WorldWideScience

Sample records for mfedb access functions

  1. MDI: Mathematica database interface for the MFEDB

    International Nuclear Information System (INIS)

    Wiley, J.C.; Miner, W.H. Jr.; Ross, D.W.

    1992-04-01

    We describe a new interface for the Magnetic Fusion Energy Database, MFEDB, which uses Mathematica reg-sign as a front end. MDI is a Mathematica package that defines a basic set of MFEDB access functions. The package will also accept standard SQL queries. Each function returns Mathematica-style lists, which can then be manipulated with any of the Mathematica functions. MDI also provides some utility functions for plotting and analyzing the data. The MDI package essentially makes the MFEDB an extension of Mathematica. The user may use any of the many Mathematica front-ends including telnet, X-Windows, or a notebook. The mdi.m package may be obtained by anonymous FTP from the MFEDB site or by use of netmfe, and E-mail database interface. MDI is a example of distributed computing. Behind the user interface, MDI calls an RPC client program that communicates with an RPC server on the MFEDB computer. It relies on the network communication capabilities of Mathematica to connect the user to a workstation running the Mathematica kernel. The Mathematica kernel is then connected to the MFEDB host workstation by a client/server pair of RPC processes. If the Mathematica kernel is to be run on the users' machine, the RPC client program must also be obtained and installed. The MDI RPC server is also available for users who would like to provide their own client software. The server returns ASCII tables from standards queries and may be accessed and processed by any program on the internet that has access to RPC services

  2. Functional Traits for Carbon Access in Macrophytes.

    Science.gov (United States)

    Stepien, Courtney C; Pfister, Catherine A; Wootton, J Timothy

    2016-01-01

    Understanding functional trait distributions among organisms can inform impacts on and responses to environmental change. In marine systems, only 1% of dissolved inorganic carbon in seawater exists as CO2. Thus the majority of marine macrophytes not only passively access CO2 for photosynthesis, but also actively transport CO2 and the more common bicarbonate (HCO3-, 92% of seawater dissolved inorganic carbon) into their cells. Because species with these carbon concentrating mechanisms (CCMs) are non-randomly distributed in ecosystems, we ask whether there is a phylogenetic pattern to the distribution of CCMs among algal species. To determine macrophyte traits that influence carbon uptake, we assessed 40 common macrophyte species from the rocky intertidal community of the Northeast Pacific Ocean to a) query whether macrophytes have a CCM and b) determine the evolutionary history of CCMs, using ancestral state reconstructions and stochastic character mapping based on previously published data. Thirty-two species not only depleted CO2, but also concentrated and depleted HCO3-, indicative of a CCM. While analysis of CCMs as a continuous trait in 30 families within Phylum Rhodophyta showed a significant phylogenetic signal under a Brownian motion model, analysis of CCMs as a discrete trait (presence or absence) indicated that red algal families are more divergent than expected in their CCM presence or absence; CCMs are a labile trait within the Rhodophyta. In contrast, CCMs were present in each of 18 Ochrophyta families surveyed, indicating that CCMs are highly conserved in the brown algae. The trait of CCM presence or absence was largely conserved within Families. Fifteen of 23 species tested also changed the seawater buffering capacity, or Total Alkalinity (TA), shifting DIC composition towards increasing concentrations of HCO3- and CO2 for photosynthesis. Manipulating the external TA of the local environment may influence carbon availability in boundary layers and

  3. Functional Traits for Carbon Access in Macrophytes

    Science.gov (United States)

    Pfister, Catherine A.; Wootton, J. Timothy

    2016-01-01

    Understanding functional trait distributions among organisms can inform impacts on and responses to environmental change. In marine systems, only 1% of dissolved inorganic carbon in seawater exists as CO2. Thus the majority of marine macrophytes not only passively access CO2 for photosynthesis, but also actively transport CO2 and the more common bicarbonate (HCO3-, 92% of seawater dissolved inorganic carbon) into their cells. Because species with these carbon concentrating mechanisms (CCMs) are non-randomly distributed in ecosystems, we ask whether there is a phylogenetic pattern to the distribution of CCMs among algal species. To determine macrophyte traits that influence carbon uptake, we assessed 40 common macrophyte species from the rocky intertidal community of the Northeast Pacific Ocean to a) query whether macrophytes have a CCM and b) determine the evolutionary history of CCMs, using ancestral state reconstructions and stochastic character mapping based on previously published data. Thirty-two species not only depleted CO2, but also concentrated and depleted HCO3-, indicative of a CCM. While analysis of CCMs as a continuous trait in 30 families within Phylum Rhodophyta showed a significant phylogenetic signal under a Brownian motion model, analysis of CCMs as a discrete trait (presence or absence) indicated that red algal families are more divergent than expected in their CCM presence or absence; CCMs are a labile trait within the Rhodophyta. In contrast, CCMs were present in each of 18 Ochrophyta families surveyed, indicating that CCMs are highly conserved in the brown algae. The trait of CCM presence or absence was largely conserved within Families. Fifteen of 23 species tested also changed the seawater buffering capacity, or Total Alkalinity (TA), shifting DIC composition towards increasing concentrations of HCO3- and CO2 for photosynthesis. Manipulating the external TA of the local environment may influence carbon availability in boundary layers and

  4. Individuals with Access and Functional Needs

    Science.gov (United States)

    ... online tool helps people locate and access their electronic health records from a variety of sources. Plan for children ... in a busy room or to provide instant privacy, headphones to decrease auditory distractions, and comfort snacks ...

  5. Attitude Accessibility as a Function of Emotionality.

    Science.gov (United States)

    Rocklage, Matthew D; Fazio, Russell H

    2018-04-01

    Despite the centrality of both attitude accessibility and attitude basis to the last 30 years of theoretical and empirical work concerning attitudes, little work has systematically investigated their relation. The research that does exist provides conflicting results and is not at all conclusive given the methodology that has been used. The current research uses recent advances in statistical modeling and attitude measurement to provide the most systematic examination of the relation between attitude accessibility and basis to date. Specifically, we use mixed-effects modeling which accounts for variation across individuals and attitude objects in conjunction with the Evaluative Lexicon (EL)-a linguistic approach that allows for the simultaneous measurement of an attitude's valence, extremity, and emotionality. We demonstrate across four studies, over 10,000 attitudes, and nearly 50 attitude objects that attitudes based on emotion tend to be more accessible in memory, particularly if the attitude is positive.

  6. Combining sync&share functionality with filesystem-like access

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    In our presentation we will analyse approaches to combine the sync & share functionality with file system-like access to data. While relatively small data volumes (GBs) can be distributed by sync&share application across user devices such as PCs, laptops and mobiles, interacting with really large data volumes (TBs, PBs) may require additional remote data access mechanism such as filesystem-like interface. We will discuss several ways for offering filesystem-like access in addition to sync & share functionality. Todays sync & share solutions may employ various data organisation in the back-end including local and distributed file systems and object stores. Therefore various approaches to providing the client with filesystem-like access are necessary in these systems. We will present possible options to integrate the filesystem-like access with sync&share functionality in the popular sync&share system. We will also show a NDS2 project solution where data backups and archives are kept sec...

  7. Using Operational Analysis to Improve Access to Pulmonary Function Testing

    Directory of Open Access Journals (Sweden)

    Ada Ip

    2016-01-01

    Full Text Available Background. Timely pulmonary function testing is crucial to improving diagnosis and treatment of pulmonary diseases. Perceptions of poor access at an academic pulmonary function laboratory prompted analysis of system demand and capacity to identify factors contributing to poor access. Methods. Surveys and interviews identified stakeholder perspectives on operational processes and access challenges. Retrospective data on testing demand and resource capacity was analyzed to understand utilization of testing resources. Results. Qualitative analysis demonstrated that stakeholder groups had discrepant views on access and capacity in the laboratory. Mean daily resource utilization was 0.64 (SD 0.15, with monthly average utilization consistently less than 0.75. Reserved testing slots for subspecialty clinics were poorly utilized, leaving many testing slots unfilled. When subspecialty demand exceeded number of reserved slots, there was sufficient capacity in the pulmonary function schedule to accommodate added demand. Findings were shared with stakeholders and influenced scheduling process improvements. Conclusion. This study highlights the importance of operational data to identify causes of poor access, guide system decision-making, and determine effects of improvement initiatives in a variety of healthcare settings. Importantly, simple operational analysis can help to improve efficiency of health systems with little or no added financial investment.

  8. Bandwidth Analysis of Functional Interconnects Used as Test Access Mechanism

    NARCIS (Netherlands)

    Van den Berg, A.; Ren, P.; Marinissen, E.J.; Gaydadjiev, G.; Goossens, K.

    2010-01-01

    Test data travels through a System on Chip (SOC) from the chip pins to the Core-Under-Test (CUT) and vice versa via a Test Access Mechanism (TAM). Conventionally, a TAM is implemented using dedicated communication infrastructure. However, also existing functional interconnect, such as a bus or

  9. Bandwidth analysis of functional interconnects used as test access mechanism

    NARCIS (Netherlands)

    Berg, van den Ardy; Ren, P.; Marinissen, Erik Jan; Gaydadjiev, G.N.; Goossens, K.G.W.

    2010-01-01

    Test data travels through a System on Chip (SOC) from the chip pins to the Core-Under-Test (CUT) and vice versa via a Test Access Mechanism (TAM). Conventionally, a TAM is implemented using dedicated communication infrastructure. However, also existing functional interconnect, such as a bus or

  10. Access to Functionalized Steroid Side Chains via Modified Julia Olefination

    Science.gov (United States)

    Izgu, Enver Cagri; Burns, Aaron C.; Hoye, Thomas R.

    2011-01-01

    Various functionalized steroidal side chains were conveniently accessed by a modified Julia olefination strategy using a common sulfone donor and an appropriate α-branched aldehyde acceptor. For the coupling of these hindered classes of reaction partners (and in contrast to typically observed trends), the benzothiazolyl(BT)-sulfone anion gave superior outcomes compared to the phenyltetrazolyl(PT)-sulfone anion. PMID:21244047

  11. Accessing Autonomic Function Can Early Screen Metabolic Syndrome

    Science.gov (United States)

    Dai, Meng; Li, Mian; Yang, Zhi; Xu, Min; Xu, Yu; Lu, Jieli; Chen, Yuhong; Liu, Jianmin; Ning, Guang; Bi, Yufang

    2012-01-01

    Background Clinical diagnosis of the metabolic syndrome is time-consuming and invasive. Convenient instruments that do not require laboratory or physical investigation would be useful in early screening individuals at high risk of metabolic syndrome. Examination of the autonomic function can be taken as a directly reference and screening indicator for predicting metabolic syndrome. Methodology and Principal Findings The EZSCAN test, as an efficient and noninvasive technology, can access autonomic function through measuring electrochemical skin conductance. In this study, we used EZSCAN value to evaluate autonomic function and to detect metabolic syndrome in 5,887 participants aged 40 years or older. The EZSCAN test diagnostic accuracy was analyzed by receiver operating characteristic curves. Among the 5,815 participants in the final analysis, 2,541 were diagnosed as metabolic syndrome and the overall prevalence was 43.7%. Prevalence of the metabolic syndrome increased with the elevated EZSCAN risk level (p for trend metabolic syndrome components (p for trend metabolic syndrome after the multiple adjustments. The area under the curve of the EZSCAN test was 0.62 (95% confidence interval [CI], 0.61–0.64) for predicting metabolic syndrome. The optimal operating point for the EZSCAN value to detect a high risk of prevalent metabolic syndrome was 30 in this study, while the sensitivity and specificity were 71.2% and 46.7%, respectively. Conclusions and Significance In conclusion, although less sensitive and accurate when compared with the clinical definition of metabolic syndrome, we found that the EZSCAN test is a good and simple screening technique for early predicting metabolic syndrome. PMID:22916265

  12. Accessing autonomic function can early screen metabolic syndrome.

    Directory of Open Access Journals (Sweden)

    Kan Sun

    Full Text Available BACKGROUND: Clinical diagnosis of the metabolic syndrome is time-consuming and invasive. Convenient instruments that do not require laboratory or physical investigation would be useful in early screening individuals at high risk of metabolic syndrome. Examination of the autonomic function can be taken as a directly reference and screening indicator for predicting metabolic syndrome. METHODOLOGY AND PRINCIPAL FINDINGS: The EZSCAN test, as an efficient and noninvasive technology, can access autonomic function through measuring electrochemical skin conductance. In this study, we used EZSCAN value to evaluate autonomic function and to detect metabolic syndrome in 5,887 participants aged 40 years or older. The EZSCAN test diagnostic accuracy was analyzed by receiver operating characteristic curves. Among the 5,815 participants in the final analysis, 2,541 were diagnosed as metabolic syndrome and the overall prevalence was 43.7%. Prevalence of the metabolic syndrome increased with the elevated EZSCAN risk level (p for trend <0.0001. Moreover, EZSCAN value was associated with an increase in the number of metabolic syndrome components (p for trend <0.0001. Compared with the no risk group (EZSCAN value 0-24, participants at the high risk group (EZSCAN value: 50-100 had a 2.35 fold increased risk of prevalent metabolic syndrome after the multiple adjustments. The area under the curve of the EZSCAN test was 0.62 (95% confidence interval [CI], 0.61-0.64 for predicting metabolic syndrome. The optimal operating point for the EZSCAN value to detect a high risk of prevalent metabolic syndrome was 30 in this study, while the sensitivity and specificity were 71.2% and 46.7%, respectively. CONCLUSIONS AND SIGNIFICANCE: In conclusion, although less sensitive and accurate when compared with the clinical definition of metabolic syndrome, we found that the EZSCAN test is a good and simple screening technique for early predicting metabolic syndrome.

