WorldWideScience

Sample records for method requires access

  1. A novel asynchronous access method with binary interfaces

    Directory of Open Access Journals (Sweden)

    Torres-Solis Jorge

    2008-10-01

    Full Text Available Abstract Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches. Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation.

  2. Section 508 Electronic Information Accessibility Requirements for Software Development

    Science.gov (United States)

    Ellis, Rebecca

    2014-01-01

    Section 508 Subpart B 1194.21 outlines requirements for operating system and software development in order to create a product that is accessible to users with various disabilities. This portion of Section 508 contains a variety of standards to enable those using assistive technology and with visual, hearing, cognitive and motor difficulties to access all information provided in software. The focus on requirements was limited to the Microsoft Windows® operating system as it is the predominant operating system used at this center. Compliance with this portion of the requirements can be obtained by integrating the requirements into the software development cycle early and by remediating issues in legacy software if possible. There are certain circumstances with software that may arise necessitating an exemption from these requirements, such as design or engineering software using dynamically changing graphics or numbers to convey information. These exceptions can be discussed with the Section 508 Coordinator and another method of accommodation used.

  3. 50 CFR 660.316 - Open access fishery-observer requirements.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Open access fishery-observer requirements... West Coast Groundfish-Open Access Fisheries § 660.316 Open access fishery—observer requirements. (a...(s) access to, and the use of, the vessel's navigation equipment and personnel, on request, to...

  4. 78 FR 30226 - Accessibility Requirements for Internet Browsers

    Science.gov (United States)

    2013-05-22

    ... software, such as an Internet browser, that it provides. Among other things, this means that the functions... CG Docket No. 10-145; FCC 13-57] Accessibility Requirements for Internet Browsers AGENCY: Federal... Act requires Internet browsers built into mobile phones to be accessible to individuals who are blind...

  5. 12 CFR 404.14 - Requirements of request for access.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Requirements of request for access. 404.14 Section 404.14 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Access to Records Under the Privacy Act of 1974 § 404.14 Requirements of request for access. (a) Form. Requests for...

  6. 49 CFR 399.207 - Truck and truck-tractor access requirements.

    Science.gov (United States)

    2010-10-01

    .... Exception. If air and electrical connections necessary to couple or uncouple a truck-tractor from a trailer... 49 Transportation 5 2010-10-01 2010-10-01 false Truck and truck-tractor access requirements. 399... Vehicles § 399.207 Truck and truck-tractor access requirements. (a) General rule. Any person entering or...

  7. A Method for Upper Bounding Long Term Growth of Network Access Speed

    Directory of Open Access Journals (Sweden)

    Thomas Phillip Knudsen

    2006-06-01

    Full Text Available The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research presented.

  8. A Method for Upper Bounding Long Term Growth of Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Pedersen, Jens Myrup; Madsen, Ole Brun

    2004-01-01

    The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound...... to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research...

  9. Visual inspection requirements for high-reliability random-access memories

    International Nuclear Information System (INIS)

    Andrade, A.; McHenery, J.

    1981-09-01

    Visual inspection requirements are given for random-access memories for deep-space satellite electronics. The requirements, based primarily on Military Standard 883B, are illustrated in the order of their manufacturing operation to clarify and facilitate inspection procedures

  10. ANALYSIS OF MPC ACCESS REQUIREMENTS FOR ADDITION OF FILLER MATERIALS

    International Nuclear Information System (INIS)

    W. Wallin

    1996-01-01

    This analysis is prepared by the Mined Geologic Disposal System (MGDS) Waste Package Development Department (WPDD) in response to a request received via a QAP-3-12 Design Input Data Request (Ref. 5.1) from WAST Design (formerly MRSMPC Design). The request is to provide: Specific MPC access requirements for the addition of filler materials at the MGDS (i.e., location and size of access required). The objective of this analysis is to provide a response to the foregoing request. The purpose of this analysis is to provide a documented record of the basis for the response. The response is stated in Section 8 herein. The response is based upon requirements from an MGDS perspective

  11. METHOD AND ABSTRACT MODEL FOR CONTROL AND ACCESS RIGHTS BY REQUESTS REDIRECTION

    Directory of Open Access Journals (Sweden)

    K. A. Shcheglov

    2015-11-01

    Full Text Available We have researched implementation problems of control and access rights of subjects to objects in modern computer systems. We have suggested access control method based on objects access requests redirection. The method possesses a distinctive feature as compared to discretional access control. In case when a subject needs to deny writing (object modification, it is not denied but redirected (access rights are not changed, but operation is performed with another object. This gives the possibility to implement access policies to system objects without breaking the system and applications operability, and share correctly access objects between subjects. This important property of suggested access control method enables to solve fundamentally new system objects securing problems like system resources virtualization aimed to protect system objects from users’ and applications attacks. We have created an abstract model, and it shows that this method (access control from subjects to objects based on requests redirection can be used as self-sufficient access control method, implementing any access control policy (from subjects to objects, thus being an alternative to discretional access control method.

  12. Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. Triangle.

    Science.gov (United States)

    Tipton, Stephen J; Forkey, Sara; Choi, Young B

    2016-04-01

    This paper examines various methods encompassing the authentication of users in accessing Electronic Medical Records (EMRs). From a methodological perspective, multiple authentication methods have been researched from both a desktop and mobile accessibility perspective. Each method is investigated at a high level, along with comparative analyses, as well as real world examples. The projected outcome of this examination is a better understanding of the sophistication required in protecting the vital privacy constraints of an individual's Protected Health Information (PHI). In understanding the implications of protecting healthcare data in today's technological world, the scope of this paper is to grasp an overview of confidentiality as it pertains to information security. In addressing this topic, a high level overview of the three goals of information security are examined; in particular, the goal of confidentiality is the primary focus. Expanding upon the goal of confidentiality, healthcare accessibility legal aspects are considered, with a focus upon the Health Insurance Portability and Accountability Act of 1996 (HIPAA). With the primary focus of this examination being access to EMRs, the paper will consider two types of accessibility of concern: access from a physician, or group of physicians; and access from an individual patient.

  13. Access Requirement Analysis of E-Governance Systems

    Science.gov (United States)

    Kim, Tai-Hoon

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  14. ASME section XI - design and access requirements for in-service inspection

    International Nuclear Information System (INIS)

    Davis, D.D.

    1982-01-01

    The Owner of a nuclear power plant has the regulatory commitment to perform Section XI in-service inspection throughout the service life of a plant. In anticipation of what will be needed to perform adequately the required examinations and tests, sub-article IWA-1500 of Section XI not only requires that sufficient access be provided to accommodate equipment and inspection personnel but also requires that other provisions be considered such as: component surface preparations, material selections, shielding, removal and storage of hardware, handling equipment, and provisions for repairs and replacements. It is, therefore, the owner's and the architect engineer's responsibility to ensure that proper design and access provisions are incorporated to enable the owner to meet his commitments. Since the architect engineer usually has the prime responsibility for the implementation of design criteria, the owner must ensure that these provisions be considered in each phase of design and construction. The benefits of this can result in shorter outages, more meaningful examinations and tests and less radiation exposure of inspection personnel. This paper will address in detail those topics that affect design and access provisions which need to be considered during the design and construction of a nuclear power plant. (author)

  15. Public Perception of Quality and Support for Required Access to Drinking Water in Schools and Parks.

    Science.gov (United States)

    Long, Michael W; Gortmaker, Steven L; Patel, Anisha I; Onufrak, Stephen J; Wilking, Cara L; Cradock, Angie L

    2018-01-01

    We assessed public support for required water access in schools and parks and perceived safety and taste of water in these settings to inform efforts to increase access to and consumption of tap water. Cross-sectional survey of the US public collected from August to November 2011. Random digit-dialed telephone survey. Participants (n = 1218) aged 17 and older from 1055 US counties in 46 states. Perceived safety and taste of water in schools and parks as well as support for required access to water in these settings. Survey-adjusted perceived safety and taste as well as support for required access were estimated. There was broad support for required access to water throughout the day in schools (96%) and parks (89%). Few participants believed water was unsafe in schools (10%) or parks (18%). This study provides evidence of public support for efforts to increase access to drinking water in schools and parks and documents overall high levels of perceived taste and safety of water provided in these settings.

  16. Multi-views storage model and access methods of conversation history in converged IP messaging system

    Science.gov (United States)

    Lu, Meilian; Yang, Dong; Zhou, Xing

    2013-03-01

    Based on the analysis of the requirements of conversation history storage in CPM (Converged IP Messaging) system, a Multi-views storage model and access methods of conversation history are proposed. The storage model separates logical views from physical storage and divides the storage into system managed region and user managed region. It simultaneously supports conversation view, system pre-defined view and user-defined view of storage. The rationality and feasibility of multi-view presentation, the physical storage model and access methods are validated through the implemented prototype. It proves that, this proposal has good scalability, which will help to optimize the physical data storage structure and improve storage performance.

  17. 45 CFR 602.42 - Retention and access requirements for records.

    Science.gov (United States)

    2010-10-01

    ... FOUNDATION UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL... (c) of this section. (2) If any litigation, claim, negotiation, audit or other action involving the... to make audits, examinations, excerpts, and transcripts. (2) Expiration of right of access. The...

  18. 5 CFR 2606.203 - Granting access.

    Science.gov (United States)

    2010-01-01

    ... Access to Records and Accounting of Disclosures § 2606.203 Granting access. (a) The methods for allowing... documentation will be required for the disclosure to the data subject of information required to be made...

  19. Analytical resource assessment method for continuous (unconventional) oil and gas accumulations - The "ACCESS" Method

    Science.gov (United States)

    Crovelli, Robert A.; revised by Charpentier, Ronald R.

    2012-01-01

    The U.S. Geological Survey (USGS) periodically assesses petroleum resources of areas within the United States and the world. The purpose of this report is to explain the development of an analytic probabilistic method and spreadsheet software system called Analytic Cell-Based Continuous Energy Spreadsheet System (ACCESS). The ACCESS method is based upon mathematical equations derived from probability theory. The ACCESS spreadsheet can be used to calculate estimates of the undeveloped oil, gas, and NGL (natural gas liquids) resources in a continuous-type assessment unit. An assessment unit is a mappable volume of rock in a total petroleum system. In this report, the geologic assessment model is defined first, the analytic probabilistic method is described second, and the spreadsheet ACCESS is described third. In this revised version of Open-File Report 00-044 , the text has been updated to reflect modifications that were made to the ACCESS program. Two versions of the program are added as appendixes.

  20. 45 CFR 1157.42 - Retention and access requirements for records.

    Science.gov (United States)

    2010-10-01

    ... FOUNDATION ON THE ARTS AND THE HUMANITIES NATIONAL ENDOWMENT FOR THE ARTS UNIFORM ADMINISTRATIVE REQUIREMENTS... (c) of this section. (2) If any litigation, claim, negotiation, audit or other action involving the... to make audits, examinations, excerpts, and transcripts. (2) Expiration of right of access. The...

  1. Identifying and prioritizing customer requirements from tractor production by QFD method

    Directory of Open Access Journals (Sweden)

    H Taghizadeh

    2017-05-01

    and theoretical bases of this study have been collected with research paper tab and the research data has been collected through four researcher-made questionnaires and interview tools. The questionnaire Type 1, used for determining the most important demands and needs of customers based on five choices Likert scale. The questionnaire Type 2 was for gathering data requirements to hierarchical AHP method, and the questionnaire Type 3 was for doing some evaluation about organization's present situation related with competitor's situation based on customer's demands and needs; and the questionnaire Type 4 had been implemented for finding technical requirement weights respect to customer's demands and needs. The reliability of the type 1, 3 and 4 questionnaires determined by Chronbach's Alpha method; after gathering required data for mentioned statistical test, these questionnaires' reliability rates are obtained: 0.768, 0.784 and 0.793, respectively. As well as, the validity of the questionnaires has been examined with content validity method. In this research, for analyzing the gathered data, while taking into account the different stages of QFD method, t- student statistical test was used for identifing the needs and demands of customers, and AHP was used for determining the priority of needs and demands of customers. Results and Discussion The results of one sample t-test for identifying the customer’s most important demands and needs showed that the factors such as: producing low price tractor, the quality of used auto-parts, sustainability and long-lasting the final production (production life and durability, comfort and peace during work, creating operator cabin, easy access to spare components, the amount of fuel consumption, warranty and maintenance, easy access to official repair stations, technical experts and suitable auto-parts, fast respond of brake system during braking and smooth moving identified the important demands and needs of customers. The results

  2. 22 CFR 226.53 - Retention and access requirements for records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Retention and access requirements for records. 226.53 Section 226.53 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT ADMINISTRATION OF... date of submission of the final expenditure report or, for awards that are renewed quarterly or...

  3. 78 FR 31769 - Accessible Emergency Information; Apparatus Requirements for Emergency Information and Video...

    Science.gov (United States)

    2013-05-24

    ... and equipment and better access video programming.'' \\7\\ \\7\\ H.R. Rep. No. 111-563, 111th Cong., 2d... Video Accessibility Act of 2010 (``CVAA''), the Commission adopts rules requiring video programming distributors and video programming providers (including program owners) to make televised emergency information...

  4. A Method for Upper Bounding on Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Patel, A.; Pedersen, Jens Myrup

    2004-01-01

    This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management.......This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management....

  5. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  6. 41 CFR 51-9.302 - Times, places and requirements for access requests.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Times, places and requirements for access requests. 51-9.302 Section 51-9.302 Public Contracts and Property Management Other... Director may require a notarized statement of identity. The Executive Director shall ensure that such times...

  7. 21 CFR 312.305 - Requirements for all expanded access uses.

    Science.gov (United States)

    2010-04-01

    ... options; (iii) The criteria for patient selection or, for an individual patient, a description of the... 21 Food and Drugs 5 2010-04-01 2010-04-01 false Requirements for all expanded access uses. 312.305 Section 312.305 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES...

  8. Research Investigation of Information Access Methods

    Science.gov (United States)

    Heinrichs, John H.; Sharkey, Thomas W.; Lim, Jeen-Su

    2006-01-01

    This study investigates the satisfaction of library users at Wayne State University who utilize alternative information access methods. The LibQUAL+[TM] desired and perceived that satisfaction ratings are used to determine the user's "superiority gap." By focusing limited library resources to address "superiority gap" issues identified by each…

  9. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  10. A Method for Automated Planning of FTTH Access Network Infrastructures

    DEFF Research Database (Denmark)

    Riaz, Muhammad Tahir; Pedersen, Jens Myrup; Madsen, Ole Brun

    2005-01-01

    In this paper a method for automated planning of Fiber to the Home (FTTH) access networks is proposed. We introduced a systematic approach for planning access network infrastructure. The GIS data and a set of algorithms were employed to make the planning process more automatic. The method explains...... method. The method, however, does not fully automate the planning but make the planning process significantly fast. The results and discussion are presented and conclusion is given in the end....

  11. Access to finance from different finance provider types: Farmer knowledge of the requirements

    OpenAIRE

    Wulandari, Eliana; Meuwissen, Miranda P. M.; Karmana, Maman H.; Oude Lansink, Alfons G. J. M.

    2017-01-01

    Analysing farmer knowledge of the requirements of finance providers can provide valuable insights to policy makers about ways to improve farmers' access to finance. This study compares farmer knowledge of the requirements to obtain finance with the actual requirements set by different finance provider types, and investigates the relation between demographic and socioeconomic factors and farmer knowledge of finance requirements. We use a structured questionnaire to collect data from a sample o...

  12. Motivating and Facilitating Advancements in Space Weather Real-Time Data Availability: Factors, Data, and Access Methods

    Science.gov (United States)

    Pankratz, C. K.; Baker, D. N.; Jaynes, A. N.; Elkington, S. R.; Baltzer, T.; Sanchez, F.

    2017-12-01

    Society's growing reliance on complex and highly interconnected technological systems makes us increasingly vulnerable to the effects of space weather events - maybe more than for any other natural hazard. An extreme solar storm today could conceivably impact hundreds of the more than 1400 operating Earth satellites. Such an extreme storm could cause collapse of the electrical grid on continental scales. The effects on navigation, communication, and remote sensing of our home planet could be devastating to our social functioning. Thus, it is imperative that the scientific community address the question of just how severe events might become. At least as importantly, it is crucial that policy makers and public safety officials be informed by the facts on what might happen during extreme conditions. This requires essentially real-time alerts, warnings, and also forecasts of severe space weather events, which in turn demands measurements, models, and associated data products to be available via the most effective data discovery and access methods possible. Similarly, advancement in the fundamental scientific understanding of space weather processes is also vital, requiring that researchers have convenient and effective access to a wide variety of data sets and models from multiple sources. The space weather research community, as with many scientific communities, must access data from dispersed and often uncoordinated data repositories to acquire the data necessary for the analysis and modeling efforts that advance our understanding of solar influences and space physics on the Earth's environment. The Laboratory for Atmospheric and Space Physics (LASP), as a leading institution in both producing data products and advancing the state of scientific understanding of space weather processes, is well positioned to address many of these issues. In this presentation, we will outline the motivating factors for effective space weather data access, summarize the various data

  13. GIS-based accessibility analysis- a mixed method approach to determine public primary health care demand in South Africa

    CSIR Research Space (South Africa)

    Mokgalaka, H

    2013-11-01

    Full Text Available The spatial realities and dynamics of a changing population with changing health care needs require regular and logical methods to evaluate and assist in primary health care (PHC) planning. Geographical access is an important aspect in the planning...

  14. Beyond ADA Accessibility Requirements: Meeting Seniors' Needs for Toilet Transfers.

    Science.gov (United States)

    Lee, Su Jin; Sanford, Jon; Calkins, Margaret; Melgen, Sarah; Endicott, Sarah; Phillips, Anjanette

    2018-04-01

    To identify the optimal spatial and dimensional requirements of grab bars that support independent and assisted transfers by older adults and their care providers. Although research has demonstrated that toilet grab bars based on the Americans with Disabilities Act (ADA) Accessibility Standards do not meet the needs of older adults, the specific dimensional requirements for alternative configurations are unknown. A two-phased study with older adults and care providers in residential facilities was conducted to determine the optimal requirements for grab bars. Seniors and caregivers in skilled nursing facilities performed transfers using a mock-up toilet. In Phase 1, participants evaluated three grab bar configurations to identify optimal characteristics for safety, ease of use, comfort, and helpfulness. These characteristics were then validated for using ability-matched samples in Phase 2. The optimal configuration derived in Phase 1 included fold-down grab bars on both sides of the toilet (14" from centerline [CL] of toilet, 32" above the floor, and extended a minimum of 6" in front of the toilet) with one side open and a sidewall 24" from CL of toilet on the other. Phase 2 feedback was significantly positive for independent and one-person transfers and somewhat lower, albeit still positive, for two-person transfers. The study provides substantial evidence that bilateral grab bars are significantly more effective than those that comply with current ADA Accessibility Standards. Findings provide specific spatial and dimensional attributes for grab bar configurations that would be most effective in senior facilities.

  15. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks

    Science.gov (United States)

    Zrelli, Saber; Okabe, Nobuo; Shinoda, Yoichi

    The wireless medium is a key technology for enabling ubiquitous and continuous network connectivity. It is becoming more and more important in our daily life especially with the increasing adoption of networking technologies in many fields such as medical care and transportation systems. Although most wireless technologies nowadays provide satisfying bandwidth and higher speeds, several of these technologies still lack improvements with regard to handoff performance. In this paper, we focus on wireless network technologies that rely on the Extensible Authentication Protocol for mutual authentication between the station and the access network. Such technologies include local area wireless networks (IEEE 802.11) as well as broadband wireless networks (IEEE 802.16). We present a new EAP authentication method based on a three party authentication scheme, namely Kerberos, that considerably shortens handoff delays. Compared to other methods, the proposed method has the advantage of not requiring any changes on the access points, making it readily deployable at reasonable costs.

  16. Kinds of access: different methods for report reveal different kinds of metacognitive access

    Science.gov (United States)

    Overgaard, Morten; Sandberg, Kristian

    2012-01-01

    In experimental investigations of consciousness, participants are asked to reflect upon their own experiences by issuing reports about them in different ways. For this reason, a participant needs some access to the content of her own conscious experience in order to report. In such experiments, the reports typically consist of some variety of ratings of confidence or direct descriptions of one's own experiences. Whereas different methods of reporting are typically used interchangeably, recent experiments indicate that different results are obtained with different kinds of reporting. We argue that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesize that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about the classification process. PMID:22492747

  17. The universal access handbook

    CERN Document Server

    Stephanidis, Constantine

    2009-01-01

    In recent years, the field of Universal Access has made significant progress in consolidating theoretical approaches, scientific methods and technologies, as well as in exploring new application domains. Increasingly, professionals in this rapidly maturing area require a comprehensive and multidisciplinary resource that addresses current principles, methods, and tools. Written by leading international authorities from academic, research, and industrial organizations and nonmarket institutions, The Universal Access Handbook covers the unfolding scientific, methodological, technological, and pol

  18. A method to evaluate equitable accessibility : Combining ethical theories and accessibility-based approaches

    NARCIS (Netherlands)

    Lucas, K.; Van Wee, G.P.; Maat, C.

    2015-01-01

    In this paper, we present the case that traditional transport appraisal methods do not sufficiently capture the social dimensions of mobility and accessibility. However, understanding this is highly relevant for policymakers to understand the impacts of their transport decisions. These dimensions

  19. Nanotube structures, methods of making nanotube structures, and methods of accessing intracellular space

    Science.gov (United States)

    VanDersarl, Jules J.; Xu, Alexander M.; Melosh, Nicholas A.; Tayebi, Noureddine

    2016-02-23

    In accordance with the purpose(s) of the present disclosure, as embodied and broadly described herein, embodiments of the present disclosure, in one aspect, relate to methods of making a structure including nanotubes, a structure including nanotubes, methods of delivering a fluid to a cell, methods of removing a fluid to a cell, methods of accessing intracellular space, and the like.

  20. Kinds of access: Different methods for report reveal different kinds of metacognitive access

    DEFF Research Database (Denmark)

    Overgaard, Morten; Sandberg, Kristian

    2012-01-01

    that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesize that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about...

  1. Access to finance from different finance provider types: Farmer knowledge of the requirements.

    Science.gov (United States)

    Wulandari, Eliana; Meuwissen, Miranda P M; Karmana, Maman H; Oude Lansink, Alfons G J M

    2017-01-01

    Analysing farmer knowledge of the requirements of finance providers can provide valuable insights to policy makers about ways to improve farmers' access to finance. This study compares farmer knowledge of the requirements to obtain finance with the actual requirements set by different finance provider types, and investigates the relation between demographic and socioeconomic factors and farmer knowledge of finance requirements. We use a structured questionnaire to collect data from a sample of finance providers and farmers in Java Island, Indonesia. We find that the most important requirements to acquire finance vary among different finance provider types. We also find that farmers generally have little knowledge of the requirements, which are important to each type of finance provider. Awareness campaigns are needed to increase farmer knowledge of the diversity of requirements among the finance provider types.

  2. Method and apparatus for managing access to a memory

    Science.gov (United States)

    DeBenedictis, Erik

    2017-08-01

    A method and apparatus for managing access to a memory of a computing system. A controller transforms a plurality of operations that represent a computing job into an operational memory layout that reduces a size of a selected portion of the memory that needs to be accessed to perform the computing job. The controller stores the operational memory layout in a plurality of memory cells within the selected portion of the memory. The controller controls a sequence by which a processor in the computing system accesses the memory to perform the computing job using the operational memory layout. The operational memory layout reduces an amount of energy consumed by the processor to perform the computing job.

  3. An Extended Role Based Access Control Method for XML Documents

    Institute of Scientific and Technical Information of China (English)

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  4. Reported Design Processes for Accessibility in Rail Transport

    DEFF Research Database (Denmark)

    Herriott, Richard; Cook, Sharon

    2014-01-01

    requirements with the aim of maximising accessibility in products and services. A review of ID literature has mainly developed in the arena of product design and design for assistive technology. Accessibility is a fundamental requirement in public transport (PT) yet there exists little research on design...... for accessibility or ID in this area. How is accessibility and the needs of users accounted for in rail transport design? This paper analyses interviews with rolling stock producers, operators and design consultancies. These conducted to determine if ID design methods are used explicitly and the extent to which...

  5. IMPROVING NEAREST NEIGHBOUR SEARCH IN 3D SPATIAL ACCESS METHOD

    Directory of Open Access Journals (Sweden)

    A. Suhaibaha

    2016-10-01

    Full Text Available Nearest Neighbour (NN is one of the important queries and analyses for spatial application. In normal practice, spatial access method structure is used during the Nearest Neighbour query execution to retrieve information from the database. However, most of the spatial access method structures are still facing with unresolved issues such as overlapping among nodes and repetitive data entry. This situation will perform an excessive Input/Output (IO operation which is inefficient for data retrieval. The situation will become more crucial while dealing with 3D data. The size of 3D data is usually large due to its detail geometry and other attached information. In this research, a clustered 3D hierarchical structure is introduced as a 3D spatial access method structure. The structure is expected to improve the retrieval of Nearest Neighbour information for 3D objects. Several tests are performed in answering Single Nearest Neighbour search and k Nearest Neighbour (kNN search. The tests indicate that clustered hierarchical structure is efficient in handling Nearest Neighbour query compared to its competitor. From the results, clustered hierarchical structure reduced the repetitive data entry and the accessed page. The proposed structure also produced minimal Input/Output operation. The query response time is also outperformed compared to the other competitor. For future outlook of this research several possible applications are discussed and summarized.

  6. An Extended Two-Phase Method for Accessing Sections of Out-of-Core Arrays

    Directory of Open Access Journals (Sweden)

    Rajeev Thakur

    1996-01-01

    Full Text Available A number of applications on parallel computers deal with very large data sets that cannot fit in main memory. In such applications, data must be stored in files on disks and fetched into memory during program execution. Parallel programs with large out-of-core arrays stored in files must read/write smaller sections of the arrays from/to files. In this article, we describe a method for accessing sections of out-of-core arrays efficiently. Our method, the extended two-phase method, uses collective l/O: Processors cooperate to combine several l/O requests into fewer larger granularity requests, to reorder requests so that the file is accessed in proper sequence, and to eliminate simultaneous l/O requests for the same data. In addition, the l/O workload is divided among processors dynamically, depending on the access requests. We present performance results obtained from two real out-of-core parallel applications – matrix multiplication and a Laplace's equation solver – and several synthetic access patterns, all on the Intel Touchstone Delta. These results indicate that the extended two-phase method significantly outperformed a direct (noncollective method for accessing out-of-core array sections.

  7. The Methods and Mechanisms for Access Control of Encrypted Data in Clouds

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2013-09-01

    Full Text Available The paper is about the problem of data access control in clouds. The main mechanisms for access control of encrypted data in untrusted cloud environments are analyzed and described. The comparative analysis of access control algorithms and implementation issues are offered. The main practical result of research is a web-based (Wikipedia-like reference and information system devoted to the access control methods and mechanisms.

  8. Model Based User's Access Requirement Analysis of E-Governance Systems

    Science.gov (United States)

    Saha, Shilpi; Jeon, Seung-Hwan; Robles, Rosslin John; Kim, Tai-Hoon; Bandyopadhyay, Samir Kumar

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  9. 32 CFR 37.920 - What requirement for access to a nonprofit participant's records do I include in a TIA?

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What requirement for access to a nonprofit participant's records do I include in a TIA? 37.920 Section 37.920 National Defense Department of Defense... What requirement for access to a nonprofit participant's records do I include in a TIA? Your TIA must...

  10. 14 CFR 382.69 - What requirements must carriers meet concerning the accessibility of videos, DVDs, and other...

    Science.gov (United States)

    2010-01-01

    ... concerning the accessibility of videos, DVDs, and other audio-visual presentations shown on-aircraft to individuals who are deaf or hard of hearing? 382.69 Section 382.69 Aeronautics and Space OFFICE OF THE... BASIS OF DISABILITY IN AIR TRAVEL Accessibility of Aircraft § 382.69 What requirements must carriers...

  11. GROUPING WEB ACCESS SEQUENCES uSING SEQUENCE ALIGNMENT METHOD

    OpenAIRE

    BHUPENDRA S CHORDIA; KRISHNAKANT P ADHIYA

    2011-01-01

    In web usage mining grouping of web access sequences can be used to determine the behavior or intent of a set of users. Grouping websessions is how to measure the similarity between web sessions. There are many shortcomings in traditional measurement methods. The taskof grouping web sessions based on similarity and consists of maximizing the intra-group similarity while minimizing the inter-groupsimilarity is done using sequence alignment method. This paper introduces a new method to group we...

  12. 32 CFR 37.915 - What requirement for access to a for-profit participant's records do I include in a TIA?

    Science.gov (United States)

    2010-07-01

    ... participant's records do I include in a TIA? 37.915 Section 37.915 National Defense Department of Defense... What requirement for access to a for-profit participant's records do I include in a TIA? (a) If a for... auditors, your TIA must include for that participant the standard access-to-records requirements at 32 CFR...

  13. Guidelines on the facilities required for minor surgical procedures and minimal access interventions.

    LENUS (Irish Health Repository)

    Humphreys, H

    2012-02-01

    There have been many changes in healthcare provision in recent years, including the delivery of some surgical services in primary care or in day surgery centres, which were previously provided by acute hospitals. Developments in the fields of interventional radiology and cardiology have further expanded the range and complexity of procedures undertaken in these settings. In the face of these changes there is a need to define from an infection prevention and control perspective the basic physical requirements for facilities in which such surgical procedures may be carried out. Under the auspices of the Healthcare Infection Society, we have developed the following recommendations for those designing new facilities or upgrading existing facilities. These draw upon best practice, available evidence, other guidelines where appropriate, and expert consensus to provide sensible and feasible advice. An attempt is also made to define minimal access interventions and minor surgical procedures. For minimal access interventions, including interventional radiology, new facilities should be mechanically ventilated to achieve 15 air changes per hour but natural ventilation is satisfactory for minor procedures. All procedures should involve a checklist and operators should be appropriately trained. There is also a need for prospective surveillance to accurately determine the post-procedure infection rate. Finally, there is a requirement for appropriate applied research to develop the evidence base required to support subsequent iterations of this guidance.

  14. An Engineering Method of Civil Jet Requirements Validation Based on Requirements Project Principle

    Science.gov (United States)

    Wang, Yue; Gao, Dan; Mao, Xuming

    2018-03-01

    A method of requirements validation is developed and defined to meet the needs of civil jet requirements validation in product development. Based on requirements project principle, this method will not affect the conventional design elements, and can effectively connect the requirements with design. It realizes the modern civil jet development concept, which is “requirement is the origin, design is the basis”. So far, the method has been successfully applied in civil jet aircraft development in China. Taking takeoff field length as an example, the validation process and the validation method of the requirements are detailed introduced in the study, with the hope of providing the experiences to other civil jet product design.

  15. Method of constructing lower dry well access tunnel for nuclear reactor container

    International Nuclear Information System (INIS)

    Kume, Tadashi; Furukawa, Hedeyasu.

    1993-01-01

    The method of the present invention facilitates construction of a lower dry well access tunnel for a nuclear reactor container. The lower dry well access tunnel is constructed across the reactor container and the reactor main body foundation. In this case, the lower dry well access tunnel is divided into three sections, i.e., axial end portions and a central portion. At first, each of the end portions is attached to the walls of the reactor container and the reactor main body foundation respectively. Subsequently, the central portion is attached to each of the end portions. An adjusting margin is previously provided to the central portion upon manufacturing each of the sections for adjusting deviation from a nominal size upon construction. In such a construction method, it is possible to eliminate interference accident during construction between the end portions of the lower dry well access tunnel and the reactor container and the reactor main body foundation, to facilitate the construction. Further, this facilitates the fabricating operation for dimensional alignment between the lower dry well access tunnel, and the reactor container and the reactor main body foundation. (I.S.)

  16. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  17. Tri-party agreement databases, access mechanism and procedures. Revision 2

    International Nuclear Information System (INIS)

    Brulotte, P.J.

    1996-01-01

    This document contains the information required for the Washington State Department of Ecology (Ecology) and the U.S. Environmental Protection Agency (EPA) to access databases related to the Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement). It identifies the procedure required to obtain access to the Hanford Site computer networks and the Tri-Party Agreement related databases. It addresses security requirements, access methods, database availability dates, database access procedures, and the minimum computer hardware and software configurations required to operate within the Hanford Site networks. This document supersedes any previous agreements including the Administrative Agreement to Provide Computer Access to U.S. Environmental Protection Agency (EPA) and the Administrative Agreement to Provide Computer Access to Washington State Department of Ecology (Ecology), agreements that were signed by the U.S. Department of Energy (DOE), Richland Operations Office (RL) in June 1990, Access approval to EPA and Ecology is extended by RL to include all Tri-Party Agreement relevant databases named in this document via the documented access method and date. Access to databases and systems not listed in this document will be granted as determined necessary and negotiated among Ecology, EPA, and RL through the Tri-Party Agreement Project Managers. The Tri-Party Agreement Project Managers are the primary points of contact for all activities to be carried out under the Tri-Party Agreement. Action Plan. Access to the Tri-Party Agreement related databases and systems does not provide or imply any ownership on behalf of Ecology or EPA whether public or private of either the database or the system. Access to identified systems and databases does not include access to network/system administrative control information, network maps, etc

  18. Spanish-Language Community-Based Mental Health Treatment Programs, Policy-Required Language-Assistance Programming, and Mental Health Treatment Access Among Spanish-Speaking Clients

    Science.gov (United States)

    McClellan, Sean R.

    2013-01-01

    Objectives. We investigated the extent to which implementing language assistance programming through contracting with community-based organizations improved the accessibility of mental health care under Medi-Cal (California’s Medicaid program) for Spanish-speaking persons with limited English proficiency, and whether it reduced language-based treatment access disparities. Methods. Using a time series nonequivalent control group design, we studied county-level penetration of language assistance programming over 10 years (1997–2006) for Spanish-speaking persons with limited English proficiency covered under Medi-Cal. We used linear regression with county fixed effects to control for ongoing trends and other influences. Results. When county mental health plans contracted with community-based organizations, those implementing language assistance programming increased penetration rates of Spanish-language mental health services under Medi-Cal more than other plans (0.28 percentage points, a 25% increase on average; P language-related disparities. Conclusions. Mental health treatment programs operated by community-based organizations may have moderately improved access after implementing required language assistance programming, but the programming did not reduce entrenched disparities in the accessibility of mental health services. PMID:23865663

  19. Beyond Section 508: The Spectrum of Legal Requirements for Accessible e-Government Web Sites in the United States

    Science.gov (United States)

    Jaeger, Paul T.

    2004-01-01

    In the United States, a number of federal laws establish requirements that electronic government (e-government) information and services be accessible to individuals with disabilities. These laws affect e-government Web sites at the federal, state, and local levels. To this point, research about the accessibility of e-government Web sites has…

  20. Diffusion accessibility as a method for visualizing macromolecular surface geometry.

    Science.gov (United States)

    Tsai, Yingssu; Holton, Thomas; Yeates, Todd O

    2015-10-01

    Important three-dimensional spatial features such as depth and surface concavity can be difficult to convey clearly in the context of two-dimensional images. In the area of macromolecular visualization, the computer graphics technique of ray-tracing can be helpful, but further techniques for emphasizing surface concavity can give clearer perceptions of depth. The notion of diffusion accessibility is well-suited for emphasizing such features of macromolecular surfaces, but a method for calculating diffusion accessibility has not been made widely available. Here we make available a web-based platform that performs the necessary calculation by solving the Laplace equation for steady state diffusion, and produces scripts for visualization that emphasize surface depth by coloring according to diffusion accessibility. The URL is http://services.mbi.ucla.edu/DiffAcc/. © 2015 The Protein Society.

  1. Metric-based method of software requirements correctness improvement

    Directory of Open Access Journals (Sweden)

    Yaremchuk Svitlana

    2017-01-01

    Full Text Available The work highlights the most important principles of software reliability management (SRM. The SRM concept construes a basis for developing a method of requirements correctness improvement. The method assumes that complicated requirements contain more actual and potential design faults/defects. The method applies a newer metric to evaluate the requirements complexity and double sorting technique evaluating the priority and complexity of a particular requirement. The method enables to improve requirements correctness due to identification of a higher number of defects with restricted resources. Practical application of the proposed method in the course of demands review assured a sensible technical and economic effect.

  2. Accessible engineering drawings for visually impaired machine operators.

    Science.gov (United States)

    Ramteke, Deepak; Kansal, Gayatri; Madhab, Benu

    2014-01-01

    An engineering drawing provides manufacturing information to a machine operator. An operator plans and executes machining operations based on this information. A visually impaired (VI) operator does not have direct access to the drawings. Drawing information is provided to them verbally or by using sample parts. Both methods have limitations that affect the quality of output. Use of engineering drawings is a standard practice for every industry; this hampers employment of a VI operator. Accessible engineering drawings are required to increase both independence, as well as, employability of VI operators. Today, Computer Aided Design (CAD) software is used for making engineering drawings, which are saved in CAD files. Required information is extracted from the CAD files and converted into Braille or voice. The authors of this article propose a method to make engineering drawings information directly accessible to a VI operator.

  3. 50 CFR 648.60 - Sea scallop area access program requirements.

    Science.gov (United States)

    2010-10-01

    ... subsequent fishing year. For example, a vessel that terminates an Elephant Trunk Access Area trip on December...) Elephant Trunk Access Area. For the 2010 fishing year, the observer set-aside for the Elephant Trunk Access... Area. For the 2010 fishing year, the research set-aside for the Elephant Trunk Access Area is 277,060...

  4. Mapping Norway - a Method to Register and Survey the Status of Accessibility

    Science.gov (United States)

    Michaelis, Sven; Bögelsack, Kathrin

    2018-05-01

    The Norwegian mapping authority has developed a standard method for mapping accessibility mostly for people with limited or no walking abilities in urban and recreational areas. We choose an object-orientated approach where points, lines and polygons represents objects in the environment. All data are stored in a geospatial database, so they can be presented as web map and analyzed using GIS software. By the end of 2016 more than 160 municipalities are mapped using that method. The aim of this project is to establish a national standard for mapping and to provide a geodatabase that shows the status of accessibility throughout Norway. The data provide a useful tool for national statistics, local planning authorities and private users. First results show that accessibility is low and Norway still faces many challenges to meet the government's goals for Universal Design.

  5. Searching for Suicide Methods: Accessibility of Information About Helium as a Method of Suicide on the Internet.

    Science.gov (United States)

    Gunnell, David; Derges, Jane; Chang, Shu-Sen; Biddle, Lucy

    2015-01-01

    Helium gas suicides have increased in England and Wales; easy-to-access descriptions of this method on the Internet may have contributed to this rise. To investigate the availability of information on using helium as a method of suicide and trends in searching about this method on the Internet. We analyzed trends in (a) Google searching (2004-2014) and (b) hits on a Wikipedia article describing helium as a method of suicide (2013-2014). We also investigated the extent to which helium was described as a method of suicide on web pages and discussion forums identified via Google. We found no evidence of rises in Internet searching about suicide using helium. News stories about helium suicides were associated with increased search activity. The Wikipedia article may have been temporarily altered to increase awareness of suicide using helium around the time of a celebrity suicide. Approximately one third of the links retrieved using Google searches for suicide methods mentioned helium. Information about helium as a suicide method is readily available on the Internet; the Wikipedia article describing its use was highly accessed following celebrity suicides. Availability of online information about this method may contribute to rises in helium suicides.

  6. "Open Access" Requires Clarification: Medical Journal Publication Models Evolve.

    Science.gov (United States)

    Lubowitz, James H; Brand, Jefferson C; Rossi, Michael J; Provencher, Matthew T

    2017-03-01

    While Arthroscopy journal is a traditional subscription model journal, our companion journal Arthroscopy Techniques is "open access." We used to believe open access simply meant online and free of charge. However, while open-access journals are free to readers, in 2017 authors must make a greater sacrifice in the form of an article-processing charge (APC). Again, while this does not apply to Arthroscopy, the APC will apply to Arthroscopy Techniques. Copyright © 2016 Arthroscopy Association of North America. Published by Elsevier Inc. All rights reserved.

  7. Characterization of coded random access with compressive sensing based multi user detection

    DEFF Research Database (Denmark)

    Ji, Yalei; Stefanovic, Cedomir; Bockelmann, Carsten

    2014-01-01

    The emergence of Machine-to-Machine (M2M) communication requires new Medium Access Control (MAC) schemes and physical (PHY) layer concepts to support a massive number of access requests. The concept of coded random access, introduced recently, greatly outperforms other random access methods...... coded random access with CS-MUD on the PHY layer and show very promising results for the resulting protocol....

  8. Use of the Paid Open Access Option in Hybrid Open Access Journals in Agriculture: A Mixed-Methods Study

    Directory of Open Access Journals (Sweden)

    Megan Kocher

    2016-12-01

    Full Text Available We explore the use and usefulness of the hybrid open access publishing model in agricultural sciences using a combination of quantitative and qualitative methods. To ascertain the level of usage of the paid open access option in hybrid open access journals in agriculture, we studied the agriculture-related journals published by six commercial publishers. These publishers offer authors the option of paying a fee, often close to $3,000 per article, to make their article immediately freely available, usually with a Creative Commons license. We defined agriculture broadly but also assigned each journal to a subspecialty (e.g., animal science in order to see if there were differences based on these subdivisions. For each journal we gathered data for 2014-2015 and noted the total number of research articles and the number of those that were made freely available by authors paying the open access fee. To give context to our results we also surveyed local faculty in agricultural sciences, asking their reasons for considering the paid open access options and the sources of the funds to pay for it. Survey respondents were asked about their academic position and rank to see if there were differences to be noted. We also investigated the findability of the open access articles, noting if each individual publisher offered a way to easily locate all the freely available articles in a particular journal and if there are other avenues to easily locate these articles.

  9. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    Directory of Open Access Journals (Sweden)

    Kevin McCluskey

    2017-08-01

    Full Text Available The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD. The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.

  10. Should gratitude be a requirement for access to live organ donation?

    Science.gov (United States)

    Escher, Monica; Lamuela-Naulin, Monique; Bollondi, Catherine; Flores Menendez, Paola; Hurst, Samia A

    2017-11-01

    Gratitude is both expected and problematic in live organ donation. Are there grounds to require it, and to forbid access to live donor transplantation to a recipient who fails to signal that he feels any form of gratitude? Recipient gratitude is not currently required for organ donation, but it is expected and may be a moral requirement. Despite this, we argue that making it a condition for live organ transplantation would be unjustified. It would constitute a problematic and disproportionate punishment for perceived immoral behaviour on the part of the recipient. It would also bar the donor from positive aspects of organ donation that remain even in the absence of recipient gratitude. A potential recipient's lack of gratitude should be explored as a possible symptom of other morally problematic issues and integrated into the information provided to the potential donor. Recognition of the donor's gift and gratitude for it may also need to be expressed in part by others. This last aspect is relevant even in cases where the recipient feels and expresses gratitude. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  11. Reported Design Processes for Accessibility in Rail Transport

    DEFF Research Database (Denmark)

    Herriott, Richard; Cook, Sharon

    2014-01-01

    Accessibility is a fundamental requirement in public transport (PT) yet there exists little research on design for accessibility or inclusive design (ID) in this area. This paper sets out to discover what methods are used in the rail sector to achieve accessibility goals and to examine how far...... these methods deviate from user-centred and ID norms. Semi-structured interviews were conducted with nine rolling stock producers, operators and design consultancies. The purpose was to determine if ID design methods are used explicitly and the extent to which the processes used conformed to ID (if at all......). The research found that the role of users in the design process of manufacturers was limited and that compliance with industry standards was the dominant means to achieving accessibility goals. Design consultancies were willing to apply more user-centred design if the client requested it. Where operators were...

  12. Deaf mobile application accessibility requirements

    Science.gov (United States)

    Nathan, Shelena Soosay; Hussain, Azham; Hashim, Nor Laily

    2016-08-01

    Requirement for deaf mobile applications need to be analysed to ensure the disabilities need are instilled into the mobile applications developed for them. Universal design is understandable to comply every user needs, however specific disability is argued by the authors to have different need and requirements. These differences are among the reasons for these applications being developed to target for a specific group of people, however they are less usable and later abandoned. This study focuses on deriving requirements that are needed by the deaf in their mobile applications that are meant specifically for them. Studies on previous literature was conducted it can be concluded that graphic, text, multimedia and sign language interpreter are among mostly required features to be included in their mobile application to ensure the applications are usable for this community.

  13. Comparison of RF spectrum prediction methods for dynamic spectrum access

    Science.gov (United States)

    Kovarskiy, Jacob A.; Martone, Anthony F.; Gallagher, Kyle A.; Sherbondy, Kelly D.; Narayanan, Ram M.

    2017-05-01

    Dynamic spectrum access (DSA) refers to the adaptive utilization of today's busy electromagnetic spectrum. Cognitive radio/radar technologies require DSA to intelligently transmit and receive information in changing environments. Predicting radio frequency (RF) activity reduces sensing time and energy consumption for identifying usable spectrum. Typical spectrum prediction methods involve modeling spectral statistics with Hidden Markov Models (HMM) or various neural network structures. HMMs describe the time-varying state probabilities of Markov processes as a dynamic Bayesian network. Neural Networks model biological brain neuron connections to perform a wide range of complex and often non-linear computations. This work compares HMM, Multilayer Perceptron (MLP), and Recurrent Neural Network (RNN) algorithms and their ability to perform RF channel state prediction. Monte Carlo simulations on both measured and simulated spectrum data evaluate the performance of these algorithms. Generalizing spectrum occupancy as an alternating renewal process allows Poisson random variables to generate simulated data while energy detection determines the occupancy state of measured RF spectrum data for testing. The results suggest that neural networks achieve better prediction accuracy and prove more adaptable to changing spectral statistics than HMMs given sufficient training data.

  14. A Fluorine-18 Radiolabeling Method Enabled by Rhenium(I) Complexation Circumvents the Requirement of Anhydrous Conditions.

    Science.gov (United States)

    Klenner, Mitchell A; Pascali, Giancarlo; Zhang, Bo; Sia, Tiffany R; Spare, Lawson K; Krause-Heuer, Anwen M; Aldrich-Wright, Janice R; Greguric, Ivan; Guastella, Adam J; Massi, Massimiliano; Fraser, Benjamin H

    2017-05-11

    Azeotropic distillation is typically required to achieve fluorine-18 radiolabeling during the production of positron emission tomography (PET) imaging agents. However, this time-consuming process also limits fluorine-18 incorporation, due to radioactive decay of the isotope and its adsorption to the drying vessel. In addressing these limitations, the fluorine-18 radiolabeling of one model rhenium(I) complex is reported here, which is significantly improved under conditions that do not require azeotropic drying. This work could open a route towards the investigation of a simplified metal-mediated late-stage radiofluorination method, which would expand upon the accessibility of new PET and PET-optical probes. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  15. EPICS: Channel Access security design

    International Nuclear Information System (INIS)

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer's interface is given. Security protocol is described and finally aids for reading the access security code are provided

  16. Access to Investigational Drugs: FDA Expanded Access Programs or “Right‐to‐Try” Legislation?

    Science.gov (United States)

    Berglund, Jelena P.; Weatherwax, Kevin; Gerber, David E.; Adamo, Joan E.

    2015-01-01

    Abstract Purpose The Food and Drug Administration Expanded Access (EA) program and “Right‐to‐Try” legislation aim to provide seriously ill patients who have no other comparable treatment options to gain access to investigational drugs and biological agents. Physicians and institutions need to understand these programs to respond to questions and requests for access. Methods FDA EA programs and state and federal legislative efforts to provide investigational products to patients by circumventing FDA regulations were summarized and compared. Results The FDA EA program includes Single Patient‐Investigational New Drug (SP‐IND), Emergency SP‐IND, Intermediate Sized Population IND, and Treatment IND. Approval rates for all categories exceed 99%. Approval requires FDA and Institutional Review Board (IRB) approval, and cooperation of the pharmaceutical partner is essential. “Right‐to‐Try” legislation bypasses some of these steps, but provides no regulatory or safety oversight. Conclusion The FDA EA program is a reasonable option for patients for whom all other therapeutic interventions have failed. The SP‐IND not only provides patient access to new drugs, but also maintains a balance between immediacy and necessary patient protection. Rather than circumventing existing FDA regulations through proposed legislation, it seems more judicious to provide the knowledge and means to meet the EA requirements. PMID:25588691

  17. 20 CFR 652.207 - How does a State meet the requirement for universal access to services provided under the Act?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false How does a State meet the requirement for universal access to services provided under the Act? 652.207 Section 652.207 Employees' Benefits EMPLOYMENT... exercising this discretion, a State must meet the Act's requirements. (b) These requirements are: (1) Labor...

  18. Perceived barriers in accessing dental care among patients attending dental institute using decision-making trial and evaluation laboratory method

    Directory of Open Access Journals (Sweden)

    Ravneet Malhi

    2015-01-01

    Full Text Available Introduction: Utilization of dental service is a concept of expressing the extent of interaction between the service provider and the people for whom it is indented. However, one of the major issues in social welfare is the equitable provision of these services to the population. Aim: To determine the perceived barriers affecting access to the dental services in the dental institute. Materials and Methods: A cross-sectional survey was conducted in the dental institute during the month of February in the year 2014 using decision-making trial and evaluation laboratory (DEMATEL method. The study sample included the 364 subjects. The required data were collected using a specially designed and pretested questionnaire. The data were analyzed using SPSS 18.0 (SPSS Inc., Chicago, IL, USA and MATLAB 7.6.0. The mean, standard deviations were used to describe the data, and inferential statistics included one-way ANOVA and DEMATEL. Results: The five determinants of cost, inconvenience, fear, organization, and patient-dentist relationship were determined as barriers to access dental services. Based on subjects′ responses to the questions, the cost (54.75% agreed or strongly agreed was identified as the most important factor affecting the access to dental health care followed by dentist-patient relationship (48.57%, inconvenience (36.55%, fear (23.70%, and organization (14.02%. The difference was found to be statistically significant (P = 0.0001. When the hierarchy of the affecting and affected factors was calculated, based on the factor analysis by using DEMATEL method, the cost (R−J = 0.16 and organization (R−J = 1.15, were certain affecting determinant which influenced the access to dental services and inconvenience. Conclusion: The major barriers to oral health care utilization among our patients were cost, fear, and organization. Policymakers, administrators, and insurance organizations have a major role. Hence, the policies should be fair and

  19. Potential of OFDM for next generation optical access

    Science.gov (United States)

    Fritzsche, Daniel; Weis, Erik; Breuer, Dirk

    2011-01-01

    This paper shows the requirements for next generation optical access (NGOA) networks and analyzes the potential of OFDM (orthogonal frequency division multiplexing) for the use in such network scenarios. First, we show the motivation for NGOA systems based on the future requirements on FTTH access systems and list the advantages of OFDM in such scenarios. In the next part, the basics of OFDM and different methods to generate and detect optical OFDM signals are explained and analyzed. At the transmitter side the options include intensity modulation and the more advanced field modulation of the optical OFDM signal. At the receiver there is the choice between direct detection and coherent detection. As the result of this discussion we show our vision of the future use of OFDM in optical access networks.

  20. Formalization of the Access Control on ARM-Android Platform with the B Method

    Science.gov (United States)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  1. Access to scientific publications: the scientist's perspective.

    Directory of Open Access Journals (Sweden)

    Yegor Voronin

    Full Text Available BACKGROUND: Scientific publishing is undergoing significant changes due to the growth of online publications, increases in the number of open access journals, and policies of funders and universities requiring authors to ensure that their publications become publicly accessible. Most studies of the impact of these changes have focused on the growth of articles available through open access or the number of open-access journals. Here, we investigated access to publications at a number of institutes and universities around the world, focusing on publications in HIV vaccine research--an area of biomedical research with special importance to the developing world. METHODS AND FINDINGS: We selected research papers in HIV vaccine research field, creating: 1 a first set of 50 most recently published papers with keywords "HIV vaccine" and 2 a second set of 200 articles randomly selected from those cited in the first set. Access to the majority (80% of the recently published articles required subscription, while cited literature was much more accessible (67% freely available online. Subscriptions at a number of institutions around the world were assessed for providing access to subscription-only articles from the two sets. The access levels varied widely, ranging among institutions from 20% to 90%. Through the WHO-supported HINARI program, institutes in low-income countries had access comparable to that of institutes in the North. Finally, we examined the response rates for reprint requests sent to corresponding authors, a method commonly used before internet access became widespread. Contacting corresponding authors with requests for electronic copies of articles by email resulted in a 55-60% success rate, although in some cases it took up to 1.5 months to get a response. CONCLUSIONS: While research articles are increasingly available on the internet in open access format, institutional subscriptions continue to play an important role. However

  2. ITS Multi-path Communications Access Decision Scheme

    Directory of Open Access Journals (Sweden)

    Miroslav Svitek

    2008-02-01

    Full Text Available Intelligent Transport Systems (ITS require widely spread and guarantied quality communications services. Method of ITS decomposition to set of subsystems and quantification of communications subsystems parameters is introduced. Due to typical complexity of the IST solution and mobility as the typical system elements property idea of communications systems with multipath multivendor structures is adopted. Resolution of seamless switching within a set of available wireless access solutions is presented. CALM based system or specifically designed and configured L3/L2 switching can be relevant solution for multi-path access communication system. These systems meet requirements of the seamless secure communications functionality within even extensive cluster of moving objects. Competent decision processes based on precisely quantified system requirements and each performance indicator tolerance range must be implemented to keep service up and running with no influence of continuously changing conditions in time and served space. Method of different paths service quality evaluation and selection of the best possible active communications access path is introduced. Proposed approach is based on Kalman filtering, which separates reasonable part of noise and also allows prediction of the individual parameters near future behavior. Presented classification algorithm applied on filtered measured data combined with deterministic parameters is trained using training data, i.e. combination of parameters vectors line and relevant decisions. Quality of classification is dependent on the size and quality of the training sets. This method is studied within projects e-Ident, DOTEK and SRATVU which are elaborating results of project CAMNA.

