WorldWideScience

Sample records for method requires access

  1. Deaf mobile application accessibility requirements

    Science.gov (United States)

    Nathan, Shelena Soosay; Hussain, Azham; Hashim, Nor Laily

    2016-08-01

    Requirement for deaf mobile applications need to be analysed to ensure the disabilities need are instilled into the mobile applications developed for them. Universal design is understandable to comply every user needs, however specific disability is argued by the authors to have different need and requirements. These differences are among the reasons for these applications being developed to target for a specific group of people, however they are less usable and later abandoned. This study focuses on deriving requirements that are needed by the deaf in their mobile applications that are meant specifically for them. Studies on previous literature was conducted it can be concluded that graphic, text, multimedia and sign language interpreter are among mostly required features to be included in their mobile application to ensure the applications are usable for this community.

  2. Section 508 Electronic Information Accessibility Requirements for Software Development

    Science.gov (United States)

    Ellis, Rebecca

    2014-01-01

    Section 508 Subpart B 1194.21 outlines requirements for operating system and software development in order to create a product that is accessible to users with various disabilities. This portion of Section 508 contains a variety of standards to enable those using assistive technology and with visual, hearing, cognitive and motor difficulties to access all information provided in software. The focus on requirements was limited to the Microsoft Windows® operating system as it is the predominant operating system used at this center. Compliance with this portion of the requirements can be obtained by integrating the requirements into the software development cycle early and by remediating issues in legacy software if possible. There are certain circumstances with software that may arise necessitating an exemption from these requirements, such as design or engineering software using dynamically changing graphics or numbers to convey information. These exceptions can be discussed with the Section 508 Coordinator and another method of accommodation used.

  3. 12 CFR 404.14 - Requirements of request for access.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Requirements of request for access. 404.14 Section 404.14 Banks and Banking EXPORT-IMPORT BANK OF THE UNITED STATES INFORMATION DISCLOSURE Access to Records Under the Privacy Act of 1974 § 404.14 Requirements of request for access. (a) Form. Requests for...

  4. A novel asynchronous access method with binary interfaces

    Directory of Open Access Journals (Sweden)

    Torres-Solis Jorge

    2008-10-01

    Full Text Available Abstract Background Traditionally synchronous access strategies require users to comply with one or more time constraints in order to communicate intent with a binary human-machine interface (e.g., mechanical, gestural or neural switches. Asynchronous access methods are preferable, but have not been used with binary interfaces in the control of devices that require more than two commands to be successfully operated. Methods We present the mathematical development and evaluation of a novel asynchronous access method that may be used to translate sporadic activations of binary interfaces into distinct outcomes for the control of devices requiring an arbitrary number of commands to be controlled. With this method, users are required to activate their interfaces only when the device under control behaves erroneously. Then, a recursive algorithm, incorporating contextual assumptions relevant to all possible outcomes, is used to obtain an informed estimate of user intention. We evaluate this method by simulating a control task requiring a series of target commands to be tracked by a model user. Results When compared to a random selection, the proposed asynchronous access method offers a significant reduction in the number of interface activations required from the user. Conclusion This novel access method offers a variety of advantages over traditionally synchronous access strategies and may be adapted to a wide variety of contexts, with primary relevance to applications involving direct object manipulation.

  5. 78 FR 30226 - Accessibility Requirements for Internet Browsers

    Science.gov (United States)

    2013-05-22

    ... software, such as an Internet browser, that it provides. Among other things, this means that the functions... CG Docket No. 10-145; FCC 13-57] Accessibility Requirements for Internet Browsers AGENCY: Federal... Act requires Internet browsers built into mobile phones to be accessible to individuals who are blind...

  6. Research Investigation of Information Access Methods

    Science.gov (United States)

    Heinrichs, John H.; Sharkey, Thomas W.; Lim, Jeen-Su

    2006-01-01

    This study investigates the satisfaction of library users at Wayne State University who utilize alternative information access methods. The LibQUAL+[TM] desired and perceived that satisfaction ratings are used to determine the user's "superiority gap." By focusing limited library resources to address "superiority gap" issues identified by each…

  7. ANALYSIS OF MPC ACCESS REQUIREMENTS FOR ADDITION OF FILLER MATERIALS

    International Nuclear Information System (INIS)

    W. Wallin

    1996-01-01

    This analysis is prepared by the Mined Geologic Disposal System (MGDS) Waste Package Development Department (WPDD) in response to a request received via a QAP-3-12 Design Input Data Request (Ref. 5.1) from WAST Design (formerly MRSMPC Design). The request is to provide: Specific MPC access requirements for the addition of filler materials at the MGDS (i.e., location and size of access required). The objective of this analysis is to provide a response to the foregoing request. The purpose of this analysis is to provide a documented record of the basis for the response. The response is stated in Section 8 herein. The response is based upon requirements from an MGDS perspective

  8. Beyond ADA Accessibility Requirements: Meeting Seniors' Needs for Toilet Transfers.

    Science.gov (United States)

    Lee, Su Jin; Sanford, Jon; Calkins, Margaret; Melgen, Sarah; Endicott, Sarah; Phillips, Anjanette

    2018-04-01

    To identify the optimal spatial and dimensional requirements of grab bars that support independent and assisted transfers by older adults and their care providers. Although research has demonstrated that toilet grab bars based on the Americans with Disabilities Act (ADA) Accessibility Standards do not meet the needs of older adults, the specific dimensional requirements for alternative configurations are unknown. A two-phased study with older adults and care providers in residential facilities was conducted to determine the optimal requirements for grab bars. Seniors and caregivers in skilled nursing facilities performed transfers using a mock-up toilet. In Phase 1, participants evaluated three grab bar configurations to identify optimal characteristics for safety, ease of use, comfort, and helpfulness. These characteristics were then validated for using ability-matched samples in Phase 2. The optimal configuration derived in Phase 1 included fold-down grab bars on both sides of the toilet (14" from centerline [CL] of toilet, 32" above the floor, and extended a minimum of 6" in front of the toilet) with one side open and a sidewall 24" from CL of toilet on the other. Phase 2 feedback was significantly positive for independent and one-person transfers and somewhat lower, albeit still positive, for two-person transfers. The study provides substantial evidence that bilateral grab bars are significantly more effective than those that comply with current ADA Accessibility Standards. Findings provide specific spatial and dimensional attributes for grab bar configurations that would be most effective in senior facilities.

  9. Access Requirement Analysis of E-Governance Systems

    Science.gov (United States)

    Kim, Tai-Hoon

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  10. 50 CFR 660.316 - Open access fishery-observer requirements.

    Science.gov (United States)

    2010-10-01

    ... 50 Wildlife and Fisheries 9 2010-10-01 2010-10-01 false Open access fishery-observer requirements... West Coast Groundfish-Open Access Fisheries § 660.316 Open access fishery—observer requirements. (a...(s) access to, and the use of, the vessel's navigation equipment and personnel, on request, to...

  11. Requirements for Scalable Access Control and Security Management Architectures

    National Research Council Canada - National Science Library

    Keromytis, Angelos D; Smith, Jonathan M

    2005-01-01

    Maximizing local autonomy has led to a scalable Internet. Scalability and the capacity for distributed control have unfortunately not extended well to resource access control policies and mechanisms...

  12. PVD and gas production: consider local resource access requirements

    International Nuclear Information System (INIS)

    Delafosse, E.

    1993-01-01

    The history of the natural gas industry worldwide teaches us that its development has sprung mainly from two sources: favorable contingent conditions, such as in the United States, where the discovery of large gas fields coincided favorably with technological progress and the already existing city gas distribution networks, as also happened in Italy and France; and political prodding, as in the Eastern European countries, in Japan, and certain countries of Western Europe too. Today, while natural gas is winning over more and more consumers and the infrastructures now exist, the rise in consumption is being held back by supply-related constraints, and namely the problem of adjusting to the rise in gas prices in the United States, and the distancing of the resources from Europe. In this context, the development of new gas markets in the developing countries could contribute to the continuous growth of the world natural gas industry. The resources do exist, and the possibility of generating electricity with them opens the way to creating or developing this industry in some twenty developing countries, to begin with, and a greater number later. For these countries, this perspective is highly enticing, economically; but development is slow, partly due to the fact that the specific requirements of gas production projects are not satisfied. The contractual and tax structure governing their implementation does not reflect the fact that, in contrast to the petroleum industry, the producer does not have access to a true market, and he is in fact only one of the wheels in an integrated production mechanism bent specifically on putting electrical power on the market. It is easy to see the difficulties that arise from such a situation, since the indispensable steps in the process, performed successively by producer, transporter, and electric company, use two interfaces with fields of business that are in close bilateral dependency. This leads to upstream inefficiency in

  13. "Open Access" Requires Clarification: Medical Journal Publication Models Evolve.

    Science.gov (United States)

    Lubowitz, James H; Brand, Jefferson C; Rossi, Michael J; Provencher, Matthew T

    2017-03-01

    While Arthroscopy journal is a traditional subscription model journal, our companion journal Arthroscopy Techniques is "open access." We used to believe open access simply meant online and free of charge. However, while open-access journals are free to readers, in 2017 authors must make a greater sacrifice in the form of an article-processing charge (APC). Again, while this does not apply to Arthroscopy, the APC will apply to Arthroscopy Techniques. Copyright © 2016 Arthroscopy Association of North America. Published by Elsevier Inc. All rights reserved.

  14. A Method for Automated Planning of FTTH Access Network Infrastructures

    DEFF Research Database (Denmark)

    Riaz, Muhammad Tahir; Pedersen, Jens Myrup; Madsen, Ole Brun

    2005-01-01

    In this paper a method for automated planning of Fiber to the Home (FTTH) access networks is proposed. We introduced a systematic approach for planning access network infrastructure. The GIS data and a set of algorithms were employed to make the planning process more automatic. The method explains...... method. The method, however, does not fully automate the planning but make the planning process significantly fast. The results and discussion are presented and conclusion is given in the end....

  15. 47 CFR 76.978 - Leased access annual reporting requirement.

    Science.gov (United States)

    2010-10-01

    ... against the cable system with the Commission or a Federal district court regarding a commercial leased..., which provides the following information for the calendar year: (1) The number of commercial leased... commercial leased access channel. (3) The rates the cable system charges for full-time and part-time leased...

  16. A Method for Upper Bounding on Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Patel, A.; Pedersen, Jens Myrup

    2004-01-01

    This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management.......This paper presents a method for calculating an upper bound on network access speed growth and gives guidelines for further research experiments and simulations. The method is aimed at providing a basis for simulation of long term network development and resource management....

  17. An Extended Role Based Access Control Method for XML Documents

    Institute of Scientific and Technical Information of China (English)

    MENG Xiao-feng; LUO Dao-feng; OU Jian-bo

    2004-01-01

    As XML has been increasingly important as the Data-change format of Internet and Intranet, access-control-on-XML-properties rises as a new issue.Role-based access control (RBAC) is an access control method that has been widely used in Internet, Operation System and Relation Data Base these 10 years.Though RBAC is already relatively mature in the above fields, new problems occur when it is used in XML properties.This paper proposes an integrated model to resolve these problems, after the fully analysis on the features of XML and RBAC.

  18. Visual inspection requirements for high-reliability random-access memories

    International Nuclear Information System (INIS)

    Andrade, A.; McHenery, J.

    1981-09-01

    Visual inspection requirements are given for random-access memories for deep-space satellite electronics. The requirements, based primarily on Military Standard 883B, are illustrated in the order of their manufacturing operation to clarify and facilitate inspection procedures

  19. 49 CFR 399.207 - Truck and truck-tractor access requirements.

    Science.gov (United States)

    2010-10-01

    .... Exception. If air and electrical connections necessary to couple or uncouple a truck-tractor from a trailer... 49 Transportation 5 2010-10-01 2010-10-01 false Truck and truck-tractor access requirements. 399... Vehicles § 399.207 Truck and truck-tractor access requirements. (a) General rule. Any person entering or...

  20. SERVICE AVAILABILITY AND ACCESSIBILITY OF REQUIREMENTS USINGCLUSTERING IN CLOUD ENVIRONMENT

    OpenAIRE

    Thamilvaani Arvaree Alvar; Rodziah Atan

    2012-01-01

    Cloud computing is one contemporary technology in which the research community has recently embarked. Cloud computing faces many of the challenges and difficulties. Meeting the user needs is the important issue in any business environment. The need for quality services that satisfies both customers and service providers is very essential. Lacking of guarantees for the customer to fully satisfy with the retrieved services from the service provider for the requested requirements has been identi...

  1. A method to evaluate equitable accessibility : Combining ethical theories and accessibility-based approaches

    NARCIS (Netherlands)

    Lucas, K.; Van Wee, G.P.; Maat, C.

    2015-01-01

    In this paper, we present the case that traditional transport appraisal methods do not sufficiently capture the social dimensions of mobility and accessibility. However, understanding this is highly relevant for policymakers to understand the impacts of their transport decisions. These dimensions

  2. Kinds of access: Different methods for report reveal different kinds of metacognitive access

    DEFF Research Database (Denmark)

    Overgaard, Morten; Sandberg, Kristian

    2012-01-01

    that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesize that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about...

  3. GROUPING WEB ACCESS SEQUENCES uSING SEQUENCE ALIGNMENT METHOD

    OpenAIRE

    BHUPENDRA S CHORDIA; KRISHNAKANT P ADHIYA

    2011-01-01

    In web usage mining grouping of web access sequences can be used to determine the behavior or intent of a set of users. Grouping websessions is how to measure the similarity between web sessions. There are many shortcomings in traditional measurement methods. The taskof grouping web sessions based on similarity and consists of maximizing the intra-group similarity while minimizing the inter-groupsimilarity is done using sequence alignment method. This paper introduces a new method to group we...

  4. Comparison of RF spectrum prediction methods for dynamic spectrum access

    Science.gov (United States)

    Kovarskiy, Jacob A.; Martone, Anthony F.; Gallagher, Kyle A.; Sherbondy, Kelly D.; Narayanan, Ram M.

    2017-05-01

    Dynamic spectrum access (DSA) refers to the adaptive utilization of today's busy electromagnetic spectrum. Cognitive radio/radar technologies require DSA to intelligently transmit and receive information in changing environments. Predicting radio frequency (RF) activity reduces sensing time and energy consumption for identifying usable spectrum. Typical spectrum prediction methods involve modeling spectral statistics with Hidden Markov Models (HMM) or various neural network structures. HMMs describe the time-varying state probabilities of Markov processes as a dynamic Bayesian network. Neural Networks model biological brain neuron connections to perform a wide range of complex and often non-linear computations. This work compares HMM, Multilayer Perceptron (MLP), and Recurrent Neural Network (RNN) algorithms and their ability to perform RF channel state prediction. Monte Carlo simulations on both measured and simulated spectrum data evaluate the performance of these algorithms. Generalizing spectrum occupancy as an alternating renewal process allows Poisson random variables to generate simulated data while energy detection determines the occupancy state of measured RF spectrum data for testing. The results suggest that neural networks achieve better prediction accuracy and prove more adaptable to changing spectral statistics than HMMs given sufficient training data.

  5. IMPROVING NEAREST NEIGHBOUR SEARCH IN 3D SPATIAL ACCESS METHOD

    Directory of Open Access Journals (Sweden)

    A. Suhaibaha

    2016-10-01

    Full Text Available Nearest Neighbour (NN is one of the important queries and analyses for spatial application. In normal practice, spatial access method structure is used during the Nearest Neighbour query execution to retrieve information from the database. However, most of the spatial access method structures are still facing with unresolved issues such as overlapping among nodes and repetitive data entry. This situation will perform an excessive Input/Output (IO operation which is inefficient for data retrieval. The situation will become more crucial while dealing with 3D data. The size of 3D data is usually large due to its detail geometry and other attached information. In this research, a clustered 3D hierarchical structure is introduced as a 3D spatial access method structure. The structure is expected to improve the retrieval of Nearest Neighbour information for 3D objects. Several tests are performed in answering Single Nearest Neighbour search and k Nearest Neighbour (kNN search. The tests indicate that clustered hierarchical structure is efficient in handling Nearest Neighbour query compared to its competitor. From the results, clustered hierarchical structure reduced the repetitive data entry and the accessed page. The proposed structure also produced minimal Input/Output operation. The query response time is also outperformed compared to the other competitor. For future outlook of this research several possible applications are discussed and summarized.

  6. Method and apparatus for managing access to a memory

    Science.gov (United States)

    DeBenedictis, Erik

    2017-08-01

    A method and apparatus for managing access to a memory of a computing system. A controller transforms a plurality of operations that represent a computing job into an operational memory layout that reduces a size of a selected portion of the memory that needs to be accessed to perform the computing job. The controller stores the operational memory layout in a plurality of memory cells within the selected portion of the memory. The controller controls a sequence by which a processor in the computing system accesses the memory to perform the computing job using the operational memory layout. The operational memory layout reduces an amount of energy consumed by the processor to perform the computing job.

  7. Diffusion accessibility as a method for visualizing macromolecular surface geometry.

    Science.gov (United States)

    Tsai, Yingssu; Holton, Thomas; Yeates, Todd O

    2015-10-01

    Important three-dimensional spatial features such as depth and surface concavity can be difficult to convey clearly in the context of two-dimensional images. In the area of macromolecular visualization, the computer graphics technique of ray-tracing can be helpful, but further techniques for emphasizing surface concavity can give clearer perceptions of depth. The notion of diffusion accessibility is well-suited for emphasizing such features of macromolecular surfaces, but a method for calculating diffusion accessibility has not been made widely available. Here we make available a web-based platform that performs the necessary calculation by solving the Laplace equation for steady state diffusion, and produces scripts for visualization that emphasize surface depth by coloring according to diffusion accessibility. The URL is http://services.mbi.ucla.edu/DiffAcc/. © 2015 The Protein Society.

  8. 78 FR 31769 - Accessible Emergency Information; Apparatus Requirements for Emergency Information and Video...

    Science.gov (United States)

    2013-05-24

    ... and equipment and better access video programming.'' \\7\\ \\7\\ H.R. Rep. No. 111-563, 111th Cong., 2d... Video Accessibility Act of 2010 (``CVAA''), the Commission adopts rules requiring video programming distributors and video programming providers (including program owners) to make televised emergency information...

  9. Kinds of access: different methods for report reveal different kinds of metacognitive access

    Science.gov (United States)

    Overgaard, Morten; Sandberg, Kristian

    2012-01-01

    In experimental investigations of consciousness, participants are asked to reflect upon their own experiences by issuing reports about them in different ways. For this reason, a participant needs some access to the content of her own conscious experience in order to report. In such experiments, the reports typically consist of some variety of ratings of confidence or direct descriptions of one's own experiences. Whereas different methods of reporting are typically used interchangeably, recent experiments indicate that different results are obtained with different kinds of reporting. We argue that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesize that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about the classification process. PMID:22492747

  10. A Method for Upper Bounding Long Term Growth of Network Access Speed

    Directory of Open Access Journals (Sweden)

    Thomas Phillip Knudsen

    2006-06-01

    Full Text Available The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research presented.

  11. A Method for Upper Bounding Long Term Growth of Network Access Speed

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Pedersen, Jens Myrup; Madsen, Ole Brun

    2004-01-01

    The development in home Internet access speed has shown an exponential development with growth rates averaging 25% per year. For resource management in network provisioning it becomes an urgent question how long such growth can continue. This paper presents a method for calculating an upper bound...... to visual content driven growth, proceeding from datarate requirements for a full virtual environment. Scenarios and approaches for reducing datarate requirements are considered and discussed. The presented figures for an upper bound on network access speed are discussed and perspectives on further research...

  12. Access to finance from different finance provider types: Farmer knowledge of the requirements

    OpenAIRE

    Wulandari, Eliana; Meuwissen, Miranda P. M.; Karmana, Maman H.; Oude Lansink, Alfons G. J. M.

    2017-01-01

    Analysing farmer knowledge of the requirements of finance providers can provide valuable insights to policy makers about ways to improve farmers' access to finance. This study compares farmer knowledge of the requirements to obtain finance with the actual requirements set by different finance provider types, and investigates the relation between demographic and socioeconomic factors and farmer knowledge of finance requirements. We use a structured questionnaire to collect data from a sample o...

  13. Multi-views storage model and access methods of conversation history in converged IP messaging system

    Science.gov (United States)

    Lu, Meilian; Yang, Dong; Zhou, Xing

    2013-03-01

    Based on the analysis of the requirements of conversation history storage in CPM (Converged IP Messaging) system, a Multi-views storage model and access methods of conversation history are proposed. The storage model separates logical views from physical storage and divides the storage into system managed region and user managed region. It simultaneously supports conversation view, system pre-defined view and user-defined view of storage. The rationality and feasibility of multi-view presentation, the physical storage model and access methods are validated through the implemented prototype. It proves that, this proposal has good scalability, which will help to optimize the physical data storage structure and improve storage performance.

  14. Analytical resource assessment method for continuous (unconventional) oil and gas accumulations - The "ACCESS" Method

    Science.gov (United States)

    Crovelli, Robert A.; revised by Charpentier, Ronald R.

    2012-01-01

    The U.S. Geological Survey (USGS) periodically assesses petroleum resources of areas within the United States and the world. The purpose of this report is to explain the development of an analytic probabilistic method and spreadsheet software system called Analytic Cell-Based Continuous Energy Spreadsheet System (ACCESS). The ACCESS method is based upon mathematical equations derived from probability theory. The ACCESS spreadsheet can be used to calculate estimates of the undeveloped oil, gas, and NGL (natural gas liquids) resources in a continuous-type assessment unit. An assessment unit is a mappable volume of rock in a total petroleum system. In this report, the geologic assessment model is defined first, the analytic probabilistic method is described second, and the spreadsheet ACCESS is described third. In this revised version of Open-File Report 00-044 , the text has been updated to reflect modifications that were made to the ACCESS program. Two versions of the program are added as appendixes.

  15. 41 CFR 51-9.302 - Times, places and requirements for access requests.

    Science.gov (United States)

    2010-07-01

    ... 41 Public Contracts and Property Management 1 2010-07-01 2010-07-01 true Times, places and requirements for access requests. 51-9.302 Section 51-9.302 Public Contracts and Property Management Other... Director may require a notarized statement of identity. The Executive Director shall ensure that such times...

  16. Public Perception of Quality and Support for Required Access to Drinking Water in Schools and Parks.

    Science.gov (United States)

    Long, Michael W; Gortmaker, Steven L; Patel, Anisha I; Onufrak, Stephen J; Wilking, Cara L; Cradock, Angie L

    2018-01-01

    We assessed public support for required water access in schools and parks and perceived safety and taste of water in these settings to inform efforts to increase access to and consumption of tap water. Cross-sectional survey of the US public collected from August to November 2011. Random digit-dialed telephone survey. Participants (n = 1218) aged 17 and older from 1055 US counties in 46 states. Perceived safety and taste of water in schools and parks as well as support for required access to water in these settings. Survey-adjusted perceived safety and taste as well as support for required access were estimated. There was broad support for required access to water throughout the day in schools (96%) and parks (89%). Few participants believed water was unsafe in schools (10%) or parks (18%). This study provides evidence of public support for efforts to increase access to drinking water in schools and parks and documents overall high levels of perceived taste and safety of water provided in these settings.

  17. Nanotube structures, methods of making nanotube structures, and methods of accessing intracellular space

    Science.gov (United States)

    VanDersarl, Jules J.; Xu, Alexander M.; Melosh, Nicholas A.; Tayebi, Noureddine

    2016-02-23

    In accordance with the purpose(s) of the present disclosure, as embodied and broadly described herein, embodiments of the present disclosure, in one aspect, relate to methods of making a structure including nanotubes, a structure including nanotubes, methods of delivering a fluid to a cell, methods of removing a fluid to a cell, methods of accessing intracellular space, and the like.

  18. Evaluating Michigan's community hospital access: spatial methods for decision support

    Directory of Open Access Journals (Sweden)

    Varnakovida Pariwate

    2006-09-01

    Full Text Available Abstract Background Community hospital placement is dictated by a diverse set of geographical factors and historical contingency. In the summer of 2004, a multi-organizational committee headed by the State of Michigan's Department of Community Health approached the authors of this paper with questions about how spatial analyses might be employed to develop a revised community hospital approval procedure. Three objectives were set. First, the committee needed visualizations of both the spatial pattern of Michigan's population and its 139 community hospitals. Second, the committee required a clear, defensible assessment methodology to quantify access to existing hospitals statewide, taking into account factors such as distance to nearest hospital and road network density to estimate travel time. Third, the committee wanted to contrast the spatial distribution of existing community hospitals with a theoretical configuration that best met statewide demand. This paper presents our efforts to first describe the distribution of Michigan's current community hospital pattern and its people, and second, develop two models, access-based and demand-based, to identify areas with inadequate access to existing hospitals. Results Using the product from the access-based model and contiguity and population criteria, two areas were identified as being "under-served." The lower area, located north/northeast of Detroit, contained the greater total land area and population of the two areas. The upper area was centered north of Grand Rapids. A demand-based model was applied to evaluate the existing facility arrangement by allocating daily bed demand in each ZIP code to the closest facility. We found 1,887 beds per day were demanded by ZIP centroids more than 16.1 kilometers from the nearest existing hospital. This represented 12.7% of the average statewide daily bed demand. If a 32.3 kilometer radius was employed, unmet demand dropped to 160 beds per day (1

  19. 21 CFR 312.305 - Requirements for all expanded access uses.

    Science.gov (United States)

    2010-04-01

    ... options; (iii) The criteria for patient selection or, for an individual patient, a description of the... 21 Food and Drugs 5 2010-04-01 2010-04-01 false Requirements for all expanded access uses. 312.305 Section 312.305 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES...

  20. 22 CFR 226.53 - Retention and access requirements for records.

    Science.gov (United States)

    2010-04-01

    ... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Retention and access requirements for records. 226.53 Section 226.53 Foreign Relations AGENCY FOR INTERNATIONAL DEVELOPMENT ADMINISTRATION OF... date of submission of the final expenditure report or, for awards that are renewed quarterly or...

  1. 45 CFR 1157.42 - Retention and access requirements for records.

    Science.gov (United States)

    2010-10-01

    ... FOUNDATION ON THE ARTS AND THE HUMANITIES NATIONAL ENDOWMENT FOR THE ARTS UNIFORM ADMINISTRATIVE REQUIREMENTS... (c) of this section. (2) If any litigation, claim, negotiation, audit or other action involving the... to make audits, examinations, excerpts, and transcripts. (2) Expiration of right of access. The...

  2. 45 CFR 602.42 - Retention and access requirements for records.

    Science.gov (United States)

    2010-10-01

    ... FOUNDATION UNIFORM ADMINISTRATIVE REQUIREMENTS FOR GRANTS AND COOPERATIVE AGREEMENTS TO STATE AND LOCAL... (c) of this section. (2) If any litigation, claim, negotiation, audit or other action involving the... to make audits, examinations, excerpts, and transcripts. (2) Expiration of right of access. The...

  3. Modified network simulation model with token method of bus access

    Directory of Open Access Journals (Sweden)

    L.V. Stribulevich

    2013-08-01

    Full Text Available Purpose. To study the characteristics of the local network with the marker method of access to the bus its modified simulation model was developed. Methodology. Defining characteristics of the network is carried out on the developed simulation model, which is based on the state diagram-layer network station with the mechanism of processing priorities, both in steady state and in the performance of control procedures: the initiation of a logical ring, the entrance and exit of the station network with a logical ring. Findings. A simulation model, on the basis of which can be obtained the dependencies of the application the maximum waiting time in the queue for different classes of access, and the reaction time usable bandwidth on the data rate, the number of network stations, the generation rate applications, the number of frames transmitted per token holding time, frame length was developed. Originality. The technique of network simulation reflecting its work in the steady condition and during the control procedures, the mechanism of priority ranking and handling was proposed. Practical value. Defining network characteristics in the real-time systems on railway transport based on the developed simulation model.

  4. Access to finance from different finance provider types: Farmer knowledge of the requirements.

    Science.gov (United States)

    Wulandari, Eliana; Meuwissen, Miranda P M; Karmana, Maman H; Oude Lansink, Alfons G J M

    2017-01-01

    Analysing farmer knowledge of the requirements of finance providers can provide valuable insights to policy makers about ways to improve farmers' access to finance. This study compares farmer knowledge of the requirements to obtain finance with the actual requirements set by different finance provider types, and investigates the relation between demographic and socioeconomic factors and farmer knowledge of finance requirements. We use a structured questionnaire to collect data from a sample of finance providers and farmers in Java Island, Indonesia. We find that the most important requirements to acquire finance vary among different finance provider types. We also find that farmers generally have little knowledge of the requirements, which are important to each type of finance provider. Awareness campaigns are needed to increase farmer knowledge of the diversity of requirements among the finance provider types.

  5. Critical requirements of the SSTR method

    International Nuclear Information System (INIS)

    Gold, R.

    1975-08-01

    Discrepancies have been reported in absolute fission rate measurements observed with Solid State Tract Recorders (SSTR) and fission chambers which lie well outside experimental error. As a result of these comparisons, the reliability of the SSTR method has been seriously questioned, and the fission chamber method has been advanced for sole use in absolute fission rate determinations. In view of the absolute accuracy already reported and well documented for the SSTR method, this conclusion is both surprising and unfortunate. Two independent methods are highly desirable. Moreover, these two methods more than compliment one another, since certain in-core experiments may be amenable to either but not both techniques. Consequently, one cannot abandon the SSTR method without sacrificing crucial advantages. A critical reappraisal of certain aspects of the SSTR method is offered in the hope that the source of the current controversy can be uncovered and a long term beneficial agreement between these two methods can therefore be established. (WHK)

  6. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks

    Science.gov (United States)

    Zrelli, Saber; Okabe, Nobuo; Shinoda, Yoichi

    The wireless medium is a key technology for enabling ubiquitous and continuous network connectivity. It is becoming more and more important in our daily life especially with the increasing adoption of networking technologies in many fields such as medical care and transportation systems. Although most wireless technologies nowadays provide satisfying bandwidth and higher speeds, several of these technologies still lack improvements with regard to handoff performance. In this paper, we focus on wireless network technologies that rely on the Extensible Authentication Protocol for mutual authentication between the station and the access network. Such technologies include local area wireless networks (IEEE 802.11) as well as broadband wireless networks (IEEE 802.16). We present a new EAP authentication method based on a three party authentication scheme, namely Kerberos, that considerably shortens handoff delays. Compared to other methods, the proposed method has the advantage of not requiring any changes on the access points, making it readily deployable at reasonable costs.

  7. Delay generation methods with reduced memory requirements

    DEFF Research Database (Denmark)

    Tomov, Borislav Gueorguiev; Jensen, Jørgen Arendt

    2003-01-01

    Modern diagnostic ultrasound beamformers require delay information for each sample along the image lines. In order to avoid storing large amounts of focusing data, delay generation techniques have to be used. In connection with developing a compact beamformer architecture, recursive algorithms were......) For the best parametric approach, the gate count was 2095, the maximum operation speed was 131.9 MHz, the power consumption at 40 MHz was 10.6 mW, and it requires 4 12-bit words for each image line and channel. 2) For the piecewise-linear approximation, the corresponding numbers are 1125 gates, 184.9 MHz, 7...

  8. Blast casting requires fresh assessment of methods

    Energy Technology Data Exchange (ETDEWEB)

    Pilshaw, S.R.

    1987-08-01

    The article discusses the reasons why conventional blasting operations, mainly that of explosive products, drilling and initiation methods are inefficient, and suggests new methods and materials to overcome the problems of the conventional operations. The author suggests that the use of bulk ANFO for casting, instead of high energy and density explosives with high velocity detonation is more effective in producing heave action results. Similarly the drilling of smaller blast holes than is conventional allows better loading distribution of explosives in the rock mass. The author also suggests that casting would be more efficient if the shot rows were loaded differently to produce a variable burden blasting pattern.

  9. ASME section XI - design and access requirements for in-service inspection

    International Nuclear Information System (INIS)

    Davis, D.D.

    1982-01-01

    The Owner of a nuclear power plant has the regulatory commitment to perform Section XI in-service inspection throughout the service life of a plant. In anticipation of what will be needed to perform adequately the required examinations and tests, sub-article IWA-1500 of Section XI not only requires that sufficient access be provided to accommodate equipment and inspection personnel but also requires that other provisions be considered such as: component surface preparations, material selections, shielding, removal and storage of hardware, handling equipment, and provisions for repairs and replacements. It is, therefore, the owner's and the architect engineer's responsibility to ensure that proper design and access provisions are incorporated to enable the owner to meet his commitments. Since the architect engineer usually has the prime responsibility for the implementation of design criteria, the owner must ensure that these provisions be considered in each phase of design and construction. The benefits of this can result in shorter outages, more meaningful examinations and tests and less radiation exposure of inspection personnel. This paper will address in detail those topics that affect design and access provisions which need to be considered during the design and construction of a nuclear power plant. (author)

  10. Accessibility

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2017-01-01

    This contribution is timely as it addresses accessibility in regards system hardware and software aligned with introduction of the Twenty-First Century Communications and Video Accessibility Act (CVAA) and adjoined game industry waiver that comes into force January 2017. This is an act created...... by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...... platforms; and games software. However, the CVAA has no legal status in the EU. This text succinctly introduces and questions implications, impact, and wider adoption. By presenting the full CVAA and game industry waiver the text targets to motivate discussions and further publications on the subject...

  11. Quantitative methods in electroencephalography to access therapeutic response.

    Science.gov (United States)

    Diniz, Roseane Costa; Fontenele, Andrea Martins Melo; Carmo, Luiza Helena Araújo do; Ribeiro, Aurea Celeste da Costa; Sales, Fábio Henrique Silva; Monteiro, Sally Cristina Moutinho; Sousa, Ana Karoline Ferreira de Castro

    2016-07-01

    Pharmacometrics or Quantitative Pharmacology aims to quantitatively analyze the interaction between drugs and patients whose tripod: pharmacokinetics, pharmacodynamics and disease monitoring to identify variability in drug response. Being the subject of central interest in the training of pharmacists, this work was out with a view to promoting this idea on methods to access the therapeutic response of drugs with central action. This paper discusses quantitative methods (Fast Fourier Transform, Magnitude Square Coherence, Conditional Entropy, Generalised Linear semi-canonical Correlation Analysis, Statistical Parametric Network and Mutual Information Function) used to evaluate the EEG signals obtained after administration regimen of drugs, the main findings and their clinical relevance, pointing it as a contribution to construction of different pharmaceutical practice. Peter Anderer et. al in 2000 showed the effect of 20mg of buspirone in 20 healthy subjects after 1, 2, 4, 6 and 8h after oral ingestion of the drug. The areas of increased power of the theta frequency occurred mainly in the temporo-occipital - parietal region. It has been shown by Sampaio et al., 2007 that the use of bromazepam, which allows the release of GABA (gamma amino butyric acid), an inhibitory neurotransmitter of the central nervous system could theoretically promote dissociation of cortical functional areas, a decrease of functional connectivity, a decrease of cognitive functions by means of smaller coherence (electrophysiological magnitude measured from the EEG by software) values. Ahmad Khodayari-Rostamabad et al. in 2015 talk that such a measure could be a useful clinical tool potentially to assess adverse effects of opioids and hence give rise to treatment guidelines. There was the relation between changes in pain intensity and brain sources (at maximum activity locations) during remifentanil infusion despite its potent analgesic effect. The statement of mathematical and computational

  12. Metric-based method of software requirements correctness improvement

    Directory of Open Access Journals (Sweden)

    Yaremchuk Svitlana

    2017-01-01

    Full Text Available The work highlights the most important principles of software reliability management (SRM. The SRM concept construes a basis for developing a method of requirements correctness improvement. The method assumes that complicated requirements contain more actual and potential design faults/defects. The method applies a newer metric to evaluate the requirements complexity and double sorting technique evaluating the priority and complexity of a particular requirement. The method enables to improve requirements correctness due to identification of a higher number of defects with restricted resources. Practical application of the proposed method in the course of demands review assured a sensible technical and economic effect.

  13. Transport Accessibility In Light Of The DEA Method

    Directory of Open Access Journals (Sweden)

    Górniak Joanna

    2014-12-01

    Full Text Available The development of transport infrastructure and increasing the efficiency of transport services are major factors of economic growth. The concept of transport accessibility can be analysed in various aspects. This article focuses on the accessibility of freight transport by road and rail, measured with infrastructure equipment. The primary objective of this study is to determine the efficiency of selected European countries in 2000, 2005 and 2010 in terms of transport accessibility for given expenditures and results. The efficiency will be measured with the Data Envelopment Analysis, which assesses the efficiency with which a given economy transforms expenditures into results. The hypothesis assumes the existence of differences between the efficiency in terms of transport accessibility in European countries and a possibility to increase this efficiency by using the experience of countries with a high efficiency level.

  14. 32 CFR 37.920 - What requirement for access to a nonprofit participant's records do I include in a TIA?

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What requirement for access to a nonprofit participant's records do I include in a TIA? 37.920 Section 37.920 National Defense Department of Defense... What requirement for access to a nonprofit participant's records do I include in a TIA? Your TIA must...

  15. METHOD AND ABSTRACT MODEL FOR CONTROL AND ACCESS RIGHTS BY REQUESTS REDIRECTION

    Directory of Open Access Journals (Sweden)

    K. A. Shcheglov

    2015-11-01

    Full Text Available We have researched implementation problems of control and access rights of subjects to objects in modern computer systems. We have suggested access control method based on objects access requests redirection. The method possesses a distinctive feature as compared to discretional access control. In case when a subject needs to deny writing (object modification, it is not denied but redirected (access rights are not changed, but operation is performed with another object. This gives the possibility to implement access policies to system objects without breaking the system and applications operability, and share correctly access objects between subjects. This important property of suggested access control method enables to solve fundamentally new system objects securing problems like system resources virtualization aimed to protect system objects from users’ and applications attacks. We have created an abstract model, and it shows that this method (access control from subjects to objects based on requests redirection can be used as self-sufficient access control method, implementing any access control policy (from subjects to objects, thus being an alternative to discretional access control method.

  16. Guidelines on the facilities required for minor surgical procedures and minimal access interventions.

    LENUS (Irish Health Repository)

    Humphreys, H

    2012-02-01

    There have been many changes in healthcare provision in recent years, including the delivery of some surgical services in primary care or in day surgery centres, which were previously provided by acute hospitals. Developments in the fields of interventional radiology and cardiology have further expanded the range and complexity of procedures undertaken in these settings. In the face of these changes there is a need to define from an infection prevention and control perspective the basic physical requirements for facilities in which such surgical procedures may be carried out. Under the auspices of the Healthcare Infection Society, we have developed the following recommendations for those designing new facilities or upgrading existing facilities. These draw upon best practice, available evidence, other guidelines where appropriate, and expert consensus to provide sensible and feasible advice. An attempt is also made to define minimal access interventions and minor surgical procedures. For minimal access interventions, including interventional radiology, new facilities should be mechanically ventilated to achieve 15 air changes per hour but natural ventilation is satisfactory for minor procedures. All procedures should involve a checklist and operators should be appropriately trained. There is also a need for prospective surveillance to accurately determine the post-procedure infection rate. Finally, there is a requirement for appropriate applied research to develop the evidence base required to support subsequent iterations of this guidance.

  17. The Sources and Methods of Engineering Design Requirement

    DEFF Research Database (Denmark)

    Li, Xuemeng; Zhang, Zhinan; Ahmed-Kristensen, Saeema

    2014-01-01

    to be defined in a new context. This paper focuses on understanding the design requirement sources at the requirement elicitation phase. It aims at proposing an improved design requirement source classification considering emerging markets and presenting current methods for eliciting requirement for each source...

  18. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  19. A Survey of Various Object Oriented Requirement Engineering Methods

    OpenAIRE

    Anandi Mahajan; Dr. Anurag Dixit

    2013-01-01

    In current years many industries have been moving to the use of object-oriented methods for the development of large scale information systems The requirement of Object Oriented approach in the development of software systems is increasing day by day. This paper is basically a survey paper on various Object-oriented requirement engineering methods. This paper contains a summary of the available Object-oriented requirement engineering methods with their relative advantages and disadvantages...

  20. Use of the Paid Open Access Option in Hybrid Open Access Journals in Agriculture: A Mixed-Methods Study

    Directory of Open Access Journals (Sweden)

    Megan Kocher

    2016-12-01

    Full Text Available We explore the use and usefulness of the hybrid open access publishing model in agricultural sciences using a combination of quantitative and qualitative methods. To ascertain the level of usage of the paid open access option in hybrid open access journals in agriculture, we studied the agriculture-related journals published by six commercial publishers. These publishers offer authors the option of paying a fee, often close to $3,000 per article, to make their article immediately freely available, usually with a Creative Commons license. We defined agriculture broadly but also assigned each journal to a subspecialty (e.g., animal science in order to see if there were differences based on these subdivisions. For each journal we gathered data for 2014-2015 and noted the total number of research articles and the number of those that were made freely available by authors paying the open access fee. To give context to our results we also surveyed local faculty in agricultural sciences, asking their reasons for considering the paid open access options and the sources of the funds to pay for it. Survey respondents were asked about their academic position and rank to see if there were differences to be noted. We also investigated the findability of the open access articles, noting if each individual publisher offered a way to easily locate all the freely available articles in a particular journal and if there are other avenues to easily locate these articles.

  1. The Methods and Mechanisms for Access Control of Encrypted Data in Clouds

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2013-09-01

    Full Text Available The paper is about the problem of data access control in clouds. The main mechanisms for access control of encrypted data in untrusted cloud environments are analyzed and described. The comparative analysis of access control algorithms and implementation issues are offered. The main practical result of research is a web-based (Wikipedia-like reference and information system devoted to the access control methods and mechanisms.

  2. GIS-based accessibility analysis- a mixed method approach to determine public primary health care demand in South Africa

    CSIR Research Space (South Africa)

    Mokgalaka, H

    2013-11-01

    Full Text Available The spatial realities and dynamics of a changing population with changing health care needs require regular and logical methods to evaluate and assist in primary health care (PHC) planning. Geographical access is an important aspect in the planning...

  3. Toward Proper Authentication Methods in Electronic Medical Record Access Compliant to HIPAA and C.I.A. Triangle.

    Science.gov (United States)

    Tipton, Stephen J; Forkey, Sara; Choi, Young B

    2016-04-01

    This paper examines various methods encompassing the authentication of users in accessing Electronic Medical Records (EMRs). From a methodological perspective, multiple authentication methods have been researched from both a desktop and mobile accessibility perspective. Each method is investigated at a high level, along with comparative analyses, as well as real world examples. The projected outcome of this examination is a better understanding of the sophistication required in protecting the vital privacy constraints of an individual's Protected Health Information (PHI). In understanding the implications of protecting healthcare data in today's technological world, the scope of this paper is to grasp an overview of confidentiality as it pertains to information security. In addressing this topic, a high level overview of the three goals of information security are examined; in particular, the goal of confidentiality is the primary focus. Expanding upon the goal of confidentiality, healthcare accessibility legal aspects are considered, with a focus upon the Health Insurance Portability and Accountability Act of 1996 (HIPAA). With the primary focus of this examination being access to EMRs, the paper will consider two types of accessibility of concern: access from a physician, or group of physicians; and access from an individual patient.

  4. Basic requirements to the methods of personnel monitoring

    International Nuclear Information System (INIS)

    Keirim-Markus, I.B.

    1981-01-01

    Requirements to methods of personnel monitoring (PMM) depending on irradiation conditions are given. The irradiation conditions determine subjected to monitoring types of irradiation, measurement ranges, periodicity of monitoring, operativeness of obtaining results and required accuracy. The PMM based on the photographic effect of ionizing radiation is the main method of the mass monitoring [ru

  5. Improving Nearest Neighbour Search in 3D Spatial Access Method

    DEFF Research Database (Denmark)

    Suhaibah, A.; Rahman, A. A.; Uznir, U.

    2016-01-01

    are still facing with unresolved issues such as overlapping among nodes and repetitive data entry. This situation will perform an excessive Input/Output (IO) operation which is inefficient for data retrieval. The situation will become more crucial while dealing with 3D data. The size of 3D data is usually...... and the accessed page. The proposed structure also produced minimal Input/Output operation. The query response time is also outperformed compared to the other competitor. For future outlook of this research several possible applications are discussed and summarized....

  6. 14 CFR 382.69 - What requirements must carriers meet concerning the accessibility of videos, DVDs, and other...

    Science.gov (United States)

    2010-01-01

    ... concerning the accessibility of videos, DVDs, and other audio-visual presentations shown on-aircraft to individuals who are deaf or hard of hearing? 382.69 Section 382.69 Aeronautics and Space OFFICE OF THE... BASIS OF DISABILITY IN AIR TRAVEL Accessibility of Aircraft § 382.69 What requirements must carriers...

  7. Beyond Section 508: The Spectrum of Legal Requirements for Accessible e-Government Web Sites in the United States

    Science.gov (United States)

    Jaeger, Paul T.

    2004-01-01

    In the United States, a number of federal laws establish requirements that electronic government (e-government) information and services be accessible to individuals with disabilities. These laws affect e-government Web sites at the federal, state, and local levels. To this point, research about the accessibility of e-government Web sites has…

  8. 50 CFR 648.60 - Sea scallop area access program requirements.

    Science.gov (United States)

    2010-10-01

    ... subsequent fishing year. For example, a vessel that terminates an Elephant Trunk Access Area trip on December...) Elephant Trunk Access Area. For the 2010 fishing year, the observer set-aside for the Elephant Trunk Access... Area. For the 2010 fishing year, the research set-aside for the Elephant Trunk Access Area is 277,060...

  9. A New Key-lock Method for User Authentication and Access Control

    Institute of Scientific and Technical Information of China (English)

    JI Dongyao; ZHANG Futai; WANG Yumin

    2001-01-01

    We propose a new key-lock methodfor user authentication and access control based onChinese remainder theorem, the concepts of the ac-cess control matrix, key-lock-pair, time stamp, and the NS public key protocol. Our method is dynamicand needs a minimum amount of computation in thesense that it only updates at most one key/lock foreach access request. We also demonstrate how an au-thentication protocol can be integrated into the ac-cess control method. By applying a time stamp, themethod can not only withstand replay attack, butalso strengthen the authenticating mechanism, whichcould not be achieved simultaneously in previous key-lock methods.

  10. Model Based User's Access Requirement Analysis of E-Governance Systems

    Science.gov (United States)

    Saha, Shilpi; Jeon, Seung-Hwan; Robles, Rosslin John; Kim, Tai-Hoon; Bandyopadhyay, Samir Kumar

    The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify user's access requirement for the stakeholders and then according to the models of Nath's approach. Based on this analysis, the Govt. can also make standards of security based on the e-governance models. Thus there will be less human errors and bias. This analysis leads to the security architecture of the specific G2C application.

  11. An Engineering Method of Civil Jet Requirements Validation Based on Requirements Project Principle

    Science.gov (United States)

    Wang, Yue; Gao, Dan; Mao, Xuming

    2018-03-01

    A method of requirements validation is developed and defined to meet the needs of civil jet requirements validation in product development. Based on requirements project principle, this method will not affect the conventional design elements, and can effectively connect the requirements with design. It realizes the modern civil jet development concept, which is “requirement is the origin, design is the basis”. So far, the method has been successfully applied in civil jet aircraft development in China. Taking takeoff field length as an example, the validation process and the validation method of the requirements are detailed introduced in the study, with the hope of providing the experiences to other civil jet product design.

  12. Should gratitude be a requirement for access to live organ donation?

    Science.gov (United States)

    Escher, Monica; Lamuela-Naulin, Monique; Bollondi, Catherine; Flores Menendez, Paola; Hurst, Samia A

    2017-11-01

    Gratitude is both expected and problematic in live organ donation. Are there grounds to require it, and to forbid access to live donor transplantation to a recipient who fails to signal that he feels any form of gratitude? Recipient gratitude is not currently required for organ donation, but it is expected and may be a moral requirement. Despite this, we argue that making it a condition for live organ transplantation would be unjustified. It would constitute a problematic and disproportionate punishment for perceived immoral behaviour on the part of the recipient. It would also bar the donor from positive aspects of organ donation that remain even in the absence of recipient gratitude. A potential recipient's lack of gratitude should be explored as a possible symptom of other morally problematic issues and integrated into the information provided to the potential donor. Recognition of the donor's gift and gratitude for it may also need to be expressed in part by others. This last aspect is relevant even in cases where the recipient feels and expresses gratitude. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  13. How to Compare the Security Quality Requirements Engineering (SQUARE) Method with Other Methods

    National Research Council Canada - National Science Library

    Mead, Nancy R

    2007-01-01

    The Security Quality Requirements Engineering (SQUARE) method, developed at the Carnegie Mellon Software Engineering Institute, provides a systematic way to identify security requirements in a software development project...

  14. Resource allocation in shared spectrum access communications for operators with diverse service requirements

    Science.gov (United States)

    Kibria, Mirza Golam; Villardi, Gabriel Porto; Ishizu, Kentaro; Kojima, Fumihide; Yano, Hiroyuki

    2016-12-01

    In this paper, we study inter-operator spectrum sharing and intra-operator resource allocation in shared spectrum access communication systems and propose efficient dynamic solutions to address both inter-operator and intra-operator resource allocation optimization problems. For inter-operator spectrum sharing, we present two competent approaches, namely the subcarrier gain-based sharing and fragmentation-based sharing, which carry out fair and flexible allocation of the available shareable spectrum among the operators subject to certain well-defined sharing rules, traffic demands, and channel propagation characteristics. The subcarrier gain-based spectrum sharing scheme has been found to be more efficient in terms of achieved throughput. However, the fragmentation-based sharing is more attractive in terms of computational complexity. For intra-operator resource allocation, we consider resource allocation problem with users' dissimilar service requirements, where the operator supports users with delay constraint and non-delay constraint service requirements, simultaneously. This optimization problem is a mixed-integer non-linear programming problem and non-convex, which is computationally very expensive, and the complexity grows exponentially with the number of integer variables. We propose less-complex and efficient suboptimal solution based on formulating exact linearization, linear approximation, and convexification techniques for the non-linear and/or non-convex objective functions and constraints. Extensive simulation performance analysis has been carried out that validates the efficiency of the proposed solution.

  15. Accessing High Spatial Resolution in Astronomy Using Interference Methods

    Science.gov (United States)

    Carbonel, Cyril; Grasset, Sébastien; Maysonnave, Jean

    2018-01-01

    In astronomy, methods such as direct imaging or interferometry-based techniques (Michelson stellar interferometry for example) are used for observations. A particular advantage of interferometry is that it permits greater spatial resolution compared to direct imaging with a single telescope, which is limited by diffraction owing to the aperture of…

  16. A Method for Software Requirement Volatility Analysis Using QFD

    Directory of Open Access Journals (Sweden)

    Yunarso Anang

    2016-10-01

    Full Text Available Changes of software requirements are inevitable during the development life cycle. Rather than avoiding the circumstance, it is easier to just accept it and find a way to anticipate those changes. This paper proposes a method to analyze the volatility of requirement by using the Quality Function Deployment (QFD method and the introduced degree of volatility. Customer requirements are deployed to software functions and subsequently to architectural design elements. And then, after determining the potential for changes of the design elements, the degree of volatility of the software requirements is calculated. In this paper the method is described using a flow diagram and illustrated using a simple example, and is evaluated using a case study.

  17. Final Report: Advanced Methods for Accessing and Disseminating Nuclear Data, August 13, 1996 - March 15, 1999

    International Nuclear Information System (INIS)

    Stone, Craig A.

    1999-01-01

    Scientific Digital Visions, Inc. developed methods of accessing and dissemination nuclear data contained within the databases of the National Data Center (NNDC) at the Brookhaven National Laboratory supporting a long standing and important DOE Program to provide scientists access to NNDC Databases. The NNDC participated as a partner in this effort

  18. Quality functions for requirements engineering in system development methods.

    Science.gov (United States)

    Johansson, M; Timpka, T

    1996-01-01

    Based on a grounded theory framework, this paper analyses the quality characteristics for methods to be used for requirements engineering in the development of medical decision support systems (MDSS). The results from a Quality Function Deployment (QFD) used to rank functions connected to user value and a focus group study were presented to a validation focus group. The focus group studies take advantage of a group process to collect data for further analyses. The results describe factors considered by the participants as important in the development of methods for requirements engineering in health care. Based on the findings, the content which, according to the user a MDSS method should support is established.

  19. Accessing inoculation methods of maize and wheat with Azospirillum brasilense.

    Science.gov (United States)

    Fukami, Josiane; Nogueira, Marco Antonio; Araujo, Ricardo Silva; Hungria, Mariangela

    2016-03-01

    The utilization of inoculants containing Azospirillum is becoming more popular due to increasing reports of expressive gains in grain yields. However, incompatibility with pesticides used in seed treatments represents a main limitation for a successful inoculation. Therefore, in this study we searched for alternatives methods for seed inoculation of maize and wheat, aiming to avoid the direct contact of bacteria with pesticides. Different doses of inoculants containing Azospirillum brasilense were employed to perform inoculation in-furrow, via soil spray at sowing and via leaf spray after seedlings had emerged, in comparison to seed inoculation. Experiments were conducted first under greenhouse controlled conditions and then confirmed in the field at different locations in Brazil. In the greenhouse, most parameters measured responded positively to the largest inoculant dose used in foliar sprays, but benefits could also be observed from both in-furrow and soil spray inoculation. However, our results present evidence that field inoculation with plant-growth promoting bacteria must consider inoculant doses, and point to the need of fine adjustments to avoid crossing the threshold of growth stimulation and inhibition. All inoculation techniques increased the abundance of diazotrophic bacteria in plant tissues, and foliar spray improved colonization of leaves, while soil inoculations favored root and rhizosphere colonization. In field experiments, inoculation with A. brasilense allowed for a 25 % reduction in the need for N fertilizers. Our results have identified alternative methods of inoculation that were as effective as the standard seed inoculation that may represent an important strategy to avoid the incompatibility between inoculant bacteria and pesticides employed for seed treatment.

  20. Requirements and Challenges of Location-Based Access Control in Healthcare Emergency Response

    DEFF Research Database (Denmark)

    Vicente, Carmen Ruiz; Kirkpatrick, Michael; Ghinita, Gabriel

    2009-01-01

    Recent advances in positioning and tracking technologies have led to the emergence of novel location-based applications that allow participants to access information relevant to their spatio-temporal context. Traditional access control models, such as role-based access control (RBAC), are not suf...... to such settings. We overview the main technical issues to be addressed, and we describe the architecture for policy decision and enforcement points....

  1. Method for developing cost estimates for generic regulatory requirements

    International Nuclear Information System (INIS)

    1985-01-01

    The NRC has established a practice of performing regulatory analyses, reflecting costs as well as benefits, of proposed new or revised generic requirements. A method had been developed to assist the NRC in preparing the types of cost estimates required for this purpose and for assigning priorities in the resolution of generic safety issues. The cost of a generic requirement is defined as the net present value of total lifetime cost incurred by the public, industry, and government in implementing the requirement for all affected plants. The method described here is for commercial light-water-reactor power plants. Estimating the cost for a generic requirement involves several steps: (1) identifying the activities that must be carried out to fully implement the requirement, (2) defining the work packages associated with the major activities, (3) identifying the individual elements of cost for each work package, (4) estimating the magnitude of each cost element, (5) aggregating individual plant costs over the plant lifetime, and (6) aggregating all plant costs and generic costs to produce a total, national, present value of lifetime cost for the requirement. The method developed addresses all six steps. In this paper, we discuss on the first three

  2. Accessing High Spatial Resolution in Astronomy Using Interference Methods

    Science.gov (United States)

    Carbonel, Cyril; Grasset, Sébastien; Maysonnave, Jean

    2018-04-01

    In astronomy, methods such as direct imaging or interferometry-based techniques (Michelson stellar interferometry for example) are used for observations. A particular advantage of interferometry is that it permits greater spatial resolution compared to direct imaging with a single telescope, which is limited by diffraction owing to the aperture of the instrument as shown by Rueckner et al. in a lecture demonstration. The focus of this paper, addressed to teachers and/or students in high schools and universities, is to easily underline both an application of interferometry in astronomy and stress its interest for resolution. To this end very simple optical experiments are presented to explain all the concepts. We show how an interference pattern resulting from the combined signals of two telescopes allows us to measure the distance between two stars with a resolution beyond the diffraction limit. Finally this work emphasizes the breathtaking resolution obtained in state-of-the-art instruments such as the VLTi (Very Large Telescope interferometer).

