copy of the flyer as it gives guidance in matters of safety and explains what to do in the event of an emergency. The flyer is available at: http://ph-dep.web.cern.ch/ph-dep/Safety/SafetyOffice.html PH-Safety Office PH Department

  17. Auditing the Accessibility of Massive Open Online Courses (MOOCs).

    Science.gov (United States)

    Iniesto, Francisco; McAndrew, Patrick; Minocha, Shailey; Coughlan, Tim

    2017-01-01

    The outcome from the research being reported in this paper is the design of an accessibility audit to evaluate Massive Open Online Courses (MOOCs) for accessibility and to arrive at solutions and adaptations that can meet user needs. This accessibility audit includes expert-based heuristic evaluations and user-based evaluations of the MOOC platforms and individual courses.

  18. Non-professional user`s understanding of Geographic Information

    DEFF Research Database (Denmark)

    Arleth, Mette

    2003-01-01

    of digital media, including online access to a variety of GI-based services; maps, online Geographic information systems, interactive 3D models etc. However, can we expect that a citizen, who has no relevant professional basis for understanding the concept geographic information, be able to use GI......-based online services and comprehend the information contents? Using the Gi-based online services qualitatively in the participatory process obviously requires knowledge of the non-professional user`s understanding and use of GI. This paper discusses the needs for research into this field as well as relevant...

  19. Accessing and disclosing protected resources

    DEFF Research Database (Denmark)

    Olesen, Henning; Khajuria, Samant

    2014-01-01

    TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers and enterpr......TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers...... and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user’s personal data have become an economic asset, not necessarily to the owners of these data, but to the service providers, whose...... business mod- els often includes the use of these data. In this paper we focus on the user – service provider interaction and discuss how recent technological progress, in particular the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources...

  20. Presto users guide version 2.6.

    Energy Technology Data Exchange (ETDEWEB)

    Gullerud, Arne S.; Koteras, James Richard; Hales, Jason Dean; Crane, Nathan Karl

    2006-10-01

    Presto is a Lagrangian, three-dimensional explicit, transient dynamics code for the analysis of solids subjected to large, suddenly applied loads. Presto is designed for problems with large deformations, nonlinear material behavior, and contact. There is a versatile element library incorporating both continuum and structural elements. The code is designed for a parallel computing environment. This document describes the input for the code that gives users access to all of the current functionality in the code. Presto is built in an environment that allows it to be coupled with other engineering analysis codes. The input structure for the code, which uses a concept called scope, reflects the fact that Presto can be used in a coupled environment. This guide describes the scope concept and the input from the outermost to the innermost input scopes. Within a given scope, the descriptions of input commands are grouped based on code functionality. For example, all material input command lines are described in a section of the user's guide for all of the material models in the code.

  1. From European Standard to User Service

    DEFF Research Database (Denmark)

    Jacobi, Ole Illum; Lind, Morten

    1997-01-01

    Today’s public administration and planning need access to proper spatial information. The tremendous growth in the area of maps and other geographically referenced databases increases the needs of the user as well as the supplier of information for an overview of the jungle of spatial data....... The answer to this need is a metadata service that gives relevant and up-to-date, at-your-fingertips information on available geographical datasets.As a result of the work in the standardization organizations, we are now, luckily, able to take the first steps towards an implementation of metadata services...... in the design of the next generation of metadata services.On the basis of recent Danish experiences with implementation of the CEN/TC 287 standard into a WWW Geographical Information metadata service, we will present and discuss some general issues: The conceptual strategy, the implementation of dataset...

  2. The web based user interface of RODOS

    International Nuclear Information System (INIS)

    Raskob, W.; Mueller, A.; Munz, E.; Rafat, M.

    2003-01-01

    Full text: The interaction between the RODOS system and its users has three main objectives: (1) operation of the system in its automatic and interactive modes including the processing of meteorological and radiological on-line data, and the choice of module chains for performing the necessary calculations; (2) input of data defining the accident situation, such as source term information, intervention criteria and timing of emergency actions; (3) selection and presentation of results in the form of spatial and temporal distributions of activity concentrations, areas affected by emergency actions and countermeasures, and their radiological and economic consequences. Users of category A have direct access to the RODOS system via local or wide area networks through the client/server protocol Internet/X. Any internet connected X desktop machine, such as Unix workstations from different vendors, X- terminals, Linux PCs, and PCs with X-emulation can be used. A number of X-Windows based graphical user interfaces (GUIs) provide direct access to all functionalities of the RODOS system and allow for handling the various user interactions with the RODOS system described above. Among others, the user can trigger or interrupt the automatic processing mode, execute application programs simultaneously, modify and delete data, import data sets from databases, and change configuration files. As the user interacts directly with in-memory active processes, the system responses immediately after having performed the necessary calculations. For obtaining the requested results, the users must know, which chain of application software has to be selected, how to interact with their interfaces, which sort of initialization data have to be assigned, etc. This flexible interaction with RODOS implies that only experienced and well-trained users are able to operate the system and to obtain correct and sensible information. A new interface has been developed which is based an the commonly used

  3. A General Attribute and Rule Based Role-Based Access Control Model

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Growing numbers of users and many access control policies which involve many different resource attributes in service-oriented environments bring various problems in protecting resource. This paper analyzes the relationships of resource attributes to user attributes in all policies, and propose a general attribute and rule based role-based access control(GAR-RBAC) model to meet the security needs. The model can dynamically assign users to roles via rules to meet the need of growing numbers of users. These rules use different attribute expression and permission as a part of authorization constraints, and are defined by analyzing relations of resource attributes to user attributes in many access policies that are defined by the enterprise. The model is a general access control model, and can support many access control policies, and also can be used to wider application for service. The paper also describes how to use the GAR-RBAC model in Web service environments.

  4. Hidden costs: the direct and indirect impact of user fees on access to malaria treatment and primary care in Mali.

    Science.gov (United States)

    Johnson, Ari; Goss, Adeline; Beckerman, Jessica; Castro, Arachu

    2012-11-01

    About 20 years after initial calls for the introduction of user fees in health systems in sub-Saharan Africa, a growing coalition is advocating for their removal. Several African countries have abolished user fees for health care for some or all of their citizens. However, fee-for-service health care delivery remains a primary health care funding model in many countries in sub-Saharan Africa. Although the impact of user fees on utilization of health services and household finances has been studied extensively, further research is needed to characterize the multi-faceted health and social problems associated with charging user fees. This ethnographic study aims to identify consequences of user fees on gender inequality, food insecurity, and household decision-making for a group of women living in poverty. Ethnographic life history interviews were conducted with 24 women in Yirimadjo, Mali in 2007. Purposive sampling selected participants across a broad socio-economic spectrum. Semi-structured interviews addressed participants' past medical history, socio-economic status, social and family history, and access to health care. Interview transcripts were coded using the guiding analytical framework of structural violence. Interviews revealed that user fees for health care not only decreased utilization of health services, but also resulted in delayed presentation for care, incomplete or inadequate care, compromised food security and household financial security, and reduced agency for women in health care decision making. The effects of user fees were amplified by conditions of poverty, as well as gender and health inequality; user fees in turn reinforced the inequalities created by those very conditions. The qualitative data reveal multi-faceted health and socioeconomic effects of user fees, and illustrate that user fees for health care may impact quality of care, health outcomes, food insecurity, and gender inequality, in addition to impacting health care utilization

  5. On Web User Tracking: How Third-Party Http Requests Track Users' Browsing Patterns for Personalised Advertising

    OpenAIRE

    Puglisi, Silvia; Rebollo-Monedero, David; Forné, Jordi

    2016-01-01

    On today's Web, users trade access to their private data for content and services. Advertising sustains the business model of many websites and applications. Efficient and successful advertising relies on predicting users' actions and tastes to suggest a range of products to buy. It follows that, while surfing the Web users leave traces regarding their identity in the form of activity patterns and unstructured data. We analyse how advertising networks build user footprints and how the sugg...

  6. Envisioning Advanced User Interfaces for E-Government Applications: A Case Study

    Science.gov (United States)

    Calvary, Gaëlle; Serna, Audrey; Coutaz, Joëlle; Scapin, Dominique; Pontico, Florence; Winckler, Marco

    The increasing use of the Web as a software platform together with the advance of technology has promoted Web applications as a starting point for improving communication between citizens and administration. Currently, several e-government Web portals propose applications for accessing information regarding healthcare, taxation, registration, housing, agriculture, education, and social services, which otherwise may be difficult to obtain. However, the adoption of services provided to citizens depends upon how such applications comply with the users' needs. Unfortunately, building an e-government website doesn't guarantee that all citizens who come to use it can access its contents. These services need to be accessible to all citizens/customers equally to ensure wider reach and subsequent adoption of the e-government services. User disabilities, computer or language illiteracy (e.g., foreign language), flexibility on information access (e.g., user remotely located in rural areas, homeless, mobile users), and ensuring user privacy on sensitive data are some of the barriers that must be taken into account when designing the User Interface (UI) of e-government applications.

  7. Professional Access 2013 programming

    CERN Document Server

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  8. An End User Development Approach for Mobile Web Augmentation

    Directory of Open Access Journals (Sweden)

    Gabriela Bosetti

    2017-01-01

    Full Text Available The trend towards mobile devices usage has made it possible for the Web to be conceived not only as an information space but also as a ubiquitous platform where users perform all kinds of tasks. In some cases, users access the Web with native mobile applications developed for well-known sites, such as, LinkedIn, Facebook, and Twitter. These native applications might offer further (e.g., location-based functionalities to their users in comparison with their corresponding Web sites because they were developed with mobile features in mind. However, many Web applications have no native counterpart and users access them using a mobile Web browser. Although the access to context information is not a complex issue nowadays, not all Web applications adapt themselves according to it or diversely improve the user experience by listening to a wide range of sensors. At some point, users might want to add mobile features to these Web sites, even if those features were not originally supported. In this paper, we present a novel approach to allow end users to augment their preferred Web sites with mobile features. We support our claims by presenting a framework for mobile Web augmentation, an authoring tool, and an evaluation with 21 end users.

  9. User Interface Design for Dynamic Geometry Software

    Science.gov (United States)

    Kortenkamp, Ulrich; Dohrmann, Christian

    2010-01-01

    In this article we describe long-standing user interface issues with Dynamic Geometry Software and common approaches to address them. We describe first prototypes of multi-touch-capable DGS. We also give some hints on the educational benefits of proper user interface design.

  10. Guidelines for Accessibility to Microblogging: an Integral Approach

    OpenAIRE

    Martín García, Yod Samuel; Álvarez Alba, Laura; Yelmo Garcia, Juan Carlos

    2011-01-01

    Microblogging is one of the most popular user-generated media, hence its accessibility has a large impact for users. However, the accessibility of this medium is poor in practice, due to the combination of bad practices by different agents ranging from the providers that host microblogging services to prosumers that post contents to them. Here we present an accessibility-oriented model of microblogging services, analyze the impact of its components, and propose guidelines for each of them to ...

  11. Flexible Access Control for Dynamic Collaborative Environments

    NARCIS (Netherlands)

    Dekker, M.A.C.

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect

  12. COSYMA user guide

    International Nuclear Information System (INIS)

    Hasemann, I.

    1991-02-01

    The COSYMA system for reactor accident consequence assessment (ACA) is intended to provide a flexible package which will allow users in a variety of institutions and in different European countries to investigate special problems by appropriate choice of parameter values and data sets. It has been developed to serve as a research tool for investigating and understanding the broad spectrum of accident consequences rather than to perform 'quick and easy' risk calculations. The easy access to intermediate and final results and the availability of flexible evaluation programs means that detailed parameter studies can be carried out, identifying the most important sensitivities and quantifying the essential uncertainties. COSYMA is intended also for use by people who are not specialists in the various disciplines of ACA modelling, but wish to use such a program. However, some familiarity with this area is required to enable them to make informed choices of models and parameter values for the particular application considered. Some assistance is given by providing default values for all relevant parameters, and the documents distributed together with the code will give some guidance on the appropriate choice of parameter values or simplifications of the code system for special applications. (orig./HP)

  13. Accessing VA Healthcare During Large-Scale Natural Disasters.

    Science.gov (United States)

    Der-Martirosian, Claudia; Pinnock, Laura; Dobalian, Aram

    2017-01-01

    Natural disasters can lead to the closure of medical facilities including the Veterans Affairs (VA), thus impacting access to healthcare for U.S. military veteran VA users. We examined the characteristics of VA patients who reported having difficulty accessing care if their usual source of VA care was closed because of natural disasters. A total of 2,264 veteran VA users living in the U.S. northeast region participated in a 2015 cross-sectional representative survey. The study used VA administrative data in a complex stratified survey design with a multimode approach. A total of 36% of veteran VA users reported having difficulty accessing care elsewhere, negatively impacting the functionally impaired and lower income VA patients.

  14. Digital Watermarks Enabling E-Commerce Strategies: Conditional and User Specific Access to Services and Resources

    Science.gov (United States)

    Dittmann, Jana; Steinebach, Martin; Wohlmacher, Petra; Ackermann, Ralf

    2002-12-01

    Digital watermarking is well known as enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multimedia data and analyze the spread spectrum of the data over networks and servers. Research has shown that data hiding techniques can be applied successfully to other application areas like manipulations recognition. In this paper, we show our innovative approach for integrating watermark and cryptography based methods within a framework of new application scenarios spanning a wide range from dedicated and user specific services, "Try&Buy" mechanisms to general means for long-term customer relationships. The tremendous recent efforts to develop and deploy ubiquitous mobile communication possibilities are changing the demands but also possibilities for establishing new business and commerce relationships. Especially we motivate annotation watermarks and aspects of M-Commerce to show important scenarios for access control. Based on a description of the challenges of the application domain and our latest work we discuss, which methods can be used for establishing services in a fast convenient and secure way for conditional access services based on digital watermarking combined with cryptographic techniques. We introduce an example scenario for digital audio and an overview of steps in order to establish these concepts practically.

  15. News from the Library: Advancing light - SPIE Digital Library accessible to CERN till 31 March 2012

    CERN Multimedia

    CERN Library

    2012-01-01

    SPIE (Society of Photo-Optical Instrumentation Engineers) is a not-for-profit international society which publishes one of the largest collections of applied optics and photonics research papers in the world: the SPIE Digital Library.   This resource includes more than 300,000 technical papers from SPIE journals, e-books and conference proceedings from 1990 to the present. The SPIE Digital Library covers many areas of interest for CERN users, such as astronomy, nanotechnology, sensors, lasers, electro-optics and imaging. The CERN Library has trial access to the complete resource till 31 March 2012, don't hesitate to give it a try! Access to the SPIE Digital Library here. We welcome any comment or question at library.desk@cern.ch.

  16. Conviviality-driven access control policy

    NARCIS (Netherlands)

    El Kateb, Donia; Zannone, N.; Moawad, Assaad; Caire, Patrice; Nain, Grégory; Mouelhi, Tejeddine; Le Traon, Yves

    2015-01-01

    Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights

  17. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  18. Livestock Fadama users' access to information on selected livestock ...

    African Journals Online (AJOL)

    The FUGs members never had access to information on key livestock technologies like artificial insemination, automated feeding, feed formulation and creep feeding. Farmers' number of years of formal education (r = -0.09) and family size (r= 0.09) had no significant relationships with respondents' access to information on ...

  19. A performance study of WebDav access to storages within the Belle II collaboration

    Science.gov (United States)

    Pardi, S.; Russo, G.

    2017-10-01

    WebDav and HTTP are becoming popular protocols for data access in the High Energy Physics community. The most used Grid and Cloud storage solutions provide such kind of interfaces, in this scenario tuning and performance evaluation became crucial aspects to promote the adoption of these protocols within the Belle II community. In this work, we present the results of a large-scale test activity, made with the goal to evaluate performances and reliability of the WebDav protocol, and study a possible adoption for the user analysis. More specifically, we considered a pilot infrastructure composed by a set of storage elements configured with the WebDav interface, hosted at the Belle II sites. The performance tests include a comparison with xrootd and gridftp. As reference tests we used a set of analysis jobs running under the Belle II software framework, accessing the input data with the ROOT I/O library, in order to simulate as much as possible a realistic user activity. The final analysis shows the possibility to achieve promising performances with WebDav on different storage systems, and gives an interesting feedback, for Belle II community and for other high energy physics experiments.

  20. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  1. Access Data Analysis Cookbook

    CERN Document Server

    Bluttman, Ken

    2008-01-01

    This book offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Whether you use Access 2007 or an earlier version, this book will teach you new methods to query data, different ways to move data in and out of Access, how to calculate answers to financial and investment issues, how to jump beyond SQL by manipulating data with VBA, and more.

  2. Rural providers' access to online resources: a randomized controlled trial

    Science.gov (United States)

    Hall, Laura J.; McElfresh, Karen R.; Warner, Teddy D.; Stromberg, Tiffany L.; Trost, Jaren; Jelinek, Devin A.

    2016-01-01

    Objective The research determined the usage and satisfaction levels with one of two point-of-care (PoC) resources among health care providers in a rural state. Methods In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants' attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA), paired t tests, and Cohen's d statistic to compare pre- and post-study effects sizes. Results Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to “about right amounts of information” at the completion of the study. DynaMed users reported a Cohen's d increase of +1.50 compared to AccessMedicine users' reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen's d. Conclusion Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine. PMID:26807050

  3. Browsing and Querying in Online Documentation:A Study of User Interfaces and the Interaction Process

    DEFF Research Database (Denmark)

    Hertzum, Morten; Frøkjær, Erik

    1996-01-01

    A user interface study concerning the usage effectiveness of selected retrieval modes was conducted using an experimental text retrieval system, TeSS, giving access to online documentation of certain programming tools. Four modes of TeSS were compared: (1) browsing, (2) conventional boolean....... In the experiment the use of printed manuals is faster and provides answers of higher quality than any of the electronic modes. Therefore, claims about the effectiveness of computer-based text retrieval have to be wary in situations where printed manuals are manageable to the users. Among the modes of Te......SS, browsing is the fastest and the one causing fewest operational errors. On the same two variables, time and operational errors, the Venn diagram mode performs better than conventional boolean retrieval. The combined mode scores worst on the objective performance measures; nonetheless nearly all subjects...

  4. Vote to link: Recovering from misbehaving anonymous users

    NARCIS (Netherlands)

    Lueks, W.; Everts, M.H.; Hoepman, J.H.

    2016-01-01

    Service providers are often reluctant to support anonymous access, because this makes it hard to deal with misbehaving users. Anonymous blacklisting and reputation systems can help prevent misbehaving users from causing more damage. However, by the time the user is blocked or has lost reputation,

  5. Viability of a New Road Infrastructure with Heterogeneous Users in Madrid Access

    OpenAIRE

    Pedro Cantos-Sanchez; Rafael Moner-Colonques; Jose J. Sempere-Monerris; Oscar Alvarez

    2008-01-01

    This paper explores the importance of heterogeneity in value of time when assessing the viability of a new road infrastructure to alleviate congestion problems. The Spanish government has developed a congestion pricing demonstration entering Madrid city centre, where road users have to choose between a free but highly congested road and a priced free-flowing road. We consider a continuum of users who differ in their value of time. Users dislike congestion and this is more so the more a user v...

  6. Wheelchair accessibility to public buildings in Istanbul.

    Science.gov (United States)

    Evcil, A Nilay

    2009-03-01

    Accessibility to public environment is the human right and basic need of each citizen and is one of the fundamental considerations for urban planning. The aim of this study is to determine the compliance of public buildings in central business districts (CBD) of Istanbul, Turkey, to wheelchair accessibility to the guidelines of the instrument and identify architectural barriers faced by wheelchair users. This is a descriptive study of 26 public buildings in CBD of Istanbul. The instrument used is the adapted Useh, Moyo and Munyonga questionnaire to collect the data from direct observation and measurement. Descriptive statistics of simple percentages and means are used to explain the compliance to the guidelines of the instrument and wheelchair accessibility. The descriptive survey results indicate that wheelchair users experience many accessibility problems in public environment of the most urbanised city (cultural capital of Europe in 2010) in a developing country. It is found that the major architectural barrier is the public transportation items with the lowest mean compliance (25%). Beside this, the most compliant to the instrument is entrance to building items with 79% as mean percentage. It is also found that there is an intention to improve accessibility when building construction period is investigated. This article describes the example of the compliance of public buildings accessibility when the country has legislation, but lacking regulations about accessibility for the wheelchair users.

  7. Reported Design Processes for Accessibility in Rail Transport

    DEFF Research Database (Denmark)

    Herriott, Richard; Cook, Sharon

    2014-01-01

    Accessibility is a fundamental requirement in public transport (PT) yet there exists little research on design for accessibility or inclusive design (ID) in this area. This paper sets out to discover what methods are used in the rail sector to achieve accessibility goals and to examine how far...... these methods deviate from user-centred and ID norms. Semi-structured interviews were conducted with nine rolling stock producers, operators and design consultancies. The purpose was to determine if ID design methods are used explicitly and the extent to which the processes used conformed to ID (if at all......). The research found that the role of users in the design process of manufacturers was limited and that compliance with industry standards was the dominant means to achieving accessibility goals. Design consultancies were willing to apply more user-centred design if the client requested it. Where operators were...

  8. Design and simulations of a spectral efficient optical code division multiple access scheme using alternated energy differentiation and single-user soft-decision demodulation

    Science.gov (United States)

    A. Garba, Aminata

    2017-01-01

    This paper presents a new approach to optical Code Division Multiple Access (CDMA) network transmission scheme using alternated amplitude sequences and energy differentiation at the transmitters to allow concurrent and secure transmission of several signals. The proposed system uses error control encoding and soft-decision demodulation to reduce the multi-user interference at the receivers. The design of the proposed alternated amplitude sequences, the OCDMA energy modulators and the soft decision, single-user demodulators are also presented. Simulation results show that the proposed scheme allows achieving spectral efficiencies higher than several reported results for optical CDMA and much higher than the Gaussian CDMA capacity limit.

  9. Interfaces for End-User Information Seeking.

    Science.gov (United States)

    Marchionini, Gary

    1992-01-01

    Discusses essential features of interfaces to support end-user information seeking. Highlights include cognitive engineering; task models and task analysis; the problem-solving nature of information seeking; examples of systems for end-users, including online public access catalogs (OPACs), hypertext, and help systems; and suggested research…

  10. Informal care giving to more disabled people with multiple sclerosis.

    Science.gov (United States)

    Buchanan, Robert J; Radin, Dagmar; Chakravorty, Bonnie J; Tyry, Tuula

    2009-01-01

    About 30% of the people with multiple sclerosis (MS) require some form of home care assistance and 80% of that assistance is provided by informal or unpaid care givers. This study focusses on the care givers for 530 more disabled people with MS, with the objective of learning more about informal care giving to people with greater dependency and need for assistance. The data presented in this study were collected in a national survey of 530 people who provided informal care to more disabled people with MS. Almost half of these care givers reported that they provided more than 20 h of care per week to the person with MS, with more than 9 in 10 shopping for groceries, doing indoor housework, preparing meals or providing transportation for the person with MS. More than 4 in 10 employed care givers reduced the amount of time worked in the previous 12 months because of their care giving responsibilities. Although more than half of the MS care givers in our study reported that care giving was demanding, time consuming or challenging, about 90% of these MS care givers were happy that they could help. About two in three of these MS care givers found that care giving was rewarding, with more than 8 in 10 proud of the care they provided. More than a quarter of the informal care givers to people with MS thought they would benefit from treatment or counselling provided by mental health professionals. Not only it is necessary to provide access to mental health services for people with MS, but it is also important to assure that their informal care givers also have access to appropriate mental health care, given the scope of their care giving responsibilities.

  11. Choice, Inclusion, and Access to Information: Understanding Female Farmers’ Participation in Kyrgyzstan’s Water-User Associations

    Directory of Open Access Journals (Sweden)

    Rebecca Nixon

    2017-12-01

    Full Text Available Participatory processes have been widely promoted within the field of natural resource management as a method of supporting efficient resource use and, within these processes, much emphasis has been placed on gendered participation. In Kyrgyzstan, participation in irrigation management is organized through water-user associations (WUAs, a decentralized system of management commonly prescribed to increase equity and efficiency in water distribution. Women in Kyrgyzstan are active in irrigated agriculture particularly in light of changing demographics due to labor migration, yet they make up a small percentage of the members and leaders in these WUAs. This study draws upon interviews with WUA officials, village leaders, and female farmers in five communities in southern Kyrgyzstan to examine the determinants of female farmers’ participation in WUAs. We argue that female farmers are strategic in how they choose to irrigate outside of the WUAs as users or participate in WUAs as members or leaders, however their gender, age, and class limits their access to information about WUAs and inclusion in WUA activities. These findings suggest the need to reassess participatory processes in WUAs in order to increase female farmers’ inclusion in WUAs and demonstrates the complexity of gendered participation in natural resource management.

  12. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    Science.gov (United States)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  13. Graphical user interface for accessing water-quality data for the Devils Lake basin, North Dakota

    Science.gov (United States)

    Ryberg, Karen R.; Damschen, William C.; Vecchia, Aldo V.

    2005-01-01

    Maintaining the quality of surface waters in the Devils Lake Basin in North Dakota is important for protecting the agricultural resources, fisheries, waterfowl and wildlife habitat, and recreational value of the basin. The U.S. Geological Survey, in cooperation with local, State, and Federal agencies, has collected and analyzed water-quality samples from streams and lakes in the basin since 1957, and the North Dakota Department of Health has collected and analyzed water-quality samples from lakes in the basin since 2001. Because water-quality data for the basin are important for numerous reasons, a graphical user interface was developed to access, view, and download the historical data for the basin. The interface is a web-based application that is available to the public and includes data through water year 2003. The interface will be updated periodically to include data for subsequent years.

  14. Mandatory and Location-Aware Access Control for Relational Databases

    Science.gov (United States)

    Decker, Michael

    Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.

  15. Proximity Displays for Access Control

    Science.gov (United States)

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  16. Multiple-Access Quantum-Classical Networks

    Science.gov (United States)

    Razavi, Mohsen

    2011-10-01

    A multi-user network that supports both classical and quantum communication is proposed. By relying on optical code-division multiple access techniques, this system offers simultaneous key exchange between multiple pairs of network users. A lower bound on the secure key generation rate will be derived for decoy-state quantum key distribution protocols.

  17. What do service users with bipolar disorder want from a web-based self-management intervention? A qualitative focus group study.