  13. Accessibility

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2017-01-01

    This contribution is timely as it addresses accessibility in regards system hardware and software aligned with introduction of the Twenty-First Century Communications and Video Accessibility Act (CVAA) and adjoined game industry waiver that comes into force January 2017. This is an act created...... by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...... platforms; and games software. However, the CVAA has no legal status in the EU. This text succinctly introduces and questions implications, impact, and wider adoption. By presenting the full CVAA and game industry waiver the text targets to motivate discussions and further publications on the subject...

  14. Short- and long-term functional effects of percutaneous transluminal angioplasty in hemodialysis vascular access

    NARCIS (Netherlands)

    J. van der Linden (Joke); J.H. Smits (Johannes); J.H. Assink (Jan Hendrik); D.W. Wolterbeek (Derk); J.J. Zijlstra (Jan); G.H.T. de Jong (Gijs); M.A. van den Dorpel (Marinus); P.J. Blankestijn (Peter)

    2002-01-01

    textabstractThe efficacy of percutaneous transluminal angioplasty (PTA) is usually expressed as the angiographic result. Access flow (Qa) measurements offer a means to quantify the functional effects. This study was performed to evaluate the short-term functional and

  15. Unprecedented access to functional biodegradable polymers and coatings

    NARCIS (Netherlands)

    Lee, Jung Seok; Wang, Rong; Chen, Wei; Meng, Fenghua; Cheng, Ru; Deng, Chao; Feijen, Jan; Zhong, Zhiyuan

    2011-01-01

    The ever-growing biomedical technology such as tissue engineering, regenerative medicine, and controlled drug release intimately relies on the development of advanced functional biomaterials. Here, we report on versatile and robust synthesis of novel vinyl sulfone (VS)-functionalized biodegradable

  16. Comparing Accessibility Auditing Methods for Ebooks: Crowdsourced, Functionality-Led Versus Web Content Methodologies.

    Science.gov (United States)

    James, Abi; Draffan, E A; Wald, Mike

    2017-01-01

    This paper presents a gap analysis between crowdsourced functional accessibility evaluations of ebooks conducted by non-experts and the technical accessibility standards employed by developers. It also illustrates how combining these approaches can provide more appropriate information for a wider group of users with print impairments.

  17. Offshoring and access to location-specific advantages - the impact of governance mode and function

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona; Motika, Agnes; Wæhrens, Brian Vejrum

    how access to particular offshoring advantages may provide this link. The results of a quantitative survey of more than 1000 Scandinavian firms show that certain offshoring factors (governance mode and type of offshored function) indeed impact the access a company acquires to certain offshoring...... advantages, which may explain the unpredictability of previous performance outcomes....

  18. Reactivating Neural Circuits with Clinically Accessible Stimulation to Restore Hand Function in Persons with Tetraplegia

    Science.gov (United States)

    2017-09-01

    AWARD NUMBER: W81XWH-16-1-0395 TITLE: Reactivating Neural Circuits with Clinically Accessible Stimulation to Restore Hand Function in...estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data...Clinically Accessible Stimulation to Restore Hand Function in Persons with Tetraplegia 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S

  19. INSTITUTION FOR THE AGED: ASSESSING THE CONDITIONS OF ACCESSIBILITY AND FUNCTIONALITY OF THE ELDERLY.

    Directory of Open Access Journals (Sweden)

    Raphaella Lomanto Santos de Almeida

    2015-04-01

    Full Text Available The study aim was to assess the capacity to undertake the Basic Activities of Daily Living (BADL of elderly residents of an Institution for the Aged (IA and their level of accessibility. This is an observational, descriptive, cross-sectional study. The level of independence for BADL was assessed by the Barthel Index and the degree of accessibility of IA was verified through a check-list, based on the Brazilian Standard (NBR 9050/2004, the Brazilian Association of Technical Standards (ABNT. Of the 62 seniors who participated in the study, 64.5% had some degree of functional dependence. Noteworthy the level of functional dependency for activities undertaken in the bathroom among elderly on wheelchair. The assessed physical structure does not fully follow the technical standards established by NBR 9050, with differences mainly in the parameters of bedrooms, bathrooms and stairs. Although much of the institutionalized elderly presenting advanced and most functional vulnerability ages, level of IA architectural accessibility is still insufficient. Rooms and bathrooms are the places with the highest deficit of accessibility and also higher prevalence of falls among the elderly residents. A good level of accessibility in IA, can be an important factor in improving the level of independence for everyday activities and to prevent the risk of falls.

  20. The RNA Exosome Channeling and Direct Access Conformations Have Distinct In Vivo Functions

    Directory of Open Access Journals (Sweden)

    Jaeil Han

    2016-09-01

    Full Text Available The RNA exosome is a 3′–5′ ribonuclease complex that is composed of nine core subunits and an essential catalytic subunit, Rrp44. Two distinct conformations of Rrp44 were revealed in previous structural studies, suggesting that Rrp44 may change its conformation to exert its function. In the channeling conformation, (Rrp44ch, RNA accesses the active site after traversing the central channel of the RNA exosome, whereas in the other conformation, (Rrp44da, RNA gains direct access to the active site. Here, we show that the Rrp44da exosome is important for nuclear function of the RNA exosome. Defects caused by disrupting the direct access conformation are distinct from those caused by channel-occluding mutations, indicating specific functions for each conformation. Our genetic analyses provide in vivo evidence that the RNA exosome employs a direct-access route to recruit specific substrates, indicating that the RNA exosome uses alternative conformations to act on different RNA substrates.

  1. Poly-functional porous-organic polymers to access functionality – CO 2 sorption energetic relationships

    KAUST Repository

    Alkordi, Mohamed H.; Haikal, Rana R.; Hassan, Youssef S.; Emwas, Abdul-Hamid M.; Belmabkhout, Youssef

    2015-01-01

    Herein, we report a facile approach towards the construction of poly-functional porous organic polymers (POPs). The functional groups employed were selected to span the range of Lewis-base to neutral to Lewis-acid character. Our results underline the effect of chemical functionality on the observed Q for CO adsorption inside the material, being largest for functional groups with electron donating O- and N-centered Lewis base sites. Our systematic investigation within a family of POPs revealed a wide range for CO heat of adsorption (23.8-53.8 kJ mol) that is clearly associated with the chemical nature of the functional groups present. In addition, post-synthetic modification of POPs reported herein demonstrated a facile pathway to dramatically enhance carbon dioxide uptake energetics.

  2. Poly-functional porous-organic polymers to access functionality – CO 2 sorption energetic relationships

    KAUST Repository

    Alkordi, Mohamed H.

    2015-09-21

    Herein, we report a facile approach towards the construction of poly-functional porous organic polymers (POPs). The functional groups employed were selected to span the range of Lewis-base to neutral to Lewis-acid character. Our results underline the effect of chemical functionality on the observed Q for CO adsorption inside the material, being largest for functional groups with electron donating O- and N-centered Lewis base sites. Our systematic investigation within a family of POPs revealed a wide range for CO heat of adsorption (23.8-53.8 kJ mol) that is clearly associated with the chemical nature of the functional groups present. In addition, post-synthetic modification of POPs reported herein demonstrated a facile pathway to dramatically enhance carbon dioxide uptake energetics.

  3. 1001 Proteomes: a functional proteomics portal for the analysis of Arabidopsis thaliana accessions.

    Science.gov (United States)

    Joshi, Hiren J; Christiansen, Katy M; Fitz, Joffrey; Cao, Jun; Lipzen, Anna; Martin, Joel; Smith-Moritz, A Michelle; Pennacchio, Len A; Schackwitz, Wendy S; Weigel, Detlef; Heazlewood, Joshua L

    2012-05-15

    The sequencing of over a thousand natural strains of the model plant Arabidopsis thaliana is producing unparalleled information at the genetic level for plant researchers. To enable the rapid exploitation of these data for functional proteomics studies, we have created a resource for the visualization of protein information and proteomic datasets for sequenced natural strains of A. thaliana. The 1001 Proteomes portal can be used to visualize amino acid substitutions or non-synonymous single-nucleotide polymorphisms in individual proteins of A. thaliana based on the reference genome Col-0. We have used the available processed sequence information to analyze the conservation of known residues subject to protein phosphorylation among these natural strains. The substitution of amino acids in A. thaliana natural strains is heavily constrained and is likely a result of the conservation of functional attributes within proteins. At a practical level, we demonstrate that this information can be used to clarify ambiguously defined phosphorylation sites from phosphoproteomic studies. Protein sets of available natural variants are available for download to enable proteomic studies on these accessions. Together this information can be used to uncover the possible roles of specific amino acids in determining the structure and function of proteins in the model plant A. thaliana. An online portal to enable the community to exploit these data can be accessed at http://1001proteomes.masc-proteomics.org/

  4. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  5. Overall Accessibility to Traveling by Rail for the Elderly with and without Functional Limitations: The Whole-Trip Perspective

    Directory of Open Access Journals (Sweden)

    Catherine Sundling

    2014-12-01

    Full Text Available Elderly persons’ perceived accessibility to railway traveling depends on their functional limitations/diseases, their functional abilities and their travel behaviors in interaction with the barriers encountered during whole trips. A survey was conducted on a random sample of 1000 city residents (65–85 years old; 57% response rate. The travels were perceived least accessible by respondents with severely reduced functional ability and by those with more than one functional limitation/disease (e.g., restricted mobility and chronic pain. Those who traveled “often”, perceived the accessibility to be better than those who traveled less frequently. For travelers with high functional ability, the main barriers to more frequent traveling were travel costs and low punctuality. For those with low functional ability, one’s own health was reported to be the main barrier. Our results clarify the links among existing functional limitations/functional abilities, the barriers encountered, the travel behavior, and the overall accessibility to traveling. By operationalizing the whole-trip concept as a chain of events, we deliver practical knowledge on vulnerable groups for decision-making to improve the transport environment for all.

  6. Overall accessibility to traveling by rail for the elderly with and without functional limitations: the whole-trip perspective.

    Science.gov (United States)

    Sundling, Catherine; Berglund, Birgitta; Nilsson, Mats E; Emardson, Ragne; Pendrill, Leslie R

    2014-12-01

    Elderly persons' perceived accessibility to railway traveling depends on their functional limitations/diseases, their functional abilities and their travel behaviors in interaction with the barriers encountered during whole trips. A survey was conducted on a random sample of 1000 city residents (65-85 years old; 57% response rate). The travels were perceived least accessible by respondents with severely reduced functional ability and by those with more than one functional limitation/disease (e.g., restricted mobility and chronic pain). Those who traveled "often", perceived the accessibility to be better than those who traveled less frequently. For travelers with high functional ability, the main barriers to more frequent traveling were travel costs and low punctuality. For those with low functional ability, one's own health was reported to be the main barrier. Our results clarify the links among existing functional limitations/functional abilities, the barriers encountered, the travel behavior, and the overall accessibility to traveling. By operationalizing the whole-trip concept as a chain of events, we deliver practical knowledge on vulnerable groups for decision-making to improve the transport environment for all.