  3. 78 FR 23684 - Personnel Access Authorization Requirements for Nuclear Power Plants

    Science.gov (United States)

    2013-04-22

    ... an employee's unescorted access at their facility. The petitioner seeks to ensure that such decisions... is solely responsible for making final unescorted access decisions, and to prescribe a clearly... #0;notices is to give interested persons an opportunity to participate in #0;the rule making prior to...

  4. Determination of material irradiation parameters. Required accuracies and available methods

    International Nuclear Information System (INIS)

    Cerles, J.M.; Mas, P.

    1978-01-01

    In this paper, the author reports some main methods to determine the nuclear parameters of material irradiation in testing reactor (nuclear power, burn-up, fluxes, fluences, ...). The different methods (theoretical or experimental) are reviewed: neutronics measurements and calculations, gamma scanning, thermal balance, ... The required accuracies are reviewed: they are of 3-5% on flux, fluences, nuclear power, burn-up, conversion factor, ... These required accuracies are compared with the real accuracies available which are at the present time of order of 5-20% on these parameters

  5. Rapid methods for jugular bleeding of dogs requiring one technician.

    Science.gov (United States)

    Frisk, C S; Richardson, M R

    1979-06-01

    Two methods were used to collect blood from the jugular vein of dogs. In both techniques, only one technician was required. A rope with a slip knot was placed around the base of the neck to assist in restraint and act as a tourniquet for the vein. The technician used one hand to restrain the dog by the muzzle and position the head. The other hand was used for collecting the sample. One of the methods could be accomplished with the dog in its cage. The bleeding techniques were rapid, requiring approximately 1 minute per dog.

  6. Determination of fuel irradiation parameters. Required accuracies and available methods

    International Nuclear Information System (INIS)

    Mas, P.

    1977-01-01

    This paper reports on the present point of some main methods to determine the nuclear parameters of fuel irradiation in testing reactors (nuclear power, burn up, ...) The different methods (theoretical or experimental) are reviewed: neutron measurements and calculations, gamma scanning, heat balance, ... . The required accuracies are reviewed: they are of 3-5 % on flux, fluences, nuclear power, burn-up, conversion factor. These required accuracies are compared with the real accuracies available which are the present time of order of 5-20 % on these parameters

  7. Classical Methods and Calculation Algorithms for Determining Lime Requirements

    Directory of Open Access Journals (Sweden)

    André Guarçoni

    Full Text Available ABSTRACT The methods developed for determination of lime requirements (LR are based on widely accepted principles. However, the formulas used for calculation have evolved little over recent decades, and in some cases there are indications of their inadequacy. The aim of this study was to compare the lime requirements calculated by three classic formulas and three algorithms, defining those most appropriate for supplying Ca and Mg to coffee plants and the smaller possibility of causing overliming. The database used contained 600 soil samples, which were collected in coffee plantings. The LR was estimated by the methods of base saturation, neutralization of Al3+, and elevation of Ca2+ and Mg2+ contents (two formulas and by the three calculation algorithms. Averages of the lime requirements were compared, determining the frequency distribution of the 600 lime requirements (LR estimated through each calculation method. In soils with low cation exchange capacity at pH 7, the base saturation method may fail to adequately supply the plants with Ca and Mg in many situations, while the method of Al3+ neutralization and elevation of Ca2+ and Mg2+ contents can result in the calculation of application rates that will increase the pH above the suitable range. Among the methods studied for calculating lime requirements, the algorithm that predicts reaching a defined base saturation, with adequate Ca and Mg supply and the maximum application rate limited to the H+Al value, proved to be the most efficient calculation method, and it can be recommended for use in numerous crops conditions.

  8. Women's access needs in maternity care in rural Tasmania, Australia: a mixed methods study.

    Science.gov (United States)

    Hoang, Ha; Le, Quynh; Terry, Daniel

    2014-03-01

    This study investigates (i) maternity care access issues in rural Tasmania, (ii) rural women's challenges in accessing maternity services and (iii) rural women's access needs in maternity services. A mixed-method approach using a survey and semi-structured interviews was conducted. The survey explored women's views of rural maternity services from antenatal to postnatal care, while interviews reinforced the survey results and provided insights into the access issues and needs of women in maternity care. The survey was completed by n=210 women, with a response rate of 35%, with n=22 follow-up interviews being conducted. The survey indicated the majority of rural women believed antenatal education and check-ups and postnatal check-ups should be provided locally. The majority of women surveyed also believed in the importance of having a maternity unit in the local hospital, which was further iterated and clarified within the interviews. Three main themes emerged from the interview data, namely (i) lack of access to maternity services, (ii) difficulties in accessing maternity services, and (iii) rural women's access needs. The study suggested that women's access needs are not fully met in some rural areas of Tasmania. Rural women face many challenges when accessing maternity services, including financial burden and risk of labouring en route. The study supports the claim that the closure of rural maternity units shifts cost and risk from the health care system to rural women and their families. Copyright © 2013 Australian College of Midwives. Published by Elsevier Ltd. All rights reserved.

  9. Methods for ensuring compliance with regulatory requirements: regulators and operators

    International Nuclear Information System (INIS)

    Fleischmann, A.W.

    1989-01-01

    Some of the methods of ensuring compliance with regulatory requirements contained in various radiation protection documents such as Regulations, ICRP Recommendations etc. are considered. These include radiation safety officers and radiation safety committees, personnel monitoring services, dissemination of information, inspection services and legislative power of enforcement. Difficulties in ensuring compliance include outmoded legislation, financial and personnel constraints

  10. Proposed New Method of Interpretation of Infrared Ship Signature Requirements

    NARCIS (Netherlands)

    Neele, F.P.; Wilson, M.T.; Youern, K.

    2005-01-01

    new method of deriving and defining requirements for the infrared signature of new ships is presented. The current approach is to specify the maximum allowed temperature or radiance contrast of the ship with respect to its background. At present, in most NATO countries, it is the contractor’s

  11. 48 CFR 3004.470 - Security requirements for access to unclassified facilities, Information Technology resources...

    Science.gov (United States)

    2010-10-01

    ... access to unclassified facilities, Information Technology resources, and sensitive information. 3004.470... Technology resources, and sensitive information. ... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive Information...

  12. Motivating and Facilitating Advancements in Space Weather Real-Time Data Availability: Factors, Data, and Access Methods

    Science.gov (United States)

    Pankratz, C. K.; Baker, D. N.; Jaynes, A. N.; Elkington, S. R.; Baltzer, T.; Sanchez, F.

    2017-12-01

    Society's growing reliance on complex and highly interconnected technological systems makes us increasingly vulnerable to the effects of space weather events - maybe more than for any other natural hazard. An extreme solar storm today could conceivably impact hundreds of the more than 1400 operating Earth satellites. Such an extreme storm could cause collapse of the electrical grid on continental scales. The effects on navigation, communication, and remote sensing of our home planet could be devastating to our social functioning. Thus, it is imperative that the scientific community address the question of just how severe events might become. At least as importantly, it is crucial that policy makers and public safety officials be informed by the facts on what might happen during extreme conditions. This requires essentially real-time alerts, warnings, and also forecasts of severe space weather events, which in turn demands measurements, models, and associated data products to be available via the most effective data discovery and access methods possible. Similarly, advancement in the fundamental scientific understanding of space weather processes is also vital, requiring that researchers have convenient and effective access to a wide variety of data sets and models from multiple sources. The space weather research community, as with many scientific communities, must access data from dispersed and often uncoordinated data repositories to acquire the data necessary for the analysis and modeling efforts that advance our understanding of solar influences and space physics on the Earth's environment. The Laboratory for Atmospheric and Space Physics (LASP), as a leading institution in both producing data products and advancing the state of scientific understanding of space weather processes, is well positioned to address many of these issues. In this presentation, we will outline the motivating factors for effective space weather data access, summarize the various data

  13. 45 CFR 310.40 - What requirements apply for accessing systems and records for monitoring Computerized Tribal IV-D...

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 2 2010-10-01 2010-10-01 false What requirements apply for accessing systems and records for monitoring Computerized Tribal IV-D Systems and Office Automation? 310.40 Section 310.40... COMPUTERIZED TRIBAL IV-D SYSTEMS AND OFFICE AUTOMATION Accountability and Monitoring Procedures for...

  14. An Extended Two-Phase Method for Accessing Sections of Out-of-Core Arrays

    Directory of Open Access Journals (Sweden)

    Rajeev Thakur

    1996-01-01

    Full Text Available A number of applications on parallel computers deal with very large data sets that cannot fit in main memory. In such applications, data must be stored in files on disks and fetched into memory during program execution. Parallel programs with large out-of-core arrays stored in files must read/write smaller sections of the arrays from/to files. In this article, we describe a method for accessing sections of out-of-core arrays efficiently. Our method, the extended two-phase method, uses collective l/O: Processors cooperate to combine several l/O requests into fewer larger granularity requests, to reorder requests so that the file is accessed in proper sequence, and to eliminate simultaneous l/O requests for the same data. In addition, the l/O workload is divided among processors dynamically, depending on the access requests. We present performance results obtained from two real out-of-core parallel applications – matrix multiplication and a Laplace's equation solver – and several synthetic access patterns, all on the Intel Touchstone Delta. These results indicate that the extended two-phase method significantly outperformed a direct (noncollective method for accessing out-of-core array sections.

  15. Neural Interfaces for Intracortical Recording: Requirements, Fabrication Methods, and Characteristics.

    Science.gov (United States)

    Szostak, Katarzyna M; Grand, Laszlo; Constandinou, Timothy G

    2017-01-01

    Implantable neural interfaces for central nervous system research have been designed with wire, polymer, or micromachining technologies over the past 70 years. Research on biocompatible materials, ideal probe shapes, and insertion methods has resulted in building more and more capable neural interfaces. Although the trend is promising, the long-term reliability of such devices has not yet met the required criteria for chronic human application. The performance of neural interfaces in chronic settings often degrades due to foreign body response to the implant that is initiated by the surgical procedure, and related to the probe structure, and material properties used in fabricating the neural interface. In this review, we identify the key requirements for neural interfaces for intracortical recording, describe the three different types of probes-microwire, micromachined, and polymer-based probes; their materials, fabrication methods, and discuss their characteristics and related challenges.

  16. Neural Interfaces for Intracortical Recording: Requirements, Fabrication Methods, and Characteristics

    Directory of Open Access Journals (Sweden)

    Katarzyna M. Szostak

    2017-12-01

    Full Text Available Implantable neural interfaces for central nervous system research have been designed with wire, polymer, or micromachining technologies over the past 70 years. Research on biocompatible materials, ideal probe shapes, and insertion methods has resulted in building more and more capable neural interfaces. Although the trend is promising, the long-term reliability of such devices has not yet met the required criteria for chronic human application. The performance of neural interfaces in chronic settings often degrades due to foreign body response to the implant that is initiated by the surgical procedure, and related to the probe structure, and material properties used in fabricating the neural interface. In this review, we identify the key requirements for neural interfaces for intracortical recording, describe the three different types of probes—microwire, micromachined, and polymer-based probes; their materials, fabrication methods, and discuss their characteristics and related challenges.

  17. Estimation methods of eco-environmental water requirements: Case study

    Institute of Scientific and Technical Information of China (English)

    YANG Zhifeng; CUI Baoshan; LIU Jingling

    2005-01-01

    Supplying water to the ecological environment with certain quantity and quality is significant for the protection of diversity and the realization of sustainable development. The conception and connotation of eco-environmental water requirements, including the definition of the conception, the composition and characteristics of eco-environmental water requirements, are evaluated in this paper. The classification and estimation methods of eco-environmental water requirements are then proposed. On the basis of the study on the Huang-Huai-Hai Area, the present water use, the minimum and suitable water requirement are estimated and the corresponding water shortage is also calculated. According to the interrelated programs, the eco-environmental water requirements in the coming years (2010, 2030, 2050) are estimated. The result indicates that the minimum and suitable eco-environmental water requirements fluctuate with the differences of function setting and the referential standard of water resources, and so as the water shortage. Moreover, the study indicates that the minimum eco-environmental water requirement of the study area ranges from 2.84×1010m3 to 1.02×1011m3, the suitable water requirement ranges from 6.45×1010m3 to 1.78×1011m3, the water shortage ranges from 9.1×109m3 to 2.16×1010m3 under the minimum water requirement, and it is from 3.07×1010m3 to 7.53×1010m3 under the suitable water requirement. According to the different values of the water shortage, the water priority can be allocated. The ranges of the eco-environmental water requirements in the three coming years (2010, 2030, 2050) are 4.49×1010m3-1.73×1011m3, 5.99×10m3?2.09×1011m3, and 7.44×1010m3-2.52×1011m3, respectively.

  18. Quantitative methods for developing C2 system requirement

    Energy Technology Data Exchange (ETDEWEB)

    Tyler, K.K.

    1992-06-01

    The US Army established the Army Tactical Command and Control System (ATCCS) Experimentation Site (AES) to provide a place where material and combat developers could experiment with command and control systems. The AES conducts fundamental and applied research involving command and control issues using a number of research methods, ranging from large force-level experiments, to controlled laboratory experiments, to studies and analyses. The work summarized in this paper was done by Pacific Northwest Laboratory under task order from the Army Tactical Command and Control System Experimentation Site. The purpose of the task was to develop the functional requirements for army engineer automation and support software, including MCS-ENG. A client, such as an army engineer, has certain needs and requirements of his or her software; these needs must be presented in ways that are readily understandable to the software developer. A requirements analysis then, such as the one described in this paper, is simply the means of communication between those who would use a piece of software and those who would develop it. The analysis from which this paper was derived attempted to bridge the communications gap'' between army combat engineers and software engineers. It sought to derive and state the software needs of army engineers in ways that are meaningful to software engineers. In doing this, it followed a natural sequence of investigation: (1) what does an army engineer do, (2) with which tasks can software help, (3) how much will it cost, and (4) where is the highest payoff This paper demonstrates how each of these questions was addressed during an analysis of the functional requirements of engineer support software. Systems engineering methods are used in a task analysis and a quantitative scoring method was developed to score responses regarding the feasibility of task automation. The paper discusses the methods used to perform utility and cost-benefits estimates.

  19. Quantitative methods for developing C2 system requirement

    Energy Technology Data Exchange (ETDEWEB)

    Tyler, K.K.

    1992-06-01

    The US Army established the Army Tactical Command and Control System (ATCCS) Experimentation Site (AES) to provide a place where material and combat developers could experiment with command and control systems. The AES conducts fundamental and applied research involving command and control issues using a number of research methods, ranging from large force-level experiments, to controlled laboratory experiments, to studies and analyses. The work summarized in this paper was done by Pacific Northwest Laboratory under task order from the Army Tactical Command and Control System Experimentation Site. The purpose of the task was to develop the functional requirements for army engineer automation and support software, including MCS-ENG. A client, such as an army engineer, has certain needs and requirements of his or her software; these needs must be presented in ways that are readily understandable to the software developer. A requirements analysis then, such as the one described in this paper, is simply the means of communication between those who would use a piece of software and those who would develop it. The analysis from which this paper was derived attempted to bridge the ``communications gap`` between army combat engineers and software engineers. It sought to derive and state the software needs of army engineers in ways that are meaningful to software engineers. In doing this, it followed a natural sequence of investigation: (1) what does an army engineer do, (2) with which tasks can software help, (3) how much will it cost, and (4) where is the highest payoff? This paper demonstrates how each of these questions was addressed during an analysis of the functional requirements of engineer support software. Systems engineering methods are used in a task analysis and a quantitative scoring method was developed to score responses regarding the feasibility of task automation. The paper discusses the methods used to perform utility and cost-benefits estimates.

  20. 45 CFR 1183.42 - Retention and access requirements for records.

    Science.gov (United States)

    2010-10-01

    ... FOUNDATION ON THE ARTS AND THE HUMANITIES INSTITUTE OF MUSEUM AND LIBRARY SERVICES UNIFORM ADMINISTRATIVE... (c) of this section. (2) If any litigation, claim, negotiation, audit or other action involving the... to make audits, examinations, excerpts, and transcripts. (2) Expiration of right of access. The...

  1. 45 CFR 1174.42 - Retention and access requirements for records.

    Science.gov (United States)

    2010-10-01

    ... FOUNDATION ON THE ARTS AND THE HUMANITIES NATIONAL ENDOWMENT FOR THE HUMANITIES UNIFORM ADMINISTRATIVE... (c) of this section. (2) If any litigation, claim, negotiation, audit or other action involving the... to make audits, examinations, excerpts, and transcripts. (2) Expiration of right of access. The...

  2. 77 FR 70970 - Accessible Emergency Information, and Apparatus Requirements for Emergency Information and Video...

    Science.gov (United States)

    2012-11-28

    ... and better access video programming.'' H.R. Rep. No. 111-563, 111th Cong., 2d Sess. at 19 (2010... distributors, providers, and owners of television video programming, as well as the manufacturers of devices that display such programming. DATES: Comments are due on or before December 18, 2012; reply comments...

  3. Guided endodontics: accuracy of a novel method for guided access cavity preparation and root canal location.

    Science.gov (United States)

    Zehnder, M S; Connert, T; Weiger, R; Krastl, G; Kühl, S

    2016-10-01

    To present a novel method utilizing 3D printed templates to gain guided access to root canals and to evaluate its accuracy in vitro. Sixty extracted human teeth were placed into six maxillary jaw models. Preoperative CBCT scans were matched with intra-oral scans using the coDiagnostix(™) software. Access cavities, sleeves and templates for guidance were virtually planned. Templates were produced by a 3D printer. After access cavity preparation by two operators, a postoperative CBCT scan was superimposed on the virtual planning. Accuracy was measured by calculating the deviation of planned and prepared cavities in three dimensions and angle. Ninety-five per cent confidence intervals were calculated for both operators. All root canals were accessible after cavity preparation with 'Guided Endodontics'. Deviations of planned and prepared access cavities were low with means ranging from 0.16 to 0.21 mm for different aspects at the base of the bur and 0.17-0.47 mm at the tip of the bur. Mean of angle deviation was 1.81°. Overlapping 95% confidence intervals revealed no significant difference between operators. 'Guided Endodontics' allowed an accurate access cavity preparation up to the apical third of the root utilizing printed templates for guidance. All root canals were accessible after preparation. © 2015 International Endodontic Journal. Published by John Wiley & Sons Ltd.

  4. Formalization of the Access Control on ARM-Android Platform with the B Method

    Science.gov (United States)

    Ren, Lu; Wang, Wei; Zhu, Xiaodong; Man, Yujia; Yin, Qing

    2018-01-01

    ARM-Android is a widespread mobile platform with multi-layer access control mechanisms, security-critical in the system. Many access control vulnerabilities still exist due to the course-grained policy and numerous engineering defects, which have been widely studied. However, few researches focus on the mechanism formalization, including the Android permission framework, kernel process management and hardware isolation. This paper first develops a comprehensive formal access control model on the ARM-Android platform using the B method, from the Android middleware to hardware layer. All the model specifications are type checked and proved to be well-defined, with 75%of proof obligations demonstrated automatically. The results show that the proposed B model is feasible to specify and verify access control schemes in the ARM-Android system, and capable of implementing a practical control module.

  5. Stem cell research funding policies and dynamic innovation: a survey of open access and commercialization requirements.

    Science.gov (United States)

    Lévesque, Maroussia; Kim, Jihyun Rosel; Isasi, Rosario; Knoppers, Bartha Maria; Plomer, Aurora; Joly, Yann

    2014-08-01

    This article compares and contrasts the pressures of both open access data sharing and commercialization policies in the context of publicly funded embryonic stem cell research (SCR). First, normative guidelines of international SCR organizations were examined. We then examined SCR funding guidelines and the project evaluation criteria of major funding organizations in the EU, the United Kingdom (UK), Spain, Canada and the United States. Our survey of policies revealed subtle pressures to commercialize research that include: increased funding availability for commercialization opportunities, assistance for obtaining intellectual property rights (IPRs) and legislation mandating commercialization. In lieu of open access models, funders are increasingly opting for limited sharing models or "protected commons" models that make the research available to researchers within the same region or those receiving the same funding. Meanwhile, there still is need for funding agencies to clarify and standardize terms such as "non-profit organizations" and "for-profit research," as more universities are pursuing for-profit or commercial opportunities.

  6. The U.S. Culture Collection Network Responding to the Requirements of the Nagoya Protocol on Access and Benefit Sharing

    Directory of Open Access Journals (Sweden)

    Kevin McCluskey

    2017-08-01

    Full Text Available The U.S. Culture Collection Network held a meeting to share information about how culture collections are responding to the requirements of the recently enacted Nagoya Protocol on Access to Genetic Resources and the Fair and Equitable Sharing of Benefits Arising from their Utilization to the Convention on Biological Diversity (CBD. The meeting included representatives of many culture collections and other biological collections, the U.S. Department of State, U.S. Department of Agriculture, Secretariat of the CBD, interested scientific societies, and collection groups, including Scientific Collections International and the Global Genome Biodiversity Network. The participants learned about the policies of the United States and other countries regarding access to genetic resources, the definition of genetic resources, and the status of historical materials and genetic sequence information. Key topics included what constitutes access and how the CBD Access and Benefit-Sharing Clearing-House can help guide researchers through the process of obtaining Prior Informed Consent on Mutually Agreed Terms. U.S. scientists and their international collaborators are required to follow the regulations of other countries when working with microbes originally isolated outside the United States, and the local regulations required by the Nagoya Protocol vary by the country of origin of the genetic resource. Managers of diverse living collections in the United States described their holdings and their efforts to provide access to genetic resources. This meeting laid the foundation for cooperation in establishing a set of standard operating procedures for U.S. and international culture collections in response to the Nagoya Protocol.

  7. Fire Source Accessibility of Water Mist Fire Suppression Improvement through Flow Method Control

    Energy Technology Data Exchange (ETDEWEB)

    Jung, Jun Ho; Kim, Hyeong Taek; Kim, Yun Jung; Park, Mun Hee [KHNP CRI, Daejeon (Korea, Republic of)

    2013-10-15

    Recently, nuclear power plants set CO{sub 2} fire suppression system. However it is hard to establish and to maintain and it also has difficulties performing function test. Therefore, it needs to develop a new fire suppression system to replace the existing CO{sub 2} fire suppression systems in nuclear power plant. In fact, already, there exist alternatives - gas fire suppression system or clean fire extinguishing agent, but it is hard to apply because it requires a highly complicated plan. However, water mist fire suppression system which has both water system and gas system uses small amount of water and droplet, so it is excellent at oxygen displacement and more suitable for nuclear power plant because it can avoid second damage caused by fire fighting water. This paper explains about enclosure effect of water mist fire suppression. And it suggests a study direction about water mist fire source approach improvement and enclosure effect improvement, using flow method control of ventilation system. Water mist fire suppression can be influenced by various variable. And flow and direction of ventilation system are important variable. Expectations of the plan for more fire source ventilation system is as in the following. It enhances enclosure effects of water mists, so it improves extinguish performance. Also the same effect as a inert gas injection causes can be achieved. Lastly, it is considered that combustible accessibility of water mists will increase because of descending air currents.

  8. Effective teaching methods in higher education: requirements and barriers

    Directory of Open Access Journals (Sweden)

    NAHID SHIRANI BIDABADI

    2016-10-01

    Full Text Available Introduction: Teaching is one of the main components in educational planning which is a key factor in conducting educational plans. Despite the importance of good teaching, the outcomes are far from ideal. The present qualitative study aimed to investigate effective teaching in higher education in Iran based on the experiences of best professors in the country and the best local professors of Isfahan University of Technology. Methods: This qualitative content analysis study was conducted through purposeful sampling. Semi-structured interviews were conducted with ten faculty members (3 of them from the best professors in the country and 7 from the best local professors. Content analysis was performed by MAXQDA software. The codes, categories and themes were explored through an inductive process that began from semantic units or direct quotations to general themes. Results: According to the results of this study, the best teaching approach is the mixed method (student-centered together with teacher-centered plus educational planning and previous readiness. But whenever the teachers can teach using this method confront with some barriers and requirements; some of these requirements are prerequisite in professors’ behavior and some of these are prerequisite in professors’ outlook. Also, there are some major barriers, some of which are associated with the professors’ operation and others are related to laws and regulations. Implications of these findings for teachers’ preparation in education are discussed. Conclusion: In the present study, it was illustrated that a good teaching method helps the students to question their preconceptions, and motivates them to learn, by putting them in a situation in which they come to see themselves as the authors of answers, as the agents of responsibility for change. But training through this method has some barriers and requirements. To have an effective teaching; the faculty members of the universities

  9. Mapping Norway - a Method to Register and Survey the Status of Accessibility

    Science.gov (United States)

    Michaelis, Sven; Bögelsack, Kathrin

    2018-05-01

    The Norwegian mapping authority has developed a standard method for mapping accessibility mostly for people with limited or no walking abilities in urban and recreational areas. We choose an object-orientated approach where points, lines and polygons represents objects in the environment. All data are stored in a geospatial database, so they can be presented as web map and analyzed using GIS software. By the end of 2016 more than 160 municipalities are mapped using that method. The aim of this project is to establish a national standard for mapping and to provide a geodatabase that shows the status of accessibility throughout Norway. The data provide a useful tool for national statistics, local planning authorities and private users. First results show that accessibility is low and Norway still faces many challenges to meet the government's goals for Universal Design.

  10. Air Force Officer Accession Planning: Addressing Key Gaps in Meeting Career Field Academic Degree Requirements for Nonrated Officers

    Science.gov (United States)

    2016-06-09

    C O R P O R A T I O N Research Report Air Force Officer Accession Planning Addressing Key Gaps in Meeting Career Field Academic Degree Requirements...potential performance, and how to include these quality measures in the classification process. The research sponsor asked us to focus on academic ...Andrew P., and James K. Lowe, “Decision Support for the Career Field Selection Process at the US Air Force Academy,” European Journal of Operational

  11. Effective Teaching Methods in Higher Education: Requirements and Barriers.

    Science.gov (United States)

    Shirani Bidabadi, Nahid; Nasr Isfahani, Ahmmadreza; Rouhollahi, Amir; Khalili, Roya

    2016-10-01

    Teaching is one of the main components in educational planning which is a key factor in conducting educational plans. Despite the importance of good teaching, the outcomes are far from ideal. The present qualitative study aimed to investigate effective teaching in higher education in Iran based on the experiences of best professors in the country and the best local professors of Isfahan University of Technology. This qualitative content analysis study was conducted through purposeful sampling. Semi-structured interviews were conducted with ten faculty members (3 of them from the best professors in the country and 7 from the best local professors). Content analysis was performed by MAXQDA software. The codes, categories and themes were explored through an inductive process that began from semantic units or direct quotations to general themes. According to the results of this study, the best teaching approach is the mixed method (student-centered together with teacher-centered) plus educational planning and previous readiness. But whenever the teachers can teach using this method confront with some barriers and requirements; some of these requirements are prerequisite in professors' behavior and some of these are prerequisite in professors' outlook. Also, there are some major barriers, some of which are associated with the professors' operation and others are related to laws and regulations. Implications of these findings for teachers' preparation in education are discussed. In the present study, it was illustrated that a good teaching method helps the students to question their preconceptions, and motivates them to learn, by putting them in a situation in which they come to see themselves as the authors of answers, as the agents of responsibility for change. But training through this method has some barriers and requirements. To have an effective teaching; the faculty members of the universities should be awarded of these barriers and requirements as a way to

  12. Access to care for patients with insulin-requiring diabetes in developing countries

    DEFF Research Database (Denmark)

    Beran, David; Yudkin, John S; de Courten, Maximilian

    2005-01-01

    The objective of this study was to assess the barriers to care for patients with insulin-requiring diabetes in Mozambique and Zambia.......The objective of this study was to assess the barriers to care for patients with insulin-requiring diabetes in Mozambique and Zambia....

  13. Method of constructing lower dry well access tunnel for nuclear reactor container

    International Nuclear Information System (INIS)

    Kume, Tadashi; Furukawa, Hedeyasu.

    1993-01-01

    The method of the present invention facilitates construction of a lower dry well access tunnel for a nuclear reactor container. The lower dry well access tunnel is constructed across the reactor container and the reactor main body foundation. In this case, the lower dry well access tunnel is divided into three sections, i.e., axial end portions and a central portion. At first, each of the end portions is attached to the walls of the reactor container and the reactor main body foundation respectively. Subsequently, the central portion is attached to each of the end portions. An adjusting margin is previously provided to the central portion upon manufacturing each of the sections for adjusting deviation from a nominal size upon construction. In such a construction method, it is possible to eliminate interference accident during construction between the end portions of the lower dry well access tunnel and the reactor container and the reactor main body foundation, to facilitate the construction. Further, this facilitates the fabricating operation for dimensional alignment between the lower dry well access tunnel, and the reactor container and the reactor main body foundation. (I.S.)

  14. A METHOD OF AND A SYSTEM FOR CONTROLLING ACCESS TO A SHARED RESOURCE

    DEFF Research Database (Denmark)

    2006-01-01

    A method and a system of controlling access of data items to a shared resource, wherein the data items each is assigned to one of a plurality of priorities, and wherein, when a predetermined number of data items of a priority have been transmitted to the shared resource, that priority...

  15. Systematic analysis of geo-location and spectrum sensing as access methods to TV white space

    CSIR Research Space (South Africa)

    Mauwa, H

    2016-11-01

    Full Text Available Access to the television white space by white space devices comes with a major technical challenge: white space devices can potentially interfere with existing television signals. Two methods have been suggested in the literature to help white space...

  16. Teens' Survey of Stores in the District of Columbia on Accessibility of Family Planning Methods.

    Science.gov (United States)

    Center for Population Options, Washington, DC.

    Access to and availability of contraceptive methods in stores play an important role in the prevention of AIDS, unwanted pregnancies, and other sexually transmitted diseases. Although teens are generally knowledgable about birth control, many encounter barriers when attempting to obtain contraceptive. Forty-five drug stores and 15 convenience…

  17. Method for Evaluation of Outage Probability on Random Access Channel in Mobile Communication Systems

    Science.gov (United States)

    Kollár, Martin

    2012-05-01

    In order to access the cell in all mobile communication technologies a so called random-access procedure is used. For example in GSM this is represented by sending the CHANNEL REQUEST message from Mobile Station (MS) to Base Transceiver Station (BTS) which is consequently forwarded as an CHANNEL REQUIRED message to the Base Station Controller (BSC). If the BTS decodes some noise on the Random Access Channel (RACH) as random access by mistake (so- called ‘phantom RACH') then it is a question of pure coincidence which èstablishment cause’ the BTS thinks to have recognized. A typical invalid channel access request or phantom RACH is characterized by an IMMEDIATE ASSIGNMENT procedure (assignment of an SDCCH or TCH) which is not followed by sending an ESTABLISH INDICATION from MS to BTS. In this paper a mathematical model for evaluation of the Power RACH Busy Threshold (RACHBT) in order to guaranty in advance determined outage probability on RACH is described and discussed as well. It focuses on Global System for Mobile Communications (GSM) however the obtained results can be generalized on remaining mobile technologies (ie WCDMA and LTE).

  18. Latency in Visionic Systems: Test Methods and Requirements

    Science.gov (United States)

    Bailey, Randall E.; Arthur, J. J., III; Williams, Steven P.; Kramer, Lynda J.

    2005-01-01

    A visionics device creates a pictorial representation of the external scene for the pilot. The ultimate objective of these systems may be to electronically generate a form of Visual Meteorological Conditions (VMC) to eliminate weather or time-of-day as an operational constraint and provide enhancement over actual visual conditions where eye-limiting resolution may be a limiting factor. Empirical evidence has shown that the total system delays or latencies including the imaging sensors and display systems, can critically degrade their utility, usability, and acceptability. Definitions and measurement techniques are offered herein as common test and evaluation methods for latency testing in visionics device applications. Based upon available data, very different latency requirements are indicated based upon the piloting task, the role in which the visionics device is used in this task, and the characteristics of the visionics cockpit display device including its resolution, field-of-regard, and field-of-view. The least stringent latency requirements will involve Head-Up Display (HUD) applications, where the visionics imagery provides situational information as a supplement to symbology guidance and command information. Conversely, the visionics system latency requirement for a large field-of-view Head-Worn Display application, providing a Virtual-VMC capability from which the pilot will derive visual guidance, will be the most stringent, having a value as low as 20 msec.

  19. 5 CFR 2606.203 - Granting access.

    Science.gov (United States)

    2010-01-01

    ... Access to Records and Accounting of Disclosures § 2606.203 Granting access. (a) The methods for allowing... documentation will be required for the disclosure to the data subject of information required to be made...

  20. Creating three-dimensional models for the inclusion of accessibility requirements in architecture.

    Directory of Open Access Journals (Sweden)

    Silvana da Rocha Rodrigues

    2013-12-01

    Full Text Available Este artículo presenta un conjunto de herramientas que ayuda al arquitecto en la representación gráfica de sus proyectos de accesibilidad. La propuesta visa la dificultad de los profesionales de Arquitectura para presentar sus proyectos a los clientes, ya que estos no tienen el repertorio técnico necesario a la comprensión de los dibujos técnicos tradicionales. Para minimizar esas dificultades, se ha desarrollado una herramienta llamada SketchUp_Access, la que integra una biblioteca de modelos de accesibilidad para el software SketchUp y ofrece un conjunto de herramientas que, dadas las normas de ccesibilidad, auxilia al arquitecto en la representación gráfica de su proyecto.

  1. Reduction in requirements for allogeneic blood products: nonpharmacologic methods.

    Science.gov (United States)

    Hardy, J F; Bélisle, S; Janvier, G; Samama, M

    1996-12-01

    Various strategies have been proposed to decrease bleeding and allogeneic transfusion requirements during and after cardiac operations. This article attempts to document the usefulness, or lack thereof, of the nonpharmacologic methods available in clinical practice. Blood conservation methods were reviewed in chronologic order, as they become available to patients during the perisurgical period. The literature in support of or against each strategy was reexamined critically. Avoidance of preoperative anemia and adherence to published guidelines for the practice of transfusion are of paramount importance. Intraoperatively, tolerance of low hemoglobin concentrations and use of autologous blood (predonated or harvested before bypass) will reduce allogeneic transfusions. The usefulness of plateletpheresis and retransfusion of shed mediastinal fluid remains controversial. Intraoperatively and postoperatively, maintenance of normothermia contributes to improved hemostasis. Several approaches have been shown to be effective. An efficient combination of methods can reduce, and sometimes abolish, the need for allogeneic blood products after cardiac operations, inasmuch as all those involved in the care of cardiac surgical patients adhere thoughtfully to existing transfusion guidelines.

  2. Searching for Suicide Methods: Accessibility of Information About Helium as a Method of Suicide on the Internet.

    Science.gov (United States)

    Gunnell, David; Derges, Jane; Chang, Shu-Sen; Biddle, Lucy

    2015-01-01

    Helium gas suicides have increased in England and Wales; easy-to-access descriptions of this method on the Internet may have contributed to this rise. To investigate the availability of information on using helium as a method of suicide and trends in searching about this method on the Internet. We analyzed trends in (a) Google searching (2004-2014) and (b) hits on a Wikipedia article describing helium as a method of suicide (2013-2014). We also investigated the extent to which helium was described as a method of suicide on web pages and discussion forums identified via Google. We found no evidence of rises in Internet searching about suicide using helium. News stories about helium suicides were associated with increased search activity. The Wikipedia article may have been temporarily altered to increase awareness of suicide using helium around the time of a celebrity suicide. Approximately one third of the links retrieved using Google searches for suicide methods mentioned helium. Information about helium as a suicide method is readily available on the Internet; the Wikipedia article describing its use was highly accessed following celebrity suicides. Availability of online information about this method may contribute to rises in helium suicides.

  3. Spanish-Language Community-Based Mental Health Treatment Programs, Policy-Required Language-Assistance Programming, and Mental Health Treatment Access Among Spanish-Speaking Clients

    Science.gov (United States)

    McClellan, Sean R.

    2013-01-01

    Objectives. We investigated the extent to which implementing language assistance programming through contracting with community-based organizations improved the accessibility of mental health care under Medi-Cal (California’s Medicaid program) for Spanish-speaking persons with limited English proficiency, and whether it reduced language-based treatment access disparities. Methods. Using a time series nonequivalent control group design, we studied county-level penetration of language assistance programming over 10 years (1997–2006) for Spanish-speaking persons with limited English proficiency covered under Medi-Cal. We used linear regression with county fixed effects to control for ongoing trends and other influences. Results. When county mental health plans contracted with community-based organizations, those implementing language assistance programming increased penetration rates of Spanish-language mental health services under Medi-Cal more than other plans (0.28 percentage points, a 25% increase on average; P language-related disparities. Conclusions. Mental health treatment programs operated by community-based organizations may have moderately improved access after implementing required language assistance programming, but the programming did not reduce entrenched disparities in the accessibility of mental health services. PMID:23865663

  4. A Novel Method for Intraoral Access to the Superior Head of the Human Lateral Pterygoid Muscle

    Directory of Open Access Journals (Sweden)

    Aleli Tôrres Oliveira

    2014-01-01

    Full Text Available Background. The uncoordinated activity of the superior and inferior parts of the lateral pterygoid muscle (LPM has been suggested to be one of the causes of temporomandibular joint (TMJ disc displacement. A therapy for this muscle disorder is the injection of botulinum toxin (BTX, of the LPM. However, there is a potential risk of side effects with the injection guide methods currently available. In addition, they do not permit appropriate differentiation between the two bellies of the muscle. Herein, a novel method is presented to provide intraoral access to the superior head of the human LPM with maximal control and minimal hazards. Methods. Computational tomography along with digital imaging software programs and rapid prototyping techniques were used to create a rapid prototyped guide to orient BTX injections in the superior LPM. Results. The method proved to be feasible and reliable. Furthermore, when tested in one volunteer it allowed precise access to the upper head of LPM, without producing side effects. Conclusions. The prototyped guide presented in this paper is a novel tool that provides intraoral access to the superior head of the LPM. Further studies will be necessary to test the efficacy and validate this method in a larger cohort of subjects.

  5. Organisational reviews - requirements, methods and experience. Progress report 2006

    International Nuclear Information System (INIS)

    Reiman, T.; Oedewald, P.; Wahlstroem, B.; Rollenhagen, C.; Kahlbom, U.

    2007-04-01

    Organisational reviews are important instruments in the continuous quest for improved performance. In the nuclear field there has been an increasing regulatory interest in organisational performance, because incidents and accidents often point to organisational deficiencies as one of the major precursors. Many methods for organisational reviews have been proposed, but they are mostly based on ad hoc approaches to specific problems. The absence of well-established techniques for organisational reviews has already shown to cause discussions and controversies on different levels. The aim of the OrRe project is to collect the experiences from organisational reviews carried out so far and to reflect them in a theoretical model of organisational performance. Furthermore, the project aims to reflect on the criteria for the definition of the scope and content of organisational reviews. Finally, recommendations will be made for guidance for people participating in organisational reviews. This progress report describes regulatory practices in Finland and Sweden together with some case examples of organizational reviews and assessment in both countries. Some issues of concern are raised and an outline for the next year's work is proposed. Issues of concern include the sufficient depth of the assessment, the required competence in assessments, data and criteria problems, definition of the boundaries of the system to be assessed, and the necessary internal support and organisational maturity required for successful assessments. Finally, plans for next year's work are outlined. (au)

  6. Organisational reviews - requirements, methods and experience. Progress report 2006

    Energy Technology Data Exchange (ETDEWEB)

    Reiman, T.; Oedewald, P.; Wahlstroem, B. [VTT, Technical Research Centre of Finland (Finland); Rollenhagen, C.; Kahlbom, U. [Maelardalen University (FI)

    2007-04-15

    Organisational reviews are important instruments in the continuous quest for improved performance. In the nuclear field there has been an increasing regulatory interest in organisational performance, because incidents and accidents often point to organisational deficiencies as one of the major precursors. Many methods for organisational reviews have been proposed, but they are mostly based on ad hoc approaches to specific problems. The absence of well-established techniques for organisational reviews has already shown to cause discussions and controversies on different levels. The aim of the OrRe project is to collect the experiences from organisational reviews carried out so far and to reflect them in a theoretical model of organisational performance. Furthermore, the project aims to reflect on the criteria for the definition of the scope and content of organisational reviews. Finally, recommendations will be made for guidance for people participating in organisational reviews. This progress report describes regulatory practices in Finland and Sweden together with some case examples of organizational reviews and assessment in both countries. Some issues of concern are raised and an outline for the next year's work is proposed. Issues of concern include the sufficient depth of the assessment, the required competence in assessments, data and criteria problems, definition of the boundaries of the system to be assessed, and the necessary internal support and organisational maturity required for successful assessments. Finally, plans for next year's work are outlined. (au)

  7. 32 CFR 37.915 - What requirement for access to a for-profit participant's records do I include in a TIA?

    Science.gov (United States)

    2010-07-01

    ... participant's records do I include in a TIA? 37.915 Section 37.915 National Defense Department of Defense... What requirement for access to a for-profit participant's records do I include in a TIA? (a) If a for... auditors, your TIA must include for that participant the standard access-to-records requirements at 32 CFR...

  8. Perceived barriers in accessing dental care among patients attending dental institute using decision-making trial and evaluation laboratory method

    Directory of Open Access Journals (Sweden)

    Ravneet Malhi

    2015-01-01

    Full Text Available Introduction: Utilization of dental service is a concept of expressing the extent of interaction between the service provider and the people for whom it is indented. However, one of the major issues in social welfare is the equitable provision of these services to the population. Aim: To determine the perceived barriers affecting access to the dental services in the dental institute. Materials and Methods: A cross-sectional survey was conducted in the dental institute during the month of February in the year 2014 using decision-making trial and evaluation laboratory (DEMATEL method. The study sample included the 364 subjects. The required data were collected using a specially designed and pretested questionnaire. The data were analyzed using SPSS 18.0 (SPSS Inc., Chicago, IL, USA and MATLAB 7.6.0. The mean, standard deviations were used to describe the data, and inferential statistics included one-way ANOVA and DEMATEL. Results: The five determinants of cost, inconvenience, fear, organization, and patient-dentist relationship were determined as barriers to access dental services. Based on subjects′ responses to the questions, the cost (54.75% agreed or strongly agreed was identified as the most important factor affecting the access to dental health care followed by dentist-patient relationship (48.57%, inconvenience (36.55%, fear (23.70%, and organization (14.02%. The difference was found to be statistically significant (P = 0.0001. When the hierarchy of the affecting and affected factors was calculated, based on the factor analysis by using DEMATEL method, the cost (R−J = 0.16 and organization (R−J = 1.15, were certain affecting determinant which influenced the access to dental services and inconvenience. Conclusion: The major barriers to oral health care utilization among our patients were cost, fear, and organization. Policymakers, administrators, and insurance organizations have a major role. Hence, the policies should be fair and

  9. Quantitative Nuclear Medicine Imaging: Concepts, Requirements and Methods

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2014-01-15

    The absolute quantification of radionuclide distribution has been a goal since the early days of nuclear medicine. Nevertheless, the apparent complexity and sometimes limited accuracy of these methods have prevented them from being widely used in important applications such as targeted radionuclide therapy or kinetic analysis. The intricacy of the effects degrading nuclear medicine images and the lack of availability of adequate methods to compensate for these effects have frequently been seen as insurmountable obstacles in the use of quantitative nuclear medicine in clinical institutions. In the last few decades, several research groups have consistently devoted their efforts to the filling of these gaps. As a result, many efficient methods are now available that make quantification a clinical reality, provided appropriate compensation tools are used. Despite these efforts, many clinical institutions still lack the knowledge and tools to adequately measure and estimate the accumulated activities in the human body, thereby using potentially outdated protocols and procedures. The purpose of the present publication is to review the current state of the art of image quantification and to provide medical physicists and other related professionals facing quantification tasks with a solid background of tools and methods. It describes and analyses the physical effects that degrade image quality and affect the accuracy of quantification, and describes methods to compensate for them in planar, single photon emission computed tomography (SPECT) and positron emission tomography (PET) images. The fast paced development of the computational infrastructure, both hardware and software, has made drastic changes in the ways image quantification is now performed. The measuring equipment has evolved from the simple blind probes to planar and three dimensional imaging, supported by SPECT, PET and hybrid equipment. Methods of iterative reconstruction have been developed to allow for

  10. Modelling of capital requirements in the energy sector: capital market access. Final memorandum

    Energy Technology Data Exchange (ETDEWEB)

    1978-04-01

    Formal modelling techniques for analyzing the capital requirements of energy industries have been performed at DOE. A survey has been undertaken of a number of models which forecast energy-sector capital requirements or which detail the interactions of the energy sector and the economy. Models are identified which can be useful as prototypes for some portion of DOE's modelling needs. The models are examined to determine any useful data bases which could serve as inputs to an original DOE model. A selected group of models are examined which can comply with the stated capabilities. The data sources being used by these models are covered and a catalog of the relevant data bases is provided. The models covered are: capital markets and capital availability models (Fossil 1, Bankers Trust Co., DRI Macro Model); models of physical capital requirements (Bechtel Supply Planning Model, ICF Oil and Gas Model and Coal Model, Stanford Research Institute National Energy Model); macroeconomic forecasting models with input-output analysis capabilities (Wharton Annual Long-Term Forecasting Model, Brookhaven/University of Illinois Model, Hudson-Jorgenson/Brookhaven Model); utility models (MIT Regional Electricity Model-Baughman Joskow, Teknekron Electric Utility Simulation Model); and others (DRI Energy Model, DRI/Zimmerman Coal Model, and Oak Ridge Residential Energy Use Model).

  11. Spatial access priority mapping (SAPM) with fishers: a quantitative GIS method for participatory planning.

    Science.gov (United States)

    Yates, Katherine L; Schoeman, David S

    2013-01-01

    Spatial management tools, such as marine spatial planning and marine protected areas, are playing an increasingly important role in attempts to improve marine management and accommodate conflicting needs. Robust data are needed to inform decisions among different planning options, and early inclusion of stakeholder involvement is widely regarded as vital for success. One of the biggest stakeholder groups, and the most likely to be adversely impacted by spatial restrictions, is the fishing community. In order to take their priorities into account, planners need to understand spatial variation in their perceived value of the sea. Here a readily accessible, novel method for quantitatively mapping fishers' spatial access priorities is presented. Spatial access priority mapping, or SAPM, uses only basic functions of standard spreadsheet and GIS software. Unlike the use of remote-sensing data, SAPM actively engages fishers in participatory mapping, documenting rather than inferring their priorities. By so doing, SAPM also facilitates the gathering of other useful data, such as local ecological knowledge. The method was tested and validated in Northern Ireland, where over 100 fishers participated in a semi-structured questionnaire and mapping exercise. The response rate was excellent, 97%, demonstrating fishers' willingness to be involved. The resultant maps are easily accessible and instantly informative, providing a very clear visual indication of which areas are most important for the fishers. The maps also provide quantitative data, which can be used to analyse the relative impact of different management options on the fishing industry and can be incorporated into planning software, such as MARXAN, to ensure that conservation goals can be met at minimum negative impact to the industry. This research shows how spatial access priority mapping can facilitate the early engagement of fishers and the ready incorporation of their priorities into the decision-making process

  12. Action research to improve methods of delivery and feedback in an Access Grid Room environment

    Science.gov (United States)

    McArthur, Lynne C.; Klass, Lara; Eberhard, Andrew; Stacey, Andrew

    2011-12-01

    This article describes a qualitative study which was undertaken to improve the delivery methods and feedback opportunity in honours mathematics lectures which are delivered through Access Grid Rooms. Access Grid Rooms are facilities that provide two-way video and audio interactivity across multiple sites, with the inclusion of smart boards. The principal aim was to improve the student learning experience, given the new environment. The specific aspects of the course delivery that the study focused on included presentation of materials and provision of opportunities for interaction between the students and between students and lecturers. The practical considerations in the delivery of distance learning are well documented in the literature, and similar problems arise in the Access Grid Room environment; in particular, those of limited access to face-to-face interaction and the reduction in peer support. The nature of the Access Grid Room classes implies that students studying the same course can be physically situated in different cities, and possibly in different countries. When studying, it is important that students have opportunity to discuss new concepts with others; particularly their peers and their lecturer. The Access Grid Room environment also presents new challenges for the lecturer, who must learn new skills in the delivery of materials. The unique nature of Access Grid Room technology offers unprecedented opportunity for effective course delivery and positive outcomes for students, and was developed in response to a need to be able to interact with complex data, other students and the instructor, in real-time, at a distance and from multiple sites. This is a relatively new technology and as yet there has been little or no studies specifically addressing the use and misuse of the technology. The study found that the correct placement of cameras and the use of printed material and smart boards were all crucial to the student experience. In addition, the

  13. Mini-grid based off-grid electrification to enhance electricity access in developing countries: What policies may be required?

    International Nuclear Information System (INIS)

    Bhattacharyya, Subhes C.; Palit, Debajit

    2016-01-01

    With 1.2 billion people still lacking electricity access by 2013, electricity access remains a major global challenge. Although mini-grid based electrification has received attention in recent times, their full exploitation requires policy support covering a range of areas. Distilling the experience from a five year research project, OASYS South Asia, this paper presents the summary of research findings and shares the experience from four demonstration activities. It suggests that cost-effective universal electricity service remains a challenge and reaching the universal electrification target by 2030 will remain a challenge for the less developed countries. The financial, organisational and governance weaknesses hinder successful implementation of projects in many countries. The paper then provides 10 policy recommendations to promote mini-grids as a complementary route to grid extension to promote electricity access for successful outcomes. - Highlights: •The academic and action research activities undertaken through OASYS South Asia Project are reported. •Evidence produced through a multi-dimensional participatory framework supplemented by four demonstration projects. •Funding and regulatory challenges militate against universal electrification objectives by 2030. •Innovative business approaches linking local mini-grids and livelihood opportunities exist. •Enabling policies are suggested to exploit such options.

  14. INTEGRATIVE METHOD OF TEACHING INFORMATION MODELING IN PRACTICAL HEALTH SERVICE BASED ON MICROSOFT ACCESS QUERIES

    Directory of Open Access Journals (Sweden)

    Svetlana A. Firsova

    2016-06-01

    Full Text Available Introduction: this article explores the pedagogical technology employed to teach medical students foundations of work with MICROSOFT ACCESS databases. The above technology is based on integrative approach to the information modeling in public health practice, drawing upon basic didactic concepts that pertain to objects and tools databases created in MICROSOFT ACCESS. The article examines successive steps in teaching the topic “Queries in MICROSOFT ACCESS” – from simple queries to complex ones. The main attention is paid to such components of methodological system, as the principles and teaching methods classified according to the degree of learners’ active cognitive activity. The most interesting is the diagram of the relationship of learning principles, teaching methods and specific types of requests. Materials and Methods: the authors used comparative analysis of literature, syllabi, curricula in medical informatics taught at leading medical universities in Russia. Results: the original technique of training in putting queries with databases of MICROSOFT ACCESS is presented for analysis of information models in practical health care. Discussion and Conclusions: it is argued that the proposed pedagogical technology will significantly improve the effectiveness of teaching the course “Medical Informatics”, that includes development and application of models to simulate the operation of certain facilities and services of the health system which, in turn, increases the level of information culture of practitioners.

  15. System and method for integrating and accessing multiple data sources within a data warehouse architecture

    Science.gov (United States)

    Musick, Charles R [Castro Valley, CA; Critchlow, Terence [Livermore, CA; Ganesh, Madhaven [San Jose, CA; Slezak, Tom [Livermore, CA; Fidelis, Krzysztof [Brentwood, CA

    2006-12-19

    A system and method is disclosed for integrating and accessing multiple data sources within a data warehouse architecture. The metadata formed by the present method provide a way to declaratively present domain specific knowledge, obtained by analyzing data sources, in a consistent and useable way. Four types of information are represented by the metadata: abstract concepts, databases, transformations and mappings. A mediator generator automatically generates data management computer code based on the metadata. The resulting code defines a translation library and a mediator class. The translation library provides a data representation for domain specific knowledge represented in a data warehouse, including "get" and "set" methods for attributes that call transformation methods and derive a value of an attribute if it is missing. The mediator class defines methods that take "distinguished" high-level objects as input and traverse their data structures and enter information into the data warehouse.

  16. Identifying and prioritizing customer requirements from tractor production by QFD method

    Directory of Open Access Journals (Sweden)

    H Taghizadeh

    2017-05-01

    and theoretical bases of this study have been collected with research paper tab and the research data has been collected through four researcher-made questionnaires and interview tools. The questionnaire Type 1, used for determining the most important demands and needs of customers based on five choices Likert scale. The questionnaire Type 2 was for gathering data requirements to hierarchical AHP method, and the questionnaire Type 3 was for doing some evaluation about organization's present situation related with competitor's situation based on customer's demands and needs; and the questionnaire Type 4 had been implemented for finding technical requirement weights respect to customer's demands and needs. The reliability of the type 1, 3 and 4 questionnaires determined by Chronbach's Alpha method; after gathering required data for mentioned statistical test, these questionnaires' reliability rates are obtained: 0.768, 0.784 and 0.793, respectively. As well as, the validity of the questionnaires has been examined with content validity method. In this research, for analyzing the gathered data, while taking into account the different stages of QFD method, t- student statistical test was used for identifing the needs and demands of customers, and AHP was used for determining the priority of needs and demands of customers. Results and Discussion The results of one sample t-test for identifying the customer’s most important demands and needs showed that the factors such as: producing low price tractor, the quality of used auto-parts, sustainability and long-lasting the final production (production life and durability, comfort and peace during work, creating operator cabin, easy access to spare components, the amount of fuel consumption, warranty and maintenance, easy access to official repair stations, technical experts and suitable auto-parts, fast respond of brake system during braking and smooth moving identified the important demands and needs of customers. The results

  17. Solvent Flux Method (SFM): A Case Study of Water Access to Candida antarctica Lipase B.

    Science.gov (United States)

    Benson, Sven P; Pleiss, Jürgen

    2014-11-11

    The solvent flux method (SFM) was developed to comprehensively characterize the influx of solvent molecules from the solvent environment into the active site of a protein in the framework of molecular dynamics simulations. This was achieved by introducing a solvent concentration gradient as well as partially reorienting and rescaling the velocity vector of all solvent molecules contained within a spherical volume enclosing the protein, thus inducing an accelerated solvent influx toward the active site. In addition to the detection of solvent access pathway within the protein structure, it is hereby possible to identify potential amino acid positions relevant to solvent-related enzyme engineering with high statistical significance. The method is particularly aimed at improving the reverse hydrolysis reaction rates in nonaqueous media. Candida antarctica lipase B (CALB) binds to a triglyceride-water interface with its substrate entrance channel oriented toward the hydrophobic substrate interface. The lipase-triglyceride-water system served as a model system for SFM to evaluate the influx of water molecules to the active site. As a proof of principle for SFM, a previously known water access pathway in CALB was identified as the primary water channel. In addition, a secondary water channel and two pathways for water access which contribute to water leakage between the protein and the triglyceride-water interface were identified.

  18. RSARF: Prediction of residue solvent accessibility from protein sequence using random forest method

    KAUST Repository

    Ganesan, Pugalenthi; Kandaswamy, Krishna Kumar Umar; Chou -, Kuochen; Vivekanandan, Saravanan; Kolatkar, Prasanna R.

    2012-01-01

    Prediction of protein structure from its amino acid sequence is still a challenging problem. The complete physicochemical understanding of protein folding is essential for the accurate structure prediction. Knowledge of residue solvent accessibility gives useful insights into protein structure prediction and function prediction. In this work, we propose a random forest method, RSARF, to predict residue accessible surface area from protein sequence information. The training and testing was performed using 120 proteins containing 22006 residues. For each residue, buried and exposed state was computed using five thresholds (0%, 5%, 10%, 25%, and 50%). The prediction accuracy for 0%, 5%, 10%, 25%, and 50% thresholds are 72.9%, 78.25%, 78.12%, 77.57% and 72.07% respectively. Further, comparison of RSARF with other methods using a benchmark dataset containing 20 proteins shows that our approach is useful for prediction of residue solvent accessibility from protein sequence without using structural information. The RSARF program, datasets and supplementary data are available at http://caps.ncbs.res.in/download/pugal/RSARF/. - See more at: http://www.eurekaselect.com/89216/article#sthash.pwVGFUjq.dpuf

  19. Internet and Social Media Access Among Youth Experiencing Homelessness: Mixed-Methods Study.

    Science.gov (United States)

    VonHoltz, Lauren A Houdek; Frasso, Rosemary; Golinkoff, Jesse M; Lozano, Alicia J; Hanlon, Alexandra; Dowshen, Nadia

    2018-05-22

    leisure or entertainment activities. While homeless youth experience changes in the frequency, amount of time, and specific uses of the internet and social media, study participants were able to access the internet regularly. The internet was used to search health-related topics. Given the importance of smartphones in accessing the internet, mobile-optimized websites may be an effective method for reaching this group. ©Lauren A Houdek VonHoltz, Rosemary Frasso, Jesse M Golinkoff, Alicia J Lozano, Alexandra Hanlon, Nadia Dowshen. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 22.05.2018.