    Science.gov (United States)

    Todd, Nicholas J; Jones, Steven H; Lobban, Fiona A

    2013-01-01

    Bipolar disorder (BD) is a chronic and recurrent severe mental health problem. A web-based self-management intervention provides the opportunity to widen access to psychological interventions. This qualitative study aims to identify what an ideal web-based intervention would look like for service users with BD. Twelve service users with BD were recruited in the UK and took part in a series of focus groups to inform and refine the development of a web-based self-management intervention. Reported here is a subset analysis of data gathered with the primary aim of identifying the needs and desires of service users for such an intervention for BD. We analysed service users' responses to questions about content, outcomes, format, barriers and support. Focus groups were transcribed verbatim, and thematic analysis was employed. The data were ordered into four key themes: (1) gaining an awareness of and managing mood swings; (2) not just about managing mood swings: the importance of practical and interpersonal issues; (3) managing living within mood swings without losing the experience; (4) internet is the only format: freely accessible, instant and interactive; (5) professional and peer support to overcome low motivation and procrastination difficulties. The small group of participants are not representative of those living with BD. These findings have significantly enhanced our understanding of what service users with BD want from a web-based self-management intervention and have clear implications for the future development of such approaches. Service users desire a web-based self-management approach that gives them the techniques they need to not only manage their moods but also manage their lives alongside the disorder, including interpersonal and practical issues. Service users describe their primary outcome, not as a cure or reduction in their symptoms, but instead being able to live a fulfilling life alongside their condition. Service users see the internet as their

  18. Exposing the Strategies that Can Reduce the Obstacles: Improving the Science User Experience

    Science.gov (United States)

    Lindsay, Francis E.; Brennan, Jennifer; Behnke, Jeanne; Lynnes, Chris

    2017-01-01

    It is now well established that pursuing generic solutions to what seem are common problems in Earth science data access and use can often lead to disappointing results for both system developers and the intended users. This presentation focuses on real-world experience of managing a large and complex data system, NASAs Earth Science Data and Information Science System (EOSDIS), whose mission is to serve both broad user communities and those in smaller niche applications of Earth science data and services. In the talk, we focus on our experiences with known data user obstacles characterizing EOSDIS approaches, including various technological techniques, for engaging and bolstering, where possible, user experiences with EOSDIS. For improving how existing and prospective users discover and access NASA data from EOSDIS we introduce our cross-archive tool: Earthdata Search. This new search and order tool further empowers users to quickly access data sets using clever and intuitive features. The Worldview data visualization tool is also discussed highlighting how many users are now performing extensive data exploration without necessarily downloading data. Also, we explore our EOSDIS data discovery and access webinars, data recipes and short tutorials, targeted technical and data publications, user profiles and social media as additional tools and methods used for improving our outreach and communications to a diverse user community. These efforts have paid substantial dividends for our user communities by allowing us to target discipline specific community needs. The desired take-away from this presentation will be an improved understanding of how EOSDIS has approached, and in several instances achieved, removing or lowering the barriers to data access and use. As we look ahead to more complex Earth science missions, EOSDIS will continue to focus on our user communities, both broad and specialized, so that our overall data system can continue to serve the needs of

  19. Exposing the Strategies that can Reduce the Obstacles: Improving the Science User Experience

    Science.gov (United States)

    Lindsay, F. E.; Brennan, J.; Behnke, J.; Lynnes, C.

    2017-12-01

    It is now well established that pursuing generic solutions to what seem are common problems in Earth science data access and use can often lead to disappointing results for both system developers and the intended users. This presentation focuses on real-world experience of managing a large and complex data system, NASA's Earth Science Data and Information Science System (EOSDIS), whose mission is to serve both broad user communities and those in smaller niche applications of Earth science data and services. In the talk, we focus on our experiences with known data user obstacles characterizing EOSDIS approaches, including various technological techniques, for engaging and bolstering, where possible, user experiences with EOSDIS. For improving how existing and prospective users discover and access NASA data from EOSDIS we introduce our cross-archive tool: Earthdata Search. This new search and order tool further empowers users to quickly access data sets using clever and intuitive features. The Worldview data visualization tool is also discussed highlighting how many users are now performing extensive data exploration without necessarily downloading data. Also, we explore our EOSDIS data discovery and access webinars, data recipes and short tutorials, targeted technical and data publications, user profiles and and social media as additional tools and methods used for improving our outreach and communications to a diverse user community. These efforts have paid substantial dividends for our user communities by allowing us to target discipline specific community needs. The desired take-away from this presentation will be an improved understanding of how EOSDIS has approached, and in several instances achieved, removing or lowering the barriers to data access and use. As we look ahead to more complex Earth science missions, EOSDIS will continue to focus on our user communities, both broad and specialized, so that our overall data system can continue to serve the needs of

  20. x509-free access to WLCG resources

    OpenAIRE

    Short, H; Manzi, A; De Notaris, V; Keeble, O; Kiryanov, A; Mikkonen, H; Tedesco, P; Wartel, R

    2017-01-01

    Access to WLCG resources is authenticated using an x509 and PKI infrastructure. Even though HEP users have always been exposed to certificates directly, the development of modern Web Applications by the LHC experiments calls for simplified authentication processes keeping the underlying software unmodified. In this work we will show a solution with the goal of providing access to WLCG resources using the user’s home organisations credentials, without the need for user-acquired x509 certificat...

  1. Sign Compute Resolve for Random Access

    DEFF Research Database (Denmark)

    Goseling, Jasper; Stefanovic, Cedomir; Popovski, Petar

    2014-01-01

    users collide. We measure the performance of the proposed method in terms of user resolution rate as well as overall throughput of the system. The results show that our approach significantly increases the performance of the system even compared to coded random access, where collisions are not wasted......We present an approach to random access that is based on three elements: physical-layer network coding, signature codes and tree splitting. Upon occurrence of a collision, physical-layer network coding enables the receiver to decode the sum of the information that was transmitted by the individual...

  2. EARS: Electronic Access to Reference Service.

    Science.gov (United States)

    Weise, F O; Borgendale, M

    1986-10-01

    Electronic Access to Reference Service (EARS) is a front end to the Health Sciences Library's electronic mail system, with links to the online public catalog. EARS, which became operational in September 1984, is accessed by users at remote sites with either a terminal or microcomputer. It is menu-driven, allowing users to request: a computerized literature search, reference information, a photocopy of a journal article, or a book. This paper traces the history of EARS and discusses its use, its impact on library staff and services, and factors that influence the diffusion of new technology.

  3. A Precoded OFDMA System with User Cooperation

    NARCIS (Netherlands)

    Yu, Yao; Yatawatta, Sarod; Petropulu, Athina P.

    2010-01-01

    A new cooperative scheme for a two-user orthogonal frequency division multiple access (OFDMA) uplink communication scenario is proposed. Each user is equipped with one transmit/receive antenna. Before transmission, inter-block linear precoding is introduced to pairs of blocks. The cooperative

  4. MUTAGEN: Multi-user tool for annotating GENomes

    DEFF Research Database (Denmark)

    Brugger, K.; Redder, P.; Skovgaard, Marie

    2003-01-01

    MUTAGEN is a free prokaryotic annotation system. It offers the advantages of genome comparison, graphical sequence browsers, search facilities and open-source for user-specific adjustments. The web-interface allows several users to access the system from standard desktop computers. The Sulfolobus...

  5. To give or not to give, that's the question: How methodology is destiny in Dutch giving data

    NARCIS (Netherlands)

    Bekkers, R.H.F.P.; Wiepking, P.

    2006-01-01

    In research on giving, methodology is destiny. The volume of donations estimated from sample surveys strongly depends on the length of the questionnaire used to measure giving. By comparing two giving surveys from the Netherlands, the authors show that a short questionnaire on giving not only

  6. Comparing methods for involving users in ideation

    DEFF Research Database (Denmark)

    Nicolajsen, Hanne Westh; Scupola, Ada; Sørensen, Flemming

    2015-01-01

    workshop method (involving users and employees) is especially good at qualifying and further developing ideas. The findings suggest that methods for involving users in ideation should be carefully selected and combined to achieve optimum benefits and avoid potential disadvantages.......In this paper we discuss how users may be involved in the ideation phase of innovation. The study compares the use of a blog and three future workshops (students, employees and a mix of the two) in a library. Our study shows that the blog is efficient in giving the users voice whereas the mixed...

  7. The User-Subjective Approach to Personal Information Management Systems.

    Science.gov (United States)

    Bergman, Ofer; Beyth-Marom, Ruth; Nachmias, Rafi

    2003-01-01

    Explains personal information management (PIM) systems and suggests a user-subjective approach to PIM system design. Advocates that PIM systems relate to the subjective value-added attributes that the user gives the stored data so that the user can find information again, recall it when needed, and use it effectively in the next interaction.…

  8. Internet access and usage by staff and students: a case study of ...

    African Journals Online (AJOL)

    This study focused on Internet access and usage by staff and students in the University of Jos Main Library. It investigated monthly number of users that queued to access Internet monthly and the number of users who actually had access to use the Internet between January – December 2006. Other things investigated ...

  9. Progress Report Phase I: Use, access, and fire/fuels management attitudes and preferences of user groups concerning the Valles Caldera National Preserve (VCNP) and adjacent areas

    Science.gov (United States)

    Kurt F. Anschuetz; Carol B. Raish

    2010-01-01

    This document represents a progress report of activities completed during Phase I of the study titled, Use, Access, and Fire/Fuels Management Attitudes and Preferences of User Groups Concerning the Valles Caldera National Preserve (VCNP) and Adjacent Areas, and the preliminary findings of this work.

  10. A novel IPTV program multiplex access system to EPON

    Science.gov (United States)

    Xu, Xian; Liu, Deming; He, Wei; Lu, Xi

    2007-11-01

    With the rapid development of high speed networks, such as Ethernet Passive Optical Network (EPON), traffic patterns in access networks have evolved from traditional text-oriented service to the mixed text-, voice- and video- based services, leading to so called "Triple Play". For supporting IPTV service in EPON access network infrastructure, in this article we propose a novel IPTV program multiplex access system to EPON, which enables multiple IPTV program source servers to seamlessly access to IPTV service access port of optical line terminal (OLT) in EPON. There are two multiplex schemes, namely static multiplex scheme and dynamic multiplex scheme, in implementing the program multiplexing. Static multiplex scheme is to multiplex all the IPTV programs and forward them to the OLT, regardless of the need of end-users. While dynamic multiplex scheme can dynamically multiplex and forward IPTV programs according to what the end-users actually demand and those watched by no end-user would not be multiplexed. By comparing these two schemes, a reduced traffic of EPON can be achieved by using dynamic multiplex scheme, especially when most end-users are watching the same few IPTV programs. Both schemes are implemented in our system, with their hardware and software designs described.

  11. Designing a Secure E-commerce with Credential Purpose-based Access Control

    OpenAIRE

    Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek

    2014-01-01

    The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-commerce must establish a secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features. The e-commerce application must authorize access to only tho...

  12. An Attribute-Based Access Control with Efficient and Secure Attribute Revocation for Cloud Data Sharing Service

    Institute of Scientific and Technical Information of China (English)

    Nyamsuren Vaanchig; Wei Chen; Zhi-Guang Qin

    2017-01-01

    Nowadays, there is the tendency to outsource data to cloud storage servers for data sharing purposes. In fact, this makes access control for the outsourced data a challenging issue. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution for this challenge. It gives the data owner (DO) direct control on access policy and enforces the access policy cryptographically. However, the practical application of CP-ABE in the data sharing service also has its own inherent challenge with regard to attribute revocation. To address this challenge, we proposed an attribute-revocable CP-ABE scheme by taking advantages of the over-encryption mechanism and CP-ABE scheme and by considering the semi-trusted cloud service provider (CSP) that participates in decryption processes to issue decryption tokens for authorized users. We further presented the security and performance analysis in order to assess the effectiveness of the scheme. As compared with the existing attribute-revocable CP-ABE schemes, our attribute-revocable scheme is reasonably efficient and more secure to enable attribute-based access control over the outsourced data in the cloud data sharing service.

  13. The web-based user interface for EAST plasma control system

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, R.R., E-mail: rrzhang@ipp.ac.cn [Institute of Plasma Physics, Chinese Academy of Sciences, Anhui (China); Xiao, B.J. [Institute of Plasma Physics, Chinese Academy of Sciences, Anhui (China); School of Nuclear Science and Technology, University of Science and Technology of China, Anhui (China); Yuan, Q.P. [Institute of Plasma Physics, Chinese Academy of Sciences, Anhui (China); Yang, F. [Institute of Plasma Physics, Chinese Academy of Sciences, Anhui (China); Department of Computer Science, Anhui Medical University, Anhui (China); Zhang, Y. [Institute of Plasma Physics, Chinese Academy of Sciences, Anhui (China); Johnson, R.D.; Penaflor, B.G. [General Atomics, DIII-D National Fusion Facility, San Diego, CA (United States)

    2014-05-15

    The plasma control system (PCS) plays a vital role at EAST for fusion science experiments. Its software application consists of two main parts: an IDL graphical user interface for setting a large number of plasma parameters to specify each discharge, several programs for performing the real-time feedback control and managing the whole control system. The PCS user interface can be used from any X11 Windows client with privileged access to the PCS computer system. However, remote access to the PCS system via the IDL user interface becomes an extreme inconvenience due to the high network latency to draw or operate the interfaces. In order to realize lower latency for remote access to the PCS system, a web-based system has been developed for EAST recently. The setup data are retrieved from the PCS system and client-side JavaScript draws the interfaces into the user's browser. The user settings are also sent back to the PCS system for controlling discharges. These technologies allow the web-based user interface to be viewed by authorized users with a web browser and have it communicate with PCS server processes directly. It works together with the IDL interface and provides a new way to aid remote participation.

  14. The web-based user interface for EAST plasma control system

    International Nuclear Information System (INIS)

    Zhang, R.R.; Xiao, B.J.; Yuan, Q.P.; Yang, F.; Zhang, Y.; Johnson, R.D.; Penaflor, B.G.

    2014-01-01

    The plasma control system (PCS) plays a vital role at EAST for fusion science experiments. Its software application consists of two main parts: an IDL graphical user interface for setting a large number of plasma parameters to specify each discharge, several programs for performing the real-time feedback control and managing the whole control system. The PCS user interface can be used from any X11 Windows client with privileged access to the PCS computer system. However, remote access to the PCS system via the IDL user interface becomes an extreme inconvenience due to the high network latency to draw or operate the interfaces. In order to realize lower latency for remote access to the PCS system, a web-based system has been developed for EAST recently. The setup data are retrieved from the PCS system and client-side JavaScript draws the interfaces into the user's browser. The user settings are also sent back to the PCS system for controlling discharges. These technologies allow the web-based user interface to be viewed by authorized users with a web browser and have it communicate with PCS server processes directly. It works together with the IDL interface and provides a new way to aid remote participation

  15. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    Science.gov (United States)

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  16. Way to increase the user access at the LCLS baseline

    Energy Technology Data Exchange (ETDEWEB)

    Geloni, Gianluca [European XFEL GmbH, Hamburg; Kocharyan, Vitali; Saldin, Evgeni [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2010-10-15

    Although the LCLS photon beam is meant for a single user, the baseline undulator is long enough to serve two users simultaneously. To this end, we propose a setup composed of two simple elements: an X-ray mirror pair for X-ray beam deflection, and a short (4 m-long) magnetic chicane, which creates an offset for mirror pair installation in the middle of the baseline undulator. The insertable mirror pair can be used for spatial separation of the X-ray beams generated in the first and in the second half of the baseline undulator. The method of deactivating one half and activating another half of the undulator is based on the rapid switching of the FEL amplification process. As proposed elsewhere, using a kicker installed upstream of the LCLS baseline undulator and an already existing corrector in the first half of the undulator, it is possible to rapidly switch the X-ray beam from one user to another, thus providing two active beamlines at any time. We present simulation results dealing with the LCLS baseline, and show that it is possible to generate two saturated SASE X-ray beams in the whole 0.8-8 keV photon energy range in the same baseline undulator. These can be exploited to serve two users. Implementation of the proposed technique does not perturb the baseline mode of operation of the LCLS undulator. Moreover, the magnetic chicane setup is very flexible, and can be used as a self-seeding setup too. We present simulation results for the LCLS baseline undulator with SHAB (second harmonic afterburner) and show that one can produce monochromatic radiation at the 2nd harmonic as well as at the 1st. We describe an efficient way for obtaining multi-user operation at the LCLS hard X-ray FEL. To this end, a photon beam distribution system based on the use of crystals in the Bragg reflection geometry is proposed. The reflectivity of crystal deflectors can be switched fast enough by flipping the crystals with piezoelectric devices similar to those for X-ray phase retarders

  17. Ubiquitous Accessibility for People with Visual Impairments: Are We There Yet?

    Science.gov (United States)

    Billah, Syed Masum; Ashok, Vikas; Porter, Donald E; Ramakrishnan, I V

    2017-05-01

    Ubiquitous access is an increasingly common vision of computing, wherein users can interact with any computing device or service from anywhere, at any time. In the era of personal computing, users with visual impairments required special-purpose, assistive technologies, such as screen readers, to interact with computers. This paper investigates whether technologies like screen readers have kept pace with, or have created a barrier to, the trend toward ubiquitous access, with a specific focus on desktop computing as this is still the primary way computers are used in education and employment. Towards that, the paper presents a user study with 21 visually-impaired participants, specifically involving the switching of screen readers within and across different computing platforms, and the use of screen readers in remote access scenarios. Among the findings, the study shows that, even for remote desktop access-an early forerunner of true ubiquitous access-screen readers are too limited, if not unusable. The study also identifies several accessibility needs, such as uniformity of navigational experience across devices, and recommends potential solutions. In summary, assistive technologies have not made the jump into the era of ubiquitous access, and multiple, inconsistent screen readers create new practical problems for users with visual impairments.

  18. User-centered 3D geovisualisation

    DEFF Research Database (Denmark)

    Nielsen, Anette Hougaard

    2004-01-01

    . In a broader perspective, the overall aim is to develop a language in 3D Geovisualisation gained through usability projects and the development of a theoretical background. A conceptual level of user-centered 3D Geovisualisation is introduced by applying a categorisation originating from Virtual Reality...... and shadowing effects or with weather phenomena serving a level of realism and providing depth cues. The rendered objects and scenes are graphically accessible through the interface where immersive or non-immersive monitors in different sizes and shapes are relevant. Through the user interface, users can...

  19. Relaxing rdf queries based on user and domain preferences

    DEFF Research Database (Denmark)

    Dolog, Peter; Stueckenschmidt, Heiner; Wache, Holger

    2009-01-01

    Research in cooperative query answering is triggered by the observation that users are often not able to correctly formulate queries to databases such that they return the intended result. Due to lacking knowledge about the contents and the structure of a database, users will often only be able t...... application in the context of e-learning systems....... knowledge and user preferences. We describe a framework for information access that combines query refinement and relaxation in order to provide robust, personalized access to heterogeneous resource description framework data as well as an implementation in terms of rewriting rules and explain its...

  20. Channel-aware multi-user uplink transmission scheme for SIMO-OFDM systems

    Institute of Scientific and Technical Information of China (English)

    PAN ChengKang; CAI YueMing; XU YouYun

    2009-01-01

    The problem of medium access control (MAC) in wireless single-Input multiple-output-orthogonal frequency division multiplexing (SIMO-OFOM) systems is addressed.Traditional random access protocols have low overheads and inferior performance.Centralized methods have superior performance and high overheads.To achieve the tradeoff between overhead and performance,we propose a channelaware uplink transmission (CaUT) scheme for SIMO-OFDM systems.In CaUT,users transmit requestto-send (RTS) at some subcarriers whose channel gains are above a predetermined threshold.Using the channel state information provided by RTS,access point performs user selection with receive beamforming to decide which users can access and then broadcasts the selection results via clear-to-send (CTS) to users.We present a distributed power control scheme by using a simple fixed modulation mode.We optimize the modulation order and channel gain thresholds to maximize the separable packets subject to the bit-error-rate (BER) and temporal fairness requirements and the Individual average transmit power constraints.The performance of CaUT scheme is analyzed analytically and evaluated by simulations.Simulation results show that CaUT can achieve more significant throughput performance than traditional random access protocols.

  1. User Experience for Disabled Users in Open Educational Resources Websites

    Directory of Open Access Journals (Sweden)

    Rosa Navarrete

    2015-11-01

    Full Text Available Open Educational Resources (OER are digital materials for teaching-learning purpose released under an open license that are available through websites. In the last decade, some governments have encouraged the development and using of OER in order to contribute to the achievement of the right to education for everyone, a fundamental right included in The Universal Declaration of Human Rights. Besides, inclusion of people with disabilities is a global concern that need to be addressed in all living aspects including education.In this research we address the user experience in OER websites —considering the perspective of users with disabilities— in order to recognize possible barriers in web design. The conformance criteria considered for this reviewing are mandatory aspects of user experience in relation to Web accessibility and Web usability.

  2. User Experience for Disabled Users in Open Educational Resources Websites

    Directory of Open Access Journals (Sweden)

    Rosa Navarrete

    2015-11-01

    Full Text Available Open Educational Resources (OER are digital materials for teaching-learning purpose released under an open license that are available through websites. In the last decade, some governments have encouraged the development and using of OER in order to contribute to the achievement of the right to education for everyone, a fundamental right included in The Universal Declaration of Human Rights. Besides, inclusion of people with disabilities is a global concern that need to be addressed in all living aspects including education. In this research we address the user experience in OER websites —considering the perspective of users with disabilities— in order to recognize possible barriers in web design. The conformance criteria considered for this reviewing are mandatory aspects of user experience in relation to Web accessibility and Web usability.

  3. Coffee shops and clinics: the give and take of doing HIV/AIDS research with injecting drug users.

    Science.gov (United States)

    Marsh, A; Loxley, W

    1992-06-01

    We discuss recruiting and interviewing injecting drug users and using research as health promotion in the context of collecting information related to human immunodeficiency virus (HIV) or acquired immune deficiency syndrome (AIDS) from a convenience sample of 200 injecting drug users, half in treatment and half not, in 1989 and 1990 in Perth, Western Australia. A variety of recruiting methods were used including advertising, referral by agency staff, 'snowballing' and approaches to personal contacts and others known to inject by the interviewer. Snowballing and personal contacts were the most successful means of recruiting those not in treatment, while advertising was comparatively unsuccessful with this group because of the importance of establishing the credibility of the study and the interviewer among injecting drug users before they will volunteer to be involved. The promotion of behavioural risk reduction among respondents during the interview is detailed. We argue that the traditionally rigid separation between research and intervention is inappropriate in the HIV/AIDS context. When lives are potentially at stake, any contact with injecting drug users, especially those not in treatment (where may receive HIV/AIDS education), must be used as an HIV/AIDS prevention opportunity, and the interview is an ideal opportunity. The employment of research as community intervention is also discussed.

  4. Open Access to Research Data Accessing, using and publishing collections of textual data in digital literary studies

    OpenAIRE

    Schöch, Christof

    2015-01-01

    Introduction What is open access to research data? Related issues A closer look What can you do with open research data? What is required from research data? Do resources fulfil these requirements? Why is getting access good, but giving access better? Current issues Some challenges Main hindrance: Legal issues Conclusions Recommended readings

  5. Research Investigation of Information Access Methods

    Science.gov (United States)

    Heinrichs, John H.; Sharkey, Thomas W.; Lim, Jeen-Su

    2006-01-01

    This study investigates the satisfaction of library users at Wayne State University who utilize alternative information access methods. The LibQUAL+[TM] desired and perceived that satisfaction ratings are used to determine the user's "superiority gap." By focusing limited library resources to address "superiority gap" issues identified by each…

  6. Editorial: Next Generation Access Networks

    Science.gov (United States)

    Ruffini, Marco; Cincotti, Gabriella; Pizzinat, Anna; Vetter, Peter

    2015-12-01

    Over the past decade we have seen an increasing number of operators deploying Fibre-to-the-home (FTTH) solutions in access networks, in order to provide home users with a much needed network access upgrade, to support higher peak rates, higher sustained rates and a better and more uniform broadband coverage of the territory.

  7. Joint estimation and contention-resolution protocol for wireless random access

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Trillingsgaard, Kasper Fløe; Kiilerich Pratas, Nuno

    2013-01-01

    We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution of their transmissi......We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution...... successive interference cancellation which, coupled with the use of the optimized access probabilities, enables throughputs that are substantially higher than the traditional slotted ALOHA-like protocols. The key feature of the proposed protocol is that the round durations are not a priori set...

  8. MERBoard User's Guide

    Science.gov (United States)

    Trimble, Jay; Shab, Ted; Vera, Alonso; Gaswiller, Rich; Clancy, Daniel (Technical Monitor)

    2002-01-01

    An important goal of MERBoard is to allow users to quickly and easily share information. The front-end interface is physically a large plasma computer display with a touch screen, allowing multiple people to interact shoulder-to-shoulder or in a small meeting area. The software system allows people to interactively create digital whiteboards, browse the web, give presentations and connect to personal computers (for example, to run applications not on the MERBoard computer itself). There are four major integrated applications: a browser; a remote connection to another computer (VNC); a digital whiteboard; and a digital space (MERSpace), which is a digital repository for each individual user.

  9. Rural providers’ access to online resources: a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Jonathan D. Eldredge

    2016-01-01

    Full Text Available Objective: The research determined the usage and satisfaction levels with one of two point-of-care (PoC resources among health care providers in a rural state. Methods: In this randomized controlled trial, twenty-eight health care providers in rural areas were stratified by occupation and region, then randomized into either the DynaMed or the AccessMedicine study arm. Study participants were physicians, physician assistants, and nurses. A pre- and post-study survey measured participants’ attitudes toward different information resources and their information-seeking activities. Medical student investigators provided training and technical support for participants. Data analyses consisted of analysis of variance (ANOVA, paired t tests, and Cohen’s d statistic to compare pre- and post-study effects sizes. Results: Participants in both the DynaMed and the AccessMedicine arms of the study reported increased satisfaction with their respective PoC resource, as expected. Participants in both arms also reported that they saved time in finding needed information. At baseline, both arms reported too little information available, which increased to ‘‘about right amounts of information’’ at the completion of the study. DynaMed users reported a Cohen’s d increase of þ1.50 compared to AccessMedicine users’ reported use of 0.82. DynaMed users reported d2 satisfaction increases of 9.48 versus AccessMedicine satisfaction increases of 0.59 using a Cohen’s d. Conclusion: Participants in the DynaMed arm of the study used this clinically oriented PoC more heavily than the users of the textbook-based AccessMedicine. In terms of user satisfaction, DynaMed users reported higher levels of satisfaction than the users of AccessMedicine.

  10. Meta-analysis of executive functioning in ecstasy/polydrug users.

    Science.gov (United States)

    Roberts, C A; Jones, A; Montgomery, C

    2016-06-01

    Ecstasy/3,4-methylenedioxymethamphetamine (MDMA) use is proposed to cause damage to serotonergic (5-HT) axons in humans. Therefore, users should show deficits in cognitive processes that rely on serotonin-rich, prefrontal areas of the brain. However, there is inconsistency in findings to support this hypothesis. The aim of the current study was to examine deficits in executive functioning in ecstasy users compared with controls using meta-analysis. We identified k = 39 studies, contributing 89 effect sizes, investigating executive functioning in ecstasy users and polydrug-using controls. We compared function-specific task performance in 1221 current ecstasy users and 1242 drug-using controls, from tasks tapping the executive functions - updating, switching, inhibition and access to long-term memory. The significant main effect demonstrated overall executive dysfunction in ecstasy users [standardized mean difference (SMD) = -0.18, 95% confidence interval (CI) -0.26 to -0.11, Z = 5.05, p Ecstasy users showed significant performance deficits in access (SMD = -0.33, 95% CI -0.46 to -0.19, Z = 4.72, p ecstasy users to date and provides a behavioural correlate of potential serotonergic neurotoxicity.

  11. Mining Users Mobility at Public Transportation

    Directory of Open Access Journals (Sweden)

    joao ferreira

    2017-02-01

    Full Text Available In this research work we propose a new approach to estimate the number of passengers in a public transportation and determinate the users’ route path based on a passive approach without user intervention. The method is based on the probe requests of users mobile device through the collected data in wireless access point. This data is manipulated to extract the information about the numbers of users with mobile devices and track their route path and time. This data can be manipulated to extract useful knowledge related with users’ habits at public transportation and extract user mobility patterns.

  12. To Give or Not to Give, That Is the Question : How Methodology Is Destiny in Dutch Giving Data

    NARCIS (Netherlands)

    Bekkers, René; Wiepking, Pamala

    2006-01-01

    In research on giving, methodology is destiny. The volume of donations estimated from sample surveys strongly depends on the length of the questionnaire used to measure giving. By comparing two giving surveys from the Netherlands, the authors show that a short questionnaire on giving not only

  13. The Effects of Adding Motivational Elements to User Instructions

    NARCIS (Netherlands)

    Loorbach, N.R.; Karreman, Joyce; Steehouder, M.F.