  3. Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems

    Science.gov (United States)

    Kollár, Martin

    2012-05-01

    In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (ie WCDMA and LTE).

  4. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  5. The Sources and Methods of Engineering Design Requirement

    DEFF Research Database (Denmark)

    Li, Xuemeng; Zhang, Zhinan; Ahmed-Kristensen, Saeema

    2014-01-01

    to be defined in a new context. This paper focuses on understanding the design requirement sources at the requirement elicitation phase. It aims at proposing an improved design requirement source classification considering emerging markets and presenting current methods for eliciting requirement for each source...

  6. RSARF: Prediction of residue solvent accessibility from protein sequence using random forest method

    KAUST Repository

    Ganesan, Pugalenthi; Kandaswamy, Krishna Kumar Umar; Chou -, Kuochen; Vivekanandan, Saravanan; Kolatkar, Prasanna R.

    2012-01-01

    Prediction of protein structure from its amino acid sequence is still a challenging problem. The complete physicochemical understanding of protein folding is essential for the accurate structure prediction. Knowledge of residue solvent accessibility gives useful insights into protein structure prediction and function prediction. In this work, we propose a random forest method, RSARF, to predict residue accessible surface area from protein sequence information. The training and testing was performed using 120 proteins containing 22006 residues. For each residue, buried and exposed state was computed using five thresholds (0%, 5%, 10%, 25%, and 50%). The prediction accuracy for 0%, 5%, 10%, 25%, and 50% thresholds are 72.9%, 78.25%, 78.12%, 77.57% and 72.07% respectively. Further, comparison of RSARF with other methods using a benchmark dataset containing 20 proteins shows that our approach is useful for prediction of residue solvent accessibility from protein sequence without using structural information. The RSARF program, datasets and supplementary data are available at http://caps.ncbs.res.in/download/pugal/RSARF/. - See more at: http://www.eurekaselect.com/89216/article#sthash.pwVGFUjq.dpuf

  7. A Survey of Various Object Oriented Requirement Engineering Methods

    OpenAIRE

    Anandi Mahajan; Dr. Anurag Dixit

    2013-01-01

    In current years many industries have been moving to the use of object-oriented methods for the development of large scale information systems The requirement of Object Oriented approach in the development of software systems is increasing day by day. This paper is basically a survey paper on various Object-oriented requirement engineering methods. This paper contains a summary of the available Object-oriented requirement engineering methods with their relative advantages and disadvantages...

  8. Basic requirements to the methods of personnel monitoring

    International Nuclear Information System (INIS)

    Keirim-Markus, I.B.

    1981-01-01

    Requirements to methods of personnel monitoring (PMM) depending on irradiation conditions are given. The irradiation conditions determine subjected to monitoring types of irradiation, measurement ranges, periodicity of monitoring, operativeness of obtaining results and required accuracy. The PMM based on the photographic effect of ionizing radiation is the main method of the mass monitoring [ru

  9. Accessibility and sensory experiences

    DEFF Research Database (Denmark)

    Ryhl, Camilla

    2010-01-01

    and accessibility. Sensory accessibility accommodates aspects of a sensory disability and describes architectural design requirements needed to ensure access to architectural experiences. In the context of architecture accessibility has become a design concept of its own. It is generally described as ensuring...... physical access to the built environment by accommodating physical disabilities. While the existing concept of accessibility ensures the physical access of everyone to a given space, sensory accessibility ensures the choice of everyone to stay and be able to participate and experience....

  10. Rights of patients required in a public service ombudsman

    Directory of Open Access Journals (Sweden)

    Maristela Santini Martins

    2015-07-01

    Full Text Available Objective: analyzing the rights of patients required in a public service ombudsmen. Methods: an exploratory, descriptive study of documentary research. 109 complaint forms coming from the basic network were analyzed, related to 12 Basic Health Units located within the Southern Health Technical Supervision. Results: grouped into four categories of required rights: access to goods and services (62.4% being, access to specialized exams (28.7%, access to consultations (16.6%, referral to a specialist (5.7%, referral for urgent/emergency cases (1.3%, monitoring through home visits (7.6%, guaranteed medications (2.5%. Quality of health services (36.9% divided into: decent, considerate and respectful care (26.8%, guidance/clarification (9.6%, and public disclosure of government programs (0.6% and adequate infrastructure (0.6%. Conclusion: the rights that patients required are related to access, quality, treatment and adequate infrastructure.

  11. 45 CFR 310.40 - What requirements apply for accessing systems and records for monitoring Computerized Tribal IV-D...

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false What requirements apply for accessing systems and records for monitoring Computerized Tribal IV-D Systems and Office Automation? 310.40 Section 310.40... COMPUTERIZED TRIBAL IV-D SYSTEMS AND OFFICE AUTOMATION Accountability and Monitoring Procedures for...

  12. Early Patient Access to Medicines: Health Technology Assessment Bodies Need to Catch Up with New Marketing Authorization Methods.

    Science.gov (United States)

    Leyens, Lada; Brand, Angela

    National and international medicines agencies have developed innovative methods to expedite promising new medicines to the market and facilitate early patient access. Some of these approval pathways are the conditional approval and the adaptive pathways by the European Medicines Agency (EMA); the Promising Innovative Medicine (PIM) designation and the Early Access to Medicines Scheme (EAMS) by the Medicines and Healthcare Products Regulatory Agency (MHRA), as well as the Fast Track, Breakthrough or Accelerated Approval methods by the Food and Drug Administration (FDA). However, at least in Europe, these methods cannot achieve the goal of improving timely access for patients to new medicines on their own; the reimbursement process also has to become adaptive and flexible. In the past 2 years, the effective access (national patient access) to newly approved oncology drugs ranged from 1 to 30 months, with an extremely high variability between European countries. The goal of early patient access in Europe can only be achieved if the national health technology assessment bodies, such as NICE (ENG), HAS (FR), G-BA (DE) or AIFA (IT), provide harmonized, transparent, flexible, conditional and adaptive methods that adopt the level of evidence accepted by the medicines agencies. The efforts from medicines agencies are welcome but will be in vain if health technology assessments do not follow with similar initiatives, and the European 'postcode' lottery will continue. © 2016 S. Karger AG, Basel.

  13. A Method for Software Requirement Volatility Analysis Using QFD

    Directory of Open Access Journals (Sweden)

    Yunarso Anang

    2016-10-01

    Full Text Available Changes of software requirements are inevitable during the development life cycle. Rather than avoiding the circumstance, it is easier to just accept it and find a way to anticipate those changes. This paper proposes a method to analyze the volatility of requirement by using the Quality Function Deployment (QFD method and the introduced degree of volatility. Customer requirements are deployed to software functions and subsequently to architectural design elements. And then, after determining the potential for changes of the design elements, the degree of volatility of the software requirements is calculated. In this paper the method is described using a flow diagram and illustrated using a simple example, and is evaluated using a case study.

  14. Open Access @ DTU

    DEFF Research Database (Denmark)

    Ekstrøm, Jeannette

    Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all peer review...... articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access and related topics...... such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc....

  15. Transport Accessibility In Light Of The DEA Method

    Directory of Open Access Journals (Sweden)

    Górniak Joanna

    2014-12-01

    Full Text Available The development of transport infrastructure and increasing the efficiency of transport services are major factors of economic growth. The concept of transport accessibility can be analysed in various aspects. This article focuses on the accessibility of freight transport by road and rail, measured with infrastructure equipment. The primary objective of this study is to determine the efficiency of selected European countries in 2000, 2005 and 2010 in terms of transport accessibility for given expenditures and results. The efficiency will be measured with the Data Envelopment Analysis, which assesses the efficiency with which a given economy transforms expenditures into results. The hypothesis assumes the existence of differences between the efficiency in terms of transport accessibility in European countries and a possibility to increase this efficiency by using the experience of countries with a high efficiency level.

  16. Open Access to Research Data Accessing, using and publishing collections of textual data in digital literary studies

    OpenAIRE

    Schöch, Christof

    2015-01-01

    Introduction What is open access to research data? Related issues A closer look What can you do with open research data? What is required from research data? Do resources fulfil these requirements? Why is getting access good, but giving access better? Current issues Some challenges Main hindrance: Legal issues Conclusions Recommended readings

  17. Women's access needs in maternity care in rural Tasmania, Australia: a mixed methods study.

    Science.gov (United States)

    Hoang, Ha; Le, Quynh; Terry, Daniel

    2014-03-01

    This study investigates (i) maternity care access issues in rural Tasmania, (ii) rural women's challenges in accessing maternity services and (iii) rural women's access needs in maternity services. A mixed-method approach using a survey and semi-structured interviews was conducted. The survey explored women's views of rural maternity services from antenatal to postnatal care, while interviews reinforced the survey results and provided insights into the access issues and needs of women in maternity care. The survey was completed by n=210 women, with a response rate of 35%, with n=22 follow-up interviews being conducted. The survey indicated the majority of rural women believed antenatal education and check-ups and postnatal check-ups should be provided locally. The majority of women surveyed also believed in the importance of having a maternity unit in the local hospital, which was further iterated and clarified within the interviews. Three main themes emerged from the interview data, namely (i) lack of access to maternity services, (ii) difficulties in accessing maternity services, and (iii) rural women's access needs. The study suggested that women's access needs are not fully met in some rural areas of Tasmania. Rural women face many challenges when accessing maternity services, including financial burden and risk of labouring en route. The study supports the claim that the closure of rural maternity units shifts cost and risk from the health care system to rural women and their families. Copyright © 2013 Australian College of Midwives. Published by Elsevier Ltd. All rights reserved.

  18. The AAS Working Group on Accessibility and Disability (WGAD) Year 1 Highlights and Database Access

    Science.gov (United States)

    Knierman, Karen A.; Diaz Merced, Wanda; Aarnio, Alicia; Garcia, Beatriz; Monkiewicz, Jacqueline A.; Murphy, Nicholas Arnold

    2017-06-01

    The AAS Working Group on Accessibility and Disability (WGAD) was formed in January of 2016 with the express purpose of seeking equity of opportunity and building inclusive practices for disabled astronomers at all educational and career stages. In this presentation, we will provide a summary of current activities, focusing on developing best practices for accessibility with respect to astronomical databases, publications, and meetings. Due to the reliance of space sciences on databases, it is important to have user centered design systems for data retrieval. The cognitive overload that may be experienced by users of current databases may be mitigated by use of multi-modal interfaces such as xSonify. Such interfaces would be in parallel or outside the original database and would not require additional software efforts from the original database. WGAD is partnering with the IAU Commission C1 WG Astronomy for Equity and Inclusion to develop such accessibility tools for databases and methods for user testing. To collect data on astronomical conference and meeting accessibility considerations, WGAD solicited feedback from January AAS attendees via a web form. These data, together with upcoming input from the community and analysis of accessibility documents of similar conferences, will be used to create a meeting accessibility document. Additionally, we will update the progress of journal access guidelines and our social media presence via Twitter. We recommend that astronomical journals form committees to evaluate the accessibility of their publications by performing user-centered usability studies.

  19. How to Compare the Security Quality Requirements Engineering (SQUARE) Method with Other Methods

    National Research Council Canada - National Science Library

    Mead, Nancy R

    2007-01-01

    The Security Quality Requirements Engineering (SQUARE) method, developed at the Carnegie Mellon Software Engineering Institute, provides a systematic way to identify security requirements in a software development project...

  20. Method for developing cost estimates for generic regulatory requirements

    International Nuclear Information System (INIS)

    1985-01-01

    The NRC has established a practice of performing regulatory analyses, reflecting costs as well as benefits, of proposed new or revised generic requirements. A method had been developed to assist the NRC in preparing the types of cost estimates required for this purpose and for assigning priorities in the resolution of generic safety issues. The cost of a generic requirement is defined as the net present value of total lifetime cost incurred by the public, industry, and government in implementing the requirement for all affected plants. The method described here is for commercial light-water-reactor power plants. Estimating the cost for a generic requirement involves several steps: (1) identifying the activities that must be carried out to fully implement the requirement, (2) defining the work packages associated with the major activities, (3) identifying the individual elements of cost for each work package, (4) estimating the magnitude of each cost element, (5) aggregating individual plant costs over the plant lifetime, and (6) aggregating all plant costs and generic costs to produce a total, national, present value of lifetime cost for the requirement. The method developed addresses all six steps. In this paper, we discuss on the first three

  1. Final Report: Advanced Methods for Accessing and Disseminating Nuclear Data, August 13, 1996 - March 15, 1999

    International Nuclear Information System (INIS)

    Stone, Craig A.

    1999-01-01

    Scientific Digital Visions, Inc. developed methods of accessing and dissemination nuclear data contained within the databases of the National Data Center (NNDC) at the Brookhaven National Laboratory supporting a long standing and important DOE Program to provide scientists access to NNDC Databases. The NNDC participated as a partner in this effort

  2. Classical Methods and Calculation Algorithms for Determining Lime Requirements

    Directory of Open Access Journals (Sweden)

    André Guarçoni

    Full Text Available ABSTRACT The methods developed for determination of lime requirements (LR are based on widely accepted principles. However, the formulas used for calculation have evolved little over recent decades, and in some cases there are indications of their inadequacy. The aim of this study was to compare the lime requirements calculated by three classic formulas and three algorithms, defining those most appropriate for supplying Ca and Mg to coffee plants and the smaller possibility of causing overliming. The database used contained 600 soil samples, which were collected in coffee plantings. The LR was estimated by the methods of base saturation, neutralization of Al3+, and elevation of Ca2+ and Mg2+ contents (two formulas and by the three calculation algorithms. Averages of the lime requirements were compared, determining the frequency distribution of the 600 lime requirements (LR estimated through each calculation method. In soils with low cation exchange capacity at pH 7, the base saturation method may fail to adequately supply the plants with Ca and Mg in many situations, while the method of Al3+ neutralization and elevation of Ca2+ and Mg2+ contents can result in the calculation of application rates that will increase the pH above the suitable range. Among the methods studied for calculating lime requirements, the algorithm that predicts reaching a defined base saturation, with adequate Ca and Mg supply and the maximum application rate limited to the H+Al value, proved to be the most efficient calculation method, and it can be recommended for use in numerous crops conditions.

  3. External access to ALICE controls conditions data

    International Nuclear Information System (INIS)

    Jadlovský, J; Jadlovská, A; Sarnovský, J; Jajčišin, Š; Čopík, M; Jadlovská, S; Papcun, P; Bielek, R; Čerkala, J; Kopčík, M; Chochula, P; Augustinus, A

    2014-01-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead – users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data – an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  4. Requirements for Scalable Access Control and Security Management Architectures

    National Research Council Canada - National Science Library

    Keromytis, Angelos D; Smith, Jonathan M

    2005-01-01

    Maximizing local autonomy has led to a scalable Internet. Scalability and the capacity for distributed control have unfortunately not extended well to resource access control policies and mechanisms...

  5. Polish Accession to the European Union: Participating Institutions

    Directory of Open Access Journals (Sweden)

    Tomaszewski Waldemar

    2015-06-01

    Full Text Available In May 2014 it was aready ten years since Poland’s accession to the European Union. The accession was preceded by a long period of political action and negotiations between the Polish and the EU institutions. The process of integration was extremely complex. It covered almost all areas of economic, legal and civil aspects of the aspiring country’s economy, in which all necessary requirements had to be met. The aim of the article was to present the institutional framework created for efficient implementation of the process of accession. The considerations involved especially an institutional method. The research resulted in poining out both the actually efficient and less efficient bodies participating in the process of integration.

  6. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  7. Assessing the National Bioengineered Food Disclosure Standard of 2016: Can Americans Access Electronic Disclosure Information?

    Directory of Open Access Journals (Sweden)

    Craig F. Berning

    2017-05-01

    Full Text Available The debate as to whether to require mandatory labeling of genetically modified organism (GMO foods was partially settled on 29 July 2016, when President Obama signed the National Bioengineered Food Disclosure Standard into public law. In contrast to precipitating legislation passed by the State of Vermont that required disclosure of GMO ingredients on food shelves or food packages, the superseding National Standard allows firms to disclose bioengineered ingredients to consumers via symbols, electronic or digital links, or phone numbers, and further requires a study assessing the ability of consumers to access disclosure information by these means. This communication analyzes survey responses from 525 adults to investigate whether U.S. consumers are able to obtain information as per the disclosure methods allowed in the Federal legislation. The survey probes deeper to investigate consumer perceptions of genetically modified organisms and whether consumers would use the tools available to access disclosure about bioengineered ingredients. Findings from the survey show that 93.8% of respondents have the ability to access information via the disclosure methods permitted. Those in the lowest income group, and from the oldest age group are least likely to have such access. This provides the United State Department of Agriculture with information relevant to how they can implement the law and highlights particular demographic segments that may require additional attention to ensure the disclosed information is universally accessible.

  8. Interventional radiology in the provision and maintenance of long-term central venous access

    International Nuclear Information System (INIS)

    Lyon, S.M.; Given, M.; Marshall, N.L.

    2008-01-01

    Establishing and maintaining venous access forms an increasing proportion of the workload in interventional radiology. Several patient groups require medium-term to long-term venous catheters for a variety of purposes, including chemotherapy, long-term antimicrobials, parenteral nutrition, short-term access for haemodialysis or exhausted haemodialysis. Often, these catheters are required for treatment and frequent blood testing, which can quickly exhaust the peripheral veins. Venous access devices include implantable catheters (ports), tunnelled catheters and peripherally inserted central catheters, which have different functions, advantages and limitations. Imaging-guided placement is the preferred method of insertion in many institutions because of higher success rates and radiologists are well suited to address catheter complications.

  9. 78 FR 23684 - Personnel Access Authorization Requirements for Nuclear Power Plants

    Science.gov (United States)

    2013-04-22

    ... an employee's unescorted access at their facility. The petitioner seeks to ensure that such decisions... is solely responsible for making final unescorted access decisions, and to prescribe a clearly... #0;notices is to give interested persons an opportunity to participate in #0;the rule making prior to...

  10. Evaluating Michigan's community hospital access: spatial methods for decision support

    Directory of Open Access Journals (Sweden)

    Varnakovida Pariwate

    2006-09-01

    Full Text Available Abstract Background Community hospital placement is dictated by a diverse set of geographical factors and historical contingency. In the summer of 2004, a multi-organizational committee headed by the State of Michigan's Department of Community Health approached the authors of this paper with questions about how spatial analyses might be employed to develop a revised community hospital approval procedure. Three objectives were set. First, the committee needed visualizations of both the spatial pattern of Michigan's population and its 139 community hospitals. Second, the committee required a clear, defensible assessment methodology to quantify access to existing hospitals statewide, taking into account factors such as distance to nearest hospital and road network density to estimate travel time. Third, the committee wanted to contrast the spatial distribution of existing community hospitals with a theoretical configuration that best met statewide demand. This paper presents our efforts to first describe the distribution of Michigan's current community hospital pattern and its people, and second, develop two models, access-based and demand-based, to identify areas with inadequate access to existing hospitals. Results Using the product from the access-based model and contiguity and population criteria, two areas were identified as being "under-served." The lower area, located north/northeast of Detroit, contained the greater total land area and population of the two areas. The upper area was centered north of Grand Rapids. A demand-based model was applied to evaluate the existing facility arrangement by allocating daily bed demand in each ZIP code to the closest facility. We found 1,887 beds per day were demanded by ZIP centroids more than 16.1 kilometers from the nearest existing hospital. This represented 12.7% of the average statewide daily bed demand. If a 32.3 kilometer radius was employed, unmet demand dropped to 160 beds per day (1

  11. Facilitating Full-text Access to Biomedical Literature Using Open Access Resources.

    Science.gov (United States)

    Kang, Hongyu; Hou, Zhen; Li, Jiao

    2015-01-01

    Open access (OA) resources and local libraries often have their own literature databases, especially in the field of biomedicine. We have developed a method of linking a local library to a biomedical OA resource facilitating researchers' full-text article access. The method uses a model based on vector space to measure similarities between two articles in local library and OA resources. The method achieved an F-score of 99.61%. This method of article linkage and mapping between local library and OA resources is available for use. Through this work, we have improved the full-text access of the biomedical OA resources.

  12. Handbook of methods for risk-based analysis of technical specification requirements

    International Nuclear Information System (INIS)

    Samanta, P.K.; Vesely, W.E.

    1994-01-01

    Technical Specifications (TS) requirements for nuclear power plants define the Limiting Conditions for Operation (LCOs) and Surveillance Requirements (SRs) to assure safety during operation. In general, these requirements were based on deterministic analysis and engineering judgments. Experiences with plant operation indicate that some elements of the requirements are unnecessarily restrictive, while others may not be conducive to safety. Improvements in these requirements are facilitated by the availability of plant specific Probabilistic Safety Assessments (PSAs). The use of risk and reliability-based methods to improve TS requirements has gained wide interest because these methods can: Quantitatively evaluate the risk and justify changes based on objective risk arguments; Provide a defensible basis for these requirements for regulatory applications. The US NRC Office of Research is sponsoring research to develop systematic risk-based methods to improve various aspects of TS requirements. The handbook of methods, which is being prepared, summarizes such risk-based methods. The scope of the handbook includes reliability and risk-based methods for evaluating allowed outage times (AOTs), action statements requiring shutdown where shutdown risk may be substantial, surveillance test intervals (STIs), defenses against common-cause failures, managing plant configurations, and scheduling maintenances. For each topic, the handbook summarizes methods of analysis and data needs, outlines the insights to be gained, lists additional references, and presents examples of evaluations

  13. Handbook of methods for risk-based analysis of Technical Specification requirements

    International Nuclear Information System (INIS)

    Samanta, P.K.; Vesely, W.E.

    1993-01-01

    Technical Specifications (TS) requirements for nuclear power plants define the Limiting Conditions for Operation (LCOs) and Surveillance Requirements (SRs) to assure safety during operation. In general, these requirements were based on deterministic analysis and engineering judgments. Experiences with plant operation indicate that some elements of the requirements are unnecessarily restrictive, while others may not be conducive to safety. Improvements in these requirements are facilitated by the availability of plant specific Probabilistic Safety Assessments (PSAs). The use of risk and reliability-based methods to improve TS requirements has gained wide interest because these methods can: quantitatively evaluate the risk impact and justify changes based on objective risk arguments. Provide a defensible basis for these requirements for regulatory applications. The United States Nuclear Regulatory Commission (USNRC) Office of Research is sponsoring research to develop systematic risk-based methods to improve various aspects of TS requirements. The handbook of methods, which is being prepared, summarizes such risk-based methods. The scope of the handbook includes reliability and risk-based methods for evaluating allowed outage times (AOTs), action statements requiring shutdown where shutdown risk may be substantial, surveillance test intervals (STIs), defenses against common-cause failures, managing plant configurations, and scheduling maintenances. For each topic, the handbook summarizes methods of analysis and data needs, outlines the insights to be gained, lists additional references, and presents examples of evaluations

  14. Atomic memory access hardware implementations

    Science.gov (United States)

    Ahn, Jung Ho; Erez, Mattan; Dally, William J

    2015-02-17

    Atomic memory access requests are handled using a variety of systems and methods. According to one example method, a data-processing circuit having an address-request generator that issues requests to a common memory implements a method of processing the requests using a memory-access intervention circuit coupled between the generator and the common memory. The method identifies a current atomic-memory access request from a plurality of memory access requests. A data set is stored that corresponds to the current atomic-memory access request in a data storage circuit within the intervention circuit. It is determined whether the current atomic-memory access request corresponds to at least one previously-stored atomic-memory access request. In response to determining correspondence, the current request is implemented by retrieving data from the common memory. The data is modified in response to the current request and at least one other access request in the memory-access intervention circuit.

  15. A Novel Method for Intraoral Access to the Superior Head of the Human Lateral Pterygoid Muscle

    Directory of Open Access Journals (Sweden)

    Aleli Tôrres Oliveira

    2014-01-01

    Full Text Available Background. The uncoordinated activity of the superior and inferior parts of the lateral pterygoid muscle (LPM has been suggested to be one of the causes of temporomandibular joint (TMJ disc displacement. A therapy for this muscle disorder is the injection of botulinum toxin (BTX, of the LPM. However, there is a potential risk of side effects with the injection guide methods currently available. In addition, they do not permit appropriate differentiation between the two bellies of the muscle. Herein, a novel method is presented to provide intraoral access to the superior head of the human LPM with maximal control and minimal hazards. Methods. Computational tomography along with digital imaging software programs and rapid prototyping techniques were used to create a rapid prototyped guide to orient BTX injections in the superior LPM. Results. The method proved to be feasible and reliable. Furthermore, when tested in one volunteer it allowed precise access to the upper head of LPM, without producing side effects. Conclusions. The prototyped guide presented in this paper is a novel tool that provides intraoral access to the superior head of the LPM. Further studies will be necessary to test the efficacy and validate this method in a larger cohort of subjects.

  16. 47 CFR 27.16 - Network access requirements for Block C in the 746-757 and 776-787 MHz bands.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Network access requirements for Block C in the 746-757 and 776-787 MHz bands. 27.16 Section 27.16 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... network restrictions on industry-wide consensus standards, such restrictions would be presumed reasonable...

  17. Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC), are not suf...... to such settings. We overview the main technical issues to be addressed, and we describe the architecture for policy decision and enforcement points....

  18. Artificial intelligence applications of fast optical memory access

    Science.gov (United States)

    Henshaw, P. D.; Todtenkopf, A. B.

    The operating principles and performance of rapid laser beam-steering (LBS) techniques are reviewed and illustrated with diagrams; their applicability to fast optical-memory (disk) access is evaluated; and the implications of fast access for the design of expert systems are discussed. LBS methods examined include analog deflection (source motion, wavefront tilt, and phased arrays), digital deflection (polarization modulation, reflectivity modulation, interferometric switching, and waveguide deflection), and photorefractive LBS. The disk-access problem is considered, and typical LBS requirements are listed as 38,000 beam positions, rotational latency 25 ms, one-sector rotation time 1.5 ms, and intersector space 87 microsec. The value of rapid access for increasing the power of expert systems (by permitting better organization of blocks of information) is illustrated by summarizing the learning process of the MVP-FORTH system (Park, 1983).

  19. The Videographic Requirements Gathering Method for Adolescent-Focused Interaction Design

    Directory of Open Access Journals (Sweden)

    Tamara Peyton

    2014-08-01

    Full Text Available We present a novel method for conducting requirements gathering with adolescent populations. Called videographic requirements gathering, this technique makes use of mobile phone data capture and participant creation of media images. The videographic requirements gathering method can help researchers and designers gain intimate insight into adolescent lives while simultaneously reducing power imbalances. We provide rationale for this approach, pragmatics of using the method, and advice on overcoming common challenges facing researchers and designers relying on this technique.

  20. Upper Bound Performance Estimation for Copper Based Broadband Access

    DEFF Research Database (Denmark)

    Jensen, Michael; Gutierrez Lopez, Jose Manuel

    2012-01-01

    of copper based access connections at a household level by using Geographical Information System data. This can be combined with different configurations of DSLAMs distributions, in order to calculate the required number of active equipment points to guarantee certain QoS levels. This method can be used...

  1. Spatial access priority mapping (SAPM) with fishers: a quantitative GIS method for participatory planning.

    Science.gov (United States)

    Yates, Katherine L; Schoeman, David S

    2013-01-01

    Spatial management tools, such as marine spatial planning and marine protected areas, are playing an increasingly important role in attempts to improve marine management and accommodate conflicting needs. Robust data are needed to inform decisions among different planning options, and early inclusion of stakeholder involvement is widely regarded as vital for success. One of the biggest stakeholder groups, and the most likely to be adversely impacted by spatial restrictions, is the fishing community. In order to take their priorities into account, planners need to understand spatial variation in their perceived value of the sea. Here a readily accessible, novel method for quantitatively mapping fishers' spatial access priorities is presented. Spatial access priority mapping, or SAPM, uses only basic functions of standard spreadsheet and GIS software. Unlike the use of remote-sensing data, SAPM actively engages fishers in participatory mapping, documenting rather than inferring their priorities. By so doing, SAPM also facilitates the gathering of other useful data, such as local ecological knowledge. The method was tested and validated in Northern Ireland, where over 100 fishers participated in a semi-structured questionnaire and mapping exercise. The response rate was excellent, 97%, demonstrating fishers' willingness to be involved. The resultant maps are easily accessible and instantly informative, providing a very clear visual indication of which areas are most important for the fishers. The maps also provide quantitative data, which can be used to analyse the relative impact of different management options on the fishing industry and can be incorporated into planning software, such as MARXAN, to ensure that conservation goals can be met at minimum negative impact to the industry. This research shows how spatial access priority mapping can facilitate the early engagement of fishers and the ready incorporation of their priorities into the decision-making process

  2. A multi-criteria approach of assessing public transport accessibility at a strategic level

    OpenAIRE

    Hawas, Yaser E.; Hassan, Mohammad Nurul; Abulibdeh, Ammar

    2016-01-01

    This paper presents an approach for accessibility categorization in areas where there is no extensive data available to run the conventional analysis. The presented method has the advantages of the lower data requirements and the utility of the results. Three benchmarks were selected to evaluate transit accessibility. The first one (transit coverage) investigates the spread of the service, and it is used to assess the percentage of people in a district that can access the service within a com...

  3. Single-Access Laparoscopic Surgery for Ileal Disease

    Directory of Open Access Journals (Sweden)

    Mohamed Moftah

    2012-01-01

    Full Text Available Aim. Single-access laparoscopic surgery (SALS can be effective for benign and malignant diseases of the ileum in both the elective and urgent setting. Methods. Ten consecutive, nonselected patients with ileal disease requiring surgery over a twelve month period were included. All had a preoperative abdominopelvic computerized tomogram. Peritoneal access was achieved via a single transumbilical incision and a “surgical glove port” utilized as our preferred access device. With the pneumoperitoneum established, the relevant ileal loop was located using standard rigid instruments. For ileal resection, anastomosis, or enterotomy, the site of pathology was delivered and addressed extracorporeally. Result. The median (range age of the patients was 42.5 (22–78 years, and the median body mass index was 22 (20.2–28 kg/m2. Procedures included tru-cut biopsy of an ileal mesenteric mass, loop ileostomy and ileotomy for impacted gallstone extraction as well as ileal (=3 and ileocaecal resection (=4. Mean (range incision length was 2.5 (2–5 cm. All convalescences were uncomplicated. Conclusions. These preliminary results show that SALS is an efficient and safe modality for the surgical management of ileal disease with all the advantages of minimal access surgery and without requiring a significant increase in theatre resource or cost or incurring extra patient morbidity.

  4. Accessing memory

    Science.gov (United States)

    Yoon, Doe Hyun; Muralimanohar, Naveen; Chang, Jichuan; Ranganthan, Parthasarathy

    2017-09-26

    A disclosed example method involves performing simultaneous data accesses on at least first and second independently selectable logical sub-ranks to access first data via a wide internal data bus in a memory device. The memory device includes a translation buffer chip, memory chips in independently selectable logical sub-ranks, a narrow external data bus to connect the translation buffer chip to a memory controller, and the wide internal data bus between the translation buffer chip and the memory chips. A data access is performed on only the first independently selectable logical sub-rank to access second data via the wide internal data bus. The example method also involves locating a first portion of the first data, a second portion of the first data, and the second data on the narrow external data bus during separate data transfers.

  5. A METHOD OF AND A SYSTEM FOR CONTROLLING ACCESS TO A SHARED RESOURCE

    DEFF Research Database (Denmark)

    2006-01-01

    A method and a system of controlling access of data items to a shared resource, wherein the data items each is assigned to one of a plurality of priorities, and wherein, when a predetermined number of data items of a priority have been transmitted to the shared resource, that priority...

  6. Modified network simulation model with token method of bus access

    Directory of Open Access Journals (Sweden)

    L.V. Stribulevich

    2013-08-01

    Full Text Available Purpose. To study the characteristics of the local network with the marker method of access to the bus its modified simulation model was developed. Methodology. Defining characteristics of the network is carried out on the developed simulation model, which is based on the state diagram-layer network station with the mechanism of processing priorities, both in steady state and in the performance of control procedures: the initiation of a logical ring, the entrance and exit of the station network with a logical ring. Findings. A simulation model, on the basis of which can be obtained the dependencies of the application the maximum waiting time in the queue for different classes of access, and the reaction time usable bandwidth on the data rate, the number of network stations, the generation rate applications, the number of frames transmitted per token holding time, frame length was developed. Originality. The technique of network simulation reflecting its work in the steady condition and during the control procedures, the mechanism of priority ranking and handling was proposed. Practical value. Defining network characteristics in the real-time systems on railway transport based on the developed simulation model.

  7. 47 CFR 76.971 - Commercial leased access terms and conditions.

    Science.gov (United States)

    2010-10-01

    ... operators that have not satisfied their statutory leased access requirements shall accommodate part-time..., educational and governmental access programming, provided that the operator's franchise agreement requires it... leased commercial channels. Cable operators may impose reasonable insurance requirements on leased access...

  8. INTEGRATIVE METHOD OF TEACHING INFORMATION MODELING IN PRACTICAL HEALTH SERVICE BASED ON MICROSOFT ACCESS QUERIES

    Directory of Open Access Journals (Sweden)

    Svetlana A. Firsova

    2016-06-01

    Full Text Available Introduction: this article explores the pedagogical technology employed to teach medical students foundations of work with MICROSOFT ACCESS databases. The above technology is based on integrative approach to the information modeling in public health practice, drawing upon basic didactic concepts that pertain to objects and tools databases created in MICROSOFT ACCESS. The article examines successive steps in teaching the topic “Queries in MICROSOFT ACCESS” – from simple queries to complex ones. The main attention is paid to such components of methodological system, as the principles and teaching methods classified according to the degree of learners’ active cognitive activity. The most interesting is the diagram of the relationship of learning principles, teaching methods and specific types of requests. Materials and Methods: the authors used comparative analysis of literature, syllabi, curricula in medical informatics taught at leading medical universities in Russia. Results: the original technique of training in putting queries with databases of MICROSOFT ACCESS is presented for analysis of information models in practical health care. Discussion and Conclusions: it is argued that the proposed pedagogical technology will significantly improve the effectiveness of teaching the course “Medical Informatics”, that includes development and application of models to simulate the operation of certain facilities and services of the health system which, in turn, increases the level of information culture of practitioners.

  9. 47 CFR 76.978 - Leased access annual reporting requirement.

    Science.gov (United States)

    2010-10-01

    ... against the cable system with the Commission or a Federal district court regarding a commercial leased..., which provides the following information for the calendar year: (1) The number of commercial leased... commercial leased access channel. (3) The rates the cable system charges for full-time and part-time leased...

  10. Spatial Accessibility of Primary Care in England: A Cross-Sectional Study Using a Floating Catchment Area Method.

    Science.gov (United States)

    Bauer, Jan; Müller, Ruth; Brüggmann, Dörthe; Groneberg, David A

    2017-07-07

    To analyze the general practitioners (GPs) with regard to the degree of urbanization, social deprivation, general health, and disability. Small area population data and GP practice data in England. We used a floating catchment area method to measure spatial GP accessibility with regard to the degree of urbanization, social deprivation, general health, and disability. Data were collected from the Office for National Statistics and the general practice census and analyzed using a geographic information system. In all, 25.8 percent of the population in England lived in areas with a significant low GP accessibility (mean z-score: -4.2); 27.6 percent lived in areas with a significant high GP accessibility (mean z-score: 7.7); 97.8 percent of high GP accessibility areas represented urban areas, and 31.1 percent of low GP accessibility areas represented rural areas (correlation of accessibility and urbanity: r = 0.59; psocial deprivation was present (r = -0.19; paccessibility throughout England. However, socially deprived areas did not have poorer spatial access to GPs. © Health Research and Educational Trust.

  11. Accessible Earth: An accessible study abroad capstone for the geoscience curriculum

    Science.gov (United States)

    Bennett, R. A.; Lamb, D. A.

    2017-12-01

    International capstone field courses offer geoscience-students opportunities to reflect upon their knowledge, develop intercultural competence, appreciate diversity, and recognize themselves as geoscientists on a global scale. Such experiences are often described as pivotal to a geoscientist's education, a right of passage. However, field-based experiences present insurmountable barriers to many students, undermining the goal of inclusive excellence. Nevertheless, there remains a widespread belief that successful geoscientists are those able to traverse inaccessible terrain. One path forward from this apparent dilemma is emerging as we take steps to address a parallel challenge: as we move into the 21st century the geoscience workforce will require an ever increasing range of skills, including analysis, modeling, communication, and computational proficiency. Computer programing, laboratory experimentation, numerical simulation, etc, are inherently more accessible than fieldwork, yet equally valuable. Students interested in pursuing such avenues may be better served by capstone experiences that align more closely with their career goals. Moreover, many of the desirable learning outcomes attributed to field-based education are not unique to immersion in remote inaccessible locations. Affective and cognitive gains may also result from social bonding through extended time with peers and mentors, creative synthesis of knowledge, project-based learning, and intercultural experience. Developing an inclusive course for the geoscience curriculum requires considering all learners, including different genders, ages, physical abilities, familial dynamics, and a multitude of other attributes. The Accessible Earth Study Abroad Program endeavors to provide geoscience students an inclusive capstone experience focusing on modern geophysical observation systems (satellite based observations and permanent networks of ground-based instruments), computational thinking and methods of

  12. Quantum random access memory

    OpenAIRE

    Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo

    2007-01-01

    A random access memory (RAM) uses n bits to randomly address N=2^n distinct memory cells. A quantum random access memory (qRAM) uses n qubits to address any quantum superposition of N memory cells. We present an architecture that exponentially reduces the requirements for a memory call: O(log N) switches need be thrown instead of the N used in conventional (classical or quantum) RAM designs. This yields a more robust qRAM algorithm, as it in general requires entanglement among exponentially l...

  13. Internet and Social Media Access Among Youth Experiencing Homelessness: Mixed-Methods Study.

    Science.gov (United States)

    VonHoltz, Lauren A Houdek; Frasso, Rosemary; Golinkoff, Jesse M; Lozano, Alicia J; Hanlon, Alexandra; Dowshen, Nadia

    2018-05-22

    leisure or entertainment activities. While homeless youth experience changes in the frequency, amount of time, and specific uses of the internet and social media, study participants were able to access the internet regularly. The internet was used to search health-related topics. Given the importance of smartphones in accessing the internet, mobile-optimized websites may be an effective method for reaching this group. ©Lauren A Houdek VonHoltz, Rosemary Frasso, Jesse M Golinkoff, Alicia J Lozano, Alexandra Hanlon, Nadia Dowshen. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 22.05.2018.

  14. Accessible methods for the dynamic time-scale decomposition of biochemical systems.

    Science.gov (United States)

    Surovtsova, Irina; Simus, Natalia; Lorenz, Thomas; König, Artjom; Sahle, Sven; Kummer, Ursula

    2009-11-01

    The growing complexity of biochemical models asks for means to rationally dissect the networks into meaningful and rather independent subnetworks. Such foregoing should ensure an understanding of the system without any heuristics employed. Important for the success of such an approach is its accessibility and the clarity of the presentation of the results. In order to achieve this goal, we developed a method which is a modification of the classical approach of time-scale separation. This modified method as well as the more classical approach have been implemented for time-dependent application within the widely used software COPASI. The implementation includes different possibilities for the representation of the results including 3D-visualization. The methods are included in COPASI which is free for academic use and available at www.copasi.org. irina.surovtsova@bioquant.uni-heidelberg.de Supplementary data are available at Bioinformatics online.

  15. From spatial to social accessibility: How socio-economic factors can affect accessibility?

    OpenAIRE

    Mercier , Aurélie

    2016-01-01

    The concept of accessibility cannot only focus on " spatial accessibility " measurement but has to integer a " social accessibility " level to take into account individual inequalities and socioeconomic disparities to access to urban opportunities. In this context, this contribution focuses on socioeconomic disparities integration on accessibility measurement, considering the Lyon case study. The paper is divided into three parts The first part aims to present a method for integrating the soc...

  16. Quantitative methods for developing C2 system requirement

    Energy Technology Data Exchange (ETDEWEB)

    Tyler, K.K.

    1992-06-01

    The US Army established the Army Tactical Command and Control System (ATCCS) Experimentation Site (AES) to provide a place where material and combat developers could experiment with command and control systems. The AES conducts fundamental and applied research involving command and control issues using a number of research methods, ranging from large force-level experiments, to controlled laboratory experiments, to studies and analyses. The work summarized in this paper was done by Pacific Northwest Laboratory under task order from the Army Tactical Command and Control System Experimentation Site. The purpose of the task was to develop the functional requirements for army engineer automation and support software, including MCS-ENG. A client, such as an army engineer, has certain needs and requirements of his or her software; these needs must be presented in ways that are readily understandable to the software developer. A requirements analysis then, such as the one described in this paper, is simply the means of communication between those who would use a piece of software and those who would develop it. The analysis from which this paper was derived attempted to bridge the ``communications gap`` between army combat engineers and software engineers. It sought to derive and state the software needs of army engineers in ways that are meaningful to software engineers. In doing this, it followed a natural sequence of investigation: (1) what does an army engineer do, (2) with which tasks can software help, (3) how much will it cost, and (4) where is the highest payoff? This paper demonstrates how each of these questions was addressed during an analysis of the functional requirements of engineer support software. Systems engineering methods are used in a task analysis and a quantitative scoring method was developed to score responses regarding the feasibility of task automation. The paper discusses the methods used to perform utility and cost-benefits estimates.

  17. Mini-grid based off-grid electrification to enhance electricity access in developing countries: What policies may be required?

    International Nuclear Information System (INIS)

    Bhattacharyya, Subhes C.; Palit, Debajit

    2016-01-01

    With 1.2 billion people still lacking electricity access by 2013, electricity access remains a major global challenge. Although mini-grid based electrification has received attention in recent times, their full exploitation requires policy support covering a range of areas. Distilling the experience from a five year research project, OASYS South Asia, this paper presents the summary of research findings and shares the experience from four demonstration activities. It suggests that cost-effective universal electricity service remains a challenge and reaching the universal electrification target by 2030 will remain a challenge for the less developed countries. The financial, organisational and governance weaknesses hinder successful implementation of projects in many countries. The paper then provides 10 policy recommendations to promote mini-grids as a complementary route to grid extension to promote electricity access for successful outcomes. - Highlights: •The academic and action research activities undertaken through OASYS South Asia Project are reported. •Evidence produced through a multi-dimensional participatory framework supplemented by four demonstration projects. •Funding and regulatory challenges militate against universal electrification objectives by 2030. •Innovative business approaches linking local mini-grids and livelihood opportunities exist. •Enabling policies are suggested to exploit such options.

  18. A Rewritable, Random-Access DNA-Based Storage System.

    Science.gov (United States)

    Yazdi, S M Hossein Tabatabaei; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-18

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  19. Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

    OpenAIRE

    Yekini N.A.; Itegboje A.O.; Oyeyinka I.K.; Akinwole A.K.

    2012-01-01

    An automatic teller machine requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with structured questions among the ATM users and the result proofed that a lot of problems was associated with ATM smartcard for access control. Among the problems are; it is very difficult to prevent another person from attaining and using a legitimate persons card, ...

  20. Airspace Operations Demo Functional Requirements Matrix

    Science.gov (United States)

    2005-01-01

    The Flight IPT assessed the reasonableness of demonstrating each of the Access 5 Step 1 functional requirements. The functional requirements listed in this matrix are from the September 2005 release of the Access 5 Functional Requirements Document. The demonstration mission considered was a notional Western US mission (WUS). The conclusion of the assessment is that 90% of the Access 5 Step 1 functional requirements can be demonstrated using the notional Western US mission.

  1. Quality functions for requirements engineering in system development methods.

    Science.gov (United States)

    Johansson, M; Timpka, T

    1996-01-01

    Based on a grounded theory framework, this paper analyses the quality characteristics for methods to be used for requirements engineering in the development of medical decision support systems (MDSS). The results from a Quality Function Deployment (QFD) used to rank functions connected to user value and a focus group study were presented to a validation focus group. The focus group studies take advantage of a group process to collect data for further analyses. The results describe factors considered by the participants as important in the development of methods for requirements engineering in health care. Based on the findings, the content which, according to the user a MDSS method should support is established.

  2. Association of State Access Standards With Accessibility to Specialists for Medicaid Managed Care Enrollees.

    Science.gov (United States)

    Ndumele, Chima D; Cohen, Michael S; Cleary, Paul D

    2017-10-01

    Medicaid recipients have consistently reported less timely access to specialists than patients with other types of coverage. By 2018, state Medicaid agencies will be required by the Center for Medicare and Medicaid Services (CMS) to enact time and distance standards for managed care organizations to ensure an adequate supply of specialist physicians for enrollees; however, there have been no published studies of whether these policies have significant effects on access to specialty care. To compare ratings of access to specialists for adult Medicaid and commercial enrollees before and after the implementation of specialty access standards. We used Consumer Assessment of Healthcare Providers and Systems survey data to conduct a quasiexperimental difference-in-differences (DID) analysis of 20 163 nonelderly adult Medicaid managed care (MMC) enrollees and 54 465 commercially insured enrollees in 5 states adopting access standards, and 37 290 MMC enrollees in 5 matched states that previously adopted access standards. Reported access to specialty care in the previous 6 months. Seven thousand six hundred ninety-eight (69%) Medicaid enrollees and 28 423 (75%) commercial enrollees reported that it was always or usually easy to get an appointment with a specialist before the policy implementation (or at baseline) compared with 11 889 (67%) of Medicaid enrollees in states that had previously implemented access standards. Overall, there was no significant improvement in timely access to specialty services for MMC enrollees in the period following implementation of standard(s) (adjusted difference-in-differences, -1.2 percentage points; 95% CI, -2.7 to 0.1), nor was there any impact of access standards on insurance-based disparities in access (0.6 percentage points; 95% CI, -4.3 to 5.4). There was heterogeneity across states, with 1 state that implemented both time and distance standards demonstrating significant improvements in access and reductions in disparities

  3. Guided endodontics: accuracy of a novel method for guided access cavity preparation and root canal location.

    Science.gov (United States)

    Zehnder, M S; Connert, T; Weiger, R; Krastl, G; Kühl, S

    2016-10-01

    To present a novel method utilizing 3D printed templates to gain guided access to root canals and to evaluate its accuracy in vitro. Sixty extracted human teeth were placed into six maxillary jaw models. Preoperative CBCT scans were matched with intra-oral scans using the coDiagnostix(™) software. Access cavities, sleeves and templates for guidance were virtually planned. Templates were produced by a 3D printer. After access cavity preparation by two operators, a postoperative CBCT scan was superimposed on the virtual planning. Accuracy was measured by calculating the deviation of planned and prepared cavities in three dimensions and angle. Ninety-five per cent confidence intervals were calculated for both operators. All root canals were accessible after cavity preparation with 'Guided Endodontics'. Deviations of planned and prepared access cavities were low with means ranging from 0.16 to 0.21 mm for different aspects at the base of the bur and 0.17-0.47 mm at the tip of the bur. Mean of angle deviation was 1.81°. Overlapping 95% confidence intervals revealed no significant difference between operators. 'Guided Endodontics' allowed an accurate access cavity preparation up to the apical third of the root utilizing printed templates for guidance. All root canals were accessible after preparation. © 2015 International Endodontic Journal. Published by John Wiley & Sons Ltd.

  4. Access French

    CERN Document Server

    Grosz, Bernard

    2014-01-01

    Access is the major new language series designed with the needs of today's generation of students firmly in mind. Whether learning for leisure or business purposes or working towards a curriculum qualification, Access French is specially designed for adults of all ages and gives students a thorough grounding in all the skills required to understand, speak, read and write contemporary French from scratch. The coursebook consists of 10 units covering different topic areas, each of which includes Language Focus panels explaining the structures covered and a comprehensive glossary. Learning tips

  5. Systematic analysis of geo-location and spectrum sensing as access methods to TV white space

    CSIR Research Space (South Africa)

    Mauwa, H

    2016-11-01

    Full Text Available Access to the television white space by white space devices comes with a major technical challenge: white space devices can potentially interfere with existing television signals. Two methods have been suggested in the literature to help white space...

  6. Resource allocation in shared spectrum access communications for operators with diverse service requirements

    Science.gov (United States)

    Kibria, Mirza Golam; Villardi, Gabriel Porto; Ishizu, Kentaro; Kojima, Fumihide; Yano, Hiroyuki

    2016-12-01

    In this paper, we study inter-operator spectrum sharing and intra-operator resource allocation in shared spectrum access communication systems and propose efficient dynamic solutions to address both inter-operator and intra-operator resource allocation optimization problems. For inter-operator spectrum sharing, we present two competent approaches, namely the subcarrier gain-based sharing and fragmentation-based sharing, which carry out fair and flexible allocation of the available shareable spectrum among the operators subject to certain well-defined sharing rules, traffic demands, and channel propagation characteristics. The subcarrier gain-based spectrum sharing scheme has been found to be more efficient in terms of achieved throughput. However, the fragmentation-based sharing is more attractive in terms of computational complexity. For intra-operator resource allocation, we consider resource allocation problem with users' dissimilar service requirements, where the operator supports users with delay constraint and non-delay constraint service requirements, simultaneously. This optimization problem is a mixed-integer non-linear programming problem and non-convex, which is computationally very expensive, and the complexity grows exponentially with the number of integer variables. We propose less-complex and efficient suboptimal solution based on formulating exact linearization, linear approximation, and convexification techniques for the non-linear and/or non-convex objective functions and constraints. Extensive simulation performance analysis has been carried out that validates the efficiency of the proposed solution.

  7. Air Force Officer Accession Planning: Addressing Key Gaps in Meeting Career Field Academic Degree Requirements for Nonrated Officers

    Science.gov (United States)

    2016-06-09

    C O R P O R A T I O N Research Report Air Force Officer Accession Planning Addressing Key Gaps in Meeting Career Field Academic Degree Requirements...potential performance, and how to include these quality measures in the classification process. The research sponsor asked us to focus on academic ...Andrew P., and James K. Lowe, “Decision Support for the Career Field Selection Process at the US Air Force Academy,” European Journal of Operational

  8. Quantitative methods for developing C2 system requirement

    Energy Technology Data Exchange (ETDEWEB)

    Tyler, K.K.

    1992-06-01

    The US Army established the Army Tactical Command and Control System (ATCCS) Experimentation Site (AES) to provide a place where material and combat developers could experiment with command and control systems. The AES conducts fundamental and applied research involving command and control issues using a number of research methods, ranging from large force-level experiments, to controlled laboratory experiments, to studies and analyses. The work summarized in this paper was done by Pacific Northwest Laboratory under task order from the Army Tactical Command and Control System Experimentation Site. The purpose of the task was to develop the functional requirements for army engineer automation and support software, including MCS-ENG. A client, such as an army engineer, has certain needs and requirements of his or her software; these needs must be presented in ways that are readily understandable to the software developer. A requirements analysis then, such as the one described in this paper, is simply the means of communication between those who would use a piece of software and those who would develop it. The analysis from which this paper was derived attempted to bridge the communications gap'' between army combat engineers and software engineers. It sought to derive and state the software needs of army engineers in ways that are meaningful to software engineers. In doing this, it followed a natural sequence of investigation: (1) what does an army engineer do, (2) with which tasks can software help, (3) how much will it cost, and (4) where is the highest payoff This paper demonstrates how each of these questions was addressed during an analysis of the functional requirements of engineer support software. Systems engineering methods are used in a task analysis and a quantitative scoring method was developed to score responses regarding the feasibility of task automation. The paper discusses the methods used to perform utility and cost-benefits estimates.

  9. Proposal for Requirement Validation Criteria and Method Based on Actor Interaction

    Science.gov (United States)

    Hattori, Noboru; Yamamoto, Shuichiro; Ajisaka, Tsuneo; Kitani, Tsuyoshi

    We propose requirement validation criteria and a method based on the interaction between actors in an information system. We focus on the cyclical transitions of one actor's situation against another and clarify observable stimuli and responses based on these transitions. Both actors' situations can be listed in a state transition table, which describes the observable stimuli or responses they send or receive. Examination of the interaction between both actors in the state transition tables enables us to detect missing or defective observable stimuli or responses. Typically, this method can be applied to the examination of the interaction between a resource managed by the information system and its user. As a case study, we analyzed 332 requirement defect reports of an actual system development project in Japan. We found that there were a certain amount of defects regarding missing or defective stimuli and responses, which can be detected using our proposed method if this method is used in the requirement definition phase. This means that we can reach a more complete requirement definition with our proposed method.