  20. No Special Equipment Required: The Accessibility Features Built into the Windows and Macintosh Operating Systems make Computers Accessible for Students with Special Needs

    Science.gov (United States)

    Kimball,Walter H.; Cohen,Libby G.; Dimmick,Deb; Mills,Rick

    2003-01-01

    The proliferation of computers and other electronic learning devices has made knowledge and communication accessible to people with a wide range of abilities. Both Windows and Macintosh computers have accessibility options to help with many different special needs. This documents discusses solutions for: (1) visual impairments; (2) hearing…

  1. Required doses for projection methods in X-ray diagnosis

    International Nuclear Information System (INIS)

    Hagemann, G.

    1992-01-01

    The ideal dose requirement has been stated by Cohen et al. (1981) by a formula basing on parallel beam, maximum quantum yield and Bucky grid effect depending on the signal to noise ratio and object contrast. This was checked by means of contrast detail diagrams measured at the hole phantom, and was additionally compared with measurement results obtained with acrylic glass phantoms. The optimal dose requirement is obtained by the maximum technically possible approach to the ideal requirement level. Examples are given, besides for x-ray equipment with Gd 2 O 2 S screen film systems for grid screen mammography, and new thoracic examination systems for mass screenings. Finally, a few values concerning the dose requirement or the analogous time required for fluorscent screening in angiography and interventional radiology, are stated, as well as for dentistry and paediatric x-ray diagnostics. (orig./HP) [de

  2. 20 CFR 652.207 - How does a State meet the requirement for universal access to services provided under the Act?

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false How does a State meet the requirement for universal access to services provided under the Act? 652.207 Section 652.207 Employees' Benefits EMPLOYMENT... exercising this discretion, a State must meet the Act's requirements. (b) These requirements are: (1) Labor...

  3. Evaluation of Information Requirements of Reliability Methods in Engineering Design

    DEFF Research Database (Denmark)

    Marini, Vinicius Kaster; Restrepo-Giraldo, John Dairo; Ahmed-Kristensen, Saeema

    2010-01-01

    This paper aims to characterize the information needed to perform methods for robustness and reliability, and verify their applicability to early design stages. Several methods were evaluated on their support to synthesis in engineering design. Of those methods, FMEA, FTA and HAZOP were selected...

  4. Accessible methods for the dynamic time-scale decomposition of biochemical systems.

    Science.gov (United States)

    Surovtsova, Irina; Simus, Natalia; Lorenz, Thomas; König, Artjom; Sahle, Sven; Kummer, Ursula

    2009-11-01

    The growing complexity of biochemical models asks for means to rationally dissect the networks into meaningful and rather independent subnetworks. Such foregoing should ensure an understanding of the system without any heuristics employed. Important for the success of such an approach is its accessibility and the clarity of the presentation of the results. In order to achieve this goal, we developed a method which is a modification of the classical approach of time-scale separation. This modified method as well as the more classical approach have been implemented for time-dependent application within the widely used software COPASI. The implementation includes different possibilities for the representation of the results including 3D-visualization. The methods are included in COPASI which is free for academic use and available at www.copasi.org. irina.surovtsova@bioquant.uni-heidelberg.de Supplementary data are available at Bioinformatics online.

  5. Average Likelihood Methods of Classification of Code Division Multiple Access (CDMA)

    Science.gov (United States)

    2016-05-01

    subject to code matrices that follows the structure given by (113). [⃗ yR y⃗I ] = √ Es 2L [ GR1 −GI1 GI2 GR2 ] [ QR −QI QI QR ] [⃗ bR b⃗I ] + [⃗ nR n⃗I... QR ] [⃗ b+ b⃗− ] + [⃗ n+ n⃗− ] (115) The average likelihood for type 4 CDMA (116) is a special case of type 1 CDMA with twice the code length and...AVERAGE LIKELIHOOD METHODS OF CLASSIFICATION OF CODE DIVISION MULTIPLE ACCESS (CDMA) MAY 2016 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE

  6. Defining Requirements and Related Methods for Designing Sensorized Garments

    Directory of Open Access Journals (Sweden)

    Giuseppe Andreoni

    2016-05-01

    Full Text Available Designing smart garments has strong interdisciplinary implications, specifically related to user and technical requirements, but also because of the very different applications they have: medicine, sport and fitness, lifestyle monitoring, workplace and job conditions analysis, etc. This paper aims to discuss some user, textile, and technical issues to be faced in sensorized clothes development. In relation to the user, the main requirements are anthropometric, gender-related, and aesthetical. In terms of these requirements, the user’s age, the target application, and fashion trends cannot be ignored, because they determine the compliance with the wearable system. Regarding textile requirements, functional factors—also influencing user comfort—are elasticity and washability, while more technical properties are the stability of the chemical agents’ effects for preserving the sensors’ efficacy and reliability, and assuring the proper duration of the product for the complete life cycle. From the technical side, the physiological issues are the most important: skin conductance, tolerance, irritation, and the effect of sweat and perspiration are key factors for reliable sensing. Other technical features such as battery size and duration, and the form factor of the sensor collector, should be considered, as they affect aesthetical requirements, which have proven to be crucial, as well as comfort and wearability.

  7. Robust design requirements specification: a quantitative method for requirements development using quality loss functions

    DEFF Research Database (Denmark)

    Pedersen, Søren Nygaard; Christensen, Martin Ebro; Howard, Thomas J.

    2016-01-01

    Product requirements serve many purposes in the product development process. Most importantly, they are meant to capture and facilitate product goals and acceptance criteria, as defined by stakeholders. Accurately communicating stakeholder goals and acceptance criteria can be challenging and more...

  8. 40 CFR 136.6 - Method modifications and analytical requirements.

    Science.gov (United States)

    2010-07-01

    ... modifications and analytical requirements. (a) Definitions of terms used in this section. (1) Analyst means the..., oil and grease, total suspended solids, total phenolics, turbidity, chemical oxygen demand, and.... Except as set forth in paragraph (b)(3) of this section, an analyst may modify an approved test procedure...

  9. A Survey of Requirements Engineering Methods for Pervasive Services

    NARCIS (Netherlands)

    Kolos, L.; van Eck, Pascal; Wieringa, Roelf J.

    Designing and deploying ubiquitous computing systems, such as those delivering large-scale mobile services, still requires large-scale investments in both development effort as well as infrastructure costs. Therefore, in order to develop the right system, the design process merits a thorough

  10. Requirements on Long-Term Accessibility and Preservation of Research Results with Particular Regard to Their Provenance

    Directory of Open Access Journals (Sweden)

    Andreas Weber

    2016-04-01

    Full Text Available Since important national and international funders of research projects require statements on the long-term accessibility of research results, many new solutions appeared to fulfil these demands. The solutions are implemented on various scopes, starting from specific solutions for one research group up to solutions with a national focus (i.e., the RADAR project. While portals for globally standardized research data (e.g., climate data are available, there is currently no provision for the large amount of data resulting from specialized research in individual research foci, the so called long-tail of sciences. In this article we describe the considerations regarding the implementation of a local research data repository for the Collaborative Research Centre (CRC 840. The main focus will be on the examination of requirements for, and an agenda of, a possible technical implementation. Requirements were derived from a more theoretical examination of similar projects and relevant literature, diverse discussions with researchers and project leaders, by analysis of existing publication data, and finally the prototypical implementation with refining iterations. Notably, the discussions with the researchers lead to new features going beyond the challenges of the mere long-term preservation of research data. Besides the need for an infrastructure that permits long-term preservation and retrieval of research data, our system will allow the reconstruction of the complete provenance of published research results. This requirement is a serious diversification of the problem, because it creates the need to qualify additional transformation data, describing the transformation process from primary research data to research results.

  11. Sensitivity Analysis of Hydraulic Methods Regarding Hydromorphologic Data Derivation Methods to Determine Environmental Water Requirements

    Directory of Open Access Journals (Sweden)

    Alireza Shokoohi

    2015-07-01

    Full Text Available This paper studies the accuracy of hydraulic methods in determining environmental flow requirements. Despite the vital importance of deriving river cross sectional data for hydraulic methods, few studies have focused on the criteria for deriving this data. The present study shows that the depth of cross section has a meaningful effect on the results obtained from hydraulic methods and that, considering fish as the index species for river habitat analysis, an optimum depth of 1 m should be assumed for deriving information from cross sections. The second important parameter required for extracting the geometric and hydraulic properties of rivers is the selection of an appropriate depth increment; ∆y. In the present research, this parameter was found to be equal to 1 cm. The uncertainty of the environmental discharge evaluation, when allocating water in areas with water scarcity, should be kept as low as possible. The Manning friction coefficient (n is an important factor in river discharge calculation. Using a range of "n" equal to 3 times the standard deviation for the study area, it is shown that the influence of friction coefficient on the estimation of environmental flow is much less than that on the calculation of river discharge.

  12. A generic method for assignment of reliability scores applied to solvent accessibility predictions

    Directory of Open Access Journals (Sweden)

    Nielsen Morten

    2009-07-01

    Full Text Available Abstract Background Estimation of the reliability of specific real value predictions is nontrivial and the efficacy of this is often questionable. It is important to know if you can trust a given prediction and therefore the best methods associate a prediction with a reliability score or index. For discrete qualitative predictions, the reliability is conventionally estimated as the difference between output scores of selected classes. Such an approach is not feasible for methods that predict a biological feature as a single real value rather than a classification. As a solution to this challenge, we have implemented a method that predicts the relative surface accessibility of an amino acid and simultaneously predicts the reliability for each prediction, in the form of a Z-score. Results An ensemble of artificial neural networks has been trained on a set of experimentally solved protein structures to predict the relative exposure of the amino acids. The method assigns a reliability score to each surface accessibility prediction as an inherent part of the training process. This is in contrast to the most commonly used procedures where reliabilities are obtained by post-processing the output. Conclusion The performance of the neural networks was evaluated on a commonly used set of sequences known as the CB513 set. An overall Pearson's correlation coefficient of 0.72 was obtained, which is comparable to the performance of the currently best public available method, Real-SPINE. Both methods associate a reliability score with the individual predictions. However, our implementation of reliability scores in the form of a Z-score is shown to be the more informative measure for discriminating good predictions from bad ones in the entire range from completely buried to fully exposed amino acids. This is evident when comparing the Pearson's correlation coefficient for the upper 20% of predictions sorted according to reliability. For this subset, values of 0

  13. Thermal test requirements and their verification by different test methods

    International Nuclear Information System (INIS)

    Droste, B.; Wieser, G.; Probst, U.

    1993-01-01

    The paper discusses the parameters influencing the thermal test conditions for type B-packages. Criteria for different test methods (by analytical as well as by experimental means) will be developed. A comparison of experimental results from fuel oil pool and LPG fire tests will be given. (J.P.N.)

  14. The Effect of Transport Accessibility on the Social Inclusion of Wheelchair Users: A Mixed Method Analysis

    Directory of Open Access Journals (Sweden)

    Raquel Velho

    2016-06-01

    Full Text Available In recent years the accessibility of London buses has improved with the introduction of ramps and wheelchair priority areas. These advances are meant to remove physical barriers to entering the bus, but new conflicts have arisen particularly over the physical space aboard. We aimed to research the barriers faced by wheelchair users in public transport using a mixed methods approach to establish the breadth of issues faced by wheelchair users. To this end we quantified the push-force used alight a bus and a study to understand the coping mechanisms used by people to propel up a ramp. This quantitative approach found push forces which resulted in a load of 2 to 3 times body weight being transferred through people’s shoulders, forces which can be directly linked to shoulder injury. This could disable the user further, preventing them from being able to push their wheelchair. Alongside the quantitative study, we conducted qualitative research comprising of a number of in-depth interviews with wheelchair users about the barriers they face in public transport. Our main claim, highlighted through this interdisciplinary collaboration, is that proposed ‘solutions’ to accessibility, such as ramps, often generate problems of their own. These barriers can affect the life of wheelchair users, impacting on their confidence and causing social isolation. These can be long-term in nature or immediate.

  15. The universal access handbook

    CERN Document Server

    Stephanidis, Constantine

    2009-01-01

    In recent years, the field of Universal Access has made significant progress in consolidating theoretical approaches, scientific methods and technologies, as well as in exploring new application domains. Increasingly, professionals in this rapidly maturing area require a comprehensive and multidisciplinary resource that addresses current principles, methods, and tools. Written by leading international authorities from academic, research, and industrial organizations and nonmarket institutions, The Universal Access Handbook covers the unfolding scientific, methodological, technological, and pol

  16. Conducting organizational safety reviews - requirements, methods and experience

    International Nuclear Information System (INIS)

    Reiman, T.; Oedewald, P.; Wahlstroem, B.; Rollenhagen, C.; Kahlbom, U.

    2008-03-01

    Organizational safety reviews are part of the safety management process of power plants. They are typically performed after major reorganizations, significant incidents or according to specified review programs. Organizational reviews can also be a part of a benchmarking between organizations that aims to improve work practices. Thus, they are important instruments in proactive safety management and safety culture. Most methods that have been used for organizational reviews are based more on practical considerations than a sound scientific theory of how various organizational or technical issues influence safety. Review practices and methods also vary considerably. The objective of this research is to promote understanding on approaches used in organizational safety reviews as well as to initiate discussion on criteria and methods of organizational assessment. The research identified a set of issues that need to be taken into account when planning and conducting organizational safety reviews. Examples of the issues are definition of appropriate criteria for evaluation, the expertise needed in the assessment and the organizational motivation for conducting the assessment. The study indicates that organizational safety assessments involve plenty of issues and situations where choices have to be made regarding what is considered valid information and a balance has to be struck between focus on various organizational phenomena. It is very important that these choices are based on a sound theoretical framework and that these choices can later be evaluated together with the assessment findings. The research concludes that at its best, the organizational safety reviews can be utilised as a source of information concerning the changing vulnerabilities and the actual safety performance of the organization. In order to do this, certain basic organizational phenomena and assessment issues have to be acknowledged and considered. The research concludes with recommendations on

  17. Conducting organizational safety reviews - requirements, methods and experience

    Energy Technology Data Exchange (ETDEWEB)

    Reiman, T.; Oedewald, P.; Wahlstroem, B. [Technical Research Centre of Finland, VTT (Finland); Rollenhagen, C. [Royal Institute of Technology, KTH, (Sweden); Kahlbom, U. [RiskPilot (Sweden)

    2008-03-15

    Organizational safety reviews are part of the safety management process of power plants. They are typically performed after major reorganizations, significant incidents or according to specified review programs. Organizational reviews can also be a part of a benchmarking between organizations that aims to improve work practices. Thus, they are important instruments in proactive safety management and safety culture. Most methods that have been used for organizational reviews are based more on practical considerations than a sound scientific theory of how various organizational or technical issues influence safety. Review practices and methods also vary considerably. The objective of this research is to promote understanding on approaches used in organizational safety reviews as well as to initiate discussion on criteria and methods of organizational assessment. The research identified a set of issues that need to be taken into account when planning and conducting organizational safety reviews. Examples of the issues are definition of appropriate criteria for evaluation, the expertise needed in the assessment and the organizational motivation for conducting the assessment. The study indicates that organizational safety assessments involve plenty of issues and situations where choices have to be made regarding what is considered valid information and a balance has to be struck between focus on various organizational phenomena. It is very important that these choices are based on a sound theoretical framework and that these choices can later be evaluated together with the assessment findings. The research concludes that at its best, the organizational safety reviews can be utilised as a source of information concerning the changing vulnerabilities and the actual safety performance of the organization. In order to do this, certain basic organizational phenomena and assessment issues have to be acknowledged and considered. The research concludes with recommendations on

  18. It’s the workflows, stupid! What is required to make ‘offsetting’ work for the open access transition

    Directory of Open Access Journals (Sweden)

    Kai Geschuhn

    2017-11-01

    Full Text Available This paper makes the case for stronger engagement of libraries and consortia when it comes to negotiating and drafting offsetting agreements. Two workshops organized by the Efficiencies and Standards for Article Charges (ESAC initiative in 2016 and 2017 have shown a clear need for an improvement of the current workflows and processes between academic institutions (and libraries and the publishers they use in terms of author identification, metadata exchange and invoicing. Publishers need to invest in their editorial systems, while institutions need to get a clearer understanding of the strategic goal of offsetting. To this purpose, strategic and practical elements, which should be included in the agreements, will be introduced. Firstly, the 'Joint Understanding of Offsetting', launched in 2016, will be discussed. This introduces the ‘pay-as-you-publish’ model as a transitional pathway for the agreements. Secondly, this paper proposes a set of recommendations for article workflows and services between institutions and publishers, based on a draft document which was produced as part of the 2nd ESAC Offsetting Workshop in March 2017. These recommendations should be seen as a minimum set of practical and formal requirements for offsetting agreements and are necessary to make any publication-based open access business model work.

  19. Review of clinically accessible methods to determine lean body mass for normalization of standardized uptake values

    International Nuclear Information System (INIS)

    DEVRIESE, Joke; POTTEL, Hans; BEELS, Laurence; MAES, Alex; VAN DE WIELE, Christophe; GHEYSENS, Olivier

    2016-01-01

    With the routine use of 2-deoxy-2-[ 18 F]-fluoro-D-glucose (18F-FDG) positron emission tomography/computed tomography (PET/CT) scans, metabolic activity of tumors can be quantitatively assessed through calculation of SUVs. One possible normalization parameter for the standardized uptake value (SUV) is lean body mass (LBM), which is generally calculated through predictive equations based on height and body weight. (Semi-)direct measurements of LBM could provide more accurate results in cancer populations than predictive equations based on healthy populations. In this context, four methods to determine LBM are reviewed: bioelectrical impedance analysis, dual-energy X-ray absorptiometry. CT, and magnetic resonance imaging. These methods were selected based on clinical accessibility and are compared in terms of methodology, precision and accuracy. By assessing each method’s specific advantages and limitations, a well-considered choice of method can hopefully lead to more accurate SUVLBM values, hence more accurate quantitative assessment of 18F-FDG PET images.

  20. Ergonomic requirements to control room design - evaluation method

    International Nuclear Information System (INIS)

    Hinz, W.

    1985-01-01

    The method of evaluation introduced is the result of work carried out by the sub-committee 'Control Room Design' of the Engineering Standards Committee in DIN Standards, Ergonomy. This committee compiles standards for the design of control rooms (instrumentation and control) for the monitoring and operation of process engineering cycles. With the agreement of the committee - whom we wish to take the opportunity of thanking at this point for their constructive collaboration - a planned partial standard will be introduced thematically in the following, in order that knowledge gained from the discussion can be included in further work on the subject. The matter in question is a procedure for the qualitative evaluation of the duties to be performed under the control of operators in order that an assessment can be made of existing control concepts or such concepts as are to be found in the draft phase. (orig./GL) [de

  1. Early Patient Access to Medicines: Health Technology Assessment Bodies Need to Catch Up with New Marketing Authorization Methods.

    Science.gov (United States)

    Leyens, Lada; Brand, Angela

    National and international medicines agencies have developed innovative methods to expedite promising new medicines to the market and facilitate early patient access. Some of these approval pathways are the conditional approval and the adaptive pathways by the European Medicines Agency (EMA); the Promising Innovative Medicine (PIM) designation and the Early Access to Medicines Scheme (EAMS) by the Medicines and Healthcare Products Regulatory Agency (MHRA), as well as the Fast Track, Breakthrough or Accelerated Approval methods by the Food and Drug Administration (FDA). However, at least in Europe, these methods cannot achieve the goal of improving timely access for patients to new medicines on their own; the reimbursement process also has to become adaptive and flexible. In the past 2 years, the effective access (national patient access) to newly approved oncology drugs ranged from 1 to 30 months, with an extremely high variability between European countries. The goal of early patient access in Europe can only be achieved if the national health technology assessment bodies, such as NICE (ENG), HAS (FR), G-BA (DE) or AIFA (IT), provide harmonized, transparent, flexible, conditional and adaptive methods that adopt the level of evidence accepted by the medicines agencies. The efforts from medicines agencies are welcome but will be in vain if health technology assessments do not follow with similar initiatives, and the European 'postcode' lottery will continue. © 2016 S. Karger AG, Basel.

  2. The evaluation of radiologic methods for access guidance in percutaneous nephrolithotomy: a systematic review of the literature.

    Science.gov (United States)

    Breda, Alberto; Territo, Angelo; Scoffone, Cesare; Seitz, Christian; Knoll, Thomas; Herrmann, Thomas; Brehmer, Mariannhe; Osther, Palle J S; Liatsikos, Evangelos

    2017-11-12

    Percutaneous nephrolithotomy (PNL) is the treatment of choice for larger and complex renal calculi. First step in performing PNL is to obtain access to the renal cavity using either fluoroscopy or ultrasound (US) guidance or a combination of both. Which guiding method to choose is controversial? A systematic review of the literature was performed comparing image guidance modalities for obtaining access in PNL. Evidence acquisition and synthesis: A PubMed, Scopus and Cochrane search for peer-reviewed studies was performed using the keywords "ultrasound" AND "fluoroscopy" AND "Percutaneous nephrolithotomy". Eligible articles were reviewed according to PRISMA criteria. Two hundred and forty records were identified using the keywords. Of these twelve studies were considered relevant. US guidance seems to be associated with a slightly lower complication rate, which may be related to fewer puncture attempts needed for obtaining access and to better peri-renal organ visualization. On the other hand, US-guidance alone needs the adjunct of fluoroscopy in a significant number of cases for achieving access. Stone free rate (SFR) was comparable between groups. Using US for renal access unequivocally reduces radiation exposure. Current evidence indicates that both fluoroscopy and US guidance may be successfully used for obtaining percutaneous renal access. Combining the image-guiding modalities - US and fluoroscopy - seems to increase outcome in PNL both with regard to success in achieving access and reducing complications. Furthermore, including US in the access strategy of PNL reduces radiation exposure to surgeon and staff as well as patients.

  3. A spectral nudging method for the ACCESS1.3 atmospheric model

    Science.gov (United States)

    Uhe, P.; Thatcher, M.

    2015-06-01

    A convolution-based method of spectral nudging of atmospheric fields is developed in the Australian Community Climate and Earth Systems Simulator (ACCESS) version 1.3 which uses the UK Met Office Unified Model version 7.3 as its atmospheric component. The use of convolutions allow for flexibility in application to different atmospheric grids. An approximation using one-dimensional convolutions is applied, improving the time taken by the nudging scheme by 10-30 times compared with a version using a two-dimensional convolution, without measurably degrading its performance. Care needs to be taken in the order of the convolutions and the frequency of nudging to obtain the best outcome. The spectral nudging scheme is benchmarked against a Newtonian relaxation method, nudging winds and air temperature towards ERA-Interim reanalyses. We find that the convolution approach can produce results that are competitive with Newtonian relaxation in both the effectiveness and efficiency of the scheme, while giving the added flexibility of choosing which length scales to nudge.

  4. A spectral nudging method for the ACCESS1.3 atmospheric model

    Directory of Open Access Journals (Sweden)

    P. Uhe

    2015-06-01

    Full Text Available A convolution-based method of spectral nudging of atmospheric fields is developed in the Australian Community Climate and Earth Systems Simulator (ACCESS version 1.3 which uses the UK Met Office Unified Model version 7.3 as its atmospheric component. The use of convolutions allow for flexibility in application to different atmospheric grids. An approximation using one-dimensional convolutions is applied, improving the time taken by the nudging scheme by 10–30 times compared with a version using a two-dimensional convolution, without measurably degrading its performance. Care needs to be taken in the order of the convolutions and the frequency of nudging to obtain the best outcome. The spectral nudging scheme is benchmarked against a Newtonian relaxation method, nudging winds and air temperature towards ERA-Interim reanalyses. We find that the convolution approach can produce results that are competitive with Newtonian relaxation in both the effectiveness and efficiency of the scheme, while giving the added flexibility of choosing which length scales to nudge.

  5. Access to Money and Relation to Women's Use of Family Planning Methods Among Young Married Women in Rural India.

    Science.gov (United States)

    Reed, Elizabeth; Donta, Balaiah; Dasgupta, Anindita; Ghule, Mohan; Battala, Madhusudana; Nair, Saritha; Silverman, Jay; Jadhav, Arun; Palaye, Prajakta; Saggurti, Niranjan; Raj, Anita

    2016-06-01

    Objectives The social positioning (i.e. social status and autonomy) of women in the household facilitates women's access to and decision-making power related to family planning (FP). Women's access to spending money, which may be an indicator of greater social positioning in the household, may also be greater among women who engage in income generating activities for their families, regardless of women's status in the household. However, in both scenarios, access to money may independently afford greater opportunity to obtain family planning services among women. This study seeks to assess whether access to money is associated with FP outcomes independently of women's social positioning in their households. Methods Using survey data from married couples in rural Maharashtra, India (n = 855), crude and adjusted regression was used to assess women's access to their own spending money in relation to past 3 month use of condoms and other forms of contraceptives (pills, injectables, intrauterine device). Results Access to money (59 %) was associated with condom and other contraceptive use (AORs ranged 1.5-1.8). These findings remained significant after adjusting for women's FP decision-making power in the household and mobility to seek FP services. Conclusion While preliminary, findings suggest that access to money may increase women's ability to obtain FP methods, even in contexts where social norms to support women's power in FP decision-making may not be readily adopted.

  6. Comparing Accessibility Auditing Methods for Ebooks: Crowdsourced, Functionality-Led Versus Web Content Methodologies.

    Science.gov (United States)

    James, Abi; Draffan, E A; Wald, Mike

    2017-01-01

    This paper presents a gap analysis between crowdsourced functional accessibility evaluations of ebooks conducted by non-experts and the technical accessibility standards employed by developers. It also illustrates how combining these approaches can provide more appropriate information for a wider group of users with print impairments.

  7. Spatial Accessibility of Primary Care in England: A Cross-Sectional Study Using a Floating Catchment Area Method.

    Science.gov (United States)

    Bauer, Jan; Müller, Ruth; Brüggmann, Dörthe; Groneberg, David A

    2017-07-07

    To analyze the general practitioners (GPs) with regard to the degree of urbanization, social deprivation, general health, and disability. Small area population data and GP practice data in England. We used a floating catchment area method to measure spatial GP accessibility with regard to the degree of urbanization, social deprivation, general health, and disability. Data were collected from the Office for National Statistics and the general practice census and analyzed using a geographic information system. In all, 25.8 percent of the population in England lived in areas with a significant low GP accessibility (mean z-score: -4.2); 27.6 percent lived in areas with a significant high GP accessibility (mean z-score: 7.7); 97.8 percent of high GP accessibility areas represented urban areas, and 31.1 percent of low GP accessibility areas represented rural areas (correlation of accessibility and urbanity: r = 0.59; psocial deprivation was present (r = -0.19; paccessibility throughout England. However, socially deprived areas did not have poorer spatial access to GPs. © Health Research and Educational Trust.

  8. A Green Media Access Method for IEEE 802.15.6 Wireless Body Area Network.

    Science.gov (United States)

    Jacob, Anil K; Jacob, Lillykutty

    2017-09-30

    It is of utmost importance to conserve battery energy to the maximum possible extent in WBAN nodes while collecting and transferring medical data. The IEEE 802.15.6 WBAN standard does not specify any method to conserve energy. This paper focuses on a method to conserve energy in IEEE 802.15.6 WBAN nodes when using CSMA/CA, while simultaneously restricting data delivery delay to the required value as specified in medical applications. The technique is to allow the nodes to sleep all the times except for receiving beacons and for transmitting data frames whenever a data frame enters an empty buffer. The energy consumed by the nodes and the average latency of data frame for periodical arrival of data are found out analytically. The analytical results are validated and also the proposed method is compared with other energy conserving schemes, using Castalia simulation studies. The proposed method shows superior performance in both device lifetime and latency of emergency medical data.

  9. The Videographic Requirements Gathering Method for Adolescent-Focused Interaction Design

    Directory of Open Access Journals (Sweden)

    Tamara Peyton

    2014-08-01

    Full Text Available We present a novel method for conducting requirements gathering with adolescent populations. Called videographic requirements gathering, this technique makes use of mobile phone data capture and participant creation of media images. The videographic requirements gathering method can help researchers and designers gain intimate insight into adolescent lives while simultaneously reducing power imbalances. We provide rationale for this approach, pragmatics of using the method, and advice on overcoming common challenges facing researchers and designers relying on this technique.

  10. 47 CFR 27.16 - Network access requirements for Block C in the 746-757 and 776-787 MHz bands.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Network access requirements for Block C in the 746-757 and 776-787 MHz bands. 27.16 Section 27.16 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... network restrictions on industry-wide consensus standards, such restrictions would be presumed reasonable...

  11. Health care access for rural youth on equal terms? A mixed methods study protocol in northern Sweden.

    Science.gov (United States)

    Goicolea, Isabel; Carson, Dean; San Sebastian, Miguel; Christianson, Monica; Wiklund, Maria; Hurtig, Anna-Karin

    2018-01-11

    The purpose of this paper is to propose a protocol for researching the impact of rural youth health service strategies on health care access. There has been no published comprehensive assessment of the effectiveness of youth health strategies in rural areas, and there is no clearly articulated model of how such assessments might be conducted. The protocol described here aims to gather information to; i) Assess rural youth access to health care according to their needs, ii) Identify and understand the strategies developed in rural areas to promote youth access to health care, and iii) Propose actions for further improvement. The protocol is described with particular reference to research being undertaken in the four northernmost counties of Sweden, which contain a widely dispersed and diverse youth population. The protocol proposes qualitative and quantitative methodologies sequentially in four phases. First, to map youth access to health care according to their health care needs, including assessing horizontal equity (equal use of health care for equivalent health needs,) and vertical equity (people with greater health needs should receive more health care than those with lesser needs). Second, a multiple case study design investigates strategies developed across the region (youth clinics, internet applications, public health programs) to improve youth access to health care. Third, qualitative comparative analysis of the 24 rural municipalities in the region identifies the best combination of conditions leading to high youth access to health care. Fourth, a concept mapping study involving rural stakeholders, care providers and youth provides recommended actions to improve rural youth access to health care. The implementation of this research protocol will contribute to 1) generating knowledge that could contribute to strengthening rural youth access to health care, as well as to 2) advancing the application of mixed methods to explore access to health care.

  12. User Perception of Facebook App Data Access: A Comparison of Methods and Privacy Concerns

    Directory of Open Access Journals (Sweden)

    Jennifer Golbeck

    2016-03-01

    Full Text Available Users share vast amounts of personal information online, but are they fully aware of what information they are sharing and with whom? In this paper, we focused on Facebook apps and set out to understand how concerned users are about privacy and how well-informed they are about what personal data apps can access. We found that initially, subjects were generally under-informed about what data apps could access from their profiles. After viewing additional information about these permissions, subjects’ concern about privacy on Facebook increased. Subjects’ understanding of what data apps were able to access increased, although even after receiving explicit information on the topic, many subjects still did not fully understand the extent to which apps could access their data.

  13. Handbook of methods for risk-based analysis of technical specification requirements

    International Nuclear Information System (INIS)

    Samanta, P.K.; Vesely, W.E.

    1994-01-01

    Technical Specifications (TS) requirements for nuclear power plants define the Limiting Conditions for Operation (LCOs) and Surveillance Requirements (SRs) to assure safety during operation. In general, these requirements were based on deterministic analysis and engineering judgments. Experiences with plant operation indicate that some elements of the requirements are unnecessarily restrictive, while others may not be conducive to safety. Improvements in these requirements are facilitated by the availability of plant specific Probabilistic Safety Assessments (PSAs). The use of risk and reliability-based methods to improve TS requirements has gained wide interest because these methods can: Quantitatively evaluate the risk and justify changes based on objective risk arguments; Provide a defensible basis for these requirements for regulatory applications. The US NRC Office of Research is sponsoring research to develop systematic risk-based methods to improve various aspects of TS requirements. The handbook of methods, which is being prepared, summarizes such risk-based methods. The scope of the handbook includes reliability and risk-based methods for evaluating allowed outage times (AOTs), action statements requiring shutdown where shutdown risk may be substantial, surveillance test intervals (STIs), defenses against common-cause failures, managing plant configurations, and scheduling maintenances. For each topic, the handbook summarizes methods of analysis and data needs, outlines the insights to be gained, lists additional references, and presents examples of evaluations

  14. Handbook of methods for risk-based analysis of Technical Specification requirements

    International Nuclear Information System (INIS)

    Samanta, P.K.; Vesely, W.E.

    1993-01-01

    Technical Specifications (TS) requirements for nuclear power plants define the Limiting Conditions for Operation (LCOs) and Surveillance Requirements (SRs) to assure safety during operation. In general, these requirements were based on deterministic analysis and engineering judgments. Experiences with plant operation indicate that some elements of the requirements are unnecessarily restrictive, while others may not be conducive to safety. Improvements in these requirements are facilitated by the availability of plant specific Probabilistic Safety Assessments (PSAs). The use of risk and reliability-based methods to improve TS requirements has gained wide interest because these methods can: quantitatively evaluate the risk impact and justify changes based on objective risk arguments. Provide a defensible basis for these requirements for regulatory applications. The United States Nuclear Regulatory Commission (USNRC) Office of Research is sponsoring research to develop systematic risk-based methods to improve various aspects of TS requirements. The handbook of methods, which is being prepared, summarizes such risk-based methods. The scope of the handbook includes reliability and risk-based methods for evaluating allowed outage times (AOTs), action statements requiring shutdown where shutdown risk may be substantial, surveillance test intervals (STIs), defenses against common-cause failures, managing plant configurations, and scheduling maintenances. For each topic, the handbook summarizes methods of analysis and data needs, outlines the insights to be gained, lists additional references, and presents examples of evaluations

  15. 42 CFR 84.146 - Method of measuring the power and torque required to operate blowers.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 1 2010-10-01 2010-10-01 false Method of measuring the power and torque required... RESPIRATORY PROTECTIVE DEVICES Supplied-Air Respirators § 84.146 Method of measuring the power and torque.... These are used to facilitate timing. To determine the torque or horsepower required to operate the...

  16. KidReporter : a method for engaging children in making a newspaper to gather user requirements

    NARCIS (Netherlands)

    Bekker, M.M.; Beusmans, J.; Keyson, D.V.; Lloyd, P.A.; Bekker, M.M.; Markopoulos, P.; Tsikalkina, M.

    2002-01-01

    We describe a design method, called the KidReporter method, for gathering user requirements from children. Two school classes participated in making a newspaper about a zoo, to gather requirements for the design process of an interactive educational game. The educational game was developed to

  17. The Role of Need for Contraception in the Evaluation of Interventions to Improve Access to Family-Planning Methods

    Science.gov (United States)

    Leon, Federico R.; Lundgren, Rebecka; Sinai, Irit; Jennings, Victoria

    2011-01-01

    A nonrandomized experiment carried out in Jharkhand, India, shows how the effects of interventions designed to improve access to family-planning methods can be erroneously regarded as trivial when contraceptive use is utilized as dependent variable, ignoring women's need for contraception. Significant effects of the intervention were observed on…

  18. A Fluorine-18 Radiolabeling Method Enabled by Rhenium(I) Complexation Circumvents the Requirement of Anhydrous Conditions.

    Science.gov (United States)

    Klenner, Mitchell A; Pascali, Giancarlo; Zhang, Bo; Sia, Tiffany R; Spare, Lawson K; Krause-Heuer, Anwen M; Aldrich-Wright, Janice R; Greguric, Ivan; Guastella, Adam J; Massi, Massimiliano; Fraser, Benjamin H

    2017-05-11

    Azeotropic distillation is typically required to achieve fluorine-18 radiolabeling during the production of positron emission tomography (PET) imaging agents. However, this time-consuming process also limits fluorine-18 incorporation, due to radioactive decay of the isotope and its adsorption to the drying vessel. In addressing these limitations, the fluorine-18 radiolabeling of one model rhenium(I) complex is reported here, which is significantly improved under conditions that do not require azeotropic drying. This work could open a route towards the investigation of a simplified metal-mediated late-stage radiofluorination method, which would expand upon the accessibility of new PET and PET-optical probes. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. The evaluation of radiologic methods for access guidance in percutaneous nephrolithotomy

    DEFF Research Database (Denmark)

    Breda, Alberto; Territo, Angelo; Scoffone, Cesare

    2018-01-01

    is controversial? A systematic review of the literature was performed comparing image guidance modalities for obtaining access in PNL. Evidence acquisition and synthesis: A PubMed, Scopus and Cochrane search for peer-reviewed studies was performed using the keywords "ultrasound" AND "fluoroscopy" AND "Percutaneous...

  20. Videophone Technology and Students with Deaf-Blindness: A Method for Increasing Access and Communication

    Science.gov (United States)

    Emerson, Judith; Bishop, John

    2012-01-01

    Introduction: Seeing the Possibilities with Videophone Technology began as research project funded by the National Center for Technology Innovation. The project implemented a face-to-face social networking program for students with deaf-blindness to investigate the potential for increasing access and communication using videophone technology.…

  1. Development of improved methods for remote access of DIII-D data and data analysis

    International Nuclear Information System (INIS)

    Greene, K.L.; McHarg, B.B. Jr.

    1997-11-01

    The DIII-D tokamak is a national fusion research facility. There is an increasing need to access data from remote sites in order to facilitate data analysis by collaborative researchers at remote locations, both nationally and internationally. In the past, this has usually been done by remotely logging into computers at the DIII-D site. With the advent of faster networking and powerful computers at remote sites, it is becoming possible to access and analyze data from anywhere in the world as if the remote user were actually at the DIII-D site. The general mechanism for accessing DIII-D data has always been via the PTDATA subroutine. Substantial enhancements are being made to that routine to make it more useful in a non-local environment. In particular, a caching mechanism is being built into PTDATA to make network data access more efficient. Studies are also being made of using Distributed File System (DFS) disk storage in a Distributed Computing Environment (DCE). A data server has been created that will migrate, on request, shot data from the DIII-D environment into the DFS environment

  2. A requirement for Australian research: access to 'big science' facilities, a report by the Australian National Committee for crystallography

    International Nuclear Information System (INIS)

    1989-03-01

    Two types of 'Big Science' research facility - synchrotron radiation sources and intense neutron beams - are now recognised as essential resources for a wide range of research activities in chemistry, physics and biology. The cost of such facilities and the lack of a sufficiently large user base will probably preclude their construction in Australia in the foreseeable future. The needs of Australian crystallographers for access to such facilities are assessed. In relation to synchrotron radiation sources, the Committee considered only the question of access to such facilities overseas. In relation to neutron beam sources, the Committee's inquiries included not only the question of access to powerful facilities overseas but also the special problems which confront Australian crystallographers as a result of the obsolescence of the HIFAR reactor. The arguments about, and options for, funding Australian use of facilities overseas are presented. The Committee concluded there is a strong case for the purchase of a beam-line at an overseas synchrotron radiation facility and a strong, though less urgent, case for substantial Australian involvement in an overseas neutron beam facility. The Committee recommended that the Australian HIFAR reactor be refurbished in its present shell, retaining the present flux and power levels, and that in the upgrading of the neutron scattering instrumentation at HIFAR special consideration be given to including items which are sufficiently specialised to attract the international neutron scattering community

  3. The Norwegian Noark Model Requirements for EDRMS in the context of open government and access to governmental information

    Directory of Open Access Journals (Sweden)

    Olav Hagen Sataslåtten

    2017-11-01

    Full Text Available This article analyses the relationship between the Norwegian Noark Standard and the concepts of Open Government and Freedom of Information. Noark is the Norwegian model requirements for Electronic Documents and Records Management Systems (EDRMS. It was introduced in 1984, making it not only the world’s first model requirement for EDRMS, but also, through the introduction of versions from Noark 1 to the present Noark 5, internationally the model requirement with the longest continuation of implementation.

  4. BIDS apps: Improving ease of use, accessibility, and reproducibility of neuroimaging data analysis methods.

    Directory of Open Access Journals (Sweden)

    Krzysztof J Gorgolewski

    2017-03-01

    Full Text Available The rate of progress in human neurosciences is limited by the inability to easily apply a wide range of analysis methods to the plethora of different datasets acquired in labs around the world. In this work, we introduce a framework for creating, testing, versioning and archiving portable applications for analyzing neuroimaging data organized and described in compliance with the Brain Imaging Data Structure (BIDS. The portability of these applications (BIDS Apps is achieved by using container technologies that encapsulate all binary and other dependencies in one convenient package. BIDS Apps run on all three major operating systems with no need for complex setup and configuration and thanks to the comprehensiveness of the BIDS standard they require little manual user input. Previous containerized data processing solutions were limited to single user environments and not compatible with most multi-tenant High Performance Computing systems. BIDS Apps overcome this limitation by taking advantage of the Singularity container technology. As a proof of concept, this work is accompanied by 22 ready to use BIDS Apps, packaging a diverse set of commonly used neuroimaging algorithms.

  5. Selective Access to Heterocyclic Sulfonamides and Sulfonyl Fluorides via a Parallel Medicinal Chemistry Enabled Method.

    Science.gov (United States)

    Tucker, Joseph W; Chenard, Lois; Young, Joseph M

    2015-11-09

    A sulfur-functionalized aminoacrolein derivative is used for the efficient and selective synthesis of heterocyclic sulfonyl chlorides, sulfonyl fluorides, and sulfonamides. The development of a 3-step parallel medicinal chemistry (PMC) protocol for the synthesis of pyrazole-4-sulfonamides effectively demonstrates the utility of this reagent. This reactivity was expanded to provide rapid access to other heterocyclic sulfonyl fluorides, including pyrimidines and pyridines, whose corresponding sulfonyl chlorides lack suitable chemical stability.

  6. Water accessibility in a membrane-inserting peptide comparing Overhauser DNP and pulse EPR methods

    Energy Technology Data Exchange (ETDEWEB)

    Segawa, Takuya F., E-mail: takuya.segawa@alumni.ethz.ch; Doppelbauer, Maximilian; Garbuio, Luca; Doll, Andrin; Polyhach, Yevhen O.; Jeschke, Gunnar, E-mail: gjeschke@ethz.ch [Laboratory of Physical Chemistry, ETH Zurich, Vladimir-Prelog-Weg 2, CH-8093 Zurich (Switzerland)

    2016-05-21

    Water accessibility is a key parameter for the understanding of the structure of biomolecules, especially membrane proteins. Several experimental techniques based on the combination of electron paramagnetic resonance (EPR) spectroscopy with site-directed spin labeling are currently available. Among those, we compare relaxation time measurements and electron spin echo envelope modulation (ESEEM) experiments using pulse EPR with Overhauser dynamic nuclear polarization (DNP) at X-band frequency and a magnetic field of 0.33 T. Overhauser DNP transfers the electron spin polarization to nuclear spins via cross-relaxation. The change in the intensity of the {sup 1}H NMR spectrum of H{sub 2}O at a Larmor frequency of 14 MHz under a continuous-wave microwave irradiation of the nitroxide spin label contains information on the water accessibility of the labeled site. As a model system for a membrane protein, we use the hydrophobic α-helical peptide WALP23 in unilamellar liposomes of DOPC. Water accessibility measurements with all techniques are conducted for eight peptides with different spin label positions and low radical concentrations (10–20 μM). Consistently in all experiments, the water accessibility appears to be very low, even for labels positioned near the end of the helix. The best profile is obtained by Overhauser DNP, which is the only technique that succeeds in discriminating neighboring positions in WALP23. Since the concentration of the spin-labeled peptides varied, we normalized the DNP parameter ϵ, being the relative change of the NMR intensity, by the electron spin concentration, which was determined from a continuous-wave EPR spectrum.

  7. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks.

    Science.gov (United States)

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Zhang, Xuekun

    2015-12-03

    Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  8. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunyang Lei

    2015-12-01

    Full Text Available Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT, Machine-to-Machine (M2M communications, Vehicular-to-Vehicular (V2V communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  9. Comparison between statistical and optimization methods in accessing unmixing of spectrally similar materials

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2010-11-01

    Full Text Available This paper reports on the results from ordinary least squares and ridge regression as statistical methods, and is compared to numerical optimization methods such as the stochastic method for global optimization, simulated annealing, particle swarm...

  10. 5 CFR 610.404 - Requirement for time-accounting method.

    Science.gov (United States)

    2010-01-01

    ... REGULATIONS HOURS OF DUTY Flexible and Compressed Work Schedules § 610.404 Requirement for time-accounting method. An agency that authorizes a flexible work schedule or a compressed work schedule under this...

  11. [Precautions of physical performance requirements and test methods during product standard drafting process of medical devices].

    Science.gov (United States)

    Song, Jin-Zi; Wan, Min; Xu, Hui; Yao, Xiu-Jun; Zhang, Bo; Wang, Jin-Hong

    2009-09-01

    The major idea of this article is to discuss standardization and normalization for the product standard of medical devices. Analyze the problem related to the physical performance requirements and test methods during product standard drafting process and make corresponding suggestions.

  12. Spanish-language community-based mental health treatment programs, policy-required language-assistance programming, and mental health treatment access among Spanish-speaking clients.

    Science.gov (United States)

    Snowden, Lonnie R; McClellan, Sean R

    2013-09-01

    We investigated the extent to which implementing language assistance programming through contracting with community-based organizations improved the accessibility of mental health care under Medi-Cal (California's Medicaid program) for Spanish-speaking persons with limited English proficiency, and whether it reduced language-based treatment access disparities. Using a time series nonequivalent control group design, we studied county-level penetration of language assistance programming over 10 years (1997-2006) for Spanish-speaking persons with limited English proficiency covered under Medi-Cal. We used linear regression with county fixed effects to control for ongoing trends and other influences. When county mental health plans contracted with community-based organizations, those implementing language assistance programming increased penetration rates of Spanish-language mental health services under Medi-Cal more than other plans (0.28 percentage points, a 25% increase on average; P language-related disparities. Mental health treatment programs operated by community-based organizations may have moderately improved access after implementing required language assistance programming, but the programming did not reduce entrenched disparities in the accessibility of mental health services.

  13. Software Safety Analysis of Digital Protection System Requirements Using a Qualitative Formal Method

    International Nuclear Information System (INIS)

    Lee, Jang-Soo; Kwon, Kee-Choon; Cha, Sung-Deok

    2004-01-01

    The safety analysis of requirements is a key problem area in the development of software for the digital protection systems of a nuclear power plant. When specifying requirements for software of the digital protection systems and conducting safety analysis, engineers find that requirements are often known only in qualitative terms and that existing fault-tree analysis techniques provide little guidance on formulating and evaluating potential failure modes. A framework for the requirements engineering process is proposed that consists of a qualitative method for requirements specification, called the qualitative formal method (QFM), and a safety analysis method for the requirements based on causality information, called the causal requirements safety analysis (CRSA). CRSA is a technique that qualitatively evaluates causal relationships between software faults and physical hazards. This technique, extending the qualitative formal method process and utilizing information captured in the state trajectory, provides specific guidelines on how to identify failure modes and the relationship among them. The QFM and CRSA processes are described using shutdown system 2 of the Wolsong nuclear power plants as the digital protection system example

  14. 40 CFR 63.344 - Performance test requirements and test methods.

    Science.gov (United States)

    2010-07-01

    ... electroplating tanks or chromium anodizing tanks. The sampling time and sample volume for each run of Methods 306... Chromium Anodizing Tanks § 63.344 Performance test requirements and test methods. (a) Performance test... Emissions From Decorative and Hard Chromium Electroplating and Anodizing Operations,” appendix A of this...

  15. 17 CFR 240.17i-5 - Record creation, maintenance, and access requirements for supervised investment bank holding...

    Science.gov (United States)

    2010-04-01

    ...; and (5) Records documenting the system of internal risk management controls required to be established... section; (3) A record of the basis for the determination of the credit risk weight and internal credit... and allowances for market, credit, and operational risk computed currently at least once each month on...

  16. Method of preliminary localization of the iris in biometric access control systems

    Science.gov (United States)

    Minacova, N.; Petrov, I.

    2015-10-01

    This paper presents a method of preliminary localization of the iris, based on the stable brightness features of the iris in images of the eye. In tests on images of eyes from publicly available databases method showed good accuracy and speed compared to existing methods preliminary localization.

  17. Adjust the method of the FMEA to the requirements of the aviation industry

    Directory of Open Access Journals (Sweden)

    Andrzej FELLNER

    2015-12-01

    Full Text Available The article presents a summary of current methods used in aviation and rail transport. It also contains a proposal to adjust the method of the FMEA to the latest requirements of the airline industry. The authors suggested tables of indicators Zn, Pr and Dt necessary to implement FMEA method of risk analysis taking into account current achievements aerospace and rail safety. Also proposed acceptable limits of the RPN number which allows you to classify threats.

  18. Requirements Elicitation of Passengers With Reduced Mobility for the Design of High Quality, Accessible and Inclusive Public Transport Services

    Directory of Open Access Journals (Sweden)

    Starzyńska Beata

    2015-09-01

    Full Text Available In this article the authors present the methodology adopted and the results obtained in the first stage of the research encompassing focus group interviews (FGI about the needs of public transport users in a selected city (Poznań. The elicitation and assessment of the requirements were carried out for three groups of people with disabilities using public transport in the city of Poznań: blind and partially sighted people, deaf and hearing-impaired people, as well as people with locomotor dysfunctions. A study carried out on the basis of a scenario especially designed for the FGI purpose has made it possible to identify barriers for people with disabilities and, consequently, to formulate their pre-trip,on-trip and post-trip requirements when it comes to urban public transport services. The results will be used to construct a questionnaire to be used further on in the project.

  19. A development and integration of the concentration database for relative method, k0 method and absolute method in instrumental neutron activation analysis using Microsoft Access

    International Nuclear Information System (INIS)

    Hoh Siew Sin

    2012-01-01

    Instrumental Neutron Activation Analysis (INAA) is offen used to determine and calculate the concentration of an element in the sample by the National University of Malaysia, especially students of Nuclear Science Program. The lack of a database service leads consumers to take longer time to calculate the concentration of an element in the sample. This is because we are more dependent on software that is developed by foreign researchers which are costly. To overcome this problem, a study has been carried out to build an INAA database software. The objective of this study is to build a database software that help the users of INAA in Relative Method and Absolute Method for calculating the element concentration in the sample using Microsoft Excel 2010 and Microsoft Access 2010. The study also integrates k 0 data, k 0 Concent and k 0 -Westcott to execute and complete the system. After the integration, a study was conducted to test the effectiveness of the database software by comparing the concentrations between the experiments and in the database. Triple Bare Monitor Zr-Au and Cr-Mo-Au were used in Abs-INAA as monitor to determine the thermal to epithermal neutron flux ratio (f). Calculations involved in determining the concentration are the net peak area (N p ), the measurement time (t m ), the irradiation time (t irr ), k-factor (k), thermal to epithermal neutron flux ratio (f), the parameters of the neutron flux distribution epithermal (α) and detection efficiency (ε p ). For Com-INAA databases, reference material IAEA-375 Soil was used to calculate the concentration of elements in the sample. CRM, SRM are also used in this database. After the INAA database integration, a verification process was to examine the effectiveness of the Abs-INAA was carried out by comparing the sample concentration between the in database and the experiment. The result of the experimental concentration value of INAA database software performed with high accuracy and precision. ICC

  20. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  1. A generic method for assignment of reliability scores applied to solvent accessibility predictions

    DEFF Research Database (Denmark)

    Petersen, Bent; Petersen, Thomas Nordahl; Andersen, Pernille

    2009-01-01

    : The performance of the neural networks was evaluated on a commonly used set of sequences known as the CB513 set. An overall Pearson's correlation coefficient of 0.72 was obtained, which is comparable to the performance of the currently best public available method, Real-SPINE. Both methods associate a reliability...... comparing the Pearson's correlation coefficient for the upper 20% of predictions sorted according to reliability. For this subset, values of 0.79 and 0.74 are obtained using our and the compared method, respectively. This tendency is true for any selected subset....

  2. Functional Mobility Testing: A Novel Method to Create Suit Design Requirements

    Science.gov (United States)

    England, Scott A.; Benson, Elizabeth A.; Rajulu, Sudhakar L.

    2008-01-01

    This study was performed to aide in the creation of design requirements for the next generation of space suits that more accurately describe the level of mobility necessary for a suited crewmember through the use of an innovative methodology utilizing functional mobility. A novel method was utilized involving the collection of kinematic data while 20 subjects (10 male, 10 female) performed pertinent functional tasks that will be required of a suited crewmember during various phases of a lunar mission. These tasks were selected based on relevance and criticality from a larger list of tasks that may be carried out by the crew. Kinematic data was processed through Vicon BodyBuilder software to calculate joint angles for the ankle, knee, hip, torso, shoulder, elbow, and wrist. Maximum functional mobility was consistently lower than maximum isolated mobility. This study suggests that conventional methods for establishing design requirements for human-systems interfaces based on maximal isolated joint capabilities may overestimate the required mobility. Additionally, this method provides a valuable means of evaluating systems created from these requirements by comparing the mobility available in a new spacesuit, or the mobility required to use a new piece of hardware, to this newly established database of functional mobility.

  3. Comparison of different methods to extract the required coefficient of friction for level walking.

    Science.gov (United States)

    Chang, Wen-Ruey; Chang, Chien-Chi; Matz, Simon

    2012-01-01

    The required coefficient of friction (RCOF) is an important predictor for slip incidents. Despite the wide use of the RCOF there is no standardised method for identifying the RCOF from ground reaction forces. This article presents a comparison of the outcomes from seven different methods, derived from those reported in the literature, for identifying the RCOF from the same data. While commonly used methods are based on a normal force threshold, percentage of stance phase or time from heel contact, a newly introduced hybrid method is based on a combination of normal force, time and direction of increase in coefficient of friction. Although no major differences were found with these methods in more than half the strikes, significant differences were found in a significant portion of strikes. Potential problems with some of these methods were identified and discussed and they appear to be overcome by the hybrid method. No standard method exists for determining the required coefficient of friction (RCOF), an important predictor for slipping. In this study, RCOF values from a single data set, using various methods from the literature, differed considerably for a significant portion of strikes. A hybrid method may yield improved results.

  4. A Visualization Technique for Accessing Solution Pool in Interactive Methods of Multiobjective Optimization

    OpenAIRE

    Filatovas, Ernestas; Podkopaev, Dmitry; Kurasova, Olga

    2015-01-01

    Interactive methods of multiobjective optimization repetitively derive Pareto optimal solutions based on decision maker’s preference information and present the obtained solutions for his/her consideration. Some interactive methods save the obtained solutions into a solution pool and, at each iteration, allow the decision maker considering any of solutions obtained earlier. This feature contributes to the flexibility of exploring the Pareto optimal set and learning about the op...

  5. REVIEW OF METHODS FOR THE SURVEILLANCE AND ACCESS CONTROL USING THE THERMAL IMAGING SYSTEM

    Directory of Open Access Journals (Sweden)

    Mate Krišto

    2016-12-01

    Full Text Available This paper presents methods for human detection for application in the field of national security in the context of state border surveillance. Except in the context of state border security, the presented methods can be applied to monitor other protected object and infrastructure such as ports and airports, power plants, water supply systems, oil pipelines, etc. Presented methods are based on use of thermal imaging systems for the human detection, recognition and identification. In addition to methods for the detection of persons, are presented and methods for face recognition and identification of the person. The use of such systems has special significance in the context of national security in the domain of timely detection of illegal crossing of state border or illegal movement near buildings, which are of special importance for national security such as traffic infrastructure facilities, power plants, military bases, especially in mountain or forests areas. In this context, thermal imaging has significant advantages over the optical camera surveillance systems because thermal imaging is robust to weather conditions and due to such an infrared thermal system can successfully applied in any weather conditions, or the periods of the day. Featured are procedures that has human detection results as well as a brief survey of specific implementation in terms of the use of infrared thermal imagers mounted on autonomous vehicles (AV and unmanned aerial vehicles (UAV. In addition to the above in this paper are described techniques and methods of face detection and human identification based on thermal image (thermogram.

  6. Mission from Mars - a method for exploring user requirements for children in a narrative space

    DEFF Research Database (Denmark)

    Dindler, Christian; Ludvigsen, Martin; Lykke-Olesen, Andreas

    2005-01-01

    In this paper a particular design method is propagated as a supplement to existing descriptive approaches to current practice studies especially suitable for gathering requirements for the design of children's technology. The Mission from Mars method was applied during the design of an electronic...... school bag (eBag). The three-hour collaborative session provides a first-hand insight into children's practice in a fun and intriguing way. The method is proposed as a supplement to existing descriptive design methods for interaction design and children....