  7. Photosystem II function and dynamics in three widely used Arabidopsis thaliana accessions.

    Directory of Open Access Journals (Sweden)

    Lan Yin

    Full Text Available Columbia-0 (Col-0, Wassilewskija-4 (Ws-4, and Landsberg erecta-0 (Ler-0 are used as background lines for many public Arabidopsis mutant collections, and for investigation in laboratory conditions of plant processes, including photosynthesis and response to high-intensity light (HL. The photosystem II (PSII complex is sensitive to HL and requires repair to sustain its function. PSII repair is a multistep process controlled by numerous factors, including protein phosphorylation and thylakoid membrane stacking. Here we have characterized the function and dynamics of PSII complex under growth-light and HL conditions. Ws-4 displayed 30% more thylakoid lipids per chlorophyll and 40% less chlorophyll per carotenoid than Col-0 and Ler-0. There were no large differences in thylakoid stacking, photoprotection and relative levels of photosynthetic complexes among the three accessions. An increased efficiency of PSII closure was found in Ws-4 following illumination with saturation flashes or continuous light. Phosphorylation of the PSII D1/D2 proteins was reduced by 50% in Ws-4 as compared to Col-0 and Ler-0. An increase in abundance of the responsible STN8 kinase in response to HL treatment was found in all three accessions, but Ws-4 displayed 50% lower levels than Col-0 and Ler-0. Despite this, the HL treatment caused in Ws-4 the lagest extent of PSII inactivation, disassembly, D1 protein degradation, and the largest decrease in the size of stacked thylakoids. The dilution of chlorophyll-protein complexes with additional lipids and carotenoids in Ws-4 may represent a mechanism to facilitate lateral protein traffic in the membrane, thus compensating for the lack of a full complement of STN8 kinase. Nevertheless, additional PSII damage occurs in Ws-4, which exceeds the D1 protein synthesis capacity, thus leading to enhanced photoinhibition. Our findings are valuable for selection of appropriate background line for PSII characterization in Arabidopsis

  8. Pitfall of the Strongest Cells in Static Random Access Memory Physical Unclonable Functions

    Directory of Open Access Journals (Sweden)

    Mingyang Gong

    2018-06-01

    Full Text Available Static Random Access Memory (SRAM Physical Unclonable Functions (PUFs are some of the most popular PUFs that provide a highly-secured solution for secret key storage. Given that PUF responses are noisy, the key reconstruction must use error correcting code (ECC to reduce the noise. Repetition code is widely used in resource constrained systems as it is concise and lightweight, however, research has shown that repetition codes can lead to information leakage. In this paper we found that the strongest cell distribution in a SRAM array may leak information of the responses of SRAM PUF when the repetition code is directly applied. Experimentally, on an ASIC platform with the HHGRACE 0.13 μm process, we recovered 8.3% of the measured response using the strongest cells revealed by the helper data, and we finally obtained a clone response 79% similar to weak response using the public helper data. We therefore propose Error Resistant Fuzzy Extractor (ERFE, a 4-bit error tolerant fuzzy extractor, that extracts the value of the sum of the responses as a unique key and reduces the failure rate to 1.8 × 10−8 with 256 bit entropy.

  9. The Association of Long-Functioning Hemodialysis Vascular Access with Prevalence of Left Ventricular Hypertrophy in Kidney Transplant Recipients

    Directory of Open Access Journals (Sweden)

    Aureliusz Kolonko

    2014-01-01

    Full Text Available Left ventricular hypertrophy (LVH is frequently observed in chronic dialysis patients and is also highly prevalent in kidney transplant recipients. This study evaluates the impact of long-functioning hemodialysis vascular access on LVH in single center cohort of kidney transplant recipients. 162 patients at 8.7 ± 1.8 years after kidney transplantation were enrolled. Echocardiography, carotid ultrasound, and assessment of pulse wave velocity were performed. LVH was defined based on left ventricular mass (LVM indexed for body surface area (BSA and height2.7. There were 67 patients with and 95 without patent vascular access. Both study groups were comparable with respect to gender, age, duration of dialysis therapy, and time after transplantation, kidney graft function, and cardiovascular comorbidities. Patients with patent vascular access were characterized by significantly elevated LVM and significantly greater percentage of LVH, based on LVMI/BSA (66.7 versus 48.4%, P=0.02. OR for LVH in patients with patent vascular access was 2.39 (1.19–4.76, P=0.01. Regression analyses confirmed an independent contribution of patent vascular access to higher LVM and increased prevalence of LVH. We concluded that long-lasting patent hemodialysis vascular access after kidney transplantation is associated with the increased prevalence of LVH in kidney transplant recipients.

  10. Genome-scale characterization of RNA tertiary structures and their functional impact by RNA solvent accessibility prediction.

    Science.gov (United States)

    Yang, Yuedong; Li, Xiaomei; Zhao, Huiying; Zhan, Jian; Wang, Jihua; Zhou, Yaoqi

    2017-01-01

    As most RNA structures are elusive to structure determination, obtaining solvent accessible surface areas (ASAs) of nucleotides in an RNA structure is an important first step to characterize potential functional sites and core structural regions. Here, we developed RNAsnap, the first machine-learning method trained on protein-bound RNA structures for solvent accessibility prediction. Built on sequence profiles from multiple sequence alignment (RNAsnap-prof), the method provided robust prediction in fivefold cross-validation and an independent test (Pearson correlation coefficients, r, between predicted and actual ASA values are 0.66 and 0.63, respectively). Application of the method to 6178 mRNAs revealed its positive correlation to mRNA accessibility by dimethyl sulphate (DMS) experimentally measured in vivo (r = 0.37) but not in vitro (r = 0.07), despite the lack of training on mRNAs and the fact that DMS accessibility is only an approximation to solvent accessibility. We further found strong association across coding and noncoding regions between predicted solvent accessibility of the mutation site of a single nucleotide variant (SNV) and the frequency of that variant in the population for 2.2 million SNVs obtained in the 1000 Genomes Project. Moreover, mapping solvent accessibility of RNAs to the human genome indicated that introns, 5' cap of 5' and 3' cap of 3' untranslated regions, are more solvent accessible, consistent with their respective functional roles. These results support conformational selections as the mechanism for the formation of RNA-protein complexes and highlight the utility of genome-scale characterization of RNA tertiary structures by RNAsnap. The server and its stand-alone downloadable version are available at http://sparks-lab.org. © 2016 Yang et al.; Published by Cold Spring Harbor Laboratory Press for the RNA Society.

  11. Courthouses as Spaces of Recognition, Functionality and Access to Law and Justice: A Portuguese Reflection

    Directory of Open Access Journals (Sweden)

    Patrìcia Branco

    2016-09-01

    Full Text Available One of the most overlooked topics at the level of reflection regarding law and the legal system, has been the courthouse architecture. Architecture organizes and structures space, making it intelligible, understandable, and capable of being interpreted as possible, being that the exterior and interior, as well as materials and objects present therein can facilitate or inhibit our activities through how they mean and represent certain messages. Hence it becomes necessary to make an analysis of the spaces of justice - and here I have in mind the Courthouse as a privileged public space of justice – taking into consideration the circumstances of time, place of jurisdiction, the historical, political, regulatory, and socio-cultural contexts, as well as legal tradition. Thus, and by analyzing the trends (international and national of development of construction and / or adaptation (types of buildings and internal organization, focusing on different infrastructures and accessibility and respective use, including, here, the representations and spatial practices of the real actors (professionals and users, I propose to consider the importance of regarding courthouses as spaces of justice, through the lenses given by the functions of recognition, functionality and access to law and justice. Uno de los temas sobre los que menos se ha reflexionado en el ámbito del derecho y el sistema legal ha sido la arquitectura de los juzgados. La arquitectura organiza y estructura el espacio, haciéndolo inteligible, comprensible y capaz de interpretarlo como algo posible, ya que el exterior y el interior, así como los materiales y objetos presentes, pueden facilitar o inhibir nuestras actividades mediante la forma en que emiten y representan ciertos mensajes. Por lo tanto, es necesario realizar un análisis de los espacios de la Justicia - y aquí se entiende el juzgado como un espacio público privilegiado de la Justicia - teniendo en cuenta las circunstancias de

  12. Report: Improvements Needed in CSB’s Identity and Access Management and Incident Response Security Functions

    Science.gov (United States)

    Report #18-P-0030, October 30, 2017. Weaknesses in the Identity and Access Management and Incident Response metric domains leave the CSB vulnerable to attacks occurring and not being detected in a timely manner.

  13. Enhancing Access to and Quality of Basic Education through Head Teachers' Leadership Functions

    Science.gov (United States)

    Oni, J. O.; Jegede, A. A.; Osisami, R. A.; Illo, C. O.; Lawal, R. O.; Fabinu, F. A.

    2016-01-01

    Basic education is the fundamental requirement for idiosyncratic and societal development. The individual child needs to have access to it and acquire it qualitatively. The sum total of all the knowledge attitude, skills and competences that the Nigerian child today acquires have been declared to be on the decline. Every stakeholder: teacher,…

  14. A novel consortium of Lactobacillus rhamnosus and Streptococcus thermophilus for increased access to functional fermented foods

    NARCIS (Netherlands)

    Kort, R.; Westerik, N.; Mariela Serrano, L.; Douillard, F.P.; Gottstein, W.; Mukisa, I.M.; Tuijn, C.J.; Basten, L.; Hafkamp, B.; Meijer, W.C.; Teusink, B.; Vos, W.M.; Reid, G.; Sybesma, W.

    2015-01-01

    Background: The lactic acid bacterium Lactobacillus rhamnosus GG is the most studied probiotic bacterium with proven health benefits upon oral intake, including the alleviation of diarrhea. The mission of the Yoba for Life foundation is to provide impoverished communities in Africa increased access

  15. ADNP-CSMA Random Multiple Access protocol application with the function of monitoring in Ad Hoc network

    Directory of Open Access Journals (Sweden)

    Zhan Gang

    2016-01-01

    Full Text Available In Ad Hoc networks,the net work of mobile nodes exchange information with their wireless transceiver equipment,the network throughput is in increased,compared to other such multiple hops network.Moreover along with the rapid development of modern information,communication business also will be increase.However,the access and adaptive of previous CSMA protocol are insufficient.According to these properties,this paper presents a kind of adaptive dual clock with monitoring function P-CSMA random multiple access protocol(ADNP-CSMA,and discusses two kinds of P-CSMA.ACK with monitoring function is introduced to maintain the stability of the whole system,and the introduction of dual clock mechanism reduces the channel of idle period.It calculate the system throughput expression through the method of average period,and the simulation results show that the system is constant in the case of high load throughput.

  16. Using speech recognition to enhance the Tongue Drive System functionality in computer access.

    Science.gov (United States)

    Huo, Xueliang; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless tongue operated assistive technology (AT), which can enable people with severe physical disabilities to access computers and drive powered wheelchairs using their volitional tongue movements. TDS offers six discrete commands, simultaneously available to the users, for pointing and typing as a substitute for mouse and keyboard in computer access, respectively. To enhance the TDS performance in typing, we have added a microphone, an audio codec, and a wireless audio link to its readily available 3-axial magnetic sensor array, and combined it with a commercially available speech recognition software, the Dragon Naturally Speaking, which is regarded as one of the most efficient ways for text entry. Our preliminary evaluations indicate that the combined TDS and speech recognition technologies can provide end users with significantly higher performance than using each technology alone, particularly in completing tasks that require both pointing and text entry, such as web surfing.

  17. The dynamic mechanism of presenilin-function: Sensitive gate dynamics and loop unplugging control protein access

    DEFF Research Database (Denmark)

    Somavarapu, Arun Kumar; Kepp, Kasper Planeta

    2016-01-01

    There is no molecular explanation for the many presenilin 1 (PSEN1) mutations causing Alzheimer's disease, but both gain of function relating to amyloid production and loss of isolated PSEN1 function have been implied. We report here the first detailed dynamic all-atom model of mature PSEN1 from ...

  18. Mitsunobu mischief: Neighbor-directed histidine N(π)–alkylation provides access to peptides containing selectively functionalized imidazolium heterocycles

    Science.gov (United States)

    Qian, Wen-Jian

    2015-01-01

    There are few methodologies that yield peptides containing His residues with selective N(π), N(π)-bis-alkylated imidazole rings. We have found that, under certain conditions, on-resin Mitsunobu coupling of alcohols with peptides having a N(π)-alkylated His residue results in selective and high-yield alkylation of the imidazole N(π) nitrogen. The reaction requires the presence of a proximal phosphoric, carboxylic or sulfonic acid, and proceeds through an apparent intramolecular mechanism involving Mitsunobu intermediates. These transformations have particular application to phosphopeptides, where “charge masking” of one phosphoryl anionic charge by the cationic histidine imidazolium ion is now possible. This chemistry opens selective access to peptides containing differentially functionalized imidazolium heterocycles, which provide access to new classes of peptides and peptide mimetics. PMID:25739367

  19. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  20. Cognitive function and the agreement between self-reported and accelerometer-accessed physical activity.