    2007-01-01

    This paper gives an overview of three studies that we conducted to investigate the effects of motivational elements in user instructions. We tested for effects on usability, in particular on task effectiveness, task efficiency and user satisfaction. Motivational elements are textual additions or

  14. PathwayAccess: CellDesigner plugins for pathway databases.

    Science.gov (United States)

    Van Hemert, John L; Dickerson, Julie A

    2010-09-15

    CellDesigner provides a user-friendly interface for graphical biochemical pathway description. Many pathway databases are not directly exportable to CellDesigner models. PathwayAccess is an extensible suite of CellDesigner plugins, which connect CellDesigner directly to pathway databases using respective Java application programming interfaces. The process is streamlined for creating new PathwayAccess plugins for specific pathway databases. Three PathwayAccess plugins, MetNetAccess, BioCycAccess and ReactomeAccess, directly connect CellDesigner to the pathway databases MetNetDB, BioCyc and Reactome. PathwayAccess plugins enable CellDesigner users to expose pathway data to analytical CellDesigner functions, curate their pathway databases and visually integrate pathway data from different databases using standard Systems Biology Markup Language and Systems Biology Graphical Notation. Implemented in Java, PathwayAccess plugins run with CellDesigner version 4.0.1 and were tested on Ubuntu Linux, Windows XP and 7, and MacOSX. Source code, binaries, documentation and video walkthroughs are freely available at http://vrac.iastate.edu/~jlv.

  15. The Ethics of User Experience Design

    DEFF Research Database (Denmark)

    Vistisen, Peter; Jensen, Thessa

    Design has in recent years been an increasing area in focus when developing digital interactive systems and services (Kolko 2010). Given the specific nature of material involved in designing digital media as ‘the material without qualities’ (Lowgreen & Stolterman 2007), and namely its total lack...... that the chosen point-of-view corresponds with the users, and thus ensures that the designed user experience actually is preferable for the user (Schauer & Merholz 2009). However, there has been a lack of discussions surrounding the ethical dimension of creating and maintaining an empathic point......-centered design process. Exemplifying the differences and ethical implications for the designer in the interaction with the user through the design of interactive digital systems. Finally the article discusses the need to understand design as a development of empathy for a given user or group of users by giving...

  16. The Ethics of User Experience Design

    DEFF Research Database (Denmark)

    Vistisen, Peter; Jensen, Thessa

    2013-01-01

    Design has in recent years been an increasing area in focus when developing digital interactive systems and services (Kolko 2010). Given the specific nature of material involved in designing digital media as ‘the material without qualities’ (Lowgreen & Stolterman 2007), and namely its total lack...... that the chosen point-of-view corresponds with the users, and thus ensures that the designed user experience actually is preferable for the user (Schauer & Merholz 2009). However, there has been a lack of discussions surrounding the ethical dimension of creating and maintaining an empathic point......-centered design process. Exemplifying the differences and ethical implications for the designer in the interaction with the user through the design of interactive digital systems. Finally the article discusses the need to understand design as a development of empathy for a given user or group of users by giving...

  17. Usability evaluation of user interface of thesis title review system

    Science.gov (United States)

    Tri, Y.; Erna, A.; Gellysa, U.

    2018-03-01

    Presentation of programs with user interface that can be accessed online through the website of course greatly provide user benefits. User can easily access the program they need. There are usability values that serve as a benchmark for the success of a user accessible program, ie efficiency, effectiveness, and convenience. These usability values also determine the development of the program for the better use. Therefore, on the review title thesis program that will be implemented in STT Dumai was measured usability evaluation. It aims to see which sides are not yet perfect and need to be improved to improve the performance and utilization of the program. Usability evaluation was measured by using smartPLS software. Database used was the result of respondent questionnaires that include questions about the experience when they used program. The result of a review of thesis title program implemented in STT Dumai has an efficiency value of 22.615, the effectiveness of 20.612, and satisfaction of 33.177.

  18. Characterization of coded random access with compressive sensing based multi user detection

    DEFF Research Database (Denmark)

    Ji, Yalei; Stefanovic, Cedomir; Bockelmann, Carsten

    2014-01-01

    The emergence of Machine-to-Machine (M2M) communication requires new Medium Access Control (MAC) schemes and physical (PHY) layer concepts to support a massive number of access requests. The concept of coded random access, introduced recently, greatly outperforms other random access methods...... coded random access with CS-MUD on the PHY layer and show very promising results for the resulting protocol....

  19. Personalization of XML Content Browsing Based on User Preferences

    Science.gov (United States)

    Encelle, Benoit; Baptiste-Jessel, Nadine; Sedes, Florence

    2009-01-01

    Personalization of user interfaces for browsing content is a key concept to ensure content accessibility. In this direction, we introduce concepts that result in the generation of personalized multimodal user interfaces for browsing XML content. User requirements concerning the browsing of a specific content type can be specified by means of…

  20. Evaluation of the Water Scarcity Energy Cost for Users

    Directory of Open Access Journals (Sweden)

    Chiara M. Fontanazza

    2013-01-01

    Full Text Available In systems experiencing water scarcity and consequent intermittent supply, users often adopt private tanks that collect water during service periods and supply users when the service is not available. The tank may be fed by gravity or by private pumping stations depending on the network pressure level. Once water resources are collected, the tank can supply users by gravity if it is located on the rooftop or by additional pumping if underground. Private tanks thus increase the energy cost of the water supply service for users by introducing several small pumping structures inside the network. The present paper aims to evaluate this users’ energy cost for different private tank configurations. A real case study was analysed, and the results showed that intermittent distribution causes inequalities not only in users’ access to water resource but also costs that users have to bear to have access to water.

  1. An Effective Key Management Approach to Differential Access Control in Dynamic Environments

    OpenAIRE

    Yogesh Karandikar; Xukai Zou; Yuanshun Dai

    2006-01-01

    Applications like e-newspaper or interactive online gaming have more than one resource and a large number of users. There is a many-to-many relationship between users and resources; each user can access multiple resources and multiple users can access each resource. The resources are independent and each resource needs to be encrypted by a different Resource Encryption Key (REK). Each REK needs to be distributed to all subscribers of the resource and each subscriber must get all the REKs he/s...

  2. Waste assay measurement integration system user interface

    International Nuclear Information System (INIS)

    Mousseau, K.C.; Hempstead, A.R.; Becker, G.K.

    1995-01-01

    The Waste Assay Measurement Integration System (WAMIS) is being developed to improve confidence in and lower the uncertainty of waste characterization data. There are two major components to the WAMIS: a data access and visualization component and a data interpretation component. The intent of the access and visualization software is to provide simultaneous access to all data sources that describe the contents of any particular container of waste. The visualization software also allows the user to display data at any level from raw to reduced output. Depending on user type, the software displays a menuing hierarchy, related to level of access, that allows the user to observe only those data sources s/he has been authorized to view. Access levels include system administrator, physicist, QA representative, shift operations supervisor, and data entry. Data sources are displayed in separate windows and presently include (1) real-time radiography video, (2) gamma spectra, (3) passive and active neutron, (4) radionuclide mass estimates, (5) total alpha activity (Ci), (6) container attributes, (7) thermal power (w), and (8) mass ratio estimates for americium, plutonium, and uranium isotopes. The data interpretation component is in the early phases of design, but will include artificial intelligence, expert system, and neural network techniques. The system is being developed on a Pentium PC using Microsoft Visual C++. Future generations of WAMIS will be UNIX based and will incorporate more generically radiographic/tomographic, gamma spectroscopic/tomographics, neutron, and prompt gamma measurements

  3. Network Performance and Quality of Experience of Remote Access Laboratories

    Directory of Open Access Journals (Sweden)

    Alexander A. Kist

    2012-11-01

    Full Text Available Remote Access Laboratories (RAL have become important learning and teaching tools. This paper presents a performance study that targets a specific remote access architecture implemented within a universities operational environment. This particular RAL system provides globally authenticated and arbitrated remote access to virtualized computers as well as computer controlled hardware experiments. This paper presents system performance results that have been obtained utilizing both a set of automated and human subject tests. Principle objectives of the study were: To gain a better understanding of the nature of network traffic caused by experimental activity usage; to obtain an indication of user expectations of activity performance; and to develop a measure to predict Quality of Experience, based on easily measurable Quality of Service parameters. The study emulates network layer variation of access-bandwidth and round-trip-time of typical usage scenarios and contrasts against user perception results that allow classifying expected user performance. It demonstrates that failure rate is excellent measure of usability, and that round-trip-time predominantly affects user experience. Thin-client and remote desktop architectures are popular to separate the location of users and the actual data processing and use similar structures, hence results of this study to be applied in these application areas as well.

  4. Access French

    CERN Document Server

    Grosz, Bernard

    2014-01-01

    Access is the major new language series designed with the needs of today's generation of students firmly in mind. Whether learning for leisure or business purposes or working towards a curriculum qualification, Access French is specially designed for adults of all ages and gives students a thorough grounding in all the skills required to understand, speak, read and write contemporary French from scratch. The coursebook consists of 10 units covering different topic areas, each of which includes Language Focus panels explaining the structures covered and a comprehensive glossary. Learning tips

  5. Development of a user-friendly interface for the searching of a data base in natural language while using concepts and means of artificial intelligence

    International Nuclear Information System (INIS)

    Pujo, Pascal

    1989-01-01

    This research thesis aimed at the development of a natural-language-based user-friendly interface for the searching of relational data bases. The author first addresses how to store data which will be accessible through an interface in natural language: this organisation must result in as few constraints as possible in query formulation. He briefly presents techniques related to the automatic processing of natural language, and highlights the need for a more user-friendly interface. Then, he presents the developed interface and outlines the user-friendliness and ergonomics of implemented procedures. He shows how the interface has been designed to deliver information and explanations on its processing. This allows the user to control the relevance of the answer. He also indicates the classification of mistakes and errors which may be present in queries in natural language. He finally gives an overview of possible evolutions of the interface, briefly presents deductive functionalities which could expand data management. The handling of complex objects is also addressed [fr

  6. Reduced feedback selective cluster index scheduling with user pre-selection for next-generation multi-input multi-output orthogonal frequency division multiple access system

    OpenAIRE

    Nicolaou, M; Doufexi, A; Armour, SMD; Sun, Y

    2011-01-01

    The joint use of opportunistic scheduling and orthogonal frequency division multiple access (OFDMA) provide significant gains in environments of low mobility and scatter for which channel variations are low. The downside of opportunistic scheduling in multicarrier systems such as OFDMA, lies in the substantial uplink overhead required to feed back by the mobile stations (MSs) describing users' instantaneous link conditions. This study presents a novel approach towards multicarrier opportunist...

  7. Accessible Collaborative Learning Using Mobile Devices

    Science.gov (United States)

    Wald, Mike; Li, Yunjia; Draffan, E. A.

    2014-01-01

    This paper describes accessible collaborative learning using mobile devices with mobile enhancements to Synote, the freely available, award winning, open source, web based application that makes web hosted recordings easier to access, search, manage, and exploit for all learners, teachers and other users. Notes taken live during lectures using…

  8. Numerical Representations and User Behaviour in Social Networking Sites

    DEFF Research Database (Denmark)

    Sjöklint, Mimmi; Constantiou, Ioanna; Trier, Matthias

    2013-01-01

    The new technological enhancements and the accessibility to varieties of online applications, enable users to collect personal data and perform self-evaluation through test, comparison and experimentation. The sparked interest in numbers and numbers as self-representative visualisations is promin......The new technological enhancements and the accessibility to varieties of online applications, enable users to collect personal data and perform self-evaluation through test, comparison and experimentation. The sparked interest in numbers and numbers as self-representative visualisations...... theoretical pillars: self-determination theory, heuristic decision making and behavioural economics. A discussion departs from these convictions to investigate user reactions and behaviour when faced with numerical representations in the SNS....

  9. User-Centered Digital Library Project Phase 2: User Testing with Teachers and Students with Disabilities. Evaluation Report

    Science.gov (United States)

    Moeller, Babette

    2010-01-01

    The goal of the User-Centered Digital Library Project, conducted by the National Center for Accessible Media (NCAM) at WGBH, was to adapt the Teachers' Domain online digital library to enable teachers and students with disabilities to more readily use the resources in science classrooms. NCAM added accessibility features such as captions and audio…

  10. Scientific user requirements for a herbarium data portal.

    Science.gov (United States)

    Vissers, Jorick; den Bosch, Frederik Van; Bogaerts, Ann; Cocquyt, Christine; Degreef, Jérôme; Diagre, Denis; de Haan, Myriam; Smedt, Sofie De; Henry Engledow; Ertz, Damien; Fabri, Régine; Godefroid, Sandrine; Nicole Hanquart; Mergen, Patricia; Ronse, Anne; Sosef, Marc; Stévart, Tariq; Stoffelen, Piet; Vanderhoeven, Sonia; Groom, Quentin

    2017-01-01

    The digitization of herbaria and their online access will greatly facilitate access to plant collections around the world. This will improve the efficiency of taxonomy and help reduce inequalities between scientists. The Botanic Garden Meise, Belgium, is currently digitizing 1.2 million specimens including label data. In this paper we describe the user requirements analysis conducted for a new herbarium web portal. The aim was to identify the required functionality, but also to assist in the prioritization of software development and data acquisition. The Garden conducted the analysis in cooperation with Clockwork, the digital engagement agency of Ordina. Using a series of interactive interviews, potential users were consulted from universities, research institutions, science-policy initiatives and the Botanic Garden Meise. Although digital herbarium data have many potential stakeholders, we focused on the needs of taxonomists, ecologists and historians, who are currently the primary users of the Meise herbarium data portal. The three categories of user have similar needs, all wanted as much specimen data as possible, and for those data, to be interlinked with other digital resources within and outside the Garden. Many users wanted an interactive system that they could comment on, or correct online, particularly if such corrections and annotations could be used to rank the reliability of data. Many requirements depend on the quality of the digitized data associated with each specimen. The essential data fields are the taxonomic name; geographic location; country; collection date; collector name and collection number. Also all researchers valued linkage between biodiversity literature and specimens. Nevertheless, to verify digitized data the researchers still want access to high quality images, even if fully transcribed label information is provided. The only major point of disagreement is the level of access users should have and what they should be allowed to do

  11. Public Access Points, Location of public beach access along the Oregon Coast. Boat ramp locations were added to the dataset to allow users to view the location of boat ramps along the Columbia River and the Willamete River north of the Oregon City Dam., Published in 2005, 1:100000 (1in=8333ft) scale, Oregon Geospatial Enterprise Office (GEO).

    Data.gov (United States)

    NSGIC State | GIS Inventory — Public Access Points dataset current as of 2005. Location of public beach access along the Oregon Coast. Boat ramp locations were added to the dataset to allow users...

  12. Content accessibility of Web documents: Overview of concepts and needed standards

    DEFF Research Database (Denmark)

    Alapetite, A.

    2006-01-01

    The concept of Web accessibility refers to a combined set of measures, namely, how easily and how efficiently different types of users may make use of a given service. While some recommendations for accessibility are focusing on people with variousspecific disabilities, this document seeks...... to broaden the scope to any type of user and any type of use case. The document provides an introduction to some required concepts and technical standards for designing accessible Web sites. A brief review of thelegal requirements in a few countries for Web accessibility complements the recommendations...

  13. A remark on accessibility

    International Nuclear Information System (INIS)

    Wu, Xinxing; Wang, Jianjun

    2016-01-01

    Highlights: • Obtain some characteristics of accessibility and Kato’s chaos. • Answer negatively a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. • A dynamical system is indecomposable if and only if it is weakly transitive. - Abstract: This note obtains some characteristics of accessibility and Kato’s chaos. Applying these results, an accessible dynamical system whose product system is not accessible is constructed, giving a negative answer to a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. Besides, it is proved that every transitive interval self-map is accessible.

  14. CAPTCHA: Impact on User Experience of Users with Learning Disabilities

    Science.gov (United States)

    Gafni, Ruti; Nagar, Idan

    2016-01-01

    CAPTCHA is one of the most common solutions to check if the user trying to enter a Website is a real person or an automated piece of software. This challenge-response test, implemented in many Internet Websites, emphasizes the gaps between accessibility and security on the Internet, as it poses an obstacle for the learning-impaired in the reading…

  15. Analisis Web Accessibility Pada Perancangan Website Chat

    OpenAIRE

    Yushan, Subhansyah

    2011-01-01

    Chat is a popular application where one user can communicate to another using text. Nowadays in the internet, many websites provide chat applications, such as Instant Messaging, Yahoo Messanger, and etc. Website which provides chat application cannot accomodate users who have any dissabilities, especialy users with visual disabilities. This situation makes communication process more complicated, where accessibility level of sending and receiving information has became low. The ...

  16. Flexible and Transparent User Authentication for Mobile Devices

    Science.gov (United States)

    Clarke, Nathan; Karatzouni, Sevasti; Furnell, Steven

    The mobile device has become a ubiquitous technology that is capable of supporting an increasingly large array of services, applications and information. Given their increasing importance, it is imperative to ensure that such devices are not misused or abused. Unfortunately, a key enabling control to prevent this, user authentication, has not kept up with the advances in device technology. This paper presents the outcomes of a 2 year study that proposes the use of transparent and continuous biometric authentication of the user: providing more comprehensive identity verification; minimizing user inconvenience; and providing security throughout the period of use. A Non-Intrusive and Continuous Authentication (NICA) system is described that maintains a continuous measure of confidence in the identity of the user, removing access to sensitive services and information with low confidence levels and providing automatic access with higher confidence levels. An evaluation of the framework is undertaken from an end-user perspective via a trial involving 27 participants. Whilst the findings raise concerns over education, privacy and intrusiveness, overall 92% of users felt the system offered a more secure environment when compared to existing forms of authentication.

  17. Sesame IO Library User Manual Version 8

    Energy Technology Data Exchange (ETDEWEB)

    Abhold, Hilary [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Young, Ginger Ann [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-05-15

    This document is a user manual for SES_IO, a low-level library for reading and writing sesame files. The purpose of the SES_IO library is to provide a simple user interface for accessing and creating sesame files that does not change across sesame format type (such as binary, ascii, and xml).

  18. An Approach for Casual Drug Users. Technical Paper.

    Science.gov (United States)

    Bloom, Erwin S., Ed.

    This publication was written to respond to the fact that many drug treatment centers receive inappropriate referrals of casual or recreational marihuana users from the courts for "treatment" as an alternative to jail. A drug abuse task force recommended that agencies give priority to abusers of the high-risk categories and to compulsive users of…

  19. User-Centered Design in Practice: The Brown University Experience

    Science.gov (United States)

    Bordac, Sarah; Rainwater, Jean

    2008-01-01

    This article presents a case study in user-centered design that explores the needs and preferences of undergraduate users. An analysis of LibQual+ and other user surveys, interviews with public service staff, and a formal American with Disabilities Act accessibility review served as the basis for planning a redesign of the Brown University…

  20. The Graphical User Interface: Crisis, Danger, and Opportunity.

    Science.gov (United States)

    Boyd, L. H.; And Others

    1990-01-01

    This article describes differences between the graphical user interface and traditional character-based interface systems, identifies potential problems posed by graphic computing environments for blind computer users, and describes some programs and strategies that are being developed to provide access to those environments. (Author/JDD)

  1. Social Relations of Fieldwork: Giving Back in a Research Setting

    Directory of Open Access Journals (Sweden)

    Clare Gupta

    2014-07-01

    Full Text Available The project of this special issue emerged from the guest editors' experiences as field researchers in sub-Saharan Africa. During this time both researchers faced the difficult question of "giving back" to the communities in which, and with whom, they worked—communities that were often far less privileged than the researchers were in terms of wealth, mobility, education, and access to health care. Returning from their field sites, both researchers felt a combination of guilt and frustration that they had not done enough or had not done things right. Thus emerged the idea of bringing together a group of researchers, from a range of disciplines, to discuss the topic of giving back in field research. This editorial describes the idea and process that led to the present collection of articles. The guest editors situate the project in the literature on feminist studies and briefly summarize each of the four thematic sections in this special issue. They conclude by emphasizing that their collection is not a guide to giving back. Rather than lay out hard and fast rules about what, how much, and to whom field researchers should give, their collection offers a series of examples and considerations for giving back in fieldwork.

  2. System for the chemical professing and evaluation gives the residual thickness the gives detecting for gives appearances LR115 type 2

    International Nuclear Information System (INIS)

    Carrazana Gonzalez, J.A.; Tomas Zerquera, J.; Prendes Alonso, M.

    1998-01-01

    In this work the system is described built in the CPHR for the homogeneous chemical processing gives detecting gives nuclear appearances. A new developed method is exposed, based on the application gives the technique optical densitometry, for the precise estimate gives the residual thickness, gives detecting, gives nuclear appearances LR115 type 2 after the process gives chemical engraving

  3. Data access performance through parallelization and vectored access. Some results

    International Nuclear Information System (INIS)

    Furano, F; Hanushevsky, A

    2008-01-01

    High Energy Physics data processing and analysis applications typically deal with the problem of accessing and processing data at high speed. Recent studies, development and test work have shown that the latencies due to data access can often be hidden by parallelizing them with the data processing, thus giving the ability to have applications which process remote data with a high level of efficiency. Techniques and algorithms able to reach this result have been implemented in the client side of the Scalla/xrootd system, and in this contribution we describe the results of some tests done in order to compare their performance and characteristics. These techniques, if used together with multiple streams data access, can also be effective in allowing to efficiently and transparently deal with data repositories accessible via a Wide Area Network

  4. User requirements for access to Dutch spoken audio archives

    NARCIS (Netherlands)

    Heeren, W.F.L.

    2008-01-01

    Searching archived audiovisual collections will change in the near future. Instead of sifting through kilometers of analog tapes in archives' deposits, end users will be able to explore the collections from behind a personal computer, either at an archive or at their home. A first step in the

  5. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  6. Multiple access to sterile syringes for injection drug users: vending machines, needle exchange programs and legal pharmacy sales in Marseille, France.

    Science.gov (United States)

    Moatti, J P; Vlahov, D; Feroni, I; Perrin, V; Obadia, Y

    2001-03-01

    In Marseille, southeastern France, HIV prevention programs for injection drug users (IDUs) simultaneously include access to sterile syringes through needle exchange programs (NEPs), legal pharmacy sales and, since 1996, vending machines that mechanically exchange new syringes for used ones. The purpose of this study was to compare the characteristics of IDUs according to the site where they last obtained new syringes. During 3 days in September 1997, all IDUs who obtained syringes from 32 pharmacies, four NEPs and three vending machines were offered the opportunity to complete a self-administered questionnaire on demographics, drug use characteristics and program utilization. Of 485 individuals approached, the number who completed the questionnaire was 141 in pharmacies, 114 in NEPs and 88 at vending machines (response rate = 70.7%). Compared to NEP users, vending machine users were younger and less likely to be enrolled in a methadone program or to report being HIV infected, but more likely to misuse buprenorphine. They also had lower financial resources and were less likely to be heroin injectors than both pharmacy and NEP users. Our results suggest that vending machines attract a very different group of IDUs than NEPs, and that both programs are useful adjuncts to legal pharmacy sales for covering the needs of IDUs for sterile syringes in a single city. Assessment of the effectiveness and cost-effectiveness of combining such programs for the prevention of HIV and other infectious diseases among IDUs requires further comparative research. Copyright 2001 S. Karger AG, Basel

  7. Implementation of Multiple Access Techniques Applicable for Maritime Satellite Communications

    Directory of Open Access Journals (Sweden)

    Stojce Dimov Ilcev

    2013-12-01

    Full Text Available In this paper are introduced fundamentals, characteristics, advantages and disadvantages of Multiple Access (MA employed as transmission techniques in the Maritime Mobile Satellite Communications (MMSC between ships and Coast Earth Station (CES via Geostationary Earth Orbit (GEO or Not-GEO satellite constellations. In fixed satellite communication, as a rule, especially in MMSC many users are active at the same time. The problem of simultaneous communications between many single or multipoint mobile satellite users can be solved by using MA technique, such as Frequency Division Multiple Access (FDMA, Time Division Multiple Access (TDMA, Code Division Multiple Access (CDMA, Space Division Multiple Access (SDMA and Random (Packet Division Multiple Access (RDMA. Since the resources of the systems such as the transmitting power and the bandwidth are limited, it is advisable to use the channels with complete charge and to create a different MA to the channel. This generates a problem of summation and separation of signals in the transmission and reception parts, respectively. Deciding this problem consists in the development of orthogonal channels of transmission in order to divide signals from various users unambiguously on the reception part.

  8. DEEP SPACE: High Resolution VR Platform for Multi-user Interactive Narratives

    Science.gov (United States)

    Kuka, Daniela; Elias, Oliver; Martins, Ronald; Lindinger, Christopher; Pramböck, Andreas; Jalsovec, Andreas; Maresch, Pascal; Hörtner, Horst; Brandl, Peter

    DEEP SPACE is a large-scale platform for interactive, stereoscopic and high resolution content. The spatial and the system design of DEEP SPACE are facing constraints of CAVETM-like systems in respect to multi-user interactive storytelling. To be used as research platform and as public exhibition space for many people, DEEP SPACE is capable to process interactive, stereoscopic applications on two projection walls with a size of 16 by 9 meters and a resolution of four times 1080p (4K) each. The processed applications are ranging from Virtual Reality (VR)-environments to 3D-movies to computationally intensive 2D-productions. In this paper, we are describing DEEP SPACE as an experimental VR platform for multi-user interactive storytelling. We are focusing on the system design relevant for the platform, including the integration of the Apple iPod Touch technology as VR control, and a special case study that is demonstrating the research efforts in the field of multi-user interactive storytelling. The described case study, entitled "Papyrate's Island", provides a prototypical scenario of how physical drawings may impact on digital narratives. In this special case, DEEP SPACE helps us to explore the hypothesis that drawing, a primordial human creative skill, gives us access to entirely new creative possibilities in the domain of interactive storytelling.

  9. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  10. Barriers to antiretroviral treatment access for injecting drug users living with HIV in Chennai, South India.

    Science.gov (United States)

    Chakrapani, Venkatesan; Velayudham, Jaikumar; Shunmugam, Murali; Newman, Peter A; Dubrow, Robert

    2014-01-01

    India's National AIDS Control Organization provides free antiretroviral treatment (ART) to people living with HIV (PLHIV), including members of marginalized groups such as injecting drug users (IDUs). To help inform development of interventions to enhance ART access, we explored barriers to free ART access at government ART centers for IDUs living with HIV in Chennai by conducting three focus groups (n = 19 IDUs) and four key informant interviews. Data were explored using framework analysis to identify categories and derive themes. We found interrelated barriers at the family and social, health-care system, and individual levels. Family and social level barriers included lack of family support and fear of societal discrimination, as well as unmet basic needs, including food and shelter. Health-care system barriers included actual or perceived unfriendly hospital environment and procedures such as requiring proof of address and identity from PLHIV, including homeless IDUs; provider perception that IDUs will not adhere to ART, resulting in ART not being initiated; actual or perceived inadequate counseling services and lack of confidentiality; and lack of effective linkages between ART centers, needle/syringe programs, and drug dependence treatment centers. Individual-level barriers included active drug use, lack of self-efficacy in ART adherence, low motivation to initiate ART stemming from a fatalistic attitude, and inadequate knowledge about ART. These findings indicate that to facilitate IDUs gaining access to ART, systemic changes are needed, including steps to make the environment and procedures at government ART centers more IDU-friendly and steps to decrease HIV- and drug use-related stigma and discrimination faced by IDUs from the general public and health-care providers. Housing support for homeless IDUs and linkage of IDUs with drug dependence treatment are also essential.

  11. Accessible Web Design - The Power of the Personal Message.

    Science.gov (United States)

    Whitney, Gill

    2015-01-01

    The aim of this paper is to describe ongoing research being carried out to enable people with visual impairments to communicate directly with designers and specifiers of hobby and community web sites to maximise the accessibility of their sites. The research started with an investigation of the accessibility of community and hobby web sites as perceived by a group of visually impaired end users. It is continuing with an investigation into how to best to communicate with web designers who are not experts in web accessibility. The research is making use of communication theory to investigate how terminology describing personal experience can be used in the most effective and powerful way. By working with the users using a Delphi study the research has ensured that the views of the visually impaired end users is successfully transmitted.