  7. Proposal for Requirement Validation Criteria and Method Based on Actor Interaction

    Science.gov (United States)

    Hattori, Noboru; Yamamoto, Shuichiro; Ajisaka, Tsuneo; Kitani, Tsuyoshi

    We propose requirement validation criteria and a method based on the interaction between actors in an information system. We focus on the cyclical transitions of one actor's situation against another and clarify observable stimuli and responses based on these transitions. Both actors' situations can be listed in a state transition table, which describes the observable stimuli or responses they send or receive. Examination of the interaction between both actors in the state transition tables enables us to detect missing or defective observable stimuli or responses. Typically, this method can be applied to the examination of the interaction between a resource managed by the information system and its user. As a case study, we analyzed 332 requirement defect reports of an actual system development project in Japan. We found that there were a certain amount of defects regarding missing or defective stimuli and responses, which can be detected using our proposed method if this method is used in the requirement definition phase. This means that we can reach a more complete requirement definition with our proposed method.

  8. Accessing memory

    Science.gov (United States)

    Yoon, Doe Hyun; Muralimanohar, Naveen; Chang, Jichuan; Ranganthan, Parthasarathy

    2017-09-26

    A disclosed example method involves performing simultaneous data accesses on at least first and second independently selectable logical sub-ranks to access first data via a wide internal data bus in a memory device. The memory device includes a translation buffer chip, memory chips in independently selectable logical sub-ranks, a narrow external data bus to connect the translation buffer chip to a memory controller, and the wide internal data bus between the translation buffer chip and the memory chips. A data access is performed on only the first independently selectable logical sub-rank to access second data via the wide internal data bus. The example method also involves locating a first portion of the first data, a second portion of the first data, and the second data on the narrow external data bus during separate data transfers.

  9. A qualitative study examining methods of accessing and identifying research relevant to clinical practice among rehabilitation clinicians

    Directory of Open Access Journals (Sweden)

    Patel D

    2017-12-01

    Full Text Available Drasti Patel,1 Christine Koehmstedt,1 Rebecca Jones,1 Nathan T Coffey,1 Xinsheng Cai,2 Steven Garfinkel,2 Dahlia M Shaewitz,2 Ali A Weinstein1 1Center for Study of Chronic Illness and Disability, College of Health and Human Services, George Mason University, Fairfax, VA, 2American Institutes for Research, Washington, DC, USA Purpose: Research examining the utilization of evidence-based practice (EBP specifically among rehabilitation clinicians is limited. The objective of this study was to examine how various rehabilitative clinicians including physical therapists, occupational therapists, rehabilitation counselors, and physiatrists are gaining access to literature and whether they are able to implement the available research into practice.Methods: A total of 21 total clinicians were interviewed via telephone. Using NVivo, a qualitative analysis of the responses was performed.Results: There were similarities found with respect to the information-seeking behaviors and translation of research across the different clinician types. Lack of time was reported to be a barrier for both access to literature and implementation of research across all clinician types. The majority of clinicians who reported having difficulty with utilizing the published literature indicated that the literature was not applicable to their practice, the research was not specific enough to be put into practice, or the research found was too outdated to be relevant. In addition, having a supportive work environment aided in the search and utilization of research through providing resources central to assisting clinicians in gaining access to health information.Conclusion: Our study identified several barriers that affect EBP for rehabilitation clinicians. The findings suggest the need for researchers to ensure that their work is applicable and specific to clinical practice for implementation to occur. Keywords: health information, information behavior, knowledge utilization

  10. Evaluation of Irrigation Methods for Highbush Blueberry. I. Growth and Water Requirements of Young Plants

    Science.gov (United States)

    A study was conducted in a new field of northern highbush blueberry (Vaccinium corymbosum L. 'Elliott') to determine the effects of different irrigation methods on growth and water requirements of uncropped plants during the first 2 years after planting. The plants were grown on mulched, raised beds...

  11. 21 CFR 111.320 - What requirements apply to laboratory methods for testing and examination?

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false What requirements apply to laboratory methods for testing and examination? 111.320 Section 111.320 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH AND HUMAN SERVICES (CONTINUED) FOOD FOR HUMAN CONSUMPTION CURRENT GOOD MANUFACTURING...

  12. Design requirements, criteria and methods for seismic qualification of CANDU power plants

    International Nuclear Information System (INIS)

    Singh, N.; Duff, C.G.

    1979-10-01

    This report describes the requirements and criteria for the seismic design and qualification of systems and equipment in CANDU nuclear power plants. Acceptable methods and techniques for seismic qualification of CANDU nuclear power plants to mitigate the effects or the consequences of earthquakes are also described. (auth)

  13. New concepts, requirements and methods concerning the periodic inspection of the CANDU fuel channels

    International Nuclear Information System (INIS)

    Denis, J.R.

    1995-01-01

    Periodic inspection of fuel channels is essential for a proper assessment of the structural integrity of these vital components of the reactor. The development of wet channel technologies for non-destructive examination (NDE) of pressure tubes and the high technical performance and reliability of the CIGAR equipment have led, in less than 1 0 years, to the accumulation of a very significant volume of data concerning the flaw mechanisms and structural behaviour of the CANDU fuel channels. On this basis, a new form of the CAN/CSA-N285.4 Standard for Periodic Inspection of CANDU Nuclear Power Plant components was elaborated, introducing new concepts and requirements, in accord with the powerful NDE methods now available. This paper presents these concepts and requirements, and discusses the NDE methods, presently used or under development, to satisfy these requirements. Specific features regarding the fuel channel inspections of Cernavoda NGS Unit 1 are also discussed. (author)

  14. ACCESS METHOD TO THE LEARNING OF BASIC TECHNICAL-TACTICAL HANDBALL ELEMENTS

    Directory of Open Access Journals (Sweden)

    Dobrislav Vujović

    2007-05-01

    Full Text Available The analysis of the handball development tendencies demands more and more sophisticated work forms and methods which provide possibility of the quick and good quality implementation of the setup goals and tasks in the work with children. In that case it becomes very important to create the best methods and instruments by which, with the systematic work, the acquired technical/tactical skils and motoric capacities will be adopted and automatized. Process of acquiring of technical/tactical skills and motoric capacities represents main goal in the overall training process of young handball players. It is also a part of the transformation process and an important prerequisite of the specifi c handball competition activity. During the systematic work e.g. training process, from the beginner to the top handball player, this learning process is very unique and in interwoven. It is going on by following general training rules with the purpose of creating supreme sport result

  15. Fault tree construction of hybrid system requirements using qualitative formal method

    International Nuclear Information System (INIS)

    Lee, Jang-Soo; Cha, Sung-Deok

    2005-01-01

    When specifying requirements for software controlling hybrid systems and conducting safety analysis, engineers experience that requirements are often known only in qualitative terms and that existing fault tree analysis techniques provide little guidance on formulating and evaluating potential failure modes. In this paper, we propose Causal Requirements Safety Analysis (CRSA) as a technique to qualitatively evaluate causal relationship between software faults and physical hazards. This technique, extending qualitative formal method process and utilizing information captured in the state trajectory, provides specific guidelines on how to identify failure modes and relationship among them. Using a simplified electrical power system as an example, we describe step-by-step procedures of conducting CRSA. Our experience of applying CRSA to perform fault tree analysis on requirements for the Wolsong nuclear power plant shutdown system indicates that CRSA is an effective technique in assisting safety engineers

  16. Women with learning disabilities and access to cervical screening: retrospective cohort study using case control methods

    Science.gov (United States)

    Reynolds, Fiona; Stanistreet, Debbi; Elton, Peter

    2008-01-01

    Background Several studies in the UK have suggested that women with learning disabilities may be less likely to receive cervical screening tests and a previous local study in had found that GPs considered screening unnecessary for women with learning disabilities. This study set out to ascertain whether women with learning disabilities are more likely to be ceased from a cervical screening programme than women without; and to examine the reasons given for ceasing women with learning disabilities. It was carried out in Bury, Heywood-and-Middleton and Rochdale. Methods Carried out using retrospective cohort study methods, women with learning disabilities were identified by Read code; and their cervical screening records were compared with the Call-and-Recall records of women without learning disabilities in order to examine their screening histories. Analysis was carried out using case-control methods – 1:2 (women with learning disabilities: women without learning disabilities), calculating odds ratios. Results 267 women's records were compared with the records of 534 women without learning disabilities. Women with learning disabilities had an odds ratio (OR) of 0.48 (Confidence Interval (CI) 0.38 – 0.58; X2: 72.227; p.value learning disabilities. Conclusion The reasons given for ceasing and/or not screening suggest that merely being coded as having a learning disability is not the sole reason for these actions. There are training needs among smear takers regarding appropriate reasons not to screen and providing screening for women with learning disabilities. PMID:18218106

  17. National Survey on Access, Use and Promotion of Rational Use of Medicines (PNAUM: household survey component methods

    Directory of Open Access Journals (Sweden)

    Sotero Serrate Mengue

    Full Text Available ABSTRACT OBJECTIVE To describe methodological aspects of the household survey National Survey on Access, Use and Promotion of Rational Use of Medicines (PNAUM related to sampling design and implementation, the actual obtained sample, instruments and fieldwork. METHODS A cross-sectional, population-based study with probability sampling in three stages of the population living in households located in Brazilian urban areas. Fieldwork was carried out between September 2013 and February 2014. The data collection instrument included questions related to: information about households, residents and respondents; chronic diseases and medicines used; use of health services; acute diseases and events treated with drugs; use of contraceptives; use of pharmacy services; behaviors that may affect drug use; package inserts and packaging; lifestyle and health insurance. RESULTS In total, 41,433 interviews were carried out in 20,404 households and 576 urban clusters corresponding to 586 census tracts distributed in the five Brazilian regions, according to eight domains defined by age and gender. CONCLUSIONS The results of the survey may be used as a baseline for future studies aiming to assess the impact of government action on drug access and use. For local studies using a compatible method, PNAUM may serve as a reference point to evaluate variations in space and population. With a comprehensive evaluation of drug-related aspects, PNAUM is a major source of data for a variety of analyses to be carried out both at academic and government level.

  18. Women with learning disabilities and access to cervical screening: retrospective cohort study using case control methods

    Directory of Open Access Journals (Sweden)

    Stanistreet Debbi

    2008-01-01

    Full Text Available Abstract Background Several studies in the UK have suggested that women with learning disabilities may be less likely to receive cervical screening tests and a previous local study in had found that GPs considered screening unnecessary for women with learning disabilities. This study set out to ascertain whether women with learning disabilities are more likely to be ceased from a cervical screening programme than women without; and to examine the reasons given for ceasing women with learning disabilities. It was carried out in Bury, Heywood-and-Middleton and Rochdale. Methods Carried out using retrospective cohort study methods, women with learning disabilities were identified by Read code; and their cervical screening records were compared with the Call-and-Recall records of women without learning disabilities in order to examine their screening histories. Analysis was carried out using case-control methods – 1:2 (women with learning disabilities: women without learning disabilities, calculating odds ratios. Results 267 women's records were compared with the records of 534 women without learning disabilities. Women with learning disabilities had an odds ratio (OR of 0.48 (Confidence Interval (CI 0.38 – 0.58; X2: 72.227; p.value X2: 24.236; p.value X2: 286.341; p.value Conclusion The reasons given for ceasing and/or not screening suggest that merely being coded as having a learning disability is not the sole reason for these actions. There are training needs among smear takers regarding appropriate reasons not to screen and providing screening for women with learning disabilities.

  19. Information Accessibility of the Charcoal Burning Suicide Method in Mainland China.

    Science.gov (United States)

    Cheng, Qijin; Chang, Shu-Sen; Guo, Yingqi; Yip, Paul S F

    2015-01-01

    There has been a marked rise in suicide by charcoal burning (CB) in some East Asian countries but little is known about its incidence in mainland China. We examined media-reported CB suicides and the availability of online information about the method in mainland China. We extracted and analyzed data for i) the characteristics and trends of fatal and nonfatal CB suicides reported by mainland Chinese newspapers (1998-2014); ii) trends and geographic variations in online searches using keywords relating to CB suicide (2011-2014); and iii) the content of Internet search results. 109 CB suicide attempts (89 fatal and 20 nonfatal) were reported by newspapers in 13 out of the 31 provinces or provincial-level-municipalities in mainland China. There were increasing trends in the incidence of reported CB suicides and in online searches using CB-related keywords. The province-level search intensities were correlated with CB suicide rates (Spearman's correlation coefficient = 0.43 [95% confidence interval: 0.08-0.68]). Two-thirds of the web links retrieved using the search engine contained detailed information about the CB suicide method, of which 15% showed pro-suicide attitudes, and the majority (86%) did not encourage people to seek help. The incidence of CB suicide was based on newspaper reports and likely to be underestimated. Mental health and suicide prevention professionals in mainland China should be alert to the increased use of this highly lethal suicide method. Better surveillance and intervention strategies need to be developed and implemented.

  20. A Novel, Open Access Method to Assess Sleep Duration Using a Wrist-Worn Accelerometer.

    Directory of Open Access Journals (Sweden)

    Vincent T van Hees

    Full Text Available Wrist-worn accelerometers are increasingly being used for the assessment of physical activity in population studies, but little is known about their value for sleep assessment. We developed a novel method of assessing sleep duration using data from 4,094 Whitehall II Study (United Kingdom, 2012-2013 participants aged 60-83 who wore the accelerometer for 9 consecutive days, filled in a sleep log and reported sleep duration via questionnaire. Our sleep detection algorithm defined (nocturnal sleep as a period of sustained inactivity, itself detected as the absence of change in arm angle greater than 5 degrees for 5 minutes or more, during a period recorded as sleep by the participant in their sleep log. The resulting estimate of sleep duration had a moderate (but similar to previous findings agreement with questionnaire based measures for time in bed, defined as the difference between sleep onset and waking time (kappa = 0.32, 95%CI:0.29,0.34 and total sleep duration (kappa = 0.39, 0.36,0.42. This estimate was lower for time in bed for women, depressed participants, those reporting more insomnia symptoms, and on weekend days. No such group differences were found for total sleep duration. Our algorithm was validated against data from a polysomnography study on 28 persons which found a longer time window and lower angle threshold to have better sensitivity to wakefulness, while the reverse was true for sensitivity to sleep. The novelty of our method is the use of a generic algorithm that will allow comparison between studies rather than a "count" based, device specific method.

  1. Creating multithemed ecological regions for macroscale ecology: Testing a flexible, repeatable, and accessible clustering method

    Science.gov (United States)

    Cheruvelil, Kendra Spence; Yuan, Shuai; Webster, Katherine E.; Tan, Pang-Ning; Lapierre, Jean-Francois; Collins, Sarah M.; Fergus, C. Emi; Scott, Caren E.; Norton Henry, Emily; Soranno, Patricia A.; Filstrup, Christopher T.; Wagner, Tyler

    2017-01-01

    Understanding broad-scale ecological patterns and processes often involves accounting for regional-scale heterogeneity. A common way to do so is to include ecological regions in sampling schemes and empirical models. However, most existing ecological regions were developed for specific purposes, using a limited set of geospatial features and irreproducible methods. Our study purpose was to: (1) describe a method that takes advantage of recent computational advances and increased availability of regional and global data sets to create customizable and reproducible ecological regions, (2) make this algorithm available for use and modification by others studying different ecosystems, variables of interest, study extents, and macroscale ecology research questions, and (3) demonstrate the power of this approach for the research question—How well do these regions capture regional-scale variation in lake water quality? To achieve our purpose we: (1) used a spatially constrained spectral clustering algorithm that balances geospatial homogeneity and region contiguity to create ecological regions using multiple terrestrial, climatic, and freshwater geospatial data for 17 northeastern U.S. states (~1,800,000 km2); (2) identified which of the 52 geospatial features were most influential in creating the resulting 100 regions; and (3) tested the ability of these ecological regions to capture regional variation in water nutrients and clarity for ~6,000 lakes. We found that: (1) a combination of terrestrial, climatic, and freshwater geospatial features influenced region creation, suggesting that the oft-ignored freshwater landscape provides novel information on landscape variability not captured by traditionally used climate and terrestrial metrics; and (2) the delineated regions captured macroscale heterogeneity in ecosystem properties not included in region delineation—approximately 40% of the variation in total phosphorus and water clarity among lakes was at the regional

  2. All ITO-based transparent resistive switching random access memory using oxygen doping method

    International Nuclear Information System (INIS)

    Kim, Hee-Dong; Yun, Min Ju; Kim, Sungho

    2015-01-01

    Recently, transparent memory would be useful in invisible electronics. In this work, for the first time we present a feasibility of stable unipolar resistive switching (RS) characteristics with reset current of sub-micron ampere for the fully transparent ITO/oxygen-doped ITO/ITO memory capacitors, i.e., all ITO structures, produced by sputtering method, which shows a high optical transmittance of approximately 80% in the visible region as well as near ultra-violet region. In addition, in a RS test to evaluate a reliability for the proposed memory devices, we observed a stable endurance of >100 cycles and a retention time of >10 4  s at 85 °C, with a current ratio of ∼10 2 to ∼10 3 . This result indicates that this transparent memory by engineering the amount of oxygen ions within the ITO films could be a milestone for future see-through electronic devices. - Highlights: • The resistive switching characteristics of the transparent ITO/O-doped ITO/ITO RRAM cells have investigated. • All ITO-based RRAM cell is achieved using oxygen doping method. • Good endurance and long retention time were observed.

  3. Quality assurance requirements and methods for high level waste package acceptability

    International Nuclear Information System (INIS)

    1992-12-01

    This document should serve as guidance for assigning the necessary items to control the conditioning process in such a way that waste packages are produced in compliance with the waste acceptance requirements. It is also provided to promote the exchange of information on quality assurance requirements and on the application of quality assurance methods associated with the production of high level waste packages, to ensure that these waste packages comply with the requirements for transportation, interim storage and waste disposal in deep geological formations. The document is intended to assist both the operators of conditioning facilities and repositories as well as national authorities and regulatory bodies, involved in the licensing of the conditioning of high level radioactive wastes or in the development of deep underground disposal systems. The document recommends the quality assurance requirements and methods which are necessary to generate data for these parameters identified in IAEA-TECDOC-560 on qualitative acceptance criteria, and indicates where and when the control methods can be applied, e.g. in the operation or commissioning of a process or in the development of a waste package design. Emphasis is on the control of the process and little reliance is placed on non-destructive or destructive testing. Qualitative criteria, relevant to disposal of high level waste, are repository dependent and are not addressed here. 37 refs, 3 figs, 2 tabs

  4. Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing

    Science.gov (United States)

    Dong, Yumin; Xiao, Shufen; Ma, Hongyang; Chen, Libo

    2016-12-01

    Cloud computing and big data have become the developing engine of current information technology (IT) as a result of the rapid development of IT. However, security protection has become increasingly important for cloud computing and big data, and has become a problem that must be solved to develop cloud computing. The theft of identity authentication information remains a serious threat to the security of cloud computing. In this process, attackers intrude into cloud computing services through identity authentication information, thereby threatening the security of data from multiple perspectives. Therefore, this study proposes a model for cloud computing protection and management based on quantum authentication, introduces the principle of quantum authentication, and deduces the quantum authentication process. In theory, quantum authentication technology can be applied in cloud computing for security protection. This technology cannot be cloned; thus, it is more secure and reliable than classical methods.

  5. Accessibility and sensory experiences

    DEFF Research Database (Denmark)

    Ryhl, Camilla

    2010-01-01

    and accessibility. Sensory accessibility accommodates aspects of a sensory disability and describes architectural design requirements needed to ensure access to architectural experiences. In the context of architecture accessibility has become a design concept of its own. It is generally described as ensuring...... physical access to the built environment by accommodating physical disabilities. While the existing concept of accessibility ensures the physical access of everyone to a given space, sensory accessibility ensures the choice of everyone to stay and be able to participate and experience....

  6. New tools and methods for direct programmatic access to the dbSNP relational database.

    Science.gov (United States)

    Saccone, Scott F; Quan, Jiaxi; Mehta, Gaurang; Bolze, Raphael; Thomas, Prasanth; Deelman, Ewa; Tischfield, Jay A; Rice, John P

    2011-01-01

    Genome-wide association studies often incorporate information from public biological databases in order to provide a biological reference for interpreting the results. The dbSNP database is an extensive source of information on single nucleotide polymorphisms (SNPs) for many different organisms, including humans. We have developed free software that will download and install a local MySQL implementation of the dbSNP relational database for a specified organism. We have also designed a system for classifying dbSNP tables in terms of common tasks we wish to accomplish using the database. For each task we have designed a small set of custom tables that facilitate task-related queries and provide entity-relationship diagrams for each task composed from the relevant dbSNP tables. In order to expose these concepts and methods to a wider audience we have developed web tools for querying the database and browsing documentation on the tables and columns to clarify the relevant relational structure. All web tools and software are freely available to the public at http://cgsmd.isi.edu/dbsnpq. Resources such as these for programmatically querying biological databases are essential for viably integrating biological information into genetic association experiments on a genome-wide scale.

  7. Analysis of rail welding methods for mine rail access with the use of modern technologies

    Science.gov (United States)

    Usoltsev, A. A.; Shevchenko, R. A.; Kozyrev, N. A.; Kriukov, R. E.; Shishkin, P. E.

    2017-09-01

    Welded joint zones are weak sections of the railway track for all traffic cases (in the case of high-speed traffic and heavy traffic). In the paper advantages and disadvantages of the basic ways of rails welding, which are widely used today, are considered: electrocontact and aluminothermic. Carefully selected mode of differentially thermally strengthened rails string will allow the process of correction after heat treatment to be minimized and internal residual compressive stresses to be kept. Particular attention should be paid to the method of rails welding, in which after rails welding during their cooling it is offered to perform quasi-isothermal exposure in the temperature range of fine structure formation by passing pulses of alternating electric current through the welded joint maintaining this temperature until the end of the transformation. The use of quasi-isothermal exposure at a temperature of 600 - 650 °C makes it possible to obtain a finely dispersed structure of the welded seam of rails without additional heat treatment.

  8. Access French

    CERN Document Server

    Grosz, Bernard

    2014-01-01

    Access is the major new language series designed with the needs of today's generation of students firmly in mind. Whether learning for leisure or business purposes or working towards a curriculum qualification, Access French is specially designed for adults of all ages and gives students a thorough grounding in all the skills required to understand, speak, read and write contemporary French from scratch. The coursebook consists of 10 units covering different topic areas, each of which includes Language Focus panels explaining the structures covered and a comprehensive glossary. Learning tips

  9. Access to Heart Transplantation: A Proper Analysis of the Competing Risks of Death and Transplantation Is Required to Optimize Graft Allocation.

    Science.gov (United States)

    Cantrelle, Christelle; Legeai, Camille; Latouche, Aurélien; Tuppin, Philippe; Jasseron, Carine; Sebbag, Laurent; Bastien, Olivier; Dorent, Richard

    2017-08-01

    Heart allocation systems are usually urgency-based, offering grafts to candidates at high risk of waitlist mortality. In the context of a revision of the heart allocation rules, we determined observed predictors of 1-year waitlist mortality in France, considering the competing risk of transplantation, to determine which candidate subgroups are favored or disadvantaged by the current allocation system. Patients registered on the French heart waitlist between 2010 and 2013 were included. Cox cause-specific hazards and Fine and Gray subdistribution hazards were used to determine candidate characteristics associated with waitlist mortality and access to transplantation. Of the 2053 candidates, 7 variables were associated with 1-year waitlist mortality by the Fine and Gray method including 4 candidate characteristics related to heart failure severity (hospitalization at listing, serum natriuretic peptide level, systolic pulmonary artery pressure, and glomerular filtration rate) and 3 characteristics not associated with heart failure severity but with lower access to transplantation (blood type, age, and body mass index). Observed waitlist mortality for candidates on mechanical circulatory support was like that of others. The heart allocation system strongly modifies the risk of pretransplant mortality related to heart failure severity. An in-depth competing risk analysis is therefore a more appropriate method to evaluate graft allocation systems. This knowledge should help to prioritize candidates in the context of a limited donor pool.

  10. An Innovative Method of Measuring Changes in Access to Healthful Foods in School Lunch Programs: Findings from a Pilot Evaluation.

    Directory of Open Access Journals (Sweden)

    Allison P Hawkes

    Full Text Available A large local health department in Colorado partnered with 15 school districts to develop an approach to evaluate changes in access to healthy foods in reimbursable school lunches and a la carte offerings.School district nutrition managers were engaged at the start of this project. Health department dietitians developed criteria to classify food items as "Lower Fat and less added Sugar" (LFS and "Higher Fat and more added Sugar" (HFS based on the percentage of calories from fat and grams of added sugar. Lunch production sheets were obtained for two time periods, food items and the number of planned servings recorded. LFS and HFS planned servings were summed for each time period, and a LFS to HFS ratio calculated by dividing LFS planned servings by HFS planned servings. Additional analyses included calculating LFS: HFS ratios by school district, and for a la carte offerings.In 2009, the LFS: HFS ratio was 2.08, in 2011, 3.71 (P<0.0001. The method also detected changes in ratios at the school district level. For a la carte items, in 2009 the ratio of LFS: HFS was 0.53, and in 2011, 0.61 (not statistically significant.This method detected an increase in the LFS: HFS ratio over time and demonstrated that the school districts improved access to healthful food/drink by changing the contents of reimbursable school lunches. The evaluation method discussed here can generate information that districts can use in helping sustain and expand their efforts to create healthier environments for children and adults. Although federal regulations now cover all food and beverages served during the school day, there are still opportunities to improve and measure changes in food served in other settings such as child care centers, youth correction facilities, or in schools not participating in the National School Lunch Program.

  11. Requisitos ambientais e acesso a mercados: o setor de defensivos agrícolas Environmental requirements and market access: the pesticide sector

    Directory of Open Access Journals (Sweden)

    Ricardo K.S. Fermam

    2008-12-01

    Full Text Available Os requisitos ambientais do comércio internacional são freqüentemente usados pelos países desenvolvidos como barreiras técnicas ao acesso a mercados pelos países em desenvolvimento. Conhecer estes requisitos é especialmente importante para o setor de defensivos agrícolas (pesticidas. Assim, este artigo busca identificar os principais requisitos ambientais relativos aos defensivos agrícolas, mostrando a importância dos mesmos para os comércio exterior dos países em desenvolvimento, especialmente o Brasil.The environmental requirements of the international trade are frequently used for the developed countries as technical barriers to the market access for the developing countries. To know these requirements is especially important for the sector of agricultural defensives (pesticides. Thus, this Article seeks to identify the main environmental requirements regards to the agricultural defensives, showing the importance of the same ones for the foreign trade of the developing countries, especially Brazil.

  12. Attending Physician Remote Access of the Electronic Health Record and Implications for Resident Supervision: A Mixed Methods Study.

    Science.gov (United States)

    Martin, Shannon K; Tulla, Kiara; Meltzer, David O; Arora, Vineet M; Farnan, Jeanne M

    2017-12-01

    Advances in information technology have increased remote access to the electronic health record (EHR). Concurrently, standards defining appropriate resident supervision have evolved. How often and under what circumstances inpatient attending physicians remotely access the EHR for resident supervision is unknown. We described a model of attending remote EHR use for resident supervision, and quantified the frequency and magnitude of use. Using a mixed methods approach, general medicine inpatient attendings were surveyed and interviewed about their remote EHR use. Frequency of use and supervisory actions were quantitatively examined via survey. Transcripts from semistructured interviews were analyzed using grounded theory to identify codes and themes. A total of 83% (59 of 71) of attendings participated. Fifty-seven (97%) reported using the EHR remotely, with 54 (92%) reporting they discovered new clinical information not relayed by residents via remote EHR use. A majority (93%, 55 of 59) reported that this resulted in management changes, and 54% (32 of 59) reported making immediate changes by contacting cross-covering teams. Six major factors around remote EHR use emerged: resident, clinical, educational, personal, technical, and administrative. Attendings described resident and clinical factors as facilitating "backstage" supervision via remote EHR use. In our study to assess attending remote EHR use for resident supervision, attendings reported frequent remote use with resulting supervisory actions, describing a previously uncharacterized form of "backstage" oversight supervision. Future work should explore best practices in remote EHR use to provide effective supervision and ultimately improve patient safety.

  13. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  14. Probabilistic Requirements (Partial) Verification Methods Best Practices Improvement. Variables Acceptance Sampling Calculators: Empirical Testing. Volume 2

    Science.gov (United States)

    Johnson, Kenneth L.; White, K. Preston, Jr.

    2012-01-01

    The NASA Engineering and Safety Center was requested to improve on the Best Practices document produced for the NESC assessment, Verification of Probabilistic Requirements for the Constellation Program, by giving a recommended procedure for using acceptance sampling by variables techniques as an alternative to the potentially resource-intensive acceptance sampling by attributes method given in the document. In this paper, the results of empirical tests intended to assess the accuracy of acceptance sampling plan calculators implemented for six variable distributions are presented.

  15. A hybrid 3D spatial access method based on quadtrees and R-trees for globe data

    Science.gov (United States)

    Gong, Jun; Ke, Shengnan; Li, Xiaomin; Qi, Shuhua

    2009-10-01

    3D spatial access method for globe data is very crucial technique for virtual earth. This paper presents a brand-new maintenance method to index 3d objects distributed on the whole surface of the earth, which integrates the 1:1,000,000- scale topographic map tiles, Quad-tree and R-tree. Furthermore, when traditional methods are extended into 3d space, the performance of spatial index deteriorates badly, for example 3D R-tree. In order to effectively solve this difficult problem, a new algorithm of dynamic R-tree is put forward, which includes two sub-procedures, namely node-choosing and node-split. In the node-choosing algorithm, a new strategy is adopted, not like the traditional mode which is from top to bottom, but firstly from bottom to top then from top to bottom. This strategy can effectively solve the negative influence of node overlap. In the node-split algorithm, 2-to-3 split mode substitutes the traditional 1-to-2 mode, which can better concern the shape and size of nodes. Because of the rational tree shape, this R-tree method can easily integrate the concept of LOD. Therefore, it will be later implemented in commercial DBMS and adopted in time-crucial 3d GIS system.

  16. A Method for and Issues Associated with the Determination of Space Suit Joint Requirements

    Science.gov (United States)

    Matty, Jennifer E.; Aitchison, Lindsay

    2009-01-01

    In the design of a new space suit it is necessary to have requirements that define what mobility space suit joints should be capable of achieving in both a system and at the component level. NASA elected to divide mobility into its constituent parts-range of motion (ROM) and torque- in an effort to develop clean design requirements that limit subject performance bias and are easily verified. Unfortunately, the measurement of mobility can be difficult to obtain. Current technologies, such as the Vicon motion capture system, allow for the relatively easy benchmarking of range of motion (ROM) for a wide array of space suit systems. The ROM evaluations require subjects in the suit to accurately evaluate the ranges humans can achieve in the suit. However, when it comes to torque, there are significant challenges for both benchmarking current performance and writing requirements for future suits. This is reflected in the fact that torque definitions have been applied to very few types of space suits and with limited success in defining all the joints accurately. This paper discussed the advantages and disadvantages to historical joint torque evaluation methods, describes more recent efforts directed at benchmarking joint torques of prototype space suits, and provides an outline for how NASA intends to address joint torque in design requirements for the Constellation Space Suit System (CSSS).

  17. A Computational Method based on Radio Frequency Technologies for the Analysis of Accessibility of Disabled People in Sustainable Cities

    Directory of Open Access Journals (Sweden)

    Virgilio Gilart-Iglesias

    2015-11-01

    Full Text Available The sustainability strategy in urban spaces arises from reflecting on how to achieve a more habitable city and is materialized in a series of sustainable transformations aimed at humanizing different environments so that they can be used and enjoyed by everyone without exception and regardless of their ability. Modern communication technologies allow new opportunities to analyze efficiency in the use of urban spaces from several points of view: adequacy of facilities, usability, and social integration capabilities. The research presented in this paper proposes a method to perform an analysis of movement accessibility in sustainable cities based on radio frequency technologies and the ubiquitous computing possibilities of the new Internet of Things paradigm. The proposal can be deployed in both indoor and outdoor environments to check specific locations of a city. Finally, a case study in a controlled context has been simulated to validate the proposal as a pre-deployment step in urban environments.

  18. A method for determining customer requirement weights based on TFMF and TLR

    Science.gov (United States)

    Ai, Qingsong; Shu, Ting; Liu, Quan; Zhou, Zude; Xiao, Zheng

    2013-11-01

    'Customer requirements' (CRs) management plays an important role in enterprise systems (ESs) by processing customer-focused information. Quality function deployment (QFD) is one of the main CRs analysis methods. Because CR weights are crucial for the input of QFD, we developed a method for determining CR weights based on trapezoidal fuzzy membership function (TFMF) and 2-tuple linguistic representation (TLR). To improve the accuracy of CR weights, we propose to apply TFMF to describe CR weights so that they can be appropriately represented. Because the fuzzy logic is not capable of aggregating information without loss, TLR model is adopted as well. We first describe the basic concepts of TFMF and TLR and then introduce an approach to compute CR weights. Finally, an example is provided to explain and verify the proposed method.

  19. Performance of methods for estimation of table beet water requirement in Alagoas

    Directory of Open Access Journals (Sweden)

    Daniella P. dos Santos

    Full Text Available ABSTRACT Optimization of water use in agriculture is fundamental, particularly in regions where water scarcity is intense, requiring the adoption of technologies that promote increased irrigation efficiency. The objective of this study was to evaluate evapotranspiration models and to estimate the crop coefficients of beet grown in a drainage lysimeter in the Agreste region of Alagoas. The experiment was conducted at the Campus of the Federal University of Alagoas - UFAL, in the municipality of Arapiraca, AL, between March and April 2014. Crop evapotranspiration (ETc was estimated in drainage lysimeters and reference evapotranspiration (ETo by Penman-Monteith-FAO 56 and Hargreaves-Samani methods. The Hargreaves-Samani method presented a good performance index for ETo estimation compared with the Penman-Monteith-FAO method, indicating that it is adequate for the study area. Beet ETc showed a cumulative demand of 202.11 mm for a cumulative reference evapotranspiration of 152.00 mm. Kc values determined using the Penman-Monteith-FAO 56 and Hargreaves-Samani methods were overestimated, in comparison to the Kc values of the FAO-56 standard method. With the obtained results, it is possible to correct the equations of the methods for the region, allowing for adequate irrigation management.

  20. Method for calculating required shielding in medical x-ray rooms

    International Nuclear Information System (INIS)

    Karppinen, J.

    1997-10-01

    The new annual radiation dose limits - 20 mSv (previously 50 mSv) for radiation workers and 1 mSv (previously 5 mSv) for other persons - implies that the adequacy of existing radiation shielding must be re-evaluated. In principle, one could assume that the thicknesses of old radiation shields should be increased by about one or two half-value layers in order to comply with the new dose limits. However, the assumptions made in the earlier shielding calculations are highly conservative; the required shielding was often determined by applying the maximum high-voltage of the x-ray tube for the whole workload. A more realistic calculation shows that increased shielding is typically not necessary if more practical x-ray tube voltages are used in the evaluation. We have developed a PC-based calculation method for calculating the x-ray shielding which is more realistic than the highly conservative method formerly used. The method may be used to evaluate an existing shield for compliance with new regulations. As examples of these calculations, typical x-ray rooms are considered. The lead and concrete thickness requirements as a function of x-ray tube voltage and workload are also given in tables. (author)

  1. Access 3 project protocol: young people and health system navigation in the digital age: a multifaceted, mixed methods study.

    Science.gov (United States)

    Kang, Melissa; Robards, Fiona; Sanci, Lena; Steinbeck, Katharine; Jan, Stephen; Hawke, Catherine; Kong, Marlene; Usherwood, Tim

    2017-08-07

    The integration of digital technology into everyday lives of young people has become widespread. It is not known whether and how technology influences barriers and facilitators to healthcare, and whether and how young people navigate between face-to-face and virtual healthcare. To provide new knowledge essential to policy and practice, we designed a study that would explore health system access and navigation in the digital age. The study objectives are to: (1) describe experiences of young people accessing and navigating the health system in New South Wales (NSW), Australia; (2) identify barriers and facilitators to healthcare for young people and how these vary between groups; (3) describe health system inefficiencies, particularly for young people who are marginalised; (4) provide policy-relevant knowledge translation of the research data. This mixed methods study has four parts, including: (1) a cross-sectional survey of young people (12-24 years) residing in NSW, Australia; (2) a longitudinal, qualitative study of a subsample of marginalised young people (defined as young people who: identify as Aboriginal and/or Torres Strait Islander; are experiencing homelessness; identify as sexuality and/or gender diverse; are of refugee or vulnerable migrant background; and/or live in rural or remote NSW); (3) interviews with professionals; (4) a knowledge translation forum. Ethics approvals were sought and granted. Data collection commenced in March 2016 and will continue until June 2017. This study will gather practice and policy-relevant intelligence about contemporary experiences of young people and health services, with a unique focus on five different groups of marginalised young people, documenting their experiences over time. Access 3 will explore navigation around all levels of the health system, determine whether digital technology is integrated into this, and if so how, and will translate findings into policy-relevant recommendations. © Article author(s) (or

  2. Central intake to improve access to physiotherapy for children with complex needs: a mixed methods case report.

    Science.gov (United States)

    Wittmeier, Kristy D M; Restall, Gayle; Mulder, Kathy; Dufault, Brenden; Paterson, Marie; Thiessen, Matthew; Lix, Lisa M

    2016-08-31

    Children with complex needs can face barriers to system access and navigation related to their need for multiple services and healthcare providers. Central intake for pediatric rehabilitation was developed and implemented in 2008 in Winnipeg Manitoba Canada as a means to enhance service coordination and access for children and their families. This study evaluates the process and impact of implementing a central intake system, using pediatric physiotherapy as a case example. A mixed methods instrumental case study design was used. Interviews were completed with 9 individuals. Data was transcribed and analyzed for themes. Quantitative data (wait times, referral volume and caregiver satisfaction) was collected for children referred to physiotherapy with complex needs (n = 1399), and a comparison group of children referred for orthopedic concerns (n = 3901). Wait times were analyzed using the Kruskal-Wallis test, caregiver satisfaction was analyzed using Fisher exact test and change point modeling was applied to examine referral volume over the study period. Interview participants described central intake implementation as creating more streamlined processes. Factors that facilitated successful implementation included 1) agreement among stakeholders, 2) hiring of a central intake coordinator, 3) a financial commitment from the government and 4) leadership at the individual and organization level. Mean (sd) wait times improved for children with complex needs (12.3(13.1) to 8.0(6.9) days from referral to contact with family, p physiotherapy (i.e., decreasing wait times) for families of children with complex needs. Future research is needed to build on this single discipline case study approach to examine changes in wait times, therapy coordination and stakeholder satisfaction within the context of continuing improvements for pediatric therapy services within the province.

  3. Evaluation of methods to estimate the essential amino acids requirements of fish from the muscle amino acid profile

    Directory of Open Access Journals (Sweden)

    Álvaro José de Almeida Bicudo

    2014-03-01

    Full Text Available Many methods to estimate amino acid requirement based on amino acid profile of fish have been proposed. This study evaluates the methodology proposed by Meyer & Fracalossi (2005 and by Tacon (1989 to estimate amino acids requirement of fish, which do exempt knowledge on previous nutritional requirement of reference amino acid. Data on amino acid requirement of pacu, Piaractus mesopotamicus, were used to validate de accuracy of those methods. Meyer & Fracalossi's and Tacon's methodology estimated the lysine requirement of pacu, respectively, at 13 and 23% above requirement determined using dose-response method. The values estimated by both methods lie within the range of requirements determined for other omnivorous fish species, the Meyer & Fracalossi (2005 method showing better accuracy.

  4. Access to a polymerase chain reaction assay method targeting 13 respiratory viruses can reduce antibiotics: a randomised, controlled trial

    Directory of Open Access Journals (Sweden)

    Lindh Magnus

    2011-04-01

    Full Text Available Abstract Background Viral respiratory infections are common worldwide and range from completely benign disease to life-threatening illness. Symptoms can be unspecific, and an etiologic diagnosis is rarely established because of a lack of suitable diagnostic tools. Improper use of antibiotics is common in this setting, which is detrimental in light of the development of bacterial resistance. It has been suggested that the use of diagnostic tests could reduce antibiotic prescription rates. The objective of this study was to evaluate whether access to a multiplex polymerase chain reaction (PCR assay panel for etiologic diagnosis of acute respiratory tract infections (ARTIs would have an impact on antibiotic prescription rate in primary care clinical settings. Methods Adult patients with symptoms of ARTI were prospectively included. Nasopharyngeal and throat swabs were analysed by using a multiplex real-time PCR method targeting thirteen viruses and two bacteria. Patients were recruited at 12 outpatient units from October 2006 through April 2009, and samples were collected on the day of inclusion (initial visit and after 10 days (follow-up visit. Patients were randomised in an open-label treatment protocol to receive a rapid or delayed result (on the following day or after eight to twelve days. The primary outcome measure was the antibiotic prescription rate at the initial visit, and the secondary outcome was the total antibiotic prescription rate during the study period. Results A total sample of 447 patients was randomised. Forty-one were excluded, leaving 406 patients for analysis. In the group of patients randomised for a rapid result, 4.5% (9 of 202 of patients received antibiotics at the initial visit, compared to 12.3% (25 of 204 (P = 0.005 of patients in the delayed result group. At follow-up, there was no significant difference between the groups: 13.9% (28 of 202 in the rapid result group and 17.2% (35 of 204 in the delayed result group (P

  5. Process qualification and control in electron beams--requirements, methods, new concepts and challenges

    International Nuclear Information System (INIS)

    Mittendorfer, J.; Gratzl, F.; Hanis, D.

    2004-01-01

    In this paper the status of process qualification and control in electron beam irradiation is analyzed in terms of requirements, concepts, methods and challenges for a state-of-the-art process control concept for medical device sterilization. Aspects from process qualification to routine process control are described together with the associated process variables. As a case study the 10 MeV beams at Mediscan GmbH are considered. Process control concepts like statistical process control (SPC) and a new concept to determine process capability is briefly discussed

  6. Flood control design requirements and flood evaluation methods of inland nuclear power plant

    International Nuclear Information System (INIS)

    Zhang Ailing; Wang Ping; Zhu Jingxing

    2011-01-01

    Effect of flooding is one of the key safety factors and environmental factors in inland nuclear power plant sitting. Up to now, the rule of law and standard systems are established for the selection of nuclear power plant location and flood control requirements in China. In this paper flood control standards of China and other countries are introduced. Several inland nuclear power plants are taken as examples to thoroughly discuss the related flood evaluation methods. The suggestions are also put forward in the paper. (authors)

  7. Access to Money and Relation to Women’s Use of Family Planning Methods among Young Married Women in Rural India

    Science.gov (United States)

    Reed, Elizabeth; Donta, Balaiah; Dasgupta, Anindita; Ghule, Mohan; Battala, Madhusudana; Nair, Saritha; Silverman, Jay; Jadhav, Arun; Palaye, Prajakta; Saggurti, Niranjan; Raj, Anita

    2016-01-01

    Objectives The social positioning (i.e. social status and autonomy) of women in the household facilitates women’s access to and decision-making power related to family planning (FP). Women’s access to spending money, which may be an indicator of greater social positioning in the household, may also be greater among women who engage in income generating activities for their families, regardless of women’s status in the household. However, in both scenarios, access to money may independently afford greater opportunity to obtain family planning services among women. This study seeks to assess whether access to money is associated with FP outcomes independently of women’s social positioning in their households. Methods Using survey data from married couples in rural Maharashtra, India (n=855), crude and adjusted regression was used to assess women’s access to their own spending money in relation to past 3 month use of condoms and other forms of contraceptives (pills, injectables, intrauterine device). Results Access to money (59%) was associated with condom and other contraceptive use (AORs ranged: 1.5 – 1.8). These findings remained significant after adjusting for women’s FP decision-making power in the household and mobility to seek FP services. Conclusion While preliminary, findings suggest that access to money may increase women’s ability to obtain FP methods, even in contexts where social norms to support women’s power in FP decision-making may not be readily adopted. PMID:26971270

  8. A design method to assess the accessibility of light on PV cells in an arbitraty geometry by means of ambient occlusion

    NARCIS (Netherlands)

    Reinders, Angelina H.M.E.; Willeke, G.; Ossenbrink, H.

    2007-01-01

    A design method has been developed by which the accessibility of light on PV cells in an arbitrary geometry can be quickly visualized and quantified. Modelling of irradiance in this method is based on ambient occlusion, which indicates the likelihood of shading of object’s surfaces due to

  9. SB certification handout material requirements, test methods, responsibilities, and minimum classification levels for mixture-based specification for flexible base.

    Science.gov (United States)

    2012-10-01

    A handout with tables representing the material requirements, test methods, responsibilities, and minimum classification levels mixture-based specification for flexible base and details on aggregate and test methods employed, along with agency and co...

  10. Complementary role of two evaluation methods in the usability and accessibility evaluation of a non-standard system

    CSIR Research Space (South Africa)

    Adebesin, F

    2010-10-01

    Full Text Available and used by people with varying abilities. Although accessibility concerns are aimed at making systems usable for people with disabilities, support for direct accessibility, the built-in redundancies in an application that enable as many people as possible...

  11. A Novel Qualitative Method to Improve Access, Elicitation, and Sample Diversification for Enhanced Transferability Applied to Studying Chemistry Outreach

    Science.gov (United States)

    Pratt, Justin M.; Yezierski, Ellen J.

    2018-01-01

    Conducting qualitative research in any discipline warrants two actions: accessing participants and eliciting their ideas. In chemistry education research (CER), survey techniques have been used to increase access to participants and diversify samples. Interview tasks (such as card sorting, using demonstrations, and using simulations) have been…

  12. ChIPWig: a random access-enabling lossless and lossy compression method for ChIP-seq data.

    Science.gov (United States)

    Ravanmehr, Vida; Kim, Minji; Wang, Zhiying; Milenkovic, Olgica

    2018-03-15

    Chromatin immunoprecipitation sequencing (ChIP-seq) experiments are inexpensive and time-efficient, and result in massive datasets that introduce significant storage and maintenance challenges. To address the resulting Big Data problems, we propose a lossless and lossy compression framework specifically designed for ChIP-seq Wig data, termed ChIPWig. ChIPWig enables random access, summary statistics lookups and it is based on the asymptotic theory of optimal point density design for nonuniform quantizers. We tested the ChIPWig compressor on 10 ChIP-seq datasets generated by the ENCODE consortium. On average, lossless ChIPWig reduced the file sizes to merely 6% of the original, and offered 6-fold compression rate improvement compared to bigWig. The lossy feature further reduced file sizes 2-fold compared to the lossless mode, with little or no effects on peak calling and motif discovery using specialized NarrowPeaks methods. The compression and decompression speed rates are of the order of 0.2 sec/MB using general purpose computers. The source code and binaries are freely available for download at https://github.com/vidarmehr/ChIPWig-v2, implemented in C ++. milenkov@illinois.edu. Supplementary data are available at Bioinformatics online.

  13. Genetic relationships among wild and cultivated accessions of curry leaf plant (Murraya koenigii (L.) Spreng.), as revealed by DNA fingerprinting methods.

    Science.gov (United States)

    Verma, Sushma; Rana, T S

    2013-02-01

    Murraya koenigii (L.) Spreng. (Rutaceae), is an aromatic plant and much valued for its flavor, nutritive and medicinal properties. In this study, three DNA fingerprinting methods viz., random amplification of polymorphic DNA (RAPD), directed amplification of minisatellite DNA (DAMD), and inter-simple sequence repeat (ISSR), were used to unravel the genetic variability and relationships across 92 wild and cultivated M. koenigii accessions. A total of 310, 102, and 184, DNA fragments were amplified using 20 RAPD, 5 DAMD, and 13 ISSR primers, revealing 95.80, 96.07, and 96.73% polymorphism, respectively, across all accessions. The average polymorphic information content value obtained with RAPD, DAMD, and ISSR markers was 0.244, 0.250, and 0.281, respectively. The UPGMA tree, based on Jaccard's similarity coefficient generated from the cumulative (RAPD, DAMD, and ISSR) band data showed two distinct clusters, clearly separating wild and cultivated accessions in the dendrogram. Percentage polymorphism, gene diversity (H), and Shannon information index (I) estimates were higher in cultivated accessions compared to wild accessions. The overall high level of polymorphism and varied range of genetic distances revealed a wide genetic base in M. koenigii accessions. The study suggests that RAPD, DAMD, and ISSR markers are highly useful to unravel the genetic variability in wild and cultivated accessions of M. koenigii.

  14. A new spinning reserve requirement forecast method for deregulated electricity markets

    International Nuclear Information System (INIS)

    Amjady, Nima; Keynia, Farshid

    2010-01-01

    Ancillary services are necessary for maintaining the security and reliability of power systems and constitute an important part of trade in competitive electricity markets. Spinning Reserve (SR) is one of the most important ancillary services for saving power system stability and integrity in response to contingencies and disturbances that continuously occur in the power systems. Hence, an accurate day-ahead forecast of SR requirement helps the Independent System Operator (ISO) to conduct a reliable and economic operation of the power system. However, SR signal has complex, non-stationary and volatile behavior along the time domain and depends greatly on system load. In this paper, a new hybrid forecast engine is proposed for SR requirement prediction. The proposed forecast engine has an iterative training mechanism composed of Levenberg-Marquadt (LM) learning algorithm and Real Coded Genetic Algorithm (RCGA), implemented on the Multi-Layer Perceptron (MLP) neural network. The proposed forecast methodology is examined by means of real data of Pennsylvania-New Jersey-Maryland (PJM) electricity market and the California ISO (CAISO) controlled grid. The obtained forecast results are presented and compared with those of the other SR forecast methods. (author)

  15. A new spinning reserve requirement forecast method for deregulated electricity markets

    Energy Technology Data Exchange (ETDEWEB)

    Amjady, Nima; Keynia, Farshid [Department of Electrical Engineering, Semnan University, Semnan (Iran)

    2010-06-15

    Ancillary services are necessary for maintaining the security and reliability of power systems and constitute an important part of trade in competitive electricity markets. Spinning Reserve (SR) is one of the most important ancillary services for saving power system stability and integrity in response to contingencies and disturbances that continuously occur in the power systems. Hence, an accurate day-ahead forecast of SR requirement helps the Independent System Operator (ISO) to conduct a reliable and economic operation of the power system. However, SR signal has complex, non-stationary and volatile behavior along the time domain and depends greatly on system load. In this paper, a new hybrid forecast engine is proposed for SR requirement prediction. The proposed forecast engine has an iterative training mechanism composed of Levenberg-Marquadt (LM) learning algorithm and Real Coded Genetic Algorithm (RCGA), implemented on the Multi-Layer Perceptron (MLP) neural network. The proposed forecast methodology is examined by means of real data of Pennsylvania-New Jersey-Maryland (PJM) electricity market and the California ISO (CAISO) controlled grid. The obtained forecast results are presented and compared with those of the other SR forecast methods. (author)

  16. "They just scraped off the calluses": a mixed methods exploration of foot care access and provision for people with rheumatoid arthritis in south-western Sydney, Australia.

    Science.gov (United States)

    Hendry, Gordon J; Gibson, Kathryn A; Pile, Kevin; Taylor, Luke; Du Toit, Verona; Burns, Joshua; Rome, Keith

    2013-08-13

    There is little indication that foot health services in Australia are meeting modern day recommendations for Rheumatoid Arthritis (RA) patients. The overall objective of this study was to explore the current state of foot health services for patients with RA with an emphasis on identifying barriers to the receipt of appropriate foot care in South-West Sydney, New South Wales, Australia. A mixed (quantitative and qualitative) approach was adopted. Indications for appropriate access to foot care were determined by comparing the foot health, disease and socio-demographic characteristics of patients with unmet foot care demands, foot care users and patients with no demands for foot care. Perceptions of provision of, and access to, foot care were explored by conducting telephone-based interviews using an interpretative phenomenology approach with thematic analysis. Twenty-nine participants took part in the cross-sectional quantitative research study design, and 12 participants took part in the interpretative phenomenological approach (qualitative study). Foot care access appeared to be driven predominantly by the presence of rearfoot deformity, which was significantly worse amongst participants in the foot care user group (p = 0.02). Five main themes emerged from the qualitative data: 1) impact of disease-related foot symptoms, 2) footwear difficulties, 3) medical/rheumatology encounters, 4) foot and podiatry care access and experiences, and 5) financial hardship. Foot care provision does not appear to be driven by appropriate foot health characteristics such as foot pain or foot-related disability. There may be significant shortfalls in footwear and foot care access and provision in Greater Western Sydney. Several barriers to adequate foot care access and provision were identified and further efforts are required to improve access to and the quality of foot care for people who have RA. Integration of podiatry services within rheumatology centres could resolve unmet

  17. Comparing the perception with the reality of walking in a hilly environment: an accessibility method applied to a University campus in Hong Kong

    Directory of Open Access Journals (Sweden)

    Guibo Sun

    2015-05-01

    Full Text Available The influence of hilliness on walking behavior could be a consequence of the real effect of the local topography, but individual perception of the difficulties associated with walking in a hilly environment may also be important. Previous studies have found that people’s perceptions do not necessarily match well with the realities of walking in hilly environments. There are a few methods that can be used to visualize the geography of that difference for use by urban planners and public health practitioners. A walking accessibility measure that allows comparison of perception and reality is proposed and implemented in this study. We note that difficulties in calculating accessibility measures in the present context arise primarily from problems with data quality, three-dimensional pedestrian network modelling and the adequacy of accessibility methods for describing and predicting walking behavior. We present practical strategies for addressing these issues using geographic information systems. Our method is illustrated by calculating accessibility for a hilly university campus in Hong Kong. Walking behaviors on, and people’s perceptions of, this hilly environment were obtained through walking diaries and a survey. The article concludes with suggested directions for the future development of walking accessibility measures along with some ideas about their applicability to the practice of planning and designing a walkable environment.

  18. Content and in-vitro accessibility of pro-vitamin A carotenoids from Sri Lankan cooked non-leafy vegetables and their estimated contribution to vitamin A requirement.

    Science.gov (United States)

    Priyadarshani, A M B; Chandrika, U G

    2007-12-01

    Vitamin A deficiency is a public health problem in Sri Lanka, which affects especially pre-school children. Carrots (Daucus carota), pumpkins (Cucurbita maxima), squashes (Cucurbita moschata) and sweet potatoes (Ipomoea batatas) of orange, yellow-fleshed varieties are good sources of provitamin A carotenoids, but have not been studied in Sri Lanka in terms of the food as eaten. The content of carotenoids in each preparation method and the in-vitro accessibility of beta-carotene and alpha-carotene were determined by high-performance liquid chromatography. The in-vitro method simulates the conditions in the human intestinal tract. The mean contents in dry weight (DW) in different carrot preparations ranged from 406.7 to 456.3, from 183.7 to 213.5 and from 29.0 to 39.6 microg/g for beta-carotene, alpha-carotene and lutein, respectively. The content of carotenoids in different pumpkin preparations varied from 282.1 to 294.4 microg/g DW for beta-carotene, from 155.6 to 157.7 microg/g DW for alpha-carotene and from 218.0 to 228.2 microg/g DW for lutein. The squashes preparation had 44.6 and 40.0 microg/g DW for beta-carotene and alpha-carotene, respectively, and in sweet potatoes beta-carotene ranged from 204.3 to 210.3 microg/g DW. The results showed that the contribution to the recommended daily allowance is greater when these vegetables are prepared as a curry with coconut milk. The percentage contribution to recommended daily allowance from each vegetable cooked with coconut milk was 46.7, 21.8, 1.2 and 10.8 for carrots, pumpkins, squashes and sweet potatoes, respectively.

  19. A method to implement fine-grained access control for personal health records through standard relational database queries.

    Science.gov (United States)

    Sujansky, Walter V; Faus, Sam A; Stone, Ethan; Brennan, Patricia Flatley

    2010-10-01

    Online personal health records (PHRs) enable patients to access, manage, and share certain of their own health information electronically. This capability creates the need for precise access-controls mechanisms that restrict the sharing of data to that intended by the patient. The authors describe the design and implementation of an access-control mechanism for PHR repositories that is modeled on the eXtensible Access Control Markup Language (XACML) standard, but intended to reduce the cognitive and computational complexity of XACML. The authors implemented the mechanism entirely in a relational database system using ANSI-standard SQL statements. Based on a set of access-control rules encoded as relational table rows, the mechanism determines via a single SQL query whether a user who accesses patient data from a specific application is authorized to perform a requested operation on a specified data object. Testing of this query on a moderately large database has demonstrated execution times consistently below 100ms. The authors include the details of the implementation, including algorithms, examples, and a test database as Supplementary materials. Copyright © 2010 Elsevier Inc. All rights reserved.