    Science.gov (United States)

    Herbolsheimer, Florian; Riepe, Matthias W; Peter, Richard

    2018-02-21

    Numerous studies have reported weak or moderate correlations between self-reported and accelerometer-assessed physical activity. One explanation is that self-reported physical activity might be biased by demographic, cognitive or other factors. Cognitive function is one factor that could be associated with either overreporting or underreporting of daily physical activity. Difficulties in remembering past physical activities might result in recall bias. Thus, the current study examines whether the cognitive function is associated with differences between self-reported and accelerometer-assessed physical activity. Cross-sectional data from the population-based Activity and Function in the Elderly in Ulm study (ActiFE) were used. A total of 1172 community-dwelling older adults (aged 65-90 years) wore a uniaxial accelerometer (activPAL unit) for a week. Additionally, self-reported physical activity was assessed using the LASA Physical Activity Questionnaire (LAPAQ). Cognitive function was measured with four items (immediate memory, delayed memory, recognition memory, and semantic fluency) from the Consortium to Establish a Registry for Alzheimer's Disease Total Score (CERAD-TS). Mean differences of self-reported and accelerometer-assessed physical activity (MPA) were associated with cognitive function in men (r s  = -.12, p = .002) but not in women. Sex-stratified multiple linear regression analyses showed that MPA declined with high cognitive function in men (β = -.13; p = .015). Results suggest that self-reported physical activity should be interpreted with caution in older populations, as cognitive function was one factor that explained the differences between objective and subjective physical activity measurements.

  1. Recursive algorithm for arrays of generalized Bessel functions: Numerical access to Dirac-Volkov solutions.

    Science.gov (United States)

    Lötstedt, Erik; Jentschura, Ulrich D

    2009-02-01

    In the relativistic and the nonrelativistic theoretical treatment of moderate and high-power laser-matter interaction, the generalized Bessel function occurs naturally when a Schrödinger-Volkov and Dirac-Volkov solution is expanded into plane waves. For the evaluation of cross sections of quantum electrodynamic processes in a linearly polarized laser field, it is often necessary to evaluate large arrays of generalized Bessel functions, of arbitrary index but with fixed arguments. We show that the generalized Bessel function can be evaluated, in a numerically stable way, by utilizing a recurrence relation and a normalization condition only, without having to compute any initial value. We demonstrate the utility of the method by illustrating the quantum-classical correspondence of the Dirac-Volkov solutions via numerical calculations.

  2. Musculoskeletal Geometry, Muscle Architecture and Functional Specialisations of the Mouse Hindlimb (Open Access)

    Science.gov (United States)

    2016-04-26

    example, studies in cats [18], guinea pigs [16] and rabbits [19] have shown that the hamstring muscles, a bi-articular group of muscles which act around...energy in compliant tendons [20, 21], whereas others, such as the hamstrings (hip extensors and knee flexors), function to produce fast contractions

  3. Regioselective Wacker Oxidation of Internal Alkenes: Rapid Access to Functionalized Ketones Facilitated by Cross-Metathesis

    KAUST Repository

    Morandi, Bill

    2013-07-26

    Wacka wacka: The title reaction makes use of a wide range of directing groups (DG) to enable the highly regioselective oxidation of alkenes, and occurs predictably at the distal position. Both E and Z alkenes afford valuable functionalized ketones and cross-metathesis was shown to facilitate the preparation of the starting materials. BQ=benzoquinone.

  4. Embedding multiple self-organisation functionalities in future radio access networks

    NARCIS (Netherlands)

    Jansen, T.; Amirijoo, M.; Türke, U.; Jorguseski, L.; Zetterberg, K.; Nascimento, J.R.V. do; Schmelz, L.C.; Turk, J.; Balan, I.

    2009-01-01

    Wireless network operators today allocate considerable manual effort in managing their networks. A viable solution for lowering the manual effort is to introduce self-organisation functionalities. In this paper we discuss the challenges that are encountered when embedding multiple self-organisation

  5. Regioselective Wacker Oxidation of Internal Alkenes: Rapid Access to Functionalized Ketones Facilitated by Cross-Metathesis

    KAUST Repository

    Morandi, Bill; Wickens, Zachary K.; Grubbs, Robert H.

    2013-01-01

    Wacka wacka: The title reaction makes use of a wide range of directing groups (DG) to enable the highly regioselective oxidation of alkenes, and occurs predictably at the distal position. Both E and Z alkenes afford valuable functionalized ketones and cross-metathesis was shown to facilitate the preparation of the starting materials. BQ=benzoquinone.

  6. How modification of accessible lysines to phenylalanine modulates the structural and functional properties of horseradish peroxidase: a simulation study.

    Directory of Open Access Journals (Sweden)

    Leila Navapour

    Full Text Available Horseradish Peroxidase (HRP is one of the most studied peroxidases and a great number of chemical modifications and genetic manipulations have been carried out on its surface accessible residues to improve its stability and catalytic efficiency necessary for biotechnological applications. Most of the stabilized derivatives of HRP reported to date have involved chemical or genetic modifications of three surface-exposed lysines (K174, K232 and K241. In this computational study, we altered these lysines to phenylalanine residues to model those chemical modifications or genetic manipulations in which these positively charged lysines are converted to aromatic hydrophobic residues. Simulation results implied that upon these substitutions, the protein structure becomes less flexible. Stability gains are likely to be achieved due to the increased number of stable hydrogen bonds, improved heme-protein interactions and more integrated proximal Ca2+ binding pocket. We also found a new persistent hydrogen bond between the protein moiety (F174 and the heme prosthetic group as well as two stitching hydrogen bonds between the connecting loops GH and F'F″ in mutated HRP. However, detailed analysis of functionally related structural properties and dynamical features suggests reduced reactivity of the enzyme toward its substrates. Molecular dynamics simulations showed that substitutions narrow the bottle neck entry of peroxide substrate access channel and reduce the surface accessibility of the distal histidine (H42 and heme prosthetic group to the peroxide and aromatic substrates, respectively. Results also demonstrated that the area and volume of the aromatic-substrate binding pocket are significantly decreased upon modifications. Moreover, the hydrophobic patch functioning as a binding site or trap for reducing aromatic substrates is shrunk in mutated enzyme. Together, the results of this simulation study could provide possible structural clues to explain

  7. A novel consortium of Lactobacillus rhamnosus and Streptococcus thermophilus for increased access to functional fermented foods.

    Science.gov (United States)

    Kort, Remco; Westerik, Nieke; Mariela Serrano, L; Douillard, François P; Gottstein, Willi; Mukisa, Ivan M; Tuijn, Coosje J; Basten, Lisa; Hafkamp, Bert; Meijer, Wilco C; Teusink, Bas; de Vos, Willem M; Reid, Gregor; Sybesma, Wilbert

    2015-12-08

    The lactic acid bacterium Lactobacillus rhamnosus GG is the most studied probiotic bacterium with proven health benefits upon oral intake, including the alleviation of diarrhea. The mission of the Yoba for Life foundation is to provide impoverished communities in Africa increased access to Lactobacillus rhamnosus GG under the name Lactobacillus rhamnosus yoba 2012, world's first generic probiotic strain. We have been able to overcome the strain's limitations to grow in food matrices like milk, by formulating a dried starter consortium with Streptococcus thermophilus that enables the propagation of both strains in milk and other food matrices. The affordable seed culture is used by people in resource-poor communities. We used S. thermophilus C106 as an adjuvant culture for the propagation of L. rhamnosus yoba 2012 in a variety of fermented foods up to concentrations, because of its endogenous proteolytic activity, ability to degrade lactose and other synergistic effects. Subsequently, L. rhamnosus could reach final titers of 1E+09 CFU ml(-1), which is sufficient to comply with the recommended daily dose for probiotics. The specific metabolic interactions between the two strains were derived from the full genome sequences of L. rhamnosus GG and S. thermophilus C106. The piliation of the L. rhamnosus yoba 2012, required for epithelial adhesion and inflammatory signaling in the human host, was stable during growth in milk for two rounds of fermentation. Sachets prepared with the two strains, yoba 2012 and C106, retained viability for at least 2 years. A stable dried seed culture has been developed which facilitates local and low-cost production of a wide range of fermented foods that subsequently act as delivery vehicles for beneficial bacteria to communities in east Africa.

  8. Colour Doppler ultrasound assessment of well-functioning mature arteriovenous fistulas for haemodialysis access

    International Nuclear Information System (INIS)

    Pietura, Radoslaw; Janczarek, Marzena; Zaluska, Wojciech; Szymanska, Anna; Janicka, Lucyna; Skublewska-Bednarek, Anna; Szczerbo-Trojanowska, Malgorzata

    2005-01-01

    Background: A well-functioning mature arteriovenous fistula is essential for the maintenance of haemodialysis in patients with chronic renal failure. The Brescia-Cimino arteriovenous fistula has the best survival characteristics and low rate of complications. The most common reason of fistula failure is thrombosis caused by stenosis. Colour Doppler ultrasonography has proven to be effective in the assessment of anatomical vascular features. The majority of studies were done in patients with clinically presumed arteriovenous fistula complications. However, only limited data are available about the well-functioning mature arteriovenous fistulas. The purpose of the present study was to evaluate completely asymptomatic, mature arteriovenous fistulas with colour Doppler ultrasound. Materials and methods: From July 2001 to April 2003, we examined 139 patients with the end-stage renal disease. They were in the range of 19-79 years of age (mean, 46.7 years). The study included only the patients who met the following criteria: (1) no difficulties with haemodialysis (as reported by nurses); (2) normal venous diastolic blood pressure (<150 mmHg) at monthly evaluation; (3) normal urea clearance x time/urea volume of distribution; (4) blood cells count, plasma electrolytes, and liver function at monthly evaluation. The mean fistula age was 26 months (S.D. = 21.9). The mean time of dialysis therapy was 49 months. Thirty-eight percent patients had primary fistulas, 23%-secondary, 11%-third and 11%-fourth, 4%-fifth, 5%-sixth, and 8% patients had more than sixth. Results: There was no correlation between: (1) patient's age and fistula age; (2) patient's age and number of fistulas in one patient; (3) fistula age and number of fistulas in one patient; (4) localization of fistula and fistula age. There was a strong correlation between dialysis therapy period and number of fistulas in one patient. The mean flow volume was 1204.1 ml/min (S.D. = 554). It was significantly higher in the

  9. PROMISING ACCESSIONS OF CHAENOMELES AND THEIR USE IN THE FUNCTIONAL FOOD

    Directory of Open Access Journals (Sweden)

    V. N. Sorokopudov

    2017-01-01

    Full Text Available A complex analysis is crucial for obtaining new resistant varieties and developing recommendations for the use of the fruit of Chaenomeles. The task of this study was to assess the productivity and quality of the fruit of the selected forms of Chaenomeles in Central Russia, with the determination of the possibility of a no-waste technology for fruit processing, and the appropriateness of using functional food in the composition of products. The studies were conducted in 2012-2016. In the Botanical Gardens of the National Research University "BelGU" (Belgorod, in the FGBNU VSTISP and GBS N.V. Tsitsina. As materials for the study, 6 selective forms of Chaenomeles, obtained from free pollination of the ‘Calif’ variety, used as a control, were used. The study was carried out according to the generally accepted methodology of varietal studies, along with using the authors' methodical development. A sufficiently high nutritional and biological value of the chelating of the Chaenomeles fruit has been observed. At the same time, the minerals, carbohydrates and vitamins from entire fruits exceed the content of ones squeezed from the pulp. The obtained results of the studies allow us to conclude that it is advisable to organize a non-waste technology for the processing of fruit of Chaenomeles, which can serve as one of the components for the enrichment of food products. Thus, a comprehensive assessment of the biological properties and productivity of breeding forms of Chaenomeles has been made showing that they exceeded the parent variety in stability are regarded as promising intense-vitamin fruit culture, that can be used for various processing methods, as part of functional and therapeutic product-prophylactic nutrition, especially in obtaining natural low-calorie foods.

  10. An open-access microfluidic model for lung-specific functional studies at an air-liquid interface.

    Science.gov (United States)

    Nalayanda, Divya D; Puleo, Christopher; Fulton, William B; Sharpe, Leilani M; Wang, Tza-Huei; Abdullah, Fizan

    2009-10-01

    In an effort to improve the physiologic relevance of existing in vitro models for alveolar cells, we present a microfluidic platform which provides an air-interface in a dynamic system combining microfluidic and suspended membrane culture systems. Such a system provides the ability to manipulate multiple parameters on a single platform along with ease in cell seeding and manipulation. The current study presents a comparison of the efficacy of the hybrid system with conventional platforms using assays analyzing the maintenance of function and integrity of A549 alveolar epithelial cell monolayer cultures. The hybrid system incorporates bio-mimetic nourishment on the basal side of the epithelial cells along with an open system on the apical side of the cells exposed to air allowing for easy access for assays.