  12. Algorithmic and user study of an autocompletion algorithm on a large medical vocabulary.

    Science.gov (United States)

    Sevenster, Merlijn; van Ommering, Rob; Qian, Yuechen

    2012-02-01

    Autocompletion supports human-computer interaction in software applications that let users enter textual data. We will be inspired by the use case in which medical professionals enter ontology concepts, catering the ongoing demand for structured and standardized data in medicine. Goal is to give an algorithmic analysis of one particular autocompletion algorithm, called multi-prefix matching algorithm, which suggests terms whose words' prefixes contain all words in the string typed by the user, e.g., in this sense, opt ner me matches optic nerve meningioma. Second we aim to investigate how well it supports users entering concepts from a large and comprehensive medical vocabulary (snomed ct). We give a concise description of the multi-prefix algorithm, and sketch how it can be optimized to meet required response time. Performance will be compared to a baseline algorithm, which gives suggestions that extend the string typed by the user to the right, e.g. optic nerve m gives optic nerve meningioma, but opt ner me does not. We conduct a user experiment in which 12 participants are invited to complete 40 snomed ct terms with the baseline algorithm and another set of 40 snomed ct terms with the multi-prefix algorithm. Our results show that users need significantly fewer keystrokes when supported by the multi-prefix algorithm than when supported by the baseline algorithm. The proposed algorithm is a competitive candidate for searching and retrieving terms from a large medical ontology. Copyright © 2011 Elsevier Inc. All rights reserved.

  13. Customer Satisfaction and Loyalty Among Internet Banking Users of Philippine National Bank in Batangas City

    Directory of Open Access Journals (Sweden)

    EDWARD KERVIN B. MOJARES

    2014-04-01

    Full Text Available One of the most vital challenges of the Internet as a service delivery channel is providing and maintaining service quality. This study aimed to describe the profile of the respondents with regards to socio-demographic and bank-related variables; to identify the effects of internet banking among its clients in Batangas City; to determine the level of customer’s satisfaction in terms of speed and accuracy, accessibility and convenience, and security features; to determine the respondents level of loyalty; to test the relationship between effects of internet banking service and customer satisfaction and loyalty variables; and lastly, to propose effective measures on how to enhance the quality of internet banking service offered by PNB in Batangas City. The descriptive-correlation method was utilized in the conduct of the study. The respondents of the study are the top 100 or 30% of the three hundred thirty four active users of internet banking service of Philippine National Bank in Batangas City during the period of October 2012 as generated by the bank’s system. The study revealed that the respondents are generally satisfied with the speed and accuracy, accessibility and convenience, and security features of the internet banking service facility. It was also found out that only speed and accuracy showed significant relationship on the effect of internet banking. Internet banking users are still considering the speed and accuracy of the banks service to make them satisfied despite that internet banking provides lower cost delivery channel, gives customers to almost any type of banking transactions and gives breadth and depth customer service. However, customers’ level of loyalty is not affected by the effects of internet banking services. This proves that as long as the customers are being provided with an excellent service, customer loyalty/retention could still be possibly attained by the bank

  14. The ARAC client system: network-based access to ARAC

    International Nuclear Information System (INIS)

    Leach, M J; Sumikawa, D; Webster, C

    1999-01-01

    The ARAC Client System allows users (such as emergency managers and first responders) with commonly available desktop and laptop computers to utilize the central ARAC system over the Internet or any other communications link using Internet protocols. Providing cost-effective fast access to the central ARAC system greatly expands the availability of the ARAC capability. The ARAC Client system consists of (1) local client applications running on the remote user's computer, and (2) ''site servers'' that provide secure access to selected central ARAC system capabilities and run on a scalable number of dedicated workstations residing at the central facility. The remote client applications allow users to describe a real or potential them-bio event, electronically sends this information to the central ARAC system which performs model calculations, and quickly receive and visualize the resulting graphical products. The site servers will support simultaneous access to ARAC capabilities by multiple users. The ARAC Client system is based on object-oriented client/server and distributed computing technologies using CORBA and Java, and consists of a large number of interacting components

  15. Free-space optical code-division multiple-access system design

    Science.gov (United States)

    Jeromin, Lori L.; Kaufmann, John E.; Bucher, Edward A.

    1993-08-01

    This paper describes an optical direct-detection multiple access communications system for free-space satellite networks utilizing code-division multiple-access (CDMA) and forward error correction (FEC) coding. System performance is characterized by how many simultaneous users operating at data rate R can be accommodated in a signaling bandwidth W. The performance of two CDMA schemes, optical orthogonal codes (OOC) with FEC and orthogonal convolutional codes (OCC), is calculated and compared to information-theoretic capacity bounds. The calculations include the effects of background and detector noise as well as nonzero transmitter extinction ratio and power imbalance among users. A system design for 10 kbps multiple-access communications between low-earth orbit satellites is given. With near- term receiver technology and representative system losses, a 15 W peak-power transmitter provides 10-6 BER performance with seven interfering users and full moon background in the receiver FOV. The receiver employs an array of discrete wide-area avalanche photodiodes (APD) for wide field of view coverage. Issues of user acquisition and synchronization, implementation technology, and system scalability are also discussed.

  16. An Object-Oriented Architecture for User Interface Management in Distributed Applications

    OpenAIRE

    Denzer, Ralf

    2017-01-01

    User interfaces for large distributed applications have to handle specific problems: the complexity of the application itself and the integration of online-data into the user interface. A main task of the user interface architecture is to provide powerful tools to design and augment the end-user system easily, hence giving the designer more time to focus on user requirements. Our experiences developing a user interface system for a process control room showed that a lot of time during the dev...

  17. ROMUSE 2.0 User Manual

    Energy Technology Data Exchange (ETDEWEB)

    Khuwaileh, Bassam [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Turinsky, Paul [North Carolina State Univ., Raleigh, NC (United States); Williams, Brian J. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-04

    ROMUSE (Reduced Order Modeling Based Uncertainty/Sensitivity Estimator) is an effort within the Consortium for Advanced Simulation of Light water reactors (CASL) to provide an analysis tool to be used in conjunction with reactor core simulators, especially the Virtual Environment for Reactor Applications (VERA). ROMUSE is written in C++ and is currently capable of performing various types of parameters perturbations, uncertainty quantification, surrogate models construction and subspace analysis. Version 2.0 has the capability to interface with DAKOTA which gives ROMUSE access to the various algorithms implemented within DAKOTA. ROMUSE is mainly designed to interface with VERA and the Comprehensive Modeling and Simulation Suite for Nuclear Safety Analysis and Design (SCALE) [1,2,3], however, ROMUSE can interface with any general model (e.g. python and matlab) with Input/Output (I/O) format that follows the Hierarchical Data Format 5 (HDF5). In this brief user manual, the use of ROMUSE will be overviewed and example problems will be presented and briefly discussed. The algorithms provided here range from algorithms inspired by those discussed in Ref.[4] to nuclear-specific algorithms discussed in Ref. [3].

  18. A Functional Approach to User Guides

    DEFF Research Database (Denmark)

    Nielsen, Sandro

    2007-01-01

    to fulfil the requirements of users. By applying the functional approach lexicographers are forced to reconsider the scope of the user guide. The user guide has traditionally centred on the structures of entries - and consequently on the word list - but its scope should be widened, so as to include all......The functional approach opens up exciting new possibilities for theoretical and practical lexicography. It encourages lexicographers to adopt a new way of thinking when planning and compiling dictionaries and when discussing and developing new lexicographic principles. One area in which it impacts...... on lexicography and lexicographic products is the writing of a really crafted and valuable user guide for instance by giving increased consideration to the user perspective. This involves the identification of the functions of the dictionary in terms of communication-oriented and cognitive functions, which helps...

  19. External access to ALICE controls conditions data

    International Nuclear Information System (INIS)

    Jadlovský, J; Jadlovská, A; Sarnovský, J; Jajčišin, Š; Čopík, M; Jadlovská, S; Papcun, P; Bielek, R; Čerkala, J; Kopčík, M; Chochula, P; Augustinus, A

    2014-01-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead – users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data – an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  20. IV access in dental practice.

    LENUS (Irish Health Repository)

    Fitzpatrick, J J

    2009-04-01

    Intravenous (IV) access is a valuable skill for dental practitioners in emergency situations and in IV sedation. However, many people feel some apprehension about performing this procedure. This article explains the basic principles behind IV access, and the relevant anatomy and physiology, as well as giving a step-by-step guide to placing an IV cannula.

  1. EPOS Seismology services and their users

    Science.gov (United States)

    Haslinger, Florian; Dupont, Aurelien; Michelini, Alberto; Rietbrock, Andreas; Sleeman, Reinoud; Wiemer, Stefan; Basili, Roberto; Bossu, Rémy; Cakti, Eser; Cotton, Fabrice; Crawford, Wayne; Crowley, Helen; Danciu, Laurentiu; Diaz, Jordi; Garth, Tom; Locati, Mario; Luzi, Lucia; Pitilakis, Kyriazis; Roumelioti, Zafeiria; Strollo, Angelo

    2017-04-01

    The construction of seismological community services for the European Plate Observing System Research Infrastructure (EPOS) is by now well under way. A significant number of services are already operational, largely based on those existing at established institutions or collaborations like ORFEUS, EMSC, AHEAD and EFEHR, and more are being added to be ready for internal validation by late 2017. In this presentation we focus on a number of issues related to the interaction of the community of users with the services provided by the seismological part of the EPOS research infrastructure. How users interact with a service (and how satisfied they are with this interaction) is viewed as one important component of the validation of a service within EPOS, and certainly is key to the uptake of a service and from that also it's attributed value. Within EPOS Seismology, the following aspects of user interaction have already surfaced: - user identification (and potential tracking) versus ease-of-access and openness Requesting users to identify themselves when accessing a service provides various advantages to providers and users (e.g. quantifying & qualifying the service use, customization of services and interfaces, handling access rights and quotas), but may impact the ease of access and also shy away users who don't wish to be identified for whatever reason. - service availability versus cost There is a clear and prominent connection between the availability of a service, both regarding uptime and capacity, and its operational cost (IT systems and personnel), and it is often not clear where to draw the line (and based on which considerations). In connection to that, how to best utilize third-party IT infrastructures (either commercial or public), and what the long-term cost implications of that might be, is equally open. - licensing and attribution The issue of intellectual property and associated licensing policies for data, products and services is only recently gaining

  2. Secure Web-based Ground System User Interfaces over the Open Internet

    Science.gov (United States)

    Langston, James H.; Murray, Henry L.; Hunt, Gary R.

    1998-01-01

    A prototype has been developed which makes use of commercially available products in conjunction with the Java programming language to provide a secure user interface for command and control over the open Internet. This paper reports successful demonstration of: (1) Security over the Internet, including encryption and certification; (2) Integration of Java applets with a COTS command and control product; (3) Remote spacecraft commanding using the Internet. The Java-based Spacecraft Web Interface to Telemetry and Command Handling (Jswitch) ground system prototype provides these capabilities. This activity demonstrates the use and integration of current technologies to enable a spacecraft engineer or flight operator to monitor and control a spacecraft from a user interface communicating over the open Internet using standard World Wide Web (WWW) protocols and commercial off-the-shelf (COTS) products. The core command and control functions are provided by the COTS Epoch 2000 product. The standard WWW tools and browsers are used in conjunction with the Java programming technology. Security is provided with the current encryption and certification technology. This system prototype is a step in the direction of giving scientist and flight operators Web-based access to instrument, payload, and spacecraft data.

  3. Providing the Public with Online Access to Large Bibliographic Data Bases.

    Science.gov (United States)

    Firschein, Oscar; Summit, Roger K.

    DIALOG, an interactive, computer-based information retrieval language, consists of a series of computer programs designed to make use of direct access memory devices in order to provide the user with a rapid means of identifying records within a specific memory bank. Using the system, a library user can be provided access to sixteen distinct and…

  4. Code-expanded radio access protocol for machine-to-machine communications

    DEFF Research Database (Denmark)

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2013-01-01

    The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated b...... subframes and orthogonal preambles, the amount of available contention resources is drastically increased, enabling the massive support of Machine-Type Communication users that is beyond the reach of current systems.......The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated...... by the random access method employed in LTE, which significantly increases the amount of contention resources without increasing the system resources, such as contention subframes and preambles. This is accomplished by a logical, rather than physical, extension of the access method in which the available system...

  5. Distributed data access in the sequential access model at the D0 experiment at Fermilab

    International Nuclear Information System (INIS)

    Terekhov, Igor; White, Victoria

    2000-01-01

    The authors present the Sequential Access Model (SAM), which is the data handling system for D0, one of two primary High Energy Experiments at Fermilab. During the next several years, the D0 experiment will store a total of about 1 PByte of data, including raw detector data and data processed at various levels. The design of SAM is not specific to the D0 experiment and carries few assumptions about the underlying mass storage level; its ideas are applicable to any sequential data access. By definition, in the sequential access mode a user application needs to process a stream of data, by accessing each data unit exactly once, the order of data units in the stream being irrelevant. The units of data are laid out sequentially in files. The adopted model allows for significant optimizations of system performance, decrease of user file latency and increase of overall throughput. In particular, caching is done with the knowledge of all the files needed in the near future, defined as all the files of the already running or submitted jobs. The bulk of the data is stored in files on tape in the mass storage system (MSS) called Enstore[2] and also developed at Fermilab. (The tape drives are served by an ADIC AML/2 Automated Tape Library). At any given time, SAM has a small fraction of the data cached on disk for processing. In the present paper, the authors discuss how data is delivered onto disk and how it is accessed by user applications. They will concentrate on data retrieval (consumption) from the MSS; when SAM is used for storing of data, the mechanisms are rather symmetrical. All of the data managed by SAM is cataloged in great detail in a relational database (ORACLE). The database also serves as the persistency mechanism for the SAM servers described in this paper. Any client or server in the SAM system which needs to store or retrieve information from the database does so through the interfaces of a CORBA-based database server. The users (physicists) use the

  6. Towards Emulation-as-a-Service: Cloud Services for Versatile Digital Object Access

    Directory of Open Access Journals (Sweden)

    Dirk von Suchodoletz

    2013-06-01

    Full Text Available The changing world of IT services opens the chance to more tightly integrate digital long-term preservation into systems, both for commercial and end users. The emergence of cloud offerings re-centralizes services, and end users interact with them remotely through standardized (web-client applications on their various devices. This offers the chance to use partially the same concepts and methods to access obsolete computer environments and allows for more sustainable business processes. In order to provide a large variety of user-friendly remote emulation services, especially in combination with authentic performance and user experience, a distributed system model and architecture is required, suitable to run as a cloud service, allowing for the specialization both of memory institutions and third party service providers.The shift of the usually non-trivial task of the emulation of obsolete software environments from the end user to specialized providers can help to simplify digital preservation and access strategies. Besides offering their users better access to their holdings, libraries and archives may gain new business opportunities to offer services to a third party, such as businesses requiring authentic reproduction of digital objects and processes for legal reasons. This paper discusses cloud concepts as the next logical step for accessing original digital material. Emulation-as-a-Service (EaaS fills the gap between the successful demonstration of emulation strategies as a long term access strategy and it’s perceived availability and usability. EaaS can build upon the ground of research and prototypical implementations of previous projects, and reuse well established remote access technology.In this article we develop requirements and a system model, suitable for a distributed environment. We will discuss the building blocks of the core services as well as requirements regarding access management. Finally, we will try to present a

  7. Awareness and use of electronic databases by public library users ...

    African Journals Online (AJOL)

    The study investigated awareness, access and use of electronic database by public library users in Ibadan Oyo State in Nigeria. The purpose of this study was to determine awareness of public library users' electronic databases, find out what these users used electronic databases to do and to identify problems associated ...

  8. PubChem Power User Gateway (PUG)

    Data.gov (United States)

    U.S. Department of Health & Human Services — PUG provides access to PubChem services via a programmatic interface. Users may download data, initiate chemical structure searches, standardize chemical structures...

  9. A user's manual to the PMBOK guide

    CERN Document Server

    Stackpole Snyder, Cynthia

    2013-01-01

    The must-have manual to understand and use the latest edition of the Fifth Edition The professional standard in the field of project management, A Guide to the Project Management Body of Knowledge (PMBOK® Guide-Fifth Edition) published by the Project Management Institute (PMI) serves as the ultimate resource for professionals and as a valuable studying and training device for students taking the PMP® Exam. A User''s Manual to the PMBOK® Guide takes the next logical step to act as a true user''s manual. With an accessible format and easy-to-understand language, it helps to not only distill es

  10. Youth with cerebral palsy with differing upper limb abilities: how do they access computers?

    Science.gov (United States)

    Davies, T Claire; Chau, Tom; Fehlings, Darcy L; Ameratunga, Shanthi; Stott, N Susan

    2010-12-01

    To identify the current level of awareness of different computer access technologies and the choices made regarding mode of access by youth with cerebral palsy (CP) and their families. Survey. Two tertiary-level rehabilitation centers in New Zealand and Canada. Youth (N=60) with CP, Manual Ability Classification Scale (MACS) levels I to V, age 13 to 25 years. Not applicable. Questionnaire. Fifty (83%) of the 60 youth were aware of at least 1 available assistive technology (AT), such as touch screens and joysticks. However, only 34 youth (57%) were familiar with the accessibility options currently available in the most common operating systems. Thirty-three (94%) of 35 youth who were MACS I and II used a standard mouse and keyboard, while few chose to use assistive technology or accessibility options. In contrast, 10 (40%) of 25 youth who were MACS III to V used a variety of assistive technologies such as touch screens, joysticks, trackballs, and scanning technologies. This group also had the highest use of accessibility options, although only 15 (60%) of the 25 were aware of them. Most youth with CP were aware of, and used, assistive technologies to enhance their computer access but were less knowledgeable about accessibility options. Accessibility options allow users to modify their own computer interface and can thus enhance computer access for youth with CP. Clinicians should be knowledgeable enough to give informed advice in this area of computer access, thus ensuring that all youth with CP can benefit from both AT and accessibility options, as required. Copyright © 2010 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  11. Open access

    CERN Document Server

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder consent, and many authors, musicians, filmmakers, and other creators who depend on royalties are understandably unwilling to give their consent. But for 350 years, scholars have written peer-reviewed journal articles for impact, not for money, and are free to consent to open access without losing revenue. In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. Distilling a decade of Suber's influential writing and thinking about open access, this is the indispe...

  12. Policies to Promote User Innovation

    DEFF Research Database (Denmark)

    Svensson, Peter; Hartmann, Rasmus Koss

    and benefits of such policies. As a first empirical step to understanding such policies, this paper reports on the results of providing hospital clinicians with access to ‘makerspaces’, i.e. staffed facilities with prototyping tools and the expertise in using them. Findings suggest that almost all innovations...... developed in the makerspaces are user innovations; that the potential returns from the first 56 innovations developed in the makerspaces are 30-80 times the required investment; and that most of the innovations would not have been developed without access to makerspaces. Yet owing to lack of diffusion, only...... a limited share of potential returns is realized. This suggests that provision of makerspaces, at least in healthcare contexts, is a tremendously effective form of user-supporting innovation policy both from an organizational and societal perspective, but also that it might need to be supplemented...

  13. Dynamically Authorized Role-Based Access Control for Grid Applications

    Institute of Scientific and Technical Information of China (English)

    YAO Hanbing; HU Heping; LU Zhengding; LI Ruixuan

    2006-01-01

    Grid computing is concerned with the sharing and coordinated use of diverse resources in distributed "virtual organizations". The heterogeneous, dynamic and multi-domain nature of these environments makes challenging security issues that demand new technical approaches. Despite the recent advances in access control approaches applicable to Grid computing, there remain issues that impede the development of effective access control models for Grid applications. Among them there are the lack of context-based models for access control, and reliance on identity or capability-based access control schemes. An access control scheme that resolve these issues is presented, and a dynamically authorized role-based access control (D-RBAC) model extending the RBAC with context constraints is proposed. The D-RABC mechanisms dynamically grant permissions to users based on a set of contextual information collected from the system and user's environments, while retaining the advantages of RBAC model. The implementation architecture of D-RBAC for the Grid application is also described.

  14. Globus Identity, Access, and Data Management: Platform Services for Collaborative Science

    Science.gov (United States)

    Ananthakrishnan, R.; Foster, I.; Wagner, R.

    2016-12-01

    Globus is software-as-a-service for research data management, developed at, and operated by, the University of Chicago. Globus, accessible at www.globus.org, provides high speed, secure file transfer; file sharing directly from existing storage systems; and data publication to institutional repositories. 40,000 registered users have used Globus to transfer tens of billions of files totaling hundreds of petabytes between more than 10,000 storage systems within campuses and national laboratories in the US and internationally. Web, command line, and REST interfaces support both interactive use and integration into applications and infrastructures. An important component of the Globus system is its foundational identity and access management (IAM) platform service, Globus Auth. Both Globus research data management and other applications use Globus Auth for brokering authentication and authorization interactions between end-users, identity providers, resource servers (services), and a range of clients, including web, mobile, and desktop applications, and other services. Compliant with important standards such as OAuth, OpenID, and SAML, Globus Auth provides mechanisms required for an extensible, integrated ecosystem of services and clients for the research and education community. It underpins projects such as the US National Science Foundation's XSEDE system, NCAR's Research Data Archive, and the DOE Systems Biology Knowledge Base. Current work is extending Globus services to be compliant with FEDRAMP standards for security assessment, authorization, and monitoring for cloud services. We will present Globus IAM solutions and give examples of Globus use in various projects for federated access to resources. We will also describe how Globus Auth and Globus research data management capabilities enable rapid development and low-cost operations of secure data sharing platforms that leverage Globus services and integrate them with local policy and security.

  15. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  16. Joint control algorithm in access network

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To deal with long probing delay and inaccurate probing results in the endpoint admission control method,a joint local and end-to-end admission control algorithm is proposed,which introduces local probing of access network besides end-to-end probing.Through local probing,the algorithm accurately estimated the resource status of the access network.Simulation shows that this algorithm can improve admission control performance and reduce users' average waiting time when the access network is heavily loaded.

  17. Barriers and facilitators to using NHS Direct: a qualitative study of 'users' and 'non-users'.

    Science.gov (United States)

    Cook, Erica J; Randhawa, Gurch; Large, Shirley; Guppy, Andy; Chater, Angel M; Ali, Nasreen

    2014-10-25

    NHS Direct, introduced in 1998, has provided 24/7 telephone-based healthcare advice and information to the public in England and Wales. National studies have suggested variation in the uptake of this service amongst the UK's diverse population. This study provides the first exploration of the barriers and facilitators that impact upon the uptake of this service from the perspectives of both 'users' and 'non- users'. Focus groups were held with NHS Direct 'users' (N = 2) from Bedfordshire alongside 'non-users' from Manchester (N = 3) and Mendip, Somerset (N = 4). Each focus group had between five to eight participants. A total of eighty one people aged between 21 and 94 years old (M: 58.90, SD: 22.70) took part in this research. Each focus group discussion lasted approximately 90 minutes and was audiotape-recorded with participants' permission. The recordings were transcribed verbatim. A framework approach was used to analyse the transcripts. The findings from this research uncovered a range of barriers and facilitators that impact upon the uptake of NHS Direct. 'Non-users' were unaware of the range of services that NHS Direct provided. Furthermore, 'non-users' highlighted a preference for face-to face communication, identifying a lack of confidence in discussing healthcare over the telephone. This was particularly evident among older people with cognitive difficulties. The cost to telephone a '0845' number from a mobile was also viewed to be a barrier to access NHS Direct, expressed more often by 'non-users' from deprived communities. NHS Direct 'users' identified that awareness, ease of use and convenience were facilitators which influenced their decision to use the service. An understanding of the barriers and facilitators which impact on the access and uptake of telephone-based healthcare is essential to move patients towards the self-care model. This research has highlighted the need for telephone-based healthcare services to increase public awareness; through

  18. Software process improvement: controlling developers, managers or users?

    DEFF Research Database (Denmark)

    Nørbjerg, Jacob

    1999-01-01

    The paper discusses how the latest trend in the management of software development: software process improvement (SPI) may affect user-developer relations. At the outset, SPI concerns the "internal workings" of software organisations, but it may also be interpreted as one way to give the developer...... organisation more control over the development process and the relations with the user organization....

  19. Access 2013 all-in-one for dummies

    CERN Document Server

    Barrows, Alison; Taylor, Allen G

    2013-01-01

    Get started with the new Access 2013 with this impressive all-in-one reference! Microsoft Access allows you to store, organize, view, analyze, and share data; the new release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. This compilation of nine indispensible minibooks is exactly what you need to get up to speed on the latest changes to Access. This easy-to-understand resource provides both new and experienced Access users with invaluable advice for connecting Access to SQL Server, manipulating data local

  20. Psychological risk factors of addiction to social networking site among Chinese smart phone users

    OpenAIRE

    Wu, Anise M. S.; Cheung, Vivi I.; Ku, L.; Hung, Eva P. W.

    2013-01-01

    Background and aims: Smartphones allow users to access social networking sites (SNSs) whenever and wherever they want. Such easy availability and accessibility may increase their vulnerability to addiction. Based on the social cognitive theory (SCT), we examined the impacts of outcome expectancies, self-efficacy, and impulsivity on young Chinese smartphone users' addictive tendencies toward SNSs. Methods: Two hundred seventy-seven Macau young smartphone users (116 males and 161 females; mean ...

  1. Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning

    OpenAIRE

    Lee, Wei-Han; Lee, Ruby B.

    2017-01-01

    Authentication of smartphone users is important because a lot of sensitive data is stored in the smartphone and the smartphone is also used to access various cloud data and services. However, smartphones are easily stolen or co-opted by an attacker. Beyond the initial login, it is highly desirable to re-authenticate end-users who are continuing to access security-critical services and data. Hence, this paper proposes a novel authentication system for implicit, continuous authentication of the...

  2. The borderless online user

    DEFF Research Database (Denmark)

    Riis, Thomas; Schovsbo, Jens Hemmingsen

    2017-01-01

    Traditionally copyright has been exploited in separate geographical markets. This practice restricts the ability of users to access online services, music, movies and sports events on their electronic devices wherever they are in Europe and regardless of borders, viz. so called ‘portability...... of amending the current legal regime. This contribution argues, however, that existing EU rules and principles, in particular the rules of competition law, may deal with the challenges of the existing restrictions on the cross-border access to online services to such an extent that those challenges...

  3. Uniform access to clinical data in a distributed environment. Radiology

    International Nuclear Information System (INIS)

    Adelhard, K.; Swoboda, N.; Nissen-Meyer, S.; Reiser, M.

    1999-01-01

    Purpose: Providing medical reports on wards and ambulatory settings in electronic form can improve the quality of health care delivery. Radiology was chosen as an example to demonstrate how to implement uniform access to clinical data in a hospital. Method: Medical professionals at the university hospital in Munich, Grosshadern, have access to all radiological reports of their patients. Web browsers are used as a front end. A centralized administration of users and patients is in place. Results: Centralized access control and patient selection guarantee uniform access to all applicable data via intranet and controls access rights. The high acceptance of this service is reflected by the high number of 150 requests per day. Discussion: Access to radiological reports within the Grosshadern University Clinics was enabled via web browsers in a short time. The high acceptance of the system also proves its easy use. Integration of the system in a centralized user and patient identification system supports the unified access to clinical data. (orig.) [de

  4. Libraries as facilitators in access to information by visually impaired users

    Directory of Open Access Journals (Sweden)

    Tania Milca Malheiros

    2017-10-01

    Full Text Available This article deals with the role of libraries as collaborators in the process of information acquisition by visually impaired users. It aims to show the importance of this role in the process of social inclusion of these users and the need to discuss this issue. As a fundamental point for its inclusion are the production and supply of alternative materials. The barriers faced in the process of information acquisition are cited, such as the lack of adapted materials and the cost of production. It also presents a history of the acquisition of information from these users and their inclusion in Brazilian and foreign libraries. The research method used was the literature review having been consulted the databaseLibrary and Information Science Abstracts (LISA, Library & Information Science and TechnologyAbstracts (LISTA, Information Science and Technology Abstracts (ISTA, Base de dados de Periódicos em Ciência da Informação (BRAPCI, Google and Google Scholar.As a conclusion, we point out the cooperation between library services as a solution to this issue.