  20. Application of spatial methods to identify areas with lime requirement in eastern Croatia

    Science.gov (United States)

    Bogunović, Igor; Kisic, Ivica; Mesic, Milan; Zgorelec, Zeljka; Percin, Aleksandra; Pereira, Paulo

    2016-04-01

    With more than 50% of acid soils in all agricultural land in Croatia, soil acidity is recognized as a big problem. Low soil pH leads to a series of negative phenomena in plant production and therefore as a compulsory measure for reclamation of acid soils is liming, recommended on the base of soil analysis. The need for liming is often erroneously determined only on the basis of the soil pH, because the determination of cation exchange capacity, the hydrolytic acidity and base saturation is a major cost to producers. Therefore, in Croatia, as well as some other countries, the amount of liming material needed to ameliorate acid soils is calculated by considering their hydrolytic acidity. For this research, several interpolation methods were tested to identify the best spatial predictor of hidrolitic acidity. The purpose of this study was to: test several interpolation methods to identify the best spatial predictor of hidrolitic acidity; and to determine the possibility of using multivariate geostatistics in order to reduce the number of needed samples for determination the hydrolytic acidity, all with an aim that the accuracy of the spatial distribution of liming requirement is not significantly reduced. Soil pH (in KCl) and hydrolytic acidity (Y1) is determined in the 1004 samples (from 0-30 cm) randomized collected in agricultural fields near Orahovica in eastern Croatia. This study tested 14 univariate interpolation models (part of ArcGIS software package) in order to provide most accurate spatial map of hydrolytic acidity on a base of: all samples (Y1 100%), and the datasets with 15% (Y1 85%), 30% (Y1 70%) and 50% fewer samples (Y1 50%). Parallel to univariate interpolation methods, the precision of the spatial distribution of the Y1 was tested by the co-kriging method with exchangeable acidity (pH in KCl) as a covariate. The soils at studied area had an average pH (KCl) 4,81, while the average Y1 10,52 cmol+ kg-1. These data suggest that liming is necessary

  1. EPICS: Channel Access security design

    International Nuclear Information System (INIS)

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer's interface is given. Security protocol is described and finally aids for reading the access security code are provided

  2. Using shared goal setting to improve access and equity: a mixed methods study of the Good Goals intervention in children’s occupational therapy

    Directory of Open Access Journals (Sweden)

    Kolehmainen Niina

    2012-08-01

    Full Text Available Abstract Background Access and equity in children’s therapy services may be improved by directing clinicians’ use of resources toward specific goals that are important to patients. A practice-change intervention (titled ‘Good Goals’ was designed to achieve this. This study investigated uptake, adoption, and possible effects of that intervention in children’s occupational therapy services. Methods Mixed methods case studies (n = 3 services, including 46 therapists and 558 children were conducted. The intervention was delivered over 25 weeks through face-to-face training, team workbooks, and ‘tools for change’. Data were collected before, during, and after the intervention on a range of factors using interviews, a focus group, case note analysis, routine data, document analysis, and researchers’ observations. Results Factors related to uptake and adoptions were: mode of intervention delivery, competing demands on therapists’ time, and leadership by service manager. Service managers and therapists reported that the intervention: helped therapists establish a shared rationale for clinical decisions; increased clarity in service provision; and improved interactions with families and schools. During the study period, therapists’ behaviours changed: identifying goals, odds ratio 2.4 (95% CI 1.5 to 3.8; agreeing goals, 3.5 (2.4 to 5.1; evaluating progress, 2.0 (1.1 to 3.5. Children’s LoT decreased by two months [95% CI −8 to +4 months] across the services. Cost per therapist trained ranged from £1,003 to £1,277, depending upon service size and therapists’ salary bands. Conclusions Good Goals is a promising quality improvement intervention that can be delivered and adopted in practice and may have benefits. Further research is required to evaluate its: (i impact on patient outcomes, effectiveness, cost-effectiveness, and (ii transferability to other clinical contexts.

  3. Broadband Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Broadband Access. Worldwide market for broadband access $30 Billion! Over 200 million broadband subscribers worldwide! Various Competing Broadband access. Digital Subscriber line; Wireless; Optical Fiber.

  4. Access 2010 Programmer's Reference

    CERN Document Server

    Hennig, Teresa; Griffith, Geoffrey L

    2010-01-01

    A comprehensive guide to programming for Access 2010 and 2007. Millions of people use the Access database applications, and hundreds of thousands of developers work with Access daily. Access 2010 brings better integration with SQL Server and enhanced XML support; this Wrox guide shows developers how to take advantage of these and other improvements. With in-depth coverage of VBA, macros, and other programming methods for building Access applications, this book also provides real-world code examples to demonstrate each topic.: Access is the leading database that is used worldwide; While VBA rem

  5. Open access and beyond

    Directory of Open Access Journals (Sweden)

    Das Chhaya

    2006-09-01

    Full Text Available Abstract Uncensored exchange of scientific results hastens progress. Open Access does not stop at the removal of price and permission barriers; still, censorship and reading disabilities, to name a few, hamper access to information. Here, we invite the scientific community and the public to discuss new methods to distribute, store and manage literature in order to achieve unfettered access to literature.

  6. Using Geographic Information Systems and Spatial Analysis Methods to Assess Household Water Access and Sanitation Coverage in the SHINE Trial.

    Science.gov (United States)

    Ntozini, Robert; Marks, Sara J; Mangwadu, Goldberg; Mbuya, Mduduzi N N; Gerema, Grace; Mutasa, Batsirai; Julian, Timothy R; Schwab, Kellogg J; Humphrey, Jean H; Zungu, Lindiwe I

    2015-12-15

    Access to water and sanitation are important determinants of behavioral responses to hygiene and sanitation interventions. We estimated cluster-specific water access and sanitation coverage to inform a constrained randomization technique in the SHINE trial. Technicians and engineers inspected all public access water sources to ascertain seasonality, function, and geospatial coordinates. Households and water sources were mapped using open-source geospatial software. The distance from each household to the nearest perennial, functional, protected water source was calculated, and for each cluster, the median distance and the proportion of households within 1500 m of such a water source. Cluster-specific sanitation coverage was ascertained using a random sample of 13 households per cluster. These parameters were included as covariates in randomization to optimize balance in water and sanitation access across treatment arms at the start of the trial. The observed high variability between clusters in both parameters suggests that constraining on these factors was needed to reduce risk of bias. © The Author 2015. Published by Oxford University Press for the Infectious Diseases Society of America.

  7. Piloting the use of indigenous methods to prevent Nipah virus infection by interrupting bats' access to date palm sap in Bangladesh.

    Science.gov (United States)

    Nahar, Nazmun; Mondal, Utpal Kumar; Sultana, Rebeca; Hossain, M Jahangir; Khan, M Salah Uddin; Gurley, Emily S; Oliveras, Elizabeth; Luby, Stephen P

    2013-09-01

    People in Bangladesh frequently drink fresh date palm sap. Fruit bats (Pteropus giganteus) also drink raw sap and may contaminate the sap by shedding Nipah virus through saliva and urine. In a previous study we identified two indigenous methods to prevent bats accessing the sap, bamboo skirts and lime (calcium carbonate). We conducted a pilot study to assess the acceptability of these two methods among sap harvesters. We used interactive community meetings and group discussions to encourage all the sap harvesters (n = 12) from a village to use either bamboo skirts or lime smear that some of them (n = 4) prepared and applied. We measured the preparation and application time and calculated the cost of bamboo skirts. We conducted interviews after the use of each method. The sap harvesters found skirts effective in preventing bats from accessing sap. They were sceptical that lime would be effective as the lime was washed away by the sap flow. Preparation of the skirt took ∼105 min. The application of each method took ∼1 min. The cost of the bamboo skirt is minimal because bamboo is widely available and they made the skirts with pieces of used bamboo. The bamboo skirt method appeared practical and affordable to the sap harvesters. Further studies should explore its ability to prevent bats from accessing date palm sap and assess if its use produces more or better quality sap, which would provide further incentives to make it more acceptable for its regular use.

  8. Characterization of coded random access with compressive sensing based multi user detection

    DEFF Research Database (Denmark)

    Ji, Yalei; Stefanovic, Cedomir; Bockelmann, Carsten

    2014-01-01

    The emergence of Machine-to-Machine (M2M) communication requires new Medium Access Control (MAC) schemes and physical (PHY) layer concepts to support a massive number of access requests. The concept of coded random access, introduced recently, greatly outperforms other random access methods...... coded random access with CS-MUD on the PHY layer and show very promising results for the resulting protocol....

  9. “They just scraped off the calluses”: a mixed methods exploration of foot care access and provision for people with rheumatoid arthritis in south-western Sydney, Australia

    Science.gov (United States)

    2013-01-01

    Background There is little indication that foot health services in Australia are meeting modern day recommendations for Rheumatoid Arthritis (RA) patients. The overall objective of this study was to explore the current state of foot health services for patients with RA with an emphasis on identifying barriers to the receipt of appropriate foot care in South-West Sydney, New South Wales, Australia. Methods A mixed (quantitative and qualitative) approach was adopted. Indications for appropriate access to foot care were determined by comparing the foot health, disease and socio-demographic characteristics of patients with unmet foot care demands, foot care users and patients with no demands for foot care. Perceptions of provision of, and access to, foot care were explored by conducting telephone-based interviews using an interpretative phenomenology approach with thematic analysis. Results Twenty-nine participants took part in the cross-sectional quantitative research study design, and 12 participants took part in the interpretative phenomenological approach (qualitative study). Foot care access appeared to be driven predominantly by the presence of rearfoot deformity, which was significantly worse amongst participants in the foot care user group (p = 0.02). Five main themes emerged from the qualitative data: 1) impact of disease-related foot symptoms, 2) footwear difficulties, 3) medical/rheumatology encounters, 4) foot and podiatry care access and experiences, and 5) financial hardship. Conclusions Foot care provision does not appear to be driven by appropriate foot health characteristics such as foot pain or foot-related disability. There may be significant shortfalls in footwear and foot care access and provision in Greater Western Sydney. Several barriers to adequate foot care access and provision were identified and further efforts are required to improve access to and the quality of foot care for people who have RA. Integration of podiatry services within

  10. Facilitators and barriers to accessing reproductive health care for migrant beer promoters in Cambodia, Laos, Thailand and Vietnam: A mixed methods study

    Science.gov (United States)

    2012-01-01

    Background The purpose of the research was to assess access to sexual and reproductive health services for migrant women who work as beer promoters. This mixed methods research was conducted in Phnom Penh, Cambodia, Bangkok, Thailand, Vientiane, Laos, and Hanoi, Vietnam during 2010 to 2011. Methods Focus groups were held with beer promoters and separate focus groups or interviews with key informants to explore the factors affecting beer promoters’ access to health care institutions for reproductive health care. The findings of the focus groups were used to develop a survey for beer promoters. This survey was conducted in popular health institutions for these women in each of the four Asian cities. Results Several common themes were evident. Work demands prevented beer promoters from accessing health care. Institutional factors affecting care included cost, location, environmental factors (e.g. waiting times, cleanliness and confidentiality) and service factors (e.g. staff attitudes, clinic hours, and availability of medications). Personal factors affecting access were shyness and fear, lack of knowledge, and support from family and friends. The survey of the beer promoters confirmed that cost, location and both environmental and service factors impact on access to health care services for beer promoters. Many beer promoters are sexually active, and a significant proportion of those surveyed rely on sex work to supplement their income. Many also drink with their clients. Despite a few differences amongst the surveyed population, the findings were remarkably similar across the four research sites. Conclusions Recommendations from the research include the provision of evening and weekend clinic hours to facilitate access, free or low cost clinics, and health insurance through employer or government plans which are easy to access for migrants. Other improvements that would facilitate the access of beer promoters to these services include increased funding to hire

  11. Facilitators and barriers to accessing reproductive health care for migrant beer promoters in Cambodia, Laos, Thailand and Vietnam: A mixed methods study

    Directory of Open Access Journals (Sweden)

    Webber Gail

    2012-07-01

    Full Text Available Abstract Background The purpose of the research was to assess access to sexual and reproductive health services for migrant women who work as beer promoters. This mixed methods research was conducted in Phnom Penh, Cambodia, Bangkok, Thailand, Vientiane, Laos, and Hanoi, Vietnam during 2010 to 2011. Methods Focus groups were held with beer promoters and separate focus groups or interviews with key informants to explore the factors affecting beer promoters’ access to health care institutions for reproductive health care. The findings of the focus groups were used to develop a survey for beer promoters. This survey was conducted in popular health institutions for these women in each of the four Asian cities. Results Several common themes were evident. Work demands prevented beer promoters from accessing health care. Institutional factors affecting care included cost, location, environmental factors (e.g. waiting times, cleanliness and confidentiality and service factors (e.g. staff attitudes, clinic hours, and availability of medications. Personal factors affecting access were shyness and fear, lack of knowledge, and support from family and friends. The survey of the beer promoters confirmed that cost, location and both environmental and service factors impact on access to health care services for beer promoters. Many beer promoters are sexually active, and a significant proportion of those surveyed rely on sex work to supplement their income. Many also drink with their clients. Despite a few differences amongst the surveyed population, the findings were remarkably similar across the four research sites. Conclusions Recommendations from the research include the provision of evening and weekend clinic hours to facilitate access, free or low cost clinics, and health insurance through employer or government plans which are easy to access for migrants. Other improvements that would facilitate the access of beer promoters to these services include

  12. A qualitative study examining methods of accessing and identifying research relevant to clinical practice among rehabilitation clinicians.

    Science.gov (United States)

    Patel, Drasti; Koehmstedt, Christine; Jones, Rebecca; Coffey, Nathan T; Cai, Xinsheng; Garfinkel, Steven; Shaewitz, Dahlia M; Weinstein, Ali A

    2017-01-01

    Research examining the utilization of evidence-based practice (EBP) specifically among rehabilitation clinicians is limited. The objective of this study was to examine how various rehabilitative clinicians including physical therapists, occupational therapists, rehabilitation counselors, and physiatrists are gaining access to literature and whether they are able to implement the available research into practice. A total of 21 total clinicians were interviewed via telephone. Using NVivo, a qualitative analysis of the responses was performed. There were similarities found with respect to the information-seeking behaviors and translation of research across the different clinician types. Lack of time was reported to be a barrier for both access to literature and implementation of research across all clinician types. The majority of clinicians who reported having difficulty with utilizing the published literature indicated that the literature was not applicable to their practice, the research was not specific enough to be put into practice, or the research found was too outdated to be relevant. In addition, having a supportive work environment aided in the search and utilization of research through providing resources central to assisting clinicians in gaining access to health information. Our study identified several barriers that affect EBP for rehabilitation clinicians. The findings suggest the need for researchers to ensure that their work is applicable and specific to clinical practice for implementation to occur.

  13. Appropriate statistical methods are required to assess diagnostic tests for replacement, add-on, and triage

    NARCIS (Netherlands)

    Hayen, Andrew; Macaskill, Petra; Irwig, Les; Bossuyt, Patrick

    2010-01-01

    To explain which measures of accuracy and which statistical methods should be used in studies to assess the value of a new binary test as a replacement test, an add-on test, or a triage test. Selection and explanation of statistical methods, illustrated with examples. Statistical methods for

  14. Review of data requirements for groundwater flow and solute transport modelling and the ability of site investigation methods to meet these requirements

    International Nuclear Information System (INIS)

    McEwen, T.J.; Chapman, N.A.; Robinson, P.C.

    1990-08-01

    This report describes the data requirements for the codes that may be used in the modelling of groundwater flow and radionuclide transport during the assessment of a Nirex site for the deep disposal of low and intermediate level radioactive waste and also the site investigation methods that exist to supply the data for these codes. The data requirements for eight codes are reviewed, with most emphasis on three of the more significant codes, VANDAL, NAMMU and CHEMTARD. The largest part of the report describes and discusses the site investigation techniques and each technique is considered in terms of its ability to provide the data necessary to characterise the geological and hydrogeological environment around a potential repository. (author)

  15. Open Access @ DTU

    DEFF Research Database (Denmark)

    Ekstrøm, Jeannette

    Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all peer review...... articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access and related topics...... such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc....

  16. Reported Design Processes for Accessibility in Rail Transport

    DEFF Research Database (Denmark)

    Herriott, Richard; Cook, Sharon

    2014-01-01

    requirements with the aim of maximising accessibility in products and services. A review of ID literature has mainly developed in the arena of product design and design for assistive technology. Accessibility is a fundamental requirement in public transport (PT) yet there exists little research on design...... for accessibility or ID in this area. How is accessibility and the needs of users accounted for in rail transport design? This paper analyses interviews with rolling stock producers, operators and design consultancies. These conducted to determine if ID design methods are used explicitly and the extent to which...

  17. Guidance and methods for satisfying low specific activity material and surface contaminated object regulatory requirements

    International Nuclear Information System (INIS)

    Pope, R.B.; Shappert, L.B.; Michelhaugh, R.D.; Boyle, R.W.; Easton, E.P.; Coodk, J.R.

    1998-01-01

    The U.S. Department of Transportation (DOT) and the U.S. Nuclear Regulatory Commission (NRC) have prepared a comprehensive set of draft guidance for shippers and inspectors to use when applying the newly imposed regulatory requirements for low specific activity (LSA) material and surface contaminated objects (SCOs). These requirements represent significant departures in some areas from the manner in which these materials and objects were regulated by the earlier versions of the regulations. The proper interpretation and application of the regulatory criteria can require a fairly complex set of decisions be made. To assist those trying these regulatory requirements, a detailed set of logic-flow diagrams representing decisions related to multiple factors were prepared and included in the draft report for comment on Categorizing and Transporting Low Specific Activity Materials and Surface Contaminated Objects, (DOT/NRC, 1997). These logic-flow diagrams, as developed, are specific to the U.S. regulations, but were readily adaptable to the IAEA regulations. The diagrams have been modified accordingly and tied directly to specific paragraphs in IAEA Safety Series No. 6. This paper provides the logic-flow diagrams adapted in the IAEA regulations, and demonstrated how these diagrams can be used to assist consignors and inspectors in assessing compliance of shipments with the LSA material and SCO regulatory requirements. (authors)

  18. Priorities and strategies for improving disabled women's access to maternity services when they are affected by domestic abuse: a multi-method study using concept maps.

    Science.gov (United States)

    Bradbury-Jones, Caroline; Breckenridge, Jenna P; Devaney, John; Duncan, Fiona; Kroll, Thilo; Lazenbatt, Anne; Taylor, Julie

    2015-12-28

    Domestic abuse is a significant public health issue. It occurs more frequently among disabled women than those without a disability and evidence suggests that a great deal of domestic abuse begins or worsens during pregnancy. All women and their infants are entitled to equal access to high quality maternity care. However, research has shown that disabled women who experience domestic abuse face numerous barriers to accessing care. The aim of the study was to identify the priority areas for improving access to maternity services for this group of women; develop strategies for improved access and utilisation; and explore the feasibility of implementing the identified strategies. This multi-method study was the third and final part of a larger study conducted in the UK between 2012 and 2014. The study used a modified concept mapping approach and was theoretically underpinned by Andersen's model of healthcare use. Seven focus group interviews were conducted with a range of maternity care professionals (n = 45), incorporating quantitative and qualitative components. Participants ranked perceived barriers to women's access and utilisation of maternity services in order of priority using a 5-point Likert scale. Quantitative data exploration used descriptive and non-parametric analyses. In the qualitative component of each focus group, participants discussed the barriers and identified potential improvement strategies (and feasibility of implementing these). Qualitative data were analysed inductively using a framework analysis approach. The three most highly ranked barriers to women's access and utilisation of maternity services identified in the quantitative component were: 1) staff being unaware and not asking about domestic abuse and disability; 2) the impact of domestic abuse on women; 3) women's fear of disclosure. The top two priority strategies were: providing information about domestic abuse to all women and promoting non-judgemental staff attitude. These were

  19. Facilitators and barriers to accessing reproductive health care for migrant beer promoters in Cambodia, Laos, Thailand and Vietnam: a mixed methods study.

    Science.gov (United States)

    Webber, Gail; Spitzer, Denise; Somrongthong, Ratana; Dat, Truong Cong; Kounnavongsa, Somphone

    2012-07-02

    The purpose of the research was to assess access to sexual and reproductive health services for migrant women who work as beer promoters. This mixed methods research was conducted in Phnom Penh, Cambodia, Bangkok, Thailand, Vientiane, Laos, and Hanoi, Vietnam during 2010 to 2011. Focus groups were held with beer promoters and separate focus groups or interviews with key informants to explore the factors affecting beer promoters' access to health care institutions for reproductive health care. The findings of the focus groups were used to develop a survey for beer promoters. This survey was conducted in popular health institutions for these women in each of the four Asian cities. Several common themes were evident. Work demands prevented beer promoters from accessing health care. Institutional factors affecting care included cost, location, environmental factors (e.g. waiting times, cleanliness and confidentiality) and service factors (e.g. staff attitudes, clinic hours, and availability of medications). Personal factors affecting access were shyness and fear, lack of knowledge, and support from family and friends.The survey of the beer promoters confirmed that cost, location and both environmental and service factors impact on access to health care services for beer promoters. Many beer promoters are sexually active, and a significant proportion of those surveyed rely on sex work to supplement their income. Many also drink with their clients. Despite a few differences amongst the surveyed population, the findings were remarkably similar across the four research sites. Recommendations from the research include the provision of evening and weekend clinic hours to facilitate access, free or low cost clinics, and health insurance through employer or government plans which are easy to access for migrants. Other improvements that would facilitate the access of beer promoters to these services include increased funding to hire more staff (reducing waiting times) and to

  20. Understanding your users a practical guide to user requirements methods, tools, and techniques

    CERN Document Server

    Baxter, Kathy

    2005-01-01

    Today many companies are employing a user-centered design (UCD) process, but for most companies, usability begins and ends with the usability test. Although usability testing is a critical part of an effective user-centered life cycle, it is only one component of the UCD process. This book is focused on the requirements gathering stage, which often receives less attention than usability testing, but is equally as important. Understanding user requirements is critical to the development of a successful product. Understanding Your Users is an easy to read, easy to implement, how-to guide on

  1. Requirements for Participative Management as a Source of Sustainable Competitive Advantage and Tipical Management Method

    Directory of Open Access Journals (Sweden)

    Muscalu Emanoil

    2015-12-01

    Full Text Available The economic context in the recent years has undergone major changes in modern methods and techniques used in management. The current competitive environment is characterized by permanent turbulences influencing firstly the managerial act itself. Out of the many methods and techniques applied so far, some turn out to be less adaptable to the current economic and social context.

  2. THE PSTD ALGORITHM: A TIME-DOMAIN METHOD REQUIRING ONLY TWO CELLS PER WAVELENGTH. (R825225)

    Science.gov (United States)

    A pseudospectral time-domain (PSTD) method is developed for solutions of Maxwell's equations. It uses the fast Fourier transform (FFT), instead of finite differences on conventional finite-difference-time-domain (FDTD) methods, to represent spatial derivatives. Because the Fourie...

  3. Adding Timing Requirements to the CODARTS Real-Time Software Design Method

    DEFF Research Database (Denmark)

    Bach, K.R.

    The CODARTS software design method consideres how concurrent, distributed and real-time applications can be designed. Although accounting for the important issues of task and communication, the method does not provide means for expressing the timeliness of the tasks and communication directly...

  4. Method Verification Requirements for an Advanced Imaging System for Microbial Plate Count Enumeration.

    Science.gov (United States)

    Jones, David; Cundell, Tony

    2018-01-01

    The Growth Direct™ System that automates the incubation and reading of membrane filtration microbial counts on soybean-casein digest, Sabouraud dextrose, and R2A agar differs only from the traditional method in that micro-colonies on the membrane are counted using an advanced imaging system up to 50% earlier in the incubation. Based on the recommendations in USP Validation of New Microbiological Testing Methods , the system may be implemented in a microbiology laboratory after simple method verification and not a full method validation. LAY ABSTRACT: The Growth Direct™ System that automates the incubation and reading of microbial counts on membranes on solid agar differs only from the traditional method in that micro-colonies on the membrane are counted using an advanced imaging system up to 50% earlier in the incubation time. Based on the recommendations in USP Validation of New Microbiological Testing Methods , the system may be implemented in a microbiology laboratory after simple method verification and not a full method validation. © PDA, Inc. 2018.

  5. Functional Mobility Testing: A Novel Method to Establish Human System Interface Design Requirements

    Science.gov (United States)

    England, Scott A.; Benson, Elizabeth A.; Rajulu, Sudhakar

    2008-01-01

    Across all fields of human-system interface design it is vital to posses a sound methodology dictating the constraints on the system based on the capabilities of the human user. These limitations may be based on strength, mobility, dexterity, cognitive ability, etc. and combinations thereof. Data collected in an isolated environment to determine, for example, maximal strength or maximal range of motion would indeed be adequate for establishing not-to-exceed type design limitations, however these restraints on the system may be excessive over what is basally needed. Resources may potentially be saved by having a technique to determine the minimum measurements a system must accommodate. This paper specifically deals with the creation of a novel methodology for establishing mobility requirements for a new generation of space suit design concepts. Historically, the Space Shuttle and the International Space Station vehicle and space hardware design requirements documents such as the Man-Systems Integration Standards and International Space Station Flight Crew Integration Standard explicitly stated that the designers should strive to provide the maximum joint range of motion capabilities exhibited by a minimally clothed human subject. In the course of developing the Human-Systems Integration Requirements (HSIR) for the new space exploration initiative (Constellation), an effort was made to redefine the mobility requirements in the interest of safety and cost. Systems designed for manned space exploration can receive compounded gains from simplified designs that are both initially less expensive to produce and lighter, thereby, cheaper to launch.

  6. 7 CFR Appendix to Subpart C of... - Accounting Methods and Procedures Required of All Borrowers

    Science.gov (United States)

    2010-01-01

    ... Television Services 105 Comprehensive Income—108 Consolidated Financial Statements 106 Cushion of Credit... statements even though this financial information is presented in the parent's consolidated statements. 2. In... consolidated financial statements in accordance with the requirements of Statement No. 94. These consolidated...

  7. Access to scientific publications: the scientist's perspective.

    Directory of Open Access Journals (Sweden)

    Yegor Voronin

    Full Text Available BACKGROUND: Scientific publishing is undergoing significant changes due to the growth of online publications, increases in the number of open access journals, and policies of funders and universities requiring authors to ensure that their publications become publicly accessible. Most studies of the impact of these changes have focused on the growth of articles available through open access or the number of open-access journals. Here, we investigated access to publications at a number of institutes and universities around the world, focusing on publications in HIV vaccine research--an area of biomedical research with special importance to the developing world. METHODS AND FINDINGS: We selected research papers in HIV vaccine research field, creating: 1 a first set of 50 most recently published papers with keywords "HIV vaccine" and 2 a second set of 200 articles randomly selected from those cited in the first set. Access to the majority (80% of the recently published articles required subscription, while cited literature was much more accessible (67% freely available online. Subscriptions at a number of institutions around the world were assessed for providing access to subscription-only articles from the two sets. The access levels varied widely, ranging among institutions from 20% to 90%. Through the WHO-supported HINARI program, institutes in low-income countries had access comparable to that of institutes in the North. Finally, we examined the response rates for reprint requests sent to corresponding authors, a method commonly used before internet access became widespread. Contacting corresponding authors with requests for electronic copies of articles by email resulted in a 55-60% success rate, although in some cases it took up to 1.5 months to get a response. CONCLUSIONS: While research articles are increasingly available on the internet in open access format, institutional subscriptions continue to play an important role. However

  8. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  9. Revolving Loan Fund: A Novel Approach to Increasing Access to Long-Acting Reversible Contraception Methods in Community Health Centers.

    Science.gov (United States)

    Evans, Megan L; Breeze, Janis L; Paulus, Jessica K; Meadows, Audra

    The aim of this study was to assess the impact of a revolving loan fund (RLF) on timing of device insertion and long-acting reversible contraception (LARC) access among a high-risk urban population at 3 Boston community health centers. Three health centers were identified to implement a RLF. Each clinic received $5000 from the RLF to purchase LARC devices. Data collected through medical record review retrospectively 1 year prior to start of the RLF and prospectively for 1 year thereafter included patient demographics, type of LARC selected, patient's date of documented interest in a LARC device, and date of insertion. The effect of a RLF on delay to LARC insertion was tested using negative binomial regression, controlling for site and potential confounding variables between the pre- and post-RLF periods. Three urban community health centers. Reproductive-aged women who received family planning services at the 3 participating health centers. Increasing access to LARC and decreasing wait times to LARC insertion after implementation of the RLF. Data on 133 patients in the pre-RLF group and 205 in the post-RLF group were collected. There were no statistically significant differences in demographic or clinical characteristics between the 2 time periods. LARC uptake increased significantly from the pre- to post-RLF period, specifically among implant users. There was a statistically significant decrease in the mean number of days in delay from interest to insertion from the pre- to post-RLF period (pre-RLF: 31.3 ± 50.6 days; post-RLF: 13.6 ± 16.7 days, adjusted P < .001). The reasons for the delay did not differ significantly between the 2 time periods. The RLF decreased wait time for the devices and increased overall insertion rates. This may serve as a promising solution to improve LARC access in community health centers. This project could be expanded to include more health centers, creating a city wide RLF. This expansion could allow for further data analysis

  10. Open access

    NARCIS (Netherlands)

    Valkenburg, P.M.

    2015-01-01

    Open access week Van 19 tot en met 25 oktober 2015 vond wereldwijd de Open Access Week plaats. Tijdens deze week werden er over de hele wereld evenementen georganiseerd waar open access een rol speelt. Ook in Nederland zijn er diverse symposia, workshops en debatten georganiseerd zoals het debat in

  11. Homeless people's access to primary care physiotherapy services: an exploratory, mixed-method investigation using a follow-up qualitative extension to core quantitative research.

    Science.gov (United States)

    Dawes, Jo; Deaton, Stuart; Greenwood, Nan

    2017-06-30

    The purpose of this study was to appraise referrals of homeless patients to physiotherapy services and explore perceptions of barriers to access. This exploratory mixed-method study used a follow-up qualitative extension to core quantitative research design. Over 9 months, quantitative data were gathered from the healthcare records of homeless patients referred to physiotherapy by a general practitioner (GP) practice, including the number of referrals and demographic data of all homeless patients referred. Corresponding physiotherapy records of those people referred to physiotherapy were searched for the outcome of their care. Qualitative semi-structured telephone interviews, based on the quantitative findings, were carried out with staff involved with patient care from the referring GP practice and were used to expand insight into the quantitative findings. Two primary care sites provided data for this study: a GP practice dedicated exclusively to homeless people and the physiotherapy department receiving their referrals. Quantitative data from the healthcare records of 34 homeless patient referrals to physiotherapy were collected and analysed. In addition, five staff involved in patient care were interviewed. 34 referrals of homeless people were made to physiotherapy in a 9-month period. It was possible to match 25 of these to records from the physiotherapy department. Nine (36%) patients did not attend their first appointment; seven (28%) attended an initial appointment, but did not attend a subsequent appointment and were discharged from the service; five (20%) completed treatment and four patients (16%) had ongoing treatment. Semi-structured interviews revealed potential barriers preventing homeless people from accessing physiotherapy services, the complex factors being faced by those making referrals and possible ways to improve physiotherapy access. Homeless people with musculoskeletal problems may fail to access physiotherapy treatment, but opportunities

  12. A method for determining the spent-fuel contribution to transport cask containment requirements

    International Nuclear Information System (INIS)

    Sanders, T.L.; Seager, K.D.; Rashid, Y.R.; Barrett, P.R.; Malinauskas, A.P.; Einziger, R.E.; Jordan, H.; Reardon, P.C.

    1992-11-01

    This report examines containment requirements for spent-fuel transport containers that are transported under normal and hypothetical accident conditions. A methodology is described that estimates the probability of rod failure and the quantity of radioactive material released from breached rods. This methodology characterizes the dynamic environment of the cask and its contents and deterministically models the peak stresses that are induced in spent-fuel cladding by the mechanical and thermal dynamic environments. The peak stresses are evaluated in relation to probabilistic failure criteria for generated or preexisting ductile tearing and material fractures at cracks partially through the wall in fuel rods. Activity concentrations in the cask cavity are predicted from estimates of the fraction of gases, volatiles, and fuel fines that are released when the rod cladding is breached. Containment requirements based on the source term are calculated in terms of maximum permissible volumetric leak rates from the cask. Calculations are included for representative cask designs

  13. A Study of Storage Ring Requirements for an Explosive Detection System Using NRA Method

    CERN Document Server

    Wang, Tai-Sen

    2005-01-01

    The technical feasibility of an explosives detection system based on the nuclear resonance absorption (NRA) of gamma rays in nitrogen-rich materials was demonstrated at Los Alamos National Laboratory (LANL) in 1993 by using an RFQ proton accelerator and a tomographic imaging prototype.* The study is being continued recently to examine deployment of such an active interrogation system in realistic scenarios. The approach is to use a cyclotron and electron-cooling-equipped storage rings(s) to provide the high quality and high current proton beam needed in a practical application. In this work, we investigate the storage ring requirements for a variant of the airport luggage inspection system considered in the earlier LANL experiments. Estimations are carried out based on the required inspection throughput, the gamma ray yield, the proton beam emittance growth due to scattering with the photon-production target, beam current limit in the storage ring, and the electron cooling rate. Studies using scaling and reas...

  14. Apparatus and method for servicing an elongated suspended pump motor in an electric power plant with limited access

    International Nuclear Information System (INIS)

    Chavez, R.V.; Ekeroth, D.E.; Johnson, F.T.; Matusz, J.M.

    1994-01-01

    Elongated coolant pumps suspended under steam generators within containment in a power plant with limited access space, are removed and replaced by an elongated maintenance cart with an elongated opening along one side in which the motor is received. Rollers support the cart for conveying the elongated motor in an upright position out from under the steam generator and onto an elevator. The elevator is lowered to transfer support of the cart and motor through trunnions to saddles straddling the elevator for rotation of the cart to a generally horizontal position. The elevator then raises the horizontally disposed cart carrying the motor to a higher floor where it is rolled off the elevator and out through the auxiliary equipment hatch. 14 figures

  15. Method to control the persons permitted to enter plants with increased security requirements and personnel lock for such plants

    International Nuclear Information System (INIS)

    Blaser, E.; Eickhoff, H.; Tretschoks, W.

    1978-01-01

    The personnel lock for a plant with increased security requirements, e.g. a nuclear power plant, has got two lock gates. Only persons whose right to enter has been established by the control equipment will be admitted to the lock chamber. For this purpose an identification recess is built in front of the first access to the lock chamber, where size, weight and the contours of the persons wanting to enter are roughly measured and compared with a code card carried along. The weight is established by a balance forming part of the base of the recess. By means of contact surfaces in the region of knees, upper thigh, chest and shoulder an upright position of the person is guaranteed. Scanning of the physical dimensions is performed with laser, infrared and light barriers. (DG) [de

  16. METHODS FOR DETERMINING AGITATOR MIXING REQUIREMENTS FOR A MIXING and SAMPLING FACILITY TO FEED WTP (WASTE TREATMENT PLANT)

    International Nuclear Information System (INIS)

    Griffin, P.W.

    2009-01-01

    The following report is a summary of work conducted to evaluate the ability of existing correlative techniques and alternative methods to accurately estimate impeller speed and power requirements for mechanical mixers proposed for use in a mixing and sampling facility (MSF). The proposed facility would accept high level waste sludges from Hanford double-shell tanks and feed uniformly mixed high level waste to the Waste Treatment Plant. Numerous methods are evaluated and discussed, and resulting recommendations provided.

  17. METHODS FOR DETERMINING AGITATOR MIXING REQUIREMENTS FOR A MIXING & SAMPLING FACILITY TO FEED WTP (WASTE TREATMENT PLANT)

    Energy Technology Data Exchange (ETDEWEB)

    GRIFFIN PW

    2009-08-27

    The following report is a summary of work conducted to evaluate the ability of existing correlative techniques and alternative methods to accurately estimate impeller speed and power requirements for mechanical mixers proposed for use in a mixing and sampling facility (MSF). The proposed facility would accept high level waste sludges from Hanford double-shell tanks and feed uniformly mixed high level waste to the Waste Treatment Plant. Numerous methods are evaluated and discussed, and resulting recommendations provided.

  18. Sensor Selection method for IoT systems – focusing on embedded system requirements

    Directory of Open Access Journals (Sweden)

    Hirayama Masayuki

    2016-01-01

    Full Text Available Recently, various types of sensors have been developed. Using these sensors, IoT systems have become hot topics in embedded system domain. However, sensor selections for embedded systems are not well discussed up to now. This paper focuses on embedded system’s features and architecture, and proposes a sensor selection method which is composed seven steps. In addition, we applied the proposed method to a simple example – a sensor selection for computer scored answer sheet reader unit. From this case study, an idea to use FTA in sensor selection is also discussed.

  19. Methodical investigations on the determination of metabolic lysine requirements in broiler chickens. 1

    International Nuclear Information System (INIS)

    Bergner, H.; Nguyen Thi Nhan; Wilke, A.

    1987-01-01

    For the estimation of lysine requirement 128 male broiler chickens were used at an age of 7 to 21 days posthatching. They received a lysine-deficient diet composed of wheat and wheat gluten. To this basal diet L-lysine-HCL was supplemented successively resulting in 8 lysine levels ranging from 5.8 to 23.3 g lysine per kg dry matter (DM) (2.2 to 8.7 g lysine per 16 g N). At the end of the two-week feeding period of the experimental diets 14 C-lysine was injected intravenously 1.5 and 5.5 hours after feed withdrawal. During the following 4 hours the exretion of CO 2 and 14 CO 2 was measured. The highest daily gain of 21.5 g was observed in animals fed 13.3 g lysine-kg DM. Lysine concentrations exceeding 18.3 g/kg DM depressed body weight gain. The CO 2 excretion was not influenced by lysine intake. 14 CO 2 excretion was low with diets low in lysine content and increased 3 to 4 times with diets meeting the lysine requirement. Based on measurements 1.5 to 5.5 hours after feed withdrawal the saturation value for lysine was reached at 13.3 g/kg DM. This value was lowered (10.8 g/kg DM), however, if the estimation was carried out 5.5 to 9.5 hours after feed withdrawal. These results suggest a higher metabolic lysine requirement during the earlier period after feed intake. Both, reduced weight gain and non linearity in 14 CO 2 excretion in diets exceeding a lysine content of 18.3 g/kg DM indicate a limited capacity of the organism to degrade excessive lysine. According to the results a lysine requirement betwen 10.8 and 13.3 g/kg DM (27% CP and 660 EFU/sub hen//kg DM) was estimated for broiler chickens 3 weeks posthatching. (author)

  20. RELAP-7 Software Verification and Validation Plan: Requirements Traceability Matrix (RTM) Part 1 – Physics and numerical methods

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Yong Joon [Idaho National Lab. (INL), Idaho Falls, ID (United States); Yoo, Jun Soo [Idaho National Lab. (INL), Idaho Falls, ID (United States); Smith, Curtis Lee [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2015-09-01

    This INL plan comprehensively describes the Requirements Traceability Matrix (RTM) on main physics and numerical method of the RELAP-7. The plan also describes the testing-based software verification and validation (SV&V) process—a set of specially designed software models used to test RELAP-7.

  1. 30 CFR 48.3 - Training plans; time of submission; where filed; information required; time for approval; method...

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Training plans; time of submission; where filed....3 Training plans; time of submission; where filed; information required; time for approval; method... training plan shall be filed with the District Manager for the area in which the mine is located. (c) Each...

  2. Novel method to ascertain chromatin accessibility at specific genomic loci from frozen brain homogenates and laser capture microdissected defined cells.

    Science.gov (United States)

    Delvaux, Elaine; Mastroeni, Diego; Nolz, Jennifer; Coleman, Paul D

    2016-06-01

    We describe a novel method for assessing the "open" or "closed" state of chromatin at selected locations within the genome. This method combines the use of Benzonase, which can digest DNA in the presence of actin, with qPCR to define digested regions. We demonstrate the application of this method in brain homogenates and laser captured cells. We also demonstrate application to selected sites within more than one gene and multiple sites within one gene. We demonstrate the validity of the method by treating cells with valproate, known to render chromatin more permissive, and by comparison with classical digestion with DNase I in an in vitro preparation. Although we demonstrate the use of this method in brain tissue we also recognize its applicability to other tissue types.

  3. Novel method to ascertain chromatin accessibility at specific genomic loci from frozen brain homogenates and laser capture microdissected defined cells

    Directory of Open Access Journals (Sweden)

    Elaine Delvaux

    2016-06-01

    Full Text Available We describe a novel method for assessing the “open” or “closed” state of chromatin at selected locations within the genome. This method combines the use of Benzonase, which can digest DNA in the presence of actin, with quantitative polymerase chain reaction to define digested regions. We demonstrate the application of this method in brain homogenates and laser captured cells. We also demonstrate application to selected sites within more than 1 gene and multiple sites within 1 gene. We demonstrate the validity of the method by treating cells with valproate, known to render chromatin more permissive, and by comparison with classical digestion with DNase I in an in vitro preparation. Although we demonstrate the use of this method in brain tissue, we also recognize its applicability to other tissue types.

  4. Potential Use of Agile Methods in Selected DoD Acquisitions: Requirements Development and Management

    Science.gov (United States)

    2014-04-01

    guidelines. 9 Kanban is a technique for managing workflow originating from the lean engineering methods pioneered by Toyota. [Reinertsen 2009...Cockburn, Alistair, & Pols, Andy. Patterns for Effective Use Cas- es. Addison-Wesley, 2002. Anderson, David. Kanban . Blue Hole Press, 2010. CMU/SEI-2013

  5. 40 CFR 53.3 - General requirements for an equivalent method determination.

    Science.gov (United States)

    2010-07-01

    ... part. (6) ISO 9001. All designated FEMs for PM2.5 or PM10−2.5 must be manufactured in an ISO 9001... candidate method. (4) All designated FEM for PM2.5 or PM10−2.5 must be manufactured in an ISO 9001...

  6. Methods for calculating energy and current requirements for industrial electron beam processing

    International Nuclear Information System (INIS)

    Cleland, M.R.; Farrell, J.P.

    1976-01-01

    The practical problems of determining electron beam parameters for industrial irradiation processes are discussed. To assist the radiation engineer in this task, the physical aspects of electron beam absorption are briefly described. Formulas are derived for calculating the surface dose in the treated material using the electron energy, beam current and the area thruput rate of the conveyor. For thick absorbers electron transport results are used to obtain the depth-dose distributions. From these the average dose in the material, anti D, and the beam power utilization efficiency, F/sub p/, can be found by integration over the distributions. These concepts can be used to relate the electron beam power to the mass thruput rate. Qualitatively, the thickness of the material determines the beam energy, the area thruput rate and surface dose determine the beam current while the mass thruput rate and average depth-dose determine the beam power requirements. Graphs are presented showing these relationships as a function of electron energy from 0.2 to 4.0 MeV for polystyrene. With this information, the determination of electron energy and current requirements is a relatively simple procedure

  7. Dietary energy requirements of young adult men, determined by using the doubly labeled water method

    International Nuclear Information System (INIS)

    Roberts, S.B.; Heyman, M.B.; Evans, W.J.; Fuss, P.; Tsay, R.; Young, V.R.

    1991-01-01

    The autors examined the hypothesis that current recommendations on dietary energy requirements may underestimate the total energy needs of young adult men, by measuring total energy expenditure (TEE) and resting energy expenditure (REE) in 14 weight-maintaining healthy subjects leading unrestricted lives. TEE and body composition were measured by using 2H(2)18O, and REE was measured by using indirect calorimetry. All subjects had sedentary full-time occupations and participated in strenuous leisure activities for 34 ± 6 (SE) min/d. TEE and REE were 14.61 ± 0.76 and 7.39 ± 0.26 MJ/d, respectively, and 202 ± 2 and 122 ± 2 kJ.kg-1.d-1. There were significant relationships between TEE and both body fat-free mass (r = 0.732, P less than 0.005) and measured REE (r = 0.568, P less than 0.05). Measured TEE:REE values were significantly higher than the recommended energy requirement (1.98 ± 0.09, compared with 1.55 or 1.67, P less than 0.005). These results are consistent with the suggestion that the current recommended energy intake for young adult men may underestimate total energy needs

  8. A Study of Storage Ring Requirements for an Explosive Detection System Using NRA Method.

    Energy Technology Data Exchange (ETDEWEB)

    Wang, T. F. (Tai-Sen F.); Kwan, T. J. T. (Thomas J. T.)

    2005-01-01

    The technical feasibility of an explosives detection system based on the nuclear resonance absorption (NRA) of gamma rays in nitrogen-rich materials was demonstrated at Los Alamos National Laboratory (LANL) in 1993 by using an RFQ proton accelerator and a tomographic imaging prototype. The study is being continued recently to examine deployment of such an active interrogation system in realistic scenarios. The approach is to use an accelerator and electron-cooling-equipped storage rings(s) to provide the high quality and high current proton beam needed in a practical application. In this work, we investigate the requirements on the storage ring(s) with external gamma-ray-production target for a variant of the airport luggage inspection system considered in the earlier LANL experiments. Estimations are carried out based on the required inspection throughput, the gamma ray yield, the proton beam emittance growth due to scatters with the photon-production target, beam current limit in the storage ring, and the electron-cooling rate. Studies using scaling and reasonable parameter values indicate that it is possible to use no more than a few storage rings per inspection station in a practical NRA luggage inspection complex having more than ten inspection stations.

  9. Comparison of Land, Water, and Energy Requirements of Lettuce Grown Using Hydroponic vs. Conventional Agricultural Methods.

    Science.gov (United States)

    Barbosa, Guilherme Lages; Gadelha, Francisca Daiane Almeida; Kublik, Natalya; Proctor, Alan; Reichelm, Lucas; Weissinger, Emily; Wohlleb, Gregory M; Halden, Rolf U

    2015-06-16

    The land, water, and energy requirements of hydroponics were compared to those of conventional agriculture by example of lettuce production in Yuma, Arizona, USA. Data were obtained from crop budgets and governmental agricultural statistics, and contrasted with theoretical data for hydroponic lettuce production derived by using engineering equations populated with literature values. Yields of lettuce per greenhouse unit (815 m2) of 41 ± 6.1 kg/m2/y had water and energy demands of 20 ± 3.8 L/kg/y and 90,000 ± 11,000 kJ/kg/y (±standard deviation), respectively. In comparison, conventional production yielded 3.9 ± 0.21 kg/m2/y of produce, with water and energy demands of 250 ± 25 L/kg/y and 1100 ± 75 kJ/kg/y, respectively. Hydroponics offered 11 ± 1.7 times higher yields but required 82 ± 11 times more energy compared to conventionally produced lettuce. To the authors' knowledge, this is the first quantitative comparison of conventional and hydroponic produce production by example of lettuce grown in the southwestern United States. It identified energy availability as a major factor in assessing the sustainability of hydroponics, and it points to water-scarce settings offering an abundance of renewable energy (e.g., from solar, geothermal, or wind power) as particularly attractive regions for hydroponic agriculture.

  10. Estimating the Technical Potential of Grid-Connected PV Systems in Indonesia : A Comparison of a Method Based on Open Access Data with a Method Based on GIS

    NARCIS (Netherlands)

    Kunaifi, Kunaifi; Reinders, Angelina H.M.E.; Smets, Arno

    2017-01-01

    In this paper, we compare two methods for estimating the technical potential of grid-connected PV systems in Indonesia. One was a method developed by Veldhuis and Renders [1] and the other is a new method using Geographic Information System (GIS) and multi-criteria decision making (MCDM). The first

  11. Access Data Analysis Cookbook

    CERN Document Server

    Bluttman, Ken

    2008-01-01

    This book offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Whether you use Access 2007 or an earlier version, this book will teach you new methods to query data, different ways to move data in and out of Access, how to calculate answers to financial and investment issues, how to jump beyond SQL by manipulating data with VBA, and more.

  12. The Paradox of "Structured" Methods for Software Requirements Management: A Case Study of an e-Government Development Project

    Science.gov (United States)

    Conboy, Kieran; Lang, Michael

    This chapter outlines the alternative perspectives of "rationalism" and "improvisation" within information systems development and describes the major shortcomings of each. It then discusses how these shortcomings manifested themselves within an e-government case study where a "structured" requirements management method was employed. Although this method was very prescriptive and firmly rooted in the "rational" paradigm, it was observed that users often resorted to improvised behaviour, such as privately making decisions on how certain aspects of the method should or should not be implemented.

  13. Switching characteristics in Cu:SiO2 by chemical soak methods for resistive random access memory (ReRAM)

    Science.gov (United States)

    Chin, Fun-Tat; Lin, Yu-Hsien; Yang, Wen-Luh; Liao, Chin-Hsuan; Lin, Li-Min; Hsiao, Yu-Ping; Chao, Tien-Sheng

    2015-01-01

    A limited copper (Cu)-source Cu:SiO2 switching layer composed of various Cu concentrations was fabricated using a chemical soaking (CS) technique. The switching layer was then studied for developing applications in resistive random access memory (ReRAM) devices. Observing the resistive switching mechanism exhibited by all the samples suggested that Cu conductive filaments formed and ruptured during the set/reset process. The experimental results indicated that the endurance property failure that occurred was related to the joule heating effect. Moreover, the endurance switching cycle increased as the Cu concentration decreased. In high-temperature tests, the samples demonstrated that the operating (set/reset) voltages decreased as the temperature increased, and an Arrhenius plot was used to calculate the activation energy of the set/reset process. In addition, the samples demonstrated stable data retention properties when baked at 85 °C, but the samples with low Cu concentrations exhibited short retention times in the low-resistance state (LRS) during 125 °C tests. Therefore, Cu concentration is a crucial factor in the trade-off between the endurance and retention properties; furthermore, the Cu concentration can be easily modulated using this CS technique.

  14. A Study on a Control Method with a Ventilation Requirement of a VAV System in Multi-Zone

    Directory of Open Access Journals (Sweden)

    Hyo-Jun Kim

    2017-11-01

    Full Text Available The objective of this study was to propose a control method with a ventilation requirement of variable air volume (VAV system in multi-zone. In order to control the VAV system inmulti-zone, it is essential to control the terminal unit installed in each zone. A VAV terminal unit with conventional control method using a fixed minimum air flow can cause indoor air quality (IAQ issues depending on the variation in the number of occupants. This research proposes a control method with a ventilation requirement of the VAV terminal unit and AHU inmulti-zone. The integrated control method with an air flow increase model in the VAV terminal unit, AHU, and outdoor air intake rate increase model in the AHU was based on the indoor CO2 concentration. The conventional and proposed control algorithms were compared through a TRNSYS simulation program. The proposed VAV terminal unit control method satisfies all the conditions of indoor temperature, IAQ, and stratification. An energy comparison with the conventional control method showed that the method satisfies not only the indoor thermal comfort, IAQ, and stratification issue, but also reduces the energy consumption.

  15. COMPARISON OF SPATIAL INTERPOLATION METHODS FOR WHEAT WATER REQUIREMENT AND ITS TEMPORAL DISTRIBUTION IN HAMEDAN PROVINCE (IRAN

    Directory of Open Access Journals (Sweden)

    M. H. Nazarifar

    2014-01-01

    Full Text Available Water is the main constraint for production of agricultural crops. The temporal and spatial variations in water requirement for agriculture products are limiting factors in the study of optimum use of water resources in regional planning and management. However, due to unfavorable distribution and density of meteorological stations, it is not possible to monitor the regional variations precisely. Therefore, there is a need to estimate the evapotranspiration of crops at places where meteorological data are not available and then extend the findings from points of measurements to regional scale. Geostatistical methods are among those methods that can be used for estimation of evapotranspiration at regional scale. The present study attempts to investigate different geostatistical methods for temporal and spatial estimation of water requirements for wheat crop in different periods. The study employs the data provided by 16 synoptic and climatology meteorological stations in Hamadan province in Iran. Evapotranspiration for each month and for the growth period were determined using Penman-Mantis and Torrent-White methods for different water periods based on Standardized Precipitation Index (SPI. Among the available geostatistical methods, three methods: Kriging Method, Cokriging Method, and inverse weighted distance were selected, and analyzed, using GS+ software. Analysis and selection of the suitable geostatistical method were performed based on two measures, namely Mean Absolute Error (MAE and Mean Bias Error (MBE. The findings suggest that, in general, during the drought period, Kriging method is the proper one for estimating water requirements for the six months: January, February, April, May, August, and December. However, weighted moving average is a better estimation method for the months March, June, September, and October. In addition, Kriging is the best method for July. In normal conditions, Kriging is suitable for April, August, December

  16. Cardiovascular and Energy Requirements of Parents Watching Their Child Compete: A Pilot Mixed-Methods Investigation

    Directory of Open Access Journals (Sweden)

    Marc Lochbaum

    2017-11-01

    Full Text Available Purpose: Researchers have extensively documented the cardiovascular and metabolic demands for sports participation. To date, researchers have ignored the same requirements of competitor’s parents. Hence, our purpose was to document parent cardiovascular and metabolic responses to watching their child compete while also paying particular attention to their thoughts before and after the competition. Achievement Goal Theory (AGT drove interpretation of parent thoughts. Materials: Parents wore a device, made by Firstbeat Technologies, which continuously monitored heart rate. The parents wore the device the night before the competition to be acclimated to the technology and during the event until later in the day. Parents also completed two open-ended questions, one before the tournament and one after the contest. Results: Before the contest, the dad expected that his son won the event (Croatian National Championships for juniors. Conversely, the mother’s expectations centered more on her son’s enjoyment and competing to the best of his abilities. Parents had differing cardiovascular and energy requirement responses to watching their son compete. In addition, post-competition reflections differed as the father expressed disappointment whereas the mother expressed sadness. Conclusions: The data presented are unique and a first in the sports literature. The parents varied in the intensity of their cardiovascular responses and calories burned while watching their son compete. The father’s cardiovascular response over the course of watching was that of an aerobic workout. Whether this pattern is unique or universal are a critical research question. Last, AGT appears relevant when assessing the parent’s expectations.

  17. An accessible method for the evaluation of the thermo-oxidative stability of organic substrates based on vegetable oils

    Energy Technology Data Exchange (ETDEWEB)

    Dzyuba, Valeriy I.; Koval, Lyudmila I., E-mail: l_koval@ionc.kiev.ua; Pekhnyo, Vasyl I.

    2016-05-20

    Graphical abstract: Autooxidation of sunflower oil at 110 °C. - Highlights: • A novel method for the determination of the oxidation induction period is proposed. • All component parts of the device are widely used in laboratory practice. • The method is on a par with standardized methods in terms of repeatability. - Abstract: A novel cost-effective computerized method is proposed for the determination of the oxidation induction period (OIP) of organic substrates. All component parts of the device are factory-made (interchangeable) details, which are widely used in laboratory practice. A sample is charged into the reactor, the closed reactor-condenser-stopcock system is evacuated. Then the device is filled with oxygen. The reactor is warmed up to balance with atmospheric pressure. The device is sealed and stirring of the heating medium, substrate and digital data transfer from the pressure sensor to the computer is started. The monitoring of the autooxidation of the sample is terminated after the system pressure has decreased by 300 hPa. A test report is formed with the aid of a computer using Microsoft Excel; OIP is determined as the point of intersection of two tangent lines to the curve. The proposed method is on a par with standardized methods in terms of the repeatability of measurement results.

  18. The effect of cooking and washing rice on the bio-accessibility of As, Cu, Fe, V and Zn using an on-line continuous leaching method.

    Science.gov (United States)

    Horner, Nolan S; Beauchemin, Diane

    2013-01-03

    A previously developed method based on continuous on-line leaching with artificial gastro-intestinal fluids was used to determine the bio-accessible fraction of As, Cu, Fe, V and Zn in brown and white rice from California by inductively coupled mass spectrometry (ICP-MS). Saliva generally accounted for the largest percentage of total element leached in comparison to gastric and intestinal juices. Arsenic speciation analysis was performed on the saliva and gastric juice leachates using ion exchange chromatography coupled to ICP-MS. The four most toxic species of As (As(III), monomethylarsonic acid (MMA), dimethylarsinic acid (DMA) and As(V)), as well as Cl(-) in the gastric juice leachate, were successfully separated within 5.5min using a simple nitric acid gradient. While cooking rice had relatively little effect on total bio-accessibility, a change in species from As(V) and DMA to As(III) was observed for both types of rice. On the other hand, washing the rice with doubly deionized water prior to cooking removed a large percentage of the total bio-accessible fraction of As, Cu, Fe, V and Zn. Copyright © 2012 Elsevier B.V. All rights reserved.