  10. Towards Emulation-as-a-Service: Cloud Services for Versatile Digital Object Access

    Directory of Open Access Journals (Sweden)

    Dirk von Suchodoletz

    2013-06-01

    Full Text Available The changing world of IT services opens the chance to more tightly integrate digital long-term preservation into systems, both for commercial and end users. The emergence of cloud offerings re-centralizes services, and end users interact with them remotely through standardized (web-client applications on their various devices. This offers the chance to use partially the same concepts and methods to access obsolete computer environments and allows for more sustainable business processes. In order to provide a large variety of user-friendly remote emulation services, especially in combination with authentic performance and user experience, a distributed system model and architecture is required, suitable to run as a cloud service, allowing for the specialization both of memory institutions and third party service providers.The shift of the usually non-trivial task of the emulation of obsolete software environments from the end user to specialized providers can help to simplify digital preservation and access strategies. Besides offering their users better access to their holdings, libraries and archives may gain new business opportunities to offer services to a third party, such as businesses requiring authentic reproduction of digital objects and processes for legal reasons. This paper discusses cloud concepts as the next logical step for accessing original digital material. Emulation-as-a-Service (EaaS fills the gap between the successful demonstration of emulation strategies as a long term access strategy and it’s perceived availability and usability. EaaS can build upon the ground of research and prototypical implementations of previous projects, and reuse well established remote access technology.In this article we develop requirements and a system model, suitable for a distributed environment. We will discuss the building blocks of the core services as well as requirements regarding access management. Finally, we will try to present a

  11. Average Likelihood Methods of Classification of Code Division Multiple Access (CDMA)

    Science.gov (United States)

    2016-05-01

    subject to code matrices that follows the structure given by (113). [⃗ yR y⃗I ] = √ Es 2L [ GR1 −GI1 GI2 GR2 ] [ QR −QI QI QR ] [⃗ bR b⃗I ] + [⃗ nR n⃗I... QR ] [⃗ b+ b⃗− ] + [⃗ n+ n⃗− ] (115) The average likelihood for type 4 CDMA (116) is a special case of type 1 CDMA with twice the code length and...AVERAGE LIKELIHOOD METHODS OF CLASSIFICATION OF CODE DIVISION MULTIPLE ACCESS (CDMA) MAY 2016 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE

  12. Access to Money and Relation to Women's Use of Family Planning Methods Among Young Married Women in Rural India.

    Science.gov (United States)

    Reed, Elizabeth; Donta, Balaiah; Dasgupta, Anindita; Ghule, Mohan; Battala, Madhusudana; Nair, Saritha; Silverman, Jay; Jadhav, Arun; Palaye, Prajakta; Saggurti, Niranjan; Raj, Anita

    2016-06-01

    Objectives The social positioning (i.e. social status and autonomy) of women in the household facilitates women's access to and decision-making power related to family planning (FP). Women's access to spending money, which may be an indicator of greater social positioning in the household, may also be greater among women who engage in income generating activities for their families, regardless of women's status in the household. However, in both scenarios, access to money may independently afford greater opportunity to obtain family planning services among women. This study seeks to assess whether access to money is associated with FP outcomes independently of women's social positioning in their households. Methods Using survey data from married couples in rural Maharashtra, India (n = 855), crude and adjusted regression was used to assess women's access to their own spending money in relation to past 3 month use of condoms and other forms of contraceptives (pills, injectables, intrauterine device). Results Access to money (59 %) was associated with condom and other contraceptive use (AORs ranged 1.5-1.8). These findings remained significant after adjusting for women's FP decision-making power in the household and mobility to seek FP services. Conclusion While preliminary, findings suggest that access to money may increase women's ability to obtain FP methods, even in contexts where social norms to support women's power in FP decision-making may not be readily adopted.

  13. A Model-driven Role-based Access Control for SQL Databases

    Directory of Open Access Journals (Sweden)

    Raimundas Matulevičius

    2015-07-01

    Full Text Available Nowadays security has become an important aspect in information systems engineering. A mainstream method for information system security is Role-based Access Control (RBAC, which restricts system access to authorised users. While the benefits of RBAC are widely acknowledged, the implementation and administration of RBAC policies remains a human intensive activity, typically postponed until the implementation and maintenance phases of system development. This deferred security engineering approach makes it difficult for security requirements to be accurately captured and for the system’s implementation to be kept aligned with these requirements as the system evolves. In this paper we propose a model-driven approach to manage SQL database access under the RBAC paradigm. The starting point of the approach is an RBAC model captured in SecureUML. This model is automatically translated to Oracle Database views and instead-of triggers code, which implements the security constraints. The approach has been fully instrumented as a prototype and its effectiveness has been validated by means of a case study.

  14. Access 2010 Programmer's Reference

    CERN Document Server

    Hennig, Teresa; Griffith, Geoffrey L

    2010-01-01

    A comprehensive guide to programming for Access 2010 and 2007. Millions of people use the Access database applications, and hundreds of thousands of developers work with Access daily. Access 2010 brings better integration with SQL Server and enhanced XML support; this Wrox guide shows developers how to take advantage of these and other improvements. With in-depth coverage of VBA, macros, and other programming methods for building Access applications, this book also provides real-world code examples to demonstrate each topic.: Access is the leading database that is used worldwide; While VBA rem

  15. A generic method for assignment of reliability scores applied to solvent accessibility predictions

    Directory of Open Access Journals (Sweden)

    Nielsen Morten

    2009-07-01

    Full Text Available Abstract Background Estimation of the reliability of specific real value predictions is nontrivial and the efficacy of this is often questionable. It is important to know if you can trust a given prediction and therefore the best methods associate a prediction with a reliability score or index. For discrete qualitative predictions, the reliability is conventionally estimated as the difference between output scores of selected classes. Such an approach is not feasible for methods that predict a biological feature as a single real value rather than a classification. As a solution to this challenge, we have implemented a method that predicts the relative surface accessibility of an amino acid and simultaneously predicts the reliability for each prediction, in the form of a Z-score. Results An ensemble of artificial neural networks has been trained on a set of experimentally solved protein structures to predict the relative exposure of the amino acids. The method assigns a reliability score to each surface accessibility prediction as an inherent part of the training process. This is in contrast to the most commonly used procedures where reliabilities are obtained by post-processing the output. Conclusion The performance of the neural networks was evaluated on a commonly used set of sequences known as the CB513 set. An overall Pearson's correlation coefficient of 0.72 was obtained, which is comparable to the performance of the currently best public available method, Real-SPINE. Both methods associate a reliability score with the individual predictions. However, our implementation of reliability scores in the form of a Z-score is shown to be the more informative measure for discriminating good predictions from bad ones in the entire range from completely buried to fully exposed amino acids. This is evident when comparing the Pearson's correlation coefficient for the upper 20% of predictions sorted according to reliability. For this subset, values of 0

  16. Effect of Perceptual Load on Semantic Access by Speech in Children

    Science.gov (United States)

    Jerger, Susan; Damian, Markus F.; Mills, Candice; Bartlett, James; Tye-Murray, Nancy; Abdi, Herve

    2013-01-01

    Purpose: To examine whether semantic access by speech requires attention in children. Method: Children ("N" = 200) named pictures and ignored distractors on a cross-modal (distractors: auditory-no face) or multimodal (distractors: auditory-static face and audiovisual- dynamic face) picture word task. The cross-modal task had a low load,…

  17. 45 CFR 1183.42 - Retention and access requirements for records.

    Science.gov (United States)

    2010-10-01

    ... FOUNDATION ON THE ARTS AND THE HUMANITIES INSTITUTE OF MUSEUM AND LIBRARY SERVICES UNIFORM ADMINISTRATIVE... (c) of this section. (2) If any litigation, claim, negotiation, audit or other action involving the... to make audits, examinations, excerpts, and transcripts. (2) Expiration of right of access. The...

  18. 45 CFR 1174.42 - Retention and access requirements for records.

    Science.gov (United States)

    2010-10-01

    ... FOUNDATION ON THE ARTS AND THE HUMANITIES NATIONAL ENDOWMENT FOR THE HUMANITIES UNIFORM ADMINISTRATIVE... (c) of this section. (2) If any litigation, claim, negotiation, audit or other action involving the... to make audits, examinations, excerpts, and transcripts. (2) Expiration of right of access. The...

  19. Accessibility issues with long-term disabilities.

    Science.gov (United States)

    Sebring-Cale, Nancy J

    2008-06-01

    Home modifications for barrier-free accessibility will assist the physically challenged populations by increasing their independence. By providing an accessible environment, an individual can become more independent and require less assistance for functional activities, such as kitchen appliance access, door widening, open floor plan, elevated electric outlets, roll-under sinks, roll-in showers and MobiLife elevating wheelchair.

  20. Synthesizing qualitative and quantitative evidence on non-financial access barriers: implications for assessment at the district level.

    Science.gov (United States)

    O'Connell, Thomas S; Bedford, K Juliet A; Thiede, Michael; McIntyre, Di

    2015-06-09

    A key element of the global drive to universal health coverage is ensuring access to needed health services for everyone, and to pursue this goal in an equitable way. This requires concerted efforts to reduce disparities in access through understanding and acting on barriers facing communities with the lowest utilisation levels. Financial barriers dominate the empirical literature on health service access. Unless the full range of access barriers are investigated, efforts to promote equitable access to health care are unlikely to succeed. This paper therefore focuses on exploring the nature and extent of non-financial access barriers. We draw upon two structured literature reviews on barriers to access and utilization of maternal, newborn and child health services in Ghana, Bangladesh, Vietnam and Rwanda. One review analyses access barriers identified in published literature using qualitative research methods; the other in published literature using quantitative analysis of household survey data. We then synthesised the key qualitative and quantitative findings through a conjoint iterative analysis. Five dominant themes on non-financial access barriers were identified: ethnicity; religion; physical accessibility; decision-making, gender and autonomy; and knowledge, information and education. The analysis highlighted that non-financial factors pose considerable barriers to access, many of which relate to the acceptability dimension of access and are challenging to address. Another key finding is that quantitative research methods, while yielding important findings, are inadequate for understanding non-financial access barriers in sufficient detail to develop effective responses. Qualitative research is critical in filling this gap. The analysis also indicates that the nature of non-financial access barriers vary considerably, not only between countries but also between different communities within individual countries. To adequately understand access barriers as a

  1. Moving toward a universally accessible web: Web accessibility and education.

    Science.gov (United States)

    Kurt, Serhat

    2017-12-08

    The World Wide Web is an extremely powerful source of information, inspiration, ideas, and opportunities. As such, it has become an integral part of daily life for a great majority of people. Yet, for a significant number of others, the internet offers only limited value due to the existence of barriers which make accessing the Web difficult, if not impossible. This article illustrates some of the reasons that achieving equality of access to the online world of education is so critical, explores the current status of Web accessibility, discusses evaluative tools and methods that can help identify accessibility issues in educational websites, and provides practical recommendations and guidelines for resolving some of the obstacles that currently hinder the achievability of the goal of universal Web access.

  2. The evaluation of radiologic methods for access guidance in percutaneous nephrolithotomy: a systematic review of the literature.

    Science.gov (United States)

    Breda, Alberto; Territo, Angelo; Scoffone, Cesare; Seitz, Christian; Knoll, Thomas; Herrmann, Thomas; Brehmer, Mariannhe; Osther, Palle J S; Liatsikos, Evangelos

    2017-11-12

    Percutaneous nephrolithotomy (PNL) is the treatment of choice for larger and complex renal calculi. First step in performing PNL is to obtain access to the renal cavity using either fluoroscopy or ultrasound (US) guidance or a combination of both. Which guiding method to choose is controversial? A systematic review of the literature was performed comparing image guidance modalities for obtaining access in PNL. Evidence acquisition and synthesis: A PubMed, Scopus and Cochrane search for peer-reviewed studies was performed using the keywords "ultrasound" AND "fluoroscopy" AND "Percutaneous nephrolithotomy". Eligible articles were reviewed according to PRISMA criteria. Two hundred and forty records were identified using the keywords. Of these twelve studies were considered relevant. US guidance seems to be associated with a slightly lower complication rate, which may be related to fewer puncture attempts needed for obtaining access and to better peri-renal organ visualization. On the other hand, US-guidance alone needs the adjunct of fluoroscopy in a significant number of cases for achieving access. Stone free rate (SFR) was comparable between groups. Using US for renal access unequivocally reduces radiation exposure. Current evidence indicates that both fluoroscopy and US guidance may be successfully used for obtaining percutaneous renal access. Combining the image-guiding modalities - US and fluoroscopy - seems to increase outcome in PNL both with regard to success in achieving access and reducing complications. Furthermore, including US in the access strategy of PNL reduces radiation exposure to surgeon and staff as well as patients.

  3. Solvent Flux Method (SFM): A Case Study of Water Access to Candida antarctica Lipase B.

    Science.gov (United States)

    Benson, Sven P; Pleiss, Jürgen

    2014-11-11

    The solvent flux method (SFM) was developed to comprehensively characterize the influx of solvent molecules from the solvent environment into the active site of a protein in the framework of molecular dynamics simulations. This was achieved by introducing a solvent concentration gradient as well as partially reorienting and rescaling the velocity vector of all solvent molecules contained within a spherical volume enclosing the protein, thus inducing an accelerated solvent influx toward the active site. In addition to the detection of solvent access pathway within the protein structure, it is hereby possible to identify potential amino acid positions relevant to solvent-related enzyme engineering with high statistical significance. The method is particularly aimed at improving the reverse hydrolysis reaction rates in nonaqueous media. Candida antarctica lipase B (CALB) binds to a triglyceride-water interface with its substrate entrance channel oriented toward the hydrophobic substrate interface. The lipase-triglyceride-water system served as a model system for SFM to evaluate the influx of water molecules to the active site. As a proof of principle for SFM, a previously known water access pathway in CALB was identified as the primary water channel. In addition, a secondary water channel and two pathways for water access which contribute to water leakage between the protein and the triglyceride-water interface were identified.

  4. Spanish-language community-based mental health treatment programs, policy-required language-assistance programming, and mental health treatment access among Spanish-speaking clients.

    Science.gov (United States)

    Snowden, Lonnie R; McClellan, Sean R

    2013-09-01

    We investigated the extent to which implementing language assistance programming through contracting with community-based organizations improved the accessibility of mental health care under Medi-Cal (California's Medicaid program) for Spanish-speaking persons with limited English proficiency, and whether it reduced language-based treatment access disparities. Using a time series nonequivalent control group design, we studied county-level penetration of language assistance programming over 10 years (1997-2006) for Spanish-speaking persons with limited English proficiency covered under Medi-Cal. We used linear regression with county fixed effects to control for ongoing trends and other influences. When county mental health plans contracted with community-based organizations, those implementing language assistance programming increased penetration rates of Spanish-language mental health services under Medi-Cal more than other plans (0.28 percentage points, a 25% increase on average; P language-related disparities. Mental health treatment programs operated by community-based organizations may have moderately improved access after implementing required language assistance programming, but the programming did not reduce entrenched disparities in the accessibility of mental health services.

  5. Architectures for a quantum random access memory

    OpenAIRE

    Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo

    2008-01-01

    A random access memory, or RAM, is a device that, when interrogated, returns the content of a memory location in a memory array. A quantum RAM, or qRAM, allows one to access superpositions of memory sites, which may contain either quantum or classical information. RAMs and qRAMs with n-bit addresses can access 2^n memory sites. Any design for a RAM or qRAM then requires O(2^n) two-bit logic gates. At first sight this requirement might seem to make large scale quantum versions of such devices ...

  6. 78 FR 10166 - Access Interpreting; Transfer of Data

    Science.gov (United States)

    2013-02-13

    ... regulations. Access Interpreting has been awarded a contract to perform work for OPP, and access to this information will enable Access Interpreting to fulfill the obligations of the contract. DATES: Access.... Contractor Requirements Under Contract No. EP10H000109, this contract is to provide the Environmental...

  7. Teens' Survey of Stores in the District of Columbia on Accessibility of Family Planning Methods.

    Science.gov (United States)

    Center for Population Options, Washington, DC.

    Access to and availability of contraceptive methods in stores play an important role in the prevention of AIDS, unwanted pregnancies, and other sexually transmitted diseases. Although teens are generally knowledgable about birth control, many encounter barriers when attempting to obtain contraceptive. Forty-five drug stores and 15 convenience…

  8. Ultrasonography-guided peripheral intravenous access versus traditional approaches in patients with difficult intravenous access.

    Science.gov (United States)

    Costantino, Thomas G; Parikh, Aman K; Satz, Wayne A; Fojtik, John P

    2005-11-01

    We assess the success rate of emergency physicians in placing peripheral intravenous catheters in difficult-access patients who were unsuccessfully cannulated by emergency nurses. A technique using real-time ultrasonographic guidance by 2 physicians was compared with traditional approaches using palpation and landmark guidance. This was a prospective, systematically allocated study of all patients requiring intravenous access who presented to 2 university hospitals between October 2003 and March 2004. Inclusion criterion was the inability of any available nurse to obtain intravenous access after at least 3 attempts on a subgroup of patients who had a history of difficult intravenous access because of obesity, history of intravenous drug abuse, or chronic medical problems. Exclusion criterion was the need for central venous access. Patients presenting on odd days were allocated to the ultrasonographic-guided group, and those presenting on even days were allocated to the traditional-approach group. Endpoints were successful cannulation, number of sticks, time, and patient satisfaction. Sixty patients were enrolled, 39 on odd days and 21 on even days. Success rate was greater for the ultrasonographic group (97%) versus control (33%), difference in proportions of 64% (95% confidence interval [CI] 39% to 71%). The ultrasonographic group required less overall time (13 minutes versus 30 minutes, for a difference of 17 [95% CI 0.8 to 25.6]), less time to successful cannulation from first percutaneous puncture (4 minutes versus 15 minutes, for a difference of 11 [95% CI 8.2 to 19.4]), and fewer percutaneous punctures (1.7 versus 3.7, for a difference of 2.0 [95% CI 1.27 to 2.82]) and had greater patient satisfaction (8.7 versus 5.7, for a difference of 3.0 [95% CI 1.82 to 4.29]) than the traditional landmark approach. Ultrasonographic-guided peripheral intravenous access is more successful than traditional "blind" techniques, requires less time, decreases the number of

  9. Is open access sufficient? A review of the quality of open-access nursing journals.

    Science.gov (United States)

    Crowe, Marie; Carlyle, Dave

    2015-02-01

    The present study aims to review the quality of open-access nursing journals listed in the Directory of Open Access Journals that published papers in 2013 with a nursing focus, written in English, and were freely accessible. Each journal was reviewed in relation to their publisher, year of commencement, number of papers published in 2013, fee for publication, indexing, impact factor, and evidence of requirements for ethics and disclosure statements. The quality of the journals was assessed by impact factors and the requirements for indexing in PubMed. A total of 552 were published in 2013 in the 19 open-access nursing journals that met the inclusion criteria. No journals had impact factors listed in Web of Knowledge, but three had low Scopus impact factors. Only five journals were indexed with PubMed. The quality of the 19 journals included in the review was evaluated as inferior to most subscription-fee journals. Mental health nursing has some responsibility to the general public, and in particular, consumers of mental health services and their families, for the quality of papers published in open-access journals. The way forward might involve dual-platform publication or a process that enables assessment of how research has improved clinical outcomes. © 2014 Australian College of Mental Health Nurses Inc.

  10. Determination of fuel irradiation parameters. Required accuracies and available methods

    International Nuclear Information System (INIS)

    Mas, P.

    1977-01-01

    This paper reports on the present point of some main methods to determine the nuclear parameters of fuel irradiation in testing reactors (nuclear power, burn up, ...) The different methods (theoretical or experimental) are reviewed: neutron measurements and calculations, gamma scanning, heat balance, ... . The required accuracies are reviewed: they are of 3-5 % on flux, fluences, nuclear power, burn-up, conversion factor. These required accuracies are compared with the real accuracies available which are the present time of order of 5-20 % on these parameters

  11. Determination of material irradiation parameters. Required accuracies and available methods

    International Nuclear Information System (INIS)

    Cerles, J.M.; Mas, P.

    1978-01-01

    In this paper, the author reports some main methods to determine the nuclear parameters of material irradiation in testing reactor (nuclear power, burn-up, fluxes, fluences, ...). The different methods (theoretical or experimental) are reviewed: neutronics measurements and calculations, gamma scanning, thermal balance, ... The required accuracies are reviewed: they are of 3-5% on flux, fluences, nuclear power, burn-up, conversion factor, ... These required accuracies are compared with the real accuracies available which are at the present time of order of 5-20% on these parameters

  12. Comparison of Radial Access, Guided Femoral Access, and Non-Guided Femoral Access Among Women Undergoing Percutaneous Coronary Intervention.

    Science.gov (United States)

    Koshy, Linda M; Aberle, Laura H; Krucoff, Mitchell W; Hess, Connie N; Mazzaferri, Ernest; Jolly, Sanjit S; Jacobs, Alice; Gibson, C Michael; Mehran, Roxana; Gilchrist, Ian C; Rao, Sunil V

    2018-01-01

    This study was conducted to determine the association between radial access, guided femoral access, and non-guided femoral access on postprocedural bleeding and vascular complications after percutaneous coronary intervention (PCI). Bleeding events and major vascular complications after PCI are associated with increased morbidity, mortality, and cost. While the radial approach has been shown to be superior to the femoral approach in reducing bleeding and vascular complications, whether the use of micropuncture, fluoroscopy, or ultrasound mitigates these differences is unknown. We conducted a post hoc analysis of women in the SAFE-PCI for Women trial who underwent PCI and had the access method identified (n = 643). The primary endpoint of postprocedure bleeding or vascular complications occurring within 72 hours or at discharge was adjudicated by an independent clinical events committee and was compared based on three categories of access technique: radial, guided femoral (fluoroscopy, micropuncture, ultrasound), or non-guided femoral (none of the aforementioned). Differences between the groups were determined using multivariate logistic regression using radial access as the reference. Of the PCI population, 330 underwent radial access, 228 underwent guided femoral access, and 85 underwent non-guided femoral access. There was a statistically significant lower incidence of the primary endpoint with radial access vs non-guided femoral access; however, there was no significant difference between radial approach and femoral access guided by fluoroscopy, micropuncture, or ultrasound. This post hoc analysis demonstrates that while radial access is safer than non-guided femoral access, guided femoral access appears to be associated with similar bleeding events or vascular complications as radial access.

  13. Access to Money and Relation to Women’s Use of Family Planning Methods among Young Married Women in Rural India

    Science.gov (United States)

    Reed, Elizabeth; Donta, Balaiah; Dasgupta, Anindita; Ghule, Mohan; Battala, Madhusudana; Nair, Saritha; Silverman, Jay; Jadhav, Arun; Palaye, Prajakta; Saggurti, Niranjan; Raj, Anita

    2016-01-01

    Objectives The social positioning (i.e. social status and autonomy) of women in the household facilitates women’s access to and decision-making power related to family planning (FP). Women’s access to spending money, which may be an indicator of greater social positioning in the household, may also be greater among women who engage in income generating activities for their families, regardless of women’s status in the household. However, in both scenarios, access to money may independently afford greater opportunity to obtain family planning services among women. This study seeks to assess whether access to money is associated with FP outcomes independently of women’s social positioning in their households. Methods Using survey data from married couples in rural Maharashtra, India (n=855), crude and adjusted regression was used to assess women’s access to their own spending money in relation to past 3 month use of condoms and other forms of contraceptives (pills, injectables, intrauterine device). Results Access to money (59%) was associated with condom and other contraceptive use (AORs ranged: 1.5 – 1.8). These findings remained significant after adjusting for women’s FP decision-making power in the household and mobility to seek FP services. Conclusion While preliminary, findings suggest that access to money may increase women’s ability to obtain FP methods, even in contexts where social norms to support women’s power in FP decision-making may not be readily adopted. PMID:26971270

  14. Access Control Management for SCADA Systems

    Science.gov (United States)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  15. A spectral nudging method for the ACCESS1.3 atmospheric model

    Science.gov (United States)

    Uhe, P.; Thatcher, M.

    2015-06-01

    A convolution-based method of spectral nudging of atmospheric fields is developed in the Australian Community Climate and Earth Systems Simulator (ACCESS) version 1.3 which uses the UK Met Office Unified Model version 7.3 as its atmospheric component. The use of convolutions allow for flexibility in application to different atmospheric grids. An approximation using one-dimensional convolutions is applied, improving the time taken by the nudging scheme by 10-30 times compared with a version using a two-dimensional convolution, without measurably degrading its performance. Care needs to be taken in the order of the convolutions and the frequency of nudging to obtain the best outcome. The spectral nudging scheme is benchmarked against a Newtonian relaxation method, nudging winds and air temperature towards ERA-Interim reanalyses. We find that the convolution approach can produce results that are competitive with Newtonian relaxation in both the effectiveness and efficiency of the scheme, while giving the added flexibility of choosing which length scales to nudge.

  16. Functional Mobility Testing: A Novel Method to Create Suit Design Requirements

    Science.gov (United States)

    England, Scott A.; Benson, Elizabeth A.; Rajulu, Sudhakar L.

    2008-01-01

    This study was performed to aide in the creation of design requirements for the next generation of space suits that more accurately describe the level of mobility necessary for a suited crewmember through the use of an innovative methodology utilizing functional mobility. A novel method was utilized involving the collection of kinematic data while 20 subjects (10 male, 10 female) performed pertinent functional tasks that will be required of a suited crewmember during various phases of a lunar mission. These tasks were selected based on relevance and criticality from a larger list of tasks that may be carried out by the crew. Kinematic data was processed through Vicon BodyBuilder software to calculate joint angles for the ankle, knee, hip, torso, shoulder, elbow, and wrist. Maximum functional mobility was consistently lower than maximum isolated mobility. This study suggests that conventional methods for establishing design requirements for human-systems interfaces based on maximal isolated joint capabilities may overestimate the required mobility. Additionally, this method provides a valuable means of evaluating systems created from these requirements by comparing the mobility available in a new spacesuit, or the mobility required to use a new piece of hardware, to this newly established database of functional mobility.

  17. Pulse patterning effect in optical pulse division multiplexing for flexible single wavelength multiple access optical network

    Science.gov (United States)

    Jung, Sun-Young; Kim, Chang-Hun; Han, Sang-Kook

    2018-05-01

    A demand for high spectral efficiency requires multiple access within a single wavelength, but the uplink signals are significantly degraded because of optical beat interference (OBI) in intensity modulation/direct detection system. An optical pulse division multiplexing (OPDM) technique was proposed that could effectively reduce the OBI via a simple method as long as near-orthogonality is satisfied, but the condition was strict, and thus, the number of multiplexing units was very limited. We propose pulse pattern enhanced OPDM (e-OPDM) to reduce the OBI and improve the flexibility in multiple access within a single wavelength. The performance of the e-OPDM and patterning effect are experimentally verified after 23-km single mode fiber transmission. By employing pulse patterning in OPDM, the tight requirement was relaxed by extending the optical delay dynamic range. This could support more number of access with reduced OBI, which could eventually enhance a multiple access function.

  18. PVD and gas production: consider local resource access requirements

    International Nuclear Information System (INIS)

    Delafosse, E.

    1993-01-01

    The history of the natural gas industry worldwide teaches us that its development has sprung mainly from two sources: favorable contingent conditions, such as in the United States, where the discovery of large gas fields coincided favorably with technological progress and the already existing city gas distribution networks, as also happened in Italy and France; and political prodding, as in the Eastern European countries, in Japan, and certain countries of Western Europe too. Today, while natural gas is winning over more and more consumers and the infrastructures now exist, the rise in consumption is being held back by supply-related constraints, and namely the problem of adjusting to the rise in gas prices in the United States, and the distancing of the resources from Europe. In this context, the development of new gas markets in the developing countries could contribute to the continuous growth of the world natural gas industry. The resources do exist, and the possibility of generating electricity with them opens the way to creating or developing this industry in some twenty developing countries, to begin with, and a greater number later. For these countries, this perspective is highly enticing, economically; but development is slow, partly due to the fact that the specific requirements of gas production projects are not satisfied. The contractual and tax structure governing their implementation does not reflect the fact that, in contrast to the petroleum industry, the producer does not have access to a true market, and he is in fact only one of the wheels in an integrated production mechanism bent specifically on putting electrical power on the market. It is easy to see the difficulties that arise from such a situation, since the indispensable steps in the process, performed successively by producer, transporter, and electric company, use two interfaces with fields of business that are in close bilateral dependency. This leads to upstream inefficiency in

  19. Action research to improve methods of delivery and feedback in an Access Grid Room environment

    Science.gov (United States)

    McArthur, Lynne C.; Klass, Lara; Eberhard, Andrew; Stacey, Andrew

    2011-12-01

    This article describes a qualitative study which was undertaken to improve the delivery methods and feedback opportunity in honours mathematics lectures which are delivered through Access Grid Rooms. Access Grid Rooms are facilities that provide two-way video and audio interactivity across multiple sites, with the inclusion of smart boards. The principal aim was to improve the student learning experience, given the new environment. The specific aspects of the course delivery that the study focused on included presentation of materials and provision of opportunities for interaction between the students and between students and lecturers. The practical considerations in the delivery of distance learning are well documented in the literature, and similar problems arise in the Access Grid Room environment; in particular, those of limited access to face-to-face interaction and the reduction in peer support. The nature of the Access Grid Room classes implies that students studying the same course can be physically situated in different cities, and possibly in different countries. When studying, it is important that students have opportunity to discuss new concepts with others; particularly their peers and their lecturer. The Access Grid Room environment also presents new challenges for the lecturer, who must learn new skills in the delivery of materials. The unique nature of Access Grid Room technology offers unprecedented opportunity for effective course delivery and positive outcomes for students, and was developed in response to a need to be able to interact with complex data, other students and the instructor, in real-time, at a distance and from multiple sites. This is a relatively new technology and as yet there has been little or no studies specifically addressing the use and misuse of the technology. The study found that the correct placement of cameras and the use of printed material and smart boards were all crucial to the student experience. In addition, the

  20. Health care access for rural youth on equal terms? A mixed methods study protocol in northern Sweden.

    Science.gov (United States)

    Goicolea, Isabel; Carson, Dean; San Sebastian, Miguel; Christianson, Monica; Wiklund, Maria; Hurtig, Anna-Karin

    2018-01-11

    The purpose of this paper is to propose a protocol for researching the impact of rural youth health service strategies on health care access. There has been no published comprehensive assessment of the effectiveness of youth health strategies in rural areas, and there is no clearly articulated model of how such assessments might be conducted. The protocol described here aims to gather information to; i) Assess rural youth access to health care according to their needs, ii) Identify and understand the strategies developed in rural areas to promote youth access to health care, and iii) Propose actions for further improvement. The protocol is described with particular reference to research being undertaken in the four northernmost counties of Sweden, which contain a widely dispersed and diverse youth population. The protocol proposes qualitative and quantitative methodologies sequentially in four phases. First, to map youth access to health care according to their health care needs, including assessing horizontal equity (equal use of health care for equivalent health needs,) and vertical equity (people with greater health needs should receive more health care than those with lesser needs). Second, a multiple case study design investigates strategies developed across the region (youth clinics, internet applications, public health programs) to improve youth access to health care. Third, qualitative comparative analysis of the 24 rural municipalities in the region identifies the best combination of conditions leading to high youth access to health care. Fourth, a concept mapping study involving rural stakeholders, care providers and youth provides recommended actions to improve rural youth access to health care. The implementation of this research protocol will contribute to 1) generating knowledge that could contribute to strengthening rural youth access to health care, as well as to 2) advancing the application of mixed methods to explore access to health care.

  1. Geospacial information utilized under the access control strategy

    Institute of Scientific and Technical Information of China (English)

    TIAN Jie; ZHANG Xin-fang; WANG Tong-yang; XIANG Wei; Cheng Ming

    2007-01-01

    This paper introduces a solution to the secure requirement for digital rights management (DRM) by the way of geospacial access control named geospacial access control (GeoAC) in geospacial field. The issues of authorization for geospacial DRM are concentrated on. To geospacial DRM, one aspect is the declaration and enforcement of access rights, based on geographic aspects. To the approbation of digital geographic content, it is important to adopt online access to geodata through a spacial data infrastructure (SDI). This results in the interoperability requirements on three different levels: data model level, service level and access control level. The interaction between the data model and service level can be obtained by criterions of the open geospacial consortium (OGC), and the interaction of the access control level may be reached by declaring and enforcing access restrictions in GeoAC. Then an archetype enforcement based on GeoAC is elucidated. As one aspect of performing usage rights, the execution of access restrictions as an extension to a regular SDI is illuminated.

  2. Web accessibility standards and disability: developing critical perspectives on accessibility.

    Science.gov (United States)

    Lewthwaite, Sarah

    2014-01-01

    accessibility blending digital and physical solutions, the use of BS 8878 and mixed-method approaches to accessibility benchmarking. Web standards and accessibility conformance should be considered together with user input and the recognition and development of local accessibility and rehabilitation expertize.

  3. Software Safety Analysis of Digital Protection System Requirements Using a Qualitative Formal Method

    International Nuclear Information System (INIS)

    Lee, Jang-Soo; Kwon, Kee-Choon; Cha, Sung-Deok

    2004-01-01

    The safety analysis of requirements is a key problem area in the development of software for the digital protection systems of a nuclear power plant. When specifying requirements for software of the digital protection systems and conducting safety analysis, engineers find that requirements are often known only in qualitative terms and that existing fault-tree analysis techniques provide little guidance on formulating and evaluating potential failure modes. A framework for the requirements engineering process is proposed that consists of a qualitative method for requirements specification, called the qualitative formal method (QFM), and a safety analysis method for the requirements based on causality information, called the causal requirements safety analysis (CRSA). CRSA is a technique that qualitatively evaluates causal relationships between software faults and physical hazards. This technique, extending the qualitative formal method process and utilizing information captured in the state trajectory, provides specific guidelines on how to identify failure modes and the relationship among them. The QFM and CRSA processes are described using shutdown system 2 of the Wolsong nuclear power plants as the digital protection system example

  4. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  5. 5 CFR 610.404 - Requirement for time-accounting method.

    Science.gov (United States)

    2010-01-01

    ... REGULATIONS HOURS OF DUTY Flexible and Compressed Work Schedules § 610.404 Requirement for time-accounting method. An agency that authorizes a flexible work schedule or a compressed work schedule under this...

  6. Effective teaching methods in higher education: requirements and barriers

    Directory of Open Access Journals (Sweden)

    NAHID SHIRANI BIDABADI

    2016-10-01

    Full Text Available Introduction: Teaching is one of the main components in educational planning which is a key factor in conducting educational plans. Despite the importance of good teaching, the outcomes are far from ideal. The present qualitative study aimed to investigate effective teaching in higher education in Iran based on the experiences of best professors in the country and the best local professors of Isfahan University of Technology. Methods: This qualitative content analysis study was conducted through purposeful sampling. Semi-structured interviews were conducted with ten faculty members (3 of them from the best professors in the country and 7 from the best local professors. Content analysis was performed by MAXQDA software. The codes, categories and themes were explored through an inductive process that began from semantic units or direct quotations to general themes. Results: According to the results of this study, the best teaching approach is the mixed method (student-centered together with teacher-centered plus educational planning and previous readiness. But whenever the teachers can teach using this method confront with some barriers and requirements; some of these requirements are prerequisite in professors’ behavior and some of these are prerequisite in professors’ outlook. Also, there are some major barriers, some of which are associated with the professors’ operation and others are related to laws and regulations. Implications of these findings for teachers’ preparation in education are discussed. Conclusion: In the present study, it was illustrated that a good teaching method helps the students to question their preconceptions, and motivates them to learn, by putting them in a situation in which they come to see themselves as the authors of answers, as the agents of responsibility for change. But training through this method has some barriers and requirements. To have an effective teaching; the faculty members of the universities

  7. Access to Investigational Drugs: FDA Expanded Access Programs or "Right-to-Try" Legislation?

    Science.gov (United States)

    Holbein, M E Blair; Berglund, Jelena P; Weatherwax, Kevin; Gerber, David E; Adamo, Joan E

    2015-10-01

    The Food and Drug Administration Expanded Access (EA) program and "Right-to-Try" legislation aim to provide seriously ill patients who have no other comparable treatment options to gain access to investigational drugs and biological agents. Physicians and institutions need to understand these programs to respond to questions and requests for access. FDA EA programs and state and federal legislative efforts to provide investigational products to patients by circumventing FDA regulations were summarized and compared. The FDA EA program includes Single Patient-Investigational New Drug (SP-IND), Emergency SP-IND, Intermediate Sized Population IND, and Treatment IND. Approval rates for all categories exceed 99%. Approval requires FDA and Institutional Review Board (IRB) approval, and cooperation of the pharmaceutical partner is essential. "Right-to-Try" legislation bypasses some of these steps, but provides no regulatory or safety oversight. The FDA EA program is a reasonable option for patients for whom all other therapeutic interventions have failed. The SP-IND not only provides patient access to new drugs, but also maintains a balance between immediacy and necessary patient protection. Rather than circumventing existing FDA regulations through proposed legislation, it seems more judicious to provide the knowledge and means to meet the EA requirements. © 2015 Wiley Periodicals, Inc.

  8. Open access and beyond

    Directory of Open Access Journals (Sweden)

    Das Chhaya

    2006-09-01

    Full Text Available Abstract Uncensored exchange of scientific results hastens progress. Open Access does not stop at the removal of price and permission barriers; still, censorship and reading disabilities, to name a few, hamper access to information. Here, we invite the scientific community and the public to discuss new methods to distribute, store and manage literature in order to achieve unfettered access to literature.

  9. Implementation of accessible tourism concept at museums in Jakarta

    Science.gov (United States)

    Wiastuti, R. D.; Adiati, M. P.; Lestari, N. S.

    2018-03-01

    Accessibility, sustainability and equitable participation by all makeup what is known as Tourism for All. Tourism product must be designed for all people despite the age, gender and ability as one of the requirements to comply the accessible tourism concept. Museum as one of the elements of tourism chain must adhere to accessible tourism concept thus able to be enjoyed for everyone regardless of one’s abilities. The aim of this study is to identify the implementation of accessible tourism concept at the museum in Jakarta and to provide practical accessibility- improvement measures for the museum in Jakarta towards accessible tourism concept. This research is qualitative- explorative research. Jakarta Tourism Board website was used as the main reference to obtain which museum that was selected. Primary data collect from direct field observations and interview. The results outline museum implementation of accessible tourism that classified into five criteria; information, transport, common requirements, universal design, and accessibility. The implication of this study provides recommendations to enhance museums’ accessibility performance expected to be in line with accessible tourism concept.

  10. Rapid methods for jugular bleeding of dogs requiring one technician.

    Science.gov (United States)

    Frisk, C S; Richardson, M R

    1979-06-01

    Two methods were used to collect blood from the jugular vein of dogs. In both techniques, only one technician was required. A rope with a slip knot was placed around the base of the neck to assist in restraint and act as a tourniquet for the vein. The technician used one hand to restrain the dog by the muzzle and position the head. The other hand was used for collecting the sample. One of the methods could be accomplished with the dog in its cage. The bleeding techniques were rapid, requiring approximately 1 minute per dog.

  11. Identity and Access Management and Security in Higher Education.

    Science.gov (United States)

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…

  12. Requirements on Long-Term Accessibility and Preservation of Research Results with Particular Regard to Their Provenance

    Directory of Open Access Journals (Sweden)

    Andreas Weber

    2016-04-01

    Full Text Available Since important national and international funders of research projects require statements on the long-term accessibility of research results, many new solutions appeared to fulfil these demands. The solutions are implemented on various scopes, starting from specific solutions for one research group up to solutions with a national focus (i.e., the RADAR project. While portals for globally standardized research data (e.g., climate data are available, there is currently no provision for the large amount of data resulting from specialized research in individual research foci, the so called long-tail of sciences. In this article we describe the considerations regarding the implementation of a local research data repository for the Collaborative Research Centre (CRC 840. The main focus will be on the examination of requirements for, and an agenda of, a possible technical implementation. Requirements were derived from a more theoretical examination of similar projects and relevant literature, diverse discussions with researchers and project leaders, by analysis of existing publication data, and finally the prototypical implementation with refining iterations. Notably, the discussions with the researchers lead to new features going beyond the challenges of the mere long-term preservation of research data. Besides the need for an infrastructure that permits long-term preservation and retrieval of research data, our system will allow the reconstruction of the complete provenance of published research results. This requirement is a serious diversification of the problem, because it creates the need to qualify additional transformation data, describing the transformation process from primary research data to research results.

  13. Fire Source Accessibility of Water Mist Fire Suppression Improvement through Flow Method Control

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Jun Ho; Kim, Hyeong Taek; Kim, Yun Jung; Park, Mun Hee [KHNP CRI, Daejeon (Korea, Republic of)

    2013-10-15

    Recently, nuclear power plants set CO{sub 2} fire suppression system. However it is hard to establish and to maintain and it also has difficulties performing function test. Therefore, it needs to develop a new fire suppression system to replace the existing CO{sub 2} fire suppression systems in nuclear power plant. In fact, already, there exist alternatives - gas fire suppression system or clean fire extinguishing agent, but it is hard to apply because it requires a highly complicated plan. However, water mist fire suppression system which has both water system and gas system uses small amount of water and droplet, so it is excellent at oxygen displacement and more suitable for nuclear power plant because it can avoid second damage caused by fire fighting water. This paper explains about enclosure effect of water mist fire suppression. And it suggests a study direction about water mist fire source approach improvement and enclosure effect improvement, using flow method control of ventilation system. Water mist fire suppression can be influenced by various variable. And flow and direction of ventilation system are important variable. Expectations of the plan for more fire source ventilation system is as in the following. It enhances enclosure effects of water mists, so it improves extinguish performance. Also the same effect as a inert gas injection causes can be achieved. Lastly, it is considered that combustible accessibility of water mists will increase because of descending air currents.

  14. Accessibility of dynamic web applications with emphasis on visually impaired users

    Directory of Open Access Journals (Sweden)

    Kingsley Okoye

    2014-09-01

    Full Text Available As the internet is fast migrating from static web pages to dynamic web pages, the users with visual impairment find it confusing and challenging when accessing the contents on the web. There is evidence that dynamic web applications pose accessibility challenges for the visually impaired users. This study shows that a difference can be made through the basic understanding of the technical requirement of users with visual impairment and addresses a number of issues pertinent to the accessibility needs for such users. We propose that only by designing a framework that is structurally flexible, by removing unnecessary extras and thereby making every bit useful (fit-for-purpose, will visually impaired users be given an increased capacity to intuitively access e-contents. This theory is implemented in a dynamic website for the visually impaired designed in this study. Designers should be aware of how the screen reading software works to enable them make reasonable adjustments or provide alternative content that still corresponds to the objective content to increase the possibility of offering faultless service to such users. The result of our research reveals that materials can be added to a content repository or re-used from existing ones by identifying the content types and then transforming them into a flexible and accessible one that fits the requirements of the visually impaired through our method (no-frill + agile methodology rather than computing in advance or designing according to a given specification.

  15. Availability and Accessibility in an Open Access Institutional Repository: A Case Study

    Science.gov (United States)

    Lee, Jongwook; Burnett, Gary; Vandegrift, Micah; Baeg, Jung Hoon; Morris, Richard

    2015-01-01

    Introduction: This study explores the extent to which an institutional repository makes papers available and accessible on the open Web by using 170 journal articles housed in DigiNole Commons, the institutional repository at Florida State University. Method: To analyse the repository's impact on availability and accessibility, we conducted…

  16. A spectral nudging method for the ACCESS1.3 atmospheric model

    Directory of Open Access Journals (Sweden)

    P. Uhe

    2015-06-01

    Full Text Available A convolution-based method of spectral nudging of atmospheric fields is developed in the Australian Community Climate and Earth Systems Simulator (ACCESS version 1.3 which uses the UK Met Office Unified Model version 7.3 as its atmospheric component. The use of convolutions allow for flexibility in application to different atmospheric grids. An approximation using one-dimensional convolutions is applied, improving the time taken by the nudging scheme by 10–30 times compared with a version using a two-dimensional convolution, without measurably degrading its performance. Care needs to be taken in the order of the convolutions and the frequency of nudging to obtain the best outcome. The spectral nudging scheme is benchmarked against a Newtonian relaxation method, nudging winds and air temperature towards ERA-Interim reanalyses. We find that the convolution approach can produce results that are competitive with Newtonian relaxation in both the effectiveness and efficiency of the scheme, while giving the added flexibility of choosing which length scales to nudge.

  17. 40 CFR 63.344 - Performance test requirements and test methods.

    Science.gov (United States)

    2010-07-01

    ... electroplating tanks or chromium anodizing tanks. The sampling time and sample volume for each run of Methods 306... Chromium Anodizing Tanks § 63.344 Performance test requirements and test methods. (a) Performance test... Emissions From Decorative and Hard Chromium Electroplating and Anodizing Operations,” appendix A of this...

  18. Access Data Analysis Cookbook

    CERN Document Server

    Bluttman, Ken

    2008-01-01

    This book offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Whether you use Access 2007 or an earlier version, this book will teach you new methods to query data, different ways to move data in and out of Access, how to calculate answers to financial and investment issues, how to jump beyond SQL by manipulating data with VBA, and more.

  19. Migrants' access to healthcare

    DEFF Research Database (Denmark)

    Norredam, Marie

    2011-01-01

    There are strong pragmatic and moral reasons for receiving societies to address access to healthcare for migrants. Receiving societies have a pragmatic interest in sustaining migrants' health to facilitate integration; they also have a moral obligation to ensure migrants' access to healthcare...... according to international human rights principles. The intention of this thesis is to increase the understanding of migrants' access to healthcare by exploring two study aims: 1) Are there differences in migrants' access to healthcare compared to that of non-migrants? (substudy I and II); and 2) Why...... are there possible differences in migrants' access to healthcare compared to that of non-migrants? (substudy III and IV). The thesis builds on different methodological approaches using both register-based retrospective cohort design, cross-sectional design and survey methods. Two different measures of access were...

  20. Fermilab Security Site Access Request Database

    Science.gov (United States)

    Fermilab Security Site Access Request Database Use of the online version of the Fermilab Security Site Access Request Database requires that you login into the ESH&Q Web Site. Note: Only Fermilab generated from the ESH&Q Section's Oracle database on May 27, 2018 05:48 AM. If you have a question

  1. Accessing Sexual and Reproductive Health Information and ...

    African Journals Online (AJOL)

    Accessing Sexual and Reproductive Health Information and Services: A Mixed Methods Study of Young ... PROMOTING ACCESS TO AFRICAN RESEARCH ... and services in Soweto, South Africa using quantitative and qualitative methods.

  2. Open Access and ORCID poster presentation

    DEFF Research Database (Denmark)

    Elbæk, Mikael Karstensen; Ekstrøm, Jeannette

    2014-01-01

    and related topics such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc. ORCID ORCID – Open Research & Contributor ID – is an internationally recognized and widely used researcher-ID. ORCID makes it easy to reuse your data across disciplines, publishers and databases – all you need to do......Open Access Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all...... peer review articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access...

  3. Effective Teaching Methods in Higher Education: Requirements and Barriers.

    Science.gov (United States)

    Shirani Bidabadi, Nahid; Nasr Isfahani, Ahmmadreza; Rouhollahi, Amir; Khalili, Roya

    2016-10-01

    Teaching is one of the main components in educational planning which is a key factor in conducting educational plans. Despite the importance of good teaching, the outcomes are far from ideal. The present qualitative study aimed to investigate effective teaching in higher education in Iran based on the experiences of best professors in the country and the best local professors of Isfahan University of Technology. This qualitative content analysis study was conducted through purposeful sampling. Semi-structured interviews were conducted with ten faculty members (3 of them from the best professors in the country and 7 from the best local professors). Content analysis was performed by MAXQDA software. The codes, categories and themes were explored through an inductive process that began from semantic units or direct quotations to general themes. According to the results of this study, the best teaching approach is the mixed method (student-centered together with teacher-centered) plus educational planning and previous readiness. But whenever the teachers can teach using this method confront with some barriers and requirements; some of these requirements are prerequisite in professors' behavior and some of these are prerequisite in professors' outlook. Also, there are some major barriers, some of which are associated with the professors' operation and others are related to laws and regulations. Implications of these findings for teachers' preparation in education are discussed. In the present study, it was illustrated that a good teaching method helps the students to question their preconceptions, and motivates them to learn, by putting them in a situation in which they come to see themselves as the authors of answers, as the agents of responsibility for change. But training through this method has some barriers and requirements. To have an effective teaching; the faculty members of the universities should be awarded of these barriers and requirements as a way to

  4. How to access data availability, accessibility and format for risk analysis?

    NARCIS (Netherlands)

    Humblet, M.F.; Vandeputte, S.; Mignot, C.; Bellet, C.; Koeijer, de A.A.; Swanenburg, M.; Afonso, A.; Sanaa, M.; Saegerman, C.

    2016-01-01

    Risk assessments are mostly carried out based on available data, which do not reflect all data theoretically required by experts to answer them. This study aimed at developing a methodology to assess data availability, accessibility and format, based on a scoring system and focusing on two diseases:

  5. Teenagers’ access to contraception in Mexico City

    Directory of Open Access Journals (Sweden)

    Sofía Gómez-Inclán

    2017-05-01

    Full Text Available Objective. To study and understand the phenomenon of access to contraceptive methods in Mexican teenages, through the use of the Levesque model, which allows for the observation of both the system and the system and the user´s participation in the access process. Materials and methods. A qualitative study was conducted with focus groups technique in a middle and high school of Mexico City. Results. The perception of ability to access to health care is limited, teenagers do not know the mechanisms of care or supply of contraceptive methods. Prejudices of service providers provoke a negative reaction. The family is a source of information for adolescents to make decisions. Conclusions. The model allowed the assessment of access to contraceptive methods in teenagers. It were identified dif­ferent aspects that act as barriers to access and may inform health care providers about this population in their sexual and reproductive health.

  6. Open access for REF2020

    Directory of Open Access Journals (Sweden)

    Simon Kerridge

    2014-03-01

    Full Text Available Open access (OA may have been the ‘big thing’ in 2013 but the OA juggernaut is still rolling and plans are now afoot for the requirements for the ‘next REF’ (which from now on we will refer to as REF2020. In 2013, on behalf of the four UK Funding Councils, the Higher Education Funding Council for England (HEFCE undertook a two-stage consultation exercise on open access requirements for articles submitted to REF2020. There are a number of nuances and caveats to the current proposals. This article will reflect on what the probable rules might be, and their implications for research managers, administrators and institutional repository managers alike.

  7. Quantitative methods in electroencephalography to access therapeutic response.

    Science.gov (United States)

    Diniz, Roseane Costa; Fontenele, Andrea Martins Melo; Carmo, Luiza Helena Araújo do; Ribeiro, Aurea Celeste da Costa; Sales, Fábio Henrique Silva; Monteiro, Sally Cristina Moutinho; Sousa, Ana Karoline Ferreira de Castro

    2016-07-01

    Pharmacometrics or Quantitative Pharmacology aims to quantitatively analyze the interaction between drugs and patients whose tripod: pharmacokinetics, pharmacodynamics and disease monitoring to identify variability in drug response. Being the subject of central interest in the training of pharmacists, this work was out with a view to promoting this idea on methods to access the therapeutic response of drugs with central action. This paper discusses quantitative methods (Fast Fourier Transform, Magnitude Square Coherence, Conditional Entropy, Generalised Linear semi-canonical Correlation Analysis, Statistical Parametric Network and Mutual Information Function) used to evaluate the EEG signals obtained after administration regimen of drugs, the main findings and their clinical relevance, pointing it as a contribution to construction of different pharmaceutical practice. Peter Anderer et. al in 2000 showed the effect of 20mg of buspirone in 20 healthy subjects after 1, 2, 4, 6 and 8h after oral ingestion of the drug. The areas of increased power of the theta frequency occurred mainly in the temporo-occipital - parietal region. It has been shown by Sampaio et al., 2007 that the use of bromazepam, which allows the release of GABA (gamma amino butyric acid), an inhibitory neurotransmitter of the central nervous system could theoretically promote dissociation of cortical functional areas, a decrease of functional connectivity, a decrease of cognitive functions by means of smaller coherence (electrophysiological magnitude measured from the EEG by software) values. Ahmad Khodayari-Rostamabad et al. in 2015 talk that such a measure could be a useful clinical tool potentially to assess adverse effects of opioids and hence give rise to treatment guidelines. There was the relation between changes in pain intensity and brain sources (at maximum activity locations) during remifentanil infusion despite its potent analgesic effect. The statement of mathematical and computational

  8. Access Agent Improving The Performance Of Access Control Lists

    Directory of Open Access Journals (Sweden)

    Thelis R. S.

    2015-08-01

    Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

  9. GIS-based accessibility analysis: An approach to determine public primary health care demand in South Africa

    CSIR Research Space (South Africa)

    Mokgalaka, H

    2013-11-01

    Full Text Available The spatial realities and dynamics of a changing population with changing health care needs require regular and logical methods to evaluate and assist in primary health care (PHC) planning. Geographical access is an important aspect in the planning...

  10. Development of a statistically based access delay timeline methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Rivera, W. Gary; Robinson, David Gerald; Wyss, Gregory Dane; Hendrickson, Stacey M. Langfitt

    2013-02-01

    The charter for adversarial delay is to hinder access to critical resources through the use of physical systems increasing an adversarys task time. The traditional method for characterizing access delay has been a simple model focused on accumulating times required to complete each task with little regard to uncertainty, complexity, or decreased efficiency associated with multiple sequential tasks or stress. The delay associated with any given barrier or path is further discounted to worst-case, and often unrealistic, times based on a high-level adversary, resulting in a highly conservative calculation of total delay. This leads to delay systems that require significant funding and personnel resources in order to defend against the assumed threat, which for many sites and applications becomes cost prohibitive. A new methodology has been developed that considers the uncertainties inherent in the problem to develop a realistic timeline distribution for a given adversary path. This new methodology incorporates advanced Bayesian statistical theory and methodologies, taking into account small sample size, expert judgment, human factors and threat uncertainty. The result is an algorithm that can calculate a probability distribution function of delay times directly related to system risk. Through further analysis, the access delay analyst or end user can use the results in making informed decisions while weighing benefits against risks, ultimately resulting in greater system effectiveness with lower cost.