  5. I need to know! Timely accessing of perioperative user manuals.

    Science.gov (United States)

    Landreneau, Raphael

    2010-12-01

    Ready access to equipment or product information is essential for the safe operation of the many items that a perioperative nurse is asked to use, troubleshoot, or maintain. One institution's solution for making manufacturer information available in the practice setting was to create a facility intranet site dedicated to OR equipment manuals. This site provides information access to perioperative nurses and support staff members and, ultimately, helps improve patient care. Published by Elsevier Inc. All rights reserved.

  6. Advanced Test Reactor National Scientific User Facility Partnerships

    International Nuclear Information System (INIS)

    Marshall, Frances M.; Allen, Todd R.; Benson, Jeff B.; Cole, James I.; Thelen, Mary Catherine

    2012-01-01

    In 2007, the United States Department of Energy designated the Advanced Test Reactor (ATR), located at Idaho National Laboratory, as a National Scientific User Facility (NSUF). This designation made test space within the ATR and post-irradiation examination (PIE) equipment at INL available for use by researchers via a proposal and peer review process. The goal of the ATR NSUF is to provide researchers with the best ideas access to the most advanced test capability, regardless of the proposer's physical location. Since 2007, the ATR NSUF has expanded its available reactor test space, and obtained access to additional PIE equipment. Recognizing that INL may not have all the desired PIE equipment, or that some equipment may become oversubscribed, the ATR NSUF established a Partnership Program. This program enables and facilitates user access to several university and national laboratories. So far, seven universities and one national laboratory have been added to the ATR NSUF with capability that includes reactor-testing space, PIE equipment, and ion beam irradiation facilities. With the addition of these universities, irradiation can occur in multiple reactors and post-irradiation exams can be performed at multiple universities. In each case, the choice of facilities is based on the user's technical needs. Universities and laboratories included in the ATR NSUF partnership program are as follows: (1) Nuclear Services Laboratories at North Carolina State University; (2) PULSTAR Reactor Facility at North Carolina State University; (3) Michigan Ion Beam Laboratory (1.7 MV Tandetron accelerator) at the University of Michigan; (4) Irradiated Materials at the University of Michigan; (5) Harry Reid Center Radiochemistry Laboratories at University of Nevada, Las Vegas; (6) Characterization Laboratory for Irradiated Materials at the University of Wisconsin-Madison; (7) Tandem Accelerator Ion Beam. (1.7 MV terminal voltage tandem ion accelerator) at the University of Wisconsin

  7. User Centric Policy Management

    Science.gov (United States)

    Cheek, Gorrell P.

    2013-01-01

    Internet use, in general, and online social networking sites, in particular, are experiencing tremendous growth with hundreds of millions of active users. As a result, there is a tremendous amount of privacy information and content online. Protecting this information is a challenge. Access control policy composition is complex, laborious and…

  8. Space Telescope Control System science user operations

    Science.gov (United States)

    Dougherty, H. J.; Rossini, R.; Simcox, D.; Bennett, N.

    1984-01-01

    The Space Telescope science users will have a flexible and efficient means of accessing the capabilities provided by the ST Pointing Control System, particularly with respect to managing the overal acquisition and pointing functions. To permit user control of these system functions - such as vehicle scanning, tracking, offset pointing, high gain antenna pointing, solar array pointing and momentum management - a set of special instructions called 'constructs' is used in conjuction with command data packets. This paper discusses the user-vehicle interface and introduces typical operational scenarios.

  9. The Design and Evaluation of a Front-End User Interface for Energy Researchers.

    Science.gov (United States)

    Borgman, Christine L.; And Others

    1989-01-01

    Reports on the Online Access to Knowledge (OAK) Project, which developed software to support end user access to a Department of Energy database based on the skill levels and needs of energy researchers. The discussion covers issues in development, evaluation, and the study of user behavior in designing an interface tailored to a special…

  10. 76 FR 17064 - Shared Use Path Accessibility Guidelines

    Science.gov (United States)

    2011-03-28

    ...] RIN 3014-AA41 Shared Use Path Accessibility Guidelines AGENCY: Architectural and Transportation... (ANPRM) to develop accessibility guidelines for shared use paths. Shared use paths are designed for both... users. The guidelines will include technical provisions for making newly constructed and altered shared...

  11. Dual-mode ultraflow access networks: a hybrid solution for the access bottleneck

    Science.gov (United States)

    Kazovsky, Leonid G.; Shen, Thomas Shunrong; Dhaini, Ahmad R.; Yin, Shuang; De Leenheer, Marc; Detwiler, Benjamin A.

    2013-12-01

    Optical Flow Switching (OFS) is a promising solution for large Internet data transfers. In this paper, we introduce UltraFlow Access, a novel optical access network architecture that offers dual-mode service to its end-users: IP and OFS. With UltraFlow Access, we design and implement a new dual-mode control plane and a new dual-mode network stack to ensure efficient connection setup and reliable and optimal data transmission. We study the impact of the UltraFlow system's design on the network throughput. Our experimental results show that with an optimized system design, near optimal (around 10 Gb/s) OFS data throughput can be attained when the line rate is 10Gb/s.

  12. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  13. The “SAFARI” Technique Using Retrograde Access Via Peroneal Artery Access

    International Nuclear Information System (INIS)

    Zhuang, Kun Da; Tan, Seck Guan; Tay, Kiang Hiong

    2012-01-01

    The “SAFARI” technique or subintimal arterial flossing with antegrade–retrograde intervention is a method for recanalisation of chronic total occlusions (CTOs) when subintimal angioplasty fails. Retrograde access is usually obtained via the popliteal, distal anterior tibial artery (ATA)/dorsalis pedis (DP), or distal posterior tibial artery (PTA). Distal access via the peroneal artery has not been described and has a risk of continued bleeding, leading to compartment syndrome due to its deep location. We describe our experience in two patients with retrograde access via the peroneal artery and the use of balloon-assisted hemostasis for these retrograde punctures. This approach may potentially give more options for endovascular interventions in lower limb CTOs.

  14. EVALUATION OF ALTERNATIVE RAILWAY CONNECTION ACCESS AT JAKARTA SOEKARNO HATTA INTERNATIONAL AIRPORT

    Directory of Open Access Journals (Sweden)

    Ayu Aprilischa

    2015-01-01

    Full Text Available Traveling between the center of Jakarta and Soekarno Hatta International Airport (SHIA is further constrained by the limited number of main routes available which likely cannot be accommodated in the future by road based transport modes alone. Hence, the airport needs to develop airport surface access to accommodate its network. The aim of this research is to analyze the railway access system for developing the system of SHIA using multi criteria analysis in the selection of alternative route alignment of the railway line and a qualitative study in data collection within the research design. Development of the criteria includes technical, economic, environmental and spatial aspect. Three alternatives have been proposed in this analysis, i.e. through West Jakarta, through North and West Jakarta and through North and Central Jakarta. The results show that alternative 3 (through North and Central Jakarta can give implications to the airport users, i.e. providing a high standard of the rail link in a well-timed manner and a cost-effective public transport link. Improving the multi-modal access to the airport will improve the supply of employment to business, lead to urban regeneration around station locations, and improve Greater Jakarta Metropolitan Area regional competitiveness.

  15. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  16. Development traumatic brain injury computer user interface for disaster area in Indonesia supported by emergency broadband access network.

    Science.gov (United States)

    Sutiono, Agung Budi; Suwa, Hirohiko; Ohta, Toshizumi; Arifin, Muh Zafrullah; Kitamura, Yohei; Yoshida, Kazunari; Merdika, Daduk; Qiantori, Andri; Iskandar

    2012-12-01

    Disasters bring consequences of negative impacts on the environment and human life. One of the common cause of critical condition is traumatic brain injury (TBI), namely, epidural (EDH) and subdural hematoma (SDH), due to downfall hard things during earthquake. We proposed and analyzed the user response, namely neurosurgeon, general doctor/surgeon and nurse when they interacted with TBI computer interface. The communication systems was supported by TBI web based applications using emergency broadband access network with tethered balloon and simulated in the field trial to evaluate the coverage area. The interface consisted of demography data and multi tabs for anamnesis, treatment, follow up and teleconference interfaces. The interface allows neurosurgeon, surgeon/general doctors and nurses to entry the EDH and SDH patient's data during referring them on the emergency simulation and evaluated based on time needs and their understanding. The average time needed was obtained after simulated by Lenovo T500 notebook using mouse; 8-10 min for neurosurgeons, 12-15 min for surgeons/general doctors and 15-19 min for nurses. By using Think Pad X201 Tablet, the time needed for entry data was 5-7 min for neurosurgeon, 7-10 min for surgeons/general doctors and 12-16 min for nurses. We observed that the time difference was depending on the computer type and user literacy qualification as well as their understanding on traumatic brain injury, particularly for the nurses. In conclusion, there are five data classification for simply TBI GUI, namely, 1) demography, 2) specific anamnesis for EDH and SDH, 3) treatment action and medicine of TBI, 4) follow up data display and 5) teleneurosurgery for streaming video consultation. The type of computer, particularly tablet PC was more convenient and faster for entry data, compare to that computer mouse touched pad. Emergency broadband access network using tethered balloon is possible to be employed to cover the communications systems in

  17. Hanford ground-water data base management guide and user's manual

    International Nuclear Information System (INIS)

    Mitchell, P.J.; Argo, R.S.; Bradymire, S.L.; Newbill, C.A.

    1985-05-01

    This management guide and user's manual is a working document for the computerized Hanford Ground-water Data Base maintained by the Geosciences Research and Engineering Department at Pacific Northwest Laboratory for the Hanford Ground-Water Surveillance Program. The program is managed by the Occupational and Environmental Protection Department for the US Department of Energy. The data base is maintained to provide rapid access to data that are rountinely collected from ground-water monitoring wells at the Hanford site. The data include water levels, sample analyses, geologic descriptions and well construction information of over 3000 existing or destroyed wells. These data are used to monitor water quality and for the evaluation of ground-water flow and pollutant transport problems. The management guide gives instructions for maintenance of the data base on the Digital Equipment Corporation PDP 11/70 Computer using the CIRMIS (Comprehensive Information Retrieval and Model Input Sequence) data base management software developed at Pacific Northwest Laboratory. Maintenance activities include inserting, modifying and deleting data, making back-up copies of the data base, and generating tables for annual monitoring reports. The user's guide includes instructions for running programs to retrieve the data in the form of listings of graphical plots. 3 refs

  18. Wilmar Planning Tool, user guide

    Energy Technology Data Exchange (ETDEWEB)

    Larsen, Helge V.

    2006-01-15

    This is a short user guide to the Wilmar Planning Tool developed in the project Wind Power Integration in Liberalised Electricity Markets (WILMAR) supported by EU (Contract No. ENK5-CT-2002-00663). A User Shell implemented in an Excel workbook controls the Wilmar Planning Tool. All data are contained in Access databases that communicate with various sub-models through text files that are exported from or imported to the databases. In the User Shell various scenario variables and control parameters are set, and export of model data from the input database, activation of the models, as well as import of model results to the output database are triggered from the shell. (au)

  19. Wilmar Planning Tool, user guide

    International Nuclear Information System (INIS)

    Larsen, Helge V.

    2006-01-01

    This is a short user guide to the Wilmar Planning Tool developed in the project Wind Power Integration in Liberalised Electricity Markets (WILMAR) supported by EU (Contract No. ENK5-CT-2002-00663). A User Shell implemented in an Excel workbook controls the Wilmar Planning Tool. All data are contained in Access databases that communicate with various sub-models through text files that are exported from or imported to the databases. In the User Shell various scenario variables and control parameters are set, and export of model data from the input database, activation of the models, as well as import of model results to the output database are triggered from the shell. (au)

  20. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Science.gov (United States)

    Kim, Seungjoo

    2014-01-01

    There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information. PMID:25374943

  1. Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment

    Directory of Open Access Journals (Sweden)

    Seungsoo Baek

    2014-01-01

    Full Text Available There has been an explosive increase in the population of the OSN (online social network in recent years. The OSN provides users with many opportunities to communicate among friends and family. Further, it facilitates developing new relationships with previously unknown people having similar beliefs or interests. However, the OSN can expose users to adverse effects such as privacy breaches, the disclosing of uncontrolled material, and the disseminating of false information. Traditional access control models such as MAC, DAC, and RBAC are applied to the OSN to address these problems. However, these models are not suitable for the dynamic OSN environment because user behavior in the OSN is unpredictable and static access control imposes a burden on the users to change the access control rules individually. We propose a dynamic trust-based access control for the OSN to address the problems of the traditional static access control. Moreover, we provide novel criteria to evaluate trust factors such as sociological approach and evaluate a method to calculate the dynamic trust values. The proposed method can monitor negative behavior and modify access permission levels dynamically to prevent the indiscriminate disclosure of information.

  2. Capacity bounds for the 2-user Gaussian IM-DD optical multiple-access channel

    KAUST Repository

    Al-Ebraheemy, Omer M. S.; Chaaban, Anas; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2016-01-01

    Optical wireless communications (OWC) is a potential solution for coping with the mismatch between the users growing demand for higher data-rates and the wireless network capabilities. In this paper, a multi-user OWC scenario is studied from

  3. Syringe vending machines for injection drug users: an experiment in Marseille, France.

    Science.gov (United States)

    Obadia, Y; Feroni, I; Perrin, V; Vlahov, D; Moatti, J P

    1999-01-01

    OBJECTIVES: This study evaluated the usefulness of vending machines in providing injection drug users with access to sterile syringes in Marseille, France. METHODS: Self-administered questionnaires were offered to 485 injection drug users obtaining syringes from 32 pharmacies, 4 needle exchange programs, and 3 vending machines. RESULTS: Of the 343 respondents (response rate = 70.7%), 21.3% used the vending machines as their primary source of syringes. Primary users of vending machines were more likely than primary users of other sources to be younger than 30 years, to report no history of drug maintenance treatment, and to report no sharing of needles or injection paraphernalia. CONCLUSIONS: Vending machines may be an appropriate strategy for providing access to syringes for younger injection drug users, who have typically avoided needle exchange programs and pharmacies. PMID:10589315

  4. A PRELIMINARY STUDY FOR DEVELOPING ACCESSIBLE MOOC SERVICES

    Directory of Open Access Journals (Sweden)

    Francisco Iniesto

    2016-11-01

    Full Text Available The flexibility of the MOOC service allows students to learn at their own time, place and pace, enhancing continuous communication and interaction between all participants in knowledge and community building. This model especially benefits people with disabilities, which can improve therefore their level of employability and social inclusion, reaching a better quality of life. Unfortunately the access to MOOC platforms present severe barriers: there is a lack of accessibility on the learning resources, the communicating tools and personalized user interfaces. All these issues add extra difficulties such as the need to develop specific digital or even social skills for students with functional diversity. In this context, MOOCs are leading a revolutionary computer and mobile-based scenario along with social technologies that will emerge new kinds of learning applications that enhance communication and collaboration processes. For that reason, this paper describes the need for designing an information model and related specifications to support a new strategy for delivering accessible MOOC courses to learners with special needs, in terms of their preferences and context of use based on a particular application profile. This user profile’s design is based on standard metadata schemas, data that provides information about other data, regarding the achievement of accessibility from content to user preferences.

  5. Role Based Access Control system in the ATLAS experiment

    International Nuclear Information System (INIS)

    Valsan, M L; Dumitru, I; Darlea, G L; Bujor, F; Dobson, M; Miotto, G Lehmann; Schlenker, S; Avolio, G; Scannicchio, D A; Filimonov, V; Khomoutnikov, V; Zaytsev, A S; Korol, A A; Bogdantchikov, A; Caramarcu, C; Ballestrero, S; Twomey, M

    2011-01-01

    The complexity of the ATLAS experiment motivated the deployment of an integrated Access Control System in order to guarantee safe and optimal access for a large number of users to the various software and hardware resources. Such an integrated system was foreseen since the design of the infrastructure and is now central to the operations model. In order to cope with the ever growing needs of restricting access to all resources used within the experiment, the Roles Based Access Control (RBAC) previously developed has been extended and improved. The paper starts with a short presentation of the RBAC design, implementation and the changes made to the system to allow the management and usage of roles to control access to the vast and diverse set of resources. The RBAC implementation uses a directory service based on Lightweight Directory Access Protocol to store the users (∼3000), roles (∼320), groups (∼80) and access policies. The information is kept in sync with various other databases and directory services: human resources, central CERN IT, CERN Active Directory and the Access Control Database used by DCS. The paper concludes with a detailed description of the integration across all areas of the system.

  6. Policies to promote user innovation

    DEFF Research Database (Denmark)

    Svensson, Peter O.; Hartmann, Rasmus Koss

    2018-01-01

    of such policies. It is also not clear whether there is a problem for user-directed policy to solve, or what that problem is. As a first empirical step to answering these questions, we report the results of providing hospital clinicians with access to ‘makerspaces’, i.e. staffed facilities with prototyping tools...... and the expertise in using them. Findings suggest that almost all innovations developed in the makerspaces are user innovations; that the potential returns from the innovations developed in the makerspaces’ first year of operation are more than tenfold the required investment; and that most of the innovations would...... not have been developed without access to makerspaces. Due to lack of diffusion, only a limited share of potential returns is realized. This suggests not only that there are problems of non-development and under-development that policy can solve and that doing so supports social welfare. It also suggests...

  7. Digital Libraries that Demonstrate High Levels of Mutual Complementarity in Collection-level Metadata Give a Richer Representation of their Content and Improve Subject Access for Users

    Directory of Open Access Journals (Sweden)

    Aoife Lawton

    2014-12-01

    -way complementarity in the metadata of all three digital libraries. This was mostly demonstrated by free-text data in the Description element complemented by data in the controlled vocabulary elements of Subject, Geographic Coverage, Temporal Coverage, and Object Type. Only one library demonstrated a significant proportion (19% of redundancy between free-text and controlled vocabulary metadata. An example of redundancy found included a repetition of geographic information in both a Description and Geographic Coverage metadata elements. Conclusion – The author reports high levels of mutual complementarity in the three cultural heritage digital libraries studied. The findings demonstrate that collection-level metadata which includes both free-text and controlled vocabulary is more representative of the intellectual content of the collections and improves subject access for users. The author maintains that there is no standard for collection-level metadata descriptions, and that this research may contribute to best practice guidelines in this area. It is unclear whether the digital libraries studied had written policies in place on how to describe collections and if those policies were adhered to in practice. The author expresses a need for further research to be conducted on collection-level metadata in other domains, such as science and interdisciplinary digital libraries, and on other scales (e.g., regional or state collections and geographic regions beyond Europe and the United States.

  8. The Graphical User Interface Crisis: Danger and Opportunity.

    Science.gov (United States)

    Boyd, Lawrence H.; And Others

    This paper examines graphic computing environments, identifies potential problems in providing access to blind people, and describes programs and strategies being developed to provide this access. The paper begins with an explanation of how graphic user interfaces differ from character-based systems in their use of pixels, visual metaphors such as…

  9. The giving standard: conditional cooperation in the case of charitable giving

    NARCIS (Netherlands)

    P. Wiepking (Pamala); M. Heijnen (Merijn)

    2011-01-01

    textabstractIn this study, we make a first attempt to investigate the mechanisms of conditional cooperation in giving outside experiments, using retrospective survey data on charitable giving (the Giving the Netherlands Panel Study 2005 (GINPS05, 2005 ; N  = 1474)). Our results show that in the case

  10. The older adult road user : recommendations for driver assistance

    NARCIS (Netherlands)

    Wilschut, E.S.; Kroon, E.C.M.; Goede, M. de; Cremers, A.H.M.; Hoedemaeker, D.M.

    2014-01-01

    The number of older road users is getting increasingly larger in Europe. Therefore policy makers pay more attention to the abilities and limitations of this group of road users. Providing accessible and comfortable assistance and safety functions for mobility is a key challenge in the objective of

  11. Code-Expanded Random Access for Machine-Type Communications

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Stefanovic, Cedomir

    2012-01-01

    Abstract—The random access methods used for support of machine-type communications (MTC) in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. Motivated by the random access method employed in LTE, we propose...

  12. Route Instruction Mechanism for Mobile Users Leveraging Distributed Wireless Resources

    Science.gov (United States)

    Kakehi, Takeshi; Shinkuma, Ryoichi; Murase, Tutomu; Motoyoshi, Gen; Yamori, Kyoko; Takahashi, Tatsuro

    The market growths of smart-phones and thin clients have been significantly increasing communication traffic in mobile networks. To handle the increased traffic, network operators should consider how to leverage distributed wireless resources such as distributed spots of wireless local access networks. In this paper, we consider the system where multiple moving users share distributed wireless access points on their traveling routes between their start and goal points and formulate as an optimization problem. Then, we come up with three algorithms as a solution for the problem. The key idea here is ‘longcut route instruction’, in which users are instructed to choose a traveling route where less congested access points are available; even if the moving distance increases, the throughput for users in the system would improve. In this paper, we define the gain function. Moreover, we analyze the basic characteristics of the system using as a simple model as possible.

  13. Disruption - Access cards service

    CERN Multimedia

    2014-01-01

    We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.

  14. Tagging for Subject Access: A Glimpse into Current Practice by Vendors, Libraries, and Users

    Science.gov (United States)

    Yang, Sharon Q.

    2012-01-01

    The study looked into the 307 Koha libraries listed in Breeding's Library Technology Guides. Since all the tag clouds in Koha are user-contributed, their adoption and usage can shed light on the extent to which libraries are supporting user tagging. The research also revealed that public library users are more actively involved in tagging than…

  15. Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Popovski, Petar

    2015-01-01

    In this chapter, we describe and discuss the current LTE random access procedure and the Radio Access Network Load Control solution within LTE/LTE-A. We provide an overview of the several considered load control solutions and give a detailed description of the standardized Extended Access Class B...

  16. An SSH key management system: easing the pain of managing key/user/account associations

    Science.gov (United States)

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  17. An SSH key management system: easing the pain of managing key/user/account associations

    International Nuclear Information System (INIS)

    Arkhipkin, D; Shiryaev, A; Betts, W; Lauret, J

    2008-01-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins

  18. Multiple-User, Multitasking, Virtual-Memory Computer System

    Science.gov (United States)

    Generazio, Edward R.; Roth, Don J.; Stang, David B.

    1993-01-01

    Computer system designed and programmed to serve multiple users in research laboratory. Provides for computer control and monitoring of laboratory instruments, acquisition and anlaysis of data from those instruments, and interaction with users via remote terminals. System provides fast access to shared central processing units and associated large (from megabytes to gigabytes) memories. Underlying concept of system also applicable to monitoring and control of industrial processes.

  19. The current status of opioid maintenance treatment in France: a survey of physicians, patients, and out-of-treatment opioid users

    Directory of Open Access Journals (Sweden)

    Benyamina A

    2014-09-01

    Full Text Available Amine Benyamina National Institute for Medical Research (INSERM U-669, Hôpital Universitaire Paul Brousse, 94804 Villejuif, France Aim: Project Access France was a national survey designed to provide real-world observations on the status of opioid dependence treatment in France. Methods: The views of physicians (n=100, patients (n=130, and out-of-treatment opioid users (n=33 were collected via interviews and questionnaires. Results: Physicians reported being moderately satisfied with treatment programs in their area (rating 6.9 out of 10. Most physicians (82% reported being concerned about misuse and diversion of medication-assisted treatment (MAT medications and 50% identified psychosocial/behavioral counseling as the key change that would most improve patient care. Among patients, the mean number of previous MAT episodes was low (1.5; 78% reported that it was easy to access a doctor to undergo MAT; 14% reported regularly or sometimes using heroin; misuse and diversion were reported in 15% and 39% of patients, respectively; and 57% of patients were not receiving psychosocial help. Out-of-treatment opioid users reported using drugs on a regular basis (42% regularly used heroin and cited 'not wanting to give up drugs completely' as the most frequent reason for staying out of MAT. Conclusion: This survey highlights a number of positive features of the open-access, GP-based treatment model for opioid dependence in France. Challenges remain with regard to continued misuse/diversion of MAT medications and limited patient access to psychosocial support. Keywords: opioid maintenance treatment, medication-assisted treatment, buprenorphine, methadone, buprenorphine–naloxone, France

  20. Accessibility and inclusion informational

    Directory of Open Access Journals (Sweden)

    Mônica Sena de Souza

    2013-06-01

    Full Text Available Introduction: Discusses the role of information professionals in meeting the informational demands of people with disabilities in the information society. The librarian is crucial for the effectiveness and success in the informational inclusion of people with disabilities, considering also continuing education for their professional qualification.Objective: To provide reflections on the role of the librarian in serving users with disabilities, highlighting the need for improvement in information units, identified in the scientific literature with regard to accessibility.Methodology: Literature search, based on a review of literature in books and scientific papers, highlighting the main authors: Adams (2000, Mazzoni (2001 and Sassaki (1997, 2002, 2005.Results: The lack of informational access for people with disabilities hampers their social and political participation, hence, reduces its condition of citizenship.Conclusion: The librarian responsible for seeking continuing education, greater involvement in the events of the area and the constant search for job training, which will reflect on the best service the information needs of users with disabilities.

  1. Activity Management System user reference manual. Revision 1

    International Nuclear Information System (INIS)

    Gates, T.A.; Burdick, M.B.

    1994-01-01

    The Activity Management System (AMS) was developed in response to the need for a simple-to-use, low-cost, user interface system for collecting and logging Hanford Waste Vitrification Plant Project (HWVP) activities. This system needed to run on user workstations and provide common user access to a database stored on a local network file server. Most important, users wanted a system that provided a management tool that supported their individual process for completing activities. Existing system treated the performer as a tool of the system. All AMS data is maintained in encrypted format. Users can feel confident that any activities they have entered into the database are private and that, as the originator, they retain sole control over who can see them. Once entered into the AMS database, the activities cannot be accessed by anyone other than the originator, the designated agent, or by authorized viewers who have been explicitly granted the right to look at specific activities by the originator. This user guide is intended to assist new AMS users in learning how to use the application and, after the initial learning process, will serve as an ongoing reference for experienced users in performing infrequently used functions. Online help screens provide reference to some of the key information in this manual. Additional help screens, encompassing all the applicable material in this manual, will be incorporated into future AMS revisions. A third, and most important, source of help is the AMS administrator(s). This guide describes the initial production version of AMS, which has been designated Revision 1.0

  2. Design and Implementation of Linux Access Control Model

    Institute of Scientific and Technical Information of China (English)

    Wei Xiaomeng; Wu Yongbin; Zhuo Jingchuan; Wang Jianyun; Haliqian Mayibula

    2017-01-01

    In this paper,the design and implementation of an access control model for Linux system are discussed in detail. The design is based on the RBAC model and combines with the inherent characteristics of the Linux system,and the support for the process and role transition is added.The core idea of the model is that the file is divided into different categories,and access authority of every category is distributed to several roles.Then,roles are assigned to users of the system,and the role of the user can be transited from one to another by running the executable file.

  3. Content sensitivity based access control framework for Hadoop

    Directory of Open Access Journals (Sweden)

    T.K. Ashwin Kumar

    2017-11-01

    Full Text Available Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misuse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attributes in a dataset or the user’s role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and information sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead.