  19. Using Geospatial Research Methods to Examine Resource Accessibility and Availability as it Relates to Community Participation of Individuals with Serious Mental Illnesses.

    Science.gov (United States)

    Townley, Greg; Brusilovskiy, Eugene; Snethen, Gretchen; Salzer, Mark S

    2018-03-01

    Greater community participation among individuals with serious mental illnesses is associated with better psychosocial and health outcomes. Typically, studies examining community participation have utilized self-report measures and been conducted in limited settings. The introduction of methodological advances to examining community participation of individuals with serious mental illnesses has the potential to advance the science of community mental health research and invigorate the work of community psychologists in this area. This study employed an innovative geospatial approach to examine the relationship between community participation and resource accessibility (i.e., proximity) and availability (i.e., concentration) among 294 individuals utilizing community mental health services throughout the United States. Findings suggest small but significant associations between community participation and the accessibility and availability of resources needed for participation. Furthermore, findings demonstrate the importance of car access for individuals residing in both urban and non-urban settings. The methods and results presented in this study have implications for community mental health research and services and provide an illustration of ways that geospatial methodologies can be used to investigate environmental factors that impact community inclusion and participation of individuals with serious mental illnesses. © Society for Community Research and Action 2017.

  20. Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system

    Science.gov (United States)

    Chen, Yu-Gene T.

    2013-04-16

    A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

  1. Efficiency Analysis of the access method with the cascading Bloom filter to the data warehouse on the parallel computing platform

    Science.gov (United States)

    Grigoriev, Yu A.; Proletarskaya, V. A.; Ermakov, E. Yu; Ermakov, O. Yu

    2017-10-01

    A new method was developed with a cascading Bloom filter (CBF) for executing SQL queries in the Apache Spark parallel computing environment. It includes the representation of the original query in the form of several subqueries, the development of a connection graph and the transformation of subqueries, the definition of connections where it is necessary to use Bloom filters, the representation of the graph in terms of Spark. On the example of the query Q3 of the TPC-H test, full-scale experiments were carried out, which confirmed the effectiveness of the developed method.

  2. How NASA's Atmospheric Science Data Center (ASDC) is operationally using the Esri ArcGIS Platform to improve data discoverability, accessibility and interoperability to meet the diversifying government, private, public and academic communities' driven requirements.

    Science.gov (United States)

    Tisdale, M.

    2016-12-01

    NASA's Atmospheric Science Data Center (ASDC) is operationally using the Esri ArcGIS Platform to improve data discoverability, accessibility and interoperability to meet the diversifying government, private, public and academic communities' driven requirements. The ASDC is actively working to provide their mission essential datasets as ArcGIS Image Services, Open Geospatial Consortium (OGC) Web Mapping Services (WMS), OGC Web Coverage Services (WCS) and leveraging the ArcGIS multidimensional mosaic dataset structure. Science teams and ASDC are utilizing these services, developing applications using the Web AppBuilder for ArcGIS and ArcGIS API for Javascript, and evaluating restructuring their data production and access scripts within the ArcGIS Python Toolbox framework and Geoprocessing service environment. These capabilities yield a greater usage and exposure of ASDC data holdings and provide improved geospatial analytical tools for a mission critical understanding in the areas of the earth's radiation budget, clouds, aerosols, and tropospheric chemistry.

  3. Medicinal Chemistry Projects Requiring Imaginative Structure-Based Drug Design Methods.

    Science.gov (United States)

    Moitessier, Nicolas; Pottel, Joshua; Therrien, Eric; Englebienne, Pablo; Liu, Zhaomin; Tomberg, Anna; Corbeil, Christopher R

    2016-09-20

    Computational methods for docking small molecules to proteins are prominent in drug discovery. There are hundreds, if not thousands, of documented examples-and several pertinent cases within our research program. Fifteen years ago, our first docking-guided drug design project yielded nanomolar metalloproteinase inhibitors and illustrated the potential of structure-based drug design. Subsequent applications of docking programs to the design of integrin antagonists, BACE-1 inhibitors, and aminoglycosides binding to bacterial RNA demonstrated that available docking programs needed significant improvement. At that time, docking programs primarily considered flexible ligands and rigid proteins. We demonstrated that accounting for protein flexibility, employing displaceable water molecules, and using ligand-based pharmacophores improved the docking accuracy of existing methods-enabling the design of bioactive molecules. The success prompted the development of our own program, Fitted, implementing all of these aspects. The primary motivation has always been to respond to the needs of drug design studies; the majority of the concepts behind the evolution of Fitted are rooted in medicinal chemistry projects and collaborations. Several examples follow: (1) Searching for HDAC inhibitors led us to develop methods considering drug-zinc coordination and its effect on the pKa of surrounding residues. (2) Targeting covalent prolyl oligopeptidase (POP) inhibitors prompted an update to Fitted to identify reactive groups and form bonds with a given residue (e.g., a catalytic residue) when the geometry allows it. Fitted-the first fully automated covalent docking program-was successfully applied to the discovery of four new classes of covalent POP inhibitors. As a result, efficient stereoselective syntheses of a few screening hits were prioritized rather than synthesizing large chemical libraries-yielding nanomolar inhibitors. (3) In order to study the metabolism of POP inhibitors by

  4. Development of a test method to access the sludge reduction potential of aquatic organisms in activated sludge

    NARCIS (Netherlands)

    Buijs, B.R.; Klapwijk, A.; Elissen, H.J.H.; Rulkens, W.H.

    2008-01-01

    This article shows the development of a quantitative sludge reduction test method, which uses the sludge consuming aquatic worm Lumbriculus variegatus (Oligochaeta, Lumbriculidae). Essential for the test are sufficient oxygen supply and the presence of a non-stirred layer of sludge for burrowing of

  5. Macromolecular competition titration method accessing thermodynamics of the unmodified macromolecule-ligand interactions through spectroscopic titrations of fluorescent analogs.

    Science.gov (United States)

    Bujalowski, Wlodzimierz; Jezewska, Maria J

    2011-01-01

    Analysis of thermodynamically rigorous binding isotherms provides fundamental information about the energetics of the ligand-macromolecule interactions and often an invaluable insight about the structure of the formed complexes. The Macromolecular Competition Titration (MCT) method enables one to quantitatively obtain interaction parameters of protein-nucleic acid interactions, which may not be available by other methods, particularly for the unmodified long polymer lattices and specific nucleic acid substrates, if the binding is not accompanied by adequate spectroscopic signal changes. The method can be applied using different fluorescent nucleic acids or fluorophores, although the etheno-derivatives of nucleic acid are especially suitable as they are relatively easy to prepare, have significant blue fluorescence, their excitation band lies far from the protein absorption spectrum, and the modification eliminates the possibility of base pairing with other nucleic acids. The MCT method is not limited to the specific size of the reference nucleic acid. Particularly, a simple analysis of the competition titration experiments is described in which the fluorescent, short fragment of nucleic acid, spanning the exact site-size of the protein-nucleic acid complex, and binding with only a 1:1 stoichiometry to the protein, is used as a reference macromolecule. Although the MCT method is predominantly discussed as applied to studying protein-nucleic acid interactions, it can generally be applied to any ligand-macromolecule system by monitoring the association reaction using the spectroscopic signal originating from the reference macromolecule in the presence of the competing macromolecule, whose interaction parameters with the ligand are to be determined. Copyright © 2011 Elsevier Inc. All rights reserved.

  6. Macromolecular Competition Titration Method: Accessing Thermodynamics of the Unmodified Macromolecule–Ligand Interactions Through Spectroscopic Titrations of Fluorescent Analogs

    Science.gov (United States)

    Bujalowski, Wlodzimierz; Jezewska, Maria J.

    2011-01-01

    Analysis of thermodynamically rigorous binding isotherms provides fundamental information about the energetics of the ligand–macromolecule interactions and often an invaluable insight about the structure of the formed complexes. The Macromolecular Competition Titration (MCT) method enables one to quantitatively obtain interaction parameters of protein–nucleic acid interactions, which may not be available by other methods, particularly for the unmodified long polymer lattices and specific nucleic acid substrates, if the binding is not accompanied by adequate spectroscopic signal changes. The method can be applied using different fluorescent nucleic acids or fluorophores, although the etheno-derivatives of nucleic acid are especially suitable as they are relatively easy to prepare, have significant blue fluorescence, their excitation band lies far from the protein absorption spectrum, and the modification eliminates the possibility of base pairing with other nucleic acids. The MCT method is not limited to the specific size of the reference nucleic acid. Particularly, a simple analysis of the competition titration experiments is described in which the fluorescent, short fragment of nucleic acid, spanning the exact site-size of the protein–nucleic acid complex, and binding with only a 1:1 stoichiometry to the protein, is used as a reference macromolecule. Although the MCT method is predominantly discussed as applied to studying protein–nucleic acid interactions, it can generally be applied to any ligand–macromolecule system by monitoring the association reaction using the spectroscopic signal originating from the reference macromolecule in the presence of the competing macromolecule, whose interaction parameters with the ligand are to be determined. PMID:21195223

  7. Novel experience of laser-assisted 'inside-out' central venous access in a patient with bilateral subclavian vein occlusion requiring pacemaker implantation.

    Science.gov (United States)

    Aye, Thandar; Phan, Thanh Trung; Muir, Douglas Findlay; Linker, Nicholas John; Hartley, Richard; Turley, Andrew John

    2017-10-01

    This new laser facilitated 'inside-out' technique was used for transvenous pacemaker insertion in a pacemaker-dependent patient with bilateral subclavian occlusion and a failed epicardial system who is not suitable for a transfemoral approach. Procedure was undertaken under general anaesthesia with venous access obtained from right femoral vein and left axillary vein. 7F multipurpose catheter was used to enter proximal edge of the occluded segment of subclavian vein via femoral approach, which then supported stiff angioplasty wires and microcatheters to tunnel into the body of occlusion. When encountered with impenetrable resistance, 1.4 mm Excimer laser helped delivery of a Pilot 200 wire, which then progressed towards the distal edge of occlusion. Serial balloon dilatations allowed wire tracked into subintimal plane, advanced towards left clavicle using knuckle wire technique, which was then externalized with blunt dissection from infraclavicular pocket area. It was later changed to Amplatz superstiff wire exiting from both ends to form a rail, which ultimately allowed passage of pacing leads after serial balloon dilatation from clavicular end. Our hybrid 'inside-out' technique permitted transvenous pacemaker insertion without complication and this is, to our knowledge, the first case using laser in this context. Published on behalf of the European Society of Cardiology. All rights reserved. © The Author 2016. For permissions please email: journals.permissions@oup.com.

  8. Migrants' access to healthcare

    DEFF Research Database (Denmark)

    Norredam, Marie

    2011-01-01

    There are strong pragmatic and moral reasons for receiving societies to address access to healthcare for migrants. Receiving societies have a pragmatic interest in sustaining migrants' health to facilitate integration; they also have a moral obligation to ensure migrants' access to healthcare...... according to international human rights principles. The intention of this thesis is to increase the understanding of migrants' access to healthcare by exploring two study aims: 1) Are there differences in migrants' access to healthcare compared to that of non-migrants? (substudy I and II); and 2) Why...... are there possible differences in migrants' access to healthcare compared to that of non-migrants? (substudy III and IV). The thesis builds on different methodological approaches using both register-based retrospective cohort design, cross-sectional design and survey methods. Two different measures of access were...

  9. Spatial access method for urban geospatial database management: An efficient approach of 3D vector data clustering technique

    DEFF Research Database (Denmark)

    Azri, Suhaibah; Ujang, Uznir; Rahman, Alias Abdul

    2014-01-01

    In the last few years, 3D urban data and its information are rapidly increased due to the growth of urban area and urbanization phenomenon. These datasets are then maintain and manage in 3D spatial database system. However, performance deterioration is likely to happen due to the massiveness of 3D...... datasets. As a solution, 3D spatial index structure is used as a booster to increase the performance of data retrieval. In commercial database, commonly and widely used index structure for 3D spatial database is 3D R-Tree. This is due to its simplicity and promising method in handling spatial data. However......D geospatial data clustering to be used in the construction of 3D R-Tree and respectively could reduce the overlapping among nodes. The proposed method is tested on 3D urban dataset for the application of urban infill development. By using several cases of data updating operations such as building...

  10. Analysis of a simulated microarray dataset: Comparison of methods for data normalisation and detection of differential expression (Open Access publication

    Directory of Open Access Journals (Sweden)

    Mouzaki Daphné

    2007-11-01

    Full Text Available Abstract Microarrays allow researchers to measure the expression of thousands of genes in a single experiment. Before statistical comparisons can be made, the data must be assessed for quality and normalisation procedures must be applied, of which many have been proposed. Methods of comparing the normalised data are also abundant, and no clear consensus has yet been reached. The purpose of this paper was to compare those methods used by the EADGENE network on a very noisy simulated data set. With the a priori knowledge of which genes are differentially expressed, it is possible to compare the success of each approach quantitatively. Use of an intensity-dependent normalisation procedure was common, as was correction for multiple testing. Most variety in performance resulted from differing approaches to data quality and the use of different statistical tests. Very few of the methods used any kind of background correction. A number of approaches achieved a success rate of 95% or above, with relatively small numbers of false positives and negatives. Applying stringent spot selection criteria and elimination of data did not improve the false positive rate and greatly increased the false negative rate. However, most approaches performed well, and it is encouraging that widely available techniques can achieve such good results on a very noisy data set.

  11. Characterization of a Gas-Purge Method to Access 11C-Carbon-Dioxide Radioactivity in Blood

    International Nuclear Information System (INIS)

    Ng, Y.; Green, M.A.

    2014-01-01

    Carbon-11 (t 1/2 : 20 minutes) labeled radiotracers, such as 11 C-acetate and 11 C-palmitate are widely used in positron emission tomography (PET) for noninvasive evaluation of myocardial metabolism under varied physiological conditions. These tracers are attractive probes of tissue physiology, because they are simply radiolabeled versions of the native biochemical substrates. One of the major metabolites generated by these tracers upon the administration is 11 CO 2 produced via the citric acid cycle. In quantitative modeling of 11 C-acetate and 11 C-palmitate PET data, the fraction of blood 11 C radioactivity present as 11 CO 2 needs to be measured to obtain a correct radiotracer arterial input function. Accordingly, the literature describes a method whereby the total blood 11 C-activity is counted in blood samples treated with base solution, while the fraction of 11 CO 2 is measured after the blood is treated with acid followed by a 10 minutes gas-purge. However, a detailed description of the experimental validation of this method was not provided. The goal of this study was to test the reliability of a 10-minute gas purging method used to assay 11 CO 2 radioactivity in blood. (author)

  12. Assessing thermochromatography as a separation method for nuclear forensics. Current capability vis-a-vis forensic requirements

    International Nuclear Information System (INIS)

    Hanson, D.E.; Garrison, J.R.; Hall, H.L.

    2011-01-01

    Nuclear forensic science has become increasingly important for global nuclear security. However, many current laboratory analysis techniques are based on methods developed without the imperative for timely analysis that underlies the post-detonation forensics mission requirements. Current analysis of actinides, fission products, and fuel-specific materials requires time-consuming chemical separation coupled with nuclear counting or mass spectrometry. High-temperature gas-phase separations have been used in the past for the rapid separation of newly created elements/isotopes and as a basis for chemical classification of that element. We are assessing the utility of this method for rapid separation in the gas-phase to accelerate the separations of radioisotopes germane to post-detonation nuclear forensic investigations. The existing state of the art for thermo chromatographic separations, and its applicability to nuclear forensics, will be reviewed. (author)

  13. Open Access

    Science.gov (United States)

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  14. Open access

    African Journals Online (AJOL)

    Prof. Dennis Ocholla

    The argument that access to information is an instrumental and individual as well as ... and Dean School of Information Studies, University of Wisconsin, Milwaukee, USA. ... to scholarly publications and can be in any digital format, including text, movies and ... language barriers, censorship, lack of access to the Internet and ...

  15. Probabilistic Requirements (Partial) Verification Methods Best Practices Improvement. Variables Acceptance Sampling Calculators: Derivations and Verification of Plans. Volume 1

    Science.gov (United States)

    Johnson, Kenneth L.; White, K, Preston, Jr.

    2012-01-01

    The NASA Engineering and Safety Center was requested to improve on the Best Practices document produced for the NESC assessment, Verification of Probabilistic Requirements for the Constellation Program, by giving a recommended procedure for using acceptance sampling by variables techniques. This recommended procedure would be used as an alternative to the potentially resource-intensive acceptance sampling by attributes method given in the document. This document contains the outcome of the assessment.

  16. Access to Heart Transplantation: A Proper Analysis of the Competing Risks of Death and Transplantation Is Required to Optimize Graft Allocation

    Directory of Open Access Journals (Sweden)

    Christelle Cantrelle, MS

    2017-08-01

    Conclusions. The heart allocation system strongly modifies the risk of pretransplant mortality related to heart failure severity. An in-depth competing risk analysis is therefore a more appropriate method to evaluate graft allocation systems. This knowledge should help to prioritize candidates in the context of a limited donor pool.

  17. Feasibility study of context-awareness device Comfort calculation methods and their application to comfort-based access control

    DEFF Research Database (Denmark)

    Guo, Jingjing; Jensen, Christian D.; Ma, Jianfeng

    2016-01-01

    Mobile devices have become more powerful and are increasingly integrated in the everyday life of people; from playing games, taking pictures and interacting with social media to replacing credit cards in payment solutions. Some actions may only be appropriate in some situations, so the security...... of a mobile device is therefore increasingly linked to its context, such as its location, surroundings (e.g. objects in the immediate environment) and so on. However, situational awareness and context are not captured by traditional security models. In this paper, we examine the notion of Device Comfort......, which captures a device's ability to secure and reason about its environment. Specifically, we study the feasibility of two device comfort calculation methods we proposed in previous work. We do trace driven simulations based on a large body of sensed data from mobile devices in the real world...

  18. Using Program Data to Improve Access to Family Planning and Enhance the Method Mix in Conflict-Affected Areas of the Democratic Republic of the Congo

    Science.gov (United States)

    Ho, Lara S; Wheeler, Erin

    2018-01-01

    Unmet need for family planning in the conflict-affected area of eastern Democratic Republic of the Congo (DRC) has been reported to be as high as 38%, and women in such conflict settings are often the most at risk for maternal mortality. The International Rescue Committee implements the Family Planning and Post-Abortion Care in Emergencies program in 3 provinces of eastern DRC to provide women and couples access to family planning, including long-acting reversible contraceptives (LARCs). This article presents routine program data from June 2011 through December 2013 from 2 health zones as well as results from a qualitative assessment of family planning clients and of male and female non-users, conducted in 2013. It then describes how these findings were used to make program adjustments to improve access to family planning services and client informed choice and assesses the effects of the program design changes on family planning uptake and method mix using routine program data from January 2014 through December 2016. Between 2011 and 2013, 8,985 clients adopted family planning, with an average 14 clients adopting a method per facility, per month. The method mix remained stable during this period, with implants dominating at 48%. Barriers to uptake identified from the qualitative research were both supply- and demand-related, including misconceptions about certain modern contraceptive methods on the part of providers, users, and other community members. The program implemented several program changes based on the assessment findings, including clinical coaching and supportive supervision to improve provider skills and attitudes, introduction of immediate postpartum insertion of the intrauterine device (IUD) and the levonorgestrel-releasing intrauterine system (LNG-IUS), and behavior change communication campaigns to raise awareness about family planning. After these program changes, the mean number of clients adopting modern family planning per facility, per month

  19. Using Program Data to Improve Access to Family Planning and Enhance the Method Mix in Conflict-Affected Areas of the Democratic Republic of the Congo.

    Science.gov (United States)

    Ho, Lara S; Wheeler, Erin

    2018-03-21

    Unmet need for family planning in the conflict-affected area of eastern Democratic Republic of the Congo (DRC) has been reported to be as high as 38%, and women in such conflict settings are often the most at risk for maternal mortality. The International Rescue Committee implements the Family Planning and Post-Abortion Care in Emergencies program in 3 provinces of eastern DRC to provide women and couples access to family planning, including long-acting reversible contraceptives (LARCs). This article presents routine program data from June 2011 through December 2013 from 2 health zones as well as results from a qualitative assessment of family planning clients and of male and female non-users, conducted in 2013. It then describes how these findings were used to make program adjustments to improve access to family planning services and client informed choice and assesses the effects of the program design changes on family planning uptake and method mix using routine program data from January 2014 through December 2016. Between 2011 and 2013, 8,985 clients adopted family planning, with an average 14 clients adopting a method per facility, per month. The method mix remained stable during this period, with implants dominating at 48%. Barriers to uptake identified from the qualitative research were both supply- and demand-related, including misconceptions about certain modern contraceptive methods on the part of providers, users, and other community members. The program implemented several program changes based on the assessment findings, including clinical coaching and supportive supervision to improve provider skills and attitudes, introduction of immediate postpartum insertion of the intrauterine device (IUD) and the levonorgestrel-releasing intrauterine system (LNG-IUS), and behavior change communication campaigns to raise awareness about family planning. After these program changes, the mean number of clients adopting modern family planning per facility, per month

  20. Simulation of temporal and spatial distribution of required irrigation water by crop models and the pan evaporation coefficient method

    Science.gov (United States)

    Yang, Yan-min; Yang, Yonghui; Han, Shu-min; Hu, Yu-kun

    2009-07-01

    Hebei Plain is the most important agricultural belt in North China. Intensive irrigation, low and uneven precipitation have led to severe water shortage on the plain. This study is an attempt to resolve this crucial issue of water shortage for sustainable agricultural production and water resources management. The paper models distributed regional irrigation requirement for a range of cultivated crops on the plain. Classic crop models like DSSAT- wheat/maize and COTTON2K are used in combination with pan-evaporation coefficient method to estimate water requirements for wheat, corn, cotton, fruit-trees and vegetables. The approach is more accurate than the static approach adopted in previous studies. This is because the combination use of crop models and pan-evaporation coefficient method dynamically accounts for irrigation requirement at different growth stages of crops, agronomic practices, and field and climatic conditions. The simulation results show increasing Required Irrigation Amount (RIA) with time. RIA ranges from 5.08×109 m3 to 14.42×109 m3 for the period 1986~2006, with an annual average of 10.6×109 m3. Percent average water use by wheat, fruit trees, vegetable, corn and cotton is 41%, 12%, 12%, 11%, 7% and 17% respectively. RIA for April and May (the period with the highest irrigation water use) is 1.78×109 m3 and 2.41×109 m3 respectively. The counties in the piedmont regions of Mount Taihang have high RIA while the central and eastern regions/counties have low irrigation requirement.

  1. Oxygen-doped zirconium nitride based transparent resistive random access memory devices fabricated by radio frequency sputtering method

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hee-Dong, E-mail: khd0708@sejong.ac.kr [Department of Electrical Engineering, Sejong University, Neungdong-ro 209, Gwangjin-gu, Seoul 143-747 (Korea, Republic of); Yun, Min Ju [Department of Electrical Engineering, Sejong University, Neungdong-ro 209, Gwangjin-gu, Seoul 143-747 (Korea, Republic of); Kim, Kyeong Heon [School of Electrical Engineering, Korea University, Anam-dong, Sungbuk-gu, Seoul 163-701 (Korea, Republic of); Kim, Sungho, E-mail: sungho85.kim@sejong.ac.kr [Department of Electrical Engineering, Sejong University, Neungdong-ro 209, Gwangjin-gu, Seoul 143-747 (Korea, Republic of)

    2016-08-05

    In this work, we present a feasibility of bipolar resistive switching (RS) characteristics for Oxygen-doped zirconium nitride (O-doped ZrN{sub x}) films, produced by sputtering method, which shows a high optical transmittance of approximately 78% in the visible region as well as near ultra-violet region. In addition, in a RS test, the device has a large current ratio of 5 × 10{sup 3} in positive bias region and 5 × 10{sup 5} in negative bias region. Then, to evaluate an ability of data storage for the proposed memory devices, we measured a retention time for 10{sup 4} s at room temperature (RT) and 85 °C as well. As a result, the set and reset states were stably maintained with a current ratio of ∼10{sup 2} at 85 °C to ∼10{sup 3} at RT. This result means that the transparent memory by controlling the working pressure during sputtering process to deposit the ZrN{sub x} films could be a milestone for future see-through electronic devices. - Highlights: • The resistive switching characteristics of the transparent O-doped ZrN{sub x}-based RRAM cells have investigated. • Oxygen doping concentration within ZrN{sub x} is optimized using working pressure of sputter. • Long retention time were observed.

  2. Oxygen-doped zirconium nitride based transparent resistive random access memory devices fabricated by radio frequency sputtering method

    International Nuclear Information System (INIS)

    Kim, Hee-Dong; Yun, Min Ju; Kim, Kyeong Heon; Kim, Sungho

    2016-01-01

    In this work, we present a feasibility of bipolar resistive switching (RS) characteristics for Oxygen-doped zirconium nitride (O-doped ZrN_x) films, produced by sputtering method, which shows a high optical transmittance of approximately 78% in the visible region as well as near ultra-violet region. In addition, in a RS test, the device has a large current ratio of 5 × 10"3 in positive bias region and 5 × 10"5 in negative bias region. Then, to evaluate an ability of data storage for the proposed memory devices, we measured a retention time for 10"4 s at room temperature (RT) and 85 °C as well. As a result, the set and reset states were stably maintained with a current ratio of ∼10"2 at 85 °C to ∼10"3 at RT. This result means that the transparent memory by controlling the working pressure during sputtering process to deposit the ZrN_x films could be a milestone for future see-through electronic devices. - Highlights: • The resistive switching characteristics of the transparent O-doped ZrN_x-based RRAM cells have investigated. • Oxygen doping concentration within ZrN_x is optimized using working pressure of sputter. • Long retention time were observed.

  3. Access to Difficult-to-reach Population Subgroups: A Family Midwife Based Home Visiting Service for Implementing Nutrition-related Preventive Activities - A Mixed Methods Explorative Study

    Directory of Open Access Journals (Sweden)

    Helena Walz

    2015-08-01

    Full Text Available Health and social inequality are tightly linked and still pose an important public health problem. However, vulnerable and disadvantaged populations are difficult to reach for health-related interventions. Given the long-lasting effects of an adverse, particular nutrition-related, intrauterine and neonatal environment on health development (perinatal programming, an early and easy access is essential for sustainable interventions. The goal of this explorative study was therefore to elucidate whether an existing access of family midwives (FMs to families in need of support could be an option to implement effective public health and nutrition interventions. To that end three research objectives were formulated: (1 to determine whether a discernible impact of home visits by FMs can be described; (2 to identify subgroups among these families in need of more specific interventions; (3 to determine how relevant nutrition-related topics are for both FMs and the supported families. For addressing these objectives a mixed methods design was used: Routine documentation data from 295 families visited by a family midwife (FM were analyzed (secondary analysis, and structured expert interviews with FMs were conducted and analyzed. Study reporting followed the STROBE (STrengthening the Reporting of OBservational studies in Epidemiology statement. Based on the FMs reports, a significant improvement (p < 0.001 regarding psycho-social variables could be determined after the home visits. Single mothers, however, seemed to benefit less from the FMs service compared to their counterparts (p = 0.015. Nutritional counseling was demanded by 89% of the families during the home visits. In addition, nutrition-related topics were reported in the interviews to be of high interest to both families and the FMs. Based on the obtained results it is concluded that FMs home visits offer a promising access to vulnerable and disadvantaged families for implementing nutrition

  4. Improving allowed outage time and surveillance test interval requirements: a study of their interactions using probabilistic methods

    International Nuclear Information System (INIS)

    Martorell, S.A.; Serradell, V.G.; Samanta, P.K.

    1995-01-01

    Technical Specifications (TS) define the limits and conditions for operating nuclear plants safely. We selected the Limiting Conditions for Operations (LCO) and Surveillance Requirements (SR), both within TS, as the main items to be evaluated using probabilistic methods. In particular, we focused on the Allowed Outage Time (AOT) and Surveillance Test Interval (STI) requirements in LCO and SR, respectively. Already, significant operating and design experience has accumulated revealing several problems which require modifications in some TS rules. Developments in Probabilistic Safety Assessment (PSA) allow the evaluation of effects due to such modifications in AOT and STI from a risk point of view. Thus, some changes have already been adopted in some plants. However, the combined effect of several changes in AOT and STI, i.e. through their interactions, is not addressed. This paper presents a methodology which encompasses, along with the definition of AOT and STI interactions, the quantification of interactions in terms of risk using PSA methods, an approach for evaluating simultaneous AOT and STI modifications, and an assessment of strategies for giving flexibility to plant operation through simultaneous changes on AOT and STI using trade-off-based risk criteria

  5. Beverage consumption in an Alaska Native village: a mixed-methods study of behaviour, attitudes and access

    Directory of Open Access Journals (Sweden)

    Deena Elwan

    2016-02-01

    Full Text Available Background: American Indians/Alaska Natives (AI/AN have the highest prevalence of obesity for any racial/ethnic group. Previous studies examining risk factors for obesity have identified excessive sugar-sweetened beverage (SSB and inadequate water consumption as major risk factors for this population group. The historical scarcity of water in rural Alaska may explain consumption patterns including reliance on SSBs and other packaged drinks. Methods: Our study was designed to assess SSB, water and other beverage consumption and attitudes towards consumption in Alaska Native children and adults residing in rural Alaska. During summer 2014, 2 focus groups were conducted employing community members in a small rural village more than 200 air miles west of Fairbanks, Alaska. Interviews were completed with shop owners, Early Head Start and Head Start program instructors (n=7. SSB and total beverage intakes were measured using a modified version of the BEVQ-15, (n=69. Results: High rates of SSB consumption (defined as sweetened juice beverages, soda, sweet tea, energy drink or sports drinks and low rates of water consumption were reported for all age groups in the village. All adolescents and 81% of children reported drinking SSBs at least once per week in the last month, and 48% of adolescents and 29% of younger children reported daily consumption. Fifty-two per cent of adults reported consuming SSBs at least once per week and 20% reported daily consumption. Twenty-five per cent of adolescents reported never drinking water in the past month, and 19% of younger children and 21% of adults did not consume water daily. Conclusion: Alaska Native children and adults living in the Interior Alaska consume high amounts of SSBs including energy drinks and insufficient amounts of water. Interventions targeting beverage consumption are urgently needed for the Alaska Native population in rural Alaska.

  6. Access Contested

    International Development Research Centre (IDRC) Digital Library (Canada)

    Transforming Global Information and Communication Markets: The Political Economy of ... 8 Control and Resistance: Attacks on Burmese Opposition Media 153 ...... “Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet,” in Access ...

  7. Forbidden Access

    CERN Multimedia

    C. Colloca TS/FM

    2004-01-01

    TS/FM group informs you that, for the replacement of the door of the main entrance at bldg. 500, the access will be closed to the public between 19 and 30 July 2004. Access to the Main Building complex will be assured at any time through both of the side doors and from bldg. 64. For more information, please contact 73273. C. Colloca TS/FM

  8. Quantum random access memory

    OpenAIRE

    Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo

    2007-01-01

    A random access memory (RAM) uses n bits to randomly address N=2^n distinct memory cells. A quantum random access memory (qRAM) uses n qubits to address any quantum superposition of N memory cells. We present an architecture that exponentially reduces the requirements for a memory call: O(log N) switches need be thrown instead of the N used in conventional (classical or quantum) RAM designs. This yields a more robust qRAM algorithm, as it in general requires entanglement among exponentially l...

  9. The intracavitary ECG method for positioning the tip of central venous access devices in pediatric patients: results of an Italian multicenter study.

    Science.gov (United States)

    Rossetti, Francesca; Pittiruti, Mauro; Lamperti, Massimo; Graziano, Ugo; Celentano, Davide; Capozzoli, Giuseppe

    2015-01-01

    The Italian Group for Venous Access Devices (GAVeCeLT) has carried out a multicenter study investigating the safety and accuracy of intracavitary electrocardiography (IC-ECG) in pediatric patients. We enrolled 309 patients (age 1 month-18 years) candidate to different central venous access devices (VAD) - 56 peripherally inserted central catheters (PICC), 178 short term centrally inserted central catheters (CICC), 65 long term VADs, 10 VADs for dialysis - in five Italian Hospitals. Three age groups were considered: A (ECG was applicable in 307 cases. The increase of the P wave on IC-ECG was detected in all cases but two. The tip of the catheter was positioned at the cavo-atrial junction (CAJ) (i.e., at the maximal height of the P wave on IC-ECG) and the position was checked during the procedure by fluoroscopy or chest x-ray, considering the CAJ at 1-2 cm (group A), 1.5-3 cm (group B), or 2-4 cm (group C) below the carina. There were no complications related to IC-ECG. The overall match between IC-ECG and x-ray was 95.8% (96.2% in group A, 95% in group B, and 96.8% in group C). In 95 cases, the IC-ECG was performed with a dedicated ECG monitor, specifically designed for IC-ECG (Nautilus, Romedex): in this group, the match between IC-ECG and x-ray was 98.8%. We conclude that the IC-ECG method is safe and accurate in the pediatric patients. The applicability of the method is 99.4% and its feasibility is 99.4%. The accuracy is 95.8% and even higher (98.8%) when using a dedicated ECG monitor.

  10. Improving access to high-quality primary care for socioeconomically disadvantaged older people in rural areas: a mixed method study protocol.

    Science.gov (United States)

    Ford, John A; Jones, Andrew P; Wong, Geoff; Clark, Allan B; Porter, Tom; Shakespeare, Tom; Swart, Ann Marie; Steel, Nicholas

    2015-09-18

    The UK has an ageing population, especially in rural areas, where deprivation is high among older people. Previous research has identified this group as at high risk of poor access to healthcare. The aim of this study is to generate a theory of how socioeconomically disadvantaged older people from rural areas access primary care, to develop an intervention based on this theory and test it in a feasibility trial. On the basis of the MRC Framework for Developing and Evaluating Complex Interventions, three methods will be used to generate the theory. First, a realist review will elucidate the patient pathway based on existing literature. Second, an analysis of the English Longitudinal Study of Ageing will be completed using structural equation modelling. Third, 15 semistructured interviews will be undertaken with patients and four focus groups with health professionals. A triangulation protocol will be used to allow each of these methods to inform and be informed by each other, and to integrate data into one overall realist theory. Based on this theory, an intervention will be developed in discussion with stakeholders to ensure that the intervention is feasible and practical. The intervention will be tested within a feasibility trial, the design of which will depend on the intervention. Lessons from the feasibility trial will be used to refine the intervention and gather the information needed for a definitive trial. Ethics approval from the regional ethics committee has been granted for the focus groups with health professionals and interviews with patients. Ethics approval will be sought for the feasibility trial after the intervention has been designed. Findings will be disseminated to the key stakeholders involved in intervention development, to researchers, clinicians and health planners through peer-reviewed journal articles and conference publications, and locally through a dissemination event. Published by the BMJ Publishing Group Limited. For permission to

  11. Accessible Knowledge - Knowledge on Accessibility

    DEFF Research Database (Denmark)

    Kirkeby, Inge Mette

    2015-01-01

    Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...

  12. Some basic requirements for the application of electrokinetic methods for the reconstruction of masonry with rising humidity

    Energy Technology Data Exchange (ETDEWEB)

    Friese, P; Jacobasch, H J; Boerner, M

    1987-12-01

    Based on some theoretical statements concerning the electro-osmosis the most important requirements for the application of electrokinetic methods for drying masonry with rising humidity are described. Samples of brick masonry (brick and mortar) were examined by means of an electrokinetic measuring system (EKM) with different electrolytes (CaSO/sub 4/ and KCl) being used for different concentrations. It was found for all samples, that the zeta potential is provided with a negative sign and that the absolute value of the zeta potential approaches zero with increasing electrolyte concentration. Based on these measurements, an upper limit of the electrolyte concentration of 0.1 Mol/liter is established for the application of electrokinetic methods for drying masonry.

  13. Open access

    CERN Document Server

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder consent, and many authors, musicians, filmmakers, and other creators who depend on royalties are understandably unwilling to give their consent. But for 350 years, scholars have written peer-reviewed journal articles for impact, not for money, and are free to consent to open access without losing revenue. In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. Distilling a decade of Suber's influential writing and thinking about open access, this is the indispe...

  14. No actual measurement … was required: Maxwell and Cavendish's null method for the inverse square law of electrostatics.

    Science.gov (United States)

    Falconer, Isobel

    In 1877 James Clerk Maxwell and his student Donald MacAlister refined Henry Cavendish's 1773 null experiment demonstrating the absence of electricity inside a charged conductor. This null result was a mathematical prediction of the inverse square law of electrostatics, and both Cavendish and Maxwell took the experiment as verifying the law. However, Maxwell had already expressed absolute conviction in the law, based on results of Michael Faraday's. So, what was the value to him of repeating Cavendish's experiment? After assessing whether the law was as secure as he claimed, this paper explores its central importance to the electrical programme that Maxwell was pursuing. It traces the historical and conceptual re-orderings through which Maxwell established the law by constructing a tradition of null tests and asserting the superior accuracy of the method. Maxwell drew on his developing 'doctrine of method' to identify Cavendish's experiment as a member of a wider class of null methods. By doing so, he appealed to the null practices of telegraph engineers, diverted attention from the flawed logic of the method, and sought to localise issues around the mapping of numbers onto instrumental indications, on the grounds that 'no actual measurement … was required'. Copyright © 2017 Elsevier Ltd. All rights reserved.

  15. The AAS Working Group on Accessibility and Disability (WGAD) Year 1 Highlights and Database Access

    Science.gov (United States)

    Knierman, Karen A.; Diaz Merced, Wanda; Aarnio, Alicia; Garcia, Beatriz; Monkiewicz, Jacqueline A.; Murphy, Nicholas Arnold

    2017-06-01

    The AAS Working Group on Accessibility and Disability (WGAD) was formed in January of 2016 with the express purpose of seeking equity of opportunity and building inclusive practices for disabled astronomers at all educational and career stages. In this presentation, we will provide a summary of current activities, focusing on developing best practices for accessibility with respect to astronomical databases, publications, and meetings. Due to the reliance of space sciences on databases, it is important to have user centered design systems for data retrieval. The cognitive overload that may be experienced by users of current databases may be mitigated by use of multi-modal interfaces such as xSonify. Such interfaces would be in parallel or outside the original database and would not require additional software efforts from the original database. WGAD is partnering with the IAU Commission C1 WG Astronomy for Equity and Inclusion to develop such accessibility tools for databases and methods for user testing. To collect data on astronomical conference and meeting accessibility considerations, WGAD solicited feedback from January AAS attendees via a web form. These data, together with upcoming input from the community and analysis of accessibility documents of similar conferences, will be used to create a meeting accessibility document. Additionally, we will update the progress of journal access guidelines and our social media presence via Twitter. We recommend that astronomical journals form committees to evaluate the accessibility of their publications by performing user-centered usability studies.

  16. Time dependent accessibility

    OpenAIRE

    Kaza, Nikhil

    2015-01-01

    Many place based accessibility studies ignore the time component. Relying on theoretical frameworks that treat distance between two fixed points as constant, these methods ignore the diurnal and seasonal changes in accessibility. Network distances between two nodes are dependent on the network structure and weight distribution on the edges. These weights can change quite frequently and the network structure itself is subject to modification because of availability and unavailability of links ...

  17. Rationale, design and methods for a randomised and controlled trial to investigate whether home access to electronic games decreases children's physical activity

    Directory of Open Access Journals (Sweden)

    Piek Jan P

    2009-06-01

    Full Text Available Abstract Background Many children are reported to have insufficient physical activity (PA placing them at greater risk of poor health outcomes. Participating in sedentary activities such as playing electronic games is widely believed to contribute to less PA. However there is no experimental evidence that playing electronic games reduces PA. There is also no evidence regarding the effect of different types of electronic games (traditional sedentary electronic games versus new active input electronic games on PA. Further, there is a poor understanding about how characteristics of children may moderate the impact of electronic game access on PA and about what leisure activities are displaced when children play electronic games. Given that many children play electronic games, a better understanding of the effect of electronic game use on PA is critical to inform child health policy and intervention. Methods This randomised and controlled trial will examine whether PA is decreased by access to electronic games and whether any effect is dependent on the type of game input or the child's characteristics. Children aged 10–12 years (N = 72, 36 females will be recruited and randomised to a balanced ordering of 'no electronic games', 'traditional' electronic games and 'active' electronic games. Each child will participate in each condition for 8 weeks, and be assessed prior to participation and at the end of each condition. The primary outcome is PA, assessed by Actical accelerometers worn for 7 days on the wrist and hip. Energy expenditure will be assessed by the doubly labelled water technique and motor coordination, adiposity, self-confidence, attitudes to technology and PA and leisure activities will also be assessed. A sample of 72 will provide a power of > 0.9 for detecting a 15 mins difference in PA (sd = 30 mins. Discussion This is the first such trial and will provide critical information to understand whether access to electronic games affects

  18. Evaluation of an open access echocardiography service in the Netherlands: a mixed methods study of indications, outcomes, patient management and trends

    Directory of Open Access Journals (Sweden)

    Streppel Marjolijn

    2010-02-01

    Full Text Available Abstract Background In our region (Eastern South Limburg, The Netherlands an open access echocardiography service started in 2002. It was the first service of this kind in The Netherlands. Our study aims were: (1 to evaluate demand for the service, participation, indications, echocardiography outcomes, and management by the general practitioner (GP; (2 to analyse changes in indications and outcomes over the years. Methods (1 Data from GP request forms, echocardiography reports and a retrospective GP questionnaire on management (response rate 83% of 625 consecutive patients (Dec. 2002 - March 2007 were analysed cross-sectionally. (2 For the analysis of changes over the years, data from GP request forms and echocardiography reports of the first and last 250 patients that visited the service between Dec. 2002 and Feb. 2008 (n = 1001 were compared. Results The echocardiography service was used by 81% of the regional GPs. On average, a GP referred one patient per year to the service. Intended indications for the service were dyspnoea (32%, cardiac murmur (59%, and peripheral oedema (17%. Of the other indications (22%, one-third was for evaluation of suspected left ventricular hypertrophy (LVH. Expected outcomes were left ventricular dysfunction (LVD (43%, predominantly diastolic and valve disease (25%. We also found a high proportion of LVH (50%. Only 24% of all echocardiograms showed no relevant disease. The GP followed the cardiologist's advice to refer the patient for further evaluation in 71%. In recent patients, more echocardiography requests were done for 'cardiac murmur' and 'other' indications, but less for 'dyspnoea'. The proportions of patients with LVD, LVH and valve disease decreased and the proportion of patients with no relevant disease increased. The number of advices by the cardiologists increased. Conclusion Overall, GPs used the open access echocardiography service efficiently (i.e. with a high chance of finding relevant pathology

  19. Gaining Access.

    Science.gov (United States)

    Wand, Sean; Thermos, Adam C.

    1998-01-01

    Explains the issues to consider before a college decides to purchase a card-access system. The benefits of automation, questions involving implementation, the criteria for technology selection, what typical card technology involves, privacy concerns, and the placement of card readers are discussed. (GR)

  20. A simple method using on-line continuous leaching and ion exchange chromatography coupled to inductively coupled plasma mass spectrometry for the speciation analysis of bio-accessible arsenic in rice.

    Science.gov (United States)

    Horner, Nolan S; Beauchemin, Diane

    2012-03-02

    A simple method for the speciation analysis of bio-accessible arsenic (As) in rice was developed using a continuous on-line leaching method to release the bio-accessible fraction. The continuous on-line leaching method has several advantages over commonly used batch methods including quicker and easier sample preparation, reduced risk of contamination and access to real time leaching data. The bio-accessibility of As in the samples was monitored using inductively coupled plasma mass spectrometry (ICP-MS). Results from a certified reference material as well as cooked and uncooked white rice showed that the majority of As was leached by saliva. Results obtained using the continuous on-line leaching method were comparable to those obtained using a batch method. Speciation analysis of the saliva leachate was performed using ion exchange chromatography coupled to ICP-MS. The four most toxic forms of As (As(III), monomethylarsonic acid (MMA), dimethylarsinic acid (DMA) and As(V)) were clearly separated within 5 min in a single chromatographic run. Over 92% of bio-accessible As in the certified reference material and uncooked white rice sample was in the form of DMA and As(V), whereas it was present as DMA and As(III) in the cooked white rice. Copyright © 2011 Elsevier B.V. All rights reserved.

  1. Requirements and testing methods for surfaces of metallic bipolar plates for low-temperature PEM fuel cells

    Science.gov (United States)

    Jendras, P.; Lötsch, K.; von Unwerth, T.

    2017-03-01

    To reduce emissions and to substitute combustion engines automotive manufacturers, legislature and first users aspire hydrogen fuel cell vehicles. Up to now the focus of research was set on ensuring functionality and increasing durability of fuel cell components. Therefore, expensive materials were used. Contemporary research and development try to substitute these substances by more cost-effective material combinations. The bipolar plate is a key component with the greatest influence on volume and mass of a fuel cell stack and they have to meet complex requirements. They support bending sensitive components of stack, spread reactants over active cell area and form the electrical contact to another cell. Furthermore, bipolar plates dissipate heat of reaction and separate one cell gastight from the other. Consequently, they need a low interfacial contact resistance (ICR) to the gas diffusion layer, high flexural strength, good thermal conductivity and a high durability. To reduce costs stainless steel is a favoured material for bipolar plates in automotive applications. Steel is characterized by good electrical and thermal conductivity but the acid environment requires a high chemical durability against corrosion as well. On the one hand formation of a passivating oxide layer increasing ICR should be inhibited. On the other hand pitting corrosion leading to increased permeation rate may not occur. Therefore, a suitable substrate lamination combination is wanted. In this study material testing methods for bipolar plates are considered.

  2. Development of the relaxation-assisted 2DIR method for accessing structures of molecules and its application for studying the energy transport on a molecular level

    Science.gov (United States)

    Kasyanenko, Valeriy Mitrofanovich

    Measuring the three-dimensional structure of molecules, dynamics of structural changes, and energy transport on a molecular scale is important for many areas of natural science. Supplementing the widely used methods of x-ray diffraction, NMR, and optical spectroscopies, a two-dimensional infrared spectroscopy (2DIR) method was introduced about a decade ago. The 2DIR method measures pair-wise interactions between vibrational modes in molecules, thus acquiring molecular structural constraints such as distances between vibrating groups and the angles between their transition dipoles. The 2DIR method has been applied to a variety of molecular systems but in studying larger molecules such as proteins and peptides the method is facing challenges associated with the congestion of their vibrational spectra and delocalized character of their vibrational modes. To help extract structural information from such spectra and make efficient use of vibrational modes separated by large distances, a novel relaxation-assisted 2DIR method (RA 2DIR) has recently been proposed, which exploits the transport of excess vibrational energy from the initially excited mode. With the goal of further development of RA 2DIR, we applied it to a variety of molecular systems, including model compounds, transition-metal complexes, and isomers. The experiments revealed several novel effects which both enhance the power of RA 2DIR and bring a deeper understanding to the fundamental process of energy transport on a molecular level. We demonstrated that RA 2DIR can enhance greatly (27-fold) the cross-peak amplitude among spatially remote modes, which leads to an increase of the range of distances accessible for structural measurements by several fold. We demonstrated that the energy transport time correlates with the intermode distance. This correlation offers a new way for identifying connectivity patterns in molecules. We developed two models of energy transport in molecules. In one, a spatial overlap

  3. Bulk derivatization and cation exchange restricted access media-based trap-and-elute liquid chromatography–mass spectrometry method for determination of trace estrogens in serum

    International Nuclear Information System (INIS)

    Beinhauer, Jana; Bian, Liangqiao; Fan, Hui; Šebela, Marek; Kukula, Maciej; Barrera, Jose A.

    2015-01-01

    Highlights: • Analysis of estrogens in small volume samples at low parts-per-trillion concentration. • Charged bulk derivatization facilitates on-line ion exchange sample preparation. • On-line WCX restricted access media traps analytes, but not proteins and lipids. • Complete preparation and LC–MS/MS analysis completed in 30 min/sample. - Abstract: Estrone (E1), estradiols (α/β-E2), and estriol (E3) are four major metabolically active estrogens exerting strong biological activities at very low circulating concentrations. This paper reports a sensitive and efficient method with automated, on-line clean-up and detection to determine trace estrogens in a small volume of serum samples using liquid chromatography–electrospray ionization–tandem mass spectrometry directly, without off-line liquid–liquid or solid-phase extraction pretreatments. Serum aliquots (charcoal stripped fetal bovine serum, 100 μL) were spiked with four estrogen standards and their corresponding isotope-labeled internal standards, then bulk derivatized with 2-fluoro-1-methyl-pyridium p-toluenesulfonate (2-FMP) to establish the calibration curves and perform method validation. Calibration was established in the concentration ranges of 5–1000 pg mL −1 , and demonstrated good linearity of R 2 from 0.9944 to 0.9997 for the four derivatized estrogens. The lower detection limits obtained were 3–7 pg mL −1 . Good accuracy and precision in the range of 86–112% and 2.3–11.9%, respectively, were observed for the quality control (QC) samples at low, medium, and high concentration levels. The stability tests showed that the derivatized serum samples were stable 8 h after derivatization at room temperature and at least to 48 h if stored at −20 °C. The method was applied to measure trace estrogens in real human and bovine serum samples, and three of four estrogen compounds studied were observed and quantified

  4. method

    Directory of Open Access Journals (Sweden)

    L. M. Kimball

    2002-01-01

    Full Text Available This paper presents an interior point algorithm to solve the multiperiod hydrothermal economic dispatch (HTED. The multiperiod HTED is a large scale nonlinear programming problem. Various optimization methods have been applied to the multiperiod HTED, but most neglect important network characteristics or require decomposition into thermal and hydro subproblems. The algorithm described here exploits the special bordered block diagonal structure and sparsity of the Newton system for the first order necessary conditions to result in a fast efficient algorithm that can account for all network aspects. Applying this new algorithm challenges a conventional method for the use of available hydro resources known as the peak shaving heuristic.

  5. Error free physically unclonable function with programmed resistive random access memory using reliable resistance states by specific identification-generation method

    Science.gov (United States)

    Tseng, Po-Hao; Hsu, Kai-Chieh; Lin, Yu-Yu; Lee, Feng-Min; Lee, Ming-Hsiu; Lung, Hsiang-Lan; Hsieh, Kuang-Yeu; Chung Wang, Keh; Lu, Chih-Yuan

    2018-04-01

    A high performance physically unclonable function (PUF) implemented with WO3 resistive random access memory (ReRAM) is presented in this paper. This robust ReRAM-PUF can eliminated bit flipping problem at very high temperature (up to 250 °C) due to plentiful read margin by using initial resistance state and set resistance state. It is also promised 10 years retention at the temperature range of 210 °C. These two stable resistance states enable stable operation at automotive environments from -40 to 125 °C without need of temperature compensation circuit. The high uniqueness of PUF can be achieved by implementing a proposed identification (ID)-generation method. Optimized forming condition can move 50% of the cells to low resistance state and the remaining 50% remain at initial high resistance state. The inter- and intra-PUF evaluations with unlimited separation of hamming distance (HD) are successfully demonstrated even under the corner condition. The number of reproduction was measured to exceed 107 times with 0% bit error rate (BER) at read voltage from 0.4 to 0.7 V.

  6. Reported Design Processes for Accessibility in Rail Transport

    DEFF Research Database (Denmark)

    Herriott, Richard; Cook, Sharon

    2014-01-01

    Accessibility is a fundamental requirement in public transport (PT) yet there exists little research on design for accessibility or inclusive design (ID) in this area. This paper sets out to discover what methods are used in the rail sector to achieve accessibility goals and to examine how far...... these methods deviate from user-centred and ID norms. Semi-structured interviews were conducted with nine rolling stock producers, operators and design consultancies. The purpose was to determine if ID design methods are used explicitly and the extent to which the processes used conformed to ID (if at all......). The research found that the role of users in the design process of manufacturers was limited and that compliance with industry standards was the dominant means to achieving accessibility goals. Design consultancies were willing to apply more user-centred design if the client requested it. Where operators were...

  7. Protein Requirements Are Elevated in Endurance Athletes after Exercise as Determined by the Indicator Amino Acid Oxidation Method.

    Directory of Open Access Journals (Sweden)

    Hiroyuki Kato

    Full Text Available A higher protein intake has been recommended for endurance athletes compared with healthy non-exercising individuals based primarily on nitrogen balance methodology. The aim of this study was to determine the estimated average protein requirement and recommended protein intake in endurance athletes during an acute 3-d controlled training period using the indicator amino acid oxidation method. After 2-d of controlled diet (1.4 g protein/kg/d and training (10 and 5km/d, respectively, six male endurance-trained adults (28±4 y of age; Body weight, 64.5±10.0 kg; VO2peak, 60.3±6.7 ml·kg-1·min-1; means±SD performed an acute bout of endurance exercise (20 km treadmill run prior to consuming test diets providing variable amounts of protein (0.2-2.8 g·kg-1·d-1 and sufficient energy. Protein was provided as a crystalline amino acid mixture based on the composition of egg protein with [1-13C]phenylalanine provided to determine whole body phenylalanine flux, 13CO2 excretion, and phenylalanine oxidation. The estimated average protein requirement was determined as the breakpoint after biphasic linear regression analysis with a recommended protein intake defined as the upper 95% confidence interval. Phenylalanine flux (68.8±8.5 μmol·kg-1·h-1 was not affected by protein intake. 13CO2 excretion displayed a robust bi-phase linear relationship (R2 = 0.86 that resulted in an estimated average requirement and a recommended protein intake of 1.65 and 1.83 g protein·kg-1·d-1, respectively, which was similar to values based on phenylalanine oxidation (1.53 and 1.70 g·kg-1·d-1, respectively. We report a recommended protein intake that is greater than the RDA (0.8 g·kg-1·d-1 and current recommendations for endurance athletes (1.2-1.4 g·kg-1·d-1. Our results suggest that the metabolic demand for protein in endurance-trained adults on a higher volume training day is greater than their sedentary peers and current recommendations for athletes based

  8. Web accessibility standards and disability: developing critical perspectives on accessibility.

    Science.gov (United States)

    Lewthwaite, Sarah

    2014-01-01

    accessibility blending digital and physical solutions, the use of BS 8878 and mixed-method approaches to accessibility benchmarking. Web standards and accessibility conformance should be considered together with user input and the recognition and development of local accessibility and rehabilitation expertize.

  9. Efficient medium access control protocol for geostationary satellite systems

    Institute of Scientific and Technical Information of China (English)

    王丽娜; 顾学迈

    2004-01-01

    This paper proposes an efficient medium access control (MAC) protocol based on multifrequency-time division multiple access (MF-TDMA) for geostationary satellite systems deploying multiple spot-beams and onboard processing,which uses a method of random reservation access with movable boundaries to dynamically request the transmission slots and can transmit different types of traffic. The simulation results have shown that our designed MAC protocol can achieve a high bandwidth utilization, while providing the required quality of service (QoS) for each class of service.

  10. Expanding Access to a New, More Affordable Levonorgestrel Intrauterine System in Kenya: Service Delivery Costs Compared With Other Contraceptive Methods and Perspectives of Key Opinion Leaders.