  11. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  12. Addressing geographic access barriers to emergency care services: a national ecologic study of hospitals in Brazil.

    Science.gov (United States)

    Rocha, Thiago Augusto Hernandes; da Silva, Núbia Cristina; Amaral, Pedro Vasconcelos; Barbosa, Allan Claudius Queiroz; Rocha, João Victor Muniz; Alvares, Viviane; de Almeida, Dante Grapiuna; Thumé, Elaine; Thomaz, Erika Bárbara Abreu Fonseca; de Sousa Queiroz, Rejane Christine; de Souza, Marta Rovery; Lein, Adriana; Lopes, Daniel Paulino; Staton, Catherine A; Vissoci, João Ricardo Nickenig; Facchini, Luiz Augusto

    2017-08-22

    Unequal distribution of emergency care services is a critical barrier to be overcome to assure access to emergency and surgical care. Considering this context it was objective of the present work analyze geographic access barriers to emergency care services in Brazil. A secondary aim of the study is to define possible roles to be assumed by small hospitals in the Brazilian healthcare network to overcome geographic access challenges. The present work can be classified as a cross-sectional ecological study. To carry out the present study, data of all 5843 Brazilian hospitals were categorized among high complexity centers and small hospitals. The geographical access barriers were identified through the use of two-step floating catchment area method. Once concluded the previous step an evaluation using the Getis-Ord-Gi method was performed to identify spatial clusters of municipalities with limited access to high complexity centers but well covered by well-equipped small hospitals. The analysis of accessibility index of high complexity centers highlighted large portions of the country with nearly zero hospital beds by inhabitant. In contrast, it was possible observe a group of 1595 municipalities with high accessibility to small hospitals, simultaneously with a low coverage of high complexity centers. Among the 1595 municipalities with good accessibility to small hospitals, 74% (1183) were covered by small hospitals with at least 60% of minimum emergency service requirements. The spatial clusters analysis aggregated 589 municipalities with high values related to minimum emergency service requirements. Small hospitals in these 589 cities could promote the equity in access to emergency services benefiting more than eight million people. There is a spatial disequilibrium within the country with prominent gaps in the health care network for emergency services. Taking this challenge into consideration, small hospitals could be a possible solution and foster equity in access

  13. No Special Equipment Required: The Accessibility Features Built into the Windows and Macintosh Operating Systems make Computers Accessible for Students with Special Needs

    Science.gov (United States)

    Kimball,Walter H.; Cohen,Libby G.; Dimmick,Deb; Mills,Rick

    2003-01-01

    The proliferation of computers and other electronic learning devices has made knowledge and communication accessible to people with a wide range of abilities. Both Windows and Macintosh computers have accessibility options to help with many different special needs. This documents discusses solutions for: (1) visual impairments; (2) hearing…

  14. Workshop AccessibleTV "Accessible User Interfaces for Future TV Applications"

    Science.gov (United States)

    Hahn, Volker; Hamisu, Pascal; Jung, Christopher; Heinrich, Gregor; Duarte, Carlos; Langdon, Pat

    Approximately half of the elderly people over 55 suffer from some type of typically mild visual, auditory, motor or cognitive impairment. For them interaction, especially with PCs and other complex devices is sometimes challenging, although accessible ICT applications could make much of a difference for their living quality. Basically they have the potential to enable or simplify participation and inclusion in their surrounding private and professional communities. However, the availability of accessible user interfaces being capable to adapt to the specific needs and requirements of users with individual impairments is very limited. Although there are a number of APIs [1, 2, 3, 4] available for various platforms that allow developers to provide accessibility features within their applications, today none of them provides features for the automatic adaptation of multimodal interfaces being capable to automatically fit the individual requirements of users with different kinds of impairments. Moreover, the provision of accessible user interfaces is still expensive and risky for application developers, as they need special experience and effort for user tests. Today many implementations simply neglect the needs of elderly people, thus locking out a large portion of their potential users. The workshop is organized as part of the dissemination activity for the European-funded project GUIDE "Gentle user interfaces for elderly people", which aims to address this situation with a comprehensive approach for the realization of multimodal user interfaces being capable to adapt to the needs of users with different kinds of mild impairments. As application platform, GUIDE will mainly target TVs and Set-Top Boxes, such as the emerging Connected-TV or WebTV platforms, as they have the potential to address the needs of the elderly users with applications such as for home automation, communication or continuing education.

  15. Time dependent accessibility

    OpenAIRE

    Kaza, Nikhil

    2015-01-01

    Many place based accessibility studies ignore the time component. Relying on theoretical frameworks that treat distance between two fixed points as constant, these methods ignore the diurnal and seasonal changes in accessibility. Network distances between two nodes are dependent on the network structure and weight distribution on the edges. These weights can change quite frequently and the network structure itself is subject to modification because of availability and unavailability of links ...

  16. A Meta-analysis of randomized clinical trials assessing hemodialysis access thrombosis based on access flow monitoring: Where do we stand?

    Science.gov (United States)

    Muchayi, Timothy; Salman, Loay; Tamariz, Leonardo J; Asif, Arif; Rizvi, Abid; Lenz, Oliver; Vazquez-Padron, Roberto I.; Tabbara, Marwan; Contreras, Gabriel

    2015-01-01

    The National Kidney Foundation Kidney Disease Outcomes Quality Initiative recommends the routine use of hemodialysis arteriovenous (AV) access surveillance to detect hemodynamically significant stenoses and appropriately correct them to reduce the incidence of thrombosis and to improve accesses patency rates. Access blood flow monitoring is considered as one of the preferred surveillance method for both AV fistulas (AVF) and AV grafts (AVG); however, published studies have reported conflicting results of its utility that led healthcare professionals to doubt the benefits of this surveillance method. We performed a meta-analysis of the published randomized controlled trials (RCTs) of AV access surveillance using access blood flow monitoring. Our hypothesis was that access blood flow monitoring lowers the risk of AV access thrombosis and that the outcome differs between AVF and AVG. The estimated overall pooled risk ratio (RR) of thrombosis was 0.87 (95% confidence interval [CI], 0.67 to 1.13) favoring access blood flow monitoring. The pooled RR of thrombosis were 0.64 (95% CI, 0.41 to 1.01) and 1.06 (95% CI, 0.77 to 1.46) in the subgroups of only AVF and only AVG, respectively. Our results added to the uncertainty of access blood flow monitoring as a surveillance method of hemodialysis accesses. PMID:25644548

  17. System and method for integrating and accessing multiple data sources within a data warehouse architecture

    Science.gov (United States)

    Musick, Charles R [Castro Valley, CA; Critchlow, Terence [Livermore, CA; Ganesh, Madhaven [San Jose, CA; Slezak, Tom [Livermore, CA; Fidelis, Krzysztof [Brentwood, CA

    2006-12-19

    A system and method is disclosed for integrating and accessing multiple data sources within a data warehouse architecture. The metadata formed by the present method provide a way to declaratively present domain specific knowledge, obtained by analyzing data sources, in a consistent and useable way. Four types of information are represented by the metadata: abstract concepts, databases, transformations and mappings. A mediator generator automatically generates data management computer code based on the metadata. The resulting code defines a translation library and a mediator class. The translation library provides a data representation for domain specific knowledge represented in a data warehouse, including "get" and "set" methods for attributes that call transformation methods and derive a value of an attribute if it is missing. The mediator class defines methods that take "distinguished" high-level objects as input and traverse their data structures and enter information into the data warehouse.

  18. 31 CFR 103.61 - Access to records.

    Science.gov (United States)

    2010-07-01

    ... REPORTING OF CURRENCY AND FOREIGN TRANSACTIONS General Provisions § 103.61 Access to records. Except as... with the recordkeeping and reporting requirements of this part, this part does not authorize the... this part. Other inspection, review or access to such records is governed by other applicable law. [50...

  19. Web Based Remote Access Microcontroller Laboratory

    OpenAIRE

    H. Çimen; İ. Yabanova; M. Nartkaya; S. M. Çinar

    2008-01-01

    This paper presents a web based remote access microcontroller laboratory. Because of accelerated development in electronics and computer technologies, microcontroller-based devices and appliances are found in all aspects of our daily life. Before the implementation of remote access microcontroller laboratory an experiment set is developed by teaching staff for training microcontrollers. Requirement of technical teaching and industrial applications are considered when expe...

  20. Get the right access rights!

    CERN Multimedia

    Rosaria Marraffino

    2015-01-01

    On 11 May, a major change concerning the requirements to access the CERN beam facilities was put in place and implemented in ADaMS in order to reduce the number of courses that people who need access to multiple installations have to follow. This revision includes dedicated safety training courses that replace, in particular, the “Safety during LS1” e-learning course, which is now to be considered obsolete.   CERN’s Access Distribution and Management System (ADaMS). As of 11 May, an important improvement was implemented in ADaMS (CERN’s Access Distribution and Management System) regarding the requisites to access safety zones. This change is closely related to the introduction of a generic e-learning course ("CERN Beam Facilities") covering the common risks and systems present in CERN's beam facilities. Two e-learning courses are no longer valid, nor available on the SIR (Safety Information Registration) catalogue: the &ld...

  1. “They just scraped off the calluses”: a mixed methods exploration of foot care access and provision for people with rheumatoid arthritis in south-western Sydney, Australia

    Science.gov (United States)

    2013-01-01

    Background There is little indication that foot health services in Australia are meeting modern day recommendations for Rheumatoid Arthritis (RA) patients. The overall objective of this study was to explore the current state of foot health services for patients with RA with an emphasis on identifying barriers to the receipt of appropriate foot care in South-West Sydney, New South Wales, Australia. Methods A mixed (quantitative and qualitative) approach was adopted. Indications for appropriate access to foot care were determined by comparing the foot health, disease and socio-demographic characteristics of patients with unmet foot care demands, foot care users and patients with no demands for foot care. Perceptions of provision of, and access to, foot care were explored by conducting telephone-based interviews using an interpretative phenomenology approach with thematic analysis. Results Twenty-nine participants took part in the cross-sectional quantitative research study design, and 12 participants took part in the interpretative phenomenological approach (qualitative study). Foot care access appeared to be driven predominantly by the presence of rearfoot deformity, which was significantly worse amongst participants in the foot care user group (p = 0.02). Five main themes emerged from the qualitative data: 1) impact of disease-related foot symptoms, 2) footwear difficulties, 3) medical/rheumatology encounters, 4) foot and podiatry care access and experiences, and 5) financial hardship. Conclusions Foot care provision does not appear to be driven by appropriate foot health characteristics such as foot pain or foot-related disability. There may be significant shortfalls in footwear and foot care access and provision in Greater Western Sydney. Several barriers to adequate foot care access and provision were identified and further efforts are required to improve access to and the quality of foot care for people who have RA. Integration of podiatry services within

  2. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  3. Patterns of Practice in Palliative Radiotherapy for Painful Bone Metastases: Impact of a Regional Rapid Access Clinic on Access to Care

    International Nuclear Information System (INIS)

    Wu, Jackson S.Y.; Kerba, Marc; Wong, Rebecca K.S.; Mckimmon, Erin; Eigl, Bernhard; Hagen, Neil A.

    2010-01-01

    Purpose: External beam radiotherapy (RT) is commonly indicated for the palliation of symptomatic bone metastases, but there is evidence of underutilization of this treatment modality in palliative care for cancer populations. This study was conducted to investigate factors that influenced the use of palliative RT services at a regional comprehensive cancer center. Methods and Materials: A cohort of patients with radiographically confirmed bone metastases and first-time users of palliative RT between 2003 and 2005 was retrospectively reviewed from the time of initial diagnosis of bone metastases to death or last follow-up. Type of radiation treatment service provider used (rapid access or routine access) and patient-, tumor-, and treatment-related factors were analyzed for their influences on the number of treatment courses given over the duration of disease. Results: A total of 887 patients received 1,354 courses of palliative RT for bone metastases at a median interval of 4.0 months between courses. Thirty-three percent of patients required more than one RT course. Increased age and travel distance reduced the likelihood and number of treatment courses, while service through a rapid access clinic was independently associated with an increase in subsequent use of palliative RT. Conclusions: A rapid access service model for palliative RT facilitated access to RT. Travel distance and other factors remained substantial barriers to use of palliative RT services. The pattern of practice suggests an unmet need for symptom control in patients with bone metastases.

  4. Comparing the perception with the reality of walking in a hilly environment: an accessibility method applied to a University campus in Hong Kong

    Directory of Open Access Journals (Sweden)

    Guibo Sun

    2015-05-01

    Full Text Available The influence of hilliness on walking behavior could be a consequence of the real effect of the local topography, but individual perception of the difficulties associated with walking in a hilly environment may also be important. Previous studies have found that people’s perceptions do not necessarily match well with the realities of walking in hilly environments. There are a few methods that can be used to visualize the geography of that difference for use by urban planners and public health practitioners. A walking accessibility measure that allows comparison of perception and reality is proposed and implemented in this study. We note that difficulties in calculating accessibility measures in the present context arise primarily from problems with data quality, three-dimensional pedestrian network modelling and the adequacy of accessibility methods for describing and predicting walking behavior. We present practical strategies for addressing these issues using geographic information systems. Our method is illustrated by calculating accessibility for a hilly university campus in Hong Kong. Walking behaviors on, and people’s perceptions of, this hilly environment were obtained through walking diaries and a survey. The article concludes with suggested directions for the future development of walking accessibility measures along with some ideas about their applicability to the practice of planning and designing a walkable environment.

  5. Feasibility of Smartphone Based Photogrammetric Point Clouds for the Generation of Accessibility Maps

    Science.gov (United States)

    Angelats, E.; Parés, M. E.; Kumar, P.

    2018-05-01

    Accessible cities with accessible services are an old claim of people with reduced mobility. But this demand is still far away of becoming a reality as lot of work is required to be done yet. First step towards accessible cities is to know about real situation of the cities and its pavement infrastructure. Detailed maps or databases on street slopes, access to sidewalks, mobility in public parks and gardens, etc. are required. In this paper, we propose to use smartphone based photogrammetric point clouds, as a starting point to create accessible maps or databases. This paper analyses the performance of these point clouds and the complexity of the image acquisition procedure required to obtain them. The paper proves, through two test cases, that smartphone technology is an economical and feasible solution to get the required information, which is quite often seek by city planners to generate accessible maps. The proposed approach paves the way to generate, in a near term, accessibility maps through the use of point clouds derived from crowdsourced smartphone imagery.

  6. Quality assurance requirements and methods for high level waste package acceptability

    International Nuclear Information System (INIS)

    1992-12-01

    This document should serve as guidance for assigning the necessary items to control the conditioning process in such a way that waste packages are produced in compliance with the waste acceptance requirements. It is also provided to promote the exchange of information on quality assurance requirements and on the application of quality assurance methods associated with the production of high level waste packages, to ensure that these waste packages comply with the requirements for transportation, interim storage and waste disposal in deep geological formations. The document is intended to assist both the operators of conditioning facilities and repositories as well as national authorities and regulatory bodies, involved in the licensing of the conditioning of high level radioactive wastes or in the development of deep underground disposal systems. The document recommends the quality assurance requirements and methods which are necessary to generate data for these parameters identified in IAEA-TECDOC-560 on qualitative acceptance criteria, and indicates where and when the control methods can be applied, e.g. in the operation or commissioning of a process or in the development of a waste package design. Emphasis is on the control of the process and little reliance is placed on non-destructive or destructive testing. Qualitative criteria, relevant to disposal of high level waste, are repository dependent and are not addressed here. 37 refs, 3 figs, 2 tabs

  7. Content accessibility of Web documents: Overview of concepts and needed standards

    DEFF Research Database (Denmark)

    Alapetite, A.

    2006-01-01

    The concept of Web accessibility refers to a combined set of measures, namely, how easily and how efficiently different types of users may make use of a given service. While some recommendations for accessibility are focusing on people with variousspecific disabilities, this document seeks...... to broaden the scope to any type of user and any type of use case. The document provides an introduction to some required concepts and technical standards for designing accessible Web sites. A brief review of thelegal requirements in a few countries for Web accessibility complements the recommendations...

  8. Development of Patient Status-Based Dynamic Access System for Medical Information Systems

    Directory of Open Access Journals (Sweden)

    Chang Won Jeong

    2015-06-01

    Full Text Available Recently, the hospital information system environment using IT communication technology and utilization of medical information has been increasing. In the medical field, the medical information system only supports the transfer of patient information to medical staff through an electronic health record, without information about patient status. Hence, it needs a method of real-time monitoring for the patient. Also, in this environment, a secure method in approaching healthcare through various smart devices is required. Therefore, in this paper, in order to classify the status of the patients, we propose a dynamic approach of the medical information system in a hospital information environment using the dynamic access control method. Also, we applied the symmetric method of AES (Advanced Encryption Standard. This was the best encryption algorithm for sending and receiving biological information. We can define usefulness as the dynamic access application service based on the final result of the proposed system. The proposed system is expected to provide a new solution for a convenient medical information system.

  9. Semantically Enriched Data Access Policies in eHealth.

    Science.gov (United States)

    Drozdowicz, Michał; Ganzha, Maria; Paprzycki, Marcin

    2016-11-01

    Internet of Things (IoT) requires novel solutions to facilitate autonomous, though controlled, resource access. Access policies have to facilitate interactions between heterogeneous entities (devices and humans). Here, we focus our attention on access control in eHealth. We propose an approach based on enriching policies, based on well-known and widely-used eXtensible Access Control Markup Language, with semantics. In the paper we describe an implementation of a Policy Information Point integrated with the HL7 Security and Privacy Ontology.

  10. Evaluating the Influence of Road Lighting on Traffic Safety at Accesses Using An Artificial Neural Network.

    Science.gov (United States)

    Xu, Yueru; Ye, Zhirui; Wang, Yuan; Wang, Chao; Sun, Cuicui

    2018-05-18

    This paper focuses on the effect of road lighting on road safety at accesses and tries to quantitatively analyze the relationship between road lighting and road safety. An Artificial Neural Network (ANN) was applied in this study. This method is one of the most popular machine-learning methods in recent years and does not require any pre-defined assumptions. This method was applied using field data collected from ten road segments in Nanjing, Jiangsu Province, China. The results show that the impact of road lighting on road safety at accesses is significant. In addition, road lighting has greater influence when vehicle speeds are higher or the number of lanes is larger. A threshold illuminance was also found in this paper, and the results show that the safety level at accesses will become stable when reaching this value. The improvement of illuminance can decrease the speed variation among vehicles and improve the safety level. In addition, high-grade roads need better illuminance at accesses. A threshold value can also be obtained based on related variables and used to develop scientific guidelines for traffic management organizations.

  11. Increasing Access and Relevance in Distance Education

    Science.gov (United States)

    Mendenhall, Robert W.

    2009-01-01

    Access to higher education is subject to many factors including affordability, time and geography. Distance education can deliver education to those that live far from a campus. Some of that distance education may be synchronous, or live, requiring students to be available at certain times. Flexibility and access are increased when the instruction…

  12. An Investigation of Unified Memory Access Performance in CUDA

    Science.gov (United States)

    Landaverde, Raphael; Zhang, Tiansheng; Coskun, Ayse K.; Herbordt, Martin

    2015-01-01

    Managing memory between the CPU and GPU is a major challenge in GPU computing. A programming model, Unified Memory Access (UMA), has been recently introduced by Nvidia to simplify the complexities of memory management while claiming good overall performance. In this paper, we investigate this programming model and evaluate its performance and programming model simplifications based on our experimental results. We find that beyond on-demand data transfers to the CPU, the GPU is also able to request subsets of data it requires on demand. This feature allows UMA to outperform full data transfer methods for certain parallel applications and small data sizes. We also find, however, that for the majority of applications and memory access patterns, the performance overheads associated with UMA are significant, while the simplifications to the programming model restrict flexibility for adding future optimizations. PMID:26594668

  13. Data access and decision tools for coastal water resources ...

    Science.gov (United States)

    US EPA has supported the development of numerous models and tools to support implementation of environmental regulations. However, transfer of knowledge and methods from detailed technical models to support practical problem solving by local communities and watershed or coastal management organizations remains a challenge. We have developed the Estuary Data Mapper (EDM) to facilitate data discovery, visualization and access to support environmental problem solving for coastal watersheds and estuaries. EDM is a stand-alone application based on open-source software which requires only internet access for operation. Initially, development of EDM focused on delivery of raw data streams from distributed web services, ranging from atmospheric deposition to hydrologic, tidal, and water quality time series, estuarine habitat characteristics, and remote sensing products. We have transitioned to include access to value-added products which provide end-users with results of future scenario analysis, facilitate extension of models across geographic regions, and/or promote model interoperability. Here we present three examples: 1) the delivery of input data for the development of seagrass models across estuaries, 2) scenarios illustrating the implications of riparian buffer management (loss or restoration) for stream thermal regimes and fish communities, and 3) access to hydrology model outputs to foster connections across models at different scales, ultimately feeding

  14. Requisitos ambientais e acesso a mercados: o setor de defensivos agrícolas Environmental requirements and market access: the pesticide sector

    Directory of Open Access Journals (Sweden)

    Ricardo K.S. Fermam

    2008-12-01

    Full Text Available Os requisitos ambientais do comércio internacional são freqüentemente usados pelos países desenvolvidos como barreiras técnicas ao acesso a mercados pelos países em desenvolvimento. Conhecer estes requisitos é especialmente importante para o setor de defensivos agrícolas (pesticidas. Assim, este artigo busca identificar os principais requisitos ambientais relativos aos defensivos agrícolas, mostrando a importância dos mesmos para os comércio exterior dos países em desenvolvimento, especialmente o Brasil.The environmental requirements of the international trade are frequently used for the developed countries as technical barriers to the market access for the developing countries. To know these requirements is especially important for the sector of agricultural defensives (pesticides. Thus, this Article seeks to identify the main environmental requirements regards to the agricultural defensives, showing the importance of the same ones for the foreign trade of the developing countries, especially Brazil.

  15. The “SAFARI” Technique Using Retrograde Access Via Peroneal Artery Access

    International Nuclear Information System (INIS)

    Zhuang, Kun Da; Tan, Seck Guan; Tay, Kiang Hiong

    2012-01-01

    The “SAFARI” technique or subintimal arterial flossing with antegrade–retrograde intervention is a method for recanalisation of chronic total occlusions (CTOs) when subintimal angioplasty fails. Retrograde access is usually obtained via the popliteal, distal anterior tibial artery (ATA)/dorsalis pedis (DP), or distal posterior tibial artery (PTA). Distal access via the peroneal artery has not been described and has a risk of continued bleeding, leading to compartment syndrome due to its deep location. We describe our experience in two patients with retrograde access via the peroneal artery and the use of balloon-assisted hemostasis for these retrograde punctures. This approach may potentially give more options for endovascular interventions in lower limb CTOs.

  16. DIFABLE PERCEPTION FOR ACCESSIBILITY AND INFORMATION OF PUBLIC TRANSPORT IN JAKARTA

    Directory of Open Access Journals (Sweden)

    Mochdiana Hernawan

    2015-02-01

    Full Text Available Every human being has equal right for accessing to the transportation. Difable persons that have different ability also have the same right. The provision of the accessibility and information facility in public transport is not fully meet difable need and therefore difable persons have difficulties in accessibility and information while using public transports. This research will investigate the difable perceptions about accessibility and traveler information for the public transport in Jakarta. Questionnaire method will be used for this purpose and then analyzed by Importance Performance Analysis. The improvement for the transport infrastructure and information system will be elaborated. The findings of the research could be used as input for the local authority while planning or re-construction public transport infrastructure and information system so that difable persons become more accessible and convenience. The study results show that the average value of the perceived performance for the accessibility is 2.78 from 5 scales. This means the performance of the accessibility in overall is fairly. For the information facility, the average performance is 3.11 that meaning the performance in overall is good. The respondents required the provision of waiting room for difable persons as a priority. The information about the departure of the vehicle should been improved as priority to be increased. Furthermore, it is obtained that the Customer Satisfaction Index (CSI value for accessibility is 56%. This indicates the entire respondents satisfied sufficiently with the accessibility facility. Also, 62% of the CSI value shows that the respondents satisfied sufficiently with the provided information.

  17. Access to essential medicines in Pakistan: policy and health systems research concerns.

    Directory of Open Access Journals (Sweden)

    Shehla Zaidi

    Full Text Available INTRODUCTION: Inadequate access to essential medicines is a common issue within developing countries. Policy response is constrained, amongst other factors, by a dearth of in-depth country level evidence. We share here i gaps related to access to essential medicine in Pakistan; and ii prioritization of emerging policy and research concerns. METHODS: An exploratory research was carried out using a health systems perspective and applying the WHO Framework for Equitable Access to Essential Medicine. Methods involved key informant interviews with policy makers, providers, industry, NGOs, experts and development partners, review of published and grey literature, and consultative prioritization in stakeholder's Roundtable. FINDINGS: A synthesis of evidence found major gaps in essential medicine access in Pakistan driven by weaknesses in the health care system as well as weak pharmaceutical regulation. 7 major policy concerns and 11 emerging research concerns were identified through consultative Roundtable. These related to weaknesses in medicine registration and quality assurance systems, unclear and counterproductive pricing policies, irrational prescribing and sub-optimal drug availability. Available research, both locally and globally, fails to target most of the identified policy concerns, tending to concentrate on irrational prescriptions. It overlooks trans-disciplinary areas of policy effectiveness surveillance, consumer behavior, operational pilots and pricing interventions review. CONCLUSION: Experience from Pakistan shows that policy concerns related to essential medicine access need integrated responses across various components of the health systems, are poorly addressed by existing evidence, and require an expanded health systems research agenda.

  18. 24 CFR 8.26 - Distribution of accessible dwelling units.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Distribution of accessible dwelling units. 8.26 Section 8.26 Housing and Urban Development Office of the Secretary, Department of Housing... accessible dwelling units. Accessible dwelling units required by § 8.22, 8.23, 8.24 or 8.25 shall, to the...

  19. Computer Security: When a person leaves - access rights remain!

    CERN Multimedia

    Computer Security Team

    2014-01-01

    We have been contacted recently by an embarrassed project manager who just figured out that a student who left at the end of 2013 still had access rights to read the whole project folder in February 2014: “How can that be?! In any other company, access rights would be purged at the same time as an employment contract terminates." Not so at CERN.   CERN has always been an open site with an open community. Physical access to the site is lightweight and you just need to have your CERN access card at hand. Further restrictions have only been put in place where safety or security really require them, and CERN does not require you to keep your access card on display. The same holds for the digital world. Once registered at CERN - either by contract, via your experiment or through the Users' office - you own a computing account that provides you with access to a wide variety of computing services. For example, last year 9,730 students/technicians/engineers/researchers/sta...

  20. Neural Interfaces for Intracortical Recording: Requirements, Fabrication Methods, and Characteristics.

    Science.gov (United States)

    Szostak, Katarzyna M; Grand, Laszlo; Constandinou, Timothy G

    2017-01-01

    Implantable neural interfaces for central nervous system research have been designed with wire, polymer, or micromachining technologies over the past 70 years. Research on biocompatible materials, ideal probe shapes, and insertion methods has resulted in building more and more capable neural interfaces. Although the trend is promising, the long-term reliability of such devices has not yet met the required criteria for chronic human application. The performance of neural interfaces in chronic settings often degrades due to foreign body response to the implant that is initiated by the surgical procedure, and related to the probe structure, and material properties used in fabricating the neural interface. In this review, we identify the key requirements for neural interfaces for intracortical recording, describe the three different types of probes-microwire, micromachined, and polymer-based probes; their materials, fabrication methods, and discuss their characteristics and related challenges.

  1. Estimation methods of eco-environmental water requirements: Case study

    Institute of Scientific and Technical Information of China (English)

    YANG Zhifeng; CUI Baoshan; LIU Jingling

    2005-01-01

    Supplying water to the ecological environment with certain quantity and quality is significant for the protection of diversity and the realization of sustainable development. The conception and connotation of eco-environmental water requirements, including the definition of the conception, the composition and characteristics of eco-environmental water requirements, are evaluated in this paper. The classification and estimation methods of eco-environmental water requirements are then proposed. On the basis of the study on the Huang-Huai-Hai Area, the present water use, the minimum and suitable water requirement are estimated and the corresponding water shortage is also calculated. According to the interrelated programs, the eco-environmental water requirements in the coming years (2010, 2030, 2050) are estimated. The result indicates that the minimum and suitable eco-environmental water requirements fluctuate with the differences of function setting and the referential standard of water resources, and so as the water shortage. Moreover, the study indicates that the minimum eco-environmental water requirement of the study area ranges from 2.84×1010m3 to 1.02×1011m3, the suitable water requirement ranges from 6.45×1010m3 to 1.78×1011m3, the water shortage ranges from 9.1×109m3 to 2.16×1010m3 under the minimum water requirement, and it is from 3.07×1010m3 to 7.53×1010m3 under the suitable water requirement. According to the different values of the water shortage, the water priority can be allocated. The ranges of the eco-environmental water requirements in the three coming years (2010, 2030, 2050) are 4.49×1010m3-1.73×1011m3, 5.99×10m3?2.09×1011m3, and 7.44×1010m3-2.52×1011m3, respectively.

  2. Access to finance from different finance provider types

    NARCIS (Netherlands)

    Wulandari, Eliana; Meuwissen, Miranda P.M.; Karmana, Maman H.; Oude Lansink, Alfons G.J.M.

    2017-01-01

    Analysing farmer knowledge of the requirements of finance providers can provide valuable insights to policy makers about ways to improve farmers’ access to finance. This study compares farmer knowledge of the requirements to obtain finance with the actual requirements set by different finance

  3. 28 CFR 17.42 - Positions requiring financial disclosure.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Positions requiring financial disclosure... INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Access to Classified Information § 17.42 Positions requiring financial disclosure. (a) The Assistant Attorney General for Administration, in consultation with the...

  4. The LHC access system LACS and LASS

    CERN Document Server

    Ninin, P

    2005-01-01

    The LHC complex is divided into a number of zones with different levels of access controls.Inside the interlocked areas, the personnel protection is ensured by the LHC Access System.The system is made of two parts:the LHC Access Safety System and the LHC Access Control System. During machine operation,the LHC Access Safety System ensures the collective protection of the personnel against the radiation hazards arising from the operation of the accelerator by interlocking the LHC key safety elements. When the beams are off, the LHC Access Control System regulates the access to the accelerator and its many subsystems.It allows a remote, local or automatic operation of the access control equipment which verifies and identifies all users entering the controlled areas.The global architecture of the LHC Access System is now designed and is being validated to ensure that it meets the safety requirements for operation of the LHC.A pilot installation will be tested in the summer 2005 to validate the concept with the us...

  5. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  6. Perceptual integration without conscious access.

    Science.gov (United States)

    Fahrenfort, Johannes J; van Leeuwen, Jonathan; Olivers, Christian N L; Hogendoorn, Hinze

    2017-04-04

    The visual system has the remarkable ability to integrate fragmentary visual input into a perceptually organized collection of surfaces and objects, a process we refer to as perceptual integration. Despite a long tradition of perception research, it is not known whether access to consciousness is required to complete perceptual integration. To investigate this question, we manipulated access to consciousness using the attentional blink. We show that, behaviorally, the attentional blink impairs conscious decisions about the presence of integrated surface structure from fragmented input. However, despite conscious access being impaired, the ability to decode the presence of integrated percepts remains intact, as shown through multivariate classification analyses of electroencephalogram (EEG) data. In contrast, when disrupting perception through masking, decisions about integrated percepts and decoding of integrated percepts are impaired in tandem, while leaving feedforward representations intact. Together, these data show that access consciousness and perceptual integration can be dissociated.

  7. Accessibility and usability OCW data: The UTPL OCW

    Directory of Open Access Journals (Sweden)

    Germania Rodríguez

    2017-08-01

    Full Text Available This data article provides a data description on article entitled “A framework for improving web accessibility and usability of Open Course Ware sites” [3] This Data in Brief presents the data obtained from the accessibility and usability evaluation of the UTPL OCW. The data obtained from the framework evaluation consists of the manual evaluation of the standards criteria and the automatic evaluation of the tools Google PageSpeed and Google Analytics. In addition, this article presents the synthetized tables from standards that are used by the framework to evaluate the accessibility and usability of OCW, and the questionnaires required to extract the data. As a result, the article also provides the data required to reproduce the evaluation of other OCW.

  8. Genetic relationships among wild and cultivated accessions of curry leaf plant (Murraya koenigii (L.) Spreng.), as revealed by DNA fingerprinting methods.

    Science.gov (United States)

    Verma, Sushma; Rana, T S

    2013-02-01

    Murraya koenigii (L.) Spreng. (Rutaceae), is an aromatic plant and much valued for its flavor, nutritive and medicinal properties. In this study, three DNA fingerprinting methods viz., random amplification of polymorphic DNA (RAPD), directed amplification of minisatellite DNA (DAMD), and inter-simple sequence repeat (ISSR), were used to unravel the genetic variability and relationships across 92 wild and cultivated M. koenigii accessions. A total of 310, 102, and 184, DNA fragments were amplified using 20 RAPD, 5 DAMD, and 13 ISSR primers, revealing 95.80, 96.07, and 96.73% polymorphism, respectively, across all accessions. The average polymorphic information content value obtained with RAPD, DAMD, and ISSR markers was 0.244, 0.250, and 0.281, respectively. The UPGMA tree, based on Jaccard's similarity coefficient generated from the cumulative (RAPD, DAMD, and ISSR) band data showed two distinct clusters, clearly separating wild and cultivated accessions in the dendrogram. Percentage polymorphism, gene diversity (H), and Shannon information index (I) estimates were higher in cultivated accessions compared to wild accessions. The overall high level of polymorphism and varied range of genetic distances revealed a wide genetic base in M. koenigii accessions. The study suggests that RAPD, DAMD, and ISSR markers are highly useful to unravel the genetic variability in wild and cultivated accessions of M. koenigii.

  9. Identity and access management business performance through connected intelligence

    CERN Document Server

    Osmanoglu, Ertem

    2013-01-01

    Identity and Access Management: Controlling Your Network provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML.Focuses on real-word implementations Provides end-to-end coverage of IAM from business drivers, requirements

  10. The Role of Need for Contraception in the Evaluation of Interventions to Improve Access to Family-Planning Methods

    Science.gov (United States)

    Leon, Federico R.; Lundgren, Rebecka; Sinai, Irit; Jennings, Victoria

    2011-01-01

    A nonrandomized experiment carried out in Jharkhand, India, shows how the effects of interventions designed to improve access to family-planning methods can be erroneously regarded as trivial when contraceptive use is utilized as dependent variable, ignoring women's need for contraception. Significant effects of the intervention were observed on…

  11. A method for experimental modal separation

    Science.gov (United States)

    Hallauer, W. L., Jr.

    1977-01-01

    A method is described for the numerical simulation of multiple-shaker modal survey testing using simulated experimental data to optimize the shaker force-amplitude distribution for the purpose of isolating individual modes of vibration. Inertia, damping, stiffness, and model data are stored on magnetic disks, available by direct access to the interactive FORTRAN programs which perform all computations required by this relative force amplitude distribution method.

  12. American Thyroid Association Statement on Remote-Access Thyroid Surgery.

    Science.gov (United States)

    Berber, Eren; Bernet, Victor; Fahey, Thomas J; Kebebew, Electron; Shaha, Ashok; Stack, Brendan C; Stang, Michael; Steward, David L; Terris, David J

    2016-03-01

    Remote-access techniques have been described over the recent years as a method of removing the thyroid gland without an incision in the neck. However, there is confusion related to the number of techniques available and the ideal patient selection criteria for a given technique. The aims of this review were to develop a simple classification of these approaches, describe the optimal patient selection criteria, evaluate the outcomes objectively, and define the barriers to adoption. A review of the literature was performed to identify the described techniques. A simple classification was developed. Technical details, outcomes, and the learning curve were described. Expert opinion consensus was formulated regarding recommendations for patient selection and performance of remote-access thyroid surgery. Remote-access thyroid procedures can be categorized into endoscopic or robotic breast, bilateral axillo-breast, axillary, and facelift approaches. The experience in the United States involves the latter two techniques. The limited data in the literature suggest long operative times, a steep learning curve, and higher costs with remote-access thyroid surgery compared with conventional thyroidectomy. Nevertheless, a consensus was reached that, in appropriate hands, it can be a viable option for patients with unilateral small nodules who wish to avoid a neck incision. Remote-access thyroidectomy has a role in a small group of patients who fit strict selection criteria. These approaches require an additional level of expertise, and therefore should be done by surgeons performing a high volume of thyroid and robotic surgery.

  13. Neural Interfaces for Intracortical Recording: Requirements, Fabrication Methods, and Characteristics

    Directory of Open Access Journals (Sweden)

    Katarzyna M. Szostak

    2017-12-01

    Full Text Available Implantable neural interfaces for central nervous system research have been designed with wire, polymer, or micromachining technologies over the past 70 years. Research on biocompatible materials, ideal probe shapes, and insertion methods has resulted in building more and more capable neural interfaces. Although the trend is promising, the long-term reliability of such devices has not yet met the required criteria for chronic human application. The performance of neural interfaces in chronic settings often degrades due to foreign body response to the implant that is initiated by the surgical procedure, and related to the probe structure, and material properties used in fabricating the neural interface. In this review, we identify the key requirements for neural interfaces for intracortical recording, describe the three different types of probes—microwire, micromachined, and polymer-based probes; their materials, fabrication methods, and discuss their characteristics and related challenges.

  14. Accessible Earth: Enhancing diversity in the Geosciences through accessible course design

    Science.gov (United States)

    Bennett, R. A.; Lamb, D. A.

    2017-12-01

    The tradition of field-based instruction in the geoscience curriculum, which culminates in a capstone geological field camp, presents an insurmountable barrier to many disabled students who might otherwise choose to pursue geoscience careers. There is a widespread perception that success as a practicing geoscientist requires direct access to outcrops and vantage points available only to those able to traverse inaccessible terrain. Yet many modern geoscience activities are based on remotely sensed geophysical data, data analysis, and computation that take place entirely from within the laboratory. To challenge the perception of geoscience as a career option only for the non-disabled, we have created the capstone Accessible Earth Study Abroad Program, an alternative to geologic field camp for all students, with a focus on modern geophysical observation systems, computational thinking, data science, and professional development.In this presentation, we will review common pedagogical approaches in geosciences and current efforts to make the field more inclusive. We will review curricular access and inclusivity relative to a wide range of learners and provide examples of accessible course design based on our experiences in teaching a study abroad course in central Italy, and our plans for ongoing assessment, refinement, and dissemination of the effectiveness of our efforts.

  15. The Critical Role of Institutional Services in Open Access Advocacy

    Directory of Open Access Journals (Sweden)

    Tomasz Neugebauer

    2013-06-01

    Full Text Available This paper examines the development of the Open Access movement in scholarly communication, with particular attention to some of the rhetorical strategies and policy mechanisms used to promote it to scholars and scientists. Despite the majority of journal publishers’ acceptance of author self-archiving practices, and the minimal time commitment required by authors to successfully self-archive their work in disciplinary or institutional repositories, the majority of authors still by and large avoid participation. The paper reviews the strategies and arguments used for increasing author participation in open access, including the role of open access mandates. We recommend a service-oriented approach towards increasing participation in open access, rather than rhetoric that speculates on the benefits that open access will have on text/data mining innovation. In advocating for open access participation, we recommend focusing on its most universal and tangible purpose: increasing public open (gratis access to the published results of publicly funded research. Researchers require strong institutional support to understand the copyright climate of open access self-archiving, user-friendly interfaces and useful metrics, such as repository usage statistics. We recommend that mandates and well-crafted and responsive author support services at universities will ultimately be required to ensure the growth of open access. We describe the mediated deposit service that was developed to support author self-archiving in Spectrum: Concordia University Research Repository. By comparing the number of deposits of non-thesis materials (e.g. articles and conference presentations that were accomplished through the staff-mediated deposit service to the number of deposits that were author-initiated, we demonstrate the relative significance of this service to the growth of the repository.

  16. 7 CFR 3015.183 - Access to contractor records.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Access to contractor records. 3015.183 Section 3015... contractor records. The Attachment 0 requires recipients to include in specified kinds of contracts a provision for access to the contractor's records by the recipient and the Federal government. The following...

  17. Access to dental care among 15–64 year old people

    Science.gov (United States)

    Eslamipour, Faezeh; Heydari, Kamal; Ghaiour, Marzieh; Salehi, Hoda

    2018-01-01

    INTRODUCTION: The current study aims to study people's access to oral and dental health-care services and their satisfaction with the services provided to them. MATERIALS AND METHODS: A descriptive study with multi-stage sampling was conducted on 1360 people aged 16–64 years residing in Isfahan city, Iran. The required data were collected by a questionnaire which comprised of three main parts: demographic characteristics, patients’ access to oral and dental health-care services and its barriers and participants’ satisfaction with access to services. Data were analyzed by SPSS statistical software. RESULTS: The results showed 40% of participants reported an average level for oral health, and 82% of them did not have any problems regarding access to dental care facilities. The main causes of their dissatisfaction were high cost of services (60%) and insufficient health insurance coverage (40%). About 73% reported that they had to spend 30 min or less to access to a dental health-care facility. In addition, 50% of participants were satisfied with the provided services. The main reported reasons for referring to dentists were oral and dental problems (69%) and regular check-ups (15%). There was no significant relationship between participants’ gender, education level, insurance coverage, and access to dental health-care centers (P > 0.05). CONCLUSION: Most participants were satisfied with access to dental healthcare, but they were dissatisfied with the costs and inadequate insurance coverage. About half of the participants were satisfied with the services provided to them, and the highest level of satisfaction was reported for easy access to health-care centers. PMID:29693027

  18. Delivering accessible fieldwork: preliminary findings from a collaborative international study

    Science.gov (United States)

    Stokes, Alison; Atchison, Christopher; Feig, Anthony; Gilley, Brett

    2017-04-01

    Students with disabilities are commonly excluded from full participation in geoscience programs, and encounter significant barriers when accessing field-learning experiences. In order to increase talent and diversity in the geoscience workforce, more inclusive learning experiences must be developed that will enable all students to complete the requirements of undergraduate degree programs, including fieldwork. We discuss the outcomes of a completely accessible field course developed through the collaborative effort of geoscience education practitioners from the US, Canada and the UK. This unique field workshop has brought together current geoscience academics and students with disabilities to share perspectives on commonly-encountered barriers to learning in the field, and explore methods and techniques for overcoming them. While the student participants had the opportunity to learn about Earth processes while situated in the natural environment, participating geoscience instructors began to identify how to improve the design of field courses, making them fully inclusive of learners with disabilities. The outcomes from this experience will be used to develop guidelines to facilitate future development and delivery of accessible geoscience fieldwork.

  19. Random Access for Machine-Type Communication based on Bloom Filtering

    DEFF Research Database (Denmark)

    Pratas, Nuno; Stefanovic, Cedomir; Madueño, Germán Corrales

    2016-01-01

    utilizes the system resources more efficiently and achieves similar or lower latency of connection establishment in case of synchronous arrivals, compared to the variant of the LTE-A access protocol that is optimized for MTC traffic. A dividend of the proposed method is that allows the base station (BS......We present a random access method inspired on Bloom filters that is suited for Machine-Type Communications (MTC). Each accessing device sends a signature during the contention process. A signature is constructed using the Bloom filtering method and contains information on the device identity...... and the connection establishment cause. We instantiate the proposed method over the current LTE-A access protocol. However, the method is applicable to a more general class of random access protocols that use preambles or other reservation sequences, as expected to be the case in 5G systems. We show that our method...

  20. M2M massive wireless access

    DEFF Research Database (Denmark)

    Zanella, Andrea; Zorzi, Michele; Santos, André F.

    2013-01-01

    In order to make the Internet of Things a reality, ubiquitous coverage and low-complexity connectivity are required. Cellular networks are hence the most straightforward and realistic solution to enable a massive deployment of always connected Machines around the globe. Nevertheless, a paradigm...... shift in the conception and design of future cellular networks is called for. Massive access attempts, low-complexity and cheap machines, sporadic transmission and correlated signals are among the main properties of this new reality, whose main consequence is the disruption of the development...... Access Reservation, Coded Random Access and the exploitation of multiuser detection in random access. Additionally, we will show how the properties of machine originated signals, such as sparsity and spatial/time correlation can be exploited. The end goal of this paper is to provide motivation...

  1. Random access with adaptive packet aggregation in LTE/LTE-A.

    Science.gov (United States)

    Zhou, Kaijie; Nikaein, Navid

    While random access presents a promising solution for efficient uplink channel access, the preamble collision rate can significantly increase when massive number of devices simultaneously access the channel. To address this issue and improve the reliability of the random access, an adaptive packet aggregation method is proposed. With the proposed method, a device does not trigger a random access for every single packet. Instead, it starts a random access when the number of aggregated packets reaches a given threshold. This method reduces the packet collision rate at the expense of an extra latency, which is used to accumulate multiple packets into a single transmission unit. Therefore, the tradeoff between packet loss rate and channel access latency has to be carefully selected. We use semi-Markov model to derive the packet loss rate and channel access latency as functions of packet aggregation number. Hence, the optimal amount of aggregated packets can be found, which keeps the loss rate below the desired value while minimizing the access latency. We also apply for the idea of packet aggregation for power saving, where a device aggregates as many packets as possible until the latency constraint is reached. Simulations are carried out to evaluate our methods. We find that the packet loss rate and/or power consumption are significantly reduced with the proposed method.

  2. A design method to assess the accessibility of light on PV cells in an arbitraty geometry by means of ambient occlusion

    NARCIS (Netherlands)

    Reinders, Angelina H.M.E.; Willeke, G.; Ossenbrink, H.

    2007-01-01

    A design method has been developed by which the accessibility of light on PV cells in an arbitrary geometry can be quickly visualized and quantified. Modelling of irradiance in this method is based on ambient occlusion, which indicates the likelihood of shading of object’s surfaces due to

  3. Accessing remote data bases using microcomputers

    OpenAIRE

    Saul, Peter D.

    1985-01-01

    General practitioners' access to remote data bases using microcomputers is increasing, making even the most obscure information readily available. Some of the systems available to general practitioners in the UK are described and the methods of access are outlined. General practitioners should be aware of the advances in technology; data bases are increasing in size, the cost of access is falling and their use is becoming easier.

  4. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  5. Estimation of waste package performance requirements for a nuclear waste repository in basalt

    International Nuclear Information System (INIS)

    Wood, B.J.

    1980-07-01

    A method of developing waste package performance requirements for specific nuclides is described, and based on federal regulations concerning permissible concentrations in solution at the point of discharge to the accessible environment, a simple and conservative transport model, and baseline and potential worst-case release scenarios

  6. The 'SAFARI' Technique Using Retrograde Access Via Peroneal Artery Access

    Energy Technology Data Exchange (ETDEWEB)

    Zhuang, Kun Da, E-mail: zkunda@gmail.com [Singapore General Hospital, Interventional Radiology Centre (Singapore); Tan, Seck Guan [Singapore General Hospital, Department of General Surgery (Singapore); Tay, Kiang Hiong [Singapore General Hospital, Interventional Radiology Centre (Singapore)

    2012-08-15

    The 'SAFARI' technique or subintimal arterial flossing with antegrade-retrograde intervention is a method for recanalisation of chronic total occlusions (CTOs) when subintimal angioplasty fails. Retrograde access is usually obtained via the popliteal, distal anterior tibial artery (ATA)/dorsalis pedis (DP), or distal posterior tibial artery (PTA). Distal access via the peroneal artery has not been described and has a risk of continued bleeding, leading to compartment syndrome due to its deep location. We describe our experience in two patients with retrograde access via the peroneal artery and the use of balloon-assisted hemostasis for these retrograde punctures. This approach may potentially give more options for endovascular interventions in lower limb CTOs.

  7. Piloting the use of indigenous methods to prevent Nipah virus infection by interrupting bats' access to date palm sap in Bangladesh.

    Science.gov (United States)

    Nahar, Nazmun; Mondal, Utpal Kumar; Sultana, Rebeca; Hossain, M Jahangir; Khan, M Salah Uddin; Gurley, Emily S; Oliveras, Elizabeth; Luby, Stephen P

    2013-09-01

    People in Bangladesh frequently drink fresh date palm sap. Fruit bats (Pteropus giganteus) also drink raw sap and may contaminate the sap by shedding Nipah virus through saliva and urine. In a previous study we identified two indigenous methods to prevent bats accessing the sap, bamboo skirts and lime (calcium carbonate). We conducted a pilot study to assess the acceptability of these two methods among sap harvesters. We used interactive community meetings and group discussions to encourage all the sap harvesters (n = 12) from a village to use either bamboo skirts or lime smear that some of them (n = 4) prepared and applied. We measured the preparation and application time and calculated the cost of bamboo skirts. We conducted interviews after the use of each method. The sap harvesters found skirts effective in preventing bats from accessing sap. They were sceptical that lime would be effective as the lime was washed away by the sap flow. Preparation of the skirt took ∼105 min. The application of each method took ∼1 min. The cost of the bamboo skirt is minimal because bamboo is widely available and they made the skirts with pieces of used bamboo. The bamboo skirt method appeared practical and affordable to the sap harvesters. Further studies should explore its ability to prevent bats from accessing date palm sap and assess if its use produces more or better quality sap, which would provide further incentives to make it more acceptable for its regular use.

  8. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...

  9. Sensitivity Analysis of Hydraulic Methods Regarding Hydromorphologic Data Derivation Methods to Determine Environmental Water Requirements

    Directory of Open Access Journals (Sweden)

    Alireza Shokoohi

    2015-07-01

    Full Text Available This paper studies the accuracy of hydraulic methods in determining environmental flow requirements. Despite the vital importance of deriving river cross sectional data for hydraulic methods, few studies have focused on the criteria for deriving this data. The present study shows that the depth of cross section has a meaningful effect on the results obtained from hydraulic methods and that, considering fish as the index species for river habitat analysis, an optimum depth of 1 m should be assumed for deriving information from cross sections. The second important parameter required for extracting the geometric and hydraulic properties of rivers is the selection of an appropriate depth increment; ∆y. In the present research, this parameter was found to be equal to 1 cm. The uncertainty of the environmental discharge evaluation, when allocating water in areas with water scarcity, should be kept as low as possible. The Manning friction coefficient (n is an important factor in river discharge calculation. Using a range of "n" equal to 3 times the standard deviation for the study area, it is shown that the influence of friction coefficient on the estimation of environmental flow is much less than that on the calculation of river discharge.

  10. A simple method using on-line continuous leaching and ion exchange chromatography coupled to inductively coupled plasma mass spectrometry for the speciation analysis of bio-accessible arsenic in rice.

    Science.gov (United States)

    Horner, Nolan S; Beauchemin, Diane

    2012-03-02

    A simple method for the speciation analysis of bio-accessible arsenic (As) in rice was developed using a continuous on-line leaching method to release the bio-accessible fraction. The continuous on-line leaching method has several advantages over commonly used batch methods including quicker and easier sample preparation, reduced risk of contamination and access to real time leaching data. The bio-accessibility of As in the samples was monitored using inductively coupled plasma mass spectrometry (ICP-MS). Results from a certified reference material as well as cooked and uncooked white rice showed that the majority of As was leached by saliva. Results obtained using the continuous on-line leaching method were comparable to those obtained using a batch method. Speciation analysis of the saliva leachate was performed using ion exchange chromatography coupled to ICP-MS. The four most toxic forms of As (As(III), monomethylarsonic acid (MMA), dimethylarsinic acid (DMA) and As(V)) were clearly separated within 5 min in a single chromatographic run. Over 92% of bio-accessible As in the certified reference material and uncooked white rice sample was in the form of DMA and As(V), whereas it was present as DMA and As(III) in the cooked white rice. Copyright © 2011 Elsevier B.V. All rights reserved.

  11. What Type of Knowledge Provides Valid Housing Standards Addressing Accessibility?

    DEFF Research Database (Denmark)

    Helle, Tina; Brandt, Åse; Iwarsson, Susanne

    evaluations of task-surface heights in elderly people’s homes. Applied Ergonomics, 31, 109-119. Kohlbacher, F. (2006). The use of qualitative content analysis in case study research. Forum: Qualitative social research sozialforschung (FQS), Open Journal Systems, vol 7, No1. Kozey, J.W. & Das, B. (2004...... accessibility aspects such as either reach, seat height or space requirements • Targeted primarily industrial workstation design and only wheelchair/scooter users • Addressed positions (standing/seated) and sex difference with respect to reach • Was generated in lab-like environments, using methods...... of the validity of housing standards. Therefore, it is reasonable to question what type of knowledge that provides the most valid standards addressing accessibility and explore the consequences of using an alternative approach. The idea was thus to examine the validity of a set of housing standards using a so...

  12. RFID Based Security Access Control System with GSM Technology

    OpenAIRE

    Peter Adole; Joseph M. Môm; Gabriel A. Igwue

    2016-01-01

    The security challenges being encountered in many places today require electronic means of controlling access to secured premises in addition to the available security personnel. Various technologies were used in different forms to solve these challenges. The Radio Frequency Identification (RFID) Based Access Control Security system with GSM technology presented in this work helps to prevent unauthorized access to controlled environments (secured premises). This is achieved mainly...