  4. User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds

    Directory of Open Access Journals (Sweden)

    Gerald Wagenknecht

    2013-03-01

    Full Text Available The intention of an authentication and authorization infrastructure (AAI is to simplify and unify access to different web resources. With a single login, a user can access web applications at multiple organizations. The Shibboleth authentication and authorization infrastructure is a standards-based, open source software package for web single sign-on (SSO across or within organizational boundaries. It allows service providers to make fine-grained authorization decisions for individual access of protected online resources. The Shibboleth system is a widely used AAI, but only supports protection of browser-based web resources. We have implemented a Shibboleth AAI extension to protect web services using Simple Object Access Protocol (SOAP. Besides user authentication for browser-based web resources, this extension also provides user and machine authentication for web service-based resources. Although implemented for a Shibboleth AAI, the architecture can be easily adapted to other AAIs.

  5. Developing Access Control Model of Web OLAP over Trusted and Collaborative Data Warehouses

    Science.gov (United States)

    Fugkeaw, Somchart; Mitrpanont, Jarernsri L.; Manpanpanich, Piyawit; Juntapremjitt, Sekpon

    This paper proposes the design and development of Role- based Access Control (RBAC) model for the Single Sign-On (SSO) Web-OLAP query spanning over multiple data warehouses (DWs). The model is based on PKI Authentication and Privilege Management Infrastructure (PMI); it presents a binding model of RBAC authorization based on dimension privilege specified in attribute certificate (AC) and user identification. Particularly, the way of attribute mapping between DW user authentication and privilege of dimensional access is illustrated. In our approach, we apply the multi-agent system to automate flexible and effective management of user authentication, role delegation as well as system accountability. Finally, the paper culminates in the prototype system A-COLD (Access Control of web-OLAP over multiple DWs) that incorporates the OLAP features and authentication and authorization enforcement in the multi-user and multi-data warehouse environment.

  6. Important announcement to INSPEC database users

    CERN Multimedia

    DSU Department

    2008-01-01

    The Library is in the process of transferring CERN’s subscription to the online INSPEC database to a new provider, which involves a new access platform. Users who have saved searches or alerts on the present system should record the details of their search strings as soon as possible whilst the old platform is still available, and manually move them to the new platform which will become available very soon. Access to the older platform will shortly be switched off, after which it will not be possible to access any saved information stored there. Access to the new platform will be available soon from the Library’s INSPEC page: http://library.cern.ch/information_resources/inspec.html

  7. User Authentication in Smartphones for Telehealth.

    Science.gov (United States)

    Smith, Katherine A; Zhou, Leming; Watzlaf, Valerie J M

    2017-01-01

    Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.

  8. THE THEORY OF ESSENTIAL FACILITIES. THE PRINCIPLE OF ACCESS TO INVENTION IN CASE OF ABUSIVE REFUSAL TO LICENSE

    Directory of Open Access Journals (Sweden)

    Irina CUCER LISNIC

    2015-07-01

    Full Text Available Essential facilities designate specific inputs which are essential for the production of other downstream goods. Inputs are situated upstream and so are eligible for intellectual property protection. In order to foster competition in the downstream, holders of these inputs should be forced to give access to potential users, by offering them operating lidcenses. In other words, one must respect the exclusive right of intellectual property holder to freely exploit his invention or must he be sacrificed in favor of downstream competition ? In the present analysis we intend to analyze some of either controverted or less known judicial aspects related to the theory of essential facilities.

  9. IDA: An Intelligent Data Access Program

    National Research Council Canada - National Science Library

    Sagalowicz, Daniel

    1977-01-01

    .... The first component of LADDER is INLAND (Informal Natural Language Access to Navy Data), which allows the user to ask questions in English about information contained in databases similar to those currently...

  10. SDN Based User-Centric Framework for Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhaoming Lu

    2016-01-01

    Full Text Available Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet. However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience driven fine-grained resource management could be achieved for wireless network users.

  11. Giving Your Patrons the World: Barriers to, and the Value of, International Interlibrary Loan

    Science.gov (United States)

    Munson, Kurt; Thompson, Hilary H.

    2018-01-01

    Using the 2011 and 2015 survey by the Reference and User Services Association Sharing and Transforming Access to Resources Section (RUSA STARS) of international interlibrary loans (ILL), the authors explore barriers to this method of meeting patrons' information needs. They evaluate international ILL in the context of developments in the…

  12. Vascular Access in Children

    International Nuclear Information System (INIS)

    Krishnamurthy, Ganesh; Keller, Marc S.

    2011-01-01

    Establishment of stable vascular access is one of the essential and most challenging procedures in a pediatric hospital. Many clinical specialties provide vascular service in a pediatric hospital. At the top of the “expert procedural pyramid” is the pediatric interventional radiologist, who is best suited and trained to deliver this service. Growing awareness regarding the safety and high success rate of vascular access using image guidance has led to increased demand from clinicians to provide around-the-clock vascular access service by pediatric interventional radiologists. Hence, the success of a vascular access program, with the pediatric interventional radiologist as the key provider, is challenging, and a coordinated multidisciplinary team effort is essential for success. However, there are few dedicated pediatric interventional radiologists across the globe, and also only a couple of training programs exist for pediatric interventions. This article gives an overview of the technical aspects of pediatric vascular access and provides useful tips for obtaining vascular access in children safely and successfully using image guidance.

  13. Online Catalogs and Their Users.

    Science.gov (United States)

    Broadus, Robert N.

    1983-01-01

    Review of research on online public access catalogs sponsored by Council on Library Resources notes the scope and method (questionnaires administered to catalog users and nonusers in 29 participating institutions) and findings and applications (including organizational setting and computer system, catalog use and satisfaction, and implications).…

  14. The 'SAFARI' Technique Using Retrograde Access Via Peroneal Artery Access

    Energy Technology Data Exchange (ETDEWEB)

    Zhuang, Kun Da, E-mail: zkunda@gmail.com [Singapore General Hospital, Interventional Radiology Centre (Singapore); Tan, Seck Guan [Singapore General Hospital, Department of General Surgery (Singapore); Tay, Kiang Hiong [Singapore General Hospital, Interventional Radiology Centre (Singapore)

    2012-08-15

    The 'SAFARI' technique or subintimal arterial flossing with antegrade-retrograde intervention is a method for recanalisation of chronic total occlusions (CTOs) when subintimal angioplasty fails. Retrograde access is usually obtained via the popliteal, distal anterior tibial artery (ATA)/dorsalis pedis (DP), or distal posterior tibial artery (PTA). Distal access via the peroneal artery has not been described and has a risk of continued bleeding, leading to compartment syndrome due to its deep location. We describe our experience in two patients with retrograde access via the peroneal artery and the use of balloon-assisted hemostasis for these retrograde punctures. This approach may potentially give more options for endovascular interventions in lower limb CTOs.

  15. Interactive SIGHT: textual access to simple bar charts

    Science.gov (United States)

    Demir, Seniz; Oliver, David; Schwartz, Edward; Elzer, Stephanie; Carberry, Sandra; Mccoy, Kathleen F.; Chester, Daniel

    2010-12-01

    Information graphics, such as bar charts and line graphs, are an important component of many articles from popular media. The majority of such graphics have an intention (a high-level message) to communicate to the graph viewer. Since the intended message of a graphic is often not repeated in the accompanying text, graphics together with the textual segments contribute to the overall purpose of an article and cannot be ignored. Unfortunately, these visual displays are provided in a format which is not readily accessible to everyone. For example, individuals with sight impairments who use screen readers to listen to documents have limited access to the graphics. This article presents a new accessibility tool, the Interactive SIGHT (Summarizing Information GrapHics Textually) system, that is intended to enable visually impaired users to access the knowledge that one would gain from viewing information graphics found on the web. The current system, which is implemented as a browser extension that works on simple bar charts, can be invoked by a user via a keystroke combination while navigating the web. Once launched, Interactive SIGHT first provides a brief summary that conveys the underlying intention of a bar chart along with the chart's most significant and salient features, and then produces history-aware follow-up responses to provide further information about the chart upon request from the user. We present two user studies that were conducted with sighted and visually impaired users to determine how effective the initial summary and follow-up responses are in conveying the informational content of bar charts, and to evaluate how easy it is to use the system interface. The evaluation results are promising and indicate that the system responses are well-structured and enable visually impaired users to answer key questions about bar charts in an easy-to-use manner. Post-experimental interviews revealed that visually impaired participants were very satisfied with

  16. FaceMashup: An End-User Development Tool for Social Network Data

    Directory of Open Access Journals (Sweden)

    Daniele Massa

    2016-03-01

    Full Text Available Every day, each active social network user produces and shares texts, images and videos. While developers can access such data through application programming interfaces (APIs for creating games, visualizations and routines, end users have less control on such information. Their access is mediated by the social application features, which limits them in combining sources, filtering results and performing actions on groups of elements. In order to fill this gap, we introduce FaceMashup, an end user development (EUD environment supporting the manipulation of the Facebook graph. We describe the tool interface, documenting the choices we made during the design iterations. Data types are represented through widgets containing user interface (UI elements similar to those used in the social network application. Widgets can be connected with each other with the drag and drop of their inner fields, and the application updates their content. Finally, we report the results of a user-test on the FaceMashup prototype, which shows a good acceptance of the environment by end-users.

  17. The Follower Count Fallacy: Detecting Twitter Users with Manipulated Follower Count

    OpenAIRE

    Aggarwal, Anupama; Kumar, Saravana; Bhargava, Kushagra; Kumaraguru, Ponnurangam

    2018-01-01

    Online Social Networks (OSN) are increasingly being used as platform for an effective communication, to engage with other users, and to create a social worth via number of likes, followers and shares. Such metrics and crowd-sourced ratings give the OSN user a sense of social reputation which she tries to maintain and boost to be more influential. Users artificially bolster their social reputation via black-market web services. In this work, we identify users which manipulate their projected f...

  18. International Reactor Physics Handbook Database and Analysis Tool (IDAT) - IDAT user manual

    International Nuclear Information System (INIS)

    2013-01-01

    The IRPhEP Database and Analysis Tool (IDAT) was first released in 2013 and is included on the DVD. This database and corresponding user interface allows easy access to handbook information. Selected information from each configuration was entered into IDAT, such as the measurements performed, benchmark values, calculated values and materials specifications of the benchmark. In many cases this is supplemented with calculated data such as neutron balance data, spectra data, k-eff nuclear data sensitivities, and spatial reaction rate plots. IDAT accomplishes two main objectives: 1. Allow users to search the handbook for experimental configurations that satisfy their input criteria. 2. Allow users to trend results and identify suitable benchmarks experiments for their application. IDAT provides the user with access to several categories of calculated data, including: - 1-group neutron balance data for each configuration with individual isotope contributions in the reactor system. - Flux and other reaction rates spectra in a 299-group energy scheme. Plotting capabilities were implemented into IDAT allowing the user to compare the spectra of selected configurations in the original fine energy structure or on any user-defined broader energy structure. - Sensitivity coefficients (percent changes of k-effective due to elementary change of basic nuclear data) for the major nuclides and nuclear processes in a 238-group energy structure. IDAT is actively being developed. Those approved to access the online version of the handbook will also have access to an online version of IDAT. As May 2013 marks the first release, IDAT may contain data entry errors and omissions. The handbook remains the primary source of reactor physics benchmark data. A copy of IDAT user's manual is attached to this document. A copy of the IRPhE Handbook can be obtained on request at http://www.oecd-nea.org/science/wprs/irphe/irphe-handbook/form.html

  19. Access problem to UNIQA’s extranet portal

    CERN Document Server

    HR Department

    2008-01-01

    UNIQA would like to inform members of the Health Insurance Scheme that they are temporarily unable to access the EXTRANET portal, via which, amongst other things, they may consult reimbursement notifications. The difficulty is that once the user name and password have been entered to access the secure site, the user is redirected to the same initial screen without any error notification. UNIQA’s computing department has been informed of the problem and is carrying out investigations. We will be informed as soon as the problem has been solved (via the Bulletin and the CHIS site http://cern.ch/chis). UNIQA apologises in advance for any inconvenience caused by this technical problem.

  20. Profex: a graphical user interface for the Rietveld refinement program BGMN.

    Science.gov (United States)

    Doebelin, Nicola; Kleeberg, Reinhard

    2015-10-01

    Profex is a graphical user interface for the Rietveld refinement program BGMN . Its interface focuses on preserving BGMN 's powerful and flexible scripting features by giving direct access to BGMN input files. Very efficient workflows for single or batch refinements are achieved by managing refinement control files and structure files, by providing dialogues and shortcuts for many operations, by performing operations in the background, and by providing import filters for CIF and XML crystal structure files. Refinement results can be easily exported for further processing. State-of-the-art graphical export of diffraction patterns to pixel and vector graphics formats allows the creation of publication-quality graphs with minimum effort. Profex reads and converts a variety of proprietary raw data formats and is thus largely instrument independent. Profex and BGMN are available under an open-source license for Windows, Linux and OS X operating systems.

  1. Squidy : a Zoomable Design Environment for Natural User Interfaces

    OpenAIRE

    König, Werner A.; Rädle, Roman; Reiterer, Harald

    2009-01-01

    We introduce the interaction library Squidy, which eases the design of natural user interfaces by unifying relevant frameworks and toolkits in a common library. Squidy provides a central design environment based on high-level visual data flow programming combined with zoomable user interface concepts. The user interface offers a Simple visual language and a collection of ready-to-use devices, filters and interaction techniques. The concept of semantic zooming enables nevertheless access to mo...

  2. U.S. Geological Survey spatial data access

    Science.gov (United States)

    Faundeen, John L.; Kanengieter, Ronald L.; Buswell, Michael D.

    2002-01-01

    The U.S. Geological Survey (USGS) has done a progress review on improving access to its spatial data holdings over the Web. The USGS EROS Data Center has created three major Web-based interfaces to deliver spatial data to the general public; they are Earth Explorer, the Seamless Data Distribution System (SDDS), and the USGS Web Mapping Portal. Lessons were learned in developing these systems, and various resources were needed for their implementation. The USGS serves as a fact-finding agency in the U.S. Government that collects, monitors, analyzes, and provides scientific information about natural resource conditions and issues. To carry out its mission, the USGS has created and managed spatial data since its inception. Originally relying on paper maps, the USGS now uses advanced technology to produce digital representations of the Earth’s features. The spatial products of the USGS include both source and derivative data. Derivative datasets include Digital Orthophoto Quadrangles (DOQ), Digital Elevation Models, Digital Line Graphs, land-cover Digital Raster Graphics, and the seamless National Elevation Dataset. These products, created with automated processes, use aerial photographs, satellite images, or other cartographic information such as scanned paper maps as source data. With Earth Explorer, users can search multiple inventories through metadata queries and can browse satellite and DOQ imagery. They can place orders and make payment through secure credit card transactions. Some USGS spatial data can be accessed with SDDS. The SDDS uses an ArcIMS map service interface to identify the user’s areas of interest and determine the output format; it allows the user to either download the actual spatial data directly for small areas or place orders for larger areas to be delivered on media. The USGS Web Mapping Portal provides views of national and international datasets through an ArcIMS map service interface. In addition, the map portal posts news about new

  3. "Playing" with our users

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2014-01-01

    was from the amazing Dr Anthony Lewis Brooks (aka Tony) who has conceived the concepts GameAbilitation, ArtAbilitation, and Ludic Engagement Designs for All. While presenting some of his work on GameAbilitation and ArtAbilitation he brought up the subject of conducting research with users with disabilities...... to be positive for the users. Well this might be how research works and we do try to be ethical, explain terms and conditions to our users and then say thank you, we sometimes return to present the results, give more “thank you”s and promise that “if it becomes available/when they acquire such an expensive...... device/when such smartphones become cheaper/when we’ll have funds” they can have such an experience again and that we make sure to upload everything online for free and so on and so forth. And sometimes we do actually try to leave devices, guidelines and software behind, though we never return to check...

  4. Access Rights Distribution

    Directory of Open Access Journals (Sweden)

    T. M. Pestunova

    2011-03-01

    Full Text Available The main aspects of the development of the information system, which grants users the rights for access to automated information system resources on the basis of the organization business-processes, are considered. The conceptual, informational, functional models of the system, as well as a model, which allows to realize control while using various formal models (RBAC, DAC, MAC, are described.

  5. Verändertes Publizieren in den Forstwissenschaften: Open Access – Bestandsaufnahme und Empfehlungen

    OpenAIRE

    Bargheer, Margo; Wagner, Roland

    2014-01-01

    This is a talk we held at the Forestry Conference "Fowita" 2014 in Tharandt, Germany. The rationale of the talk was to give an overview on existing Open Access options in the field of forestry and give recommendations to forestry reserchers on how to publish Open Access.

  6. Continuity of care in the Health Care Network: negotiation between users and professionals

    Directory of Open Access Journals (Sweden)

    Maria Denise Schimith

    2014-12-01

    Full Text Available This study aimed to identify the negotiation and shared decision-making between professionals and users in a Family Health Unit and its influence on the continuity of care in the Health Care Network. Qualitative research created from a case study. One conducted 19 interviews, observation and document research. It was developed in a city in the countryside of Rio Grande do Sul, Brazil, in 2012. The results show that decisions used to happen unilaterally and that users and professionals looked for alternative ways to the continuity of care. It was not possible to identify the negotiation between professional and users and it was noticed that the user was alone looking for access. It is understood that primary care in the city researched needs to take responsibility for users and their access.

  7. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  8. Access to medication in the Public Health System and equity: populational health surveys in São Paulo, Brazil.

    Science.gov (United States)

    Monteiro, Camila Nascimento; Gianini, Reinaldo José; Barros, Marilisa Berti de Azevedo; Cesar, Chester Luiz Galvão; Goldbaum, Moisés

    2016-03-01

    Since 2003, the access to medication has been increasing in Brazil and particularly in São Paulo. The present study aimed to analyze the access to medication obtained in the public sector and the socioeconomic differences in this access in 2003 and 2008. Also, we explored the difference in access to medication from 2003 to 2008. Data were obtained from two cross-sectional population-based household surveys from São Paulo, Brazil (ISA-Capital 2003 and ISA-Capital 2008). Concentration curve and concentration index were calculated to analyze the associations between socioeconomic factors and access to medication in the public sector. Additionally, the differences between 2003 and 2008 regarding socioeconomic characteristics and access to medication were studied. Access to medication was 89.55% in 2003 and 92.99% in 2008, and the proportion of access to medication did not change in the period. Access in the public sector increased from 26.40% in 2003 to 48.55% in 2008 and there was a decrease in the concentration index between 2003 and 2008 in access to medication in the public sector. The findings indicate an expansion of Brazilian Unified Health System (Sistema Único de Saúde ) users, with the inclusion of people of higher socioeconomic position in the public sector. As the SUS gives more support to people of lower socioeconomic position in terms of medication provision, the SUS tends to equity. Nevertheless, universal coverage for medication and equity in access to medication in the public sector are still challenges for the Brazilian public health system.

  9. Online Help to End-Users in a Networked Environment.

    Science.gov (United States)

    Meyer, Paul

    1991-01-01

    Discusses the need for online help for end-users based on experiences with an online public access catalog (OPAC) at the University of Cape Town libraries. The concept of end users is examined, the role of search intermediaries in information systems is explained, and online help and systems design is discussed. (LRW)

  10. The Role of Social Media User Experience as a Mediator for Understanding Social Media User Behavior in Indonesia’s Museum Industry: Literature Review

    Science.gov (United States)

    Sundjaja, A. M.; LumanGaol, F.; Budiarti, T.; Abbas, B. S.; Abdinagoro, S. B.; Ongowarsito, H.

    2017-01-01

    Social media has changed the interaction between the customer and the business, social media has proven to provide new opportunities in facilitating access to information, efficiency and ease of interaction between customers and businesses that are distributed geographically dispersed. Ease of interaction to improve access to information about products, services, and prices have proven to have a positive impact for consumers. The purpose of this article is to develop a conceptual model to test the effect of user motivation, user expectations, and online community involvement to the intention of behavior that is mediated by the use of social media museum experience. This article is a literature study on exploration of social media user experiences museum in Indonesia. Authors searched and examined 85 articles from google scholar with the following keywords: motivation, expectations, online communities, user experience, social media, Technology Acceptance Model, Experiential Marketing, Uses and Gratification Theory. Proposed data collection techniques are literature study, survey and observation. The sample used in this research is 400 respondents of social media users that follow the social media managed by Indonesia’s museum. The sampling technique are systematic sampling. We use Structural Equation Model with AMOS for analyze the data.

  11. The upgrade of the J-TEXT experimental data access and management system

    International Nuclear Information System (INIS)

    Yang, C.; Zhang, M.; Zheng, W.; Liu, R.; Zhuang, G.

    2014-01-01

    Highlights: • The J-TEXT DAMS is developed based on B/S model, which makes it conveniently access the system. • The JWeb-Scope adopts segment strategy to read data that improve the speed of reading data. • DAMS have integrated the management and JWeb-Scope and make an easy way for visitors to access the experiment data. • The JWeb-Scope can be visited all over the world, plot experiment data and zoom in or out smoothly. - Abstract: The experimental data of J-TEXT tokamak are stored in the MDSplus database. The old J-TEXT data access system is based on the tools provided by MDSplus. Since the number of signals is huge, the data retrieval for an experiment is difficult. To solve this problem, the J-TEXT experimental data access and management system (DAMS) based on MDSplus has been developed. The DAMS left the old MDSplus system unchanged providing new tools, which can help users to handle all signals as well as to retrieve signals they need thanks to the user information requirements. The DAMS also offers users a way to create their jScope configuration files which can be downloaded to the local computer. In addition, the DAMS provides a JWeb-Scope tool to visualize the signal in a browser. JWeb-Scope adopts segment strategy to read massive data efficiently. Users can plot one or more signals on their own choice and zoom-in, zoom-out smoothly. The whole system is based on B/S model, so that the users only need of the browsers to access the DAMS. The DAMS has been tested and it has a better user experience. It will be integrated into the J-TEXT remote participation system later

  12. Public Access to NASA's Earth Science Data

    Science.gov (United States)

    Behnke, J.; James, N.

    2013-12-01

    Many steps have been taken over the past 20 years to make NASA's Earth Science data more accessible to the public. The data collected by NASA represent a significant public investment in research. NASA holds these data in a public trust to promote comprehensive, long-term Earth science research. Consequently, NASA developed a free, open and non-discriminatory policy consistent with existing international policies to maximize access to data and to keep user costs as low as possible. These policies apply to all data archived, maintained, distributed or produced by NASA data systems. The Earth Observing System Data and Information System (EOSDIS) is a major core capability within NASA Earth Science Data System Program. EOSDIS is designed to ingest, process, archive, and distribute data from approximately 90 instruments. Today over 6800 data products are available to the public through the EOSDIS. Last year, EOSDIS distributed over 636 million science data products to the user community, serving over 1.5 million distinct users. The system supports a variety of science disciplines including polar processes, land cover change, radiation budget, and most especially global climate change. A core philosophy of EOSDIS is that the general user is best served by providing discipline specific support for the data. To this end, EOSDIS has collocated NASA Earth science data with centers of science discipline expertise, called Distributed Active Archive Centers (DAACs). DAACs are responsible for data management, archive and distribution of data products. There are currently twelve DAACs in the EOSDIS system. The centralized entrance point to the NASA Earth Science data collection can be found at http://earthdata.nasa.gov. Over the years, we have developed several methods for determining needs of the user community including use of the American Customer Satisfaction Index survey and a broad metrics program. Annually, we work with an independent organization (CFI Group) to send this

  13. Highlights from e-EPS: Coordinated Access to Light sources

    CERN Multimedia

    e-EPS News

    2014-01-01

    The CALIPSO project, which runs until May 2015, will contribute to the effective exploitation of European synchrotrons and free electron lasers. CALIPSO (Coordinated Access to Light sources to Promote Standards and Optimisation) includes 20 partners forming one of the largest Research Networks in the world.   e-EPS interviewed M. Bertolo, CALIPSO project manager and his assistant C. Blasetti. Which challenges are addressed by CALIPSO? CALIPSO’s goal is to optimize the exploitation of the European synchrotrons and Free Electron Lasers. With respect to previous projects funded by the European Commission, it foresees significant improvements in integration, innovation and user-friendliness in all three areas of networking, transnational access and instrumentation. The Transnational Access program potentially benefits a community of 25,000 estimated users offering free open access to 12 synchrotrons and 5 free electron lasers solely based on scientific merit. In ad...

  14. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  15. The ISIS Open GENIE user manual

    International Nuclear Information System (INIS)

    Akeroyd, F.A.; Ashworth, R.L.; Campbell, S.I.; Johnston, S.D.; Martin, J.M.; Moreton-Smith, C.M.; Sivia, D.S.

    2000-01-01

    This manual should enable you to become familiar with Open GENIE quickly and easily. It therefore complements the Open GENIE Reference Manual which should be used to understand the full meaning of Open GENIE commands. The reference manual is accessible on the ISIS web server at: http://www.isis.rl.ac.uk/GENIEReferenceManual/ and the user manual is planned to be accessible by January '98 at http://www.isis.rl.ac.ukIGENIEUserManual/. The Open GENIE User Manual is separated into two parts: Part A. The User Manual. An introduction to the use of Open GENIE. Part B. The Installation Guide. General information on how to install and run Open GENIE. Assuming that you are new to Open GENIE and have just downloaded a copy you will need to consult the Installation Guide to get Open GENIE installed on your machine. After this we recommend you experiment with some of the example files to get an idea of the capabilities of Open GENIE. For further information, comments, additions of routines that you feel should be included, please contact us at genie at isise.rl.ac.uk

  16. Bridging the gap connecting users to digital contents

    CERN Document Server

    Lee, Sul H

    2013-01-01

    The amount of digital information that libraries need to manage effectively for the benefit of users is constantly increasing. This book discusses in detail how library administrators can better handle this growing abundance of information, as well as effective ways to allow library users easy access. Respected leaders in the field of librarianship explore various aspects of how librarians are meeting the challenges of delivering more digital information to a changing user base, including preservation demands, licensing agreements, digitizing and making available collections unique to speci

  17. User-friendly technology to help family carers cope.

    Science.gov (United States)

    Chambers, Mary; Connor, Samantha L

    2002-12-01

    Increases in the older adult population are occurring simultaneously with a growth in new technology. Modern technology presents an opportunity to enhance the quality of life and independence of older people and their family carers through communication and access to health care information. To evaluate the usability of a multimedia software application designed to provide family carers of the elderly or disabled with information, advice and psychological support to increase their coping capacity. The interactive application consisted of an information-based package that provided carers with advice on the promotion of psychological health, including relaxation and other coping strategies. The software application also included a carer self-assessment instrument, designed to provide both family and professional carers with information to assess how family carers were coping with their care-giving role. Usability evaluation was carried out in two stages. In the first stage (verification), user trials and an evaluation questionnaire were used to refine and develop the content and usability of the multimedia software application. In the second (demonstration), stage evaluation questionnaires were used to appraise the usability of the modified software application. The findings evidenced that the majority of users found the software to be usable and informative. Some areas were highlighted for improvement in the navigation of the software. The authors conclude that with further refinement, the software application has the potential to offer information and support to those who are caring for the elderly and disabled at home.

  18. VisTool: A user interface and visualization development system

    DEFF Research Database (Denmark)

    Xu, Shangjin

    system – to simplify user interface development. VisTool allows user interface development without real programming. With VisTool a designer assembles visual objects (e.g. textboxes, ellipse, etc.) to visualize database contents. In VisTool, visual properties (e.g. color, position, etc.) can be formulas...... programming. However, in Software Engineering, software engineers who develop user interfaces do not follow it. In many cases, it is desirable to use graphical presentations, because a graphical presentation gives a better overview than text forms, and can improve task efficiency and user satisfaction....... However, it is more difficult to follow the classical usability approach for graphical presentation development. These difficulties result from the fact that designers cannot implement user interface with interactions and real data. We developed VisTool – a user interface and visualization development...