    Science.gov (United States)

    Rademacher, Kate H; Solomon, Marsden; Brett, Tracey; Bratt, John H; Pascual, Claire; Njunguru, Jesse; Steiner, Markus J

    2016-08-11

    The levonorgestrel intrauterine system (LNG IUS) is one of the most effective forms of contraception and offers important non-contraceptive health benefits. However, it is not widely available in developing countries, largely due to the high price of existing products. Medicines360 plans to introduce its new, more affordable LNG IUS in Kenya. The public-sector transfer price will vary by volume between US$12 to US$16 per unit; for an order of 100,000 units, the public-sector transfer price will be approximately US$15 per unit. We calculated the direct service delivery cost per couple-years of protection (CYP) of various family planning methods. The model includes the costs of contraceptive commodities, consumable supplies, instruments per client visit, and direct labor for counseling, insertion, removal, and resupply, if required. The model does not include costs of demand creation or training. We conducted interviews with key opinion leaders in Kenya to identify considerations for scale-up of a new LNG IUS, including strategies to overcome barriers that have contributed to low uptake of the copper intrauterine device. The direct service delivery cost of Medicines360's LNG IUS per CYP compares favorably with other contraceptive methods commonly procured for public-sector distribution in Kenya. The cost is slightly lower than that of the 3-month contraceptive injectable, which is currently the most popular method in Kenya. Almost all key opinion leaders agreed that introducing a more affordable LNG IUS could increase demand and uptake of the method. They thought that women seeking the product's non-contraceptive health benefits would be a key market segment, and most agreed that the reduced menstrual bleeding associated with the method would likely be viewed as an advantage. The key opinion leaders indicated that myths and misconceptions among providers and clients about IUDs must be addressed, and that demand creation and provider training should be prioritized

  11. The methodical approach to determining the heterogeneity of cognitive function in preschool children requiring correction of speech impediments

    Directory of Open Access Journals (Sweden)

    N.B. Petrenko

    2016-04-01

    Full Text Available Introduction. It has been confirmed that children who suffer from speech impediments may experience difficulties in their cognitive activity, limitations in communication, asociality and sense detachment. It is also clear that these children require not only logopedic treatment, but also assistance in developing functions of their cognitive and mental activities. Aims. To identify the case of uniformity lack of cognitive and somatomental functions of 5-6 year old children with speech impediments in a group; to evaluate the method used for this research. Methods. Use estimates of major mental and cognitive activities by means of tests increases the difficulty. Scores from 1 to 10 were given. Such factors as movement coordination, musicality and body plasticity were taken into consideration too. StatSoft STATISTICA10.0. programme was used to run the statistical analysis. Results. The changes of the group with uniformity of physical, cognitive, somatomental and dance abilities were analysed and estimated at the beginning and at the end of the academic year. The results of the claster analysis have shown that the children managed to develop their cognitive and somatomental abilities. Also it was estimated that the level of uniformity has increased in the group. Conclusions. Having done the research we can state that with the help of cluster analysis children with speech impediments can be grouped according to their physical, cognitive, somatomental and dance abilities. With the help of the results of the claster analysis that notifies that the children managed to develop their cognitive and somatomental abilities, we can observe the positivie effects of the suggested dance-cognitive teaching elements in an educational programme.

  12. Accessing Sexual and Reproductive Health Information and ...

    African Journals Online (AJOL)

    Accessing Sexual and Reproductive Health Information and Services: A Mixed Methods Study of Young ... PROMOTING ACCESS TO AFRICAN RESEARCH ... and services in Soweto, South Africa using quantitative and qualitative methods.

  13. METHOD FOR SECURITY SPECIFICATION SOFTWARE REQUIREMENTS AS A MEANS FOR IMPLEMENTING A SOFTWARE DEVELOPMENT PROCESS SECURE - MERSEC

    Directory of Open Access Journals (Sweden)

    Castro Mecías, L.T.

    2015-06-01

    Full Text Available Often security incidents that have the object or use the software as a means of causing serious damage and legal, economic consequences, etc. Results of a survey by Kaspersky Lab reflectvulnerabilities in software are the main cause of security incidents in enterprises, the report shows that 85% of them have reported security incidents and vulnerabilities in software are the main reason is further estimated that incidents can cause significant losses estimated from 50,000 to $ 649.000. (1 In this regard academic and industry research focuses on proposals based on reducing vulnerabilities and failures of technology, with a positive influence on how the software is developed. A development process for improved safety practices and should include activities from the initial phases of the software; so that security needs are identified, manage risk and appropriate measures are implemented. This article discusses a method of analysis, acquisition and requirements specification of the software safety analysis on the basis of various proposals and deficiencies identified from participant observation in software development teams. Experiments performed using the proposed yields positive results regarding the reduction of security vulnerabilities and compliance with the safety objectives of the software.

  14. Method

    Directory of Open Access Journals (Sweden)

    Ling Fiona W.M.

    2017-01-01

    Full Text Available Rapid prototyping of microchannel gain lots of attention from researchers along with the rapid development of microfluidic technology. The conventional methods carried few disadvantages such as high cost, time consuming, required high operating pressure and temperature and involve expertise in operating the equipment. In this work, new method adapting xurography method is introduced to replace the conventional method of fabrication of microchannels. The novelty in this study is replacing the adhesion film with clear plastic film which was used to cut the design of the microchannel as the material is more suitable for fabricating more complex microchannel design. The microchannel was then mold using polymethyldisiloxane (PDMS and bonded with a clean glass to produce a close microchannel. The microchannel produced had a clean edge indicating good master mold was produced using the cutting plotter and the bonding between the PDMS and glass was good where no leakage was observed. The materials used in this method is cheap and the total time consumed is less than 5 hours where this method is suitable for rapid prototyping of microchannel.

  15. Bulk derivatization and cation exchange restricted access media-based trap-and-elute liquid chromatography–mass spectrometry method for determination of trace estrogens in serum

    Energy Technology Data Exchange (ETDEWEB)

    Beinhauer, Jana [Department of Biochemistry, Faculty of Science, Palacký University, Šlechtitelů 11, CZ-783 71 Olomouc (Czech Republic); Centre of the Region Haná for Biotechnological and Agricultural Research - Department of Protein Biochemistry and Proteomics, Faculty of Science, Palacký University, Šlechtitelů 11, CZ-783 71 Olomouc (Czech Republic); Bian, Liangqiao [Shimadzu Center for Advanced Analytical Chemistry, The University of Texas at Arlington, Arlington, TX (United States); Shimadzu Institute for Research Technologies, The University of Texas at Arlington, Arlington, TX (United States); Fan, Hui [Department of Chemistry and Biochemistry, The University of Texas at Arlington, Arlington, TX (United States); Šebela, Marek [Department of Biochemistry, Faculty of Science, Palacký University, Šlechtitelů 11, CZ-783 71 Olomouc (Czech Republic); Centre of the Region Haná for Biotechnological and Agricultural Research - Department of Protein Biochemistry and Proteomics, Faculty of Science, Palacký University, Šlechtitelů 11, CZ-783 71 Olomouc (Czech Republic); Kukula, Maciej [Shimadzu Center for Advanced Analytical Chemistry, The University of Texas at Arlington, Arlington, TX (United States); Shimadzu Institute for Research Technologies, The University of Texas at Arlington, Arlington, TX (United States); Barrera, Jose A. [Shimadzu Institute for Research Technologies, The University of Texas at Arlington, Arlington, TX (United States); and others

    2015-02-09

    Highlights: • Analysis of estrogens in small volume samples at low parts-per-trillion concentration. • Charged bulk derivatization facilitates on-line ion exchange sample preparation. • On-line WCX restricted access media traps analytes, but not proteins and lipids. • Complete preparation and LC–MS/MS analysis completed in 30 min/sample. - Abstract: Estrone (E1), estradiols (α/β-E2), and estriol (E3) are four major metabolically active estrogens exerting strong biological activities at very low circulating concentrations. This paper reports a sensitive and efficient method with automated, on-line clean-up and detection to determine trace estrogens in a small volume of serum samples using liquid chromatography–electrospray ionization–tandem mass spectrometry directly, without off-line liquid–liquid or solid-phase extraction pretreatments. Serum aliquots (charcoal stripped fetal bovine serum, 100 μL) were spiked with four estrogen standards and their corresponding isotope-labeled internal standards, then bulk derivatized with 2-fluoro-1-methyl-pyridium p-toluenesulfonate (2-FMP) to establish the calibration curves and perform method validation. Calibration was established in the concentration ranges of 5–1000 pg mL{sup −1}, and demonstrated good linearity of R{sup 2} from 0.9944 to 0.9997 for the four derivatized estrogens. The lower detection limits obtained were 3–7 pg mL{sup −1}. Good accuracy and precision in the range of 86–112% and 2.3–11.9%, respectively, were observed for the quality control (QC) samples at low, medium, and high concentration levels. The stability tests showed that the derivatized serum samples were stable 8 h after derivatization at room temperature and at least to 48 h if stored at −20 °C. The method was applied to measure trace estrogens in real human and bovine serum samples, and three of four estrogen compounds studied were observed and quantified.

  16. A multi-criteria approach of assessing public transport accessibility at a strategic level

    OpenAIRE

    Hawas, Yaser E.; Hassan, Mohammad Nurul; Abulibdeh, Ammar

    2016-01-01

    This paper presents an approach for accessibility categorization in areas where there is no extensive data available to run the conventional analysis. The presented method has the advantages of the lower data requirements and the utility of the results. Three benchmarks were selected to evaluate transit accessibility. The first one (transit coverage) investigates the spread of the service, and it is used to assess the percentage of people in a district that can access the service within a com...

  17. Kinds of Access

    DEFF Research Database (Denmark)

    Overgaard, Morten; Sandberg, Kristian

    2014-01-01

    that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesise that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about...

  18. Improving access to health care for chronic hepatitis B among migrant Chinese populations: A systematic mixed methods review of barriers and enablers

    OpenAIRE

    Vedio, A.; Liu, E. Z. H.; Lee, A. C. K.; Salway, S.

    2017-01-01

    Summary Migrant Chinese populations in Western countries have a high prevalence of chronic hepatitis B but often experience poor access to health care and late diagnosis. This systematic review aimed to identify obstacles and supports to timely and appropriate health service use among these populations. Systematic searches resulted in 48 relevant studies published between 1996 and 2015. Data extraction and synthesis were informed by models of healthcare access that highlight the interplay of ...

  19. Atomic memory access hardware implementations

    Science.gov (United States)

    Ahn, Jung Ho; Erez, Mattan; Dally, William J

    2015-02-17

    Atomic memory access requests are handled using a variety of systems and methods. According to one example method, a data-processing circuit having an address-request generator that issues requests to a common memory implements a method of processing the requests using a memory-access intervention circuit coupled between the generator and the common memory. The method identifies a current atomic-memory access request from a plurality of memory access requests. A data set is stored that corresponds to the current atomic-memory access request in a data storage circuit within the intervention circuit. It is determined whether the current atomic-memory access request corresponds to at least one previously-stored atomic-memory access request. In response to determining correspondence, the current request is implemented by retrieving data from the common memory. The data is modified in response to the current request and at least one other access request in the memory-access intervention circuit.

  20. Accessibility of long-term family planning methods: a comparison study between Output Based Approach (OBA) clients verses non-OBA clients in the voucher supported facilities in Kenya.

    Science.gov (United States)

    Oyugi, Boniface; Kioko, Urbanus; Kaboro, Stephen Mbugua; Gikonyo, Shadrack; Okumu, Clarice; Ogola-Munene, Sarah; Kalsi, Shaminder; Thiani, Simon; Korir, Julius; Odundo, Paul; Baltazaar, Billy; Ranji, Moses; Muraguri, Nicholas; Nzioka, Charles

    2017-03-27

    The study seeks to evaluate the difference in access of long-term family planning (LTFP) methods among the output based approach (OBA) and non-OBA clients within the OBA facility. The study utilises a quasi experimental design. A two tailed unpaired t-test with unequal variance is used to test for the significance variation in the mean access. The difference in difference (DiD) estimates of program effect on long term family planning methods is done to estimate the causal effect by exploiting the group level difference on two or more dimensions. The study also uses a linear regression model to evaluate the predictors of choice of long-term family planning methods. Data was analysed using SPSS version 17. All the methods (Bilateral tubal ligation-BTL, Vasectomy, intrauterine contraceptive device -IUCD, Implants, and Total or combined long-term family planning methods -LTFP) showed a statistical significant difference in the mean utilization between OBA versus non-OBA clients. The difference in difference estimates reveal that the difference in access between OBA and non OBA clients can significantly be attributed to the implementation of the OBA program for intrauterine contraceptive device (p = 0.002), Implants (p = 0.004), and total or combined long-term family planning methods (p = 0.001). The county of residence is a significant determinant of access to all long-term family planning methods except vasectomy and the year of registration is a significant determinant of access especially for implants and total or combined long-term family planning methods. The management level and facility type does not play a role in determining the type of long-term family planning method preferred; however, non-governmental organisations (NGOs) as management level influences the choice of all methods (Bilateral tubal ligation, intrauterine contraceptive device, Implants, and combined methods) except vasectomy. The adjusted R 2 value, representing the percentage of

  1. A method of formal requirements analysis for NPP I and C systems based on object-oriented visual modeling with SCR

    International Nuclear Information System (INIS)

    Koo, S. R.; Seong, P. H.

    1999-01-01

    In this work, a formal requirements analysis method for Nuclear Power Plant (NPP) I and C systems is suggested. This method uses Unified Modeling Language (UML) for modeling systems visually and Software Cost Reduction (SCR) formalism for checking the system models. Since object-oriented method can analyze a document by the objects in a real system, UML models that use object-oriented method are useful for understanding problems and communicating with everyone involved in the project. In order to analyze the requirement more formally, SCR tabular notations is converted from UML models. To help flow-through from UML models to SCR specifications, additional syntactic extensions for UML notation and a converting procedure are defined. The combined method has been applied to Dynamic Safety System (DSS). From this application, three kinds of errors were detected in the existing DSS requirements

  2. Upper Bound Performance Estimation for Copper Based Broadband Access

    DEFF Research Database (Denmark)

    Jensen, Michael; Gutierrez Lopez, Jose Manuel

    2012-01-01

    of copper based access connections at a household level by using Geographical Information System data. This can be combined with different configurations of DSLAMs distributions, in order to calculate the required number of active equipment points to guarantee certain QoS levels. This method can be used...

  3. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  4. Accessible engineering drawings for visually impaired machine operators.

    Science.gov (United States)

    Ramteke, Deepak; Kansal, Gayatri; Madhab, Benu

    2014-01-01

    An engineering drawing provides manufacturing information to a machine operator. An operator plans and executes machining operations based on this information. A visually impaired (VI) operator does not have direct access to the drawings. Drawing information is provided to them verbally or by using sample parts. Both methods have limitations that affect the quality of output. Use of engineering drawings is a standard practice for every industry; this hampers employment of a VI operator. Accessible engineering drawings are required to increase both independence, as well as, employability of VI operators. Today, Computer Aided Design (CAD) software is used for making engineering drawings, which are saved in CAD files. Required information is extracted from the CAD files and converted into Braille or voice. The authors of this article propose a method to make engineering drawings information directly accessible to a VI operator.

  5. External access to ALICE controls conditions data

    International Nuclear Information System (INIS)

    Jadlovský, J; Jadlovská, A; Sarnovský, J; Jajčišin, Š; Čopík, M; Jadlovská, S; Papcun, P; Bielek, R; Čerkala, J; Kopčík, M; Chochula, P; Augustinus, A

    2014-01-01

    ALICE Controls data produced by commercial SCADA system WINCCOA is stored in ORACLE database on the private experiment network. The SCADA system allows for basic access and processing of the historical data. More advanced analysis requires tools like ROOT and needs therefore a separate access method to the archives. The present scenario expects that detector experts create simple WINCCOA scripts, which retrieves and stores data in a form usable for further studies. This relatively simple procedure generates a lot of administrative overhead – users have to request the data, experts needed to run the script, the results have to be exported outside of the experiment network. The new mechanism profits from database replica, which is running on the CERN campus network. Access to this database is not restricted and there is no risk of generating a heavy load affecting the operation of the experiment. The developed tools presented in this paper allow for access to this data. The users can use web-based tools to generate the requests, consisting of the data identifiers and period of time of interest. The administrators maintain full control over the data – an authorization and authentication mechanism helps to assign privileges to selected users and restrict access to certain groups of data. Advanced caching mechanism allows the user to profit from the presence of already processed data sets. This feature significantly reduces the time required for debugging as the retrieval of raw data can last tens of minutes. A highly configurable client allows for information retrieval bypassing the interactive interface. This method is for example used by ALICE Offline to extract operational conditions after a run is completed. Last but not least, the software can be easily adopted to any underlying database structure and is therefore not limited to WINCCOA.

  6. Safety evaluations required in the safety regulations for Monju and the validity confirmation of safety evaluation methods

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-08-15

    The purposes of this study are to perform the safety evaluations of the fast breeder reactor 'Monju' and to confirm the validity of the safety evaluation methods. In JFY 2012, the following results were obtained. As for the development of safety evaluation methods needed in the safety examination achieved for the reactor establishment permission, development of the analysis codes, such as a core damage analysis code, were carried out according to the plan. As for the development of the safety evaluation method needed for the risk informed safety regulation, the quantification technique of the event tree using the Continuous Markov chain Monte Carlo method (CMMC method) were studied. (author)

  7. Tri-party agreement databases, access mechanism and procedures. Revision 2

    International Nuclear Information System (INIS)

    Brulotte, P.J.

    1996-01-01

    This document contains the information required for the Washington State Department of Ecology (Ecology) and the U.S. Environmental Protection Agency (EPA) to access databases related to the Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement). It identifies the procedure required to obtain access to the Hanford Site computer networks and the Tri-Party Agreement related databases. It addresses security requirements, access methods, database availability dates, database access procedures, and the minimum computer hardware and software configurations required to operate within the Hanford Site networks. This document supersedes any previous agreements including the Administrative Agreement to Provide Computer Access to U.S. Environmental Protection Agency (EPA) and the Administrative Agreement to Provide Computer Access to Washington State Department of Ecology (Ecology), agreements that were signed by the U.S. Department of Energy (DOE), Richland Operations Office (RL) in June 1990, Access approval to EPA and Ecology is extended by RL to include all Tri-Party Agreement relevant databases named in this document via the documented access method and date. Access to databases and systems not listed in this document will be granted as determined necessary and negotiated among Ecology, EPA, and RL through the Tri-Party Agreement Project Managers. The Tri-Party Agreement Project Managers are the primary points of contact for all activities to be carried out under the Tri-Party Agreement. Action Plan. Access to the Tri-Party Agreement related databases and systems does not provide or imply any ownership on behalf of Ecology or EPA whether public or private of either the database or the system. Access to identified systems and databases does not include access to network/system administrative control information, network maps, etc

  8. Cost of energy from utility-owned solar electric systems. A required revenue method for ERDA/EPRI evaluations

    Energy Technology Data Exchange (ETDEWEB)

    1976-06-01

    This methodology calculates the electric energy busbar cost from a utility-owned solar electric system. This approach is applicable to both publicly- and privately-owned utilities. Busbar cost represents the minimum price per unit of energy consistent with producing system-resultant revenues equal to the sum of system-resultant costs. This equality is expressed in present value terms, where the discount rate used reflects the rate of return required on invested capital. Major input variables describe the output capabilities and capital cost of the energy system, the cash flows required for system operation and maintenance, and the financial structure and tax environment of the utility.

  9. Accessibility issues with long-term disabilities.

    Science.gov (United States)

    Sebring-Cale, Nancy J

    2008-06-01

    Home modifications for barrier-free accessibility will assist the physically challenged populations by increasing their independence. By providing an accessible environment, an individual can become more independent and require less assistance for functional activities, such as kitchen appliance access, door widening, open floor plan, elevated electric outlets, roll-under sinks, roll-in showers and MobiLife elevating wheelchair.

  10. Get the right access rights!

    CERN Multimedia

    Rosaria Marraffino

    2015-01-01

    On 11 May, a major change concerning the requirements to access the CERN beam facilities was put in place and implemented in ADaMS in order to reduce the number of courses that people who need access to multiple installations have to follow. This revision includes dedicated safety training courses that replace, in particular, the “Safety during LS1” e-learning course, which is now to be considered obsolete.   CERN’s Access Distribution and Management System (ADaMS). As of 11 May, an important improvement was implemented in ADaMS (CERN’s Access Distribution and Management System) regarding the requisites to access safety zones. This change is closely related to the introduction of a generic e-learning course ("CERN Beam Facilities") covering the common risks and systems present in CERN's beam facilities. Two e-learning courses are no longer valid, nor available on the SIR (Safety Information Registration) catalogue: the &ld...

  11. Artificial intelligence applications of fast optical memory access

    Science.gov (United States)

    Henshaw, P. D.; Todtenkopf, A. B.

    The operating principles and performance of rapid laser beam-steering (LBS) techniques are reviewed and illustrated with diagrams; their applicability to fast optical-memory (disk) access is evaluated; and the implications of fast access for the design of expert systems are discussed. LBS methods examined include analog deflection (source motion, wavefront tilt, and phased arrays), digital deflection (polarization modulation, reflectivity modulation, interferometric switching, and waveguide deflection), and photorefractive LBS. The disk-access problem is considered, and typical LBS requirements are listed as 38,000 beam positions, rotational latency 25 ms, one-sector rotation time 1.5 ms, and intersector space 87 microsec. The value of rapid access for increasing the power of expert systems (by permitting better organization of blocks of information) is illustrated by summarizing the learning process of the MVP-FORTH system (Park, 1983).

  12. Reduction in the Number of Comparisons Required to Create Matrix of Expert Judgment in the Comet Method

    Directory of Open Access Journals (Sweden)

    Sałabun Wojciech

    2014-09-01

    Full Text Available Multi-criteria decision-making (MCDM methods are associated with the ranking of alternatives based on expert judgments made using a number of criteria. In the MCDM field, the distance-based approach is one popular method for receiving a final ranking. One of the newest MCDM method, which uses the distance-based approach, is the Characteristic Objects Method (COMET. In this method, the preferences of each alternative are obtained on the basis of the distance from the nearest characteristic ob jects and their values. For this purpose, the domain and fuzzy numbers set for all the considered criteria are determined. The characteristic objects are obtained as the combination of the crisp values of all the fuzzy numbers. The preference values of all the characteristic ob ject are determined based on the tournament method and the principle of indifference. Finally, the fuzzy model is constructed and is used to calculate preference values of the alternatives. In this way, a multi-criteria model is created and it is free of rank reversal phenomenon. In this approach, the matrix of expert judgment is necessary to create. For this purpose, an expert has to compare all the characteristic ob jects with each other. The number of necessary comparisons depends squarely to the number of ob jects. This study proposes the improvement of the COMET method by using the transitivity of pairwise comparisons. Three numerical examples are used to illustrate the efficiency of the proposed improvement with respect to results from the original approach. The proposed improvement reduces significantly the number of necessary comparisons to create the matrix of expert judgment.

  13. Do talento ao alto rendimento: indicadores de acesso à excelência no handebol From talent to a high level of performance: key requirements to access the excellence in handball

    Directory of Open Access Journals (Sweden)

    Luís Massuça

    2010-12-01

    Full Text Available O talento constitui uma das condições fundamentais para acender à excelência no desporto de competição e a sua identificação representa o primeiro passo de um longo processo de especialização que permite selecionar os sujeitos certos. Para conhecer as variáveis que os treinadores julgam mais influentes no sucesso do atleta de handebol (do sexo masculino, foi aplicado um questionário a 71 treinadores de handebol ("Questionário aos Técnicos de Andebol - QTA"; MASSUÇA, 2007. Neste instrumento, solicitava-se aos participantes que avaliassem o grau de importância de cada fator e indicador de rendimento no sucesso em geral (Handebolista, A e, que o fizessem igualmente para cada uma das posições de jogo que caracterizam a modalidade desportiva (Ponta, P; Lateral, L; Central, C; Pivot, Pi; Guarda-redes, GR. Os resultados permitem constatar que não existe um perfil de atleta de handebol, mas vários. Pode assim concluir-se que no jogo de handebol o sucesso pode ser experimentado por atletas com diferentes características. Em complemento, julgamos que o inventário apresentado (das qualidades necessárias ao atleta de handebol de alto rendimento poderá servir de referência para a construção de um modelo de seleção de talentos.Talent is a key requirement to access the excellence in a competitive sport and its identification is the first step of a long process of specialization that allows the correct selection of subjects. To understand what the most influent variables to achieve success are, a questionnaire was administered to 71 handball coaches ("Questionnaire to Handball Coaches - QTA"; MASSUÇA, 2007. The coaches were asked to rate the importance of each factor and performance indicator considering the success of the general male handball player (A and to do exactly the same for each specific playing position (wing, P; backward left/right, L; backward centre, C; pivot, Pi; goalkeeper, GR. Results showed that there is not a

  14. Estimation of the bio-accessible fraction of Cr, As, Cd and Pb in locally available bread using on-line continuous leaching method coupled to inductively coupled plasma mass spectrometry.

    Science.gov (United States)

    Lamsal, Ram P; Beauchemin, Diane

    2015-03-31

    A previously developed, efficient and simple on-line leaching method was used to assess the maximum bio-accessible fraction (assuming no synergistic effect from other food and beverage) of potentially toxic elements (Cr, As, Cd and Pb) in whole wheat brown and white bread samples. Artificial saliva, gastric juice and intestinal juice were successively pumped into a mini-column, packed with bread (maintained at 37 °C) connected on-line to the nebulizer of an inductively coupled plasma mass spectrometry (ICP-MS) instrument equipped with a collision-reaction interface (CRI) using hydrogen as reaction gas to minimize carbon- and chlorine-based polyatomic interferences. In contrast to the conventional batch method to which it was compared, this approach provides real-time monitoring of potentially toxic elements that are continuously released during leaching. Mass balance for both methods was verified at the 95% confidence level. Results obtained from the whole wheat brown and white bread showed that the majority of Cr, Cd and Pb was leached by gastric juice but, in contrast, the majority of As was leached by saliva. While there was higher total content for elements in whole wheat bread than in white bread, a higher percentage of elements were bio-accessible in white bread than in whole wheat bread. Both the on-line and batch methods indicate that 40-98% of toxic elements in bread samples are bio-accessible. While comparison of total analyte concentrations with provisional tolerable daily intake values may indicate some serious health concern for children, when accounting for the bio-accessibility of these elements, bread consumption is found to be safe for all ages. Copyright © 2015 Elsevier B.V. All rights reserved.

  15. Moving toward a universally accessible web: Web accessibility and education.

    Science.gov (United States)

    Kurt, Serhat

    2017-12-08

    The World Wide Web is an extremely powerful source of information, inspiration, ideas, and opportunities. As such, it has become an integral part of daily life for a great majority of people. Yet, for a significant number of others, the internet offers only limited value due to the existence of barriers which make accessing the Web difficult, if not impossible. This article illustrates some of the reasons that achieving equality of access to the online world of education is so critical, explores the current status of Web accessibility, discusses evaluative tools and methods that can help identify accessibility issues in educational websites, and provides practical recommendations and guidelines for resolving some of the obstacles that currently hinder the achievability of the goal of universal Web access.

  16. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  17. Development of test practice requirements for a standard method on fracture toughness testing in the transition range

    International Nuclear Information System (INIS)

    McCabe, D.E.; Zerbst, U.; Heerens, J.

    1993-01-01

    This report covers the resolution of several issues that are relevant to the ductile to brittle transition range of structural steels. One of this issues was to compare a statistical-based weakest-link method to constraint data adjustment methods for modeling the specimen size effects on fracture toughness. Another was to explore the concept of a universal transition temperature curve shape (Master Curve). Data from a Materials Properties Council round robin activity were used to test the proposals empirically. The findings of this study are inclosed in an activity for the development of a draft standard test procedure ''Test Practice for Fracture Toughness in the Transition Range''. (orig.) [de

  18. Improving software requirements specification for safety-related systems using the fault tree developed by an object-based method

    International Nuclear Information System (INIS)

    Cepin, M.; Mavko, B.

    1998-01-01

    A modification of the fault tree analysis is presented. The new fault tree integrates structural and behavioral models of a system. Information on the system structure is captured in the name of each gate and basic event of the fault tree. Information on the system behavior is captured in their description. Behavior is expressed using the axiomatic notation based on first order predicate logic. The new fault tree is a useful model for analysis and improvement of software requirements specification. The benefit of such improvements is reduced probability of failures in specification, which in turn results in increased reliability of the software.(author)

  19. 2 CFR 801.437 - What method do I use to communicate to a participant the requirements described in the OMB...

    Science.gov (United States)

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false What method do I use to communicate to a participant the requirements described in the OMB guidance at 2 CFR 180.435? 801.437 Section 801.437 Grants... NONPROCUREMENT DEBARMENT AND SUSPENSION Responsibilities of Federal Agency Officials Regarding Transactions § 801...

  20. 2 CFR 801.332 - What methods must I use to pass requirements down to participants at lower tiers with whom I...

    Science.gov (United States)

    2010-01-01

    ... 2 Grants and Agreements 1 2010-01-01 2010-01-01 false What methods must I use to pass requirements down to participants at lower tiers with whom I intend to do business? 801.332 Section 801.332 Grants... NONPROCUREMENT DEBARMENT AND SUSPENSION Responsibilities of Participants Regarding Transactions § 801.332 What...

  1. Access to Investigational Drugs: FDA Expanded Access Programs or “Right‐to‐Try” Legislation?

    Science.gov (United States)

    Berglund, Jelena P.; Weatherwax, Kevin; Gerber, David E.; Adamo, Joan E.

    2015-01-01

    Abstract Purpose The Food and Drug Administration Expanded Access (EA) program and “Right‐to‐Try” legislation aim to provide seriously ill patients who have no other comparable treatment options to gain access to investigational drugs and biological agents. Physicians and institutions need to understand these programs to respond to questions and requests for access. Methods FDA EA programs and state and federal legislative efforts to provide investigational products to patients by circumventing FDA regulations were summarized and compared. Results The FDA EA program includes Single Patient‐Investigational New Drug (SP‐IND), Emergency SP‐IND, Intermediate Sized Population IND, and Treatment IND. Approval rates for all categories exceed 99%. Approval requires FDA and Institutional Review Board (IRB) approval, and cooperation of the pharmaceutical partner is essential. “Right‐to‐Try” legislation bypasses some of these steps, but provides no regulatory or safety oversight. Conclusion The FDA EA program is a reasonable option for patients for whom all other therapeutic interventions have failed. The SP‐IND not only provides patient access to new drugs, but also maintains a balance between immediacy and necessary patient protection. Rather than circumventing existing FDA regulations through proposed legislation, it seems more judicious to provide the knowledge and means to meet the EA requirements. PMID:25588691

  2. Potential of OFDM for next generation optical access

    Science.gov (United States)

    Fritzsche, Daniel; Weis, Erik; Breuer, Dirk

    2011-01-01

    This paper shows the requirements for next generation optical access (NGOA) networks and analyzes the potential of OFDM (orthogonal frequency division multiplexing) for the use in such network scenarios. First, we show the motivation for NGOA systems based on the future requirements on FTTH access systems and list the advantages of OFDM in such scenarios. In the next part, the basics of OFDM and different methods to generate and detect optical OFDM signals are explained and analyzed. At the transmitter side the options include intensity modulation and the more advanced field modulation of the optical OFDM signal. At the receiver there is the choice between direct detection and coherent detection. As the result of this discussion we show our vision of the future use of OFDM in optical access networks.

  3. Comparative Method for Indirect Sensitivity Measurement of UHF RFID Reader with Respect to Interoperability and Conformance Requirements

    Directory of Open Access Journals (Sweden)

    Lukas Kypus

    2014-01-01

    Full Text Available There is never-ending race for the competitive advantage that forces RFID technology service integrators to focus more on used technology qualitative aspects and theirs impacts inside RFID ecosystem. This paper contributes to UHF RFID reader qualitative parameters evaluation and assessment problematic. It presents and describes in details indirect method and procedure of sensitivity measurement created for UHF RFID readers. We applied this method on RFID readers within prepared test environment and confirmed long term intention and recognized trend. Due to regulations limitations, there is not possible to increase output power over defined limits, but there are possibilities to influence reader sensitivity. Our proposal is to use customized comparative measurement method with insertion loss compensation for return link. Beside the main goal achievement, results show as well the qualitative status of development snapshot of reader. Method and following experiment helped us to gain an external view, current values of important parameters and motivation we want to follow up on as well as compared developed reader with its commercial competitors.

  4. Access to Research Inputs

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    2015-01-01

    The viability of modern open science norms and practices depends on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50 % more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry...

  5. Access to Research Inputs

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    The viability of modern open science norms and practices depend on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50% more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry....

  6. Toward a risk assessment of the spent fuel and high-level nuclear waste disposal system. Risk assessment requirements, literature review, methods evaluation: an interim report

    International Nuclear Information System (INIS)

    Hamilton, L.D.; Hill, D.; Rowe, M.D.; Stern, E.

    1986-04-01

    This report provides background information for a risk assessment of the disposal system for spent nuclear fuel and high-level radioactive waste (HLW). It contains a literature review, a survey of the statutory requirements for risk assessment, and a preliminary evaluation of methods. The literature review outlines the state of knowledge of risk assessment and accident consequence analysis in the nuclear fuel cycle and its applicability to spent fuel and HLW disposal. The survey of statutory requirements determines the extent to which risk assessment may be needed in development of the waste-disposal system. The evaluation of methods reviews and evaluates merits and applicabilities of alternative methods for assessing risks and relates them to the problems of spent fuel and HLW disposal. 99 refs

  7. Toward a risk assessment of the spent fuel and high-level nuclear waste disposal system. Risk assessment requirements, literature review, methods evaluation: an interim report

    Energy Technology Data Exchange (ETDEWEB)

    Hamilton, L.D.; Hill, D.; Rowe, M.D.; Stern, E.

    1986-04-01

    This report provides background information for a risk assessment of the disposal system for spent nuclear fuel and high-level radioactive waste (HLW). It contains a literature review, a survey of the statutory requirements for risk assessment, and a preliminary evaluation of methods. The literature review outlines the state of knowledge of risk assessment and accident consequence analysis in the nuclear fuel cycle and its applicability to spent fuel and HLW disposal. The survey of statutory requirements determines the extent to which risk assessment may be needed in development of the waste-disposal system. The evaluation of methods reviews and evaluates merits and applicabilities of alternative methods for assessing risks and relates them to the problems of spent fuel and HLW disposal. 99 refs.

  8. International Harmonisation Of Accounting Standards: The Case For A Mandatory Requirement For The Direct Method Of Reporting Operating Cash Flows

    OpenAIRE

    Christine Yap

    2011-01-01

    Even though standard setters have now embraced cash flow statements there remains ambivalence as to the best format (i.e. direct or indirect method) for disclosing cash flow from operations. In 1987 the FASB asserted that information about the gross amounts of cash receipts and cash payments is more relevant than information about the net amounts of cash receipts and payments. Yet apart from Australia and New Zealand, most standard setting bodies, including the International Accounting Standa...

  9. Cell mediated lympholysis: CML. A microplate technique requiring few target cells and employing a new method of supernatant collection

    International Nuclear Information System (INIS)

    Hirschberg, A.; Thorsby, E.

    1977-01-01

    A micromethod for the 51 Cr release assay is described. Allogeneically induced cytotoxic lymphocytes are generated in mixed lymphocyte microcultures in the wells of microplates. Their cytotoxic capacity is assayed by adding 51 Cr-labelled PHA derived lymphoblasts directly into the microcultures with no pooling or transfer of the cytotoxic effector cells being required. The 51 Cr isotope released into the cell supernatants is collected by inserting a cellulose acetate absorption cartridge into each well. A glass fiber filter attached to the cartridge effectively separates the supernatant from the cellular elemets. This system allows the simultaneous collection of the supernatant from 96 wells, and can be used with either adherent or non-adherent target cells

  10. HIV in hiding: methods and data requirements for the estimation of the number of people living with undiagnosed HIV

    DEFF Research Database (Denmark)

    Lundgren, Jens

    2011-01-01

    Many people who are HIV positive are unaware of their infection status. Estimation of the number of people with undiagnosed HIV within a country or region is vital for understanding future need for treatment and for motivating testing programs. We review the available estimation approaches which...... are in current use. They can be broadly classified into those based on prevalence surveys and those based on reported HIV and AIDS cases. Estimation based on prevalence data requires data from regular prevalence surveys in different population groups together with estimates of the size of these groups....... The recommended minimal case reporting data needed to estimate the number of patients with undiagnosed HIV are HIV diagnoses, including CD4 count at diagnosis and whether there has been an AIDS diagnosis in the 3 months before or after HIV diagnosis, and data on deaths in people with HIV. We would encourage all...

  11. Evaluation of an open access echocardiography service in the Netherlands: a mixed methods study of indications, outcomes, patient management and trends.

    Science.gov (United States)

    van Heur, Leanne M S G; Baur, Leo H B; Tent, Marleen; Lodewijks-van der Bolt, Cara L B; Streppel, Marjolijn; Winkens, Ron A G; Stoffers, Henri E J H

    2010-02-10

    In our region (Eastern South Limburg, The Netherlands) an open access echocardiography service started in 2002. It was the first service of this kind in The Netherlands. Our study aims were: (1) to evaluate demand for the service, participation, indications, echocardiography outcomes, and management by the general practitioner (GP); (2) to analyse changes in indications and outcomes over the years. (1) Data from GP request forms, echocardiography reports and a retrospective GP questionnaire on management (response rate 83%) of 625 consecutive patients (Dec. 2002-March 2007) were analysed cross-sectionally. (2) For the analysis of changes over the years, data from GP request forms and echocardiography reports of the first and last 250 patients that visited the service between Dec. 2002 and Feb. 2008 (n = 1001) were compared. The echocardiography service was used by 81% of the regional GPs. On average, a GP referred one patient per year to the service. Intended indications for the service were dyspnoea (32%), cardiac murmur (59%), and peripheral oedema (17%). Of the other indications (22%), one-third was for evaluation of suspected left ventricular hypertrophy (LVH). Expected outcomes were left ventricular dysfunction (LVD) (43%, predominantly diastolic) and valve disease (25%). We also found a high proportion of LVH (50%). Only 24% of all echocardiograms showed no relevant disease. The GP followed the cardiologist's advice to refer the patient for further evaluation in 71%. In recent patients, more echocardiography requests were done for 'cardiac murmur' and 'other' indications, but less for 'dyspnoea'. The proportions of patients with LVD, LVH and valve disease decreased and the proportion of patients with no relevant disease increased. The number of advices by the cardiologists increased. Overall, GPs used the open access echocardiography service efficiently (i.e. with a high chance of finding relevant pathology), but efficiency decreased slightly over the years

  12. Improving access to medicines for non-communicable diseases in rural India: a mixed methods study protocol using quasi-experimental design.

    Science.gov (United States)

    Prashanth, N S; Elias, Maya Annie; Pati, Manoj Kumar; Aivalli, Praveenkumar; Munegowda, C M; Bhanuprakash, Srinath; Sadhana, S M; Criel, Bart; Bigdeli, Maryam; Devadasan, Narayanan

    2016-08-22

    India has the distinction of financing its healthcare mainly through out-of-pocket expenses by individual families contributing to catastrophic health expenditure and impoverishment. Nearly 70 % of the expenditure is on medicines purchased at private pharmacies. Patients with chronic ailments are especially affected, as they often need lifelong medicines. Over the past years in India, there have been several efforts to improve drug availability at government primary health centres. In this study, we aim to understand health system factors that affect utilisation and access to generic medicines for people with non-communicable diseases. This study aims to understand if (and how) a package of interventions targeting primary health centres and community participation platforms affect utilisation and access to generic medicines for people with non-communicable diseases in the current district context in India. This study will employ a quasi-experimental design and a qualitative theory-driven approach. PHCs will be randomly assigned to one of three arms of the intervention. In one arm, PHCs will receive inputs to optimise service delivery for non-communicable diseases, while the second arm will receive an additional package of interventions to strengthen community participation platforms for improving non-communicable disease care. The third arm will be the control. We will conduct household and facility surveys, before and after the intervention and will estimate the effect of the intervention by difference-in-difference analysis. Sample size for measuring effects was calculated based on obtaining at least 30 households for each primary health centre spread across three distance-based clusters. Primary outcomes include availability and utilisation of medicines at primary health centres and out-of-pocket expenditure for medicines by non-communicable disease households. Focus group discussions with patients and in-depth interviews with health workers will also be

  13. Quality requirements for veterinary hematology analyzers in small animals-a survey about veterinary experts' requirements and objective evaluation of analyzer performance based on a meta-analysis of method validation studies: bench top hematology analyzer.

    Science.gov (United States)

    Cook, Andrea M; Moritz, Andreas; Freeman, Kathleen P; Bauer, Natali

    2016-09-01

    Scarce information exists about quality requirements and objective evaluation of performance of large veterinary bench top hematology analyzers. The study was aimed at comparing the observed total error (TEobs ) derived from meta-analysis of published method validation data to the total allowable error (TEa ) for veterinary hematology variables in small animals based on experts' opinions. Ideally, TEobs should be hematology analyzers (ADVIA 2120; Sysmex XT2000iV, and CellDyn 3500) was calculated based on method validation studies published between 2005 and 2013 (n = 4). The percent TEobs = 2 * CV (%) + bias (%). The CV was derived from published studies except for the ADVIA 2120 (internal data), and bias was estimated from the regression equation. A total of 41 veterinary experts (19 diplomates, 8 residents, 10 postgraduate students, 4 anonymous specialists) responded. The proposed range of TEa was wide, but generally ≤ 20%. The TEobs was < TEa for all variables and analyzers except for canine and feline HGB (high bias, low CV) and platelet counts (high bias, high CV). Overall, veterinary bench top analyzers fulfilled experts' requirements except for HGB due to method-related bias, and platelet counts due to known preanalytic/analytic issues. © 2016 American Society for Veterinary Clinical Pathology.

  14. [Validation of an in-house method for the determination of zinc in serum: Meeting the requirements of ISO 17025].

    Science.gov (United States)

    Llorente Ballesteros, M T; Navarro Serrano, I; López Colón, J L

    2015-01-01

    The aim of this report is to propose a scheme for validation of an analytical technique according to ISO 17025. According to ISO 17025, the fundamental parameters tested were: selectivity, calibration model, precision, accuracy, uncertainty of measurement, and analytical interference. A protocol has been developed that has been applied successfully to quantify zinc in serum by atomic absorption spectrometry. It is demonstrated that our method is selective, linear, accurate, and precise, making it suitable for use in routine diagnostics. Copyright © 2015 SECA. Published by Elsevier Espana. All rights reserved.

  15. A Study on the Quantitative Assessment Method of Software Requirement Documents Using Software Engineering Measures and Bayesian Belief Networks

    International Nuclear Information System (INIS)

    Eom, Heung Seop; Kang, Hyun Gook; Park, Ki Hong; Kwon, Kee Choon; Chang, Seung Cheol

    2005-01-01

    One of the major challenges in using the digital systems in a NPP is the reliability estimation of safety critical software embedded in the digital safety systems. Precise quantitative assessment of the reliability of safety critical software is nearly impossible, since many of the aspects to be considered are of qualitative nature and not directly measurable, but they have to be estimated for a practical use. Therefore an expert's judgment plays an important role in estimating the reliability of the software embedded in safety-critical systems in practice, because they can deal with all the diverse evidence relevant to the reliability and can perform an inference based on the evidence. But, in general, the experts' way of combining the diverse evidence and performing an inference is usually informal and qualitative, which is hard to discuss and will eventually lead to a debate about the conclusion. We have been carrying out research on a quantitative assessment of the reliability of safety critical software using Bayesian Belief Networks (BBN). BBN has been proven to be a useful modeling formalism because a user can represent a complex set of events and relationships in a fashion that can easily be interpreted by others. In the previous works we have assessed a software requirement specification of a reactor protection system by using our BBN-based assessment model. The BBN model mainly employed an expert's subjective probabilities as inputs. In the process of assessing the software requirement documents we found out that the BBN model was excessively dependent on experts' subjective judgments in a large part. Therefore, to overcome the weakness of our methodology we employed conventional software engineering measures into the BBN model as shown in this paper. The quantitative relationship between the conventional software measures and the reliability of software were not identified well in the past. Then recently there appeared a few researches on a ranking of

  16. Improving access to health care for chronic hepatitis B among migrant Chinese populations: A systematic mixed methods review of barriers and enablers.

    Science.gov (United States)

    Vedio, A; Liu, E Z H; Lee, A C K; Salway, S

    2017-07-01

    Migrant Chinese populations in Western countries have a high prevalence of chronic hepatitis B but often experience poor access to health care and late diagnosis. This systematic review aimed to identify obstacles and supports to timely and appropriate health service use among these populations. Systematic searches resulted in 48 relevant studies published between 1996 and 2015. Data extraction and synthesis were informed by models of healthcare access that highlight the interplay of patient, provider and health system factors. There was strong consistent evidence of low levels of knowledge among patients and community members; but interventions that were primarily focused on increasing knowledge had only modest positive effects on testing and/or vaccination. There was strong consistent evidence that Chinese migrants tend to misunderstand the need for health care for hepatitis B and have low satisfaction with services. Stigma was consistently associated with hepatitis B, and there was weak but consistent evidence of stigma acting as a barrier to care. However, available evidence on the effects of providing culturally appropriate services for hepatitis B on increasing uptake is limited. There was strong consistent evidence that health professionals miss opportunities for testing and vaccination. Practitioner education interventions may be important, but evidence of effectiveness is limited. A simple prompt in patient records for primary care physicians improved the uptake of testing, and a dedicated service increased targeted vaccination coverage for newborns. Further development and more rigorous evaluation of more holistic approaches that address patient, provider and system obstacles are needed. © 2017 The Authors. Journal of Viral Hepatitis Published by John Wiley & Sons Ltd.

  17. A multi-level intervention in subsidized housing sites to increase fruit and vegetable access and intake: Rationale, design and methods of the ‘Live Well, Viva Bien’ cluster randomized trial

    Directory of Open Access Journals (Sweden)

    Kim M. Gans

    2016-06-01

    Full Text Available Abstract Background Adequate fruit and vegetable (F&V intake is important for disease prevention. Yet, most Americans, especially low-income and racial/ethnic minorities, do not eat adequate amounts. These disparities are partly attributable to food environments in low-income neighborhoods where residents often have limited access to affordable, healthful food and easy access to inexpensive, unhealthful foods. Increasing access to affordable healthful food in underserved neighborhoods through mobile markets is a promising, year-round strategy for improving dietary behaviors and reducing F&V intake disparities. However, to date, there have been no randomized controlled trials studying their effectiveness. The objective of the ‘Live Well, Viva Bien’ (LWVB cluster randomized controlled trial is to evaluate the efficacy of a multicomponent mobile market intervention at increasing F&V intake among residents of subsidized housing complexes. Methods/Design One housing complex served as a pilot site for the intervention group and the remaining 14 demographically-matched sites were randomized into either the intervention or control group. The intervention group received bimonthly, discount, mobile, fresh F&V markets in conjunction with a nutrition education intervention (two F&V campaigns, newsletters, DVDs and cooking demonstrations for 12 months. The control group received physical activity and stress reduction interventions. Outcome measures include F&V intake (measured by two validated F&V screeners at baseline, six-month and twelve-months along with potential psychosocial mediating variables. Extensive quantitative and qualitative process evaluation was also conducted throughout the study. Discussion Modifying neighborhood food environments in ways that increase access to affordable, healthful food is a promising strategy for improving dietary behaviors among low-income, racial and ethnic minority groups at increased risk for obesity and other

  18. Effects of climate change on water requirements and phenological period of major crops in Heihe River basin, China - Based on the accumulated temperature threshold method

    Science.gov (United States)

    Han, Dongmei; Xu, Xinyi; Yan, Denghua

    2016-04-01

    In recent years, global climate change has significantly caused a serious crisis of water resources throughout the world. However, mainly through variations in temperature, climate change will affect water requirements of crop. It is obvious that the rise of temperature affects growing period and phenological period of crop directly, then changes the water demand quota of crop. Methods including accumulated temperature threshold and climatic tendency rate were adopted, which made up for the weakness of phenological observations, to reveal the response of crop phenological change during the growing period. Then using Penman-Menteith model and crop coefficients from the United Nations Food& Agriculture Organization (FAO), the paper firstly explored crop water requirements in different growth periods, and further forecasted quantitatively crop water requirements in Heihe River Basin, China under different climate change scenarios. Results indicate that: (i) The results of crop phenological change established in the method of accumulated temperature threshold were in agreement with measured results, and (ii) there were many differences in impacts of climate warming on water requirement of different crops. The growth periods of wheat and corn had tendency of shortening as well as the length of growth periods. (ii)Results of crop water requirements under different climate change scenarios showed: when temperature increased by 1°C, the start time of wheat growth period changed, 2 days earlier than before, and the length of total growth period shortened 2 days. Wheat water requirements increased by 1.4mm. However, corn water requirements decreased by almost 0.9mm due to the increasing temperature of 1°C. And the start time of corn growth period become 3 days ahead, and the length of total growth period shortened 4 days. Therefore, the contradiction between water supply and water demands are more obvious under the future climate warming in Heihe River Basin, China.

  19. Rights of patients required in a public service ombudsman

    Directory of Open Access Journals (Sweden)

    Maristela Santini Martins

    2015-07-01

    Full Text Available Objective: analyzing the rights of patients required in a public service ombudsmen. Methods: an exploratory, descriptive study of documentary research. 109 complaint forms coming from the basic network were analyzed, related to 12 Basic Health Units located within the Southern Health Technical Supervision. Results: grouped into four categories of required rights: access to goods and services (62.4% being, access to specialized exams (28.7%, access to consultations (16.6%, referral to a specialist (5.7%, referral for urgent/emergency cases (1.3%, monitoring through home visits (7.6%, guaranteed medications (2.5%. Quality of health services (36.9% divided into: decent, considerate and respectful care (26.8%, guidance/clarification (9.6%, and public disclosure of government programs (0.6% and adequate infrastructure (0.6%. Conclusion: the rights that patients required are related to access, quality, treatment and adequate infrastructure.

  20. Perceptual integration without conscious access.

    Science.gov (United States)

    Fahrenfort, Johannes J; van Leeuwen, Jonathan; Olivers, Christian N L; Hogendoorn, Hinze

    2017-04-04

    The visual system has the remarkable ability to integrate fragmentary visual input into a perceptually organized collection of surfaces and objects, a process we refer to as perceptual integration. Despite a long tradition of perception research, it is not known whether access to consciousness is required to complete perceptual integration. To investigate this question, we manipulated access to consciousness using the attentional blink. We show that, behaviorally, the attentional blink impairs conscious decisions about the presence of integrated surface structure from fragmented input. However, despite conscious access being impaired, the ability to decode the presence of integrated percepts remains intact, as shown through multivariate classification analyses of electroencephalogram (EEG) data. In contrast, when disrupting perception through masking, decisions about integrated percepts and decoding of integrated percepts are impaired in tandem, while leaving feedforward representations intact. Together, these data show that access consciousness and perceptual integration can be dissociated.

  1. From spatial to social accessibility: How socio-economic factors can affect accessibility?

    OpenAIRE

    Mercier , Aurélie

    2016-01-01

    The concept of accessibility cannot only focus on " spatial accessibility " measurement but has to integer a " social accessibility " level to take into account individual inequalities and socioeconomic disparities to access to urban opportunities. In this context, this contribution focuses on socioeconomic disparities integration on accessibility measurement, considering the Lyon case study. The paper is divided into three parts The first part aims to present a method for integrating the soc...

  2. Direct access to INIS

    International Nuclear Information System (INIS)

    Zheludev, I.S.; Romanenko, A.G.

    1981-01-01

    Librarians, researchers, and information specialists throughout the world now have the opportunity for direct access to coverage of almost 95% of the world's literature dealing with the peaceful uses of atomic energy and nuclear science. This opportunity has been provided by the International Nuclear Information System (INIS) of the IAEA. INIS, with the voluntary collaboration of more than 60 of the Agency's Member States, maintains a comprehensive, computer-resident data-base, containing the bibliographic details plus informative abstracts of the bulk of the world's literature on nuclear science and technology. Since this data-base is growing at a rate of 75,000 items per year, and already contains more than 500,000 items, it is obviously important to be able to search this collection conveniently and efficiently. The usefulness of this ability is enhanced when other data-bases on related subjects are made available on an information network. During the early 1970s, on-line interrogation of large bibliographic data-bases became the accepted method for searching this type of information resource. Direct interaction between the searcher and the data-base provides quick feed-back resulting in improved literature listings for launching research and development projects. On-line access enables organizations which cannot store a large data-base on their own computer to expand the information resources at their command. Because of these advantages, INIS undertook to extend to interested Member States on-line access to its data-base in Vienna

  3. Fishing Access Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — The Vermont Fish & Wildlife Department maintains developed fishing access areas. These sites provide public access to waters in Vermont for shore fishing...

  4. Open Access and ORCID poster presentation

    DEFF Research Database (Denmark)

    Elbæk, Mikael Karstensen; Ekstrøm, Jeannette

    2014-01-01

    and related topics such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc. ORCID ORCID – Open Research & Contributor ID – is an internationally recognized and widely used researcher-ID. ORCID makes it easy to reuse your data across disciplines, publishers and databases – all you need to do......Open Access Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all...... peer review articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access...

  5. Development of a traceability analysis method based on case grammar for NPP requirement documents written in Korean language

    International Nuclear Information System (INIS)

    Yoo, Yeong Jae; Seong, Poong Hyun; Kim, Man Cheol

    2004-01-01

    Software inspection is widely believed to be an effective method for software verification and validation (V and V). However, software inspection is labor-intensive and, since it uses little technology, software inspection is viewed upon as unsuitable for a more technology-oriented development environment. Nevertheless, software inspection is gaining in popularity. KAIST Nuclear I and C and Information Engineering Laboratory (NICIEL) has developed software management and inspection support tools, collectively named 'SIS-RT.' SIS-RT is designed to partially automate the software inspection processes. SIS-RT supports the analyses of traceability between a given set of specification documents. To make SIS-RT compatible for documents written in Korean, certain techniques in natural language processing have been studied. Among the techniques considered, case grammar is most suitable for analyses of the Korean language. In this paper, we propose a methodology that uses a case grammar approach to analyze the traceability between documents written in Korean. A discussion regarding some examples of such an analysis will follow

  6. Proximity Displays for Access Control

    Science.gov (United States)

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  7. Catalogue of methods of calculation, interpolation, smoothing, and reduction for the physical, chemical, and biological parameters of deep hydrology (CATMETH) (NODC Accession 7700442)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The document presents the methods, formulas and citations used by the BNDO to process physical, chemical, and biological data for deep hydrology including...

  8. Method of Maintaining the Required Values of Surface Roughness and Prediction of Technological Conditions for Cold Sheet Rolling

    Directory of Open Access Journals (Sweden)

    Valíček J.

    2014-06-01

    Full Text Available The paper is based on results obtained from topography of surfaces of sheets rolled from deep-drawing steel of the type KOHAL grade 697, non-alloy low-carbon structural steel EN 10263-2:2004 and aluminium. The presented results document correctness of the assumption that the rolling force Froll increases with the increasing reduction Δh and the quality of the rolled surface is improved at the simultaneous increasing of strength of rolled sheets and the decreasing of size of structural grains. The experiment was performed on the two-high rolling stand DUO 210 SVa, which enables only non-continuous technology in contrast to the rolling mill with continuous reduction on one sheet in several degrees on rolling trains, in consequence of which the obtained height parameters of the section are in close correlation with the predicted dependence. Contribution of the work consists in the creation of a mathematical model (algorithm for predicting technological parameters of the two-high rolling stand DUO 210 SVa at change of the absolute reduction Δh, for example for a deep-drawing steel of the type KOHAL grade 697 and non-alloy lowcarbon structural steel PN EN 10263-2:2004 and aluminium, and also in the development of a method of calculation applicable to any material being rolled in general, because the authors have found that various materials can be differentiated by a derived analytical criterion IKP. This criterion is a function of ratio between the modulus of elasticity of reference material and that of actually rolled material. The reference material is here deep-drawing steel of the type KOHAL grade 697. Verification was carried out by measuring changes of final surface roughness profile and final strength of rolled sheets of the stated materials in relation to reductions and those were compared with theoretically predicted values. It is possible to identify and predict on the basis of this algorithm an instant state of surface topography in

  9. JISC Open Access Briefing Paper

    OpenAIRE

    Swan, Alma

    2005-01-01

    What Open Access is. What Open Access is not. How is Open Access provided? Open Access archives or repositories. Open Access journals. Why should authors provide Open Access to their work? Further information and resources

  10. Respondent-driven sampling (rds as a new method to access vulnerable populations to hiv: its application in men who have sex with men

    Directory of Open Access Journals (Sweden)

    John H. Estrada M

    2010-11-01

    Full Text Available Approximately 30 million people are living with hiv all around the world in 2010. The most vulnerable hiv/aids groups are sex workers, intravenous drug users, transgender people and population of men who have sex with men (msm. Up to now, the surveillance and behavioral studies on sexual transmitted diseases (sti and hiv have been conducted using intentional sampling methods like the snowball methodology, but this kind of sampling does not achieve representation and does not represent a conclusive method for the study of hidden populations in order to extend and apply its results to the general population. Furthermore, it is necessary to add to this limitation the lack of knowledge about the size of these groups that must face situations of stigma and discrimination. A decade ago a new method was designed to sample hidden and hard to reach populations based on Markov theories and on chain recruitment. This new method is known as respondent-driven sampling (rds and it has been used in several behavioral and hiv prevalence studies. This review article presents the background, the theoretical support and a description of the method. It also analyzes some studies carried out using this new methodology.