  13. Communication access to businesses and organizations for people with complex communication needs.

    Science.gov (United States)

    Collier, Barbara; Blackstone, Sarah W; Taylor, Andrew

    2012-12-01

    Human rights legislation and anti-discrimination and accessibility laws exist in many countries and through international conventions and treaties. To varying degrees, these laws protect the rights of people with disabilities to full and equal access to goods and services. Yet, the accessibility requirements of people with complex communication needs (CCN) are not well represented in the existing accessibility literature. This article describes the results of surveys completed by disability service providers and individuals with CCN due to cerebral palsy, developmental delay, and acquired disabilities. It identifies accessibility requirements for people with CCN for face-to-face communication; comprehension of spoken language; telephone communication; text and print-based communication; Internet, email, and social media interactions; and written communication. Recommendations are made for communication accessibility accommodations in regulations, guidelines, and practices.

  14. Barriers and facilitators to intraosseous access in adult resuscitations when peripheral intravenous access is not achievable.

    Science.gov (United States)

    James Cheung, Warren; Rosenberg, Hans; Vaillancourt, Christian

    2014-03-01

    Studies suggest that intraosseous (IO) access is underutilized in adult resuscitations, despite recommendations from advanced trauma and cardiac life support guidelines. The objective was to determine factors associated with IO access use by physicians during adult resuscitations when intravenous (IV) access is not immediately achievable. This study was an online survey among physicians purposefully recruited from various clinical care areas at three teaching hospitals. Questions were generated from the qualitative results of 20 iterative interviews, verified for internal validity, and piloted. The interview guide was based on the constructs of the Theory of Planned Behavior (TPB), which elicits salient attitudes, social influences, and control beliefs that potentially influence intention to use IO access. Recruitment took place in September 2012 until reaching more than 100% of the required sample size (n = 200). Internal consistency was measured using Cronbach's alpha, and the effect of TPB constructs and specific beliefs were assessed with regression analyses. For the 205 respondents, the mean age was 35 years (range = 20 to 66 years), and 53.3% were male. Participants' departmental affiliations were 50.3% emergency medicine (EM), 16.9% internal medicine, 14.9% anesthesia, 10.8% general surgery, and 7.2% critical care. Residents comprised 60.7% of the sample, and 39.3% were attending physicians. Median intention to use IO access when IV is not immediately achievable was 4.67 (interquartile range [IQR] = 4 to 5) out of 5 (5 highest) and predicted by the following TPB constructs: attitudes (AdjCoefficients = 0.504; 95% confidence interval [CI] = 0.334 to 0.673), social influences (AdjCoefficients = 0.285; 95% CI = 0.172 to 0.398), and control beliefs (AdjCoefficients 0.217; 95% CI = 0.113 to 0.320). Physicians were more likely to use IO access if they believed that it provided rapid vascular access for delivering large volumes of fluids, could prevent delays in

  15. Rural women's access to health care in Bangladesh: swimming against the tide?

    Science.gov (United States)

    Hossen, Md Abul; Westhues, Anne

    2011-01-01

    Large segments of the population in developing countries are deprived of a fundamental right: access to basic health care. The problem of access to health care is particularly acute in Bangladesh. One crucial determinant of health seeking among rural women is the accessibility of medical care and barriers to care that may develop because of location, financial requirements, bureaucratic responses to the patient, social distance between client and provider, and the sex of providers. This article argues that to increase accessibility fundamental changes are required not only in resource allocation but also in the very structure of health services delivery.

  16. Proposed New Method of Interpretation of Infrared Ship Signature Requirements

    NARCIS (Netherlands)

    Neele, F.P.; Wilson, M.T.; Youern, K.

    2005-01-01

    new method of deriving and defining requirements for the infrared signature of new ships is presented. The current approach is to specify the maximum allowed temperature or radiance contrast of the ship with respect to its background. At present, in most NATO countries, it is the contractor’s

  17. Frame of Reference: Open Access Starts with You

    Science.gov (United States)

    Goetsch, Lori A.

    2010-01-01

    Federal legislation now requires the deposit of some taxpayer-funded research in "open-access" repositories--that is, sites where scholarship and research are made freely available over the Internet. The institutions whose faculty produce the research have begun to see the benefit of open-access publication as well. From the perspective of faculty…

  18. Code-Expanded Random Access for Machine-Type Communications

    DEFF Research Database (Denmark)

    Kiilerich Pratas, Nuno; Thomsen, Henning; Stefanovic, Cedomir

    2012-01-01

    Abstract—The random access methods used for support of machine-type communications (MTC) in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. Motivated by the random access method employed in LTE, we propose...

  19. Experimental protocol to assess the tourism vehicles accessibility based on heart rate and access time measurements

    Energy Technology Data Exchange (ETDEWEB)

    Alcala Fazio, E.; Alvarez Fernandez, N.

    2016-07-01

    The objective of the Project is to define an experimental protocol for the accessibility assessment of the transport vehicles, by analysing the evolution of the effort and time variables consumed by a target group –Persons of Reduced Mobility (PMRs). This protocol consisted in tests of accessibility on a sample of 6 passenger cars (class M1) by 8 elderly people carrying a heart rate monitor, and whose access manoeuvres were recorded by video cameras. Based on the Hilloskorpi et al. [1] model and by developing a method of truncation of the heart rate (HR) tests records - eliminating the component of the work biologically needed by the organism to keep its basal metabolic rate from the work each person performed – it was possible to evaluate how much energy each individual invested in each access manoeuver. Immediately after each test, and after the whole round of vehicles, each participant was surveyed for a subjective assessment of the difficulty of accessing to the cars. According to each of the above results, the HR objective measurements and the subjective opinion about the ease of access experienced by each individual, the vehicles were ranked by order of accessibility to the front and rear seats. The result of both rankings showed the orders of the similar vehicles, the potential of the method and a fair closeness between its results and the subjective, but real and unequivocal, judgments of the participants. (Author)

  20. Hand Society and Matching Program Web Sites Provide Poor Access to Information Regarding Hand Surgery Fellowship.

    Science.gov (United States)

    Hinds, Richard M; Klifto, Christopher S; Naik, Amish A; Sapienza, Anthony; Capo, John T

    2016-08-01

    The Internet is a common resource for applicants of hand surgery fellowships, however, the quality and accessibility of fellowship online information is unknown. The objectives of this study were to evaluate the accessibility of hand surgery fellowship Web sites and to assess the quality of information provided via program Web sites. Hand fellowship Web site accessibility was evaluated by reviewing the American Society for Surgery of the Hand (ASSH) on November 16, 2014 and the National Resident Matching Program (NRMP) fellowship directories on February 12, 2015, and performing an independent Google search on November 25, 2014. Accessible Web sites were then assessed for quality of the presented information. A total of 81 programs were identified with the ASSH directory featuring direct links to 32% of program Web sites and the NRMP directory directly linking to 0%. A Google search yielded direct links to 86% of program Web sites. The quality of presented information varied greatly among the 72 accessible Web sites. Program description (100%), fellowship application requirements (97%), program contact email address (85%), and research requirements (75%) were the most commonly presented components of fellowship information. Hand fellowship program Web sites can be accessed from the ASSH directory and, to a lesser extent, the NRMP directory. However, a Google search is the most reliable method to access online fellowship information. Of assessable programs, all featured a program description though the quality of the remaining information was variable. Hand surgery fellowship applicants may face some difficulties when attempting to gather program information online. Future efforts should focus on improving the accessibility and content quality on hand surgery fellowship program Web sites.

  1. Method for calculating required shielding in medical x-ray rooms

    International Nuclear Information System (INIS)

    Karppinen, J.

    1997-10-01

    The new annual radiation dose limits - 20 mSv (previously 50 mSv) for radiation workers and 1 mSv (previously 5 mSv) for other persons - implies that the adequacy of existing radiation shielding must be re-evaluated. In principle, one could assume that the thicknesses of old radiation shields should be increased by about one or two half-value layers in order to comply with the new dose limits. However, the assumptions made in the earlier shielding calculations are highly conservative; the required shielding was often determined by applying the maximum high-voltage of the x-ray tube for the whole workload. A more realistic calculation shows that increased shielding is typically not necessary if more practical x-ray tube voltages are used in the evaluation. We have developed a PC-based calculation method for calculating the x-ray shielding which is more realistic than the highly conservative method formerly used. The method may be used to evaluate an existing shield for compliance with new regulations. As examples of these calculations, typical x-ray rooms are considered. The lead and concrete thickness requirements as a function of x-ray tube voltage and workload are also given in tables. (author)

  2. Latency in Visionic Systems: Test Methods and Requirements

    Science.gov (United States)

    Bailey, Randall E.; Arthur, J. J., III; Williams, Steven P.; Kramer, Lynda J.

    2005-01-01

    A visionics device creates a pictorial representation of the external scene for the pilot. The ultimate objective of these systems may be to electronically generate a form of Visual Meteorological Conditions (VMC) to eliminate weather or time-of-day as an operational constraint and provide enhancement over actual visual conditions where eye-limiting resolution may be a limiting factor. Empirical evidence has shown that the total system delays or latencies including the imaging sensors and display systems, can critically degrade their utility, usability, and acceptability. Definitions and measurement techniques are offered herein as common test and evaluation methods for latency testing in visionics device applications. Based upon available data, very different latency requirements are indicated based upon the piloting task, the role in which the visionics device is used in this task, and the characteristics of the visionics cockpit display device including its resolution, field-of-regard, and field-of-view. The least stringent latency requirements will involve Head-Up Display (HUD) applications, where the visionics imagery provides situational information as a supplement to symbology guidance and command information. Conversely, the visionics system latency requirement for a large field-of-view Head-Worn Display application, providing a Virtual-VMC capability from which the pilot will derive visual guidance, will be the most stringent, having a value as low as 20 msec.

  3. Access to health care for children with neural tube defects: Experiences of mothers in Zambia

    Directory of Open Access Journals (Sweden)

    Micah M. Simpamba

    2016-12-01

    Full Text Available Introduction: In Zambia, all children born with neural tube defects requiring surgery need to be referred to a tertiary level hospital in Lusaka, the capital city, where the specialists are based. The aim of this study was to explore the experiences of mothers accessing health care who had recently given birth to a child with a neural tube defect. Methods and analysis: In-depth interviews were conducted with a purposively selected sample of 20 mothers at the tertiary level hospital. The interviews were audiotaped, transcribed verbatim and translated. Content analysis was used to identify codes, which were later collapsed into categories and themes. Findings: Five themes emerged: access to health care, access to transport, access to information, concerns about family and support needs. Discussion: Barriers to access to health care included geographical barriers and barriers linked to availability. Geographical barriers were related to distance between home and the health centre, and referral between health facilities. Barriers to availability included the lack of specialist health workers at various levels, and insufficient hospital vehicles to transport mothers and children to the tertiary level hospital. The main barrier to affordability was the cost of transport, which was alleviated by either family or government support. Acceptability of the health services was affected by a lack of information, incorrect advice, the attitude of health workers and the beliefs of the family. Conclusion: Access to health care by mothers of children with neural tube defects in Zambia is affected by geographical accessibility, availability, affordability and acceptability. The supply-side barriers and demand-side barriers require different interventions to address them. This suggests that health policy is needed which ensures access to surgery and follow-up care.

  4. Task-and-role-based access-control model for computational grid

    Institute of Scientific and Technical Information of China (English)

    LONG Tao; HONG Fan; WU Chi; SUN Ling-li

    2007-01-01

    Access control in a grid environment is a challenging issue because the heterogeneous nature and independent administration of geographically dispersed resources in grid require access control to use fine-grained policies. We established a task-and-role-based access-control model for computational grid (CG-TRBAC model), integrating the concepts of role-based access control (RBAC) and task-based access control (TBAC). In this model, condition restrictions are defined and concepts specifically tailored to Workflow Management System are simplified or omitted so that role assignment and security administration fit computational grid better than traditional models; permissions are mutable with the task status and system variables, and can be dynamically controlled. The CG-TRBAC model is proved flexible and extendible. It can implement different control policies. It embodies the security principle of least privilege and executes active dynamic authorization. A task attribute can be extended to satisfy different requirements in a real grid system.

  5. Using Direct Sub-Level Entity Access to Improve Nuclear Stockpile Simulation Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Parker, Robert Y. [Brigham Young Univ., Provo, UT (United States)

    1999-08-01

    Direct sub-level entity access is a seldom-used technique in discrete-event simulation modeling that addresses the accessibility of sub-level entity information. The technique has significant advantages over more common, alternative modeling methods--especially where hierarchical entity structures are modeled. As such, direct sub-level entity access is often preferable in modeling nuclear stockpile, life-extension issues, an area to which it has not been previously applied. Current nuclear stockpile, life-extension models were demonstrated to benefit greatly from the advantages of direct sub-level entity access. In specific cases, the application of the technique resulted in models that were up to 10 times faster than functionally equivalent models where alternative techniques were applied. Furthermore, specific implementations of direct sub-level entity access were observed to be more flexible, efficient, functional, and scalable than corresponding implementations using common modeling techniques. Common modeling techniques (''unbatch/batch'' and ''attribute-copying'') proved inefficient and cumbersome in handling many nuclear stockpile modeling complexities, including multiple weapon sites, true defect analysis, and large numbers of weapon and subsystem types. While significant effort was required to enable direct sub-level entity access in the nuclear stockpile simulation models, the enhancements were worth the effort--resulting in more efficient, more capable, and more informative models that effectively addressed the complexities of the nuclear stockpile.

  6. Access to Four-Year Public Colleges and Degree Completion

    OpenAIRE

    Joshua Goodman; Michael Hurwitz; Jonathan Smith

    2015-01-01

    Does access to four-year colleges affect degree completion for students who would otherwise attend two-year colleges? Admission to Georgia’s four-year public sector requires minimum SAT scores. Regression discontinuity estimates show that access to this sector increases four-year college enrollment and college quality, largely by diverting students from two-year colleges. Access substantially increases bachelor’s degree completion rates for these relatively low-skilled students. SAT retaking ...

  7. User Management with LDAP(Light weight Directory Access Protocolfor access to technology and Information Services in Companies

    Directory of Open Access Journals (Sweden)

    José Teodoro Mejía Viteri

    2016-08-01

    Full Text Available This research aims to conduct an analysis of management services information and users with LDAP (Lightweight / Simplified Directory Access Protocol, their interaction with other technology services company, allowing it to be accessed through a single user and password. This study allowed us to collect information through a literature review on the LDAP service and its ability to interact with your user directory Open source technology services; also with Windows Server and Active Directory service is used by companies for their ease of management and access resources on Windows clients; is intended to provide an alternative for the implementation of each of the services required by public and private companies with tools free use and access to services for management and administration can be done by integrating or synchronizing with the directory LDAP.

  8. Efficient Unsteady Flow Visualization with High-Order Access Dependencies

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Jiang; Guo, Hanqi; Yuan, Xiaoru

    2016-04-19

    We present a novel high-order access dependencies based model for efficient pathline computation in unsteady flow visualization. By taking longer access sequences into account to model more sophisticated data access patterns in particle tracing, our method greatly improves the accuracy and reliability in data access prediction. In our work, high-order access dependencies are calculated by tracing uniformly-seeded pathlines in both forward and backward directions in a preprocessing stage. The effectiveness of our proposed approach is demonstrated through a parallel particle tracing framework with high-order data prefetching. Results show that our method achieves higher data locality and hence improves the efficiency of pathline computation.

  9. Adaptation of AMO-FBMC-OQAM in optical access network for accommodating asynchronous multiple access in OFDM-based uplink transmission

    Science.gov (United States)

    Jung, Sun-Young; Jung, Sang-Min; Han, Sang-Kook

    2015-01-01

    Exponentially expanding various applications in company with proliferation of mobile devices make mobile traffic exploded annually. For future access network, bandwidth efficient and asynchronous signals converged transmission technique is required in optical network to meet a huge bandwidth demand, while integrating various services and satisfying multiple access in perceived network resource. Orthogonal frequency division multiplexing (OFDM) is highly bandwidth efficient parallel transmission technique based on orthogonal subcarriers. OFDM has been widely studied in wired-/wireless communication and became a Long term evolution (LTE) standard. Consequently, OFDM also has been actively researched in optical network. However, OFDM is vulnerable frequency and phase offset essentially because of its sinc-shaped side lobes, therefore tight synchronism is necessary to maintain orthogonality. Moreover, redundant cyclic prefix (CP) is required in dispersive channel. Additionally, side lobes act as interference among users in multiple access. Thus, it practically hinders from supporting integration of various services and multiple access based on OFDM optical transmission In this paper, adaptively modulated optical filter bank multicarrier system with offset QAM (AMO-FBMC-OQAM) is introduced and experimentally investigated in uplink optical transmission to relax multiple access interference (MAI), while improving bandwidth efficiency. Side lobes are effectively suppressed by using FBMC, therefore the system becomes robust to path difference and imbalance among optical network units (ONUs), which increase bandwidth efficiency by reducing redundancy. In comparison with OFDM, a signal performance and an efficiency of frequency utilization are improved in the same experimental condition. It enables optical network to effectively support heterogeneous services and multiple access.

  10. Evaluation of methods to estimate the essential amino acids requirements of fish from the muscle amino acid profile

    Directory of Open Access Journals (Sweden)

    Álvaro José de Almeida Bicudo

    2014-03-01

    Full Text Available Many methods to estimate amino acid requirement based on amino acid profile of fish have been proposed. This study evaluates the methodology proposed by Meyer & Fracalossi (2005 and by Tacon (1989 to estimate amino acids requirement of fish, which do exempt knowledge on previous nutritional requirement of reference amino acid. Data on amino acid requirement of pacu, Piaractus mesopotamicus, were used to validate de accuracy of those methods. Meyer & Fracalossi's and Tacon's methodology estimated the lysine requirement of pacu, respectively, at 13 and 23% above requirement determined using dose-response method. The values estimated by both methods lie within the range of requirements determined for other omnivorous fish species, the Meyer & Fracalossi (2005 method showing better accuracy.

  11. Optical Access Multiservice Architecture with Support to Smart Grid

    DEFF Research Database (Denmark)

    Gómez-Martínez, Alejandro; Amaya-Fernández, Ferney; Hincapié, Roberto

    2013-01-01

    The increasing demand of fixed and mobile applications, and considering that smart grid imposes new requirements to the access networks, in this paper we present an optical access architecture to support home multiservice including smart grid applications. We propose a migration path based in a WDM...

  12. KidReporter : a method for engaging children in making a newspaper to gather user requirements

    NARCIS (Netherlands)

    Bekker, M.M.; Beusmans, J.; Keyson, D.V.; Lloyd, P.A.; Bekker, M.M.; Markopoulos, P.; Tsikalkina, M.

    2002-01-01

    We describe a design method, called the KidReporter method, for gathering user requirements from children. Two school classes participated in making a newspaper about a zoo, to gather requirements for the design process of an interactive educational game. The educational game was developed to

  13. Validation of Housing Standards Addressing Accessibility

    DEFF Research Database (Denmark)

    Helle, Tina

    2013-01-01

    The aim was to explore the use of an activity-based approach to determine the validity of a set of housing standards addressing accessibility. This included examination of the frequency and the extent of accessibility problems among older people with physical functional limitations who used...... participant groups were examined. Performing well-known kitchen activities was associated with accessibility problems for all three participant groups, in particular those using a wheelchair. The overall validity of the housing standards examined was poor. Observing older people interacting with realistic...... environments while performing real everyday activities seems to be an appropriate method for assessing accessibility problems....

  14. The use of modern information technology in research on transport accessibility

    Directory of Open Access Journals (Sweden)

    Bartosz BARTOSIEWICZ

    2015-09-01

    Full Text Available Transport accessibility can be analyzed using a number of different methods. The problem with each of them is the difficulty of obtaining data to measure this phenomenon The focus of this article and its main goal are to present methods and tools for gathering data on road traffic; thanks to modern information technology, it is possible to collect real data without the need for large-scale and highly capital-intensive measurements. The application of modern information technology (IT presented in the article, such as computer programs and applications like Google Maps Traffic Overlay and TomTom Live Traffic, enable research to be conducted on a scale that has thus far been unattainable, and allows information to be collected on such criteria as traffic volume, flow, average traffic speed, and actual journey time. Such innovative means of gathering data on automobile traffic open up new perspectives for assessing transport accessibility in terms of automobile traffic by providing high-quality data that meet the requirements for use in primary research.

  15. Fault tree construction of hybrid system requirements using qualitative formal method

    International Nuclear Information System (INIS)

    Lee, Jang-Soo; Cha, Sung-Deok

    2005-01-01

    When specifying requirements for software controlling hybrid systems and conducting safety analysis, engineers experience that requirements are often known only in qualitative terms and that existing fault tree analysis techniques provide little guidance on formulating and evaluating potential failure modes. In this paper, we propose Causal Requirements Safety Analysis (CRSA) as a technique to qualitatively evaluate causal relationship between software faults and physical hazards. This technique, extending qualitative formal method process and utilizing information captured in the state trajectory, provides specific guidelines on how to identify failure modes and relationship among them. Using a simplified electrical power system as an example, we describe step-by-step procedures of conducting CRSA. Our experience of applying CRSA to perform fault tree analysis on requirements for the Wolsong nuclear power plant shutdown system indicates that CRSA is an effective technique in assisting safety engineers

  16. Comparing Accessibility Auditing Methods for Ebooks: Crowdsourced, Functionality-Led Versus Web Content Methodologies.

    Science.gov (United States)

    James, Abi; Draffan, E A; Wald, Mike

    2017-01-01

    This paper presents a gap analysis between crowdsourced functional accessibility evaluations of ebooks conducted by non-experts and the technical accessibility standards employed by developers. It also illustrates how combining these approaches can provide more appropriate information for a wider group of users with print impairments.

  17. Accessibility of long-term family planning methods: a comparison study between Output Based Approach (OBA) clients verses non-OBA clients in the voucher supported facilities in Kenya.

    Science.gov (United States)

    Oyugi, Boniface; Kioko, Urbanus; Kaboro, Stephen Mbugua; Gikonyo, Shadrack; Okumu, Clarice; Ogola-Munene, Sarah; Kalsi, Shaminder; Thiani, Simon; Korir, Julius; Odundo, Paul; Baltazaar, Billy; Ranji, Moses; Muraguri, Nicholas; Nzioka, Charles

    2017-03-27

    The study seeks to evaluate the difference in access of long-term family planning (LTFP) methods among the output based approach (OBA) and non-OBA clients within the OBA facility. The study utilises a quasi experimental design. A two tailed unpaired t-test with unequal variance is used to test for the significance variation in the mean access. The difference in difference (DiD) estimates of program effect on long term family planning methods is done to estimate the causal effect by exploiting the group level difference on two or more dimensions. The study also uses a linear regression model to evaluate the predictors of choice of long-term family planning methods. Data was analysed using SPSS version 17. All the methods (Bilateral tubal ligation-BTL, Vasectomy, intrauterine contraceptive device -IUCD, Implants, and Total or combined long-term family planning methods -LTFP) showed a statistical significant difference in the mean utilization between OBA versus non-OBA clients. The difference in difference estimates reveal that the difference in access between OBA and non OBA clients can significantly be attributed to the implementation of the OBA program for intrauterine contraceptive device (p = 0.002), Implants (p = 0.004), and total or combined long-term family planning methods (p = 0.001). The county of residence is a significant determinant of access to all long-term family planning methods except vasectomy and the year of registration is a significant determinant of access especially for implants and total or combined long-term family planning methods. The management level and facility type does not play a role in determining the type of long-term family planning method preferred; however, non-governmental organisations (NGOs) as management level influences the choice of all methods (Bilateral tubal ligation, intrauterine contraceptive device, Implants, and combined methods) except vasectomy. The adjusted R 2 value, representing the percentage of

  18. Time dependent policy-based access control

    DEFF Research Database (Denmark)

    Vasilikos, Panagiotis; Nielson, Flemming; Nielson, Hanne Riis

    2017-01-01

    also on other attributes of the environment such as the time. In this paper, we use systems of Timed Automata to model distributed systems and we present a logic in which one can express time-dependent policies for access control. We show how a fragment of our logic can be reduced to a logic......Access control policies are essential to determine who is allowed to access data in a system without compromising the data's security. However, applications inside a distributed environment may require those policies to be dependent on the actual content of the data, the flow of information, while...... that current model checkers for Timed Automata such as UPPAAL can handle and we present a translator that performs this reduction. We then use our translator and UPPAAL to enforce time-dependent policy-based access control on an example application from the aerospace industry....

  19. Access to 4-Year Public Colleges and Degree Completion

    OpenAIRE

    Goodman, Joshua Samuel; Hurwitz, Michael; Smith, Jonathan

    2017-01-01

    Does access to 4-year colleges affect degree completion for students who would otherwise attend 2-year colleges? Admission to Georgia’s 4-year public sector requires minimum SAT scores. Regression discontinuity estimates show that access to this sector increases 4-year college enrollment and college quality, largely by diverting students from 2-year colleges. Access substantially increases bachelor’s degree completion rates for these relatively low-skilled students. SAT retaking behavior sugg...

  20. Access inequalities addressed by audit.

    Science.gov (United States)

    Singh, Rajiv; Pentland, Brian

    2005-08-01

    The Disability Discrimination Act (1995) protects disabled people from discrimination in access to services, facilities and goods as well as in education and employment. All hospitals have an inherent duty to enable access to services but this will now be enshrined in law. As the health sector has most contact with disability, it may be expected that most hospitals would already be in a good position to comply with the Act, especially one treating many patients with disability. However we identified many problems in a rehabilitation hospital setting by means of a simple access audit in March 2004. Recommendations were set out and by March 2005 considerable improvements had been made costing Pound 100,000. Although many necessary changes will be expensive, not all problems identified require costly correction. Many simply involve a change in staff attitudes and practices. We recommend that all hospitals start to identify the changes needed under the Act by means of a simple access audit that can be carried out by hospital staff with no specialist equipment.

  1. Joint control algorithm in access network

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    To deal with long probing delay and inaccurate probing results in the endpoint admission control method,a joint local and end-to-end admission control algorithm is proposed,which introduces local probing of access network besides end-to-end probing.Through local probing,the algorithm accurately estimated the resource status of the access network.Simulation shows that this algorithm can improve admission control performance and reduce users' average waiting time when the access network is heavily loaded.

  2. Determined to Learn: Accessing Education despite Life-Threatening Disasters

    Science.gov (United States)

    SchWeber, Claudine

    2008-01-01

    The "right to education" proclaimed by the 1948 Universal Declaration of Human Rights requires access to learning as well as the support systems. Since access can be interrupted by various circumstances, the possibility of providing continuity despite external dangers by using online distance education, offers an intriguing and valuable…

  3. Methods for ensuring compliance with regulatory requirements: regulators and operators

    International Nuclear Information System (INIS)

    Fleischmann, A.W.

    1989-01-01

    Some of the methods of ensuring compliance with regulatory requirements contained in various radiation protection documents such as Regulations, ICRP Recommendations etc. are considered. These include radiation safety officers and radiation safety committees, personnel monitoring services, dissemination of information, inspection services and legislative power of enforcement. Difficulties in ensuring compliance include outmoded legislation, financial and personnel constraints

  4. Facilitators and barriers to accessing reproductive health care for migrant beer promoters in Cambodia, Laos, Thailand and Vietnam: A mixed methods study

    Science.gov (United States)

    2012-01-01

    Background The purpose of the research was to assess access to sexual and reproductive health services for migrant women who work as beer promoters. This mixed methods research was conducted in Phnom Penh, Cambodia, Bangkok, Thailand, Vientiane, Laos, and Hanoi, Vietnam during 2010 to 2011. Methods Focus groups were held with beer promoters and separate focus groups or interviews with key informants to explore the factors affecting beer promoters’ access to health care institutions for reproductive health care. The findings of the focus groups were used to develop a survey for beer promoters. This survey was conducted in popular health institutions for these women in each of the four Asian cities. Results Several common themes were evident. Work demands prevented beer promoters from accessing health care. Institutional factors affecting care included cost, location, environmental factors (e.g. waiting times, cleanliness and confidentiality) and service factors (e.g. staff attitudes, clinic hours, and availability of medications). Personal factors affecting access were shyness and fear, lack of knowledge, and support from family and friends. The survey of the beer promoters confirmed that cost, location and both environmental and service factors impact on access to health care services for beer promoters. Many beer promoters are sexually active, and a significant proportion of those surveyed rely on sex work to supplement their income. Many also drink with their clients. Despite a few differences amongst the surveyed population, the findings were remarkably similar across the four research sites. Conclusions Recommendations from the research include the provision of evening and weekend clinic hours to facilitate access, free or low cost clinics, and health insurance through employer or government plans which are easy to access for migrants. Other improvements that would facilitate the access of beer promoters to these services include increased funding to hire

  5. Facilitators and barriers to accessing reproductive health care for migrant beer promoters in Cambodia, Laos, Thailand and Vietnam: A mixed methods study

    Directory of Open Access Journals (Sweden)

    Webber Gail

    2012-07-01

    Full Text Available Abstract Background The purpose of the research was to assess access to sexual and reproductive health services for migrant women who work as beer promoters. This mixed methods research was conducted in Phnom Penh, Cambodia, Bangkok, Thailand, Vientiane, Laos, and Hanoi, Vietnam during 2010 to 2011. Methods Focus groups were held with beer promoters and separate focus groups or interviews with key informants to explore the factors affecting beer promoters’ access to health care institutions for reproductive health care. The findings of the focus groups were used to develop a survey for beer promoters. This survey was conducted in popular health institutions for these women in each of the four Asian cities. Results Several common themes were evident. Work demands prevented beer promoters from accessing health care. Institutional factors affecting care included cost, location, environmental factors (e.g. waiting times, cleanliness and confidentiality and service factors (e.g. staff attitudes, clinic hours, and availability of medications. Personal factors affecting access were shyness and fear, lack of knowledge, and support from family and friends. The survey of the beer promoters confirmed that cost, location and both environmental and service factors impact on access to health care services for beer promoters. Many beer promoters are sexually active, and a significant proportion of those surveyed rely on sex work to supplement their income. Many also drink with their clients. Despite a few differences amongst the surveyed population, the findings were remarkably similar across the four research sites. Conclusions Recommendations from the research include the provision of evening and weekend clinic hours to facilitate access, free or low cost clinics, and health insurance through employer or government plans which are easy to access for migrants. Other improvements that would facilitate the access of beer promoters to these services include

  6. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Science.gov (United States)

    2010-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive Information...

  7. 42 CFR 84.146 - Method of measuring the power and torque required to operate blowers.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Method of measuring the power and torque required... RESPIRATORY PROTECTIVE DEVICES Supplied-Air Respirators § 84.146 Method of measuring the power and torque.... These are used to facilitate timing. To determine the torque or horsepower required to operate the...

  8. Extended abstract: Partial row projection methods

    Energy Technology Data Exchange (ETDEWEB)

    Bramley, R.; Lee, Y. [Indiana Univ., Bloomington, IN (United States)

    1996-12-31

    Accelerated row projection (RP) algorithms for solving linear systems Ax = b are a class of iterative methods which in theory converge for any nonsingular matrix. RP methods are by definition ones that require finding the orthogonal projection of vectors onto the null space of block rows of the matrix. The Kaczmarz form, considered here because it has a better spectrum for iterative methods, has an iteration matrix that is the product of such projectors. Because straightforward Kaczmarz method converges slowly for practical problems, typically an outer CG acceleration is applied. Definiteness, symmetry, or localization of the eigenvalues, of the coefficient matrix is not required. In spite of this robustness, work has generally been limited to structured systems such as block tridiagonal matrices because unlike many iterative solvers, RP methods cannot be implemented by simply supplying a matrix-vector multiplication routine. Finding the orthogonal projection of vectors onto the null space of block rows of the matrix in practice requires accessing the actual entries in the matrix. This report introduces a new partial RP algorithm which retains advantages of the RP methods.

  9. High School Student Information Access and Engineering Design Performance

    Science.gov (United States)

    Mentzer, Nathan

    2014-01-01

    Developing solutions to engineering design problems requires access to information. Research has shown that appropriately accessing and using information in the design process improves solution quality. This quasi-experimental study provides two groups of high school students with a design problem in a three hour design experience. One group has…

  10. 24 CFR 9.153 - Distribution of accessible dwelling units.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 1 2010-04-01 2010-04-01 false Distribution of accessible dwelling units. 9.153 Section 9.153 Housing and Urban Development Office of the Secretary, Department of Housing... dwelling units. Accessible dwelling units required by § 9.152 shall, to the maximum extent feasible, be...

  11. Enclosure and open access in communication scholarship

    OpenAIRE

    Morrison, Heather

    2011-01-01

    The current state of scholarly communication is one of contest between an increasingly commercial system that is dysfunctional and incompatible with the basic aims of scholarship, and emerging alternatives, particularly open access publishing and open access archiving. Two approaches to facilitating global participation in scholarly communication are contrasted in this paper; equity is seen as a superior goal to the donor model, which requires poverty or inequity to succeed. The current stat...

  12. What is needed for effective open access workflows?

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Institutions and funders are pushing forward open access with ever new guidelines and policies. Since institutional repositories are important maintainers of green open access, they should support easy and fast workflows for researchers and libraries to release publications. Based on the requirements specification of researchers, libraries and publishers, possible supporting software extensions are discussed. How does a typical workflow look like? What has to be considered by the researchers and by the editors in the library before releasing a green open access publication? Where and how can software support and improve existing workflows?

  13. Channel Access Algorithm Design for Automatic Identification System

    Institute of Scientific and Technical Information of China (English)

    Oh Sang-heon; Kim Seung-pum; Hwang Dong-hwan; Park Chan-sik; Lee Sang-jeong

    2003-01-01

    The Automatic Identification System (AIS) is a maritime equipment to allow an efficient exchange of the navigational data between ships and between ships and shore stations. It utilizes a channel access algorithm which can quickly resolve conflicts without any intervention from control stations. In this paper, a design of channel access algorithm for the AIS is presented. The input/output relationship of each access algorithm module is defined by drawing the state transition diagram, dataflow diagram and flowchart based on the technical standard, ITU-R M.1371. In order to verify the designed channel access algorithm, the simulator was developed using the C/C++ programming language. The results show that the proposed channel access algorithm can properly allocate transmission slots and meet the operational performance requirements specified by the technical standard.

  14. Recommendations for Mass Spectrometry Data Quality Metrics for Open Access Data (Corollary to the Amsterdam Principles)

    DEFF Research Database (Denmark)

    Kinsinger, Christopher R.; Apffel, James; Baker, Mark

    2011-01-01

    and deployment of methods for measuring and documenting data quality metrics. On September 18, 2010, the United States National Cancer Institute convened the "International Workshop on Proteomic Data Quality Metrics" in Sydney, Australia, to identify and address issues facing the development and use......Policies supporting the rapid and open sharing of proteomic data are being implemented by the leading journals in the field. The proteomics community is taking steps to ensure that data are made publicly accessible and are of high quality, a challenging task that requires the development...... of such methods for open access proteomics data. The stakeholders at the workshop enumerated the key principles underlying a framework for data quality assessment in mass spectrometry data that will meet the needs of the research community, journals, funding agencies, and data repositories. Attendees discussed...

  15. Recommendations for Mass Spectrometry Data Quality Metrics for Open Access Data (Corollary to the Amsterdam Principles)

    DEFF Research Database (Denmark)

    Kinsinger, Christopher R.; Apffel, James; Baker, Mark

    2012-01-01

    and deployment of methods for measuring and documenting data quality metrics. On September 18, 2010, the United States National Cancer Institute convened the "International Workshop on Proteomic Data Quality Metrics" in Sydney, Australia, to identify and address issues facing the development and use......Policies supporting the rapid and open sharing of proteomic data are being implemented by the leading journals in the field. The proteomics community is taking steps to ensure that data are made publicly accessible and are of high quality, a challenging task that requires the development...... of such methods for open access proteomics data. The stakeholders at the workshop enumerated the key principles underlying a framework for data quality assessment in mass spectrometry data that will meet the needs of the research community, journals, funding agencies, and data repositories. Attendees discussed...

  16. Transportation Limitation Access to the Small Islands (Case Study: Banggai Laut Regency)

    Science.gov (United States)

    Sunarti, S.

    2018-02-01

    Indonesia is as an archipelago and maritime country, the large number of Islands owned and scattered in all directions makes a challenge for the Government in equitable development. Development in Indonesia has not been spread evenly and tends to focus on the big island, while the smaller islands are still far behind and lack of government attention. One of them is the lack of infrastructure especially the access to the small islands. Among the small islands in Indonesia with minimal maritime infrastructure or transportation is Banggai Laut Regency, Central Sulawesi Province. This Regency is a new regency that separate itself from its previous regency that is Banggai Kepulauan Regency in about 4 years ago. For the development of the Banggai Laut Regency, access to reach that regency is quite difficult. Therefore, the aim of this research is to find infrastructure development strategy to support the development of Banggai Laut Regency. The research method used was the concurrent model mixed method. Data collection method was done with primary data through field observation and interview, secondary data through literature and document review. Analytical techniques used are qualitative descriptive and Map Overlay techniques using GIS to describe the characteristics of study areas and spatial relationships between islands. The results of this research conclude that the Banggai Laut Regency requires infrastructure development particularly maritime transportation to enhance accessibility of the community headed to Banggi Laut Regency or headed to another island from the Banggai Laut Regency.

  17. The SSC access shafts calculational study

    International Nuclear Information System (INIS)

    Baishev, I.S.; Mokhov, N.V.; Toohig, T.E.

    1991-06-01

    The SSC generic shaft requirements and access spacing are considered elsewhere. The shafts connecting the ground surface with the underground accelerator tunnel deliver to the surface some portion of the radiation created in the tunnel. The radiation safety problem of access shafts consists of two major questions: Does the dose equivalent at the ground surface exceed permissible limits? If it exceeds those limits, what additional shielding measures are required? A few works deal with this problem for high energy machines. This work is an attempt to answer these questions for the basic types of shafts specific to the SSC magnet delivery, utility and personnel shafts using full-scale Monte-Carlo calculations of the entire process from hadronic cascades in the lattice elements to particles scattered in the tunnel, niches, alcoves, shafts and surface bunkers and buildings. 9 refs., 16 figs., 1 tab

  18. User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns

    Directory of Open Access Journals (Sweden)

    Jennifer Golbeck

    2016-03-01

    Full Text Available Users share vast amounts of personal information online, but are they fully aware of what information they are sharing and with whom? In this paper, we focused on Facebook apps and set out to understand how concerned users are about privacy and how well-informed they are about what personal data apps can access. We found that initially, subjects were generally under-informed about what data apps could access from their profiles. After viewing additional information about these permissions, subjects’ concern about privacy on Facebook increased. Subjects’ understanding of what data apps were able to access increased, although even after receiving explicit information on the topic, many subjects still did not fully understand the extent to which apps could access their data.

  19. ACCESS AND USE OF HEALTH SERVICES BY GYPSY POPULATION: A SYSTEMATIC REVIEW

    Directory of Open Access Journals (Sweden)

    Ana Cláudia Conceição da Silva

    2016-06-01

    Full Text Available Study aimed to characterize the studies on access and use of health services by the Roma population. A systematic review was performed by searching for articles from databases OvidSP/Medline, ProQuest, Web of Science and LILACS, between 2003 and 2013. Initially, 115 citations were selected: (51 Medline, (17 ProQuest, ( 47 Web of Science, (0 Lilacs. After thorough reading, 10 articles were selected which were related to access and health of Roma population. Many studies seemed to meet inclusion criteria by reading the title and abstract, but after thorough reading they did not meet the requirements. All are in English idiom. Most of the UK in the period of 2012-1013, quantitative studies. They presented varied methods, without methodological rigor and detail, with unrepresentative samples and little comparability findings.

  20. Data access and its implementation at Wendelstein 7-X

    Energy Technology Data Exchange (ETDEWEB)

    Bluhm, T. [Max-Planck-Institute fuer Plasmaphysik, Teilinstitut Greifswald, Wendelsteinstr. 1, 17491 Greifswald (Germany)], E-mail: torsten.bluhm@ipp.mpg.de; Heimann, P. [Max-Planck-Institute fuer Plasmaphysik, Boltzmannstr. 2, 85748 Garching (Germany); Hennig, Ch. [Max-Planck-Institute fuer Plasmaphysik, Teilinstitut Greifswald, Wendelsteinstr. 1, 17491 Greifswald (Germany); Kroiss, H. [Max-Planck-Institute fuer Plasmaphysik, Boltzmannstr. 2, 85748 Garching (Germany); Kuehner, G. [Max-Planck-Institute fuer Plasmaphysik, Teilinstitut Greifswald, Wendelsteinstr. 1, 17491 Greifswald (Germany); Maier, J. [Max-Planck-Institute fuer Plasmaphysik, Boltzmannstr. 2, 85748 Garching (Germany); Riemann, H. [Max-Planck-Institute fuer Plasmaphysik, Teilinstitut Greifswald, Wendelsteinstr. 1, 17491 Greifswald (Germany); Zilker, M. [Max-Planck-Institute fuer Plasmaphysik, Boltzmannstr. 2, 85748 Garching (Germany)

    2008-04-15

    The increasing number of data acquisition stations and setups in laboratory environments at Wendelstein 7-X does already produce a considerable amount of data by now. Diagnosticians want to view the acquired data in a comfortable way and use them for calculations in their own test and analysis algorithms. To prepare for full operation of W7-X, a reasonable approach is to provide data access methods that stay as close as possible to the final data access concept. This requires taking care of the special needs of W7-X regarding continuously acquired data, segment based parameter switching and synchronization of data from different diagnostics. Therefore, a data access interface has been designed and implemented considering continuous data acquisition as well as usability and performance issues. The interface and its usage in different software environments (e.g. high level scientific programming languages) will be explained. Also, the integration of user defined off line analysis algorithms will be described. Additionally, the DataBrowser will be presented. The DataBrowser is a Java application that can browse continuously acquired data of different kind, provides several types of plots including zooming functions to display the data and the corresponding parameters and offers export functions to save selected data locally.

  1. Algorithmic PON/P2P FTTH Access Network Design for CAPEX Minimization

    DEFF Research Database (Denmark)

    Papaefthimiou, Kostantinos; Tefera, Yonas; Mihylov, Dimitar

    2013-01-01

    one. It provides an obvious advantage for the end users in terms of high achievable data rates. On the other hand, the high initial deployment cost required exists as the heaviest impediment. The main goal of this paper is to study different approaches when designing a fiber access network. More......Due to the emergence of high bandwidth-requiring services, telecommunication operators (telcos) are called to upgrade their fixed access network. In order to keep up with the competition, they must consider different optical access network solutions with Fiber To The Home (FTTH) as the prevailing...

  2. Facilitating or Restraining Access To Genetic Resources? Procedural Dimensions In Kenya

    Directory of Open Access Journals (Sweden)

    Evanson Chege Kamau

    2009-09-01

    Full Text Available States have the right to regulate access to biological resources subject to national legislations. Allowing, restricting or prohibiting access, however, requires a balance to avoid contravention of the objectives of the Convention on Biological Diversity. The Convention requires that, in regulating access, the measures adopted do not become a hindrance to access. In many instances, however, this has been the case. Overreaction to previous cases of bio-piracy and over-enthusiasm to tap into the benefits from discovered genetic resources have caused many provider countries to either over-regulate or extremely complicate access procedures, thus deterring access. In some instances, over-regulation and complex procedures are to be blamed on the users’ reluctance to collaborate with providers in minimising or eliminating abuse. Also, the need to protect certain rights over genetic resources or of an intellectual (property character, for example, might at times complicate regulation. While it is appreciated that such issues must also be taken into account in addressing and creating a balance in access and benefit sharing, a discussion embracing all these aspects cannot be captured within the ambit of this article. Focus is therefore laid on the procedural dimensions of access in Kenya and suggestions for improvement.

  3. Recommendations for Mass Spectrometry Data Quality Metrics for Open Access Data (Corollary to the Amsterdam Principles)

    DEFF Research Database (Denmark)

    Kinsinger, Christopher R.; Apffel, James; Baker, Mark

    2012-01-01

    Policies supporting the rapid and open sharing of proteomic data are being implemented by the leading journals in the field. The proteomics community is taking steps to ensure that data are made publicly accessible and are of high quality, a challenging task that requires the development...... of such methods for open access proteomics data. The stakeholders at the workshop enumerated the key principles underlying a framework for data quality assessment in mass spectrometry data that will meet the needs of the research community, journals, funding agencies, and data repositories. Attendees discussed....... This workshop report explores the historic precedents, key discussions, and necessary next steps to enhance the quality of open access data. By agreement, this article is published simultaneously in the Journal of Proteome Research, Molecular and Cellular Proteomics, Proteomics, and Proteomics Clinical...

  4. Recommendations for Mass Spectrometry Data Quality Metrics for Open Access Data (Corollary to the Amsterdam Principles)

    DEFF Research Database (Denmark)

    Kinsinger, Christopher R.; Apffel, James; Baker, Mark

    2011-01-01

    Policies supporting the rapid and open sharing of proteomic data are being implemented by the leading journals in the field. The proteomics community is taking steps to ensure that data are made publicly accessible and are of high quality, a challenging task that requires the development...... of such methods for open access proteomics data. The stakeholders at the workshop enumerated the key principles underlying a framework for data quality assessment in mass spectrometry data that will meet the needs of the research community, journals, funding agencies, and data repositories. Attendees discussed....... This workshop report explores the historic precedents, key discussions, and necessary next steps to enhance the quality of open access data. By agreement, this article is published simultaneously in the Journal of Proteome Research, Molecular and Cellular Proteomics, Proteomics, and Proteomics Clinical...

  5. Kinds of Access

    DEFF Research Database (Denmark)

    Overgaard, Morten; Sandberg, Kristian

    2014-01-01

    that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesise that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about...

  6. Rethinking ADA signage standards for low-vision accessibility.

    Science.gov (United States)

    Arditi, Aries

    2017-05-01

    Americans With Disabilities Act (ADA) and International Code Council (ICC) standards for accessible buildings and facilities affect design and construction of all new and renovated buildings throughout the United States, and form the basis for compliance with the ADA. While these standards may result in acceptable accessibility for people who are fully blind, they fall far short of what they could and should accomplish for those with low vision. In this article I critique the standards, detailing their lack of evidence base and other shortcomings. I suggest that simply making existing requirements stricter (e.g., by mandating larger letter size or higher contrasts) will not ensure visual accessibility and therefore cannot act as a valid basis for compliance with the law. I propose two remedies. First, requirements for visual characteristics of signs intended to improve access for those with low vision should be expressed not in terms of physical features, such as character height and contrast, but rather in terms of the distance at which a sign can be read by someone with nominally normal (20/20) visual acuity under expected lighting conditions for the installed environment. This would give sign designers greater choice in design parameters but place on them the burden of ensuring legibility. Second, mounting of directional signs, which are critical for effective and efficient wayfinding, should be required to be in consistent and approachable locations so that those with reduced acuity may view them at close distance.

  7. CERN Confirms commitment to Open Access

    CERN Multimedia

    2005-01-01

    The CERN Library Information desk.At a meeting on the Wednesday before Easter, the Executive Committee endorsed a policy of open access to all the laboratory's results, as expressed in the document ‘Continuing CERN action on Open Access' (http://cds.cern.ch/record/828991/files/open-2005-006.pdf), released by its Scientific Information Policy Board (SIPB) earlier in the month. "This underlines CERN's commitment to sharing the excitement of fundamental research with as wide an audience as possible", said Guido Altarelli, current SIPB chairman. Open Access to scientific knowledge is today the goal of an increasing component of the worldwide scientific community. It is a concept, made possible by new electronic tools, which would bring enormous benefits to all readers by giving them free access to research results. CERN has implicitly supported such moves from its very beginning. Its Convention (http://cds.cern.ch/record/330625/files/cm-p00046871.pdf), adopted in 1953, requires openness, stipulating that "......

  8. Publishing in Open Access Education Journals: The Authors' Perspectives

    Science.gov (United States)

    Coonin, Bryna; Younce, Leigh M.

    2010-01-01

    Open access publishing is now an accepted method of scholarly communication. However, the greatest traction for open access publishing thus far has been in the sciences. Penetration of open access publishing has been much slower among the social sciences. This study surveys 309 authors from recent issues of open access journals in education to…

  9. Insurance + Access ≠ Health Care: Typology of Barriers to Health Care Access for Low-Income Families

    Science.gov (United States)

    DeVoe, Jennifer E.; Baez, Alia; Angier, Heather; Krois, Lisa; Edlund, Christine; Carney, Patricia A.

    2007-01-01

    PURPOSE Public health insurance programs have expanded coverage for the poor, and family physicians provide essential services to these vulnerable populations. Despite these efforts, many Americans do not have access to basic medical care. This study was designed to identify barriers faced by low-income parents when accessing health care for their children and how insurance status affects their reporting of these barriers. METHODS A mixed methods analysis was undertaken using 722 responses to an open-ended question on a health care access survey instrument that asked low-income Oregon families, “Is there anything else you would like to tell us?” Themes were identified using immersion/crystallization techniques. Pertinent demographic attributes were used to conduct matrix coded queries. RESULTS Families reported 3 major barriers: lack of insurance coverage, poor access to services, and unaffordable costs. Disproportionate reporting of these themes was most notable based on insurance status. A higher percentage of uninsured parents (87%) reported experiencing difficulties obtaining insurance coverage compared with 40% of those with insurance. Few of the uninsured expressed concerns about access to services or health care costs (19%). Access concerns were the most common among publicly insured families, and costs were more often mentioned by families with private insurance. Families made a clear distinction between insurance and access, and having one or both elements did not assure care. Our analyses uncovered a 3-part typology of barriers to health care for low-income families. CONCLUSIONS Barriers to health care can be insurmountable for low-income families, even those with insurance coverage. Patients who do not seek care in a family medicine clinic are not necessarily getting their care elsewhere. PMID:18025488

  10. Radio Access Sharing Strategies for Multiple Operators in Cellular Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Iversen, Villy Bæk

    2015-01-01

    deployments (required for coverage enhancement), increased base station utilization, and reduced overall power consumption. Today, network sharing in the radio access part is passive and limited to cell sites. With the introduction of Cloud Radio Access Network and Software Defined Networking adoption...... to the radio access network, the possibility for sharing baseband processing and radio spectrum becomes an important aspect of network sharing. This paper investigates strategies for active sharing of radio access among multiple operators, and analyses the individual benefits depending on the sharing degree...

  11. Prevalence of Sharing Access Credentials in Electronic Medical Records

    Science.gov (United States)

    Korach, Tzfania; Shreberk-Hassidim, Rony; Thomaidou, Elena; Uzefovsky, Florina; Ayal, Shahar; Ariely, Dan

    2017-01-01

    Objectives Confidentiality of health information is an important aspect of the physician patient relationship. The use of digital medical records has made data much more accessible. To prevent data leakage, many countries have created regulations regarding medical data accessibility. These regulations require a unique user ID for each medical staff member, and this must be protected by a password, which should be kept undisclosed by all means. Methods We performed a four-question Google Forms-based survey of medical staff. In the survey, each participant was asked if he/she ever obtained the password of another medical staff member. Then, we asked how many times such an episode occurred and the reason for it. Results A total of 299 surveys were gathered. The responses showed that 220 (73.6%) participants reported that they had obtained the password of another medical staff member. Only 171 (57.2%) estimated how many time it happened, with an average estimation of 4.75 episodes. All the residents that took part in the study (45, 15%) had obtained the password of another medical staff member, while only 57.5% (38/66) of the nurses reported this. Conclusions The use of unique user IDs and passwords to defend the privacy of medical data is a common requirement in medical organizations. Unfortunately, the use of passwords is doomed because medical staff members share their passwords with one another. Strict regulations requiring each staff member to have it's a unique user ID might lead to password sharing and to a decrease in data safety. PMID:28875052

  12. Application of an access technology delivery protocol to two children with cerebral palsy.

    Science.gov (United States)

    Mumford, Leslie; Chau, Tom

    2015-07-14

    This study further delineates the merits and limitations of the Access Technology Delivery Protocol (ATDP) through its application to two children with severe disabilities. We conducted mixed methods case studies to demonstrate the ATDP with two children with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with custom access technologies. After 16 weeks, one child's switch offered improved response efficiency, high teacher satisfaction and increased participation. The other child's switch resulted in improved satisfaction and switch effectiveness but lower overall efficiency. The latter child was no longer using his switch by the end of the study. These contrasting findings indicate that changes to any contextual factors that may impact the user's switch performance should mandate a reassessment of the access pathway. Secondly, it is important to ensure that individuals who will be responsible for switch training be identified at the outset and engaged throughout the ATDP. Finally, the ATDP should continue to be tested with individuals with severe disabilities to build an evidence base for the delivery of response efficient access solutions. Implications for Rehabilitation A data-driven, comprehensive access technology delivery protocol for children with complex communication needs could help to mitigate technology abandonment. Successful adoption of an access technology requires personalized design, training of the technology user, the teaching staff, the caregivers and other communication partners, and integration with functional activities.

  13. 24 CFR 598.410 - Public access to materials and proceedings.

    Science.gov (United States)

    2010-04-01

    ... DESIGNATIONS Post-Designation Requirements § 598.410 Public access to materials and proceedings. After... 24 Housing and Urban Development 3 2010-04-01 2010-04-01 false Public access to materials and... Development (Continued) OFFICE OF ASSISTANT SECRETARY FOR COMMUNITY PLANNING AND DEVELOPMENT, DEPARTMENT OF...