  11. λ5-Phosphorus-Containing α-Diazo Compounds: A Valuable Tool for Accessing Phosphorus-Functionalized Molecules.

    Science.gov (United States)

    Marinozzi, Maura; Pertusati, Fabrizio; Serpi, Michaela

    2016-11-23

    The compounds characterized by the presence of a λ 5 -phosphorus functionality at the α-position with respect to the diazo moiety, here referred to as λ 5 -phosphorus-containing α-diazo compounds (PCDCs), represent a vast class of extremely versatile reagents in organic chemistry and are particularly useful in the preparation of phosphonate- and phosphinoxide-functionalized molecules. Indeed, thanks to the high reactivity of the diazo moiety, PCDCs can be induced to undergo a wide variety of chemical transformations. Among them are carbon-hydrogen, as well as heteroatom-hydrogen insertion reactions, cyclopropanation, ylide formation, Wolff rearrangement, and cycloaddition reactions. PCDCs can be easily prepared from readily accessible precursors by a variety of different methods, such as diazotization, Bamford-Stevens-type elimination, and diazo transfer reactions. This evidence along with their relative stability and manageability make them appealing tools in organic synthesis. This Review aims to demonstrate the ongoing utility of PCDCs in the modern preparation of different classes of phosphorus-containing compounds, phosphonates, in particular. Furthermore, to address the lack of precedent collective papers, this Review also summarizes the methods for PCDCs preparation.

  12. Seeing with the nano-eye: accessing structure, function, and dynamics of matter on its natural length and time scales

    Science.gov (United States)

    Raschke, Markus

    2015-03-01

    To understand and ultimately control the properties of most functional materials, from molecular soft-matter to quantum materials, requires access to the structure, coupling, and dynamics on the elementary time and length scales that define the microscopic interactions in these materials. To gain the desired nanometer spatial resolution with simultaneous spectroscopic specificity we combine scanning probe microscopy with different optical, including coherent, nonlinear, and ultrafast spectroscopies. The underlying near-field interaction mediated by the atomic-force or scanning tunneling microscope tip provides the desired deep-sub wavelength nano-focusing enabling few-nm spatial resolution. I will introduce our generalization of the approach in terms of the near-field impedance matching to a quantum system based on special optical antenna-tip designs. The resulting enhanced and qualitatively new forms of light-matter interaction enable measurements of quantum dynamics in an interacting environment or to image the electromagnetic local density of states of thermal radiation. Other applications include the inter-molecular coupling and dynamics in soft-matter hetero-structures, surface plasmon interferometry as a probe of electronic structure and dynamics in graphene, and quantum phase transitions in correlated electron materials. These examples highlight the general applicability of the new near-field microscopy approach, complementing emergent X-ray and electron imaging tools, aiming towards the ultimate goal of probing matter on its most elementary spatio-temporal level.

  13. Direct Functionalization of an Acid-Terminated Nanodiamond with Azide: Enabling Access to 4-Substituted-1,2,3-Triazole-Functionalized Particles

    International Nuclear Information System (INIS)

    Kennedy, Zachary C.; Barrett, Christopher A.; Warner, Marvin G.

    2017-01-01

    Azides on the periphery of nanodiamond materials (ND) are of great utility because they have been shown to undergo Cu-catalyzed and Cu-free cycloaddition reactions with structurally diverse alkynes, affording particles tailored for applications in biology and materials science. However, current methods employed to access ND featuring azide groups typically require either harsh pretreatment procedures or multiple synthesis steps and use surface linking groups that may be susceptible to undesirable cleavage. Here in this paper we demonstrate an alternative single-step approach to producing linker-free, azide-functionalized ND. Our method was applied to low-cost, detonation-derived ND powders where surface carbonyl groups undergo silver-mediated decarboxylation and radical substitution with azide. ND with directly grafted azide groups were then treated with a variety of aliphatic, aromatic, and fluorescent alkynes to afford 1-(ND)-4-substituted-1,2,3-triazole materials under standard copper-catalyzed cycloaddition conditions. Surface modification steps were verified by characteristic infrared absorptions and elemental analyses. High loadings of triazole surface groups (up to 0.85 mmol g –1 ) were obtained as determined from thermogravimetric analysis. The azidation procedure disclosed is envisioned to become a valuable initial transformation in numerous future applications of ND.

  14. Direct Functionalization of an Acid-Terminated Nanodiamond with Azide: Enabling Access to 4-Substituted-1,2,3-Triazole-Functionalized Particles.

    Science.gov (United States)

    Kennedy, Zachary C; Barrett, Christopher A; Warner, Marvin G

    2017-03-21

    Azides on the periphery of nanodiamond materials (ND) are of great utility because they have been shown to undergo Cu-catalyzed and Cu-free cycloaddition reactions with structurally diverse alkynes, affording particles tailored for applications in biology and materials science. However, current methods employed to access ND featuring azide groups typically require either harsh pretreatment procedures or multiple synthesis steps and use surface linking groups that may be susceptible to undesirable cleavage. Here we demonstrate an alternative single-step approach to producing linker-free, azide-functionalized ND. Our method was applied to low-cost, detonation-derived ND powders where surface carbonyl groups undergo silver-mediated decarboxylation and radical substitution with azide. ND with directly grafted azide groups were then treated with a variety of aliphatic, aromatic, and fluorescent alkynes to afford 1-(ND)-4-substituted-1,2,3-triazole materials under standard copper-catalyzed cycloaddition conditions. Surface modification steps were verified by characteristic infrared absorptions and elemental analyses. High loadings of triazole surface groups (up to 0.85 mmol g -1 ) were obtained as determined from thermogravimetric analysis. The azidation procedure disclosed is envisioned to become a valuable initial transformation in numerous future applications of ND.

  15. Typology of person-environment fit constellations: a platform addressing accessibility problems in the built environment for people with functional limitations.

    Science.gov (United States)

    Slaug, Björn; Schilling, Oliver; Iwarsson, Susanne; Carlsson, Gunilla

    2015-09-02

    Making the built environment accessible for all regardless of functional capacity is an important goal for public health efforts. Considerable impediments to achieving this goal suggest the need for valid measurements of acccessibility and for greater attention to the complexity of person-environment fit issues. To address these needs, this study aimed to provide a methodological platform, useful for further research and instrument development within accessibility research. This was accomplished by the construction of a typology of problematic person-environment fit constellations, utilizing an existing methodology developed to assess and analyze accessibility problems in the built environment. By means of qualitative review and statistical methods we classified the person-environment fit components covered by an existing application which targets housing accessibility: the Housing Enabler (HE) instrument. The International Classification of Functioning, Disability and Health (ICF) was used as a conceptual framework. Qualitative classification principles were based on conceptual similarities and for quantitative analysis of similarities, Principal Component Analysis was carried out. We present a typology of problematic person-environment fit constellations classified along three dimensions: 1) accessibility problem range and severity 2) aspects of functioning 3) environmental context. As a result of the classification of the HE components, 48 typical person-environment fit constellations were recognised. The main contribution of this study is the proposed typology of person-environment fit constellations. The typology provides a methodological platform for the identification and quantification of problematic person-environment fit constellations. Its link to the globally accepted ICF classification system facilitates communication within the scientific and health care practice communities. The typology also highlights how relations between aspects of functioning

  16. Functional classification of the Gauteng provincial road network using the South African road classification and access management manual (TRH26)

    CSIR Research Space (South Africa)

    Veramoothea, P

    2015-08-01

    Full Text Available and safety. This approach can be standardised throughout the country to make inferences to road safety, speed regulation, driver behaviour, traffic studies and accessibility to services....

  17. Broadband Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Broadband Access. Worldwide market for broadband access $30 Billion! Over 200 million broadband subscribers worldwide! Various Competing Broadband access. Digital Subscriber line; Wireless; Optical Fiber.

  18. Volume Transport Stream Function Calculated from World Ocean Atlas 2013 (WOA13-VTSF) and Climatological Wind (NCEI Accession 0138646)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The dataset consists of calculated annual and monthly mean ocean volume transport stream function on 1 degree resolution using the WOA13 (T, S) and corresponding...

  19. Plants: An International Scientific Open Access Journal to Publish All Facets of Plants, Their Functions and Interactions with the Environment and Other Living Organisms

    Science.gov (United States)

    Fernando, W.G. Dilantha

    2012-01-01

    Plants are one of the two major groups of living organisms that are an essential entity to the function of the biosphere. Plants can be found in all known parts of the earth, in all shapes and sizes. They include the green algae, mosses, ferns, vines, grasses, bushes, herbs, flowering plants and trees. Although some plants are parasitic, most produce their own food through photosynthesis. Most plants initiate from a seed. The importance of plants in the food chain dates back to ancient times. The first humans gathered wild plants for food. As settlements developed, food crops were cultivated, leading to selection of high-yielding cultivated varieties to feed the growing populations. Unlike plants, humans and other animals are unable to manufacture their own food. Therefore, they are dependent, directly or indirectly, on plants. Plants are found in natural ecosystems such as rain forests, and also in agricultural areas and urbanized settings. They are an essential part of our daily lives providing food, clean air, and important ecosystem functions. The study of plants and their function could be considered the most complex of interactions. From the time a seed germinates, it goes through a myriad of physiological processes that can be closely studied using modern tools and molecular biological methods. An open access journal such as Plants will give millions of readers access to that information around the world. PMID:27137635

  20. An Open-Source Sandbox for Increasing the Accessibility of Functional Programming to the Bioinformatics and Scientific Communities

    Science.gov (United States)

    Fenwick, Matthew; Sesanker, Colbert; Schiller, Martin R.; Ellis, Heidi JC; Hinman, M. Lee; Vyas, Jay; Gryk, Michael R.

    2012-01-01

    Scientists are continually faced with the need to express complex mathematical notions in code. The renaissance of functional languages such as LISP and Haskell is often credited to their ability to implement complex data operations and mathematical constructs in an expressive and natural idiom. The slow adoption of functional computing in the scientific community does not, however, reflect the congeniality of these fields. Unfortunately, the learning curve for adoption of functional programming techniques is steeper than that for more traditional languages in the scientific community, such as Python and Java, and this is partially due to the relative sparseness of available learning resources. To fill this gap, we demonstrate and provide applied, scientifically substantial examples of functional programming, We present a multi-language source-code repository for software integration and algorithm development, which generally focuses on the fields of machine learning, data processing, bioinformatics. We encourage scientists who are interested in learning the basics of functional programming to adopt, reuse, and learn from these examples. The source code is available at: https://github.com/CONNJUR/CONNJUR-Sandbox (see also http://www.connjur.org). PMID:25328913

  1. An Open-Source Sandbox for Increasing the Accessibility of Functional Programming to the Bioinformatics and Scientific Communities.

    Science.gov (United States)

    Fenwick, Matthew; Sesanker, Colbert; Schiller, Martin R; Ellis, Heidi Jc; Hinman, M Lee; Vyas, Jay; Gryk, Michael R

    2012-01-01

    Scientists are continually faced with the need to express complex mathematical notions in code. The renaissance of functional languages such as LISP and Haskell is often credited to their ability to implement complex data operations and mathematical constructs in an expressive and natural idiom. The slow adoption of functional computing in the scientific community does not, however, reflect the congeniality of these fields. Unfortunately, the learning curve for adoption of functional programming techniques is steeper than that for more traditional languages in the scientific community, such as Python and Java, and this is partially due to the relative sparseness of available learning resources. To fill this gap, we demonstrate and provide applied, scientifically substantial examples of functional programming, We present a multi-language source-code repository for software integration and algorithm development, which generally focuses on the fields of machine learning, data processing, bioinformatics. We encourage scientists who are interested in learning the basics of functional programming to adopt, reuse, and learn from these examples. The source code is available at: https://github.com/CONNJUR/CONNJUR-Sandbox (see also http://www.connjur.org).

  2. Ready access to functionally embellished cis-hydrindanes and cis-decalins: protecting group-free total syntheses of (±)-Nootkatone and (±)-Noreremophilane.