  19. Performance Evaluation of TDMA Medium Access Control Protocol in Cognitive Wireless Networks

    Directory of Open Access Journals (Sweden)

    Muhammed Enes Bayrakdar

    2017-02-01

    Full Text Available Cognitive radio paradigm has been revealed as a new communication technology that shares channels in wireless networks. Channel assignment is a crucial issue in the field of cognitive wireless networks because of the spectrum scarcity. In this work, we have evaluated the performance of TDMA medium access control protocol. In our simulation scenarios, primary users and secondary users utilize TDMA as a medium access control protocol. We have designed a network environment in Riverbed simulation software that consists of primary users, secondary users, and base stations. In our system model, secondary users sense the spectrum and inform the base station about empty channels. Then, the base station decides accordingly which secondary user may utilize the empty channel. Energy detection technique is employed as a spectrum sensing technique because it is the best when information about signal of primary user is acquired. Besides, different number of users is selected in simulation scenarios in order to obtain accurate delay and throughput results. Comparing analytical model with simulation results, we have shown that performance analysis of our system model is consistent and accurate.

  20. Development of RESTful services and map-based user interface tools for access and delivery of data and metadata from the Marine-Geo Digital Library

    Science.gov (United States)

    Morton, J. J.; Ferrini, V. L.

    2015-12-01

    The Marine Geoscience Data System (MGDS, www.marine-geo.org) operates an interactive digital data repository and metadata catalog that provides access to a variety of marine geology and geophysical data from throughout the global oceans. Its Marine-Geo Digital Library includes common marine geophysical data types and supporting data and metadata, as well as complementary long-tail data. The Digital Library also includes community data collections and custom data portals for the GeoPRISMS, MARGINS and Ridge2000 programs, for active source reflection data (Academic Seismic Portal), and for marine data acquired by the US Antarctic Program (Antarctic and Southern Ocean Data Portal). Ensuring that these data are discoverable not only through our own interfaces but also through standards-compliant web services is critical for enabling investigators to find data of interest.Over the past two years, MGDS has developed several new RESTful web services that enable programmatic access to metadata and data holdings. These web services are compliant with the EarthCube GeoWS Building Blocks specifications and are currently used to drive our own user interfaces. New web applications have also been deployed to provide a more intuitive user experience for searching, accessing and browsing metadata and data. Our new map-based search interface combines components of the Google Maps API with our web services for dynamic searching and exploration of geospatially constrained data sets. Direct introspection of nearly all data formats for hundreds of thousands of data files curated in the Marine-Geo Digital Library has allowed for precise geographic bounds, which allow geographic searches to an extent not previously possible. All MGDS map interfaces utilize the web services of the Global Multi-Resolution Topography (GMRT) synthesis for displaying global basemap imagery and for dynamically provide depth values at the cursor location.

  1. Remote access to mathematical software

    International Nuclear Information System (INIS)

    Dolan, E.; Hovland, P.; More, J.; Norris, B.; Smith, B.

    2001-01-01

    The network-oriented application services paradigm is becoming increasingly common for scientific computing. The popularity of this approach can be attributed to the numerous advantages to both user and developer provided by network-enabled mathematical software. The burden of installing and maintaining complex systems is lifted from the user, while enabling developers to provide frequent updates without disrupting service. Access to software with similar functionality can be unified under the same interface. Remote servers can utilize potentially more powerful computing resources than may be available locally. We discuss some of the application services developed by the Mathematics and Computer Science Division at Argonne National Laboratory, including the Network Enabled Optimization System (NEOS) Server and the Automatic Differentiation of C (ADIC) Server, as well as preliminary work on Web access to the Portable Extensible Toolkit for Scientific Computing (PETSc). We also provide a brief survey of related work

  2. Mining User spatiotemporal Behavior in Geospatial Cyberinfrastructure --using GEOSS Clearinghouse as an example

    Science.gov (United States)

    XIA, J.; Yang, C.; Liu, K.; Huang, Q.; Li, Z.

    2013-12-01

    Big Data becomes increasingly important in almost all scientific domains, especially in geoscience where hundreds to millions of sensors are collecting data of the Earth continuously (Whitehouse News 2012). With the explosive growth of data, various Geospatial Cyberinfrastructure (GCI) (Yang et al. 2010) components are developed to manage geospatial resources and provide data access for the public. These GCIs are accessed by different users intensively on a daily basis. However, little research has been done to analyze the spatiotemporal patterns of user behavior, which could be critical to the management of Big Data and the operation of GCIs (Yang et al. 2011). For example, the spatiotemporal distribution of end users helps us better arrange and locate GCI computing facilities. A better indexing and caching mechanism could be developed based on the spatiotemporal pattern of user queries. In this paper, we use GEOSS Clearinghouse as an example to investigate spatiotemporal patterns of user behavior in GCIs. The investigation results show that user behaviors are heterogeneous but with patterns across space and time. Identified patterns include (1) the high access frequency regions; (2) local interests; (3) periodical accesses and rush hours; (4) spiking access. Based on identified patterns, this presentation reports several solutions to better support the operation of the GEOSS Clearinghouse and other GCIs. Keywords: Big Data, EarthCube, CyberGIS, Spatiotemporal Thinking and Computing, Data Mining, User Behavior Reference: Fayyad, U. M., Piatetsky-Shapiro, G., Smyth, P., & Uthurusamy, R. 1996. Advances in knowledge discovery and data mining. Whitehouse. 2012. Obama administration unveils 'BIG DATA' initiative: announces $200 million in new R&D investments. Whitehouse. Retrieved from http://www.whitehouse.gov/sites/default/files/microsites/ostp/big_data_press_release_final_2.pdf [Accessed 14 June 2013] Yang, C., Wu, H., Huang, Q., Li, Z., & Li, J. 2011. Using spatial

  3. Next Generation Access Network Deployment in Croatia: Optical Access Networks and Current IoT/5G Status

    Science.gov (United States)

    Breskovic, Damir; Sikirica, Mladen; Begusic, Dinko

    2018-05-01

    This paper gives an overview and background of optical access network deployment in Croatia. Optical access network development in Croatia has been put into a global as well as in the European Union context. All the challenges and the driving factors for optical access networks deployment are considered. Optical access network architectures that have been deployed by most of the investors in Croatian telecommunication market are presented, as well as the architectures that are in early phase of deployment. Finally, an overview on current status of mobile networks of the fifth generation and Internet of Things is given.

  4. Interoperable and accessible census and survey data from IPUMS.

    Science.gov (United States)

    Kugler, Tracy A; Fitch, Catherine A

    2018-02-27

    The first version of the Integrated Public Use Microdata Series (IPUMS) was released to users in 1993, and since that time IPUMS has come to stand for interoperable and accessible census and survey data. Initially created to harmonize U.S. census microdata over time, IPUMS now includes microdata from the U.S. and international censuses and from surveys on health, employment, and other topics. IPUMS also provides geo-spatial data, aggregate population data, and environmental data. IPUMS supports ten data products, each disseminating an integrated data collection with a set of tools that make complex data easy to find, access, and use. Key features are record-level integration to create interoperable datasets, user-friendly interfaces, and comprehensive metadata and documentation. The IPUMS philosophy aligns closely with the FAIR principles of findability, accessibility, interoperability, and re-usability. IPUMS data have catalyzed knowledge generation across a wide range of social science and other disciplines, as evidenced by the large volume of publications and other products created by the vast IPUMS user community.

  5. Textual information access statistical models

    CERN Document Server

    Gaussier, Eric

    2013-01-01

    This book presents statistical models that have recently been developed within several research communities to access information contained in text collections. The problems considered are linked to applications aiming at facilitating information access:- information extraction and retrieval;- text classification and clustering;- opinion mining;- comprehension aids (automatic summarization, machine translation, visualization).In order to give the reader as complete a description as possible, the focus is placed on the probability models used in the applications

  6. StarTrax --- The Next Generation User Interface

    Science.gov (United States)

    Richmond, Alan; White, Nick

    StarTrax is a software package to be distributed to end users for installation on their local computing infrastructure. It will provide access to many services of the HEASARC, i.e. bulletins, catalogs, proposal and analysis tools, initially for the ROSAT MIPS (Mission Information and Planning System), later for the Next Generation Browse. A user activating the GUI will reach all HEASARC capabilities through a uniform view of the system, independent of the local computing environment and of the networking method of accessing StarTrax. Use it if you prefer the point-and-click metaphor of modern GUI technology, to the classical command-line interfaces (CLI). Notable strengths include: easy to use; excellent portability; very robust server support; feedback button on every dialog; painstakingly crafted User Guide. It is designed to support a large number of input devices including terminals, workstations and personal computers. XVT's Portability Toolkit is used to build the GUI in C/C++ to run on: OSF/Motif (UNIX or VMS), OPEN LOOK (UNIX), or Macintosh, or MS-Windows (DOS), or character systems.

  7. Giving Psychology Away: How George Miller's Vision Is Being Realised by Psychological Literacy

    Science.gov (United States)

    Banyard, Philip; Hulme, Julie A.

    2015-01-01

    In George Miller's famous address to the American Psychological Association in 1969 he explored the aims and future direction of psychology. Psychology could develop as a professional elite that develops specialised knowledge that experts can hold on to or it could aim to "give psychology away" and to allow the general public access to…

  8. Perceptions of Cataloguers and End-Users towards Bilingual Authority Files.

    Science.gov (United States)

    Abdoulaye, Kaba

    2002-01-01

    Analyzes and describes bilingual authority files at the main library of the International Islamic University of Malaysia. Highlights include a review of multilingual research; perceptions of end users and catalogers; problems with bilingual files; and use of the OPAC (online public access catalog) by users. (Author/LRW)

  9. Performance analysis of adaptive modulation for cognitive radios with opportunistic access

    KAUST Repository

    Chen, Yunfei

    2011-06-01

    The performance of adaptive modulation for cognitive radio with opportunistic access is analyzed by considering the effects of spectrum sensing and primary user traffic for Nakagami-m fading channels. Both the adaptive continuous rate scheme and the adaptive discrete rate scheme are considered. Numerical results show that spectrum sensing and primary user traffic cause considerable degradation to the bit error rate performance of adaptive modulation in a cognitive radio system with opportunistic access to the licensed channel. They also show that primary user traffic does not affect the link spectral efficiency performance of adaptive modulation, while the spectrum sensing degrades the link spectral efficiency performance. © 2011 IEEE.

  10. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.; Radaydeh, Redha Mahmoud; Alouini, Mohamed-Slim

    2013-01-01

    access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a

  11. Image transmission in multicore-fiber code-division multiple access network

    Science.gov (United States)

    Yang, Guu-Chang; Kwong, Wing C.

    1997-01-01

    Recently, two-dimensional (2-D) signature patterns were proposed to encode binary digitized image pixels in optical code-division multiple-access (CDMA) networks with 'multicore' fiber. The new technology enables parallel transmission and simultaneous access of 2-D images in multiple-access environment, where these signature patterns are defined as optical orthogonal signature pattern codes (OOSPCs). However, previous work on OOSPCs assumed that the weight of each signature pattern was the same. In this paper, we construct a new family of OOSPCs with the removal of this assumption. Since varying the weight of a user's signature pattern affects that user's performance, this approach is useful for CDMA optical systems with multiple performance requirements.

  12. Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things

    Directory of Open Access Journals (Sweden)

    Zhen Qin

    2017-01-01

    Full Text Available Online healthcare social networks (OHSNs play an essential role in sharing information among medical experts and patients who are equipped with similar experiences. To access other patients’ data or experts’ diagnosis anywhere and anytime, it is necessary to integrate the OHSN into the Internet as part of the Internet of Things (IoT. Therefore, it is crucial to design an efficient and versatile access control scheme that can grant and revoke a user to access the OHSN. In this paper, we propose novel attribute-based encryption (ABE features with user revocation and verifiable decryption outsourcing to control the access privilege of the users. The security of the proposed ABE scheme is given in the well-studied random oracle model. With the proposed ABE scheme, the malicious users can be excluded from the system and the user can offload most of the overhead in the decryption to an untrusted cloud server in a verifiable manner. An access control scheme for the OHSN has been given in the context of the IoT based on the proposed ABE scheme. The simulation demonstrates that our access control mechanism is practical.

  13. Data Access System for Hydrology

    Science.gov (United States)

    Whitenack, T.; Zaslavsky, I.; Valentine, D.; Djokic, D.

    2007-12-01

    As part of the CUAHSI HIS (Consortium of Universities for the Advancement of Hydrologic Science, Inc., Hydrologic Information System), the CUAHSI HIS team has developed Data Access System for Hydrology or DASH. DASH is based on commercial off the shelf technology, which has been developed in conjunction with a commercial partner, ESRI. DASH is a web-based user interface, developed in ASP.NET developed using ESRI ArcGIS Server 9.2 that represents a mapping, querying and data retrieval interface over observation and GIS databases, and web services. This is the front end application for the CUAHSI Hydrologic Information System Server. The HIS Server is a software stack that organizes observation databases, geographic data layers, data importing and management tools, and online user interfaces such as the DASH application, into a flexible multi- tier application for serving both national-level and locally-maintained observation data. The user interface of the DASH web application allows online users to query observation networks by location and attributes, selecting stations in a user-specified area where a particular variable was measured during a given time interval. Once one or more stations and variables are selected, the user can retrieve and download the observation data for further off-line analysis. The DASH application is highly configurable. The mapping interface can be configured to display map services from multiple sources in multiple formats, including ArcGIS Server, ArcIMS, and WMS. The observation network data is configured in an XML file where you specify the network's web service location and its corresponding map layer. Upon initial deployment, two national level observation networks (USGS NWIS daily values and USGS NWIS Instantaneous values) are already pre-configured. There is also an optional login page which can be used to restrict access as well as providing a alternative to immediate downloads. For large request, users would be notified via

  14. A Global User-Driven Model for Tile Prefetching in Web Geographical Information Systems.

    Science.gov (United States)

    Pan, Shaoming; Chong, Yanwen; Zhang, Hang; Tan, Xicheng

    2017-01-01

    A web geographical information system is a typical service-intensive application. Tile prefetching and cache replacement can improve cache hit ratios by proactively fetching tiles from storage and replacing the appropriate tiles from the high-speed cache buffer without waiting for a client's requests, which reduces disk latency and improves system access performance. Most popular prefetching strategies consider only the relative tile popularities to predict which tile should be prefetched or consider only a single individual user's access behavior to determine which neighbor tiles need to be prefetched. Some studies show that comprehensively considering all users' access behaviors and all tiles' relationships in the prediction process can achieve more significant improvements. Thus, this work proposes a new global user-driven model for tile prefetching and cache replacement. First, based on all users' access behaviors, a type of expression method for tile correlation is designed and implemented. Then, a conditional prefetching probability can be computed based on the proposed correlation expression mode. Thus, some tiles to be prefetched can be found by computing and comparing the conditional prefetching probability from the uncached tiles set and, similarly, some replacement tiles can be found in the cache buffer according to multi-step prefetching. Finally, some experiments are provided comparing the proposed model with other global user-driven models, other single user-driven models, and other client-side prefetching strategies. The results show that the proposed model can achieve a prefetching hit rate in approximately 10.6% ~ 110.5% higher than the compared methods.

  15. User habits of smartphone owners in terms of consumption of media content

    OpenAIRE

    Kimla, Lukáš

    2017-01-01

    The thesis "User habits of smartphone owners in terms of consumption of media content" aims to expertly uncover a deeper description of user habits of today's smartphone users, and focus primarily on aspects of the consumption of media content on these devices, such as applications, games, web browsing, news, audiovisual content and social networks. The purpose is to give a complete picture of today's smartphone users as consumers of new technological media and to reveal the spectrum of influ...

  16. Enhancing Sensing and Channel Access in Cognitive Radio Networks

    KAUST Repository

    Hamza, Doha R.

    2014-06-18

    Cognitive radio technology is a promising technology to solve the wireless spectrum scarcity problem by intelligently allowing secondary, or unlicensed, users access to the primary, licensed, users\\' frequency bands. Cognitive technology involves two main tasks: 1) sensing the wireless medium to assess the presence of the primary users and 2) designing secondary spectrum access techniques that maximize the secondary users\\' benefits while maintaining the primary users\\' privileged status. On the spectrum sensing side, we make two contributions. First, we maximize a utility function representing the secondary throughput while constraining the collision probability with the primary below a certain value. We optimize therein the channel sensing time, the sensing decision threshold, the channel probing time, together with the channel sensing order for wideband primary channels. Second, we design a cooperative spectrum sensing technique termed sensing with equal gain combining whereby cognitive radios simultaneously transmit their sensing results to the fusion center over multipath fading reporting channels. The proposed scheme is shown to outperform orthogonal reporting systems in terms of achievable secondary throughput and to be robust against phase and synchronization errors. On the spectrum access side, we make four contributions. First, we design a secondary scheduling scheme with the goal of minimizing the secondary queueing delay under constraints on the average secondary transmit power and the maximum tolerable primary outage probability. Second, we design another secondary scheduling scheme based on the spectrum sensing results and the primary automatic repeat request feedback. The optimal medium access probabilities are obtained via maximizing the secondary throughput subject to constraints that guarantee quality of service parameters for the primary. Third, we propose a three-message superposition coding scheme to maximize the secondary throughput without

  17. Restructuring Big Data to Improve Data Access and Performance in Analytic Services Making Research More Efficient for the Study of Extreme Weather Events and Application User Communities

    Science.gov (United States)

    Ostrenga, D.; Shen, S.; Vollmer, B.; Meyer, D. L.

    2017-12-01

    NASA climate reanalysis dataset from MERRA-2 contains numerous data for atmosphere, land, and ocean, that are grouped into 95 products of archived volume over 300 TB. The data files are saved as hourly-file, day-file (hourly time interval) and month-file containing up to 125 parameters. Due to the large number of data files and the sheer data volumes, it is a challenging for users, especially those in the application research community, to handle dealing with the original data files. Most of these researchers prefer to focus on a small region or single location using the hourly data for long time periods to analyze extreme weather events or say winds for renewable energy applications. At the GES DISC, we have been working closely with the science teams and the application user community to create several new value added data products and high quality services to facilitate the use of the model data for various types of research. We have tested converting hourly data from one-day per file into different data cubes, such as one-month, one-year, or whole-mission and then continued to analyze the efficiency of the accessibility of this newly structured data through various services. Initial results have shown that compared to the original file structure, the new data has significantly improved the performance for accessing long time series. It is noticed that the performance is associated to the cube size and structure, the compression method, and how the data are accessed. The optimized data cube structure will not only improve the data access, but also enable better online analytic services for doing statistical analysis and extreme events mining. Two case studies will be presented using the newly structured data and value added services, the California drought and the extreme drought of the Northeastern states of Brazil. Furthermore, data access and analysis through cloud storage capabilities will be investigated.

  18. Challenges in Cultivating EOSDIS User Survey Participation

    Science.gov (United States)

    Boquist, C. L.; Sofinowski, E. J.; Walter, S.

    2011-12-01

    Since 2004 NASA has surveyed users of its Earth Observing System Data and Information System (EOSDIS) to determine user satisfaction with its services. The surveys have been conducted by CFI Group under contract with the Federal Consulting Group, Executive Agent in government for the American Customer Satisfaction Index (ACSI). The purpose of these annual surveys is to help EOSDIS and the data centers assess current status and improve future services. The survey questions include demographic and experiential questions in addition to the ACSI and EOSDIS specific rating questions. In addition to customer satisfaction, analysis of each year's results has provided insight into the survey process. Although specific questions have been added, modified, or deleted to reflect changes to the EOSDIS system and processes, the model rating questions have remained the same to ensure consistency for evaluating cross year trends. Working with the CFI Group, we have refined the invitation and questions to increase clarity and address the different ways diverse groups of users access services at EOSDIS data centers. We present challenges in preparing a single set of questions that go to users with backgrounds in many Earth science disciplines. These users may have contacted any of the 12 EOSDIS data centers for information or may have accessed data or data products from many kinds of aircraft and satellite instruments. We discuss lessons learned in preparing the invitation and survey questions and the steps taken to make the survey easier to complete and to encourage increased participation.

  19. H1DS: A new web-based data access system

    Energy Technology Data Exchange (ETDEWEB)

    Pretty, D.G., E-mail: david.pretty@anu.edu.au; Blackwell, B.D.

    2014-05-15

    Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems.

  20. H1DS: A new web-based data access system

    International Nuclear Information System (INIS)

    Pretty, D.G.; Blackwell, B.D.

    2014-01-01

    Highlights: • We present H1DS, a new RESTful web service for accessing fusion data. • We examine the scalability and extensibility of H1DS. • We present a fast and user friendly web browser client for the H1DS web service. • A summary relational database is presented as an application of the H1DS API. - Abstract: A new data access system, H1DS, has been developed and deployed for the H-1 Heliac at the Australian Plasma Fusion Research Facility. The data system provides access to fusion data via a RESTful web service. With the URL acting as the API to the data system, H1DS provides a scalable and extensible framework which is intuitive to new users, and allows access from any internet connected device. The H1DS framework, originally designed to work with MDSplus, has a modular design which can be extended to provide access to alternative data storage systems

  1. User`s Guide for the NREL Force and Loads Analysis Program. Version 2.2

    Energy Technology Data Exchange (ETDEWEB)

    Wright, A D

    1992-08-01

    The following report gives the reader an overview of and instructions on the proper use of the National Renewable Energy Laboratory Force and Loads Analysis Program (FLAP, version 2.2). It is intended as a tool for prediction of rotor and blade loads and response for two- or three-bladed rigid hub wind turbines. The effects of turbulence are accounted for. The objectives of the report are to give an overview of the code and also show the methods of data input and correct code execution steps in order to model an example two-bladed rigid hub turbine. A large portion of the discussion (Sections 6.0, 7.0, and 8.0) is devoted to the subject of inputting and running the code for wind turbulence effects. The ability to include turbulent wind effects is perhaps the biggest change in the code since the release of FLAP version 2.01 in 1988. This report is intended to be a user`s guide. It does not contain a theoretical discussion on equations of motion, assumptions, underlying theory, etc. It is intended to be used in conjunction with Wright, Buhl, and Thresher (1988).

  2. Tracking Users for a Targeted Dissemination

    Directory of Open Access Journals (Sweden)

    Philippe Bautier

    2015-12-01

    Full Text Available How to build a dissemination and communication strategy in a world where users have easy access to a deluge of data and information from various origins and where IT tools and design standards change so quickly that users behaviour and their expectations are continuously modified? The first challenge of Eurostat is clearly to know what users want: we know our different types of users but we have to identify how they get our data, what they do with our data, how they react to our outputs and which sort of new service they would like us to propose. Translating these needs into a visual dissemination is a new challenge undertaken by Eurostat through a new portal, new mobile apps and new info graphs and basic application as well as increasing the visibility on Google. The objective of this paper is to share Eurostat's experience in identifying user Leeds and to show how concretely this information has been visually disseminated.

  3. XACML to build access control policies for Internet of Things

    OpenAIRE

    Atlam, Hany F.; Alassafi, Madini, Obad; Alenezi, Ahmed; Walters, Robert; Wills, Gary

    2018-01-01

    Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an ef...

  4. Perspectives on access to in vitro fertilization in Portugal

    Directory of Open Access Journals (Sweden)

    S. Silva

    2012-04-01

    Full Text Available OBJECTIVE: To analyze users' reasons for choosing in vitro fertilization treatment in public or private services and to identify their suggestions for improving fertility treatment. METHODS: A qualitative study using an interpretative approach was conducted. Fifteen semi-structured interviews were conducted with patients undergoing in vitro fertilization treatment (nine women, one man and five couples at home or at their workplace in the districts of Viana do Castelo, Braga, Porto and Lisbon, Portugal, between July 2005 and February 2006. RESULTS: Users evaluated access to in vitro fertilization treatment in public and private services based mainly on their individual experiences and called for more access to less costly, faster and friendlier care with suitable facilities, appropriate time management and caring medical providers. These perceptions were also associated with views on the need for fighting stigmatization of infertility, protecting children's rights and guaranteeing sustainability of health care system. Interviewees sought to balance reduced waiting time and more attentive care with costs involved. The choice of services depended on the users' purchase power and place of residence and availability of attentive care. CONCLUSIONS: Current national policies on in vitro fertilization treatment meet user's demands of promoting access to, and quality, availability and affordability of in vitro fertilization treatment. However, their focus on legal regulation and technical-scientific aspects contrasts with the users' emphasis on reimbursement, insurance coverage and focus on emotional aspects of the treatment. The study showed these policies should ensure insurance coverage, participation of user representatives in the National Council for Assisted Reproductive Technology, promotion of infertility research and certification of fertility laboratories.

  5. Designing User Manuals for the Online Public Access Catalog.

    Science.gov (United States)

    Seiden, Peggy; Sullivan, Patricia

    1986-01-01

    Describes the process of developing and revising a brochure to guide library patrons in conducting an author search on an online public access catalog in order to demonstrate the application of four steps in production of a functional document--analysis; planning; development; evaluation, testing, and revision. Three sources are given. (EJS)

  6. The Techy Teacher/Access: Let's Get Creative

    Science.gov (United States)

    Tucker, Catlin

    2016-01-01

    Some teachers fear that using technology will create an even larger divide between the haves and the have nots, but the reality is that kids "must" leave schools technology literate to access information and opportunities beyond school. Teachers who do not have easy access to technology must get creative to give students opportunities to…

  7. Mobile authentication and access: any time, any place, any device?

    Directory of Open Access Journals (Sweden)

    Mark Williams

    2012-11-01

    Full Text Available The move from IP-based authentication to that of federated access has seen the sector support single sign-on to web-based resources, but the simplified user experience is at risk due to the rapid growth of mobile platforms and increasing variety of accompanying access methods for such devices. The user authentication experience on mobile devices is often further complicated by the poor discovery and delivery design of websites. While the introduction of tools such as Raptor permit accurate tracking of usage statistics via the UK Access Management Federation, the variety of mobile authentication methods such as native apps on devices and device paring pose additional challenges to librarians trying to gather a complete picture of resource use within their institution. In this article we examine the access challenges posed by the explosion of mobile device use.

  8. A Method for Upper Bounding on Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Patel, A.; Pedersen, Jens Myrup

    2004-01-01

    This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management.......This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management....

  9. Ethics of trial drug use: to give or not to give?

    Science.gov (United States)

    Ebunoluwa, Oduwole O; Kareem, Fayemi A

    2016-01-01

    The 2014 outbreak of Ebola viral disease in some West African countries, which later spread to the USA and Spain, has continued to be a subject of global public health debate. While there is no approved vaccine or drug for Ebola cure yet, moral questions of bioethical significance are emerging even as vaccine studies are at different clinical trial phases. This paper, through a normative and critical approach, focuses on the question of whether it is ethical to give any experimental drugs to Ebola victims in West Africa or not. Given the global panic and deadly contagious nature of Ebola, this paper argues on three major compassionate grounds that it is ethical to use experimental drugs on the dying African victims of Ebola. Besides respecting patients and family consent in the intervention process, this paper argues that the use of Ebola trial drugs on West African population will be ethical if it promotes the common good, and does not violate the fundamental principles of transparency and integrity in human research ethics. Using Kantian ethical framework of universality as a basis for moral defense of allowing access to yet approved drugs. This paper provides argument to strengthen the compassionate ground provisional recommendation of the WHO's Strategic Advisory Group of Experts on Immunization (SAGE) on Ebola vaccines and vaccination.

  10. MedlinePlus® Everywhere: Access from Your Phone, Tablet or Desktop

    Science.gov (United States)

    ... responsivefull.html MedlinePlus® Everywhere: Access from Your Phone, Tablet or Desktop To use the sharing features on ... provide a consistent user experience from a desktop, tablet, or phone. All users, regardless of how they ...

  11. The Philosophy of User Interfaces in HELIO and the Importance of CASSIS

    Science.gov (United States)

    Bonnin, X.; Aboudarham, J.; Renié, C.; Csillaghy, A.; Messerotti, M.; Bentley, R. D.