  14. Authentication Method for Privacy Protection in Smart Grid Environment

    Directory of Open Access Journals (Sweden)

    Do-Eun Cho

    2014-01-01

    Full Text Available Recently, the interest in green energy is increasing as a means to resolve problems including the exhaustion of the energy source and, effective management of energy through the convergence of various fields. Therefore, the projects of smart grid which is called intelligent electrical grid for the accomplishment of low carbon green growth are being carried out in a rush. However, as the IT is centered upon the electrical grid, the shortage of IT also appears in smart grid and the complexity of convergence is aggravating the problem. Also, various personal information and payment information within the smart grid are gradually becoming big data and target for external invasion and attack; thus, there is increase in concerns for this matter. The purpose of this study is to analyze the security vulnerabilities and security requirement within smart grid and the authentication and access control method for privacy protection within home network. Therefore, we propose a secure access authentication and remote control method for user’s home device within home network environment, and we present their security analysis. The proposed access authentication method blocks the unauthorized external access and enables secure remote access to home network and its devices with a secure message authentication protocol.

  15. Accessibility analysis in manufacturing processes using visibility cones

    Institute of Scientific and Technical Information of China (English)

    尹周平; 丁汉; 熊有伦

    2002-01-01

    Accessibility is a kind of important design feature of products,and accessibility analysis has been acknowledged as a powerful tool for solving computational manufacturing problems arising from different manufacturing processes.After exploring the relations among approachability,accessibility and visibility,a general method for accessibility analysis using visibility cones (VC) is proposed.With the definition of VC of a point,three kinds of visibility of a feature,namely complete visibility cone (CVC),partial visibility cone (PVC) and local visibility cone (LVC),are defined.A novel approach to computing VCs is formulated by identifying C-obstacles in the C-space,for which a general and efficient algorithm is proposed and implemented by making use of visibility culling.Lastly,we discuss briefly how to realize accessibility analysis in numerically controlled (NC) machining planning,coordinate measuring machines (CMMs) inspection planning and assembly sequence planning with the proposed methods.

  16. Accessing the SEED genome databases via Web services API: tools for programmers.

    Science.gov (United States)

    Disz, Terry; Akhter, Sajia; Cuevas, Daniel; Olson, Robert; Overbeek, Ross; Vonstein, Veronika; Stevens, Rick; Edwards, Robert A

    2010-06-14

    The SEED integrates many publicly available genome sequences into a single resource. The database contains accurate and up-to-date annotations based on the subsystems concept that leverages clustering between genomes and other clues to accurately and efficiently annotate microbial genomes. The backend is used as the foundation for many genome annotation tools, such as the Rapid Annotation using Subsystems Technology (RAST) server for whole genome annotation, the metagenomics RAST server for random community genome annotations, and the annotation clearinghouse for exchanging annotations from different resources. In addition to a web user interface, the SEED also provides Web services based API for programmatic access to the data in the SEED, allowing the development of third-party tools and mash-ups. The currently exposed Web services encompass over forty different methods for accessing data related to microbial genome annotations. The Web services provide comprehensive access to the database back end, allowing any programmer access to the most consistent and accurate genome annotations available. The Web services are deployed using a platform independent service-oriented approach that allows the user to choose the most suitable programming platform for their application. Example code demonstrate that Web services can be used to access the SEED using common bioinformatics programming languages such as Perl, Python, and Java. We present a novel approach to access the SEED database. Using Web services, a robust API for access to genomics data is provided, without requiring large volume downloads all at once. The API ensures timely access to the most current datasets available, including the new genomes as soon as they come online.

  17. Variation in Direct Access to Tests to Investigate Cancer: A Survey of English General Practitioners

    Science.gov (United States)

    Nicholson, Brian D.; Oke, Jason L.; Rose, Peter W.; Mant, David

    2016-01-01

    Background The 2015 NICE guidelines for suspected cancer recommend that English General Practitioners have direct access to diagnostic tests to investigate symptoms of cancer that do not meet the criteria for urgent referral. We aimed to identify the proportion of GPs in England with direct access to these tests. Methods We recruited 533 English GPs through a national clinical research network to complete an online survey about direct access to laboratory, radiology, and endoscopy tests in the three months leading up to the release of the 2015 NICE guidance. If they had direct access to a diagnostic test, GPs were asked about the time necessary to arrange a test and receive a report. Results are reported by NHS sub-region and, adjusting for sampling, for England as a whole. Results Almost all GPs reported direct access to x-ray and laboratory investigations except faecal occult blood testing (54%, 95% CI 49–59%) and urine protein electrophoresis (89%, 95% CI 84–92%). Fewer GPs had direct access to CT scans (54%, 95% CI 49–59%) or endoscopy (colonoscopy 32%, 95% CI 28–37%; gastroscopy 72%, 95% CI 67–77%). There was significant variation in direct access between NHS regions for the majority of imaging tests—for example, from 20 to 85% to MRI. Apart from x-ray, very few GPs (1–22%) could access radiology and endoscopy within the timescales recommended by NICE. The modal request to test time was 2–4 weeks for routine radiology and 4–6 weeks for routine endoscopy with results taking another 1–2 weeks. Conclusion At the time that the 2015 NICE guideline was released, local investment was required to not only provide direct access but also reduce the interval between request and test and speed up reporting. Further research using our data as a benchmark is now required to identify whether local improvements in direct access have been achieved in response to the NICE targets. If alternative approaches to test access are to be proposed they must be

  18. Information-flow-based Access Control for Virtualized Systems

    Directory of Open Access Journals (Sweden)

    Dmitriy Aleksandrovich Postoev

    2014-12-01

    Full Text Available The article is devoted to the method of information-flow-based access control, adopted for virtualized systems. General structure of access control system for virtual infrastructure is proposed.

  19. Characterization of genetic diversity of bird-of-paradise accessions

    Directory of Open Access Journals (Sweden)

    Alessandro Aparecido Brito dos Santos

    2018-04-01

    Full Text Available This study aimed to characterize genetic diversity in the bird-of-paradise (Strelitzia reginae collection at the Universidade do Estado de Mato Grosso Carlos Alberto Reyes Maldonado (UNEMAT by estimating genetic divergence among genotypes based on agronomic characteristics. Seven agronomic characters were evaluated with average Euclidean distance. The UPGMA (Unweighted Pair Group Method with Arithmetic Mean hierarchical clustering method was used between groups, as well as Tocher’s optimization clustering method and principal component analysis (PCA, in order to classify the genotypes with maximum similarity between groups. Measures of genetic dissimilarity with average Euclidean distance verified the existence of genetic variability among accessions since the amplitude of dissimilarity values ranged from 1.09 to 36.97. Tocher’s clustering method verified the formation of two distinct groups. UPGMA hierarchical clustering, based on the dissimilarity matrix, verified the formation of three groups with 30% cutoff point. Based on the main components analysis, we verified genetic divergence between the bird-of-paradise accessions in the UNEMAT Collection. The most promising combinations for future crosses in breeding programs comprise accessions 1, 11, and 23 and accession 1 as the most divergent among the accessions evaluated.

  20. Interactive access to LP DAAC satellite data archives through a combination of open-source and custom middleware web services

    Science.gov (United States)

    Davis, Brian N.; Werpy, Jason; Friesz, Aaron M.; Impecoven, Kevin; Quenzer, Robert; Maiersperger, Tom; Meyer, David J.

    2015-01-01

    Current methods of searching for and retrieving data from satellite land remote sensing archives do not allow for interactive information extraction. Instead, Earth science data users are required to download files over low-bandwidth networks to local workstations and process data before science questions can be addressed. New methods of extracting information from data archives need to become more interactive to meet user demands for deriving increasingly complex information from rapidly expanding archives. Moving the tools required for processing data to computer systems of data providers, and away from systems of the data consumer, can improve turnaround times for data processing workflows. The implementation of middleware services was used to provide interactive access to archive data. The goal of this middleware services development is to enable Earth science data users to access remote sensing archives for immediate answers to science questions instead of links to large volumes of data to download and process. Exposing data and metadata to web-based services enables machine-driven queries and data interaction. Also, product quality information can be integrated to enable additional filtering and sub-setting. Only the reduced content required to complete an analysis is then transferred to the user.

  1. Transradial access for coronary angiography: a single operator's experience of 500 cases

    International Nuclear Information System (INIS)

    Ali, J.; Aziz, S.; Javed, A.; Kayani, A.M.

    2011-01-01

    Objective: The purpose of the present study was to assess the feasibility, success, and safety of the transradial approach (TRA) for diagnostic coronary angiography. Study Design: Descriptive study. Place and Duration of Study: The study was carried out in Armed Forces Institute of Cardiology- National Institute of Heart Diseases (AFIC-NIHD) over a period of ten months from June 2009 to March 2010. Patients and Methods: We collected data of 500 consecutive patients who underwent coronary catheterization by the transradial approach. Transradial access was performed only if the Allen's test was normal (positive). Patients with previous CABG or requiring right heart catheterization were excluded from this study. Study endpoints included procedure success rate, vascular complications at access site, and major adverse cardiac and cerebrovascular events during hospitalization. Results: Mean age of the patients was 52 years (range 33-77 yrs) and 72.8% (n= 364) were men and 27.2% (n=136) were females. The vast majority of cases (98.4%) were elective. The right radial artery was used in 98% of cases. Procedural success was achieved in 90.6% cases (453/500). No case of vascular complications such as major access site bleeding, vascular perforation, radial artery occlusion, forearm ischemia, compartment syndrome or MACE was observed. Conclusion: Transradial access for coronary angiography is a safe, effective and elegant alternative to trans femoral access. (author)

  2. New Methods for Kinematic Modelling and Calibration of Robots

    DEFF Research Database (Denmark)

    Søe-Knudsen, Rune

    2014-01-01

    the accuracy in an easy and accessible way. The required equipment is accessible, since the cost is held to a minimum and can be made with conventional processing equipment. Our first method calibrates the kinematics of a robot using known relative positions measured with the robot itself and a plate...... with holes matching the robot tool flange. The second method calibrates the kinematics using two robots. This method allows the robots to carry out the collection of measurements and the adjustment, by themselves, after the robots have been connected. Furthermore, we also propose a method for restoring......Improving a robot's accuracy increases its ability to solve certain tasks, and is therefore valuable. Practical ways of achieving this improved accuracy, even after robot repair, is also valuable. In this work, we introduce methods that improve the robot's accuracy and make it possible to maintain...

  3. Open access for freight railroads : worthwhile or wasteful disruption, final report.

    Science.gov (United States)

    2009-01-01

    This study compares the experience of the freight railroads in North America, Europe and : Australia with required access. Europe and Australia have pursued very different network access : strategies than the United States and Canada. Both the Europe...

  4. Proximity Displays for Access Control

    Science.gov (United States)

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  5. AN AUTOMATIC AND METHODOLOGICAL APPROACH FOR ACCESSIBLE WEB APPLICATIONS

    Directory of Open Access Journals (Sweden)

    Lourdes Moreno

    2007-06-01

    Full Text Available Semantic Web approaches try to get the interoperability and communication among technologies and organizations. Nevertheless, sometimes it is forgotten that the Web must be useful for every user, consequently it is necessary to include tools and techniques doing Semantic Web be accessible. Accessibility and usability are two usually joined concepts widely used in web application development, however their meaning are different. Usability means the way to make easy the use but accessibility is referred to the access possibility. For the first one, there are many well proved approaches in real cases. However, accessibility field requires a deeper research that will make feasible the access to disable people and also the access to novel non-disable people due to the cost to automate and maintain accessible applications. In this paper, we propose one architecture to achieve the accessibility in web-environments dealing with the WAI accessibility standard and the Universal Design paradigm. This architecture tries to control the accessibility in web applications development life-cycle following a methodology starting from a semantic conceptual model and leans on description languages and controlled vocabularies.

  6. Reduction in requirements for allogeneic blood products: nonpharmacologic methods.

    Science.gov (United States)

    Hardy, J F; Bélisle, S; Janvier, G; Samama, M

    1996-12-01

    Various strategies have been proposed to decrease bleeding and allogeneic transfusion requirements during and after cardiac operations. This article attempts to document the usefulness, or lack thereof, of the nonpharmacologic methods available in clinical practice. Blood conservation methods were reviewed in chronologic order, as they become available to patients during the perisurgical period. The literature in support of or against each strategy was reexamined critically. Avoidance of preoperative anemia and adherence to published guidelines for the practice of transfusion are of paramount importance. Intraoperatively, tolerance of low hemoglobin concentrations and use of autologous blood (predonated or harvested before bypass) will reduce allogeneic transfusions. The usefulness of plateletpheresis and retransfusion of shed mediastinal fluid remains controversial. Intraoperatively and postoperatively, maintenance of normothermia contributes to improved hemostasis. Several approaches have been shown to be effective. An efficient combination of methods can reduce, and sometimes abolish, the need for allogeneic blood products after cardiac operations, inasmuch as all those involved in the care of cardiac surgical patients adhere thoughtfully to existing transfusion guidelines.

  7. Designing a Secure E-commerce with Credential Purpose-based Access Control

    OpenAIRE

    Norjihan Abdul Ghani; Harihodin Selamat; Zailani Mohamed Sidek

    2014-01-01

    The rapid growth of e-commerce has created a great opportunities for both businesses and end users. The essential e-commerce process is required for the successful operation and management of e-commerce activities. One of the processes is access control and security. E-commerce must establish a secure access between the parties in an e-commerce transaction by authenticating users, authorizing access, and enforcing security features. The e-commerce application must authorize access to only tho...

  8. 45 CFR 613.2 - Requesting access to records.

    Science.gov (United States)

    2010-10-01

    ... and/or date and place of birth of the individual; (2) Your own identity, as required in paragraph (c...) Verification of identity. When requesting access to records about yourself, NSF requires that you verify your identity in an appropriate fashion. Individuals appearing in person should be prepared to show reasonable...

  9. 42 CFR 51.42 - Access to facilities and residents.

    Science.gov (United States)

    2010-10-01

    ... REQUIREMENTS APPLICABLE TO THE PROTECTION AND ADVOCACY FOR INDIVIDUALS WITH MENTAL ILLNESS PROGRAM Access to... such monitoring have access to the minor or adult with a legal guardian. The system shall take no... request, by the P&A system when: (1) An incident is reported or a complaint is made to the P&A system; (2...

  10. AMES: Towards an Agile Method for ERP Selection

    OpenAIRE

    Juell-Skielse, Gustaf; Nilsson, Anders G.; Nordqvist, Andreas; Westergren, Mattias

    2012-01-01

    Conventional on-premise installations of ERP are now rapidly being replaced by ERP as service. Although ERP becomes more accessible and no longer requires local infrastructure, current selection methods do not take full advantage of the provided agility. In this paper we present AMES (Agile Method for ERP Selection), a novel method for ERP selection which better utilizes the strengths of service oriented ERP. AMES is designed to shorten lead time for selection, support identification of essen...

  11. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    Moore, J.W.; Banks, W.W.

    1988-01-01

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  12. Review of clinically accessible methods to determine lean body mass for normalization of standardized uptake values

    International Nuclear Information System (INIS)

    DEVRIESE, Joke; POTTEL, Hans; BEELS, Laurence; MAES, Alex; VAN DE WIELE, Christophe; GHEYSENS, Olivier

    2016-01-01

    With the routine use of 2-deoxy-2-[ 18 F]-fluoro-D-glucose (18F-FDG) positron emission tomography/computed tomography (PET/CT) scans, metabolic activity of tumors can be quantitatively assessed through calculation of SUVs. One possible normalization parameter for the standardized uptake value (SUV) is lean body mass (LBM), which is generally calculated through predictive equations based on height and body weight. (Semi-)direct measurements of LBM could provide more accurate results in cancer populations than predictive equations based on healthy populations. In this context, four methods to determine LBM are reviewed: bioelectrical impedance analysis, dual-energy X-ray absorptiometry. CT, and magnetic resonance imaging. These methods were selected based on clinical accessibility and are compared in terms of methodology, precision and accuracy. By assessing each method’s specific advantages and limitations, a well-considered choice of method can hopefully lead to more accurate SUVLBM values, hence more accurate quantitative assessment of 18F-FDG PET images.

  13. Making accessibility analyses accessible: A tool to facilitate the public review of the effects of regional transportation plans on accessibility

    OpenAIRE

    Golub, Aaron; Robinson, Glenn; Brendan Nee, Brendan Nee

    2013-01-01

    The regional transportation planning process in the United States has not been easily opened to public oversight even after strengthened requirements for public participation and civil rights considerations. In the effort to improve the public review of regional transportation plans, this paper describes the construction of a proof-of concept web-based tool designed to analyze the effects of regional transportation plans on accessibility to jobs and other essential destinations. The tool allo...

  14. The new biometric access control system resembles a big electronic eye. It will be used to control access to the LHC from 2007 onwards.

    CERN Multimedia

    Maximilien Brice

    2006-01-01

    The new LHC access control systems will soon be using the latest technology: optical recognition based on iris image data. In order to gain access to the tunnel it will be your eye, not your credentials that you'll be required to show! As of September, the entrance point at Point 8 should be the first to be fitted out with iris recognition equipment. The other access shafts will then gradually be equipped one by one.

  15. Support the Open Access Movement

    CERN Multimedia

    2005-01-01

    CERN's Executive Board recently endorsed a new policy of open access to the laboratory's results: Continuing CERN action on Open Access (OA) [http://cds.cern.ch/record/828991/files/open-2005-006.pdf]. What does this policy mean for you? CERN authors have two responsibilities: Submit your document to the CERN Document Server; Consider submitting future articles to an Open Access journal. Since 2001, Operational Circular No. 6 has required every CERN author (Staff member, Fellow, or any Associated member of personnel who is allowed to use CERN as his affiliation) to submit a copy of their scientific documents to the CERN Document Server (CDS). For some groups all approved documents are submitted by the secretary (see the Departments' policies at: http://library.cern.ch/cern_publications/cern_publication_policy.html). Each author should personally also ensure the submission of any other articles which are not added in this way, such as conference contributions and review articles. It is not sufficient to re...

  16. Comparison of different methods to extract the required coefficient of friction for level walking.

    Science.gov (United States)

    Chang, Wen-Ruey; Chang, Chien-Chi; Matz, Simon

    2012-01-01

    The required coefficient of friction (RCOF) is an important predictor for slip incidents. Despite the wide use of the RCOF there is no standardised method for identifying the RCOF from ground reaction forces. This article presents a comparison of the outcomes from seven different methods, derived from those reported in the literature, for identifying the RCOF from the same data. While commonly used methods are based on a normal force threshold, percentage of stance phase or time from heel contact, a newly introduced hybrid method is based on a combination of normal force, time and direction of increase in coefficient of friction. Although no major differences were found with these methods in more than half the strikes, significant differences were found in a significant portion of strikes. Potential problems with some of these methods were identified and discussed and they appear to be overcome by the hybrid method. No standard method exists for determining the required coefficient of friction (RCOF), an important predictor for slipping. In this study, RCOF values from a single data set, using various methods from the literature, differed considerably for a significant portion of strikes. A hybrid method may yield improved results.

  17. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  18. Multi-Dimensional Bitmap Indices for Optimising Data Access within Object Oriented Databases at CERN

    CERN Document Server

    Stockinger, K

    2001-01-01

    Efficient query processing in high-dimensional search spaces is an important requirement for many analysis tools. In the literature on index data structures one can find a wide range of methods for optimising database access. In particular, bitmap indices have recently gained substantial popularity in data warehouse applications with large amounts of read mostly data. Bitmap indices are implemented in various commercial database products and are used for querying typical business applications. However, scientific data that is mostly characterised by non-discrete attribute values cannot be queried efficiently by the techniques currently supported. In this thesis we propose a novel access method based on bitmap indices that efficiently handles multi-dimensional queries against typical scientific data. The algorithm is called GenericRangeEval and is an extension of a bitmap index for discrete attribute values. By means of a cost model we study the performance of queries with various selectivities against uniform...

  19. Open-access publishing for pharmacy-focused journals.

    Science.gov (United States)

    Clauson, Kevin A; Veronin, Michael A; Khanfar, Nile M; Lou, Jennie Q

    2008-08-15

    Pharmacy-focused journals that are available in open-access (OA), freely accessible, hybrid, or traditional formats were identified. Relevant journals were accessed from PubMed, International Pharmaceutical Abstracts, EMBASE, and the Pharmacology and Pharmacy category of Thomson Scientific Journal Citation Reports. Criteria were established to select journals that satisfied the definition of pharmacy focused. Journals were assessed based on accessibility, copyright transfer requirements, and restrictions. If tracked, the journal's impact factor (IF) was identified according to classification, and medians were calculated for each journal category. A total of 317 pharmacy-focused journals were identified. The majority of pharmacy-focused journals identified were traditional/non-OA (n = 240). A smaller number of journals were freely accessible/ non-OA (n = 37), freely accessible/non-OA with content restrictions (n = 20), or freely available/non-OA with date restrictions (n = 18). The fewest number of journals were completely OA (n = 2). The median IF for the 185 journals whose IF was tracked was 2.029. The median IF for freely accessible and hybrid journals (n = 42) was 2.550, whereas the median IF for traditional journals (n = 143) was 1.900. A very small number of pharmacy-focused journals adhere to the OA paradigm of access. However, journals that adopt some elements of the OA model, chiefly free accessibility, may be more likely to be cited than traditional journals. Pharmacy practitioners, educators, and researchers could benefit from the advantages that OA offers but should understand its financial disadvantages.

  20. Access to augmentative and alternative communication: new technologies and clinical decision-making.

    Science.gov (United States)

    Fager, Susan; Bardach, Lisa; Russell, Susanne; Higginbotham, Jeff

    2012-01-01

    Children with severe physical impairments require a variety of access options to augmentative and alternative communication (AAC) and computer technology. Access technologies have continued to develop, allowing children with severe motor control impairments greater independence and access to communication. This article will highlight new advances in access technology, including eye and head tracking, scanning, and access to mainstream technology, as well as discuss future advances. Considerations for clinical decision-making and implementation of these technologies will be presented along with case illustrations.

  1. Quantitative analysis of access strategies to remote information in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach in...

  2. Large scale access tests and online interfaces to ATLAS conditions databases

    International Nuclear Information System (INIS)

    Amorim, A; Lopes, L; Pereira, P; Simoes, J; Soloviev, I; Burckhart, D; Schmitt, J V D; Caprini, M; Kolos, S

    2008-01-01

    The access of the ATLAS Trigger and Data Acquisition (TDAQ) system to the ATLAS Conditions Databases sets strong reliability and performance requirements on the database storage and access infrastructures. Several applications were developed to support the integration of Conditions database access with the online services in TDAQ, including the interface to the Information Services (IS) and to the TDAQ Configuration Databases. The information storage requirements were the motivation for the ONline A Synchronous Interface to COOL (ONASIC) from the Information Service (IS) to LCG/COOL databases. ONASIC avoids the possible backpressure from Online Database servers by managing a local cache. In parallel, OKS2COOL was developed to store Configuration Databases into an Offline Database with history record. The DBStressor application was developed to test and stress the access to the Conditions database using the LCG/COOL interface while operating in an integrated way as a TDAQ application. The performance scaling of simultaneous Conditions database read accesses was studied in the context of the ATLAS High Level Trigger large computing farms. A large set of tests were performed involving up to 1000 computing nodes that simultaneously accessed the LCG central database server infrastructure at CERN

  3. Locating stations of public transportation vehicles for improving transit accessibility

    Directory of Open Access Journals (Sweden)

    H. Ziari

    2007-06-01

    Full Text Available Since transportation is one of the most complicated and the basic problem of urban life in developing countries at the present time and in various dimensions, so it is necessary to view it more scientifically-practically. Reducing travelling time is one way to reduce its cost. In public transportation system, it is important to determine proper travelling costs. There are various methods to determine the distances between stations. One of these methods used in England is based on logical and calculative relations in mathematics. In this paper, in addition to studying this method some changes have been made in order to reduce and modify required variables for calculation of those relations. A numerical example is designed to demonstrate the effectiveness of the method and thus developed to optimize the public transportation stop location problem. The sensitivity of the total travel time, access, speed and the effect of the parameters on the optimum stop location are analyzed and discussed.

  4. A qualitative study examining methods of accessing and identifying research relevant to clinical practice among rehabilitation clinicians

    Directory of Open Access Journals (Sweden)

    Patel D

    2017-12-01

    Full Text Available Drasti Patel,1 Christine Koehmstedt,1 Rebecca Jones,1 Nathan T Coffey,1 Xinsheng Cai,2 Steven Garfinkel,2 Dahlia M Shaewitz,2 Ali A Weinstein1 1Center for Study of Chronic Illness and Disability, College of Health and Human Services, George Mason University, Fairfax, VA, 2American Institutes for Research, Washington, DC, USA Purpose: Research examining the utilization of evidence-based practice (EBP specifically among rehabilitation clinicians is limited. The objective of this study was to examine how various rehabilitative clinicians including physical therapists, occupational therapists, rehabilitation counselors, and physiatrists are gaining access to literature and whether they are able to implement the available research into practice.Methods: A total of 21 total clinicians were interviewed via telephone. Using NVivo, a qualitative analysis of the responses was performed.Results: There were similarities found with respect to the information-seeking behaviors and translation of research across the different clinician types. Lack of time was reported to be a barrier for both access to literature and implementation of research across all clinician types. The majority of clinicians who reported having difficulty with utilizing the published literature indicated that the literature was not applicable to their practice, the research was not specific enough to be put into practice, or the research found was too outdated to be relevant. In addition, having a supportive work environment aided in the search and utilization of research through providing resources central to assisting clinicians in gaining access to health information.Conclusion: Our study identified several barriers that affect EBP for rehabilitation clinicians. The findings suggest the need for researchers to ensure that their work is applicable and specific to clinical practice for implementation to occur. Keywords: health information, information behavior, knowledge utilization

  5. Access to Heart Transplantation: A Proper Analysis of the Competing Risks of Death and Transplantation Is Required to Optimize Graft Allocation.

    Science.gov (United States)

    Cantrelle, Christelle; Legeai, Camille; Latouche, Aurélien; Tuppin, Philippe; Jasseron, Carine; Sebbag, Laurent; Bastien, Olivier; Dorent, Richard

    2017-08-01

    Heart allocation systems are usually urgency-based, offering grafts to candidates at high risk of waitlist mortality. In the context of a revision of the heart allocation rules, we determined observed predictors of 1-year waitlist mortality in France, considering the competing risk of transplantation, to determine which candidate subgroups are favored or disadvantaged by the current allocation system. Patients registered on the French heart waitlist between 2010 and 2013 were included. Cox cause-specific hazards and Fine and Gray subdistribution hazards were used to determine candidate characteristics associated with waitlist mortality and access to transplantation. Of the 2053 candidates, 7 variables were associated with 1-year waitlist mortality by the Fine and Gray method including 4 candidate characteristics related to heart failure severity (hospitalization at listing, serum natriuretic peptide level, systolic pulmonary artery pressure, and glomerular filtration rate) and 3 characteristics not associated with heart failure severity but with lower access to transplantation (blood type, age, and body mass index). Observed waitlist mortality for candidates on mechanical circulatory support was like that of others. The heart allocation system strongly modifies the risk of pretransplant mortality related to heart failure severity. An in-depth competing risk analysis is therefore a more appropriate method to evaluate graft allocation systems. This knowledge should help to prioritize candidates in the context of a limited donor pool.

  6. The ethics of open access publishing.

    Science.gov (United States)

    Parker, Michael

    2013-03-22

    Should those who work on ethics welcome or resist moves to open access publishing? This paper analyses arguments in favour and against the increasing requirement for open access publishing and considers their implications for bioethics research. In the context of biomedical science, major funders are increasingly mandating open access as a condition of funding and such moves are also common in other disciplines. Whilst there has been some debate about the implications of open-access for the social sciences and humanities, there has been little if any discussion about the implications of open access for ethics. This is surprising given both the central role of public reason and critique in ethics and the fact that many of the arguments made for and against open access have been couched in moral terms. In what follows I argue that those who work in ethics have a strong interest in supporting moves towards more open publishing approaches which have the potential both to inform and promote richer and more diverse forms of public deliberation and to be enriched by them. The importance of public deliberation in practical and applied ethics suggests that ethicists have a particular interest in the promotion of diverse and experimental forms of publication and debate and in supporting new, more creative and more participatory approaches to publication.

  7. OpenCourseWare, Global Access and the Right to Education: Real access or marketing ploy?

    Directory of Open Access Journals (Sweden)

    Henk Huijser

    2008-02-01

    Full Text Available This paper explores the potential opportunities that OpenCourseWare (OCW offers in providing wider access to tertiary education, based on the ideal of ‘the right to education’. It first discusses the wider implications of OCW, and its underlying philosophy, before using a case study of a tertiary preparation program (TPP at the University of Southern Queensland (USQ to draw out the issues involved in offering a program that is created in a particular national and social context on a global scale. This paper draws specific attention to the digital divide, its effects in national and global contexts, and the particular obstacles this presents with regards to OCW. This paper argues that OCW provides many opportunities, both in terms of access to education and in terms of student recruitment and marketing for universities. To take full advantage of those opportunities, however, requires a concerted effort on the part of tertiary education institutions, and it requires a vision that is fundamentally informed by, and committed to, the principle of ‘the right to education’.

  8. Librarians and Libraries Supporting Open Access Publishing

    Science.gov (United States)

    Richard, Jennifer; Koufogiannakis, Denise; Ryan, Pam

    2009-01-01

    As new models of scholarly communication emerge, librarians and libraries have responded by developing and supporting new methods of storing and providing access to information and by creating new publishing support services. This article will examine the roles of libraries and librarians in developing and supporting open access publishing…

  9. Gender Factors in Capital Sourcing and Accessibility by Arable Crop ...

    African Journals Online (AJOL)

    Female farmers' access to loan was positively influenced by their level of education and length of loan repayment period. The access to loan by the female farmers was significantly and negatively influenced by value of required collaterals, size of their households, and interest charges on the loans. Gender related factors ...

  10. Accessibility to health services by persons with disabilities.

    Science.gov (United States)

    Castro, Shamyr Sulyvan; Lefèvre, Fernando; Lefèvre, Ana Maria Cavalcanti; Cesar, Chester Luiz Galvão

    2011-02-01

    To analyze the difficulties in accessibility to health services experienced by persons with disabilities. A qualitative study was performed with individuals who reported having a certain type of disability (paralysis or amputation of limbs; low vision, unilateral or total blindness; low hearing, unilateral or total deafness). A total of 25 individuals (14 women) were interviewed in the city of São Paulo, Southeastern Brazil, between June and August 2007, responding to questions about transportation and accessibility to health services. Collective Subject Discourse was the methodology used to analyze results and analyses were performed with the Qualiquantisoft software. The analysis of discourses on transportation to health services revealed a diversity in terms of the user going to the service alone or accompanied; using a private car, public transportation or ambulance or walking; and requiring different times to arrive at the service. With regard to the difficulties in accessibility to health services, there were reports of delayed service, problems with parking, and lack of ramps, elevators, wheelchairs, doctors and adapted toilets. Individuals with a certain type of disability used various means of transportation, requiring someone to accompany them in some cases. Problems with accessibility to health services were reported by persons with disabilities, contradicting the principle of equity, a precept of the Brazilian Unified Health System.

  11. Improving access to urologists through an electronic consultation service

    Science.gov (United States)

    Witherspoon, Luke; Liddy, Clare; Afkham, Amir; Keely, Erin; Mahoney, John

    2017-01-01

    Introduction Access to specialist services is limited by wait times and geographic availability. Champlain Building Access to Specialist Advice (BASE) has been implemented in our service region to facilitate access to specialists by primary care providers (PCPs). Through a secure web-based system, PCPs are able to send eConsults instead of requesting a formal in-office consultation. Methods Urology eConsults completed through the Champlain BASE service from March 2013 to January 2015 were analyzed. Each consult was characterized in regard to the type of question asked by the referring physician and the clinical content of the referral. Using the mandatory close-out surveys, we analyzed rates of referral avoidance, physician satisfaction, and overall impact on patient care. Results Of 190 eConsultations, 70% were completed in less than 10 minutes. The most common clinical questions related to the interpretation of imaging reports (16%) and tests to choose for investigating a condition (15%). The most common diagnoses were hematuria (13%) and renal mass (8%). In 35% of cases, referral to a urologist had originally been contemplated and was avoided. In 8% of cases, a PCP did not believe a consultation was initially needed, but a referral was ultimately initiated after the eConsultation. Conclusions Our study shows that although certain clinical presentations still require a formal in-person urological consultation, eConsultations can potentially reduce unnecessary clinic visits while identifying patients who may benefit from early urological consultation. Through both these mechanisms, we may improve timely access to urologists. PMID:28798830

  12. Preventing Smoking in Young People: A Systematic Review of the Impact of Access Interventions

    Directory of Open Access Journals (Sweden)

    Karin Humphries

    2009-04-01

    Full Text Available Aims: To examine existing evidence on the effectiveness of interventions that are designed to prevent the illegal sale of tobacco to young people. The review considers specific sub-questions related to the factors that might influence effectiveness, any differential effects for different sub-populations of youth, and barriers and facilitators to implementation. Methods: A review of studies on the impact of interventions on young people under the age of 18 was conducted. It included interventions that were designed to prevent the illegal sale of tobacco to children and young people. The review was conducted in July 2007, and included 20 papers on access restriction studies. The quality of the papers was assessed and the relevant data was extracted. Results: The evidence obtained from the review indicates that access restriction interventions may produce significant reductions in the rate of illegal tobacco sales to youth. However, lack of enforcement and the ability of youth to acquire cigarettes from social sources may undermine the effectiveness of these interventions. Conclusions: When access interventions are applied in a comprehensive manner, they can affect young people’s access to tobacco. However, further research is required to examine the effects of access restriction interventions on young people’s smoking behaviour.

  13. Ultrasound-Guided Peripheral Intravenous Access in the Emergency Department: Patient-Centered Survey

    Directory of Open Access Journals (Sweden)

    Keith Boniface

    2011-05-01

    Full Text Available Introduction: To assess characteristics, satisfaction, and disposition of emergency department (ED patients who successfully received ultrasound (US-guided peripheral intravenous (IV access. Methods: This is a prospective observational study among ED patients who successfully received US-guided peripheral IV access by ED technicians. Nineteen ED technicians were taught to use US guidance to obtain IV access. Training sessions consisted of didactic instruction and hands-on practice. The US guidance for IV access was limited to patients with difficult access. After successfully receiving an US-guided peripheral IV, patients were approached by research assistants who administered a 10-question survey. Disposition information was collected after the conclusion of the ED visit by accessing patients’ electronic medical record. Results: In total, 146 surveys were completed in patients successfully receiving US-guided IVs. Patients reported an average satisfaction with the procedure of 9.2 of 10. Forty-two percent of patients had a body mass index (BMI of greater than 30, and 17.8% had a BMI of more than 35. Sixty-two percent reported a history of central venous catheter placement. This patient population averaged 3 ED visits per year in the past year. Fifty-three percent of the patients were admitted. Conclusion: Patients requiring US-guided IVs in our ED are discharged home at the conclusion of their ED visit about half of the time. These patients reported high rates of both difficult IV access and central venous catheter placement in the past. Patient satisfaction with US-guided IVs was very high. These data support the continued use of US-guided peripheral IVs in this patient population. [West J Emerg Med. 2011;12(4:475–477.

  14. Safety and Feasibility of Transradial Access for Visceral Interventions in Patients with Thrombocytopenia

    International Nuclear Information System (INIS)

    Titano, J. J.; Biederman, D. M.; Marinelli, B. S.; Patel, R. S.; Kim, E.; Tabori, N. E.; Nowakowski, F. S.; Lookstein, R. A.; Fischman, A. M.

    2016-01-01

    PurposeTransradial access (TRA) has shown lower morbidity and decreased bleeding complications compared to transfemoral access. This study evaluates the safety and feasibility of TRA in thrombocytopenic patients undergoing visceral interventions.Methods and MaterialsPatients who underwent visceral interventions via the radial artery with platelet count less than or equal to 50,000/µL were included in the study. Outcome variables included technical success, access site, bleeding, transfusion, and neurological complications.ResultsFrom July 1, 2012, to May 31, 2015, a total of 1353 peripheral interventions via TRA were performed, of which 85 procedures were performed in 64 patients (mean age 62.2 years) with a platelet count <50,000/µL (median 39,000/µL). Interventions included chemoembolization (n = 46), selective internal radiation therapy (n = 30), and visceral embolization (n = 9). Technical success was 97.6 % with two cases of severe vessel spasm requiring ipsilateral femoral crossover. There was no major access site, bleeding, or neurological adverse events at 30 days. Minor access site hematomas occurred in five cases (5.9 %) and were treated conservatively in all cases. Pre-procedural platelet transfusions were administered in 23 (27.1 %) cases. There was no statistically significant difference in access site or bleeding complications between the transfused and nontransfused groups.ConclusionsTransradial visceral interventions in patients with thrombocytopenia are both feasible and safe, possibly without the need for platelet transfusions.

  15. Safety and Feasibility of Transradial Access for Visceral Interventions in Patients with Thrombocytopenia

    Energy Technology Data Exchange (ETDEWEB)

    Titano, J. J., E-mail: joseph.titano@mountsinai.org; Biederman, D. M., E-mail: derek.biederman@mountsinai.org; Marinelli, B. S., E-mail: brett.marinelli@exchange.mssm.edu; Patel, R. S., E-mail: rahul.patel@mountsinai.org; Kim, E., E-mail: edward.kim@mountsinai.org; Tabori, N. E., E-mail: nora.tabori@mountsinai.org; Nowakowski, F. S., E-mail: scott.nowakowski@mountsinai.org; Lookstein, R. A., E-mail: robert.lookstein@mountsinai.org; Fischman, A. M., E-mail: aaron.fischman@mountsinai.org [Icahn School of Medicine at Mount Sinai, Department of Interventional Radiology (United States)

    2016-05-15

    PurposeTransradial access (TRA) has shown lower morbidity and decreased bleeding complications compared to transfemoral access. This study evaluates the safety and feasibility of TRA in thrombocytopenic patients undergoing visceral interventions.Methods and MaterialsPatients who underwent visceral interventions via the radial artery with platelet count less than or equal to 50,000/µL were included in the study. Outcome variables included technical success, access site, bleeding, transfusion, and neurological complications.ResultsFrom July 1, 2012, to May 31, 2015, a total of 1353 peripheral interventions via TRA were performed, of which 85 procedures were performed in 64 patients (mean age 62.2 years) with a platelet count <50,000/µL (median 39,000/µL). Interventions included chemoembolization (n = 46), selective internal radiation therapy (n = 30), and visceral embolization (n = 9). Technical success was 97.6 % with two cases of severe vessel spasm requiring ipsilateral femoral crossover. There was no major access site, bleeding, or neurological adverse events at 30 days. Minor access site hematomas occurred in five cases (5.9 %) and were treated conservatively in all cases. Pre-procedural platelet transfusions were administered in 23 (27.1 %) cases. There was no statistically significant difference in access site or bleeding complications between the transfused and nontransfused groups.ConclusionsTransradial visceral interventions in patients with thrombocytopenia are both feasible and safe, possibly without the need for platelet transfusions.

  16. Time division multiple access for vehicular communications

    CERN Document Server

    Omar, Hassan Aboubakr

    2014-01-01

    This brief focuses on medium access control (MAC) in vehicular ad hoc networks (VANETs), and presents VeMAC, a novel MAC scheme based on distributed time division multiple access (TDMA) for VANETs. The performance of VeMAC is evaluated via mathematical analysis and computer simulations in comparison with other existing MAC protocols, including the IEEE 802.11p standard. This brief aims at proposing TDMA as a suitable MAC scheme for VANETs, which can support the quality-of-service requirements of high priority VANET applications.

  17. Accessibility in Public Buildings: : Efficiency of Checklist Protocols

    OpenAIRE

    Andersson, Jonas E; Skehan, Terry

    2016-01-01

    In Sweden, governmental agencies and bodies are required to implement a higher level of accessibility in their buildings than that stipulated by the National Building and Planning Act (PBL). The Swedish Agency for Participation (MFD, Myndigheten för delaktighet) develops holistic guidelines in order to conceptualize this higher level of accessibility. In conjunction to these guidelines, various checklist protocols have been produced. The present study focuses on the efficiency of such checkli...

  18. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks.

    Science.gov (United States)

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Zhang, Xuekun

    2015-12-03

    Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  19. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunyang Lei

    2015-12-01

    Full Text Available Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT, Machine-to-Machine (M2M communications, Vehicular-to-Vehicular (V2V communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  20. 43 CFR 36.10 - Access to inholdings.

    Science.gov (United States)

    2010-10-01

    ... barriers prevent adequate and feasible access to State or private lands or valid interests in lands except across an area(s). Physical barriers include but are not limited to rugged mountain terrain, extensive... method of access would cause significant adverse impacts on natural or other values of the area and...

  1. Cellulose accessibility limits the effectiveness of minimum cellulase loading on the efficient hydrolysis of pretreated lignocellulosic substrates

    Directory of Open Access Journals (Sweden)

    Saddler Jack N

    2011-02-01

    Full Text Available Abstract A range of lignocellulosic feedstocks (including agricultural, softwood and hardwood substrates were pretreated with either sulfur dioxide-catalyzed steam or an ethanol organosolv procedure to try to establish a reliable assessment of the factors governing the minimum protein loading that could be used to achieve efficient hydrolysis. A statistical design approach was first used to define what might constitute the minimum protein loading (cellulases and β-glucosidase that could be used to achieve efficient saccharification (defined as at least 70% glucan conversion of the pretreated substrates after 72 hours of hydrolysis. The likely substrate factors that limit cellulose availability/accessibility were assessed, and then compared with the optimized minimum amounts of protein used to obtain effective hydrolysis. The optimized minimum protein loadings to achieve efficient hydrolysis of seven pretreated substrates ranged between 18 and 63 mg protein per gram of glucan. Within the similarly pretreated group of lignocellulosic feedstocks, the agricultural residues (corn stover and corn fiber required significantly lower protein loadings to achieve efficient hydrolysis than did the pretreated woody biomass (poplar, douglas fir and lodgepole pine. Regardless of the substantial differences in the source, structure and chemical composition of the feedstocks, and the difference in the pretreatment technology used, the protein loading required to achieve efficient hydrolysis of lignocellulosic substrates was strongly dependent on the accessibility of the cellulosic component of each of the substrates. We found that cellulose-rich substrates with highly accessible cellulose, as assessed by the Simons' stain method, required a lower protein loading per gram of glucan to obtain efficient hydrolysis compared with substrates containing less accessible cellulose. These results suggest that the rate-limiting step during hydrolysis is not the catalytic

  2. Accessible Website Content Guidelines for Users with Intellectual Disabilities

    NARCIS (Netherlands)

    Karreman, Joyce; van der Geest, Thea; Buursink, Esmee

    2007-01-01

    Background: The W3C Web Accessibility Initiative has issued guidelines for making websites better and easier to access for people with various disabilities (W3C Web Accessibility Initiative guidelines 1999). - Method: The usability of two versions of a website (a non-adapted site and a site that was

  3. Upper Extremity Steal Syndrome Is Associated with Atherosclerotic Burden and Access Configuration.

    Science.gov (United States)

    Kudlaty, Elizabeth A; Kendrick, Daniel E; Allemang, Matthew T; Kashyap, Vikram S; Wong, Virginia L

    2016-08-01

    Clinically significant steal syndrome occurs in a subset of dialysis patients with arteriovenous (AV) access. Factors associated with steal are poorly understood. Severe symptoms require access revision or sacrifice, potentially jeopardizing access options. Our objective was to review our dialysis access experience to identify factors associated with significant steal syndrome. We reviewed all adult patients undergoing their first permanent upper extremity access, AV fistula (AVF) or AV graft (AVG), between January 2008 and July 2011 at a single center. Medical, demographic, and access characteristics were collected from our electronic medical record and a local dialysis center's database. Patients who required correction of steal syndrome were compared with the larger access cohort. Statistical analysis included Fisher's exact test and χ(2) for noncontinuous variables and unpaired t-test for continuous variables. Of the 303 patients, 15 required correction for steal syndrome (8 of 232 AVF and 7 of 71 AVG). Eight were ligated; 2 were initially banded, then ligated; and 5 underwent distal revascularization with interval ligation. Coronary artery disease was more prevalent in steal syndrome patients (66.7% vs. 25%, P = 0.001); the same was found with peripheral arterial disease (40% vs. 13.8%, P = 0.02). Furthermore, more patients with steal syndrome were on clopidogrel for cardiovascular reasons (40% vs. 9%, P = 0.002). Steal syndrome only developed with AVF and AVG using brachial artery inflow. No cases of steal syndrome arose from radial/ulnar inflow (P = 0.03). All AVG with steal syndrome had a straight configuration; no looped AVG developed steal (P = 0.02). Other patient characteristics such as age, sex, race, hypertension, diabetes mellitus, congestive heart failure, cerebrovascular accident, cause of end-stage renal disease, and other medication history were not different between groups. Clinically significant steal syndrome is associated with

  4. A utility perspective on radiation worker access control systems

    International Nuclear Information System (INIS)

    Watson, B.A.; Goff, T.E.

    1984-01-01

    Based on an evaluation of the current commercial Radiation Worker Access Control Software Systems, Baltimore Gas and Electric Company has elected to design and develop a site specific access control and accountability system for the Calvert Cliffs Nuclear Power Plant. The vendor provided systems allow for radiation worker access control based on training and external exposure records and authorizations. These systems do not afford internal exposure control until after bioassay measurements or maximum permissible concentration-hours are tabulated. The vendor provided systems allow for data trending for ALARA purposes, but each software package must be modified to meet site specific requirements. Unlike the commercial systems, the Calvert Cliffs Radiological Controls and Accountability System (RCAS) will provide radiation worker exposure control, both internal and external. The RCAS is designed to fulfill the requirements by integrating the existing Radiation Safety, Dosemetry, and Training data bases with a comprehensive radiological surveillance program. Prior to each worker's entry into the Radiological Control Area; his training and qualifications, radiation exposure history and authorization, will be compared with administrative controls, such as radiation work permits, and respiratory protection requirements and the radiological conditions in the work area. The RCAS, a computer based applied health physics access control system is described as it is presently configured for development. The mechanisms for enhancing worker internal and external exposure controls are discussed. Proposed data application to both the Calvert Cliffs ALARA and outage planning programs is included

  5. Living large: the experiences of large-bodied women when accessing general practice services

    Directory of Open Access Journals (Sweden)

    Russell N

    2013-09-01

    Full Text Available INTRODUCTION: Numerous studies report high levels of stigma and discrimination experienced by obese/overweight women within the health care system and society at large. Despite general practice being the most utilised point of access for health care services, there is very little international or national exploration of the experiences of large-bodied women (LBW accessing these services. The aim of this study was to explore LBW's experiences of accessing general practice services in New Zealand. METHODS: This is a qualitative, descriptive, feminist study. Local advertising for participants resulted in eight self-identified, large-bodied women being interviewed. A post-structural feminist lens was applied to the data during thematic analysis. FINDINGS: The women in this study provided examples of verbal insults, inappropriate humour, negative body language, unmet health care needs and breaches of dignity from health care providers in general practice. Seven themes were identified: early experiences of body perception, confronting social stereotypes, contending with feminine beauty ideals, perceptions of health, pursuing health, respecting the whole person, and feeling safe to access care. CONCLUSION: Pressure for body size vigilance has, in effect, excluded the women in this study from the very locations of health that they are 'encouraged' to attend-including socialising and exercising in public, screening opportunities that require bodily exposure, and accessing first point of care health services.

  6. DownloadAccess to Information Request form

    International Development Research Centre (IDRC) Digital Library (Canada)

    PC Forms Inc. 834-4048

    To apply for information under the Access to. Information Act, complete this form or a written request mentioning the Act. Describe the information being sought and provide any relevant details necessary to help the International. Development Research Centre (IDRC) find it. If you require assistance, refer to Info Source.

  7. An electronically controlled automatic security access gate

    Directory of Open Access Journals (Sweden)

    Jonathan A. ENOKELA

    2014-11-01

    Full Text Available The security challenges being encountered in many places require electronic means of controlling access to communities, recreational centres, offices, and homes. The electronically controlled automated security access gate being proposed in this work helps to prevent an unwanted access to controlled environments. This is achieved mainly through the use of a Radio Frequency (RF transmitter-receiver pair. In the design a microcontroller is programmed to decode a given sequence of keys that is entered on a keypad and commands a transmitter module to send out this code as signal at a given radio frequency. Upon reception of this RF signal by the receiver module, another microcontroller activates a driver circuitry to operate the gate automatically. The codes for the microcontrollers were written in C language and were debugged and compiled using the KEIL Micro vision 4 integrated development environment. The resultant Hex files were programmed into the memories of the microcontrollers with the aid of a universal programmer. Software simulation was carried out using the Proteus Virtual System Modeling (VSM version 7.7. A scaled-down prototype of the system was built and tested. The electronically controlled automated security access gate can be useful in providing security for homes, organizations, and automobile terminals. The four-character password required to operate the gate gives the system an increased level of security. Due to its standalone nature of operation the system is cheaper to maintain in comparison with a manually operated type.

  8. Combining sync&share functionality with filesystem-like access

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    In our presentation we will analyse approaches to combine the sync & share functionality with file system-like access to data. While relatively small data volumes (GBs) can be distributed by sync&share application across user devices such as PCs, laptops and mobiles, interacting with really large data volumes (TBs, PBs) may require additional remote data access mechanism such as filesystem-like interface. We will discuss several ways for offering filesystem-like access in addition to sync & share functionality. Todays sync & share solutions may employ various data organisation in the back-end including local and distributed file systems and object stores. Therefore various approaches to providing the client with filesystem-like access are necessary in these systems. We will present possible options to integrate the filesystem-like access with sync&share functionality in the popular sync&share system. We will also show a NDS2 project solution where data backups and archives are kept sec...

  9. Utilizing Strategic and Operational Methods for Whole-Community Disaster Planning.

    Science.gov (United States)

    Franks, Stevee; Seaton, Ellen

    2017-12-01

    Analysis of response and recovery efforts to disasters over the past 2 decades has identified a consistent gap that plagues the nation in regard to persons with access and functional needs. This gap can be highlighted by Hurricane Katrina, where the majority of those killed were a part of the access and functional needs population. After a disaster, many individuals with access and functional needs require assistance recovering but often have difficulty accessing services and resources. These difficulties are due to a combination of issues, such as health problems and the disruption of community support services. We sought to help bridge this gap by focusing on strategic and operational methods used while planning for the whole community. This article highlights the many partnerships that must be fostered for successful whole-community planning. These partnerships include, but are not limited to, local government departments, health agencies, nonprofit and nongovernmental organizations, and other volunteer organizations. We showcase these methods by using a developmental Post-Disaster Canvassing Plan to highlight planning methods that may aid jurisdictions across the United States in disaster planning for the whole community. (Disaster Med Public Health Preparedness. 2017;11:741-746).

  10. Comparison of all-remote and personnel access maintenance operations for INTOR

    International Nuclear Information System (INIS)

    Spampinato, P.T.; Finn, P.A.; Gohar, M.Y.; Stasko, R.R.

    1985-01-01

    The INTOR reference design was developed to permit limited maintenance operations external to the reactor in a ''hands-on'' mode; all internal operations would be remotely accomplished. The design embodies those requirements for shielding, tritium containment and cleanup, and confinement of contaminated particulate matter to permit personnel access. The cost reflects these requirements, at least first order. The impact of personnel access on the reactor design and its costs are cause to reexamine the maintenance approach on which much of the present configuration is based. The purpose of this study is to compare the benefits and costs associated with personnel access maintenance procedures to those associated with all-remote maintenance procedures and to identify modifications to the baseline design that could enhance maintenance operations

  11. Code-expanded radio access protocol for machine-to-machine communications

    DEFF Research Database (Denmark)

    Thomsen, Henning; Kiilerich Pratas, Nuno; Stefanovic, Cedomir

    2013-01-01

    The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated b...... subframes and orthogonal preambles, the amount of available contention resources is drastically increased, enabling the massive support of Machine-Type Communication users that is beyond the reach of current systems.......The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated...... by the random access method employed in LTE, which significantly increases the amount of contention resources without increasing the system resources, such as contention subframes and preambles. This is accomplished by a logical, rather than physical, extension of the access method in which the available system...

  12. An open-access endoscopy screen correctly and safely identifies patients for conscious sedation.

    Science.gov (United States)

    Kothari, Darshan; Feuerstein, Joseph D; Moss, Laureen; D'Souza, Julie; Montanaro, Kerri; Leffler, Daniel A; Sheth, Sunil G

    2016-11-01

    Open-access scheduling is highly utilized for facilitating generally low-risk endoscopies. Preprocedural screening addresses sedation requirements; however, procedural safety may be compromised if screening is inaccurate. We sought to determine the reliability of our open-access scheduling system for appropriate use of conscious sedation. We prospectively and consecutively enrolled outpatient procedures booked at an academic center by open-access using screening after in-office gastroenterology (GI) consultation. We collected the cases inappropriately booked for conscious sedation and compared the characteristics for significant differences. A total of 8063 outpatients were scheduled for procedures with conscious sedation, and 5959 were booked with open-access. Only 78 patients (0.97%, 78/8063) were identified as subsequently needing anesthesiologist-assisted sedation; 44 (56.4%, 44/78) were booked through open-access, of which chronic opioid (47.7%, 21/44) or benzodiazepine use (34.1%, 15/44) were the most common reasons for needing anesthesiologist-assisted sedation. Patients on chronic benzodiazepines required more midazolam than those not on chronic benzodiazepines (P = .03) of those patients who underwent conscious sedation. Similarly, patients with chronic opioid use required more fentanyl than those without chronic opioid use (P = .04). Advanced liver disease and alcohol use were common reasons for patients being booked after in-office consultation and were significantly higher than those booked with open-access (both P open-access scheduling. © The Author(s) 2016. Published by Oxford University Press and Sixth Affiliated Hospital of Sun Yat-Sen University.