    Science.gov (United States)

    Handore, Kishor L; Seetharamsingh, B; Reddy, D Srinivasa

    2013-08-16

    A simple and efficient synthesis of functionalized cis-hydrindanes and cis-decalins was achieved using a sequential Diels-Alder/aldol approach in a highly diastereoselective manner. The scope of this method was tested with a variety of substrates and was successfully applied to the synthesis of two natural products in racemic form. The highlights of the present work provide ready access to 13 new cis-hydrindanes/cis-decalins, a protecting group-free total synthesis of an insect repellent Nootkatone, and the first synthesis of a Noreremophilane using the shortest sequence.

  3. BioPortal: enhanced functionality via new Web services from the National Center for Biomedical Ontology to access and use ontologies in software applications.

    Science.gov (United States)

    Whetzel, Patricia L; Noy, Natalya F; Shah, Nigam H; Alexander, Paul R; Nyulas, Csongor; Tudorache, Tania; Musen, Mark A

    2011-07-01

    The National Center for Biomedical Ontology (NCBO) is one of the National Centers for Biomedical Computing funded under the NIH Roadmap Initiative. Contributing to the national computing infrastructure, NCBO has developed BioPortal, a web portal that provides access to a library of biomedical ontologies and terminologies (http://bioportal.bioontology.org) via the NCBO Web services. BioPortal enables community participation in the evaluation and evolution of ontology content by providing features to add mappings between terms, to add comments linked to specific ontology terms and to provide ontology reviews. The NCBO Web services (http://www.bioontology.org/wiki/index.php/NCBO_REST_services) enable this functionality and provide a uniform mechanism to access ontologies from a variety of knowledge representation formats, such as Web Ontology Language (OWL) and Open Biological and Biomedical Ontologies (OBO) format. The Web services provide multi-layered access to the ontology content, from getting all terms in an ontology to retrieving metadata about a term. Users can easily incorporate the NCBO Web services into software applications to generate semantically aware applications and to facilitate structured data collection.

  4. Cobalt(III)-catalyzed alkenylation of arenes and 6-arylpurines with terminal alkynes: efficient access to functional dyes.

    Science.gov (United States)

    Wang, Shan; Hou, Ji-Ting; Feng, Mei-Lin; Zhang, Xiao-Zhuan; Chen, Shan-Yong; Yu, Xiao-Qi

    2016-02-14

    Alkenylation of unactivated arenes and 6-arylpurines with terminal alkynes in high yields using Cp*Co(CO)I2 as catalyst under mild conditions is described. This method shows outstanding functional group compatibility and can be applied in the design of a mitochondria-targeted imaging dye.

  5. Wrapper design for the reuse of a bus, network-on-chip, or other functional interconnect as test access mechanism

    NARCIS (Netherlands)

    Amory, A.M.; Goossens, K.G.W.; Marinissen, Erik Jan; Lubaszewski, M.; Moraes, F.

    2007-01-01

    A new core test wrapper design approach is proposed which transports streaming test data, for example scan test patterns, into and out of an embedded core exclusively via (some of) its functional data ports. The latter are typically based on standardised protocols such as AXI, DTL, and OCP. The new

  6. Pd-Catalyzed C-H activation/oxidative cyclization of acetanilide with norbornene: concise access to functionalized indolines.

    Science.gov (United States)

    Gao, Yang; Huang, Yubing; Wu, Wanqing; Huang, Kefan; Jiang, Huanfeng

    2014-08-07

    An efficient Pd-catalyzed oxidative cyclization reaction for the synthesis of functionalized indolines by direct C-H activation of acetanilide has been developed. The norbornylpalladium species formed via direct ortho C-H activation of acetanilides is supposed to be a key intermediate in this transformation.

  7. Access to gram scale amounts of functional globular adiponectin from E. coli inclusion bodies by alkaline-shock solubilization.

    Science.gov (United States)

    Heiker, John T; Klöting, Nora; Blüher, Matthias; Beck-Sickinger, Annette G

    2010-07-16

    The adipose tissue derived protein adiponectin exerts anti-diabetic, anti-inflammatory and anti-atherosclerotic effects. Adiponectin serum concentrations are in the microgram per milliliter range in healthy humans and inversely correlate with obesity and metabolic disorders. Accordingly, raising circulating adiponectin levels by direct administration may be an intriguing strategy in the treatment of obesity-related metabolic disorders. However production of large amounts of recombinant adiponectin protein is a primary obstacle so far. Here, we report a novel method for large amount production of globular adiponectin from E. coli inclusion bodies utilizing an alkaline-shock solubilization method without chaotropic agents followed by precipitation of the readily renaturing protein. Precipitation of the mildly solubilized protein capitalizes on advantages of inclusion body formation. This approach of inclusion body protein recovery provides access to gram scale amounts of globular adiponectin with standard laboratory equipment avoiding vast dilution or dialysis steps to neutralize the pH and renature the protein, thus saving chemicals and time. The precipitated protein is readily renaturing in buffer, is of adequate purity without a chromatography step and shows biological activity in cultured MCF7 cells and significantly lowered blood glucose levels in mice with streptozotocin induced type 1 diabetes. Copyright 2010 Elsevier Inc. All rights reserved.

  8. Changes in mu-opioid receptor expression and function in the mesolimbic system after long-term access to a palatable diet.

    Science.gov (United States)

    Pitman, Kimberley A; Borgland, Stephanie L

    2015-10-01

    The incidence of obesity in both adults and children is rising. In order to develop effective treatments for obesity, it is important to understand how diet can induce changes in the brain that could promote excessive intake of high-calorie foods and alter the efficacy of therapeutic targets. The mu-opioid receptor is involved in regulating the motivation for and hedonic reaction to food. Here, we review the literature examining changes in the expression and function of mu-opioid receptors in the mesolimbic system of rodents after extended access to a high-fat diet. We also review how maternal diet can induce long-term changes in the expression or function of mu-opioid receptors in the mesolimbic system of offspring. Understanding the behavioural and therapeutic implications of these changes requires further study. Copyright © 2015 Elsevier Inc. All rights reserved.

  9. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  10. Nonequilibrium self-energy functional theory. Accessing the real-time dynamics of strongly correlated fermionic lattice systems

    Energy Technology Data Exchange (ETDEWEB)

    Hofmann, Felix

    2016-07-05

    The self-energy functional theory (SFT) is extended to the nonequilibrium case and applied to the real-time dynamics of strongly correlated lattice-fermions. Exploiting the basic structure of the well established equilibrium theory the entire formalism is reformulated in the language of Keldysh-Matsubara Green's functions. To this end, a functional of general nonequilibrium self-energies is constructed which is stationary at the physical point where it moreover yields the physical grand potential of the initial thermal state. Nonperturbative approximations to the full self-energy can be constructed by reducing the original lattice problem to smaller reference systems and varying the functional on the space of the respective trial self-energies, which are parametrized by the reference system's one-particle parameters. Approximations constructed in this way can be shown to respect the macroscopic conservation laws related to the underlying symmetries of the original lattice model. Assuming thermal equilibrium, the original SFT is recovered from the extended formalism. However, in the general case, the nonequilibrium variational principle comprises functional derivatives off the physical parameter space. These can be carried out analytically to derive inherently causal conditional equations for the optimal physical parameters of the reference system and a computationally realizable propagation scheme is set up. As a benchmark for the numerical implementation the variational cluster approach is applied to the dynamics of a dimerized Hubbard model after fast ramps of its hopping parameters. Finally, the time-evolution of a homogeneous Hubbard model after sudden quenches and ramps of the interaction parameter is studied by means of a dynamical impurity approximation with a single bath site. Sharply separated by a critical interaction at which fast relaxation to a thermal final state is observed, two differing response regimes can be distinguished, where the

  11. EPICS: Channel Access security design

    International Nuclear Information System (INIS)

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer's interface is given. Security protocol is described and finally aids for reading the access security code are provided

  12. Open access

    NARCIS (Netherlands)

    Valkenburg, P.M.

    2015-01-01

    Open access week Van 19 tot en met 25 oktober 2015 vond wereldwijd de Open Access Week plaats. Tijdens deze week werden er over de hele wereld evenementen georganiseerd waar open access een rol speelt. Ook in Nederland zijn er diverse symposia, workshops en debatten georganiseerd zoals het debat in

  13. Functionalized paper--A readily accessible adsorbent for removal of dissolved heavy metal salts and nanoparticles from water.

    Science.gov (United States)

    Setyono, Daisy; Valiyaveettil, Suresh

    2016-01-25

    Paper, a readily available renewable resource, comprises of interwoven cellulosic fibers, which can be functionalized to develop interesting low-cost adsorbent material for water purification. In this study, polyethyleneimine (PEI)-functionalized paper was used for the removal of hazardous pollutants such as Au and Ag nanoparticles, Cr(VI) anions, Ni(2+), Cd(2+), and Cu(2+) cations from spiked water samples. Compared to untreated paper, the PEI-coated paper showed significant improvement in adsorption capacities toward the pollutants investigated in this study. Kinetics, isotherm models, pH, and desorption studies were carried out to study the adsorption mechanism of pollutants on the adsorbent surface. Adsorption of pollutants was better described by pseudo-second order kinetics and Langmuir isotherm model. Maximum adsorption of anionic pollutants was achieved at pH 5 while that of cations was at pH>6. Overall, the PEI-functionalized paper showed interesting Langmuir adsorption capacities for heavy metal ions such as Cr(VI) (68 mg/g), Ni(2+) (208 mg/g), Cd(2+) (370 mg/g), and Cu(2+) (435 mg/g) ions at neutral pH. In addition, the modified paper was also used to remove Ag-citrate (79 mg/g), Ag-PVP (46 mg/g), Au-citrate (30 mg/g), Au-PVP (17 mg/g) nanoparticles from water. Desorption of NPs from the adsorbent was done by washing with 2 M HCl or thiourea solution, while heavy metal ions were desorbed using 1 M NaOH or HNO3 solution. The modified paper retained its extraction efficiencies upon desorption of pollutants. Copyright © 2015 Elsevier B.V. All rights reserved.

  14. Selectively bred crossed high-alcohol-preferring mice drink to intoxication and develop functional tolerance, but not locomotor sensitization during free-choice ethanol access.

    Science.gov (United States)

    Matson, Liana M; Kasten, Chelsea R; Boehm, Stephen L; Grahame, Nicholas J

    2014-01-01

    Crossed high-alcohol-preferring (cHAP) mice were selectively bred from a cross of the HAP1 × HAP2 replicate lines and demonstrate blood ethanol concentrations (BECs) during free-choice drinking reminiscent of those observed in alcohol-dependent humans. In this report, we investigated the relationship between free-choice drinking, intoxication, tolerance, and sensitization in cHAP mice. We hypothesized that initially mice would become ataxic after drinking alcohol, but that increased drinking over days would be accompanied by increasing tolerance to the ataxic effects of ethanol (EtOH). Male and female cHAP mice had free-choice access to 10% EtOH and water (E), while Water mice (W) had access to water alone. In experiment 1, the first drinking experience was monitored during the dark portion of the cycle. Once E mice reached an average intake rate of ≥1.5 g/kg/h, they, along with W mice, were tested for footslips on a balance beam, and BECs were assessed. In experiments 2, 3, and 4, after varying durations of free-choice 10% EtOH access (0, 3, 14, or 21 days), mice were challenged with 20% EtOH and tested for number of footslips on a balance beam or locomotor stimulant response. Blood was sampled for BEC determination. We found that cHAP mice rapidly acquire alcohol intakes that lead to ataxia. Over time, cHAP mice developed behavioral tolerance to the ataxic effects of alcohol, paralleled by escalating alcohol consumption. However, locomotor sensitization did not develop following 14 days of free-choice EtOH access. Overall, we observed increases in free-choice drinking with extended alcohol access paralleled by increases in functional tolerance, but not locomotor sensitization. These data support our hypothesis that escalating free-choice drinking over days in cHAP mice is driven by tolerance to alcohol's behavioral effects. These data are the first to demonstrate that escalating free-choice consumption is accompanied by increasing alcohol tolerance. In

  15. Internal resistor of multi-functional tunnel barrier for selectivity and switching uniformity in resistive random access memory.

    Science.gov (United States)

    Lee, Sangheon; Woo, Jiyong; Lee, Daeseok; Cha, Euijun; Hwang, Hyunsang

    2014-01-01

    In this research, we analyzed the multi-functional role of a tunnel barrier that can be integrated in devices. This tunnel barrier, acting as an internal resistor, changes its resistance with applied bias. Therefore, the current flow in the devices can be controlled by a tunneling mechanism that modifies the tunnel barrier thickness for non-linearity and switching uniformity of devices. When a device is in a low-resistance state, the tunnel barrier controls the current behavior of the device because most of the bias is applied to the tunnel barrier owing to its higher resistance. Furthermore, the tunnel barrier induces uniform filament formation during set operation with the tunnel barrier controlling the current flow.