    2012-09-01

    HELIO is a European project funded under FP7 (Project No. 238969). One of its goals as a Heliospheric Virtual Observatory is to provide an easy access to many datasets scattered all over the world, in the fields of Solar physics, Heliophysics, and Planetary magnetospheres. The efficiency of such a tool is very much related to the quality of the user interface. HELIO infrastructure is based on a Service Oriented Architecture (SOA), regrouping a network of standalone components, which allows four main types of interfaces: - HELIO Front End (HFE) is a browser-based user interface, which offers a centralized access to the HELIO main functionalities. Especially, it provides the possibility to reach data directly, or to refine selection by determination of observing characteristics, such as which instrument was observing at that time, which instrument was at this location, etc. - Many services/components provide their own standalone graphical user interface. While one can directly access individually each of these interfaces, they can also be connected together. - Most services also provide direct access for any tools through a public interface. A small java library, called Java API, simplifies this access by providing client stubs for services and shields the user from security, discovery and failover issues. - Workflows capabilities are available in HELIO, allowing complex combination of queries over several services. We want the user to be able to navigate easily, at his needs, through the various interfaces, and possibly use a specific one in order to make much-dedicated queries. We will also emphasize the importance of the CASSIS project (Coordination Action for the integration of Solar System Infrastructure and Science) in encouraging the interoperability necessary to undertake scientific studies that span disciplinary boundaries. If related projects follow the guidelines being developed by CASSIS then using external resources with HELIO will be greatly simplified.

  12. Task-role-based Access Control Model in Smart Health-care System

    OpenAIRE

    Wang Peng; Jiang Lingyun

    2015-01-01

    As the development of computer science and smart health-care technology, there is a trend for patients to enjoy medical care at home. Taking enormous users in the Smart Health-care System into consideration, access control is an important issue. Traditional access control models, discretionary access control, mandatory access control, and role-based access control, do not properly reflect the characteristics of Smart Health-care System. This paper proposes an advanced access control model for...

  13. TRANSNET -- access to radioactive and hazardous materials transportation codes and databases

    International Nuclear Information System (INIS)

    Cashwell, J.W.

    1992-01-01

    TRANSNET has been developed and maintained by Sandia National Laboratories under the sponsorship of the United States Department of Energy (DOE) Office of Environmental Restoration and Waste Management to permit outside access to computerized routing, risk and systems analysis models, and associated databases. The goal of the TRANSNET system is to enable transfer of transportation analytical methods and data to qualified users by permitting direct, timely access to the up-to-date versions of the codes and data. The TRANSNET facility comprises a dedicated computer with telephone ports on which these codes and databases are adapted, modified, and maintained. To permit the widest spectrum of outside users, TRANSNET is designed to minimize hardware and documentation requirements. The user is thus required to have an IBM-compatible personal computer, Hayes-compatible modem with communications software, and a telephone. Maintenance and operation of the TRANSNET facility are underwritten by the program sponsor(s) as are updates to the respective models and data, thus the only charges to the user of the system are telephone hookup charges. TRANSNET provides access to the most recent versions of the models and data developed by or for Sandia National Laboratories. Code modifications that have been made since the last published documentation are noted to the user on the introductory screens. User friendly interfaces have been developed for each of the codes and databases on TRANSNET. In addition, users are provided with default input data sets for typical problems which can either be used directly or edited. Direct transfers of analytical or data files between codes are provided to permit the user to perform complex analyses with a minimum of input. Recent developments to the TRANSNET system include use of the system to directly pass data files between both national and international users as well as development and integration of graphical depiction techniques

  14. Access to digital library databases in higher education: design problems and infrastructural gaps.

    Science.gov (United States)

    Oswal, Sushil K

    2014-01-01

    After defining accessibility and usability, the author offers a broad survey of the research studies on digital content databases which have thus far primarily depended on data drawn from studies conducted by sighted researchers with non-disabled users employing screen readers and low vision devices. This article aims at producing a detailed description of the difficulties confronted by blind screen reader users with online library databases which now hold most of the academic, peer-reviewed journal and periodical content essential for research and teaching in higher education. The approach taken here is borrowed from descriptive ethnography which allows the author to create a complete picture of the accessibility and usability problems faced by an experienced academic user of digital library databases and screen readers. The author provides a detailed analysis of the different aspects of accessibility issues in digital databases under several headers with a special focus on full-text PDF files. The author emphasizes that long-term studies with actual, blind screen reader users employing both qualitative and computerized research tools can yield meaningful data for the designers and developers to improve these databases to a level that they begin to provide an equal access to the blind.

  15. AFM-CMM integrated instrument user manual

    DEFF Research Database (Denmark)

    Marinello, Francesco; Bariani, Paolo

    This manual gives general important guidelines for a proper use of the integrated AFM-CMM instrument. More information can be collected reading: • N. Kofod Ph.D thesis [1]; • P. Bariani Ph.D thesis [2]; • Dualscope DME 95-200 operation manuals [3]; • SPIP help [4] • Stitching software user manual...

  16. A Comparative Study on Java Technologies for Focus and Cursor Handling in Accessible Dynamic Interactions.

    Science.gov (United States)

    Jitngernmadan, Prajaks; Miesenberger, Klaus

    2015-01-01

    For an interactive application, supporting and guiding the user in fulfilling tasks is most important. The behavior of the application that will guide users through the procedures until they finish the task has to be designed intuitively and well guiding, especially if the users has only restricted or no access to the visual and spatial arrangement on the screen. Therefore, the focus/cursor management plays an important role for orientation and navigating through the interaction. In the frame of ongoing research on a software tool supporting blind people in more efficiently doing mathematical calculations, we researched how Java technologies support implementing an accessible Graphical User Interface (GUI) with an additional focus on usable accessibility in terms of guiding blind users through the process of solving mathematical calculations. We used Java Swing [1] and Eclipse SWT [2] APIs for creating a series of prototypes. We tested a) accessibility and usability of the prototypes for blind people when using screen reader software and refreshable Braille display and b) the implementation support to developers provided by both technologies. It turned out that Eclipse SWT API delivered best results under Windows operating system.

  17. EXFOR-CINDA-ENDF: Migration of Databases to Give Higher-Quality Nuclear Data Services

    International Nuclear Information System (INIS)

    Zerkin, V.V.; McLane, V.; Herman, M.W.; Dunford, C.L.

    2005-01-01

    Extensive work began in 1999 to migrate the EXFOR, CINDA, and ENDF nuclear reaction databases, and convert the available nuclear data services from VMS to a modern computing environment. This work has been performed through co-operative efforts between the IAEA Nuclear Data Section (IAEA-NDS) and the National Nuclear Data Center (NNDC), Brookhaven National Laboratory. The project also afforded the opportunity to make general revisions and improvements to the nuclear reaction data services by taking account of past experience with the old system and users' feedback. A main goal of the project was to implement databases in a relational form that provides full functionality for maintenance by data centre staff and improved retrieval capability for external users. As a result, the quality of our nuclear service has significantly improved, with better functionality of the system, accessibility of data, and improved data retrieval functions for users involved in a wide range of applications

  18. Wheelchair accessibility to public buildings in the Kumasi metropolis, Ghana

    Directory of Open Access Journals (Sweden)

    Cosmos Yarfi

    2017-09-01

    Conclusion: The results of this study show that public buildings in the Kumasi metropolis are not wheelchair accessible. An important observation made during this study was that there is an intention to improve accessibility when buildings are being constructed or renovated, but there are no laid down guidelines as how to make the buildings accessible for wheelchair users.

  19. Electromagnetic interference-aware transmission scheduling and power control for dynamic wireless access in hospital environments.

    Science.gov (United States)

    Phunchongharn, Phond; Hossain, Ekram; Camorlinga, Sergio

    2011-11-01

    We study the multiple access problem for e-Health applications (referred to as secondary users) coexisting with medical devices (referred to as primary or protected users) in a hospital environment. In particular, we focus on transmission scheduling and power control of secondary users in multiple spatial reuse time-division multiple access (STDMA) networks. The objective is to maximize the spectrum utilization of secondary users and minimize their power consumption subject to the electromagnetic interference (EMI) constraints for active and passive medical devices and minimum throughput guarantee for secondary users. The multiple access problem is formulated as a dual objective optimization problem which is shown to be NP-complete. We propose a joint scheduling and power control algorithm based on a greedy approach to solve the problem with much lower computational complexity. To this end, an enhanced greedy algorithm is proposed to improve the performance of the greedy algorithm by finding the optimal sequence of secondary users for scheduling. Using extensive simulations, the tradeoff in performance in terms of spectrum utilization, energy consumption, and computational complexity is evaluated for both the algorithms.

  20. User Privacy and Empowerment: Trends, Challenges, and Opportunities

    DEFF Research Database (Denmark)

    Dhotre, Prashant Shantaram; Olesen, Henning; Khajuria, Samant

    2018-01-01

    to the service providers. Considering business models that are slanted towards service provid-ers, privacy has become a crucial issue in today’s fast growing digital world. Hence, this paper elaborates personal information flow between users, service providers, and data brokers. We also discussed the significant...... privacy issues like present business models, user awareness about privacy and user control over per-sonal data. To address such issues, this paper also identified challenges that com-prise unavailability of effective privacy awareness or protection tools and the ef-fortless way to study and see the flow...... of personal information and its manage-ment. Thus, empowering users and enhancing awareness are essential to compre-hending the value of secrecy. This paper also introduced latest advances in the domain of privacy issues like User Managed Access (UMA) can state suitable requirements for user empowerment...

  1. Effectiveness of Agile Implementation Methods in Business Intelligence Projects from an End-user Perspective

    Directory of Open Access Journals (Sweden)

    Anna Maria Misiak

    2016-06-01

    Full Text Available The global Business Intelligence (BI market grew by 10% in 2013 according to the Gartner Report. Today organizations require better use of data and analytics to support their business decisions. Internet power and business trend changes have provided a broad term for data analytics – Big Data. To be able to handle it and leverage a value of having access to Big Data, organizations have no other choice than to get proper systems implemented and working. However traditional methods are not efficient for changing business needs. The long time between project start and go-live causes a gap between initial solution blueprint and actual user requirements in the end of the project. This article presents the latest market trends in BI systems implementation by comparing Agile with traditional methods. It presents a case study provided in a large telecommunications company (20K employees and the results of a pilot research provided in the three large companies: telecommunications, digital, and insurance. Both studies prove that Agile methods might be more effective in BI projects from an end-user perspective and give first results and added value in a much shorter time compared to a traditional approach.

  2. Reported Design Processes for Accessibility in Rail Transport

    DEFF Research Database (Denmark)

    Herriott, Richard; Cook, Sharon

    2014-01-01

    requirements with the aim of maximising accessibility in products and services. A review of ID literature has mainly developed in the arena of product design and design for assistive technology. Accessibility is a fundamental requirement in public transport (PT) yet there exists little research on design...... for accessibility or ID in this area. How is accessibility and the needs of users accounted for in rail transport design? This paper analyses interviews with rolling stock producers, operators and design consultancies. These conducted to determine if ID design methods are used explicitly and the extent to which...

  3. Social networking sites and older users - a systematic review

    OpenAIRE

    Nef, Tobias; Ganea, Raluca L.; Müri, René M.; Mosimann, Urs P.

    2017-01-01

    BACKGROUND Social networking sites can be beneficial for senior citizens to promote social participation and to enhance intergenerational communication. Particularly for older adults with impaired mobility, social networking sites can help them to connect with family members and other active social networking users. The aim of this systematic review is to give an overview of existing scientific literature on social networking in older users. METHODS Computerized databases were sea...

  4. Proceedings of the third users meeting for the Advanced Photon Source

    Energy Technology Data Exchange (ETDEWEB)

    1990-06-01

    The Third Users Meetings for the Advanced Photon Source, held on October 12--13, 1989, at Argonne National Laboratory, brought together scientists and engineers from industry, universities, and national laboratories to review the status of the facility and make plans for its use. The presentations documented in these proceedings include overviews of the project status and the user access policy; updates on several fundamental research efforts that make use of synchrotron radiation; reports on insertion-device R D and beam line design activities; cost and manpower estimates for beam line construction; and a panel discussion on strategies for developing and managing Collaborative Access Teams. The actions taken at the 1989 Business Meeting of the Advanced Photon Source Users Organization are also documented.

  5. Proceedings of the third users meeting for the Advanced Photon Source

    International Nuclear Information System (INIS)

    1990-06-01

    The Third Users Meetings for the Advanced Photon Source, held on October 12--13, 1989, at Argonne National Laboratory, brought together scientists and engineers from industry, universities, and national laboratories to review the status of the facility and make plans for its use. The presentations documented in these proceedings include overviews of the project status and the user access policy; updates on several fundamental research efforts that make use of synchrotron radiation; reports on insertion-device R ampersand D and beam line design activities; cost and manpower estimates for beam line construction; and a panel discussion on strategies for developing and managing Collaborative Access Teams. The actions taken at the 1989 Business Meeting of the Advanced Photon Source Users Organization are also documented

  6. Reducing the MAC Latency for IEEE 802.11 Vehicular Internet Access

    Directory of Open Access Journals (Sweden)

    Kang Moonsoo

    2010-01-01

    Full Text Available In an intermittently connected environment, access points are sparsely distributed throughout an area. As mobile users travel along the roadway, they can opportunistically connect, albeit temporarily, to roadside 802.11 (Wi-Fi APs for Internet access. Net-working characteristics of vehicular Internet access in an intermittently connected envi ronment face numerous challenges, such as short periods of connectivity and unpredictable connection times. To meet these challenges, we propose an Access Point Report (APR protocol where mobile stations opportunistically collaborate by broadcasting an APR to other mobile stations to fully utilize the short-lived connection periods. APR can optimize the use of short connection periods by minimizing the scanning delay and also act as a hint that enables mobile users to predict when connection can be established.

  7. Novel Virtual User Models of Mild Cognitive Impairment for Simulating Dementia

    Science.gov (United States)

    Segkouli, Sofia; Tzovaras, Dimitrios; Tsakiris, Thanos; Tsolaki, Magda; Karagiannidis, Charalampos

    2015-01-01

    Virtual user modeling research has attempted to address critical issues of human-computer interaction (HCI) such as usability and utility through a large number of analytic, usability-oriented approaches as cognitive models in order to provide users with experiences fitting to their specific needs. However, there is demand for more specific modules embodied in cognitive architecture that will detect abnormal cognitive decline across new synthetic task environments. Also, accessibility evaluation of graphical user interfaces (GUIs) requires considerable effort for enhancing ICT products accessibility for older adults. The main aim of this study is to develop and test virtual user models (VUM) simulating mild cognitive impairment (MCI) through novel specific modules, embodied at cognitive models and defined by estimations of cognitive parameters. Well-established MCI detection tests assessed users' cognition, elaborated their ability to perform multitasks, and monitored the performance of infotainment related tasks to provide more accurate simulation results on existing conceptual frameworks and enhanced predictive validity in interfaces' design supported by increased tasks' complexity to capture a more detailed profile of users' capabilities and limitations. The final outcome is a more robust cognitive prediction model, accurately fitted to human data to be used for more reliable interfaces' evaluation through simulation on the basis of virtual models of MCI users. PMID:26339282

  8. Method of recommending items to a user based on user interest

    Science.gov (United States)

    Bollen, John; Van De Sompel, Herbert

    2013-11-05

    Although recording of usage data is common in scholarly information services, its exploitation for the creation of value-added services remains limited due to concerns regarding, among others, user privacy, data validity, and the lack of accepted standards for the representation, sharing and aggregation of usage data. A technical, standards-based architecture for sharing usage information is presented. In this architecture, OpenURL-compliant linking servers aggregate usage information of a specific user community as it navigates the distributed information environment that it has access to. This usage information is made OAI-PMH harvestable so that usage information exposed by many linking servers can be aggregated to facilitate the creation of value-added services with a reach beyond that of a single community or a single information service.

  9. Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

    OpenAIRE

    Yekini N.A.; Itegboje A.O.; Oyeyinka I.K.; Akinwole A.K.

    2012-01-01

    An automatic teller machine requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with structured questions among the ATM users and the result proofed that a lot of problems was associated with ATM smartcard for access control. Among the problems are; it is very difficult to prevent another person from attaining and using a legitimate persons card, ...

  10. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed.......We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  11. A Practical Guide for Building a Digital Library: User-Focused Collection

    Science.gov (United States)

    Zhu, Qin; Guevara, Sophia

    2009-01-01

    With changing user expectations, many libraries are moving toward digital content. Accessible from anywhere at any time, digital content provides users with efficient, on-demand information experiences. Accordingly, librarians are presented with challenges and opportunities to build, manage, and implement outreach strategies that promote their…

  12. Creating the User-Friendly Library by Evaluating Patron Perception of Signage.

    Science.gov (United States)

    Bosman, Ellen; Rusinek, Carol

    1997-01-01

    Librarians at Indiana University Northwest Library surveyed patrons on how to make the library's collection and services more accessible by improving signage. Examines the effectiveness of signage to instruct users, reduce difficulties and fears, ameliorate negative experiences, and contribute to a user-friendly environment. (AEF)

  13. A SOA broker solution for standard discovery and access services: the GI-cat framework

    Science.gov (United States)

    Boldrini, Enrico

    2010-05-01

    GI-cat ideal users are data providers or service providers within the geoscience community. The former have their data already available through an access service (e.g. an OGC Web Service) and would have it published through a standard catalog service, in a seamless way. The latter would develop a catalog broker and let users query and access different geospatial resources through one or more standard interfaces and Application Profiles (AP) (e.g. OGC CSW ISO AP, CSW ebRIM/EO AP, etc.). GI-cat actually implements a broker components (i.e. a middleware service) which carries out distribution and mediation functionalities among "well-adopted" catalog interfaces and data access protocols. GI-cat also publishes different discovery interfaces: the OGC CSW ISO and ebRIM Application Profiles (the latter coming with support for the EO and CIM extension packages) and two different OpenSearch interfaces developed in order to explore Web 2.0 possibilities. An extended interface is also available to exploit all available GI-cat features, such as interruptible incremental queries and queries feedback. Interoperability tests performed in the context of different projects have also pointed out the importance to enforce compatibility with existing and wide-spread tools of the open source community (e.g. GeoNetwork and Deegree catalogs), which was then achieved. Based on a service-oriented framework of modular components, GI-cat can effectively be customized and tailored to support different deployment scenarios. In addition to the distribution functionality an harvesting approach has been lately experimented, allowing the user to switch between a distributed and a local search giving thus more possibilities to support different deployment scenarios. A configurator tool is available in order to enable an effective high level configuration of the broker service. A specific geobrowser was also naturally developed, for demonstrating the advanced GI-cat functionalities. This client

  14. Establishment and Operation of User Facilities

    International Nuclear Information System (INIS)

    Kim, Kye Ryung; Park, B. S.; Lim, Y. K.; Lee, S. K.; Jung, J. P.

    2005-08-01

    The final goal of this project is to establish the proton beam user facility which can offer the suitable proton beam for the user's demand. In the first phase we developed the key technologies that were required for the establishment of 20MeV and 100MeV proton user facilities. The user's demand survey was also achieved, and the test user facility was established on the results of the demand survey. Using the test facility, the users performed their pilot studies. Now, we have finished the conceptual design for 20MeV proton user facility. During the first phase we performed the user's demand survey and produced many materials related to the proton beam utilizations in domestic or abroad. The survey results were reflected on the establishment of the test user facility and the conceptual design of 20MeV/100MeV proton beam user facilities. We have developed the key technologies which concern to beam energy control, flux control, uniform irradiation, dose and uniformity measurement, proton energy measurement, SOBP(Spread-out Bragg Peak) system using a rotating range modulator, and carried out the conceptual design of 20MeV proton user facility. The test user facility has been constructed and operated for both verifying the developed key technologies and performing the user's preliminary experiments. 45MeV low flux user facility was constructed in 2003 and has performed a lot of irradiation experiments. The development of 1.8MeV test user facility was completed. Also the low energy user facility that KAERI kept was upgraded and used for many users. Therefore, we provided our users with various beams. On the other hand, the following activities were carried out, such as, inviting the oversea researchers, giving support to users to use the beam in domestic and abroad, discussing the beam utilization technologies by visiting the foreign user facilities, etc

  15. Customer co-creation in innovations : a protocol for innovating with end users

    OpenAIRE

    Weber, M.E.A.

    2011-01-01

    The transition into the information revolution or age has made it possible for consumers and users to interfere in the conceptualization, design, production and sales processes of firms. Consumers and users can express their needs in more direct way to producing firms, they have access to the way products and services are made, and last but not least, have access to information on competing products and services that even producers don’t know about. Consumers have become more knowledgeable an...

  16. J-TEXT WebScope: An efficient data access and visualization system for long pulse fusion experiment

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Wei, E-mail: zhenghaku@gmail.com [State Key Laboratory of Advanced Electromagnetic Engineering and Technology in Huazhong University of Science and Technology, Wuhan 430074 (China); School of Electrical and Electronic Engineering in Huazhong University of Science and Technology, Wuhan 430074 (China); Wan, Kuanhong; Chen, Zhi; Hu, Feiran; Liu, Qiang [State Key Laboratory of Advanced Electromagnetic Engineering and Technology in Huazhong University of Science and Technology, Wuhan 430074 (China); School of Electrical and Electronic Engineering in Huazhong University of Science and Technology, Wuhan 430074 (China)

    2016-11-15

    Highlights: • No matter how large the data is, the response time is always less than 500 milliseconds. • It is intelligent and just gives you the data you want. • It can be accessed directly over the Internet without installing special client software if you already have a browser. • Adopt scale and segment technology to organize data. • To support a new database for the WebScope is quite easy. • With the configuration stored in user’s profile, you have your own portable WebScope. - Abstract: Fusion research is an international collaboration work. To enable researchers across the world to visualize and analyze the experiment data, a web based data access and visualization tool is quite important [1]. Now, a new WebScope based on RIA (Rich Internet Application) is designed and implemented to meet these requirements. On the browser side, a fluent and intuitive interface is provided for researchers at J-TEXT laboratory and collaborators from all over the world to view experiment data and related metadata. The fusion experiments will feature long pulse and high sampling rate in the future. The data access and visualization system in this work has adopted segment and scale concept. Large data samples are re-sampled in different scales and then split into segments for instant response. It allows users to view extremely large data on the web browser efficiently, without worrying about the limitation on the size of the data. The HTML5 and JavaScript based web front-end can provide intuitive and fluent user experience. On the server side, a RESTful (Representational State Transfer) web API, which is based on ASP.NET MVC (Model View Controller), allows users to access the data and its metadata through HTTP (HyperText Transfer Protocol). An interface to the database has been designed to decouple the data access and visualization system from the data storage. It can be applied upon any data storage system like MDSplus or JTEXTDB, and this system is very easy to

  17. J-TEXT WebScope: An efficient data access and visualization system for long pulse fusion experiment

    International Nuclear Information System (INIS)

    Zheng, Wei; Wan, Kuanhong; Chen, Zhi; Hu, Feiran; Liu, Qiang

    2016-01-01

    Highlights: • No matter how large the data is, the response time is always less than 500 milliseconds. • It is intelligent and just gives you the data you want. • It can be accessed directly over the Internet without installing special client software if you already have a browser. • Adopt scale and segment technology to organize data. • To support a new database for the WebScope is quite easy. • With the configuration stored in user’s profile, you have your own portable WebScope. - Abstract: Fusion research is an international collaboration work. To enable researchers across the world to visualize and analyze the experiment data, a web based data access and visualization tool is quite important [1]. Now, a new WebScope based on RIA (Rich Internet Application) is designed and implemented to meet these requirements. On the browser side, a fluent and intuitive interface is provided for researchers at J-TEXT laboratory and collaborators from all over the world to view experiment data and related metadata. The fusion experiments will feature long pulse and high sampling rate in the future. The data access and visualization system in this work has adopted segment and scale concept. Large data samples are re-sampled in different scales and then split into segments for instant response. It allows users to view extremely large data on the web browser efficiently, without worrying about the limitation on the size of the data. The HTML5 and JavaScript based web front-end can provide intuitive and fluent user experience. On the server side, a RESTful (Representational State Transfer) web API, which is based on ASP.NET MVC (Model View Controller), allows users to access the data and its metadata through HTTP (HyperText Transfer Protocol). An interface to the database has been designed to decouple the data access and visualization system from the data storage. It can be applied upon any data storage system like MDSplus or JTEXTDB, and this system is very easy to

  18. User-friendly cognitive training for the elderly: a technical report.

    Science.gov (United States)

    Boquete, Luciano; Rodríguez-Ascariz, José Manuel; Amo-Usanos, Carlos; Martínez-Arribas, Alejandro; Amo-Usanos, Javier; Otón, Salvador

    2011-01-01

    This article presents a system that implements a cognitive training program in users' homes. The system comprises various applications designed to create a daily brain-fitness regime. The proposed mental training system uses television and a remote control specially designed for the elderly. This system integrates Java applications to promote brain-fitness training in three areas: arithmetic, memory, and idea association. The system comprises the following: Standard television set, simplified wireless remote control, black box (system's core hardware and software), brain-fitness games (language Java), and Wi-Fi-enabled Internet-connected router. All data from the user training sessions are monitored through a control center. This control center analyzes the evolution of the user and the proper performance of the system during the test. The implemented system has been tested by six healthy volunteers. The results for this user group demonstrated the accessibility and usability of the system in a controlled real environment. The impressions of the users were very favorable, and they reported high adaptability to the system. The mean score for usability and accessibility assigned by the users was 3.56 out of 5 points. The operation stress test (over 200 h) was successful. The proposed system was used to implement a cognitive training program in users' homes, which was developed to be a low-cost tool with a high degree of user interactivity. The results of this preliminary study indicate that this user-friendly system could be adopted as a form of cognitive training for the elderly.

  19. Efficient scheduling request algorithm for opportunistic wireless access

    KAUST Repository

    Nam, Haewoon

    2011-08-01

    An efficient scheduling request algorithm for opportunistic wireless access based on user grouping is proposed in this paper. Similar to the well-known opportunistic splitting algorithm, the proposed algorithm initially adjusts (or lowers) the threshold during a guard period if no user sends a scheduling request. However, if multiple users make requests simultaneously and therefore a collision occurs, the proposed algorithm no longer updates the threshold but narrows down the user search space by splitting the users into multiple groups iteratively, whereas the opportunistic splitting algorithm keeps adjusting the threshold until a single user is found. Since the threshold is only updated when no user sends a request, it is shown that the proposed algorithm significantly alleviates the burden of the signaling for the threshold distribution to the users by the scheduler. More importantly, the proposed algorithm requires a less number of mini-slots to make a user selection given a certain scheduling outage probability. © 2011 IEEE.

  20. Personal computer versus personal computer/mobile device combination users' preclinical laboratory e-learning activity.

    Science.gov (United States)

    Kon, Haruka; Kobayashi, Hiroshi; Sakurai, Naoki; Watanabe, Kiyoshi; Yamaga, Yoshiro; Ono, Takahiro

    2017-11-01

    The aim of the present study was to clarify differences between personal computer (PC)/mobile device combination and PC-only user patterns. We analyzed access frequency and time spent on a complete denture preclinical website in order to maximize website effectiveness. Fourth-year undergraduate students (N=41) in the preclinical complete denture laboratory course were invited to participate in this survey during the final week of the course to track login data. Students accessed video demonstrations and quizzes via our e-learning site/course program, and were instructed to view online demonstrations before classes. When the course concluded, participating students filled out a questionnaire about the program, their opinions, and devices they had used to access the site. Combination user access was significantly more frequent than PC-only during supplementary learning time, indicating that students with mobile devices studied during lunch breaks and before morning classes. Most students had favorable opinions of the e-learning site, but a few combination users commented that some videos were too long and that descriptive answers were difficult on smartphones. These results imply that mobile devices' increased accessibility encouraged learning by enabling more efficient time use between classes. They also suggest that e-learning system improvements should cater to mobile device users by reducing video length and including more short-answer questions. © 2016 John Wiley & Sons Australia, Ltd.