  13. Efficacy of Ultrasound-Guided Axillary Brachial Plexus Block for Analgesia During Percutaneous Transluminal Angioplasty for Dialysis Access

    International Nuclear Information System (INIS)

    Chiba, Emiko; Hamamoto, Kohei; Nagashima, Michio; Matsuura, Katsuhiko; Okochi, Tomohisa; Tanno, Keisuke; Tanaka, Osamu

    2016-01-01

    PurposeTo evaluate the efficacy and safety of ultrasound (US)-guided axillary brachial plexus block (ABPB) for analgesia during percutaneous transluminal angioplasty (PTA) for dialysis access.Subjects and MethodsTwenty-one patients who underwent PTA for stenotic dialysis access shunts and who had previous experience of PTA without sedation, analgesia, and anesthesia were included. The access type in all patients was native arteriovenous fistulae in the forearm. Two radiologists performed US-guided ABPB for the radial and musculocutaneous nerves before PTA. The patients’ pain scores were evaluated using a visual analog scale (VAS) after PTA, and these were compared with previous sessions without US-guided ABPB. The patient’s motor/sensory paralysis after PTA was also examined.ResultsThe mean time required to achieve US-guided ABPB was 8 min. The success rate of this procedure was 100 %, and there were no significant complications. All 21 patients reported lower VAS with US-guided ABPB as compared to without the block (p < 0.01). All patients expressed the desire for an ABPB for future PTA sessions, if required. Transient motor paralysis occurred in 8 patients, but resolved in all after 60 min.ConclusionUS-guided ABPB is feasible and effective for analgesia in patients undergoing PTA for stenotic dialysis access sites.Level of EvidenceLevel 4 (case series).

  14. Efficacy of Ultrasound-Guided Axillary Brachial Plexus Block for Analgesia During Percutaneous Transluminal Angioplasty for Dialysis Access

    Energy Technology Data Exchange (ETDEWEB)

    Chiba, Emiko, E-mail: chibaemi23@comet.ocn.ne.jp; Hamamoto, Kohei, E-mail: hkouhei917@gmail.com [Jichi Medical University, Department of Radiology, Saitama Medical Center (Japan); Nagashima, Michio, E-mail: nagamic00@gmail.com [Asahikawa Medical University, Department of Emergency Medicine (Japan); Matsuura, Katsuhiko, E-mail: kmatsur@gmail.com; Okochi, Tomohisa, E-mail: t-shachi@dj8.so-net.ne.jp; Tanno, Keisuke, E-mail: tankichi1974@gmail.com; Tanaka, Osamu, E-mail: otanaka@omiya.jichi.ac.jp [Jichi Medical University, Department of Radiology, Saitama Medical Center (Japan)

    2016-10-15

    PurposeTo evaluate the efficacy and safety of ultrasound (US)-guided axillary brachial plexus block (ABPB) for analgesia during percutaneous transluminal angioplasty (PTA) for dialysis access.Subjects and MethodsTwenty-one patients who underwent PTA for stenotic dialysis access shunts and who had previous experience of PTA without sedation, analgesia, and anesthesia were included. The access type in all patients was native arteriovenous fistulae in the forearm. Two radiologists performed US-guided ABPB for the radial and musculocutaneous nerves before PTA. The patients’ pain scores were evaluated using a visual analog scale (VAS) after PTA, and these were compared with previous sessions without US-guided ABPB. The patient’s motor/sensory paralysis after PTA was also examined.ResultsThe mean time required to achieve US-guided ABPB was 8 min. The success rate of this procedure was 100 %, and there were no significant complications. All 21 patients reported lower VAS with US-guided ABPB as compared to without the block (p < 0.01). All patients expressed the desire for an ABPB for future PTA sessions, if required. Transient motor paralysis occurred in 8 patients, but resolved in all after 60 min.ConclusionUS-guided ABPB is feasible and effective for analgesia in patients undergoing PTA for stenotic dialysis access sites.Level of EvidenceLevel 4 (case series).

  15. Accessibility to health care facilities in Montreal Island: an application of relative accessibility indicators from the perspective of senior and non-senior residents

    Directory of Open Access Journals (Sweden)

    Morency Catherine

    2010-10-01

    Full Text Available Abstract Background Geographical access to health care facilities is known to influence health services usage. As societies age, accessibility to health care becomes an increasingly acute public health concern. It is known that seniors tend to have lower mobility levels, and it is possible that this may negatively affect their ability to reach facilities and services. Therefore, it becomes important to examine the mobility situation of seniors vis-a-vis the spatial distribution of health care facilities, to identify areas where accessibility is low and interventions may be required. Methods Accessibility is implemented using a cumulative opportunities measure. Instead of assuming a fixed bandwidth (i.e. a distance threshold for measuring accessibility, in this paper the bandwidth is defined using model-based estimates of average trip length. Average trip length is an all-purpose indicator of individual mobility and geographical reach. Adoption of a spatial modelling approach allows us to tailor these estimates of travel behaviour to specific locations and person profiles. Replacing a fixed bandwidth with these estimates permits us to calculate customized location- and person-based accessibility measures that allow inter-personal as well as geographical comparisons. Data The case study is Montreal Island. Geo-coded travel behaviour data, specifically average trip length, and relevant traveller's attributes are obtained from the Montreal Household Travel Survey. These data are complemented with information from the Census. Health care facilities, also geo-coded, are extracted from a comprehensive business point database. Health care facilities are selected based on Standard Industrial Classification codes 8011-21 (Medical Doctors and Dentists. Results Model-based estimates of average trip length show that travel behaviour varies widely across space. With the exception of seniors in the downtown area, older residents of Montreal Island tend to be

  16. Performance estimates for personnel access control systems

    International Nuclear Information System (INIS)

    Bradley, R.G.

    1980-10-01

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems

  17. Primary care direct access MRI for the investigation of chronic headache

    International Nuclear Information System (INIS)

    Taylor, T.R.; Evangelou, N.; Porter, H.; Lenthall, R.

    2012-01-01

    Aim: To assess the efficacy of a primary-care imaging pathway for neurology outpatients, from inception to deployment, compared with traditional outpatient referral. Materials and methods: After local agreement, guidelines were generated providing pathways for diagnosis and treatment of common causes of headache, highlighting “red-flag” features requiring urgent neurology referral, and selecting patients for direct magnetic resonance imaging (MRI) referral. In addition, reports were clarified and standardized. To evaluate the efficacy of the access pathway, a retrospective sequential review of 100 MRI investigations was performed comparing general practitioner (GP) referral, with traditional neurology referral plus imaging, acquired before the pathway started. Results: No statistically significant difference in rates of major abnormalities, incidental findings or ischaemic lesions were identified between the two cohorts. Reported patient satisfaction was high, with a cost reduction for groups using the pathway. Conclusion: The findings of the present study suggest that a defined access pathway for imaging to investigate chronic headache can be deployed appropriately in a primary-care setting.

  18. Primary care direct access MRI for the investigation of chronic headache

    Energy Technology Data Exchange (ETDEWEB)

    Taylor, T.R., E-mail: timt@nhs.net [Queens Medical Centre, Nottingham (United Kingdom); Evangelou, N. [Queens Medical Centre, Nottingham (United Kingdom); Porter, H. [Nottingham Cripps Health Centre, Nottingham (United Kingdom); Lenthall, R. [Queens Medical Centre, Nottingham (United Kingdom)

    2012-01-15

    Aim: To assess the efficacy of a primary-care imaging pathway for neurology outpatients, from inception to deployment, compared with traditional outpatient referral. Materials and methods: After local agreement, guidelines were generated providing pathways for diagnosis and treatment of common causes of headache, highlighting 'red-flag' features requiring urgent neurology referral, and selecting patients for direct magnetic resonance imaging (MRI) referral. In addition, reports were clarified and standardized. To evaluate the efficacy of the access pathway, a retrospective sequential review of 100 MRI investigations was performed comparing general practitioner (GP) referral, with traditional neurology referral plus imaging, acquired before the pathway started. Results: No statistically significant difference in rates of major abnormalities, incidental findings or ischaemic lesions were identified between the two cohorts. Reported patient satisfaction was high, with a cost reduction for groups using the pathway. Conclusion: The findings of the present study suggest that a defined access pathway for imaging to investigate chronic headache can be deployed appropriately in a primary-care setting.

  19. National Survey on Access, Use and Promotion of Rational Use of Medicines (PNAUM: household survey component methods

    Directory of Open Access Journals (Sweden)

    Sotero Serrate Mengue

    Full Text Available ABSTRACT OBJECTIVE To describe methodological aspects of the household survey National Survey on Access, Use and Promotion of Rational Use of Medicines (PNAUM related to sampling design and implementation, the actual obtained sample, instruments and fieldwork. METHODS A cross-sectional, population-based study with probability sampling in three stages of the population living in households located in Brazilian urban areas. Fieldwork was carried out between September 2013 and February 2014. The data collection instrument included questions related to: information about households, residents and respondents; chronic diseases and medicines used; use of health services; acute diseases and events treated with drugs; use of contraceptives; use of pharmacy services; behaviors that may affect drug use; package inserts and packaging; lifestyle and health insurance. RESULTS In total, 41,433 interviews were carried out in 20,404 households and 576 urban clusters corresponding to 586 census tracts distributed in the five Brazilian regions, according to eight domains defined by age and gender. CONCLUSIONS The results of the survey may be used as a baseline for future studies aiming to assess the impact of government action on drug access and use. For local studies using a compatible method, PNAUM may serve as a reference point to evaluate variations in space and population. With a comprehensive evaluation of drug-related aspects, PNAUM is a major source of data for a variety of analyses to be carried out both at academic and government level.

  20. Accessible Knowledge - Knowledge on Accessibility

    DEFF Research Database (Denmark)

    Kirkeby, Inge Mette

    2015-01-01

    Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...

  1. Accessibility of women farmers to agricultural information in South ...

    African Journals Online (AJOL)

    Furthermore, the women farmers were accessible to technical information on improved seeds (x = 2.59), storage methods (x = 2.44), but poor access to operating farm machinery (x =0.49) and weather forecast (x =0.68). With regard to economic information they were accessible to market locations (x =2.40), but had low ...

  2. The evaluation of radiologic methods for access guidance in percutaneous nephrolithotomy

    DEFF Research Database (Denmark)

    Breda, Alberto; Territo, Angelo; Scoffone, Cesare

    2018-01-01

    is controversial? A systematic review of the literature was performed comparing image guidance modalities for obtaining access in PNL. Evidence acquisition and synthesis: A PubMed, Scopus and Cochrane search for peer-reviewed studies was performed using the keywords "ultrasound" AND "fluoroscopy" AND "Percutaneous...

  3. Adjust the method of the FMEA to the requirements of the aviation industry

    Directory of Open Access Journals (Sweden)

    Andrzej FELLNER

    2015-12-01

    Full Text Available The article presents a summary of current methods used in aviation and rail transport. It also contains a proposal to adjust the method of the FMEA to the latest requirements of the airline industry. The authors suggested tables of indicators Zn, Pr and Dt necessary to implement FMEA method of risk analysis taking into account current achievements aerospace and rail safety. Also proposed acceptable limits of the RPN number which allows you to classify threats.

  4. An introduction to numerical methods and analysis

    CERN Document Server

    Epperson, James F

    2013-01-01

    Praise for the First Edition "". . . outstandingly appealing with regard to its style, contents, considerations of requirements of practice, choice of examples, and exercises.""-Zentralblatt MATH "". . . carefully structured with many detailed worked examples.""-The Mathematical Gazette The Second Edition of the highly regarded An Introduction to Numerical Methods and Analysis provides a fully revised guide to numerical approximation. The book continues to be accessible and expertly guides readers through the many available techniques of numerical methods and analysis. An Introduction to

  5. Policies to Spur Energy Access. Executive Summary; Volume 1, Engaging the Private Sector in Expanding Access to Electricity; Volume 2, Case Studies to Public-Private Models to Finance Decentralized Electricity Access

    Energy Technology Data Exchange (ETDEWEB)

    Walters, Terri [National Renewable Energy Lab. (NREL), Golden, CO (United States); Rai, Neha [International Institute for Environment and Development (IIED), London (England); Esterly, Sean [National Renewable Energy Lab. (NREL), Golden, CO (United States); Cox, Sadie [National Renewable Energy Lab. (NREL), Golden, CO (United States); Reber, Tim [National Renewable Energy Lab. (NREL), Golden, CO (United States); Muzammil, Maliha [Univ. of Oxford (United Kingdom); Mahmood, Tasfiq [International Center for Climate Change and Development, Baridhara (Bangladesh); Kaur, Nanki [International Institute for Environment and Development (IIED), London (England); Tesfaye, Lidya [Echnoserve Consulting (Ethiopia); Mamuye, Simret [Echnoserve Consulting (Ethiopia); Knuckles, James [Univ. of London (England). Cass Business School; Morris, Ellen [Columbia Univ., New York, NY (United States); de Been, Merijn [Delft Univ. of Technology (Netherlands); Steinbach, Dave [International Institute for Environment and Development (IIED), London (England); Acharya, Sunil [Digo Bikas Inst. (Nepal); Chhetri, Raju Pandit [National Renewable Energy Lab. (NREL), Golden, CO (United States); Bhushal, Ramesh [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2015-09-01

    Government policy is one of the most important factors in engaging the private sector in providing universal access to electricity. In particular, the private sector is well positioned to provide decentralized electricity products and services. While policy uncertainty and regulatory barriers can keep enterprises and investors from engaging in the market, targeted policies can create opportunities to leverage private investment and skills to expand electricity access. However, creating a sustainable market requires policies beyond traditional electricity regulation. The report reviews the range of policy issues that impact the development and expansion of a market for decentralized electricity services from establishing an enabling policy environment to catalyzing finance, building human capacity, and integrating energy access with development programs. The case studies in this report show that robust policy frameworks--addressing a wide range of market issues--can lead to rapid transformation in energy access. The report highlights examples of these policies in action Bangladesh, Ethiopia, Mali, Mexico, and Nepal.

  6. A distributed Synchronous reservation multiple access control protocol for mobile Ad hoc networks

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yanling; SUN Xianpu; LI Jiandong

    2007-01-01

    This study proposes a new multiple access control protocol named distributed synchronous reservation multiple access control protocol.in which the hidden and exposed terminal problems are solved,and the quality of service(QoS)requirements for real-time traffic are guaranteed.The protocol is founded on time division multiplex address and a different type of traffic is assigned to difierent priority,according to which a node should compete for and reserve the free slots in a different method.Moreover,there is a reservation acknowledgement process before data transmit in each reserved slot,so that the intruded terminal problem is solved.The throughput and average packets drop probability of this protocol are analyzed and simulated in a fully connected network.the results of which indicate that this protocol is efficient enough to support the real-time traffic.and it is more suitable to MANETs.

  7. Achieving Access to the General Curriculum for Students with Mental Retardation.

    Science.gov (United States)

    Wehmeyer, Michael L.; Lattin, Dana; Agran, Martin

    2001-01-01

    This article reviews requirements in the Individuals with Disabilities Education Act for providing access to the general education curriculum, examines the intent of the language, and proposes a decision-making model to enable Individualized Education Program teams to reach curriculum decisions that provide such access for students with mental…

  8. Suspect online sellers and contraceptive access.

    Science.gov (United States)

    Liang, Bryan A; Mackey, Tim K; Lovett, Kimberly M

    2012-11-01

    Issues surrounding contraception access have been a national focus. During this debate, adolescent and adult women may seek these products online. Due to safety concerns, including potential counterfeit forms, we wished to assess whether online "no prescription" contraceptives were available. We assessed online availability of reversible, prescription contraceptive methods resulting in online pharmacy marketing is shifting from direct search engine access to social media (Facebook, Twitter, Slidehare, flickr). Online contraceptive sales represent patient safety risks and a parallel system of high-risk product access absent professional guidance. Providers should educate patients, while policy makers employ legal strategies to address these systemic risks. Copyright © 2012 Elsevier Inc. All rights reserved.

  9. Web accessibility and open source software.

    Science.gov (United States)

    Obrenović, Zeljko

    2009-07-01

    A Web browser provides a uniform user interface to different types of information. Making this interface universally accessible and more interactive is a long-term goal still far from being achieved. Universally accessible browsers require novel interaction modalities and additional functionalities, for which existing browsers tend to provide only partial solutions. Although functionality for Web accessibility can be found as open source and free software components, their reuse and integration is complex because they were developed in diverse implementation environments, following standards and conventions incompatible with the Web. To address these problems, we have started several activities that aim at exploiting the potential of open-source software for Web accessibility. The first of these activities is the development of Adaptable Multi-Interface COmmunicator (AMICO):WEB, an infrastructure that facilitates efficient reuse and integration of open source software components into the Web environment. The main contribution of AMICO:WEB is in enabling the syntactic and semantic interoperability between Web extension mechanisms and a variety of integration mechanisms used by open source and free software components. Its design is based on our experiences in solving practical problems where we have used open source components to improve accessibility of rich media Web applications. The second of our activities involves improving education, where we have used our platform to teach students how to build advanced accessibility solutions from diverse open-source software. We are also partially involved in the recently started Eclipse projects called Accessibility Tools Framework (ACTF), the aim of which is development of extensible infrastructure, upon which developers can build a variety of utilities that help to evaluate and enhance the accessibility of applications and content for people with disabilities. In this article we briefly report on these activities.

  10. 77 FR 70970 - Accessible Emergency Information, and Apparatus Requirements for Emergency Information and Video...

    Science.gov (United States)

    2012-11-28

    ... and better access video programming.'' H.R. Rep. No. 111-563, 111th Cong., 2d Sess. at 19 (2010... distributors, providers, and owners of television video programming, as well as the manufacturers of devices that display such programming. DATES: Comments are due on or before December 18, 2012; reply comments...

  11. Access and utilisation of maternity care for disabled women who experience domestic abuse: a systematic review

    Science.gov (United States)

    2014-01-01

    Background Although disabled women are significantly more likely to experience domestic abuse during pregnancy than non-disabled women, very little is known about how maternity care access and utilisation is affected by the co-existence of disability and domestic abuse. This systematic review of the literature explored how domestic abuse impacts upon disabled women’s access to maternity services. Methods Eleven articles were identified through a search of six electronic databases and data were analysed to identify: the factors that facilitate or compromise access to care; the consequences of inadequate care for pregnant women’s health and wellbeing; and the effectiveness of existing strategies for improvement. Results Findings indicate that a mental health diagnosis, poor relationships with health professionals and environmental barriers can compromise women’s utilisation of maternity services. Domestic abuse can both compromise, and catalyse, access to services and social support is a positive factor when accessing care. Delayed and inadequate care has adverse effects on women’s physical and psychological health, however further research is required to fully explore the nature and extent of these consequences. Only one study identified strategies currently being used to improve access to services for disabled women experiencing abuse. Conclusions Based upon the barriers and facilitators identified within the review, we suggest that future strategies for improvement should focus on: understanding women’s reasons for accessing care; fostering positive relationships; being women-centred; promoting environmental accessibility; and improving the strength of the evidence base. PMID:25029907

  12. 42 CFR 424.106 - Criteria for determining whether the hospital was the most accessible.

    Science.gov (United States)

    2010-10-01

    ... the most accessible. 424.106 Section 424.106 Public Health CENTERS FOR MEDICARE & MEDICAID SERVICES... whether the hospital was the most accessible. (a) Basic requirement. (1) The hospital must be the most... nonparticipating hospital was the most accessible hospital: (1) The personal preference of the beneficiary, the...

  13. Parallel Access of Out-Of-Core Dense Extendible Arrays

    Energy Technology Data Exchange (ETDEWEB)

    Otoo, Ekow J; Rotem, Doron

    2007-07-26

    Datasets used in scientific and engineering applications are often modeled as dense multi-dimensional arrays. For very large datasets, the corresponding array models are typically stored out-of-core as array files. The array elements are mapped onto linear consecutive locations that correspond to the linear ordering of the multi-dimensional indices. Two conventional mappings used are the row-major order and the column-major order of multi-dimensional arrays. Such conventional mappings of dense array files highly limit the performance of applications and the extendibility of the dataset. Firstly, an array file that is organized in say row-major order causes applications that subsequently access the data in column-major order, to have abysmal performance. Secondly, any subsequent expansion of the array file is limited to only one dimension. Expansions of such out-of-core conventional arrays along arbitrary dimensions, require storage reorganization that can be very expensive. Wepresent a solution for storing out-of-core dense extendible arrays that resolve the two limitations. The method uses a mapping function F*(), together with information maintained in axial vectors, to compute the linear address of an extendible array element when passed its k-dimensional index. We also give the inverse function, F-1*() for deriving the k-dimensional index when given the linear address. We show how the mapping function, in combination with MPI-IO and a parallel file system, allows for the growth of the extendible array without reorganization and no significant performance degradation of applications accessing elements in any desired order. We give methods for reading and writing sub-arrays into and out of parallel applications that run on a cluster of workstations. The axial-vectors are replicated and maintained in each node that accesses sub-array elements.

  14. Does Technical Success of Angioplasty in Dysfunctional Hemodialysis Accesses Correlate with Access Patency?

    Energy Technology Data Exchange (ETDEWEB)

    Sidhu, Arshdeep; Tan, Kong T.; Noel-Lamy, Maxime; Simons, Martin E.; Rajan, Dheeraj K., E-mail: dheeraj.rajan@uhn.ca [University Health Network, University of Toronto, Division of Vascular and Interventional Radiology, Peter Munk Cardiac Center (Canada)

    2016-10-15

    PurposeTo study if <30 % residual stenosis post angioplasty (PTA) correlates with primary access circuit patency, and if any variables predict technical success.Materials and MethodsA prospective observational study was performed between January 2009 and December 2012, wherein 76 patients underwent 154 PTA events in 56 prosthetic grafts (AVG) and 98 autogenous fistulas (AVF). Data collected included patient age, gender, lesion location and laterality, access type and location, number of prior interventions, and transonic flow rates pre- and postintervention. Impact of technical outcome on access patency was assessed. Univariate logistic regression was used to assess the impact of variables on technical success with significant factors assessed with a multiple variable model.ResultsTechnical success rates of PTA in AVFs and AVGs were 79.6 and 76.7 %, respectively. Technical failures of PTA were associated with an increased risk of patency loss among circuits with AVFs (p < 0.05), but not with AVGs (p = 0.7). In AVFs, primary access patency rates between technical successes and failures at three and 6 months were 74.4 versus 61.9 % (p = 0.3) and 53.8 versus 23.8 % (p < 0.05), respectively. In AVGs, primary access patency rates between technical successes and failures at three and six months were 72.1 versus 53.9 % (p = 0.5) and 33.6 versus 38.5 % (p = 0.8), respectively. Transonic flow rates did not significantly differ among technically successful or failed outcomes at one or three months.ConclusionTechnical failures of PTA had a significant impact on access patency among AVFs with a trend toward poorer access patency within AVGs.

  15. Does Technical Success of Angioplasty in Dysfunctional Hemodialysis Accesses Correlate with Access Patency?

    International Nuclear Information System (INIS)

    Sidhu, Arshdeep; Tan, Kong T.; Noel-Lamy, Maxime; Simons, Martin E.; Rajan, Dheeraj K.

    2016-01-01

    PurposeTo study if <30 % residual stenosis post angioplasty (PTA) correlates with primary access circuit patency, and if any variables predict technical success.Materials and MethodsA prospective observational study was performed between January 2009 and December 2012, wherein 76 patients underwent 154 PTA events in 56 prosthetic grafts (AVG) and 98 autogenous fistulas (AVF). Data collected included patient age, gender, lesion location and laterality, access type and location, number of prior interventions, and transonic flow rates pre- and postintervention. Impact of technical outcome on access patency was assessed. Univariate logistic regression was used to assess the impact of variables on technical success with significant factors assessed with a multiple variable model.ResultsTechnical success rates of PTA in AVFs and AVGs were 79.6 and 76.7 %, respectively. Technical failures of PTA were associated with an increased risk of patency loss among circuits with AVFs (p < 0.05), but not with AVGs (p = 0.7). In AVFs, primary access patency rates between technical successes and failures at three and 6 months were 74.4 versus 61.9 % (p = 0.3) and 53.8 versus 23.8 % (p < 0.05), respectively. In AVGs, primary access patency rates between technical successes and failures at three and six months were 72.1 versus 53.9 % (p = 0.5) and 33.6 versus 38.5 % (p = 0.8), respectively. Transonic flow rates did not significantly differ among technically successful or failed outcomes at one or three months.ConclusionTechnical failures of PTA had a significant impact on access patency among AVFs with a trend toward poorer access patency within AVGs.

  16. Design requirements, criteria and methods for seismic qualification of CANDU power plants

    International Nuclear Information System (INIS)

    Singh, N.; Duff, C.G.

    1979-10-01

    This report describes the requirements and criteria for the seismic design and qualification of systems and equipment in CANDU nuclear power plants. Acceptable methods and techniques for seismic qualification of CANDU nuclear power plants to mitigate the effects or the consequences of earthquakes are also described. (auth)

  17. Deported Mexican migrants: health status and access to care

    Science.gov (United States)

    Fernández-Niño, Julián Alfredo; Ramírez-Valdés, Carlos Jacobo; Cerecero-Garcia, Diego; Bojorquez-Chapela, Ietza

    2014-01-01

    OBJECTIVE To describe the health status and access to care of forced-return Mexican migrants deported through the Mexico-United States border and to compare it with the situation of voluntary-return migrants. METHODS Secondary data analysis from the Survey on Migration in Mexico’s Northern Border from 2012. This is a continuous survey, designed to describe migration flows between Mexico and the United States, with a mobile-population sampling design. We analyzed indicators of health and access to care among deported migrants, and compare them with voluntary-return migrants. Our analysis sample included 2,680 voluntary-return migrants, and 6,862 deportees. We employ an ordinal multiple logistic regression model, to compare the adjusted odds of having worst self-reported health between the studied groups. RESULTS As compared to voluntary-return migrants, deportees were less likely to have medical insurance in the United States (OR = 0.05; 95%CI 0.04;0.06). In the regression model a poorer self-perceived health was found to be associated with having been deported (OR = 1.71, 95%CI 1.52;1.92), as well as age (OR = 1.03, 95%CI 1.02;1.03) and years of education (OR = 0.94 95%CI 0.93;0.95). CONCLUSIONS According to our results, deportees had less access to care while in the United States, as compared with voluntary-return migrants. Our results also showed an independent and statistically significant association between deportation and having poorer self-perceived health. To promote the health and access to care of deported Mexican migrants coming back from the United States, new health and social policies are required. PMID:25119943

  18. Development of improved methods for remote access of DIII-D data and data analysis

    International Nuclear Information System (INIS)

    Greene, K.L.; McHarg, B.B. Jr.

    1997-11-01

    The DIII-D tokamak is a national fusion research facility. There is an increasing need to access data from remote sites in order to facilitate data analysis by collaborative researchers at remote locations, both nationally and internationally. In the past, this has usually been done by remotely logging into computers at the DIII-D site. With the advent of faster networking and powerful computers at remote sites, it is becoming possible to access and analyze data from anywhere in the world as if the remote user were actually at the DIII-D site. The general mechanism for accessing DIII-D data has always been via the PTDATA subroutine. Substantial enhancements are being made to that routine to make it more useful in a non-local environment. In particular, a caching mechanism is being built into PTDATA to make network data access more efficient. Studies are also being made of using Distributed File System (DFS) disk storage in a Distributed Computing Environment (DCE). A data server has been created that will migrate, on request, shot data from the DIII-D environment into the DFS environment

  19. Architectures for a quantum random access memory

    Science.gov (United States)

    Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo

    2008-11-01

    A random access memory, or RAM, is a device that, when interrogated, returns the content of a memory location in a memory array. A quantum RAM, or qRAM, allows one to access superpositions of memory sites, which may contain either quantum or classical information. RAMs and qRAMs with n -bit addresses can access 2n memory sites. Any design for a RAM or qRAM then requires O(2n) two-bit logic gates. At first sight this requirement might seem to make large scale quantum versions of such devices impractical, due to the difficulty of constructing and operating coherent devices with large numbers of quantum logic gates. Here we analyze two different RAM architectures (the conventional fanout and the “bucket brigade”) and propose some proof-of-principle implementations, which show that, in principle, only O(n) two-qubit physical interactions need take place during each qRAM call. That is, although a qRAM needs O(2n) quantum logic gates, only O(n) need to be activated during a memory call. The resulting decrease in resources could give rise to the construction of large qRAMs that could operate without the need for extensive quantum error correction.

  20. Xrootd data access for LHC experiments at the INFN-CNAF Tier-1

    International Nuclear Information System (INIS)

    Gregori, Daniele; Prosperini, Andrea; Ricci, Pier Paolo; Sapunenko, Vladimir; Boccali, Tommaso; Noferini, Francesco; Vagnoni, Vincenzo

    2014-01-01

    The Mass Storage System installed at the INFN-CNAF Tier-1 is one of the biggest hierarchical storage facilities in Europe. It currently provides storage resources for about 12% of all LHC data, as well as for other experiments. The Grid Enabled Mass Storage System (GEMSS) is the current solution implemented at CNAF and it is based on a custom integration between a high performance parallel file system (General Parallel File System, GPFS) and a tape management system for long-term storage on magnetic media (Tivoli Storage Manager, TSM). Data access to Grid users is being granted since several years by the Storage Resource Manager (StoRM), an implementation of the standard SRM interface, widely adopted within the WLCG community. The evolving requirements from the LHC experiments and other users are leading to the adoption of more flexible methods for accessing the storage. These include the implementation of the so-called storage federations, i.e. geographically distributed federations allowing direct file access to the federated storage between sites. A specific integration between GEMSS and Xrootd has been developed at CNAF to match the requirements of the CMS experiment. This was already implemented for the ALICE use case, using ad-hoc Xrootd modifications. The new developments for CMS have been validated and are already available in the official Xrootd builds. This integration is currently in production and appropriate large scale tests have been made. In this paper we present the Xrootd solutions adopted for ALICE, CMS, ATLAS and LHCb to increase the availability and optimize the overall performance.

  1. 77 FR 60962 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2012-10-05

    ... ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 2 [FRL-9733-8] Clean Water Act; Contractor Access to... transfer of confidential business information to contractor, subcontractors, and consultants. SUMMARY: The... certain industries. We have determined that the contractors listed below require access [[Page 60963

  2. Energy access in Africa: Challenges ahead

    International Nuclear Information System (INIS)

    Brew-Hammond, Abeeku

    2010-01-01

    This paper presents a review of the current situation and projections for energy access in Africa. The paper also presents several sets of ambitious energy access targets as agreed by the regional groupings within the region. The paper argues that achieving between 50% and 100% access to modern energy services by 2030 in Africa will require more effective mobilization and use of both domestic and external funding, and the development and implementation of innovative policy frameworks. The paper suggests that greater emphasis will need to be placed on productive uses of energy and energy for income generation in order to break the vicious circle of low incomes leading to poor access to modern energy services, which in turn puts severe limitations on the ability to generate higher incomes. The paper further suggests that if anything near the ambitious targets set by African organisations are to be achieved then it will be advisable to tap into the full menu of energy resource and technology options, and there will be the need for significant increases in the numbers of various actors involved together with more effective institutions in the energy sector.

  3. Software Ergonomics of Iranian Digital Library Software’s: An Accessibility-Centered Survey

    Directory of Open Access Journals (Sweden)

    Saeideh Jahanghiri

    2016-06-01

    Full Text Available Purpose: The Purpose of this study is to evaluate accessibility features of Iranian Digital Library Software’s (IDLS. Method/Approach: This is an applied research and has done as a heuristic survey. Statistical population of the study includes five Digital Library Softwares: Azarakhsh, Nosa, Papyrus, Parvanpajooh and Payam. The researcher-made criteria list of this study is based on ISO 9241-171 and has prepared through a Delphi method. Different types of descriptive statistical techniques in collaboration with Friedman test and SAW decision making method used for data analyzing. Findings: Research results showed that IDLSs have made no impressive effort for regarding accessibility features and their accessibility has obtained solely through the Operating System and Platform that the software runs on it. That’s why input accessibility features – which have regarded through OS-, have gained first rank among other accessibility features. There is meaningful statistical difference between IDLSs in regarding accessibility features. Originality/Value: This study which survey the accessibility features of IDLSs, is one of the first attending software accessibility features in Iran and it can have an important role in introducing disable users’ needs to software developers and digital collection makers.

  4. Task Delegation Based Access Control Models for Workflow Systems

    Science.gov (United States)

    Gaaloul, Khaled; Charoy, François

    e-Government organisations are facilitated and conducted using workflow management systems. Role-based access control (RBAC) is recognised as an efficient access control model for large organisations. The application of RBAC in workflow systems cannot, however, grant permissions to users dynamically while business processes are being executed. We currently observe a move away from predefined strict workflow modelling towards approaches supporting flexibility on the organisational level. One specific approach is that of task delegation. Task delegation is a mechanism that supports organisational flexibility, and ensures delegation of authority in access control systems. In this paper, we propose a Task-oriented Access Control (TAC) model based on RBAC to address these requirements. We aim to reason about task from organisational perspectives and resources perspectives to analyse and specify authorisation constraints. Moreover, we present a fine grained access control protocol to support delegation based on the TAC model.

  5. Lexical Access in L2 Speech Production: a controlled serial search task

    Directory of Open Access Journals (Sweden)

    Gicele Vergine Vieira

    2017-09-01

    Full Text Available When it comes to lexical access in L2 speech production, working memory (WM seems to play a central role as for less automatized procedures require more WM capacity to be executed (Prebianca, 2007. With that in mind, this paper aims at claiming that bilingual lexical access qualifies as a controlled serial strategic search task susceptible to individual differences in WM capacity. Evidence in support of such claim is provided by the results of AUTHOR's (2010 study conducted so as to investigate the relationship between L2 lexical access, WMC and L2 proficiency. AUTHOR's (2010 findings indicate that bilingual lexical access entails underlying processes such as cue generation, set delimitation, serial search and monitoring, which to be carried out, require the allocation of attention. Attention is limited and, as a result, only higher spans were able to perform these underlying processes automatically.

  6. Experiences Accessing Abortion Care in Alabama among Women Traveling for Services.

    Science.gov (United States)

    White, Kari; deMartelly, Victoria; Grossman, Daniel; Turan, Janet M

    2016-01-01

    In Alabama, more than one-half of reproductive-aged women live in counties without an abortion provider. State regulations require in-person counseling (or confirmed receipt of materials sent by certified mail) followed by a 48-hour waiting period. We explored the impact of this service and policy environment on experiences accessing abortion care for women traveling long distances to clinics. We conducted in-depth interviews with 25 women who traveled more than 30 miles to an Alabama clinic providing abortion care between July and September 2014. Women were interviewed by telephone at least 1 day after their consultation, procedure, or follow-up visit. We used content analysis methods to code and analyze interview transcripts. Almost all women found a clinic by searching online or talking to others in their social networks who had abortions. These strategies did not always direct women to the closest clinic, and some described searches that yielded inaccurate information. The majority of women did not believe an in-person consultation visit was necessary and found it to be burdensome because of the extra travel required and long waits at the clinic. Two-thirds of the women were unable to schedule their abortion 48 hours later owing to work schedules or because appointments were offered only once a week, and four women were delayed until their second trimester even though they sought services earlier in pregnancy. It is often difficult for women in communities without an abortion provider to find and access timely abortion care. Efforts are needed to make abortion more accessible and prevent further restrictions on services. Copyright © 2016 Jacobs Institute of Women's Health. Published by Elsevier Inc. All rights reserved.

  7. 47 CFR 32.5082 - Switched access revenue.

    Science.gov (United States)

    2010-10-01

    ... SYSTEM OF ACCOUNTS FOR TELECOMMUNICATIONS COMPANIES Instructions For Revenue Accounts § 32.5082 Switched access revenue. (a) This account shall consist of federally and state tariffed charges assessed to... and state tariffed charges. Such subsidiary record categories shall be reported as required by part 43...

  8. Access Control of Web- and Java-Based Applications

    Science.gov (United States)

    Tso, Kam S.; Pajevski, Michael J.

    2013-01-01

    Cybersecurity has become a great concern as threats of service interruption, unauthorized access, stealing and altering of information, and spreading of viruses have become more prevalent and serious. Application layer access control of applications is a critical component in the overall security solution that also includes encryption, firewalls, virtual private networks, antivirus, and intrusion detection. An access control solution, based on an open-source access manager augmented with custom software components, was developed to provide protection to both Web-based and Javabased client and server applications. The DISA Security Service (DISA-SS) provides common access control capabilities for AMMOS software applications through a set of application programming interfaces (APIs) and network- accessible security services for authentication, single sign-on, authorization checking, and authorization policy management. The OpenAM access management technology designed for Web applications can be extended to meet the needs of Java thick clients and stand alone servers that are commonly used in the JPL AMMOS environment. The DISA-SS reusable components have greatly reduced the effort for each AMMOS subsystem to develop its own access control strategy. The novelty of this work is that it leverages an open-source access management product that was designed for Webbased applications to provide access control for Java thick clients and Java standalone servers. Thick clients and standalone servers are still commonly used in businesses and government, especially for applications that require rich graphical user interfaces and high-performance visualization that cannot be met by thin clients running on Web browsers

  9. Automated Computer Access Request System

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  10. Allelic database and divergence among Psidium accessions by using microsatellite markers.

    Science.gov (United States)

    da Costa, S R; Santos, C A F

    2013-12-16

    This study aimed to investigate the genetic variability among guava accessions and wild Psidium species of the Embrapa Semiárido germplasm collection by using microsatellite loci to guide genetic resources and breeding programs, emphasizing crosses between guava and other Psidium species. DNA was extracted using the 2X CTAB method, and polymerase chain reaction products were analyzed on 6% denatured polyacrylamide gels stained with silver nitrate. The unweighted pair-group method using arithmetic average dendrogram generated from the distance matrix of the Jaccard coefficient for 183 alleles of 13 microsatellite loci was used for visualization of genetic similarity. The number of base pairs was estimated using inverse mobility method based on the regression of known-size products. Analysis of molecular variance was performed using total decomposition between and within guava accessions. The accessions showed similarity from 0.75 to 1.00, with the dendrogram presenting cophenetic value of 0.85. Five groups were observed: the first included guava accessions; the second, P. guineense accessions; the third, one accession of P. friedrichsthalianum; and the last 2 groups, P. cattleianum. The genetic similarity among P. guineense and some guava accessions were above 80%, suggesting greater possibility to obtain interspecies hybrids between these 2 species. The genetic variability between the accessions was considered to be high (ΦST = 0.238), indicating that guava genetic variability is not uniformly distributed among the 9 Brazilian states from where the accession were obtained. Obtaining a greater number of accessions by Brazilian states is recommended in order to have greater diversity among the species.

  11. Right of access to energy

    International Nuclear Information System (INIS)

    Delgado Triana, Yanelys; Fariñas Wong, Ernesto Yoel

    2015-01-01

    Energy is essential for the development of our life and for the development of production capacity. However, a number of people worldwide without this living, specifically power. To the extent that increase energy needs for domestic, industrial and agricultural use, each day more indispensable need access to this recognition as a human right or fundamental respect is made, so some questions in this paper are required both denominations, being essential to consider the emergence and evolution of these. An analysis of the international protection they receive the right of access to energy services, although currently there are no international treaties that specifically recognize it also performs a number of initiatives that promote its preservation manifested and recognized in several abstractly legal instruments, such as declarations, covenants and conventions. (full text)

  12. Integrating and accessing medical data resources within the ViroLab Virtual Laboratory

    NARCIS (Netherlands)

    Assel, M.; Nowakowski, P.; Bubak, M.

    2008-01-01

    This paper presents the data access solutions which have been developed in the ViroLab Virtual Laboratory infrastructure to enable medical researchers and practitioners to conduct experiments in the area of HIV treatment. Such experiments require access to a number of geographically distributed data

  13. 78 FR 79692 - Clean Water Act; Contractor Access to Confidential Business Information

    Science.gov (United States)

    2013-12-31

    ... ENVIRONMENTAL PROTECTION AGENCY [FRL-9904-94-OW] Clean Water Act; Contractor Access to... Transfer of Confidential Business Information to Contractor, Subcontractors, and Consultants. SUMMARY: The... contractors listed below require access to CBI submitted to EPA under Section 308 of the Clean Water Act (CWA...

  14. A hybrid 3D spatial access method based on quadtrees and R-trees for globe data

    Science.gov (United States)

    Gong, Jun; Ke, Shengnan; Li, Xiaomin; Qi, Shuhua

    2009-10-01

    3D spatial access method for globe data is very crucial technique for virtual earth. This paper presents a brand-new maintenance method to index 3d objects distributed on the whole surface of the earth, which integrates the 1:1,000,000- scale topographic map tiles, Quad-tree and R-tree. Furthermore, when traditional methods are extended into 3d space, the performance of spatial index deteriorates badly, for example 3D R-tree. In order to effectively solve this difficult problem, a new algorithm of dynamic R-tree is put forward, which includes two sub-procedures, namely node-choosing and node-split. In the node-choosing algorithm, a new strategy is adopted, not like the traditional mode which is from top to bottom, but firstly from bottom to top then from top to bottom. This strategy can effectively solve the negative influence of node overlap. In the node-split algorithm, 2-to-3 split mode substitutes the traditional 1-to-2 mode, which can better concern the shape and size of nodes. Because of the rational tree shape, this R-tree method can easily integrate the concept of LOD. Therefore, it will be later implemented in commercial DBMS and adopted in time-crucial 3d GIS system.

  15. Measurement of bio-impedance with a smart needle to confirm percutaneous kidney access.

    Science.gov (United States)

    Hernandez, D J; Sinkov, V A; Roberts, W W; Allaf, M E; Patriciu, A; Jarrett, T W; Kavoussi, L R; Stoianovici, D

    2001-10-01

    The traditional method of percutaneous renal access requires freehand needle placement guided by C-arm fluoroscopy, ultrasonography, or computerized tomography. This approach provides limited objective means for verifying successful access. We developed an impedance based percutaneous Smart Needle system and successfully used it to confirm collecting system access in ex vivo porcine kidneys. The Smart Needle consists of a modified 18 gauge percutaneous access needle with the inner stylet electrically insulated from the outer sheath. Impedance is measured between the exposed stylet tip and sheath using Model 4275 LCR meter (Hewlett-Packard, Sunnyvale, California). An ex vivo porcine kidney was distended by continuous gravity infusion of 100 cm. water saline from a catheter passed through the parenchyma into the collecting system. The Smart Needle was gradually inserted into the kidney to measure depth precisely using a robotic needle placement system, while impedance was measured continuously. The Smart Needle was inserted 4 times in each of 4 kidneys. When the needle penetrated the distended collecting system in 11 of 16 attempts, a characteristic sharp drop in resistivity was noted from 1.9 to 1.1 ohm m. Entry into the collecting system was confirmed by removing the stylet and observing fluid flow from the sheath. This characteristic impedance change was observed only at successful entry into the collecting system. A characteristic sharp drop in impedance signifies successful entry into the collecting system. The Smart Needle system may prove useful for percutaneous kidney access.

  16. Energy challenges in optical access and aggregation networks.

    Science.gov (United States)

    Kilper, Daniel C; Rastegarfar, Houman

    2016-03-06

    Scalability is a critical issue for access and aggregation networks as they must support the growth in both the size of data capacity demands and the multiplicity of access points. The number of connected devices, the Internet of Things, is growing to the tens of billions. Prevailing communication paradigms are reaching physical limitations that make continued growth problematic. Challenges are emerging in electronic and optical systems and energy increasingly plays a central role. With the spectral efficiency of optical systems approaching the Shannon limit, increasing parallelism is required to support higher capacities. For electronic systems, as the density and speed increases, the total system energy, thermal density and energy per bit are moving into regimes that become impractical to support-for example requiring single-chip processor powers above the 100 W limit common today. We examine communication network scaling and energy use from the Internet core down to the computer processor core and consider implications for optical networks. Optical switching in data centres is identified as a potential model from which scalable access and aggregation networks for the future Internet, with the application of integrated photonic devices and intelligent hybrid networking, will emerge. © 2016 The Author(s).

  17. Hera-FFX: a Firefox add-on for Semi-automatic Web Accessibility Evaluation

    OpenAIRE

    Fuertes Castro, José Luis; González, Ricardo; Gutiérrez, Emmanuelle; Martínez Normand, Loïc

    2009-01-01

    Website accessibility evaluation is a complex task requiring a combination of human expertise and software support. There are several online and offline tools to support the manual web accessibility evaluation process. However, they all have some weaknesses because none of them includes all the desired features. In this paper we present Hera-FFX, an add-on for the Firefox web browser that supports semi-automatic web accessibility evaluation.

  18. 45 CFR 150.203 - Circumstances requiring CMS enforcement.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Circumstances requiring CMS enforcement. 150.203... CARE ACCESS CMS ENFORCEMENT IN GROUP AND INDIVIDUAL INSURANCE MARKETS CMS Enforcement Processes for... requiring CMS enforcement. CMS enforces HIPAA requirements to the extent warranted (as determined by CMS) in...

  19. Analysis of the accessibility in websites of Ecuadorian universities of excellence

    Directory of Open Access Journals (Sweden)

    Tania Acosta

    2017-02-01

    Full Text Available Since the publication of the Ecuadorian Technical Standard NTE INEN ISO / IEC 40500 in 2014 and the Ecuadorian Technical Regulation RTE INEN 288 "The web contents accessibility" in 2016, web accessibility in Ecuador has taken great importance. In the educational field, the websites of Higher Education Institutions (HEI have become a communication channel, where universities publish the information and services they offer. In addition, HEI must satisfy the rights of all citizens to have access to education, which includes persons with disabilities. In order to ensure access to the websites of HEI to all people it is important that HEI incorporate web accessibility as an essential requirement in their websites. The objective of this research is to perform the accessibility analysis of the websites of the Ecuadorian universities of excellence belonging to categories A, B and C; identify websites accessibility errors and to present some recommendations for a better fulfillment of the WCAG 2.0 accessibility guidelines by website designers and developers.

  20. The Biocarbon vascular access device (DiaTAB) for haemodialysis.

    Science.gov (United States)

    Smits, P J; Slooff, M J; Lichtendahl, D H; van der Hem, G K

    1985-01-01

    The Biocarbon vascular access device (DiaTAB) is a relatively new method in secondary access surgery. Punctures, often the cause of complications can be avoided because it is a no-needle method of dialysis. However thrombosis due to stenosis of the venous anastomosis or of the efferent vein is a continuing problem. A new experience is the fibrin flap formation under the plug of the device, which can be removed easily.

  1. A semi-automated vascular access system for preclinical models

    International Nuclear Information System (INIS)

    Berry-Pusey, B N; David, J; Taschereau, R; Silverman, R W; Williams, D; Ladno, W; Stout, D; Chatziioannou, A; Chang, Y C; Prince, S W; Chu, K; Tsao, T C

    2013-01-01

    Murine models are used extensively in biological and translational research. For many of these studies it is necessary to access the vasculature for the injection of biologically active agents. Among the possible methods for accessing the mouse vasculature, tail vein injections are a routine but critical step for many experimental protocols. To perform successful tail vein injections, a high skill set and experience is required, leaving most scientists ill-suited to perform this task. This can lead to a high variability between injections, which can impact experimental results. To allow more scientists to perform tail vein injections and to decrease the variability between injections, a vascular access system (VAS) that semi-automatically inserts a needle into the tail vein of a mouse was developed. The VAS uses near infrared light, image processing techniques, computer controlled motors, and a pressure feedback system to insert the needle and to validate its proper placement within the vein. The VAS was tested by injecting a commonly used radiolabeled probe (FDG) into the tail veins of five mice. These mice were then imaged using micro-positron emission tomography to measure the percentage of the injected probe remaining in the tail. These studies showed that, on average, the VAS leaves 3.4% of the injected probe in the tail. With these preliminary results, the VAS system demonstrates the potential for improving the accuracy of tail vein injections in mice. (paper)

  2. Access to Research Inputs

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    2015-01-01

    The viability of modern open science norms and practices depends on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50 % more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry...

  3. Access to Research Inputs

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    The viability of modern open science norms and practices depend on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50% more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry....

  4. Open Access Publishing in Indian Premier Research Institutions

    Science.gov (United States)

    Bhat, Mohammad Hanief

    2009-01-01

    Introduction: Publishing research findings in open access journals is a means of enhancing visibility and consequently increasing the impact of publications. This study provides an overview of open access publishing in premier research institutes of India. Method: The publication output of each institution from 2003 to 2007 was ascertained through…

  5. Effect Through Broadcasting System Access Point For Video Transmission

    Directory of Open Access Journals (Sweden)

    Leni Marlina

    2015-08-01

    Full Text Available Most universities are already implementing wired and wireless network that is used to access integrated information systems and the Internet. At present it is important to do research on the influence of the broadcasting system through the access point for video transmitter learning in the university area. At every university computer network through the access point must also use the cable in its implementation. These networks require cables that will connect and transmit data from one computer to another computer. While wireless networks of computers connected through radio waves. This research will be a test or assessment of how the influence of the network using the WLAN access point for video broadcasting means learning from the server to the client. Instructional video broadcasting from the server to the client via the access point will be used for video broadcasting means of learning. This study aims to understand how to build a wireless network by using an access point. It also builds a computer server as instructional videos supporting software that can be used for video server that will be emitted by broadcasting via the access point and establish a system of transmitting video from the server to the client via the access point.

  6. Accessible solitons of fractional dimension

    Energy Technology Data Exchange (ETDEWEB)

    Zhong, Wei-Ping, E-mail: zhongwp6@126.com [Department of Electronic and Information Engineering, Shunde Polytechnic, Guangdong Province, Shunde 528300 (China); Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar); Belić, Milivoj [Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar); Zhang, Yiqi [Key Laboratory for Physical Electronics and Devices of the Ministry of Education & Shaanxi Key Lab of Information Photonic Technique, Xi’an Jiaotong University, Xi’an 710049 (China)

    2016-05-15

    We demonstrate that accessible solitons described by an extended Schrödinger equation with the Laplacian of fractional dimension can exist in strongly nonlocal nonlinear media. The soliton solutions of the model are constructed by two special functions, the associated Legendre polynomials and the Laguerre polynomials in the fraction-dimensional space. Our results show that these fractional accessible solitons form a soliton family which includes crescent solitons, and asymmetric single-layer and multi-layer necklace solitons. -- Highlights: •Analytic solutions of a fractional Schrödinger equation are obtained. •The solutions are produced by means of self-similar method applied to the fractional Schrödinger equation with parabolic potential. •The fractional accessible solitons form crescent, asymmetric single-layer and multilayer necklace profiles. •The model applies to the propagation of optical pulses in strongly nonlocal nonlinear media.

  7. [The Open Access Initiative (OAI) in the scientific literature].

    Science.gov (United States)

    Sánchez-Martín, Francisco M; Millán Rodríguez, Félix; Villavicencio Mavrich, Humberto

    2009-01-01

    According to the declaration of the Budapest Open Access Initiative (OAI) is defined as a editorial model in which access to scientific journal literature and his use are free. Free flow of information allowed by Internet has been the basis of this initiative. The Bethesda and the Berlin declarations, supported by some international agencies, proposes to require researchers to deposit copies of all articles published in a self-archive or an Open Access repository, and encourage researchers to publish their research papers in journals Open Access. This paper reviews the keys of the OAI, with their strengths and controversial aspects; and it discusses the position of databases, search engines and repositories of biomedical information, as well as the attitude of the scientists, publishers and journals. So far the journal Actas Urológicas Españolas (Act Urol Esp) offer their contents on Open Access as On Line in Spanish and English.

  8. New concepts, requirements and methods concerning the periodic inspection of the CANDU fuel channels

    International Nuclear Information System (INIS)

    Denis, J.R.