  11. A Patient Advocate to facilitate access and improve communication, care, and outcomes in adults with moderate or severe asthma: Rationale, design, and methods of a randomized controlled trial

    Science.gov (United States)

    Apter, Andrea J.; Morales, Knashawn H.; Han, Xiaoyan; Perez, Luzmercy; Huang, Jingru; Ndicu, Grace; Localio, Anna; Nardi, Alyssa; Klusaritz, Heather; Rogers, Marisa; Phillips, Alexis; Cidav, Zuleyha; Schwartz, J. Sanford

    2017-01-01

    Few interventions to improve asthma outcomes have targeted low-income minority adults. Even fewer have focused on the real-world practice where care is delivered. We adapted a patient navigator, here called a Patient Advocate (PA), a term preferred by patients, to facilitate and maintain access to chronic care for adults with moderate or severe asthma and prevalent co-morbidities recruited from clinics serving low-income urban neighborhoods. We describe the planning, design, methodology (informed by patient and provider focus groups), baseline results, and challenges of an ongoing randomized controlled trial of 312 adults of a PA intervention implemented in a variety of practices. The PA coaches, models, and assists participants with preparations for a visit with the asthma clinician; attends the visit with permission of participant and provider; and confirms participants’ understanding of what transpired at the visit. The PA facilitates scheduling, obtaining insurance coverage, overcoming patients’ unique social and administrative barriers to carrying out medical advice and transfer of information between providers and patients. PA activities are individualized, take account of comorbidities, and are generalizable to other chronic diseases. PAs are recent college graduates interested in health-related careers, research experience, working with patients, and generally have the same race/ethnicity distribution as potential participants. We test whether the PA intervention, compared to usual care, is associated with improved and sustained asthma control and other asthma outcomes (prednisone bursts, ED visits, hospitalizations, quality of life, FEV1) relative to baseline. Mediators and moderators of the PA-asthma outcome relationship are examined along with the intervention’s cost-effectiveness. PMID:28315481

  12. Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

    OpenAIRE

    Yekini N.A.; Itegboje A.O.; Oyeyinka I.K.; Akinwole A.K.

    2012-01-01

    An automatic teller machine requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with structured questions among the ATM users and the result proofed that a lot of problems was associated with ATM smartcard for access control. Among the problems are; it is very difficult to prevent another person from attaining and using a legitimate persons card, ...

  13. Single access laparoscopic nephrectomy

    Directory of Open Access Journals (Sweden)

    Jay D Raman

    2008-01-01

    Full Text Available Laparoscopic nephrectomy has assumed a central role in the management of benign and malignant kidney diseases. While laparoscopy is less morbid than open surgery, it still requires several incisions each at least 1-2 cm in length. Each incision carries morbidity risks of bleeding, hernia and/or internal organ damage, and incrementally decreases cosmesis. An alternative to conventional laparoscopy is single access or keyhole surgery, which utilizes magnetic anchoring and guidance system (MAGS technology or articulating laparoscopic instruments. These technical innovations obviate the need to externally space trocars for triangulation, thus allowing for the creation of a small, solitary portal of entry into the abdomen. Laboratory and early clinical series demonstrate feasibility as well as safe and successful completion of keyhole nephrectomy. Future work is necessary to improve existing instrumentation, increase clinical experience, assess benefits of this surgical approach, and explore other potential applications for this technique.

  14. Access For All

    DEFF Research Database (Denmark)

    Andersen, Ove Kjeld; Hjulmand, Christian

    2005-01-01

    Approximately 30% of the Danish population has severe problems in reading everyday text. In the light of the increasing amount of text available on the Internet this poses a democratic challenge to ensure “equal access” to information. The Talking Internet service - Access For All (AFA) - offers...... a free Internet-based tool for reading aloud any marked text with a synthetic voice. The only requirements are a standard equipped PC running a recent Windows OS and an Internet connection. Experiences gathered from running the service for more than 28 months underline the viability of the concept....... There is a clear need for a free internet based Danish text-to-speech synthesizer. Furthermore, the current state of technology i.e. internet bandwidth, response time and server technology is sufficient for setting up an online automatic reading service that is used by steadily growing number of individuals...

  15. Identity and Access Management and Security in Higher Education.

    Science.gov (United States)

    Bruhn, Mark; Gettes, Michael; West, Ann

    2003-01-01

    Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…

  16. 78 FR 10166 - Access Interpreting; Transfer of Data

    Science.gov (United States)

    2013-02-13

    ... regulations. Access Interpreting has been awarded a contract to perform work for OPP, and access to this information will enable Access Interpreting to fulfill the obligations of the contract. DATES: Access.... Contractor Requirements Under Contract No. EP10H000109, this contract is to provide the Environmental...

  17. Active Radiation Detectors for Use in Space Beyond Low Earth Orbit: Spatial and Energy Resolution Requirements and Methods for Heavy Ion Charge Classification

    Science.gov (United States)

    McBeth, Rafe A.

    Space radiation exposure to astronauts will need to be carefully monitored on future missions beyond low earth orbit. NASA has proposed an updated radiation risk framework that takes into account a significant amount of radiobiological and heavy ion track structure information. These models require active radiation detection systems to measure the energy and ion charge Z. However, current radiation detection systems cannot meet these demands. The aim of this study was to investigate several topics that will help next generation detection systems meet the NASA objectives. Specifically, this work investigates the required spatial resolution to avoid coincident events in a detector, the effects of energy straggling and conversion of dose from silicon to water, and methods for ion identification (Z) using machine learning. The main results of this dissertation are as follows: 1. Spatial resolution on the order of 0.1 cm is required for active space radiation detectors to have high confidence in identifying individual particles, i.e., to eliminate coincident events. 2. Energy resolution of a detector system will be limited by energy straggling effects and the conversion of dose in silicon to dose in biological tissue (water). 3. Machine learning methods show strong promise for identification of ion charge (Z) with simple detector designs.

  18. ITS Multi-path Communications Access Decision Scheme

    Directory of Open Access Journals (Sweden)

    Miroslav Svitek

    2008-02-01

    Full Text Available Intelligent Transport Systems (ITS require widely spread and guarantied quality communications services. Method of ITS decomposition to set of subsystems and quantification of communications subsystems parameters is introduced. Due to typical complexity of the IST solution and mobility as the typical system elements property idea of communications systems with multipath multivendor structures is adopted. Resolution of seamless switching within a set of available wireless access solutions is presented. CALM based system or specifically designed and configured L3/L2 switching can be relevant solution for multi-path access communication system. These systems meet requirements of the seamless secure communications functionality within even extensive cluster of moving objects. Competent decision processes based on precisely quantified system requirements and each performance indicator tolerance range must be implemented to keep service up and running with no influence of continuously changing conditions in time and served space. Method of different paths service quality evaluation and selection of the best possible active communications access path is introduced. Proposed approach is based on Kalman filtering, which separates reasonable part of noise and also allows prediction of the individual parameters near future behavior. Presented classification algorithm applied on filtered measured data combined with deterministic parameters is trained using training data, i.e. combination of parameters vectors line and relevant decisions. Quality of classification is dependent on the size and quality of the training sets. This method is studied within projects e-Ident, DOTEK and SRATVU which are elaborating results of project CAMNA.

  19. Polish Accession to the European Union: Participating Institutions

    Directory of Open Access Journals (Sweden)

    Tomaszewski Waldemar

    2015-06-01

    Full Text Available In May 2014 it was aready ten years since Poland’s accession to the European Union. The accession was preceded by a long period of political action and negotiations between the Polish and the EU institutions. The process of integration was extremely complex. It covered almost all areas of economic, legal and civil aspects of the aspiring country’s economy, in which all necessary requirements had to be met. The aim of the article was to present the institutional framework created for efficient implementation of the process of accession. The considerations involved especially an institutional method. The research resulted in poining out both the actually efficient and less efficient bodies participating in the process of integration.

  20. Professional Access 2013 programming

    CERN Document Server

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  1. Increasing Access and Relevance in Distance Education

    Science.gov (United States)

    Mendenhall, Robert W.

    2009-01-01

    Access to higher education is subject to many factors including affordability, time and geography. Distance education can deliver education to those that live far from a campus. Some of that distance education may be synchronous, or live, requiring students to be available at certain times. Flexibility and access are increased when the instruction…

  2. Fermilab Security Site Access Request Database

    Science.gov (United States)

    Fermilab Security Site Access Request Database Use of the online version of the Fermilab Security Site Access Request Database requires that you login into the ESH&Q Web Site. Note: Only Fermilab generated from the ESH&Q Section's Oracle database on May 27, 2018 05:48 AM. If you have a question

  3. Web Based Remote Access Microcontroller Laboratory

    OpenAIRE

    H. Çimen; İ. Yabanova; M. Nartkaya; S. M. Çinar

    2008-01-01

    This paper presents a web based remote access microcontroller laboratory. Because of accelerated development in electronics and computer technologies, microcontroller-based devices and appliances are found in all aspects of our daily life. Before the implementation of remote access microcontroller laboratory an experiment set is developed by teaching staff for training microcontrollers. Requirement of technical teaching and industrial applications are considered when expe...

  4. Comparison of Radial Access, Guided Femoral Access, and Non-Guided Femoral Access Among Women Undergoing Percutaneous Coronary Intervention.

    Science.gov (United States)

    Koshy, Linda M; Aberle, Laura H; Krucoff, Mitchell W; Hess, Connie N; Mazzaferri, Ernest; Jolly, Sanjit S; Jacobs, Alice; Gibson, C Michael; Mehran, Roxana; Gilchrist, Ian C; Rao, Sunil V

    2018-01-01

    This study was conducted to determine the association between radial access, guided femoral access, and non-guided femoral access on postprocedural bleeding and vascular complications after percutaneous coronary intervention (PCI). Bleeding events and major vascular complications after PCI are associated with increased morbidity, mortality, and cost. While the radial approach has been shown to be superior to the femoral approach in reducing bleeding and vascular complications, whether the use of micropuncture, fluoroscopy, or ultrasound mitigates these differences is unknown. We conducted a post hoc analysis of women in the SAFE-PCI for Women trial who underwent PCI and had the access method identified (n = 643). The primary endpoint of postprocedure bleeding or vascular complications occurring within 72 hours or at discharge was adjudicated by an independent clinical events committee and was compared based on three categories of access technique: radial, guided femoral (fluoroscopy, micropuncture, ultrasound), or non-guided femoral (none of the aforementioned). Differences between the groups were determined using multivariate logistic regression using radial access as the reference. Of the PCI population, 330 underwent radial access, 228 underwent guided femoral access, and 85 underwent non-guided femoral access. There was a statistically significant lower incidence of the primary endpoint with radial access vs non-guided femoral access; however, there was no significant difference between radial approach and femoral access guided by fluoroscopy, micropuncture, or ultrasound. This post hoc analysis demonstrates that while radial access is safer than non-guided femoral access, guided femoral access appears to be associated with similar bleeding events or vascular complications as radial access.

  5. Open Access to Research Data Accessing, using and publishing collections of textual data in digital literary studies

    OpenAIRE

    Schöch, Christof

    2015-01-01

    Introduction What is open access to research data? Related issues A closer look What can you do with open research data? What is required from research data? Do resources fulfil these requirements? Why is getting access good, but giving access better? Current issues Some challenges Main hindrance: Legal issues Conclusions Recommended readings

  6. Overview: Routes to Open Access

    OpenAIRE

    Tullney, Marco; van Wezenbeek, Wilma

    2017-01-01

    Slides of an overview presentation given at a CESAER workshop on Open Access, February 2nd, 2017, in Brussels Cover major routes to more open access as discussed in the Task Force Open Science of CESAER: (national) open access strategies open access mandates open access incentives open access awareness open access publishing open access infrastructure

  7. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  8. Design for Accessibility

    DEFF Research Database (Denmark)

    Herriott, Richard

    2012-01-01

    A report on how nine rail builder, operators and transport designers deal with design for accessibility......A report on how nine rail builder, operators and transport designers deal with design for accessibility...

  9. Information on Open Access

    African Journals Online (AJOL)

    Open Access (OA), defined most simply, means free full text online. There are over 130 Open Access journals hosted on the AJOL website. You can find a full list of these journals here: OA journals on AJOL ...

  10. Minerals Intake Distributions in a Large Sample of Iranian at-Risk Population Using the National Cancer Institute Method: Do They Meet Their Requirements?

    Science.gov (United States)

    Heidari, Zahra; Feizi, Awat; Azadbakht, Leila; Sarrafzadegan, Nizal

    2015-01-01

    Minerals are required for the body's normal function. The current study assessed the intake distribution of minerals and estimated the prevalence of inadequacy and excess among a representative sample of healthy middle aged and elderly Iranian people. In this cross-sectional study, the second follow up to the Isfahan Cohort Study (ICS), 1922 generally healthy people aged 40 and older were investigated. Dietary intakes were collected using 24 hour recalls and two or more consecutive food records. Distribution of minerals intake was estimated using traditional (averaging dietary intake days) and National Cancer Institute (NCI) methods, and the results obtained from the two methods, were compared. The prevalence of minerals intake inadequacy or excess was estimated using the estimated average requirement (EAR) cut-point method, the probability approach and the tolerable upper intake levels (UL). There were remarkable differences between values obtained using traditional and NCI methods, particularly in the lower and upper percentiles of the estimated intake distributions. A high prevalence of inadequacy of magnesium (50 - 100 %), calcium (21 - 93 %) and zinc (30 - 55 % for males > 50 years) was observed. Significant gender differences were found regarding inadequate intakes of calcium (21 - 76 % for males vs. 45 - 93 % for females), magnesium (92 % vs. 100 %), iron (0 vs. 15 % for age group 40 - 50 years) and zinc (29 - 55 % vs. 0 %) (all; p < 0.05). Severely imbalanced intakes of magnesium, calcium and zinc were observed among the middle-aged and elderly Iranian population. Nutritional interventions and population-based education to improve healthy diets among the studied population at risk are needed.

  11. Access Customized Forms

    OpenAIRE

    Cosma Emil; Jeflea Victor

    2010-01-01

    By using Word, Excel or PowerPoint one can automate routine operations using the VBA language (Visual Basic for Applications). This language is also used in Access, allowing access to data stored in tables or queries. Thus, Access and VBA resources can be used together. Access is designed for programming forms and reports (among other things), so there won’t be found any of the VBA editor’s specific forms.

  12. Contraceptive use and method preference among women in Soweto, South Africa: the influence of expanding access to HIV care and treatment services.

    Directory of Open Access Journals (Sweden)

    Angela Kaida

    2010-11-01

    Full Text Available Preventing unintended pregnancy among HIV-positive women constitutes a critical and cost-effective approach to primary prevention of mother-to-child transmission of HIV and is a global public health priority for addressing the desperate state of maternal and child health in HIV hyper-endemic settings. We sought to investigate whether the prevalence of contraceptive use and method preferences varied by HIV status and receipt of highly active antiretroviral therapy (HAART among women in Soweto, South Africa.We used survey data from 563 sexually active, non-pregnant women (18-44 years recruited from the Perinatal HIV Research Unit in Soweto (May-December, 2007; 171 women were HIV-positive and receiving HAART (median duration of use = 31 months; IQR = 28, 33, 178 were HIV-positive and HAART-naïve, and 214 were HIV-negative. Medical record review was conducted to confirm HIV status and clinical variables. Logistic regression models estimated adjusted associations between HIV status, receipt of HAART, and contraceptive use.Overall, 78% of women reported using contraception, with significant variation by HIV status: 86% of HAART users, 82% of HAART-naïve women, and 69% of HIV-negative women (p<0.0001. In adjusted models, compared with HIV-negative women, women receiving HAART were significantly more likely to use contraception while HAART-naïve women were non-significantly more likely (AOR: 2.40; 95% CI: 1.25, 4.62 and AOR: 1.59; 95% CI: 0.88, 2.85; respectively. Among HIV-positive women, HAART users were non-significantly more likely to use contraception compared with HAART-naïve women (AOR: 1.55; 95% CI: 0.84, 2.88. Similar patterns held for specific use of barrier (primarily male condoms, permanent, and dual protection contraceptive methods.Among HIV-positive women receiving HAART, the observed higher prevalence of contraceptive use overall and condoms in particular promises to yield fewer unintended pregnancies and reduced risks of

  13. Contraceptive use and method preference among women in Soweto, South Africa: the influence of expanding access to HIV care and treatment services.

    Science.gov (United States)

    Kaida, Angela; Laher, Fatima; Strathdee, Steffanie A; Money, Deborah; Janssen, Patricia A; Hogg, Robert S; Gray, Glenda

    2010-11-05

    Preventing unintended pregnancy among HIV-positive women constitutes a critical and cost-effective approach to primary prevention of mother-to-child transmission of HIV and is a global public health priority for addressing the desperate state of maternal and child health in HIV hyper-endemic settings. We sought to investigate whether the prevalence of contraceptive use and method preferences varied by HIV status and receipt of highly active antiretroviral therapy (HAART) among women in Soweto, South Africa. We used survey data from 563 sexually active, non-pregnant women (18-44 years) recruited from the Perinatal HIV Research Unit in Soweto (May-December, 2007); 171 women were HIV-positive and receiving HAART (median duration of use = 31 months; IQR = 28, 33), 178 were HIV-positive and HAART-naïve, and 214 were HIV-negative. Medical record review was conducted to confirm HIV status and clinical variables. Logistic regression models estimated adjusted associations between HIV status, receipt of HAART, and contraceptive use. Overall, 78% of women reported using contraception, with significant variation by HIV status: 86% of HAART users, 82% of HAART-naïve women, and 69% of HIV-negative women (pwomen, women receiving HAART were significantly more likely to use contraception while HAART-naïve women were non-significantly more likely (AOR: 2.40; 95% CI: 1.25, 4.62 and AOR: 1.59; 95% CI: 0.88, 2.85; respectively). Among HIV-positive women, HAART users were non-significantly more likely to use contraception compared with HAART-naïve women (AOR: 1.55; 95% CI: 0.84, 2.88). Similar patterns held for specific use of barrier (primarily male condoms), permanent, and dual protection contraceptive methods. Among HIV-positive women receiving HAART, the observed higher prevalence of contraceptive use overall and condoms in particular promises to yield fewer unintended pregnancies and reduced risks of vertical and sexual HIV transmission. These findings highlight the

  14. Applying WHO's 'workforce indicators of staffing need' (WISN) method to calculate the health worker requirements for India's maternal and child health service guarantees in Orissa State.

    Science.gov (United States)

    Hagopian, Amy; Mohanty, Manmath K; Das, Abhijit; House, Peter J

    2012-01-01

    In one district of Orissa state, we used the World Health Organization's Workforce Indicators of Staffing Need (WISN) method to calculate the number of health workers required to achieve the maternal and child health 'service guarantees' of India's National Rural Health Mission (NRHM). We measured the difference between this ideal number and current staffing levels. We collected census data, routine health information data and government reports to calculate demand for maternal and child health services. By conducting 54 interviews with physicians and midwives, and six focus groups, we were able to calculate the time required to perform necessary health care tasks. We also interviewed 10 new mothers to cross-check these estimates at a global level and get assessments of quality of care. For 18 service centres of Ganjam District, we found 357 health workers in our six cadre categories, to serve a population of 1.02 million. Total demand for the MCH services guaranteed under India's NRHM outpaced supply for every category of health worker but one. To properly serve the study population, the health workforce supply should be enhanced by 43 additional physicians, 15 nurses and 80 nurse midwives. Those numbers probably under-estimate the need, as they assume away geographic barriers. Our study established time standards in minutes for each MCH activity promised by the NRHM, which could be applied elsewhere in India by government planners and civil society advocates. Our calculations indicate significant numbers of new health workers are required to deliver the services promised by the NRHM.

  15. Accessing Electronic Journals.

    Science.gov (United States)

    McKay, Sharon Cline

    1999-01-01

    Discusses issues librarians need to consider when providing access to electronic journals. Topics include gateways; index and abstract services; validation and pay-per-view; title selection; integration with OPACs (online public access catalogs)or Web sites; paper availability; ownership versus access; usage restrictions; and services offered…

  16. Pulse patterning effect in optical pulse division multiplexing for flexible single wavelength multiple access optical network

    Science.gov (United States)

    Jung, Sun-Young; Kim, Chang-Hun; Han, Sang-Kook

    2018-05-01

    A demand for high spectral efficiency requires multiple access within a single wavelength, but the uplink signals are significantly degraded because of optical beat interference (OBI) in intensity modulation/direct detection system. An optical pulse division multiplexing (OPDM) technique was proposed that could effectively reduce the OBI via a simple method as long as near-orthogonality is satisfied, but the condition was strict, and thus, the number of multiplexing units was very limited. We propose pulse pattern enhanced OPDM (e-OPDM) to reduce the OBI and improve the flexibility in multiple access within a single wavelength. The performance of the e-OPDM and patterning effect are experimentally verified after 23-km single mode fiber transmission. By employing pulse patterning in OPDM, the tight requirement was relaxed by extending the optical delay dynamic range. This could support more number of access with reduced OBI, which could eventually enhance a multiple access function.

  17. Toward a standard for the evaluation of PET-Auto-Segmentation methods following the recommendations of AAPM task group No. 211: Requirements and implementation.

    Science.gov (United States)

    Berthon, Beatrice; Spezi, Emiliano; Galavis, Paulina; Shepherd, Tony; Apte, Aditya; Hatt, Mathieu; Fayad, Hadi; De Bernardi, Elisabetta; Soffientini, Chiara D; Ross Schmidtlein, C; El Naqa, Issam; Jeraj, Robert; Lu, Wei; Das, Shiva; Zaidi, Habib; Mawlawi, Osama R; Visvikis, Dimitris; Lee, John A; Kirov, Assen S

    2017-08-01

    The aim of this paper is to define the requirements and describe the design and implementation of a standard benchmark tool for evaluation and validation of PET-auto-segmentation (PET-AS) algorithms. This work follows the recommendations of Task Group 211 (TG211) appointed by the American Association of Physicists in Medicine (AAPM). The recommendations published in the AAPM TG211 report were used to derive a set of required features and to guide the design and structure of a benchmarking software tool. These items included the selection of appropriate representative data and reference contours obtained from established approaches and the description of available metrics. The benchmark was designed in a way that it could be extendable by inclusion of bespoke segmentation methods, while maintaining its main purpose of being a standard testing platform for newly developed PET-AS methods. An example of implementation of the proposed framework, named PETASset, was built. In this work, a selection of PET-AS methods representing common approaches to PET image segmentation was evaluated within PETASset for the purpose of testing and demonstrating the capabilities of the software as a benchmark platform. A selection of clinical, physical, and simulated phantom data, including "best estimates" reference contours from macroscopic specimens, simulation template, and CT scans was built into the PETASset application database. Specific metrics such as Dice Similarity Coefficient (DSC), Positive Predictive Value (PPV), and Sensitivity (S), were included to allow the user to compare the results of any given PET-AS algorithm to the reference contours. In addition, a tool to generate structured reports on the evaluation of the performance of PET-AS algorithms against the reference contours was built. The variation of the metric agreement values with the reference contours across the PET-AS methods evaluated for demonstration were between 0.51 and 0.83, 0.44 and 0.86, and 0.61 and 1

  18. Airspace Operations Demo Functional Requirements Matrix

    Science.gov (United States)

    2005-01-01

    The Flight IPT assessed the reasonableness of demonstrating each of the Access 5 Step 1 functional requirements. The functional requirements listed in this matrix are from the September 2005 release of the Access 5 Functional Requirements Document. The demonstration mission considered was a notional Western US mission (WUS). The conclusion of the assessment is that 90% of the Access 5 Step 1 functional requirements can be demonstrated using the notional Western US mission.

  19. Open access for REF2020

    Directory of Open Access Journals (Sweden)

    Simon Kerridge

    2014-03-01

    Full Text Available Open access (OA may have been the ‘big thing’ in 2013 but the OA juggernaut is still rolling and plans are now afoot for the requirements for the ‘next REF’ (which from now on we will refer to as REF2020. In 2013, on behalf of the four UK Funding Councils, the Higher Education Funding Council for England (HEFCE undertook a two-stage consultation exercise on open access requirements for articles submitted to REF2020. There are a number of nuances and caveats to the current proposals. This article will reflect on what the probable rules might be, and their implications for research managers, administrators and institutional repository managers alike.

  20. Addressing geographic access barriers to emergency care services: a national ecologic study of hospitals in Brazil.

    Science.gov (United States)

    Rocha, Thiago Augusto Hernandes; da Silva, Núbia Cristina; Amaral, Pedro Vasconcelos; Barbosa, Allan Claudius Queiroz; Rocha, João Victor Muniz; Alvares, Viviane; de Almeida, Dante Grapiuna; Thumé, Elaine; Thomaz, Erika Bárbara Abreu Fonseca; de Sousa Queiroz, Rejane Christine; de Souza, Marta Rovery; Lein, Adriana; Lopes, Daniel Paulino; Staton, Catherine A; Vissoci, João Ricardo Nickenig; Facchini, Luiz Augusto

    2017-08-22

    Unequal distribution of emergency care services is a critical barrier to be overcome to assure access to emergency and surgical care. Considering this context it was objective of the present work analyze geographic access barriers to emergency care services in Brazil. A secondary aim of the study is to define possible roles to be assumed by small hospitals in the Brazilian healthcare network to overcome geographic access challenges. The present work can be classified as a cross-sectional ecological study. To carry out the present study, data of all 5843 Brazilian hospitals were categorized among high complexity centers and small hospitals. The geographical access barriers were identified through the use of two-step floating catchment area method. Once concluded the previous step an evaluation using the Getis-Ord-Gi method was performed to identify spatial clusters of municipalities with limited access to high complexity centers but well covered by well-equipped small hospitals. The analysis of accessibility index of high complexity centers highlighted large portions of the country with nearly zero hospital beds by inhabitant. In contrast, it was possible observe a group of 1595 municipalities with high accessibility to small hospitals, simultaneously with a low coverage of high complexity centers. Among the 1595 municipalities with good accessibility to small hospitals, 74% (1183) were covered by small hospitals with at least 60% of minimum emergency service requirements. The spatial clusters analysis aggregated 589 municipalities with high values related to minimum emergency service requirements. Small hospitals in these 589 cities could promote the equity in access to emergency services benefiting more than eight million people. There is a spatial disequilibrium within the country with prominent gaps in the health care network for emergency services. Taking this challenge into consideration, small hospitals could be a possible solution and foster equity in access

  1. Access 2013 for dummies

    CERN Document Server

    Ulrich Fuller, Laurie

    2013-01-01

    The easy guide to Microsoft Access returns with updates on the latest version! Microsoft Access allows you to store, organize, view, analyze, and share data; the new Access 2013 release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. Access 2013 For Dummies covers all the new features of the latest version of Accessand serves as an ideal reference, combining the latest Access features with the basics of building usable databases. You'll learn how to create an app from the Welcome screen, get support

  2. Pro Access 2010 Development

    CERN Document Server

    Collins, Mark

    2011-01-01

    Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for Applications (VBA) tools for Access applications, integrate Access with SharePoint and other business systems, and much more. Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, co

  3. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  4. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  5. Teenagers’ access to contraception in Mexico City

    Directory of Open Access Journals (Sweden)

    Sofía Gómez-Inclán

    2017-05-01

    Full Text Available Objective. To study and understand the phenomenon of access to contraceptive methods in Mexican teenages, through the use of the Levesque model, which allows for the observation of both the system and the system and the user´s participation in the access process. Materials and methods. A qualitative study was conducted with focus groups technique in a middle and high school of Mexico City. Results. The perception of ability to access to health care is limited, teenagers do not know the mechanisms of care or supply of contraceptive methods. Prejudices of service providers provoke a negative reaction. The family is a source of information for adolescents to make decisions. Conclusions. The model allowed the assessment of access to contraceptive methods in teenagers. It were identified dif­ferent aspects that act as barriers to access and may inform health care providers about this population in their sexual and reproductive health.

  6. Architectures for a quantum random access memory

    OpenAIRE

    Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo

    2008-01-01

    A random access memory, or RAM, is a device that, when interrogated, returns the content of a memory location in a memory array. A quantum RAM, or qRAM, allows one to access superpositions of memory sites, which may contain either quantum or classical information. RAMs and qRAMs with n-bit addresses can access 2^n memory sites. Any design for a RAM or qRAM then requires O(2^n) two-bit logic gates. At first sight this requirement might seem to make large scale quantum versions of such devices ...

  7. Publishing in Open Access Education Journals: The Authors' Perspectives

    Science.gov (United States)

    Coonin, Bryna; Younce, Leigh M.

    2010-01-01

    Open access publishing is now an accepted method of scholarly communication. However, the greatest traction for open access publishing thus far has been in the sciences. Penetration of open access publishing has been much slower among the social sciences. This study surveys 309 authors from recent issues of open access journals in education to…

  8. Assessing the National Bioengineered Food Disclosure Standard of 2016: Can Americans Access Electronic Disclosure Information?

    Directory of Open Access Journals (Sweden)

    Craig F. Berning

    2017-05-01

    Full Text Available The debate as to whether to require mandatory labeling of genetically modified organism (GMO foods was partially settled on 29 July 2016, when President Obama signed the National Bioengineered Food Disclosure Standard into public law. In contrast to precipitating legislation passed by the State of Vermont that required disclosure of GMO ingredients on food shelves or food packages, the superseding National Standard allows firms to disclose bioengineered ingredients to consumers via symbols, electronic or digital links, or phone numbers, and further requires a study assessing the ability of consumers to access disclosure information by these means. This communication analyzes survey responses from 525 adults to investigate whether U.S. consumers are able to obtain information as per the disclosure methods allowed in the Federal legislation. The survey probes deeper to investigate consumer perceptions of genetically modified organisms and whether consumers would use the tools available to access disclosure about bioengineered ingredients. Findings from the survey show that 93.8% of respondents have the ability to access information via the disclosure methods permitted. Those in the lowest income group, and from the oldest age group are least likely to have such access. This provides the United State Department of Agriculture with information relevant to how they can implement the law and highlights particular demographic segments that may require additional attention to ensure the disclosed information is universally accessible.

  9. Accessing remote data bases using microcomputers

    OpenAIRE

    Saul, Peter D.

    1985-01-01

    General practitioners' access to remote data bases using microcomputers is increasing, making even the most obscure information readily available. Some of the systems available to general practitioners in the UK are described and the methods of access are outlined. General practitioners should be aware of the advances in technology; data bases are increasing in size, the cost of access is falling and their use is becoming easier.

  10. Effect of Perceptual Load on Semantic Access by Speech in Children

    Science.gov (United States)

    Jerger, Susan; Damian, Markus F.; Mills, Candice; Bartlett, James; Tye-Murray, Nancy; Abdi, Herve

    2013-01-01

    Purpose: To examine whether semantic access by speech requires attention in children. Method: Children ("N" = 200) named pictures and ignored distractors on a cross-modal (distractors: auditory-no face) or multimodal (distractors: auditory-static face and audiovisual- dynamic face) picture word task. The cross-modal task had a low load,…

  11. American Thyroid Association Statement on Remote-Access Thyroid Surgery.

    Science.gov (United States)

    Berber, Eren; Bernet, Victor; Fahey, Thomas J; Kebebew, Electron; Shaha, Ashok; Stack, Brendan C; Stang, Michael; Steward, David L; Terris, David J

    2016-03-01

    Remote-access techniques have been described over the recent years as a method of removing the thyroid gland without an incision in the neck. However, there is confusion related to the number of techniques available and the ideal patient selection criteria for a given technique. The aims of this review were to develop a simple classification of these approaches, describe the optimal patient selection criteria, evaluate the outcomes objectively, and define the barriers to adoption. A review of the literature was performed to identify the described techniques. A simple classification was developed. Technical details, outcomes, and the learning curve were described. Expert opinion consensus was formulated regarding recommendations for patient selection and performance of remote-access thyroid surgery. Remote-access thyroid procedures can be categorized into endoscopic or robotic breast, bilateral axillo-breast, axillary, and facelift approaches. The experience in the United States involves the latter two techniques. The limited data in the literature suggest long operative times, a steep learning curve, and higher costs with remote-access thyroid surgery compared with conventional thyroidectomy. Nevertheless, a consensus was reached that, in appropriate hands, it can be a viable option for patients with unilateral small nodules who wish to avoid a neck incision. Remote-access thyroidectomy has a role in a small group of patients who fit strict selection criteria. These approaches require an additional level of expertise, and therefore should be done by surgeons performing a high volume of thyroid and robotic surgery.

  12. Accessible solitons of fractional dimension

    Energy Technology Data Exchange (ETDEWEB)

    Zhong, Wei-Ping, E-mail: zhongwp6@126.com [Department of Electronic and Information Engineering, Shunde Polytechnic, Guangdong Province, Shunde 528300 (China); Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar); Belić, Milivoj [Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar); Zhang, Yiqi [Key Laboratory for Physical Electronics and Devices of the Ministry of Education & Shaanxi Key Lab of Information Photonic Technique, Xi’an Jiaotong University, Xi’an 710049 (China)

    2016-05-15

    We demonstrate that accessible solitons described by an extended Schrödinger equation with the Laplacian of fractional dimension can exist in strongly nonlocal nonlinear media. The soliton solutions of the model are constructed by two special functions, the associated Legendre polynomials and the Laguerre polynomials in the fraction-dimensional space. Our results show that these fractional accessible solitons form a soliton family which includes crescent solitons, and asymmetric single-layer and multi-layer necklace solitons. -- Highlights: •Analytic solutions of a fractional Schrödinger equation are obtained. •The solutions are produced by means of self-similar method applied to the fractional Schrödinger equation with parabolic potential. •The fractional accessible solitons form crescent, asymmetric single-layer and multilayer necklace profiles. •The model applies to the propagation of optical pulses in strongly nonlocal nonlinear media.

  13. Single-Access Laparoscopic Surgery for Ileal Disease

    Directory of Open Access Journals (Sweden)

    Mohamed Moftah

    2012-01-01

    Full Text Available Aim. Single-access laparoscopic surgery (SALS can be effective for benign and malignant diseases of the ileum in both the elective and urgent setting. Methods. Ten consecutive, nonselected patients with ileal disease requiring surgery over a twelve month period were included. All had a preoperative abdominopelvic computerized tomogram. Peritoneal access was achieved via a single transumbilical incision and a “surgical glove port” utilized as our preferred access device. With the pneumoperitoneum established, the relevant ileal loop was located using standard rigid instruments. For ileal resection, anastomosis, or enterotomy, the site of pathology was delivered and addressed extracorporeally. Result. The median (range age of the patients was 42.5 (22–78 years, and the median body mass index was 22 (20.2–28 kg/m2. Procedures included tru-cut biopsy of an ileal mesenteric mass, loop ileostomy and ileotomy for impacted gallstone extraction as well as ileal (=3 and ileocaecal resection (=4. Mean (range incision length was 2.5 (2–5 cm. All convalescences were uncomplicated. Conclusions. These preliminary results show that SALS is an efficient and safe modality for the surgical management of ileal disease with all the advantages of minimal access surgery and without requiring a significant increase in theatre resource or cost or incurring extra patient morbidity.

  14. Screw scale measurement requirements and test methods%螺旋秤的计量要求和试验方法

    Institute of Scientific and Technical Information of China (English)

    刘炜

    2012-01-01

    Through to the electronic spiral weighing feeder test, this article describes in detail on the basis of continuous totalizing automatic weighing instrument (belt) national standard (GBfF7721-2007) and test procedures (JJG195-2D02) corresponding to the terms of the screw scale test measurement requirements and test methods.%本文通过对电子螺旋称重给料机进行试验,详细地阐述了依据连续累计自动衡器(皮带秤)的国家标准(GB/T7721—2007)和检定规程~G195—2002)相应的条款对螺旋秤进行试验的计量要求和试验方法。

  15. From basic to applied research to improve outcomes for individuals who require augmentative and alternative communication: potential contributions of eye tracking research methods.

    Science.gov (United States)

    Light, Janice; McNaughton, David

    2014-06-01

    In order to improve outcomes for individuals who require AAC, there is an urgent need for research across the full spectrum--from basic research to investigate fundamental language and communication processes, to applied clinical research to test applications of this new knowledge in the real world. To date, there has been a notable lack of basic research in the AAC field to investigate the underlying cognitive, sensory perceptual, linguistic, and motor processes of individuals with complex communication needs. Eye tracking research technology provides a promising method for researchers to investigate some of the visual cognitive processes that underlie interaction via AAC. The eye tracking research technology automatically records the latency, duration, and sequence of visual fixations, providing key information on what elements attract the individual's attention (and which ones do not), for how long, and in what sequence. As illustrated by the papers in this special issue, this information can be used to improve the design of AAC systems, assessments, and interventions to better meet the needs of individuals with developmental and acquired disabilities who require AAC (e.g., individuals with autism spectrum disorders, Down syndrome, intellectual disabilities of unknown origin, aphasia).

  16. A Rewritable, Random-Access DNA-Based Storage System.

    Science.gov (United States)

    Yazdi, S M Hossein Tabatabaei; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-18

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  17. Monographs and Open Access

    Directory of Open Access Journals (Sweden)

    Geoffrey Crossick

    2016-03-01

    Full Text Available This article presents the project that I led for HEFCE on the implications of OA (open access for monographs and other long-form research publications. The likely requirement that books should be OA if submitted to the REF (Research Excellence Framework after next means that OA development must be based on an understanding of the importance of the monograph in the AHSS (arts, humanities and social sciences as well as the challenges involved in making the transition to online OA. The project focused on three issues and each is summarized in turn in the article: What is the place of the monograph and other long-form publications in AHSS disciplines that makes it so important? What is happening to the monograph and is there a crisis as some suggest? What are the issues involved in moving monographs into a digital and OA environment – not just the challenge of effective business models but also many other aspects of sustaining and enhancing the qualities of the monograph? These include third-party rights, technical challenges, licences and the need for international collaboration.

  18. Norway's ICT Accessibility Legislation, Methods and Indicators.

    Science.gov (United States)

    Rygg, Malin; Rømen, Dagfinn; Sterri, Brynhild Runa

    2016-01-01

    This paper gives an overview of the Norwegian legislation on Universal Design of information and communication technology (ICT) and how the Norwegian Authority for Universal Design of ICT works to enforce and achieve the goals behind the legislation. The Authority uses indicators to check websites for compliance with the regulations. This paper describes the rationale and intended use for the indicators and how they are used for both supervision and benchmarks as well as a way of gathering data to give an overview of the current state of Universal Design of websites in Norway.

  19. Synthesizing qualitative and quantitative evidence on non-financial access barriers: implications for assessment at the district level.

    Science.gov (United States)

    O'Connell, Thomas S; Bedford, K Juliet A; Thiede, Michael; McIntyre, Di

    2015-06-09

    A key element of the global drive to universal health coverage is ensuring access to needed health services for everyone, and to pursue this goal in an equitable way. This requires concerted efforts to reduce disparities in access through understanding and acting on barriers facing communities with the lowest utilisation levels. Financial barriers dominate the empirical literature on health service access. Unless the full range of access barriers are investigated, efforts to promote equitable access to health care are unlikely to succeed. This paper therefore focuses on exploring the nature and extent of non-financial access barriers. We draw upon two structured literature reviews on barriers to access and utilization of maternal, newborn and child health services in Ghana, Bangladesh, Vietnam and Rwanda. One review analyses access barriers identified in published literature using qualitative research methods; the other in published literature using quantitative analysis of household survey data. We then synthesised the key qualitative and quantitative findings through a conjoint iterative analysis. Five dominant themes on non-financial access barriers were identified: ethnicity; religion; physical accessibility; decision-making, gender and autonomy; and knowledge, information and education. The analysis highlighted that non-financial factors pose considerable barriers to access, many of which relate to the acceptability dimension of access and are challenging to address. Another key finding is that quantitative research methods, while yielding important findings, are inadequate for understanding non-financial access barriers in sufficient detail to develop effective responses. Qualitative research is critical in filling this gap. The analysis also indicates that the nature of non-financial access barriers vary considerably, not only between countries but also between different communities within individual countries. To adequately understand access barriers as a

  20. A New Method to Retrieve the Data Requirements of the Remote Sensing Community – Exemplarily Demonstrated for Hyperspectral User NEEDS

    Directory of Open Access Journals (Sweden)

    Ils Reusen

    2007-08-01

    Full Text Available User-driven requirements for remote sensing data are difficult to define,especially details on geometric, spectral and radiometric parameters. Even more difficult isa decent assessment of the required degrees of processing and corresponding data quality. Itis therefore a real challenge to appropriately assess data costs and services to be provided.In 2006, the HYRESSA project was initiated within the framework 6 programme of theEuropean Commission to analyze the user needs of the hyperspectral remote sensingcommunity. Special focus was given to finding an answer to the key question, “What arethe individual user requirements for hyperspectral imagery and its related data products?”.A Value-Benefit Analysis (VBA was performed to retrieve user needs and address openitems accordingly. The VBA is an established tool for systematic problem solving bysupporting the possibility of comparing competing projects or solutions. It enablesevaluation on the basis of a multidimensional objective model and can be augmented withexpert’s preferences. After undergoing a VBA, the scaling method (e.g., Law ofComparative Judgment was applied for achieving the desired ranking judgments. Theresult, which is the relative value of projects with respect to a well-defined main objective,can therefore be produced analytically using a VBA. A multidimensional objective modeladhering to VBA methodology was established. Thereafter, end users and experts wererequested to fill out a Questionnaire of User Needs (QUN at the highest level of detail -the value indicator level. The end user was additionally requested to report personalpreferences for his particular research field. In the end, results from the experts’ evaluationand results from a sensor data survey can be compared in order to understand user needsand the drawbacks of existing data products. The investigation – focusing on the needs of the hyperspectral user

  1. Achieving Accuracy Requirements for Forest Biomass Mapping: A Data Fusion Method for Estimating Forest Biomass and LiDAR Sampling Error with Spaceborne Data

    Science.gov (United States)

    Montesano, P. M.; Cook, B. D.; Sun, G.; Simard, M.; Zhang, Z.; Nelson, R. F.; Ranson, K. J.; Lutchke, S.; Blair, J. B.

    2012-01-01

    forest AGB sampling errors by 15 - 38%. Furthermore, spaceborne global scale accuracy requirements were achieved. At least 80% of the grid cells at 100m, 250m, 500m, and 1km grid levels met AGB density accuracy requirements using a combination of passive optical and SAR along with machine learning methods to predict vegetation structure metrics for forested areas without LiDAR samples. Finally, using either passive optical or SAR, accuracy requirements were met at the 500m and 250m grid level, respectively.

  2. Strategic Accessibility Competition

    OpenAIRE

    Bacchiega, Emanuele; Randon, Emanuela; Zirulia, Lorenzo

    2010-01-01

    We analyze the effect of competition in market-accessibility enhancement among quality-differentiated firms. Firms are located in regions with different ex-ante transport costs to reach the final market. We characterize the equilibrium of the two-stage game in which firms first invest to improve market accessibility and then compete in prices. Efforts in accessibility improvement crucially depend on the interplay between the willingness to pay for the quality premium of the median consumer an...

  3. Are PDF Documents Accessible?

    Directory of Open Access Journals (Sweden)

    Mireia Ribera Turró

    2008-09-01

    Full Text Available Adobe PDF is one of the most widely used formats in scientific communications and in administrative documents. In its latest versions it has incorporated structural tags and improvements that increase its level of accessibility. This article reviews the concept of accessibility in the reading of digital documents and evaluates the accessibility of PDF according to the most widely established standards.

  4. Open Access Monitor - DK

    DEFF Research Database (Denmark)

    Svendsen, Michael; Hansen, Lars Asger Juel; Andersen, Dorte

    2017-01-01

    Open Access Monitor - DK (OAM-DK) is a 2-year DEFF funded [DEFF.2016-0018] national project running in 2017-2018 with the aim of collecting, documenting and administrating Open Access publishing costs. OAM-DK is lead by Copenhagen University Library under the Royal Danish Library with participation...... of all Danish University Libraries. This poster presents the first results of Open Access costs related to 2015 publications at the The University of Copenhagen....

  5. Librarians and Libraries Supporting Open Access Publishing

    Science.gov (United States)

    Richard, Jennifer; Koufogiannakis, Denise; Ryan, Pam

    2009-01-01

    As new models of scholarly communication emerge, librarians and libraries have responded by developing and supporting new methods of storing and providing access to information and by creating new publishing support services. This article will examine the roles of libraries and librarians in developing and supporting open access publishing…

  6. Energy requirement assessed by doubly-labeled water method in patients with advanced amyotrophic lateral sclerosis managed by tracheotomy positive pressure ventilation.

    Science.gov (United States)

    Ichihara, Noriko; Namba, Kazuyoshi; Ishikawa-Takata, Kazuko; Sekine, Kazunori; Takase, Mitsunori; Kamada, Yuko; Fujii, Seigo

    2012-10-01

    This study aimed to clarify the energy requirement in patients with amyotrophic lateral sclerosis (ALS) undergoing tracheostomy positive pressure ventilation with tracheostomy. Total energy expenditure (TEE) was measured in 10 hospitalized bedridden ALS patients using the doubly-labeled water (DLW) method. The mean TEE/day and TEE/fat- free mass estimated by DLW method were 934 ± 201 kcal/day and 34.8 ± 5.5 kcal/kg/day, respectively. The mean TEE/resting metabolic rate (RMR) was 0.85 when RMR was estimated by the Harris-Benedict equation, 0.91 by Dietary Reference Intake (DRI), and 0.97 by Ganpule's equation using fat-free mass (FFM). The ratios of TEE to measured RMR were 1.05, 1.15 and 1.23 in three patients. In conclusion, multiplying measured RMR by 1.1 to 1.2 is considered to be appropriate to estimate energy need. However, because it is difficult to measure RMR directly in a clinical setting, an appropriate equation for estimating RMR for ALS patient should be developed.

  7. Demystifying Open Access

    International Nuclear Information System (INIS)

    Mele, Salvatore

    2007-01-01

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  8. OGIS Access System

    Data.gov (United States)

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  9. Access 2013 bible

    CERN Document Server

    Alexander, Michael

    2013-01-01

    A comprehensive reference to the updated and new features of Access 2013 As the world's most popular database management tool, Access enables you to organize, present, analyze, and share data as well as build powerful database solutions. However, databases can be complex. That's why you need the expert guidance in this comprehensive reference. Access 2013 Bible helps you gain a solid understanding of database purpose, construction, and application so that whether you're new to Access or looking to upgrade to the 2013 version, this well-rounded resource provides you with a th

  10. Web Accessibility and Guidelines

    Science.gov (United States)

    Harper, Simon; Yesilada, Yeliz

    Access to, and movement around, complex online environments, of which the World Wide Web (Web) is the most popular example, has long been considered an important and major issue in the Web design and usability field. The commonly used slang phrase ‘surfing the Web’ implies rapid and free access, pointing to its importance among designers and users alike. It has also been long established that this potentially complex and difficult access is further complicated, and becomes neither rapid nor free, if the user is disabled. There are millions of people who have disabilities that affect their use of the Web. Web accessibility aims to help these people to perceive, understand, navigate, and interact with, as well as contribute to, the Web, and thereby the society in general. This accessibility is, in part, facilitated by the Web Content Accessibility Guidelines (WCAG) currently moving from version one to two. These guidelines are intended to encourage designers to make sure their sites conform to specifications, and in that conformance enable the assistive technologies of disabled users to better interact with the page content. In this way, it was hoped that accessibility could be supported. While this is in part true, guidelines do not solve all problems and the new WCAG version two guidelines are surrounded by controversy and intrigue. This chapter aims to establish the published literature related to Web accessibility and Web accessibility guidelines, and discuss limitations of the current guidelines and future directions.

  11. Access inequalities addressed by audit.

    Science.gov (United States)

    Singh, Rajiv; Pentland, Brian

    2005-08-01

    The Disability Discrimination Act (1995) protects disabled people from discrimination in access to services, facilities and goods as well as in education and employment. All hospitals have an inherent duty to enable access to services but this will now be enshrined in law. As the health sector has most contact with disability, it may be expected that most hospitals would already be in a good position to comply with the Act, especially one treating many patients with disability. However we identified many problems in a rehabilitation hospital setting by means of a simple access audit in March 2004. Recommendations were set out and by March 2005 considerable improvements had been made costing Pound 100,000. Although many necessary changes will be expensive, not all problems identified require costly correction. Many simply involve a change in staff attitudes and practices. We recommend that all hospitals start to identify the changes needed under the Act by means of a simple access audit that can be carried out by hospital staff with no specialist equipment.

  12. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  13. Validation of Housing Standards Addressing Accessibility

    DEFF Research Database (Denmark)

    Helle, Tina

    2013-01-01

    The aim was to explore the use of an activity-based approach to determine the validity of a set of housing standards addressing accessibility. This included examination of the frequency and the extent of accessibility problems among older people with physical functional limitations who used...... participant groups were examined. Performing well-known kitchen activities was associated with accessibility problems for all three participant groups, in particular those using a wheelchair. The overall validity of the housing standards examined was poor. Observing older people interacting with realistic...... environments while performing real everyday activities seems to be an appropriate method for assessing accessibility problems....

  14. [The new methods to define the staffing requirements for doctors,nurses and nurses aides: an example of their implementation in an Italian hospital].

    Science.gov (United States)

    Laquintana, Dario; Pazzaglia, Silvia; Demarchi, Antonia

    2017-01-01

    . The new methods to define the staffing requirements for doctors, nurses and nurses aides: an example of their implementation in an Italian hospital. The Italian government, after the transposition of European Union legislation on working hours, made a declaration of commitment to increase the number of staff of the National Health Service (NHS). The method for assessing the staffing needs innovates the old one that dated back a few decades. To implement the method proposed by the Ministry of Health to an Italian hospital and assess its impact on staffing and costs. The model was implemented on all the wards, multiplying the minutes of care expected in 2016, dividing the result by 60 to obtain the hours of care, and further dividing by the number of yearly hours of work of a nurse (1418). Same was done for nurses aides. The minutes of care were related to mean weight of the Diagnosis Related Groups of the ward and the results obtained compared to the actual staffing of nurses and nurses aides. The costs of the differences were calculated. The implementation of the model produced an excess of 23 nurses and a scarcity of 95 nurses aides compared to the actual staffing, with an increase of the costs of € 1.828.562,00. The results obtained and the criticisms received so far show the need of major changes. The data from international studies that associate staffing and patients outcomes and the nurse/patient ratio are macro-indicators already available that may orient choices and investments on the health care professions.

  15. Bilgi Erişim Platformu Olarak Bulut Bilişim: Riskler ve Hukuksal Koşullar Üzerine Bir İnceleme= Cloud Computing as an Information Access Platform: A Study on Threats and Legal Requirements

    Directory of Open Access Journals (Sweden)

    Özgür Külcü

    2013-06-01

    Full Text Available Bulut bilişim, bilgiye her yerden ve her an erişebilme kolaylığı ile internet üzerinden sunulan çok yönlü ve hızlı gelişen servis araçlarından biridir. Ancak bu yeni teknoloji servisi birçok faydasının yanı sıra; göz ardı edilmesi halinde büyük kayıplara neden olabilecek riskleri de içermektedir. Çalışma genelinde, küresel çapta yoğun olarak tartışılmakta olan “Bulut üzerinde bulunan bilgilerin sahibi kim? Kişisel verilerin korunmasından kim sorumlu? Kayıp ve zararların telafi edilmesi mümkün mü?” gibi birçok sorunun yanıtı literatür ve mevcut uygulamalar içinde aranarak; bulut bilişimde verilerin güvenliği ve gizliliği konusunda toplumda bilinçlenmenin artırılması hedeflenmiştir. Bu çalışmada, bulut bilişimin faydalı ve olumsuz yönleri ile birlikte; mevcut ABD hukuk mevzuatı, AB direktifleri ve AB sözleşmeleri kapsamlı olarak incelenerek, tüm hukuksal risk ve problemlere dikkat çekilmiştir. Çalışma sonunda, mevcut bulut hizmet sözleşmeleri ve yasal düzenlemeler çerçevesinde; Türkiye’de bulut bilişim kullanıcılarının veri güvenliğini ve gizliliğini yeterli seviyede koruyan bir hukuksal düzenlemenin bulunmadığı ortaya konulmuştur. Ayrıca; veri öznelerinin bulut bilişime olan güveninin sağlanabilmesi ve kişisel verilerin korunabilmesi amacıyla temel olarak kabul edilebilecek güvenli bulut bilişim modeli önerisinde bulunulmuştur./ Cloud computing is one of the services that are delivered over internet for transmission and access to user data at anytime from anywhere. In spite of numerous advantages provided with cloud computing, it is important to recognize the potential threats, including loss of user data, when disregarded. In scope of the study, it is aimed to raise public awareness on cloud computing by investigating security and privacy issues related to user data stored on remote servers based on the questions like “Who is the owner

  16. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  17. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  18. The LHC access system LACS and LASS

    CERN Document Server

    Ninin, P

    2005-01-01

    The LHC complex is divided into a number of zones with different levels of access controls.Inside the interlocked areas, the personnel protection is ensured by the LHC Access System.The system is made of two parts:the LHC Access Safety System and the LHC Access Control System. During machine operation,the LHC Access Safety System ensures the collective protection of the personnel against the radiation hazards arising from the operation of the accelerator by interlocking the LHC key safety elements. When the beams are off, the LHC Access Control System regulates the access to the accelerator and its many subsystems.It allows a remote, local or automatic operation of the access control equipment which verifies and identifies all users entering the controlled areas.The global architecture of the LHC Access System is now designed and is being validated to ensure that it meets the safety requirements for operation of the LHC.A pilot installation will be tested in the summer 2005 to validate the concept with the us...

  19. Access and utilisation of maternity care for disabled women who experience domestic abuse: a systematic review

    Science.gov (United States)

    2014-01-01

    Background Although disabled women are significantly more likely to experience domestic abuse during pregnancy than non-disabled women, very little is known about how maternity care access and utilisation is affected by the co-existence of disability and domestic abuse. This systematic review of the literature explored how domestic abuse impacts upon disabled women’s access to maternity services. Methods Eleven articles were identified through a search of six electronic databases and data were analysed to identify: the factors that facilitate or compromise access to care; the consequences of inadequate care for pregnant women’s health and wellbeing; and the effectiveness of existing strategies for improvement. Results Findings indicate that a mental health diagnosis, poor relationships with health professionals and environmental barriers can compromise women’s utilisation of maternity services. Domestic abuse can both compromise, and catalyse, access to services and social support is a positive factor when accessing care. Delayed and inadequate care has adverse effects on women’s physical and psychological health, however further research is required to fully explore the nature and extent of these consequences. Only one study identified strategies currently being used to improve access to services for disabled women experiencing abuse. Conclusions Based upon the barriers and facilitators identified within the review, we suggest that future strategies for improvement should focus on: understanding women’s reasons for accessing care; fostering positive relationships; being women-centred; promoting environmental accessibility; and improving the strength of the evidence base. PMID:25029907

  20. Bioclim Deliverable D6b: application of statistical down-scaling within the BIOCLIM hierarchical strategy: methods, data requirements and underlying assumptions

    International Nuclear Information System (INIS)

    2004-01-01

    The overall aim of BIOCLIM is to assess the possible long term impacts due to climate change on the safety of radioactive waste repositories in deep formations. The coarse spatial scale of the Earth-system Models of Intermediate Complexity (EMICs) used in BIOCLIM compared with the BIOCLIM study regions and the needs of performance assessment creates a need for down-scaling. Most of the developmental work on down-scaling methodologies undertaken by the international research community has focused on down-scaling from the general circulation model (GCM) scale (with a typical spatial resolution of 400 km by 400 km over Europe in the current generation of models) using dynamical down-scaling (i.e., regional climate models (RCMs), which typically have a spatial resolution of 50 km by 50 km for models whose domain covers the European region) or statistical methods (which can provide information at the point or station scale) in order to construct scenarios of anthropogenic climate change up to 2100. Dynamical down-scaling (with the MAR RCM) is used in BIOCLIM WP2 to down-scale from the GCM (i.e., IPSL C M4 D ) scale. In the original BIOCLIM description of work, it was proposed that UEA would apply statistical down-scaling to IPSL C M4 D output in WP2 as part of the hierarchical strategy. Statistical down-scaling requires the identification of statistical relationships between the observed large-scale and regional/local climate, which are then applied to large-scale GCM output, on the assumption that these relationships remain valid in the future (the assumption of stationarity). Thus it was proposed that UEA would investigate the extent to which it is possible to apply relationships between the present-day large-scale and regional/local climate to the relatively extreme conditions of the BIOCLIM WP2 snapshot simulations. Potential statistical down-scaling methodologies were identified from previous work performed at UEA. Appropriate station data from the case