  16. Open Access

    Science.gov (United States)

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  17. Open access

    African Journals Online (AJOL)

    Prof. Dennis Ocholla

    The argument that access to information is an instrumental and individual as well as ... and Dean School of Information Studies, University of Wisconsin, Milwaukee, USA. ... to scholarly publications and can be in any digital format, including text, movies and ... language barriers, censorship, lack of access to the Internet and ...

  18. Enabling Web-Based GIS Tools for Internet and Mobile Devices To Improve and Expand NASA Data Accessibility and Analysis Functionality for the Renewable Energy and Agricultural Applications

    Science.gov (United States)

    Ross, A.; Stackhouse, P. W.; Tisdale, B.; Tisdale, M.; Chandler, W.; Hoell, J. M., Jr.; Kusterer, J.

    2014-12-01

    The NASA Langley Research Center Science Directorate and Atmospheric Science Data Center have initiated a pilot program to utilize Geographic Information System (GIS) tools that enable, generate and store climatological averages using spatial queries and calculations in a spatial database resulting in greater accessibility of data for government agencies, industry and private sector individuals. The major objectives of this effort include the 1) Processing and reformulation of current data to be consistent with ESRI and openGIS tools, 2) Develop functions to improve capability and analysis that produce "on-the-fly" data products, extending these past the single location to regional and global scales. 3) Update the current web sites to enable both web-based and mobile application displays for optimization on mobile platforms, 4) Interact with user communities in government and industry to test formats and usage of optimization, and 5) develop a series of metrics that allow for monitoring of progressive performance. Significant project results will include the the development of Open Geospatial Consortium (OGC) compliant web services (WMS, WCS, WFS, WPS) that serve renewable energy and agricultural application products to users using GIS software and tools. Each data product and OGC service will be registered within ECHO, the Common Metadata Repository, the Geospatial Platform, and Data.gov to ensure the data are easily discoverable and provide data users with enhanced access to SSE data, parameters, services, and applications. This effort supports cross agency, cross organization, and interoperability of SSE data products and services by collaborating with DOI, NRCan, NREL, NCAR, and HOMER for requirements vetting and test bed users before making available to the wider public.

  19. Access Contested

    International Development Research Centre (IDRC) Digital Library (Canada)

    Transforming Global Information and Communication Markets: The Political Economy of ... 8 Control and Resistance: Attacks on Burmese Opposition Media 153 ...... “Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet,” in Access ...

  20. Accessing memory

    Science.gov (United States)

    Yoon, Doe Hyun; Muralimanohar, Naveen; Chang, Jichuan; Ranganthan, Parthasarathy

    2017-09-26

    A disclosed example method involves performing simultaneous data accesses on at least first and second independently selectable logical sub-ranks to access first data via a wide internal data bus in a memory device. The memory device includes a translation buffer chip, memory chips in independently selectable logical sub-ranks, a narrow external data bus to connect the translation buffer chip to a memory controller, and the wide internal data bus between the translation buffer chip and the memory chips. A data access is performed on only the first independently selectable logical sub-rank to access second data via the wide internal data bus. The example method also involves locating a first portion of the first data, a second portion of the first data, and the second data on the narrow external data bus during separate data transfers.

  1. Forbidden Access

    CERN Multimedia

    C. Colloca TS/FM

    2004-01-01

    TS/FM group informs you that, for the replacement of the door of the main entrance at bldg. 500, the access will be closed to the public between 19 and 30 July 2004. Access to the Main Building complex will be assured at any time through both of the side doors and from bldg. 64. For more information, please contact 73273. C. Colloca TS/FM

  2. Item response theory analysis of the Amyotrophic Lateral Sclerosis Functional Rating Scale-Revised in the Pooled Resource Open-Access ALS Clinical Trials Database.

    Science.gov (United States)

    Bacci, Elizabeth D; Staniewska, Dorota; Coyne, Karin S; Boyer, Stacey; White, Leigh Ann; Zach, Neta; Cedarbaum, Jesse M

    2016-01-01

    Our objective was to examine dimensionality and item-level performance of the Amyotrophic Lateral Sclerosis Functional Rating Scale-Revised (ALSFRS-R) across time using classical and modern test theory approaches. Confirmatory factor analysis (CFA) and Item Response Theory (IRT) analyses were conducted using data from patients with amyotrophic lateral sclerosis (ALS) Pooled Resources Open-Access ALS Clinical Trials (PRO-ACT) database with complete ALSFRS-R data (n = 888) at three time-points (Time 0, Time 1 (6-months), Time 2 (1-year)). Results demonstrated that in this population of 888 patients, mean age was 54.6 years, 64.4% were male, and 93.7% were Caucasian. The CFA supported a 4* individual-domain structure (bulbar, gross motor, fine motor, and respiratory domains). IRT analysis within each domain revealed misfitting items and overlapping item response category thresholds at all time-points, particularly in the gross motor and respiratory domain items. Results indicate that many of the items of the ALSFRS-R may sub-optimally distinguish among varying levels of disability assessed by each domain, particularly in patients with less severe disability. Measure performance improved across time as patient disability severity increased. In conclusion, modifications to select ALSFRS-R items may improve the instrument's specificity to disability level and sensitivity to treatment effects.

  3. Error free physically unclonable function with programmed resistive random access memory using reliable resistance states by specific identification-generation method

    Science.gov (United States)

    Tseng, Po-Hao; Hsu, Kai-Chieh; Lin, Yu-Yu; Lee, Feng-Min; Lee, Ming-Hsiu; Lung, Hsiang-Lan; Hsieh, Kuang-Yeu; Chung Wang, Keh; Lu, Chih-Yuan

    2018-04-01

    A high performance physically unclonable function (PUF) implemented with WO3 resistive random access memory (ReRAM) is presented in this paper. This robust ReRAM-PUF can eliminated bit flipping problem at very high temperature (up to 250 °C) due to plentiful read margin by using initial resistance state and set resistance state. It is also promised 10 years retention at the temperature range of 210 °C. These two stable resistance states enable stable operation at automotive environments from -40 to 125 °C without need of temperature compensation circuit. The high uniqueness of PUF can be achieved by implementing a proposed identification (ID)-generation method. Optimized forming condition can move 50% of the cells to low resistance state and the remaining 50% remain at initial high resistance state. The inter- and intra-PUF evaluations with unlimited separation of hamming distance (HD) are successfully demonstrated even under the corner condition. The number of reproduction was measured to exceed 107 times with 0% bit error rate (BER) at read voltage from 0.4 to 0.7 V.

  4. Accessible Knowledge - Knowledge on Accessibility

    DEFF Research Database (Denmark)

    Kirkeby, Inge Mette

    2015-01-01

    Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...

  5. Open access

    CERN Document Server

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder consent, and many authors, musicians, filmmakers, and other creators who depend on royalties are understandably unwilling to give their consent. But for 350 years, scholars have written peer-reviewed journal articles for impact, not for money, and are free to consent to open access without losing revenue. In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. Distilling a decade of Suber's influential writing and thinking about open access, this is the indispe...

  6. Access French

    CERN Document Server

    Grosz, Bernard

    2014-01-01

    Access is the major new language series designed with the needs of today's generation of students firmly in mind. Whether learning for leisure or business purposes or working towards a curriculum qualification, Access French is specially designed for adults of all ages and gives students a thorough grounding in all the skills required to understand, speak, read and write contemporary French from scratch. The coursebook consists of 10 units covering different topic areas, each of which includes Language Focus panels explaining the structures covered and a comprehensive glossary. Learning tips

  7. Gaining Access.

    Science.gov (United States)

    Wand, Sean; Thermos, Adam C.

    1998-01-01

    Explains the issues to consider before a college decides to purchase a card-access system. The benefits of automation, questions involving implementation, the criteria for technology selection, what typical card technology involves, privacy concerns, and the placement of card readers are discussed. (GR)

  8. A Pilot Randomized Controlled Trial of the ACCESS Program: A Group Intervention to Improve Social, Adaptive Functioning, Stress Coping, and Self-Determination Outcomes in Young Adults with Autism Spectrum Disorder

    Science.gov (United States)

    Oswald, Tasha M.; Winder-Patel, Breanna; Ruder, Steven; Xing, Guibo; Stahmer, Aubyn; Solomon, Marjorie

    2018-01-01

    The purpose of this pilot randomized controlled trial was to investigate the acceptability and efficacy of the Acquiring Career, Coping, Executive control, Social Skills (ACCESS) Program, a group intervention tailored for young adults with autism spectrum disorder (ASD) to enhance critical skills and beliefs that promote adult functioning,…

  9. Access Rights Distribution

    Directory of Open Access Journals (Sweden)

    T. M. Pestunova

    2011-03-01

    Full Text Available The main aspects of the development of the information system, which grants users the rights for access to automated information system resources on the basis of the organization business-processes, are considered. The conceptual, informational, functional models of the system, as well as a model, which allows to realize control while using various formal models (RBAC, DAC, MAC, are described.

  10. Natural variation in stomatal response to closing stimuli among Arabidopsis thaliana accessions after exposure to low VPD as a tool to recognize the mechanism of disturbed stomatal functioning.

    Science.gov (United States)

    Aliniaeifard, Sasan; van Meeteren, Uulke

    2014-12-01

    Stomatal responses to closing stimuli are disturbed after long-term exposure of plants to low vapour pressure deficit (VPD). The mechanism behind this disturbance is not fully understood. Genetic variation between naturally occurring ecotypes can be helpful to elucidate the mechanism controlling stomatal movements in different environments. We characterized the stomatal responses of 41 natural accessions of Arabidopsis thaliana to closing stimuli (ABA and desiccation) after they had been exposed for 4 days to moderate VPD (1.17 kPa) or low VPD (0.23 kPa). A fast screening system was used to test stomatal response to ABA using chlorophyll fluorescence imaging under low O2 concentrations of leaf discs floating on ABA solutions. In all accessions stomatal conductance (gs) was increased after prior exposure to low VPD. After exposure to low VPD, stomata of 39 out of 41 of the accessions showed a diminished ABA closing response; only stomata of low VPD-exposed Map-42 and C24 were as responsive to ABA as moderate VPD-exposed plants. In response to desiccation, most of the accessions showed a normal stomata closing response following low VPD exposure. Only low VPD-exposed Cvi-0 and Rrs-7 showed significantly less stomatal closure compared with moderate VPD-exposed plants. Using principle component analysis (PCA), accessions could be categorized to very sensitive, moderately sensitive, and less sensitive to closing stimuli. In conclusion, we present evidence for different stomatal responses to closing stimuli after long-term exposure to low VPD across Arabidopsis accessions. The variation can be a useful tool for finding the mechanism of stomatal malfunctioning. © The Author 2014. Published by Oxford University Press on behalf of the Society for Experimental Biology.

  11. Improvement of dose evaluation system for employees at severe accident in a nuclear power plant. Introduction of the dose rate conversion coefficient and addition of the access route edit function

    International Nuclear Information System (INIS)

    Sasaki, Yasuhiro; Minami, Noritoshi; Yoshida, Yoshitaka

    2006-01-01

    Institute of Nuclear Safety System, Inc. had developed the dose evaluation system to evaluate the radiation dose of employees at severe accident in a nuclear power plant. This system has features, which are (1) the dose rate of any evaluation point can be evaluated, (2) the dose rate at any time can be evaluated in consideration of the change in the radioactive source, (3) the dose rate map in the plant can be displayed (4) the dose along the access route when moving can be evaluated, and it is possible to use it for examination of the accident management guideline on the dose side etc.. To upgrade the dose evaluation function of this system, the improvements had been done which were introduction of the dose rate conversion coefficient and addition of the access route edit function. By introducing the dose rate conversion coefficient, the calculation time of the dose rate map in the plant was shortened at about 20 seconds, and a new function to evaluate time-dependent dose rate of any evaluation point was added. By adding the access route edit function, it became possible to re-calculate the dose easily at the route change. (author)

  12. Accessing Inpatient Rehabilitation after Acute Severe Stroke: Age, Mobility, Prestroke Function and Hospital Unit Are Associated with Discharge to Inpatient Rehabilitation

    Science.gov (United States)

    Hakkennes, Sharon; Hill, Keith D.; Brock, Kim; Bernhardt, Julie; Churilov, Leonid

    2012-01-01

    The objective of this study was to identify the variables associated with discharge to inpatient rehabilitation following acute severe stroke and to determine whether hospital unit contributed to access. Five acute hospitals in Victoria, Australia participated in this study. Patients were eligible for inclusion if they had suffered an acute severe…

  13. Naturally occurring broad-spectrum powdery mildw resistance in a central American tomato accession is caused by loss of Mlo function

    NARCIS (Netherlands)

    Bai, Y.; Pavan, S.N.C.; Zheng, Z.; Zappel, N.F.; Reinstadler, A.; Lotti, C.; Giovanni, de C.; Ricciardi, L.; Lindhout, P.; Visser, R.G.F.; Theres, K.; Panstruga, R.