    1995-01-01

    Periodic inspection of fuel channels is essential for a proper assessment of the structural integrity of these vital components of the reactor. The development of wet channel technologies for non-destructive examination (NDE) of pressure tubes and the high technical performance and reliability of the CIGAR equipment have led, in less than 1 0 years, to the accumulation of a very significant volume of data concerning the flaw mechanisms and structural behaviour of the CANDU fuel channels. On this basis, a new form of the CAN/CSA-N285.4 Standard for Periodic Inspection of CANDU Nuclear Power Plant components was elaborated, introducing new concepts and requirements, in accord with the powerful NDE methods now available. This paper presents these concepts and requirements, and discusses the NDE methods, presently used or under development, to satisfy these requirements. Specific features regarding the fuel channel inspections of Cernavoda NGS Unit 1 are also discussed. (author)

  9. Effects of Temperature, Light and Pre-Chilling on Seed Germination of Stevia rebaudiana (Bertoni Bertoni Accessions

    Directory of Open Access Journals (Sweden)

    Mario Macchia

    Full Text Available Stevia rebaudiana (Bertoni Bertoni is a perennial shrub of the Asteraceae family native to Paraguay and Brazil where it has been used for several years as a sweetener. It is a short-day species, with a critical light requirement for flowering of roughly 13 hours. In plants whose biological cycle is strongly photoperiod-dependent, latitude is one of the major factors influencing reproduction. Late flowering may adversely affect seed production if this occurs during a season that is unfavorable to pollination. At Italian latitudes, this species often gives scanty seed production, with low germination rate and poor germination energy of seeds produced. In 2001 four accessions have been grown for seed production in a field plot experiment in Central Italy. The various accessions were found to exhibit noticeably different photoperiod requirements, which affected flowering time (from late August to the end of September and consequently also the conditions of achene filling and ripening. Late flowering and seed ripening occurred during autumn season, unfavourable to complete seed formation, leading to an increase in the empty seed percentage recorded for each accession. Detailed germination trials were therefore undertaken using seeds collected from plants of the different accessions in order to assess the quality of the seeds produced. Various germination methods have been tested in a controlled environment adopting four different temperatures (20° C, 25° C constant temperature and 15/25° C, 20/30° C (16/8h alternating temperature in light or darkness with or without pre-chilling. Germination rates varied over an extensive range (germination percentage from 9 to 83%, mainly due to the divergent specific characteristics of the material examined and the different treatments studied. At all temperatures tested, the most earlier accession, showed the higher germination percentages (54-83% while the latest accession was among those with the lowest

  10. Economic assessment of strategies to deploy publicly accessible charging infrastructure

    OpenAIRE

    Madina, Carlos; Barlag, Heike; Coppola, Giovanni; Gómez-Arriola, Inés; Rodríguez-Sánchez, Raúl; Zabala, Eduardo

    2015-01-01

    From the end user perspective, the main barriers for widespread electric vehicle (EV) adoption are high purchase cost and range anxiety, both regarding battery capacity and availability of accessible EV charging infrastructure. Governments and public bodies in general are taking steps towards overcoming these barriers by, among others, setting up regulatory requirements regarding standardisation, customer information and recommending objectives of publicly accessible charging infrastructure. ...

  11. Measuring Vulnerable Population’s Healthy and Unhealthy Food Access in Austin, Texas

    Directory of Open Access Journals (Sweden)

    Junfeng Jiao

    2016-09-01

    Full Text Available Food deserts—areas with a significant low-income population experiencing low accessibility to healthy food sources—have been well studied in terms of their connection to obesity and its related health outcomes. Measuring food accessibility is the key component in food desert research. However, previous studies often measured food accessibility based on large geographic units (e.g. census tract, zip code with few transportation modes (e.g. driving or taking public transit and limited vulnerable population measures. This paper aims to demonstrate a new method to measure food access for different vulnerable population groups at a smaller geographic scale with different transportation modes. In detail, this paper improves on previous studies from the following three perspectives: (1 Measuring food accessibility with a smaller geographic scale: block group vs. census track which on average includes 1000 people vs. 4000 people; (2 Measuring food accessibility with different transportation modes: walking, biking, transit, and driving vs. driving only; and (3 Measuring food accessibility for different vulnerable population groups. The proposed method was tested in the city of Austin, which is the capital of Texas and the 11th largest city in the US, and measured people’s accessibility to both healthy and unhealthy food sources within the city. The methods can be applied to address food accessibility issues in other cities or regions.

  12. Detecting Inappropriate Access to Electronic Health Records Using Collaborative Filtering.

    Science.gov (United States)

    Menon, Aditya Krishna; Jiang, Xiaoqian; Kim, Jihoon; Vaidya, Jaideep; Ohno-Machado, Lucila

    2014-04-01

    Many healthcare facilities enforce security on their electronic health records (EHRs) through a corrective mechanism: some staff nominally have almost unrestricted access to the records, but there is a strict ex post facto audit process for inappropriate accesses, i.e., accesses that violate the facility's security and privacy policies. This process is inefficient, as each suspicious access has to be reviewed by a security expert, and is purely retrospective, as it occurs after damage may have been incurred. This motivates automated approaches based on machine learning using historical data. Previous attempts at such a system have successfully applied supervised learning models to this end, such as SVMs and logistic regression. While providing benefits over manual auditing, these approaches ignore the identity of the users and patients involved in a record access. Therefore, they cannot exploit the fact that a patient whose record was previously involved in a violation has an increased risk of being involved in a future violation. Motivated by this, in this paper, we propose a collaborative filtering inspired approach to predicting inappropriate accesses. Our solution integrates both explicit and latent features for staff and patients, the latter acting as a personalized "finger-print" based on historical access patterns. The proposed method, when applied to real EHR access data from two tertiary hospitals and a file-access dataset from Amazon, shows not only significantly improved performance compared to existing methods, but also provides insights as to what indicates an inappropriate access.

  13. A Study on the Deriving Requirements of ARGO Operation System

    Directory of Open Access Journals (Sweden)

    Yoon-Kyung Seo

    2009-12-01

    Full Text Available Korea Astronomy and Space Science Institute (KASI has been developing one mobile and one stationary SLR system since 2008 named as ARGO-M and ARGO-F, respectively. KASI finished the step of deriving the system requirements of ARGO. The requirements include definitions and scopes of various software and hardware components which are necessary for developing the ARGO-M operation system. And the requirements define function, performance, and interface requirements. The operation system consisting of ARGO-M site, ARGO-F site, and Remote Operation Center (ROC inside KASI is designed for remote access and the automatic tracking and control system which are the main operation concept of ARGO system. To accomplish remote operation, we are considering remote access to ARGO-F and ARGO-M from ROC. The mobile-phone service allows us to access the ARGO-F remotely and to control the system in an emergency. To implement fully automatic tracking and control function in ARGO-F, we have investigated and described the requirements about the automatic aircraft detection system and the various meteorological sensors. This paper addresses the requirements of ARGO Operation System.

  14. Use of simple transport equations to estimate waste package performance requirements

    International Nuclear Information System (INIS)

    Wood, B.J.

    1982-01-01

    A method of developing waste package performance requirements for specific nuclides is described. The method is based on: Federal regulations concerning permissible concentrations in solution at the point of discharge to the accessible environment; a simple and conservative transport model; baseline and potential worst-case release scenarios. Use of the transport model enables calculation of maximum permissible release rates within a repository in basalt for each of the scenarios. The maximum permissible release rates correspond to performance requirements for the engineered barrier system. The repository was assumed to be constructed in a basalt layer. For the cases considered, including a well drilled into an aquifer 1750 m from the repository center, little significant advantage is obtained from a 1000-yr as opposed to a 100-yr waste package. A 1000-yr waste package is of importance only for nuclides with half-lives much less than 100 yr which travel to the accessible environment in much less than 1000 yr. Such short travel times are extremely unlikely for a mined repository. Among the actinides, the most stringent maximum permissible release rates are for 236 U and 234 U. A simple solubility calculation suggests, however, that these performance requirements can be readily met by the engineered barrier system. Under the reducing conditions likely to occur in a repository located in basalt, uranium would be sufficiently insoluble that no solution could contain more than about 0.01% of the maximum permissible concentration at saturation. The performance requirements derived from the one-dimensional modeling approach are conservative by at least one to two orders of magnitude. More quantitative three-dimensional modeling at specific sites should enable relaxation of the performance criteria derived in this study. 12 references, 8 figures, 8 tables

  15. Accessing antiretroviral therapy for children: Caregivers' voices

    Directory of Open Access Journals (Sweden)

    Margaret (Maggie Williams

    2016-10-01

    Full Text Available Despite efforts to scale up access to antiretroviral therapy (ART, particularly at primary health care (PHC facilities, antiretroviral therapy (ART continues to be out of reach formany human immunodeficiency virus (HIV-positive children in sub-Saharan Africa. In resource limited settings decentralisation of ART is required to scale up access to essential medication. Traditionally, paediatric HIV care has been provided in tertiary care facilities which have better human and material resources, but limited accessibility in terms of distance for caregivers of HIV-positive children. The focus of this article is on the experiences of caregivers whilst accessing ART for HIV-positive children at PHC (decentralised care facilities in Nelson Mandela Bay (NMB in the Eastern Cape, South Africa. A qualitative, explorative, descriptive and contextual research design was used. The target population comprised caregivers of HIV-positive children. Data were collected by means of indepth individual interviews, which were thematically analysed. Guba's model was usedto ensure trustworthiness. Barriers to accessing ART at PHC clinics for HIV-positive children included personal issues, negative experiences, lack of support and finance, stigma and discrimination. The researchers recommend standardised programmes be developed and implemented in PHC clinics to assist in providing treatment, care and support for HIV positive children.

  16. Accessing antiretroviral therapy for children: Caregivers' voices

    Directory of Open Access Journals (Sweden)

    Margaret (Maggie Williams

    2016-12-01

    Full Text Available Despite efforts to scale up access to antiretroviral therapy (ART, particularly at primary health care (PHC facilities, antiretroviral therapy (ART continues to be out of reach for many human immunodeficiency virus (HIV-positive children in sub-Saharan Africa. In resource limited settings decentralisation of ART is required to scale up access to essential medication. Traditionally, paediatric HIV care has been provided in tertiary care facilities which have better human and material resources, but limited accessibility in terms of distance for caregivers of HIV-positive children. The focus of this article is on the experiences of caregivers whilst accessing ART for HIV-positive children at PHC (decentralised care facilities in Nelson Mandela Bay (NMB in the Eastern Cape, South Africa. A qualitative, explorative, descriptive and contextual research design was used. The target population comprised caregivers of HIV-positive children. Data were collected by means of in-depth individual interviews, which were thematically analysed. Guba's model was used to ensure trustworthiness. Barriers to accessing ART at PHC clinics for HIV-positive children included personal issues, negative experiences, lack of support and finance, stigma and discrimination. The researchers recommend standardised programmes be developed and implemented in PHC clinics to assist in providing treatment, care and support for HIV-positive children.

  17. ACOG Committee Opinion Number 542: Access to emergency contraception.

    Science.gov (United States)

    2012-11-01

    Emergency contraception includes contraceptive methods used to prevent pregnancy in the first few days after unprotected intercourse, sexual assault, or contraceptive failure. Although the U.S. Food and Drug Administration approved the first dedicated product for emergency contraception in 1998, numerous barriers to access to emergency contraception remain. The purpose of this Committee Opinion is to examine the barriers to the use of oral emergency contraception methods and to highlight the importance of increasing access.

  18. Authentication and Access: Accommodating Public Users in an Academic World

    Directory of Open Access Journals (Sweden)

    Lynne Weber

    2010-09-01

    Full Text Available In the fall of 2004, the Academic Computing Center, a division of the Information Technology Services Department (ITS at Minnesota State University, Mankato took over responsibility for the computers in the public areas of Memorial Library. For the first time, affiliated Memorial Library users were required to authenticate using a campus username and password, a change that effectively eliminated computer access for anyone not part of the university community. This posed a dilemma for the librarians. Because of its Federal Depository status, the library had a responsibility to provide general access to both print and online government publications for the general public. Furthermore, the library had a long tradition of providing guest access to most library resources, and there was reluctance to abandon the practice. Therefore the librarians worked with ITS to retain a small group of six computers that did not require authentication and were clearly marked for community use, along with several standup, open-access computers on each floor used primarily for searching the library catalog. The additional need to provide computer access to high school students visiting the library for research and instruction led to more discussions with ITS and resulted in a means of generating temporary usernames and passwords through a Web form. These user accommodations were implemented in the library without creating a written policy governing the use of open-access computers.

  19. Does Imaging Modality Used For Percutaneous Renal Access Make a Difference?

    DEFF Research Database (Denmark)

    Andonian, Sero; Scoffone, Cesare; Louie, Michael K

    2013-01-01

    OBJECTIVE To assess peri-operative outcomes of percutaneous nephrolithotomy (PCNL) using ultrasound or fluoroscopic guidance for percutaneous access. METHODS A prospectively collected international CROES database containing 5806 patients treated with PCNL was used for the study. Patients were...... divided into two groups based on the methods of percutaneous access: ultrasound vs. fluoroscopy. Patient characteristics, operative data and post-operative outcomes were compared. RESULTS Percutaneous access was obtained using ultrasound guidance only in 453 patients (13.7%) and fluoroscopic guidance only...

  20. Optical fiber cabling technologies for flexible access network

    Science.gov (United States)

    Tanji, Hisashi

    2008-07-01

    Fiber-to-the-home (FTTH) outside plant infrastructure should be so designed and constructed as to flexibly deal with increasing subscribers and system evolution to be expected in the future, taking minimization of total cost (CAPEX and OPEX) into consideration. With this in mind, fiber access architectures are reviewed and key technologies on optical fiber and cable for supporting flexible access network are presented. Low loss over wide wavelength (low water peak) and bend-insensitive single mode fiber is a future proof solution. Enhanced separable ribbon facilitates mid-span access to individual fibers in a cable installed, improving fiber utilizing efficiency and flexibility of distribution design. It also contributes to an excellent low PMD characteristic which could be required for video RF overlay system or high capacity long reach metro-access convergence network in the future. Bend-insensitive fiber based cabling technique including field installable connector greatly improves fiber/cable handling in installation and maintenance work.

  1. A spatial analysis of variations in health access: linking geography, socio-economic status and access perceptions

    Science.gov (United States)

    2011-01-01

    Background This paper analyses the relationship between public perceptions of access to general practitioners (GPs) surgeries and hospitals against health status, car ownership and geographic distance. In so doing it explores the different dimensions associated with facility access and accessibility. Methods Data on difficulties experienced in accessing health services, respondent health status and car ownership were collected through an attitudes survey. Road distances to the nearest service were calculated for each respondent using a GIS. Difficulty was related to geographic distance, health status and car ownership using logistic generalized linear models. A Geographically Weighted Regression (GWR) was used to explore the spatial non-stationarity in the results. Results Respondent long term illness, reported bad health and non-car ownership were found to be significant predictors of difficulty in accessing GPs and hospitals. Geographic distance was not a significant predictor of difficulty in accessing hospitals but was for GPs. GWR identified the spatial (local) variation in these global relationships indicating locations where the predictive strength of the independent variables was higher or lower than the global trend. The impacts of bad health and non-car ownership on the difficulties experienced in accessing health services varied spatially across the study area, whilst the impacts of geographic distance did not. Conclusions Difficulty in accessing different health facilities was found to be significantly related to health status and car ownership, whilst the impact of geographic distance depends on the service in question. GWR showed how these relationships were varied across the study area. This study demonstrates that the notion of access is a multi-dimensional concept, whose composition varies with location, according to the facility being considered and the health and socio-economic status of the individual concerned. PMID:21787394

  2. Vertical and horizontal access configurations

    International Nuclear Information System (INIS)

    Spampinato, P.T.

    1987-01-01

    A number of configuration features and maintenance operations are influenced by the choice of whether a design is based on vertical or horizontal access for replacing reactor components. The features which are impacted most include the first wall/blanket segmentation, the poloidal field coil locations, the toroidal field coil number and size, access port size for in-vessel components, and facilities. Since either configuration can be made to work, the choice between the two is not clear cut because both have certain advantages. It is apparent that there are large cost benefits in the poloidal field coil system for ideal coil locations for high elongation plasmas and marginal savings for the INTOR case. If we assume that a new tokamak design will require a higher plasma elongation, the recommendation is to arrange the poloidal field coils in a cost-effective manner while providing reasonable midplane access for heating interfaces and test modules. If a new design study is not based on a high elongation plasma, it still appears prudent to consider this approach so that in-vessel maintenance can be accomplished without moving very massive structures such as the bulk shield. 10 refs., 29 figs., 3 tabs

  3. Comparative efficacy of multimodal digital methods in assessing trail/resource degradation

    Science.gov (United States)

    Logan O. Park

    2014-01-01

    Outdoor recreation can cause both positive and negative impacts on associated forest ecosystems. Forest recreation trails localize negative impacts to a controlled spatial extent while providing recreation access beyond developed areas and transportation networks. Current methods for assessing extent and severity of trail and proximal resource degradation require...

  4. [Value of preserved saphenous vein graft for the creation of access ports in hemodialyzed patients: report of 309 cases].

    Science.gov (United States)

    Schneider, Marc; Barrou, Benoît; Cluzel, Philippe; Hamani, Aziz; Bitker, Marc-Olivier; Richard, François

    2003-09-01

    Biological grafts are rarely used for the creation of vascular access, despite their many advantages. Our group prefers to use distal vascular accesses with interposition of a biological graft when direct access cannot be achieved. The objective of this study was to determine the long-term patency and the complication rate of a series of 309 vascular access procedures using a preserved saphenous (PS) vein homograft. 410 (27%) of the 1,500 vascular access procedures performed by our group required the use of a graft, including 376 PS vein homografts (25%). This retrospective study comprised complete data collection for 309 arteriovenous fistulas (AVF) using preserved saphenous (PS) vein graft in the forearm performed in 267 patients between 1985 and 2000. Primary patency was defined as the interval between creation of the vascular access and the first complication requiring surgical or radiological correction; secondary patency was defined as the interval between creation and loss of the graft, with or without revision of the fistula. Survival rates were calculated according to the Kaplan-Meier method. Inter-group comparison was performed by the Logrank test and analysis of variance was performed by logistic regression. Primary patency rates were 77%, 40% and 27% at 1,2 and 5 years, respectively. Secondary patency rates were 79% and 47% at 1 year and 5 years, respectively. The thrombosis rate was 42%. Two episodes of thrombosis occurred in 25% of grafts and 3 episodes were observed in 10% of cases. Infection rates were 1.9% postoperatively and 5% after dialysis, respectively. An aneurysm occurred on 10% of grafts. The operator's experience (RR = 1.58; p creation of vascular accesses with similar patency rates to those of prosthetic grafts. Vein grafts present a number of advantages, particularly a greater ease of use facilitating distal implantation of the graft and a low infection rate.

  5. A smartphone photogrammetry method for digitizing prosthetic socket interiors.

    Science.gov (United States)

    Hernandez, Amaia; Lemaire, Edward

    2017-04-01

    Prosthetic CAD/CAM systems require accurate 3D limb models; however, difficulties arise when working from the person's socket since current 3D scanners have difficulties scanning socket interiors. While dedicated scanners exist, they are expensive and the cost may be prohibitive for a limited number of scans per year. A low-cost and accessible photogrammetry method for socket interior digitization is proposed, using a smartphone camera and cloud-based photogrammetry services. 15 two-dimensional images of the socket's interior are captured using a smartphone camera. A 3D model is generated using cloud-based software. Linear measurements were comparing between sockets and the related 3D models. 3D reconstruction accuracy averaged 2.6 ± 2.0 mm and 0.086 ± 0.078 L, which was less accurate than models obtained by high quality 3D scanners. However, this method would provide a viable 3D digital socket reproduction that is accessible and low-cost, after processing in prosthetic CAD software. Clinical relevance The described method provides a low-cost and accessible means to digitize a socket interior for use in prosthetic CAD/CAM systems, employing a smartphone camera and cloud-based photogrammetry software.

  6. The contribution of atom accessibility to site of metabolism models for cytochromes P450

    DEFF Research Database (Denmark)

    Rydberg, Patrik; Rostkowski, M.; Gloriam, D.E.

    2013-01-01

    Three different types of atom accessibility descriptors are investigated in relation to site of metabolism predictions. To enable the integration of local accessibility we have constructed 2DSASA, a method for the calculation of the atomic solvent accessible surface area that is independent of 3D...... coordinates. The method was implemented in the SMARTCyp site of metabolism prediction models and improved the results by up to 4 percentage points for nine cytochrome P450 isoforms. The final models are made available at http://www.farma.ku.dk/smartcyp.......Three different types of atom accessibility descriptors are investigated in relation to site of metabolism predictions. To enable the integration of local accessibility we have constructed 2DSASA, a method for the calculation of the atomic solvent accessible surface area that is independent of 3D...

  7. Access to surgical assistance: challenges and perspectives

    Directory of Open Access Journals (Sweden)

    Maria Fernanda do Prado Tostes

    2016-01-01

    Full Text Available Objective to characterize the access to surgical assistance in Brazil. Method documentary study, with a quantitative approach, developed from information of the Caixa Preta da Saúde [Health Black Box] database, of the Brazilian Medical Association. Results in the one-year period 3773 cases related to health care in Brazil were recorded. There were 458 (12.3% records on surgical assistance. Of these, most, 339 (74.1%, involved the lack of access in all regions of Brazil. The main access constraint was the prolonged waiting time for surgery. Other constraints were the excessive waiting for medical appointment with experts, doing examinations and cancellation of surgeries. Conclusion the access to surgical assistance, by users of the Brazilian health system, is not widely guaranteed, reinforcing the need for integrated governmental actions, organization of the health care network, management of health care and human resources to overcome the challenges imposed to achieve the Universal Access to Health and Universal Health Coverage.

  8. 78 FR 30233 - Defense Federal Acquisition Regulation Supplement; Government Support Contractor Access to...

    Science.gov (United States)

    2013-05-22

    ... Number 0750-AG38 Defense Federal Acquisition Regulation Supplement; Government Support Contractor Access... Government support contractors to have access to proprietary technical data belonging to prime contractors and other third parties, provided that the technical data owner may require the support contractor to...

  9. A method to implement fine-grained access control for personal health records through standard relational database queries.

    Science.gov (United States)

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  10. 50 CFR 660.15 - Equipment requirements.

    Science.gov (United States)

    2010-10-01

    ... software requirements. (i) A personal computer with Pentium 75-MHz or higher. Random Access Memory (RAM... Graphics Adapter (VGA) or higher resolution monitor (super VGA is recommended). (ii) Microsoft Windows 2000...

  11. The Effect of Transport Accessibility on the Social Inclusion of Wheelchair Users: A Mixed Method Analysis

    Directory of Open Access Journals (Sweden)

    Raquel Velho

    2016-06-01

    Full Text Available In recent years the accessibility of London buses has improved with the introduction of ramps and wheelchair priority areas. These advances are meant to remove physical barriers to entering the bus, but new conflicts have arisen particularly over the physical space aboard. We aimed to research the barriers faced by wheelchair users in public transport using a mixed methods approach to establish the breadth of issues faced by wheelchair users. To this end we quantified the push-force used alight a bus and a study to understand the coping mechanisms used by people to propel up a ramp. This quantitative approach found push forces which resulted in a load of 2 to 3 times body weight being transferred through people’s shoulders, forces which can be directly linked to shoulder injury. This could disable the user further, preventing them from being able to push their wheelchair. Alongside the quantitative study, we conducted qualitative research comprising of a number of in-depth interviews with wheelchair users about the barriers they face in public transport. Our main claim, highlighted through this interdisciplinary collaboration, is that proposed ‘solutions’ to accessibility, such as ramps, often generate problems of their own. These barriers can affect the life of wheelchair users, impacting on their confidence and causing social isolation. These can be long-term in nature or immediate.

  12. Heuristics Miner for E-Commerce Visitor Access Pattern Representation

    Directory of Open Access Journals (Sweden)

    Kartina Diah Kesuma Wardhani

    2017-06-01

    Full Text Available E-commerce click stream data can form a certain pattern that describe visitor behavior while surfing the e-commerce website. This pattern can be used to initiate a design to determine alternative access sequence on the website. This research use heuristic miner algorithm to determine the pattern. σ-Algorithm and Genetic Mining are methods used for pattern recognition with frequent sequence item set approach. Heuristic Miner is an evolved form of those methods. σ-Algorithm assume that an activity in a website, that has been recorded in the data log, is a complete sequence from start to finish, without any tolerance to incomplete data or data with noise. On the other hand, Genetic Mining is a method that tolerate incomplete data or data with noise, so it can generate a more detailed e-commerce visitor access pattern. In this study, the same sequence of events obtained from six-generated patterns. The resulting pattern of visitor access is that visitors are often access the home page and then the product category page or the home page and then the full text search page.

  13. Space station data system analysis/architecture study. Task 1: Functional requirements definition, DR-5. Appendix: Requirements data base

    Science.gov (United States)

    1985-01-01

    Appendix A contains data that characterize the system functions in sufficient depth as to determine the requirements for the Space Station Data System (SSDS). This data is in the form of: (1) top down traceability report; (2) bottom up traceability report; (3) requirements data sheets; and (4) cross index of requirements paragraphs of the source documents and the requirements numbers. A data base users guide is included that interested parties can use to access the requirements data base and get up to date information about the functions.

  14. Complications of Central Venous Totally Implantable Access Port: Internal Jugular Versus Subclavian Access

    Directory of Open Access Journals (Sweden)

    Pil Young Jung

    Full Text Available Background: Totally implantable access port (TIAP provides reliable, long term vascular access with minimal risk of infection and allows patients normal physical activity. With wide use of ports, new complications have been encountered. We analyzed TIAP related complications and evaluated the outcomes of two different percutaneous routes of access to superior vena cava. Methods: All 172 patients who underwent port insertion with internal jugular approach (Group 1, n = 92 and subclavian approach (Group 2, n = 79 between August 2011 and May 2013 in a single center were analyzed, retrospectively. Medical records were analyzed to compare the outcomes and the occurrence of port related complications between two different percutaneous routes of access to superior vena cava. Results: Median follow-up for TIAP was 278 days (range, 1-1868. Twenty four complications were occurred (14.0%, including pneumothorax (n = 1, 0.6%, migration/malposition (n = 4, 2.3%, pinch-off syndrome (n = 4, 2.3%, malfunction (n = 2, 1.1%, infection (n = 8, 4.7%, and venous thrombosis (n = 5, 2.9%. The overall incidence was 8.7% and 20.3% in each group (p = 0.030. Mechanical complications except infectious and thrombotic complications were more often occurred in group 2 (p = 0.033. The mechanical complication free probability is significantly higher in group 1 (p = 0.040. Conclusions: We suggest that the jugular access should be chosen in patients who need long term catheterization because of high incidence of mechanical complication, such as pinch-off syndrome.

  15. A review of accessibility of administrative healthcare databases in the Asia-Pacific region

    Science.gov (United States)

    Milea, Dominique; Azmi, Soraya; Reginald, Praveen; Verpillat, Patrice; Francois, Clement

    2015-01-01

    Objective We describe and compare the availability and accessibility of administrative healthcare databases (AHDB) in several Asia-Pacific countries: Australia, Japan, South Korea, Taiwan, Singapore, China, Thailand, and Malaysia. Methods The study included hospital records, reimbursement databases, prescription databases, and data linkages. Databases were first identified through PubMed, Google Scholar, and the ISPOR database register. Database custodians were contacted. Six criteria were used to assess the databases and provided the basis for a tool to categorise databases into seven levels ranging from least accessible (Level 1) to most accessible (Level 7). We also categorised overall data accessibility for each country as high, medium, or low based on accessibility of databases as well as the number of academic articles published using the databases. Results Fifty-four administrative databases were identified. Only a limited number of databases allowed access to raw data and were at Level 7 [Medical Data Vision EBM Provider, Japan Medical Data Centre (JMDC) Claims database and Nihon-Chouzai Pharmacy Claims database in Japan, and Medicare, Pharmaceutical Benefits Scheme (PBS), Centre for Health Record Linkage (CHeReL), HealthLinQ, Victorian Data Linkages (VDL), SA-NT DataLink in Australia]. At Levels 3–6 were several databases from Japan [Hamamatsu Medical University Database, Medi-Trend, Nihon University School of Medicine Clinical Data Warehouse (NUSM)], Australia [Western Australia Data Linkage (WADL)], Taiwan [National Health Insurance Research Database (NHIRD)], South Korea [Health Insurance Review and Assessment Service (HIRA)], and Malaysia [United Nations University (UNU)-Casemix]. Countries were categorised as having a high level of data accessibility (Australia, Taiwan, and Japan), medium level of accessibility (South Korea), or a low level of accessibility (Thailand, China, Malaysia, and Singapore). In some countries, data may be available but

  16. TRANSNET -- access to radioactive and hazardous materials transportation codes and databases

    International Nuclear Information System (INIS)

    Cashwell, J.W.

    1992-01-01

    TRANSNET has been developed and maintained by Sandia National Laboratories under the sponsorship of the United States Department of Energy (DOE) Office of Environmental Restoration and Waste Management to permit outside access to computerized routing, risk and systems analysis models, and associated databases. The goal of the TRANSNET system is to enable transfer of transportation analytical methods and data to qualified users by permitting direct, timely access to the up-to-date versions of the codes and data. The TRANSNET facility comprises a dedicated computer with telephone ports on which these codes and databases are adapted, modified, and maintained. To permit the widest spectrum of outside users, TRANSNET is designed to minimize hardware and documentation requirements. The user is thus required to have an IBM-compatible personal computer, Hayes-compatible modem with communications software, and a telephone. Maintenance and operation of the TRANSNET facility are underwritten by the program sponsor(s) as are updates to the respective models and data, thus the only charges to the user of the system are telephone hookup charges. TRANSNET provides access to the most recent versions of the models and data developed by or for Sandia National Laboratories. Code modifications that have been made since the last published documentation are noted to the user on the introductory screens. User friendly interfaces have been developed for each of the codes and databases on TRANSNET. In addition, users are provided with default input data sets for typical problems which can either be used directly or edited. Direct transfers of analytical or data files between codes are provided to permit the user to perform complex analyses with a minimum of input. Recent developments to the TRANSNET system include use of the system to directly pass data files between both national and international users as well as development and integration of graphical depiction techniques

  17. Improving access to adequate pain management in Taiwan.

    Science.gov (United States)

    Scholten, Willem

    2015-06-01

    There is a global crisis in access to pain management in the world. WHO estimates that 4.65 billion people live in countries where medical opioid consumption is near to zero. For 2010, WHO considered a per capita consumption of 216.7 mg morphine equivalents adequate, while Taiwan had a per capita consumption of 0.05 mg morphine equivalents in 2007. In Asia, the use of opioids is sensitive because of the Opium Wars in the 19th century and for this reason, the focus of controlled substances policies has been on the prevention of diversion and dependence. However, an optimal public health outcome requires that also the beneficial aspects of these substances are acknowledged. Therefore, WHO recommends a policy based on the Principle of Balance: ensuring access for medical and scientific purposes while preventing diversion, harmful use and dependence. Furthermore, international law requires that countries ensure access to opioid analgesics for medical and scientific purposes. There is evidence that opioid analgesics for chronic pain are not associated with a major risk for developing dependence. Barriers for access can be classified in the categories of overly restrictive laws and regulations; insufficient medical training on pain management and problems related to assessment of medical needs; attitudes like an excessive fear for dependence or diversion; and economic and logistical problems. The GOPI project found many examples of such barriers in Asia. Access to opioid medicines in Taiwan can be improved by analysing the national situation and drafting a plan. The WHO policy guidelines Ensuring Balance in National Policies on Controlled Substances can be helpful for achieving this purpose, as well as international guidelines for pain treatment. Copyright © 2015. Published by Elsevier B.V.

  18. Access to care for patients with insulin-requiring diabetes in developing countries

    DEFF Research Database (Denmark)

    Beran, David; Yudkin, John S; de Courten, Maximilian

    2005-01-01

    The objective of this study was to assess the barriers to care for patients with insulin-requiring diabetes in Mozambique and Zambia.......The objective of this study was to assess the barriers to care for patients with insulin-requiring diabetes in Mozambique and Zambia....

  19. Developing a measure of patient access to primary care: the access response index (AROS).

    NARCIS (Netherlands)

    Elwyn, G.; Jones, W.; Rhydderch, S.M.; Edwards, P.

    2003-01-01

    Access to appointments in primary care is not routinely measured, and there is no one standardized method for doing so. Any measurement tool has to take account of the dynamic status of appointment availability and the definitional problems of appointment types. The aim of this study was to develop

  20. Theoretical Availability versus Practical Accessibility: The Critical Role of Metadata Management in Open Data Portals

    Directory of Open Access Journals (Sweden)

    Thomas Schauppenlehner

    2018-02-01

    Full Text Available As a consequence of policies such as the EU Public Sector Initiative, authorities across Europe have been moving towards providing free access to a wide range of statistical data and in particular geodata. From the diverse end-users’ perspective (general public, interest groups, students, other authorities, etc., access to data requires specific knowledge, methods, and guidance in identifying and using the relevant content. Metadata are a key concept for the description and classification of data and thus also for ensuring their long-term value. We analyze the European Data Portal as well as one national metadatabase (Austrian Data Portal with regard to aspects such as data search functionality, keyword consistency, spatial referencing, data format and data license information. In both cases, we found extensive inconsistencies and conceptual weaknesses that heavily limit the practical accessibility. The mere presence of metadata is no indicator for the usability of the data. We argue for a better definition and structuring of the interface between the numerous data providers and the metadatabases.

  1. Over-the-catheter precut to gain access to the biliary duct during ERCP rendezvous.

    Science.gov (United States)

    Manes, Gianpiero; Baratti, Cinzia; Ardizzone, Sandro; Ferla, Fabio; Spiropoulos, Jean; Corsi, Fabio; Foschi, Diego; Trabucchi, Emilio; Bianchi Porro, Gabriele

    2008-10-01

    Endoscopic retrograde cholangiopancreatography (ERCP) rendezvous during laparoscopic cholecystectomy is an efficient and safe method to treat cholecystocholedocholithiasis. Advancing a guidewire through the cystic duct into the duodenum and withdrawing it in the accessory channel of duodenoscope may be, however, laborious. Moreover, rendezvous performed in the typical manner needs the use of several costly accessories. We herein describe a simpler and cheaper method to gain access to the biliary duct at rendezvous. Twenty-four consecutive patients undergoing ERCP rendezvous during laparoscopic cholecystectomy were considered. A catheter was introduced in the cystic duct and advanced into the duodenum. Access to the bile duct was than achieved by means of a precut sphincterotomy performed over the catheter emerging from the papilla. Cannulation was successful in all but two patients, in whom ERCP was performed in the conventional manner. The only complication was a case of mild post-sphincterotomy bleeding. In comparison with the typical rendezvous technique our procedure allowed savings of about 250, since its performance only requires a catheter and a knife sphincterotome. Over-the-catheter precut during ERCP rendezvous is a feasible and safe method which avoids the need for the manipulation of several accessories and guidewires, and thus results in money and time savings.

  2. Accessing information in working memory: Can the focus of attention grasp two elements at the same time?

    NARCIS (Netherlands)

    Oberauer, K.; Bialkova, S.E.

    2009-01-01

    Processing information in working memory requires selective access to a subset of working-memory contents by a focus of attention. Complex cognition often requires joint access to 2 items in working memory. How does the focus select 2 items? Two experiments with an arithmetic task and 1 with a

  3. Considering User's Access Pattern in Multimedia File Systems

    Science.gov (United States)

    Cho, KyoungWoon; Ryu, YeonSeung; Won, Youjip; Koh, Kern

    2002-12-01

    Legacy buffer cache management schemes for multimedia server are grounded at the assumption that the application sequentially accesses the multimedia file. However, user access pattern may not be sequential in some circumstances, for example, in distance learning application, where the user may exploit the VCR-like function(rewind and play) of the system and accesses the particular segments of video repeatedly in the middle of sequential playback. Such a looping reference can cause a significant performance degradation of interval-based caching algorithms. And thus an appropriate buffer cache management scheme is required in order to deliver desirable performance even under the workload that exhibits looping reference behavior. We propose Adaptive Buffer cache Management(ABM) scheme which intelligently adapts to the file access characteristics. For each opened file, ABM applies either the LRU replacement or the interval-based caching depending on the Looping Reference Indicator, which indicates that how strong temporally localized access pattern is. According to our experiment, ABM exhibits better buffer cache miss ratio than interval-based caching or LRU, especially when the workload exhibits not only sequential but also looping reference property.

  4. Improving Nearest Neighbour Search in 3D Spatial Access Method

    DEFF Research Database (Denmark)

    Suhaibah, A.; Rahman, A. A.; Uznir, U.

    2016-01-01

    are still facing with unresolved issues such as overlapping among nodes and repetitive data entry. This situation will perform an excessive Input/Output (IO) operation which is inefficient for data retrieval. The situation will become more crucial while dealing with 3D data. The size of 3D data is usually...... and the accessed page. The proposed structure also produced minimal Input/Output operation. The query response time is also outperformed compared to the other competitor. For future outlook of this research several possible applications are discussed and summarized....

  5. Quantitative Nuclear Medicine Imaging: Concepts, Requirements and Methods

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2014-01-15

    The absolute quantification of radionuclide distribution has been a goal since the early days of nuclear medicine. Nevertheless, the apparent complexity and sometimes limited accuracy of these methods have prevented them from being widely used in important applications such as targeted radionuclide therapy or kinetic analysis. The intricacy of the effects degrading nuclear medicine images and the lack of availability of adequate methods to compensate for these effects have frequently been seen as insurmountable obstacles in the use of quantitative nuclear medicine in clinical institutions. In the last few decades, several research groups have consistently devoted their efforts to the filling of these gaps. As a result, many efficient methods are now available that make quantification a clinical reality, provided appropriate compensation tools are used. Despite these efforts, many clinical institutions still lack the knowledge and tools to adequately measure and estimate the accumulated activities in the human body, thereby using potentially outdated protocols and procedures. The purpose of the present publication is to review the current state of the art of image quantification and to provide medical physicists and other related professionals facing quantification tasks with a solid background of tools and methods. It describes and analyses the physical effects that degrade image quality and affect the accuracy of quantification, and describes methods to compensate for them in planar, single photon emission computed tomography (SPECT) and positron emission tomography (PET) images. The fast paced development of the computational infrastructure, both hardware and software, has made drastic changes in the ways image quantification is now performed. The measuring equipment has evolved from the simple blind probes to planar and three dimensional imaging, supported by SPECT, PET and hybrid equipment. Methods of iterative reconstruction have been developed to allow for

  6. Facilitators and barriers to accessing reproductive health care for migrant beer promoters in Cambodia, Laos, Thailand and Vietnam: a mixed methods study.

    Science.gov (United States)

    Webber, Gail; Spitzer, Denise; Somrongthong, Ratana; Dat, Truong Cong; Kounnavongsa, Somphone

    2012-07-02

    The purpose of the research was to assess access to sexual and reproductive health services for migrant women who work as beer promoters. This mixed methods research was conducted in Phnom Penh, Cambodia, Bangkok, Thailand, Vientiane, Laos, and Hanoi, Vietnam during 2010 to 2011. Focus groups were held with beer promoters and separate focus groups or interviews with key informants to explore the factors affecting beer promoters' access to health care institutions for reproductive health care. The findings of the focus groups were used to develop a survey for beer promoters. This survey was conducted in popular health institutions for these women in each of the four Asian cities. Several common themes were evident. Work demands prevented beer promoters from accessing health care. Institutional factors affecting care included cost, location, environmental factors (e.g. waiting times, cleanliness and confidentiality) and service factors (e.g. staff attitudes, clinic hours, and availability of medications). Personal factors affecting access were shyness and fear, lack of knowledge, and support from family and friends.The survey of the beer promoters confirmed that cost, location and both environmental and service factors impact on access to health care services for beer promoters. Many beer promoters are sexually active, and a significant proportion of those surveyed rely on sex work to supplement their income. Many also drink with their clients. Despite a few differences amongst the surveyed population, the findings were remarkably similar across the four research sites. Recommendations from the research include the provision of evening and weekend clinic hours to facilitate access, free or low cost clinics, and health insurance through employer or government plans which are easy to access for migrants. Other improvements that would facilitate the access of beer promoters to these services include increased funding to hire more staff (reducing waiting times) and to

  7. Hardware architecture design of a fast global motion estimation method

    Science.gov (United States)

    Liang, Chaobing; Sang, Hongshi; Shen, Xubang

    2015-12-01

    VLSI implementation of gradient-based global motion estimation (GME) faces two main challenges: irregular data access and high off-chip memory bandwidth requirement. We previously proposed a fast GME method that reduces computational complexity by choosing certain number of small patches containing corners and using them in a gradient-based framework. A hardware architecture is designed to implement this method and further reduce off-chip memory bandwidth requirement. On-chip memories are used to store coordinates of the corners and template patches, while the Gaussian pyramids of both the template and reference frame are stored in off-chip SDRAMs. By performing geometric transform only on the coordinates of the center pixel of a 3-by-3 patch in the template image, a 5-by-5 area containing the warped 3-by-3 patch in the reference image is extracted from the SDRAMs by burst read. Patched-based and burst mode data access helps to keep the off-chip memory bandwidth requirement at the minimum. Although patch size varies at different pyramid level, all patches are processed in term of 3x3 patches, so the utilization of the patch-processing circuit reaches 100%. FPGA implementation results show that the design utilizes 24,080 bits on-chip memory and for a sequence with resolution of 352x288 and frequency of 60Hz, the off-chip bandwidth requirement is only 3.96Mbyte/s, compared with 243.84Mbyte/s of the original gradient-based GME method. This design can be used in applications like video codec, video stabilization, and super-resolution, where real-time GME is a necessity and minimum memory bandwidth requirement is appreciated.

  8. Open Access UHPSFC/MS - an additional analytical resource for an academic mass spectrometry facility.

    Science.gov (United States)

    Herniman, Julie M; Langley, G John

    2016-08-15

    Many compounds submitted for analysis in Chemistry at the University of Southampton do not retain, elute or ionize using open access reversed-phase ultra-high-performance liquid chromatography/mass spectrometry (RP-UHPLC/MS) and require analysis via infusion. An ultra-high-performance supercritical fluid chromatography mass spectrometry approach was implemented to afford high-throughput analysis of these compounds with chromatographic separation. A UPC(2) -TQD MS system has been incorporated into the open access MS provision within Chemistry at the University of Southampton, using an ESCi source (electrospray and atmospheric pressure chemical ionization) and an atmospheric pressure photoionization (APPI) source. Access to instrumentation is enabled via a web-based interface (RemoteAnalyzer™). Compounds such as fluorosugars, fullerenes, phosphoramidites, porphyrins, and rotaxanes exhibiting properties incompatible with RP-UHPLC/MS have been analyzed using automated chromatography and mass spectrometry methods. The speedy return of data enables research in these areas to progress unhindered by sample type. The provision of an electronic web format enables easy incorporation of chromatograms and mass spectra into electronic files and reports. The implementation of UHPSFC/MS increases access to a wide range of chemistries incompatible with reversed-phase chromatography and polar solvents, enabling more than 90% of submitted samples to be analyzed using an open access approach. Further, chromatographic separation is provided where previously flow injection or infusion analyses were the only options. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  9. Display methods of electronic patient record screens: patient privacy concerns.

    Science.gov (United States)

    Niimi, Yukari; Ota, Katsumasa

    2013-01-01

    To provide adequate care, medical professionals have to collect not only medical information but also information that may be related to private aspects of the patient's life. With patients' increasing awareness of information privacy, healthcare providers have to pay attention to the patients' right of privacy. This study aimed to clarify the requirements of the display method of electronic patient record (EPR) screens in consideration of both patients' information privacy concerns and health professionals' information needs. For this purpose, semi-structured group interviews were conducted of 78 medical professionals. They pointed out that partial concealment of information to meet patients' requests for privacy could result in challenges in (1) safety in healthcare, (2) information sharing, (3) collaboration, (4) hospital management, and (5) communication. They believed that EPRs should (1) meet the requirements of the therapeutic process, (2) have restricted access, (3) provide convenient access to necessary information, and (4) facilitate interprofessional collaboration. This study provides direction for the development of display methods that balance the sharing of vital information and protection of patient privacy.

  10. A Green Media Access Method for IEEE 802.15.6 Wireless Body Area Network.

    Science.gov (United States)

    Jacob, Anil K; Jacob, Lillykutty

    2017-09-30

    It is of utmost importance to conserve battery energy to the maximum possible extent in WBAN nodes while collecting and transferring medical data. The IEEE 802.15.6 WBAN standard does not specify any method to conserve energy. This paper focuses on a method to conserve energy in IEEE 802.15.6 WBAN nodes when using CSMA/CA, while simultaneously restricting data delivery delay to the required value as specified in medical applications. The technique is to allow the nodes to sleep all the times except for receiving beacons and for transmitting data frames whenever a data frame enters an empty buffer. The energy consumed by the nodes and the average latency of data frame for periodical arrival of data are found out analytically. The analytical results are validated and also the proposed method is compared with other energy conserving schemes, using Castalia simulation studies. The proposed method shows superior performance in both device lifetime and latency of emergency medical data.

  11. Evaluation of internet access and utilization by medical students in Lahore, Pakistan

    Science.gov (United States)

    2011-01-01

    Background The internet is increasingly being used worldwide in imparting medical education and improving its delivery. It has become an important tool for healthcare professionals training but the data on its use by medical students in developing countries is lacking with no study on the subject from Pakistan. This study was, therefore, carried out with an aim to evaluate the pattern of internet access and utilization by medical students in Pakistan. Methods A structured pre-tested questionnaire was administered to a group of 750 medical students in clinical years studying at various public and private medical colleges in Lahore. The questions were related to patterns of internet access, purpose of use and self reported confidence in performing various internet related tasks, use of health related websites to supplement learning and the problems faced by students in using internet at the institution. Results A total of 532 medical students (70.9%) returned the questionnaire. The mean age of study participants was 21.04 years (SD 1.96 years). Majority of the respondents (84.0%) reported experience with internet use. About half of the students (42.1%) were using internet occasionally with 23.1%, 20.9% and 13.9% doing so frequently, regularly and rarely respectively. About two third of the students (61.0%) stated that they use internet for both academic and professional activities. Most of the participants preferred to use internet at home (70.5%). Self reported ability to search for required article from PubMed and PakMedinet was reported by only 34.0% of the entire sample. Students were moderately confident in performing various internet related tasks including downloading medical books from internet, searching internet for classification of diseases and downloading full text article. Health related websites were being accessed by 55.1% students to supplement their learning process. Lack of time, inadequate number of available computers and lack of support from

  12. Access to parks and physical activity: an eight country comparison

    DEFF Research Database (Denmark)

    Schipperijn, Jasper; Cerin, Ester; Adams, Marc A

    2017-01-01

    Abstract Several systematic reviews have reported mixed associations between access to parks and physical activity, and suggest that this is due to inconsistencies in the study methods or differences across countries. An international study using consistent methods is needed to investigate...... the association between access to parks and physical activity. The International Physical Activity and Environment Network (IPEN) Adult Study is a multi-country cross-sectional study using a common design and consistent methods Accelerometer, survey and Geographic Information Systems (GIS) data for 6......,181 participants from 12 cities in 8 countries (Belgium, Brazil, Czech Republic, Denmark, Mexico, New Zealand, UK, USA) were used to estimate the strength and shape of associations of 11 measures of park access (1 perceived and 10 GIS-based measures) with accelerometer-based moderate-to-vigorous physical activity...

  13. Adapting Building Design to Access by Individuals with Intellectual Disability

    Directory of Open Access Journals (Sweden)

    L Castell

    2012-11-01

    Full Text Available Over the last 15 years, since introductionof the Disability Discrimination Act (DDA(Commonwealth Government of Australia,1992, there has been much discussionabout the extent and nature of buildingaccess for the disabled, particularly inresponse to proposed revisions to theBuilding Code of Australia (BCA and theintroduction of a Premises Standardcovering building access. Much of theargument which contributed to the twoyear delay in submitting a final version ofthese documents for government approvalrelated to the extent of access provisionsand the burden of cost. The final versionsubmitted to government by the AustralianBuilding Codes Board (ABCB (notreleased publicly appears to still containinconsistencies between the DDA and theBCA in several areas such as wayfindingand egress.In the debate preceding submission of thefinal version there appears to have beenlittle reference to access requirements forindividuals with intellectual disability (ID.This may be due to a general lack ofresearch on the topic. Consequently, thispaper uses a combination of theknowledge gained from a limited numberof previous wayfinding studies, literaturedescribing general problems faced bythose with ID and the author’s personalexperience observing others with ID tocreate a list of probable difficulties andsuggested solutions. The paperconcludes with a discussion about theassociated cost implications and benefitsin providing the required access.

  14. Stakeholder perspectives of the future of accessible tourism in New Zealand

    Directory of Open Access Journals (Sweden)

    Brielle Gillovic

    2015-10-01

    Full Text Available Purpose – The purpose of this paper is to put forward the argument that New Zealand�s tourism industry generally fails to acknowledge the importance of the access market. Despite anecdotal evidence of the market's value and strong legislation, New Zealand�s access market arguably remains underserviced and misunderstood. The current research sought to explore social and business rationales to support a future for accessible tourism in New Zealand, from the perspectives of its key stakeholders. It sought to uncover contemporary issues in the tourism industry, to examine the capacity and context for which issues can be addressed and overcome, to achieve a future for accessible tourism in New Zealand. Design/methodology/approach – Under the interpretive paradigm, original, exploratory research was conducted. Semi-structured interviews were carried out with ten key New Zealand tourism industry stakeholders who agreed to participate in the research. Qualitative data were thematically analysed. The following five key themes inductively emerged from the data: "Accessibility as a human right: Developing a culture of accessibility"; "Accessible tourism: Good for business?"; "Bottom-up, market-led approach"; "Leadership from the top: Moving from apathy to action"; and "Meeting somewhere in the middle". The five themes correspond to themes evidenced in the wider literature and present propositions for the future development of accessible tourism in New Zealand. Findings – Findings revealed stakeholder opinions of an industry exemplifying minimal awareness and consideration for accessibility. Accessibility was perceived to be an issue of social change, requiring the achievement of a cultural shift where accessibility is envisioned as a cultural norm necessary for the future. Whilst top-down leadership and support were deemed pertinent, ownership and accountability were seen to be crucial at the lower, operational levels of the industry. A "meeting

  15. Broadband Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Broadband Access. Worldwide market for broadband access $30 Billion! Over 200 million broadband subscribers worldwide! Various Competing Broadband access. Digital Subscriber line; Wireless; Optical Fiber.

  16. Key issues of multiple access technique for LEO satellite communication systems

    Institute of Scientific and Technical Information of China (English)

    温萍萍; 顾学迈

    2004-01-01

    The large carrier frequency shift caused by the high-speed movement of satellite (Doppler effects) and the propagation delay on the up-down link are very critical issues in an LEO satellite communication system, which affects both the selection and the implementation of a suitable access method. A Doppler based multiple access technique is used here to control the flow and an MPRMA-HS protocol is proposed for the application in LEO satellite communication systems. The extended simulation trials prove that the proposed scheme seems to be a very promising access method.

  17. Growth rate correlates negatively with protein turnover in Arabidopsis accessions.

    Science.gov (United States)

    Ishihara, Hirofumi; Moraes, Thiago Alexandre; Pyl, Eva-Theresa; Schulze, Waltraud X; Obata, Toshihiro; Scheffel, André; Fernie, Alisdair R; Sulpice, Ronan; Stitt, Mark

    2017-08-01

    Previous studies with Arabidopsis accessions revealed that biomass correlates negatively to dusk starch content and total protein, and positively to the maximum activities of enzymes in photosynthesis. We hypothesized that large accessions have lower ribosome abundance and lower rates of protein synthesis, and that this is compensated by lower rates of protein degradation. This would increase growth efficiency and allow more investment in photosynthetic machinery. We analysed ribosome abundance and polysome loading in 19 accessions, modelled the rates of protein synthesis and compared them with the observed rate of growth. Large accessions contained less ribosomes than small accessions, due mainly to cytosolic ribosome abundance falling at night in large accessions. The modelled rates of protein synthesis resembled those required for growth in large accessions, but were up to 30% in excess in small accessions. We then employed 13 CO 2 pulse-chase labelling to measure the rates of protein synthesis and degradation in 13 accessions. Small accessions had a slightly higher rate of protein synthesis and much higher rates of protein degradation than large accessions. Protein turnover was negligible in large accessions but equivalent to up to 30% of synthesised protein day -1 in small accessions. We discuss to what extent the decrease in growth in small accessions can be quantitatively explained by known costs of protein turnover and what factors may lead to the altered diurnal dynamics and increase of ribosome abundance in small accessions, and propose that there is a trade-off between protein turnover and maximisation of growth rate. © 2017 The Authors The Plant Journal © 2017 John Wiley & Sons Ltd.

  18. File access prediction using neural networks.

    Science.gov (United States)

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.

  19. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  20. Widening energy access in Africa: Towards energy transition

    International Nuclear Information System (INIS)

    Sokona, Youba; Mulugetta, Yacob; Gujba, Haruna

    2012-01-01

    The discussion to widen access to modern energy services has been influential in shaping some of the discussions on energy at the international level. The practice of widening modern energy services access to the poor in Africa is complex, and exacerbated by the dual nature of the energy system across Sub-Saharan Africa where traditional and modern energy systems and practices co-exist. This presents major challenges for policy makers who have to contend with a fragmented energy system, which requires the mobilisation of an array of actors at cross-sectoral levels in order to develop effective institutions and implement innovative policy frameworks. This paper further argues that, the ‘energy access’ discussion needs to take place in the context of energy transitions, giving due consideration to the productive sector as an important vehicle for change. As the link between energy and development is context specific, each African country needs to chart its own energy transition pathway into the future, and there are ample lessons that they can draw from previous energy transitions. - Highlights: ► Lack of access to modern energy services in Africa is an impediment to socio-economic development. ► Widening modern energy services access to the poor in Africa is complex. ► A broader approach to address the ‘energy access’ discourse is required. ► Each African country needs to chart its own energy transition pathway. ► Both fossil and renewable energy systems would be needed for a transition to modern energy sources.