    2008-01-01

    The resistant cherry tomato (Solanum lycopersicum var. cerasiforme) line LC-95, derived from an accession collected in Ecuador, harbors a natural allele (ol-2) that confers broad-spectrum and recessively inherited resistance to powdery mildew (Oidium neolycopersici). As both the genetic and

  14. Long-term reliable physically unclonable function based on oxide tunnel barrier breakdown on two-transistors two-magnetic-tunnel-junctions cell-based embedded spin transfer torque magnetoresistive random access memory

    Science.gov (United States)

    Takaya, Satoshi; Tanamoto, Tetsufumi; Noguchi, Hiroki; Ikegami, Kazutaka; Abe, Keiko; Fujita, Shinobu

    2017-04-01

    Among the diverse applications of spintronics, security for internet-of-things (IoT) devices is one of the most important. A physically unclonable function (PUF) with a spin device (spin transfer torque magnetoresistive random access memory, STT-MRAM) is presented. Oxide tunnel barrier breakdown is used to realize long-term stability for PUFs. A secure PUF has been confirmed by evaluating the Hamming distance of a 32-bit STT-MRAM-PUF fabricated using 65 nm CMOS technology.

  15. Accessibility issues with long-term disabilities.

    Science.gov (United States)

    Sebring-Cale, Nancy J

    2008-06-01

    Home modifications for barrier-free accessibility will assist the physically challenged populations by increasing their independence. By providing an accessible environment, an individual can become more independent and require less assistance for functional activities, such as kitchen appliance access, door widening, open floor plan, elevated electric outlets, roll-under sinks, roll-in showers and MobiLife elevating wheelchair.

  16. Prediction models and development of an easy to use open-access tool for measuring lung function of individuals with motor complete spinal cord injury

    NARCIS (Netherlands)

    Mueller, Gabi; de Groot, Sonja; van der Woude, Lucas H.; Perret, Claudio; Michel, Franz; Hopman, Maria T. E.

    Objective: To develop statistical models to predict lung function and respiratory muscle strength from personal and lesion characteristics of individuals with motor complete spinal cord injury. Design: Cross-sectional, multi-centre cohort study. Subjects: A total of 440 individuals with traumatic,

  17. Activation of dominant hemisphere association cortex during naming as a function of cognitive performance in mild traumatic brain injury: Insights into mechanisms of lexical access

    Directory of Open Access Journals (Sweden)

    Mihai Popescu

    2017-01-01

    processes. These findings also provide support for a parallel processing model of lexical access.

  18. Rhodium-Catalyzed Denitrogenative [3+2] Cycloaddition: Access to Functionalized Hydroindolones and the Framework of Montanine-Type Amaryllidaceae Alkaloids.

    Science.gov (United States)

    Yang, Hongjian; Hou, Shengtai; Tao, Cheng; Liu, Zhao; Wang, Chao; Cheng, Bin; Li, Yun; Zhai, Hongbin

    2017-09-18

    Rhodium-catalyzed denitrogenative [3+2] cycloaddition of 1-sulfonyl-1,2,3-triazoles with cyclic silyl dienol ethers has been developed for the synthesis of functionalized hydroindolones or their corresponding silyl ethers. The present method has been employed to construct synthetically valuable bicyclo[3.3.1]alkenone derivatives and pyrrolidine-ring-containing bicyclic indole compounds. As a further synthetic application, a stereoselective synthesis of 5,11-methanomorphanthridin-3-one, which shares a key skeleton with montanine-type Amaryllidaceae alkaloids has been achieved by using this chemistry. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. Fishing Access Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — The Vermont Fish & Wildlife Department maintains developed fishing access areas. These sites provide public access to waters in Vermont for shore fishing...

  20. Accessibility and sensory experiences

    DEFF Research Database (Denmark)

    Ryhl, Camilla

    2010-01-01

    and accessibility. Sensory accessibility accommodates aspects of a sensory disability and describes architectural design requirements needed to ensure access to architectural experiences. In the context of architecture accessibility has become a design concept of its own. It is generally described as ensuring...... physical access to the built environment by accommodating physical disabilities. While the existing concept of accessibility ensures the physical access of everyone to a given space, sensory accessibility ensures the choice of everyone to stay and be able to participate and experience....

  1. A snapshot into the uptake and utilization of potential oligosaccharide prebiotics by probiotic lactobacilli and bifidobacteria as accessed by transcriptomics, functional genomics, and recombinant protein characterization

    DEFF Research Database (Denmark)

    Andersen, Joakim Mark

    and lifestyle diseases are currently well documented. Selective utilization, of primarily non-digestible carbohydrates, termed prebiotics, by probiotics has been identified as an attribute of probiotic action, however the molecular mechanisms of prebiotics utilization and in particular the specificities...... of carbohydrate transporters and glycoside hydrolases that confer this remain largely unknown, limiting a robust understanding for the basis of selective utilization of known prebiotics and the discovery and documentation of novel prebiotics. The aim of this Ph.D. thesis was to identify the genes involved...... with uptake and catabolism of potential prebiotics by the probiotics Lactobacillus acidophilus NCFM and Bifidobacterium animalis subsp. lactis Bl-04 as model organisms, using DNA whole genome microarrays and by in silico pathway re-construction to identify key genes for further functional analysis by gene...

  2. Accessibility of antiretroviral therapy in Ghana: Convenience of access

    African Journals Online (AJOL)

    Joyce Addo-Atuah * Joyce Addo-Atuah, BPharm, MSc, PhD, Assistant Professor, Touro College of Pharmacy, New York, USA. She was a PhD candidate at the University of Tennessee (UT), Memphis, USA, when the study was undertaken in Ghana. joyce.addo-atuah@touro.edu, Dick Gourley Dick Gourley, PharmD, Professor and Dean, UT College of Pharmacy during the study and major research advisor. , Greta Gourley Greta Gourley, PharmD/PhD, retired Associate Professor of Pharmaceutical Sciences at UT College of Pharmacy and research advisor. , Shelley I. White-Means Shelley I. White-Means, PhD, Professor and Chair, Health Outcomes and Policy Research Division of UT College of Pharmacy at time of the study and research advisor. , Robin J. Womeodu Robin J. Womeodu, MD, F.A.C.P., Associate Professor of Internal Medicine and Preventive Medicine at UT College of Medicine at time of study and research advisor. , Richard J. Faris Richard J. Faris, Assistant Professor at UT College of Pharmacy at time of study and research advisor. &

    2012-05-30

    May 30, 2012 ... The accuracy of any instructions, formulae, and drug doses ... The convenience of accessing antiretroviral therapy (ART) is ...... tious diseases, paediatrics, chest diseases, dermatology, public .... CD4 count, (2) a full blood count, (3) a liver function test, (4) ..... America: measures of the African brain drain.

  3. Prognostic value of myocardial perfusion and ventricular function in a Japanese multicenter cohort study (J-ACCESS). The first-year total events and hard events

    International Nuclear Information System (INIS)

    Nakajima, Kenichi; Kusuoka, Hideo; Nishimura, Shigeyuki; Yamashina, Akira; Nishimura, Tsunehiko

    2009-01-01

    The objective of this study was to determine the prognostic value of myocardial ischemia, function and coronary risk factors on total and hard cardiac events using myocardial perfusion imaging in a Japanese population. A prospective cohort study was performed in 117 Japanese hospitals, each with a nuclear cardiology facility. A total of 4,031 patients with suspected or confirmed ischemic heart disease were registered. The patients were followed up for a year to investigate total and hard events, and those who had any events were followed up for 3 years to evaluate subsequent hard events. A stress-rest gated myocardial perfusion study was performed with 99m Tc-tetrofosmin using gated single-photon emission computed tomography (SPECT) and analyzed by semi-quantitative scores. During the 1-year follow-up period, 263 (6.5%) patients had total events comprising all-cause death, non-fatal myocardial infarction (MI), heart failure, unstable angina, angina pectoris and coronary revascularization. Cardiac death occurred in 23 patients (0.6%) and non-fatal MI in 11 (0.3%). Among patients with ejection fraction (EF) of <45% and a summed difference score (SDS) of ≥2, 18.7% (2.4% for cardiac death and 0.6% for non-fatal MI) experienced total events compared with 3.9% (0.3% for cardiac death and 0.2% for non-fatal MI; P<0.0001) of those with EF≥45% and SDS<2. Multivariate analysis identified EF, SDS, age, history of revascularization and diabetes as significant predictors of all events, while the significant predictors were age and EF for hard events. When the patients who had heart failure in the first year were followed up, 9 of 41 (22.0%) experienced cardiac death in the subsequent 3-year follow-up period. Myocardial ischemia defined by SDS and ventricular function were the main predictors of total events despite the relatively low incidence of hard events in this Japanese population. In patients with cardiac events in a year, closer attention should be paid to subsequent

  4. JISC Open Access Briefing Paper

    OpenAIRE

    Swan, Alma

    2005-01-01

    What Open Access is. What Open Access is not. How is Open Access provided? Open Access archives or repositories. Open Access journals. Why should authors provide Open Access to their work? Further information and resources

  5. Housing Accessibility Methodology Targeting Older People

    DEFF Research Database (Denmark)

    Helle, Tina

    accessibility problems before the planning of housing intervention strategies. It is also critical that housing standards addressing accessibility intended to accommodate people with functional limitations are valid in the sense that their definitions truly support accessibility. However, there is a paucity...... of valid and reliable assessment instruments targeting housing accessibility, and in-depth analysis of factors potentially impacting on reliability in complex assessment situations is remarkably absent. Moreover, the knowledge base informing the housing standards appears to be vague. We may therefore...... reasonably question the validity of the housing standards addressing accessibility. This thesis addresses housing accessibility methodology in general and the reliability of assessment and the validity of standards targeting older people with functional limitations and a dependence on mobility devices...

  6. Professional Access 2013 programming

    CERN Document Server

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  7. Access 2010 Programmer's Reference

    CERN Document Server

    Hennig, Teresa; Griffith, Geoffrey L

    2010-01-01

    A comprehensive guide to programming for Access 2010 and 2007. Millions of people use the Access database applications, and hundreds of thousands of developers work with Access daily. Access 2010 brings better integration with SQL Server and enhanced XML support; this Wrox guide shows developers how to take advantage of these and other improvements. With in-depth coverage of VBA, macros, and other programming methods for building Access applications, this book also provides real-world code examples to demonstrate each topic.: Access is the leading database that is used worldwide; While VBA rem

  8. Overview: Routes to Open Access

    OpenAIRE

    Tullney, Marco; van Wezenbeek, Wilma

    2017-01-01

    Slides of an overview presentation given at a CESAER workshop on Open Access, February 2nd, 2017, in Brussels Cover major routes to more open access as discussed in the Task Force Open Science of CESAER: (national) open access strategies open access mandates open access incentives open access awareness open access publishing open access infrastructure

  9. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  10. Design for Accessibility

    DEFF Research Database (Denmark)

    Herriott, Richard

    2012-01-01

    A report on how nine rail builder, operators and transport designers deal with design for accessibility......A report on how nine rail builder, operators and transport designers deal with design for accessibility...

  11. Information on Open Access

    African Journals Online (AJOL)

    Open Access (OA), defined most simply, means free full text online. There are over 130 Open Access journals hosted on the AJOL website. You can find a full list of these journals here: OA journals on AJOL ...

  12. Accessible solitons of fractional dimension

    Energy Technology Data Exchange (ETDEWEB)

    Zhong, Wei-Ping, E-mail: zhongwp6@126.com [Department of Electronic and Information Engineering, Shunde Polytechnic, Guangdong Province, Shunde 528300 (China); Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar); Belić, Milivoj [Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar); Zhang, Yiqi [Key Laboratory for Physical Electronics and Devices of the Ministry of Education & Shaanxi Key Lab of Information Photonic Technique, Xi’an Jiaotong University, Xi’an 710049 (China)

    2016-05-15

    We demonstrate that accessible solitons described by an extended Schrödinger equation with the Laplacian of fractional dimension can exist in strongly nonlocal nonlinear media. The soliton solutions of the model are constructed by two special functions, the associated Legendre polynomials and the Laguerre polynomials in the fraction-dimensional space. Our results show that these fractional accessible solitons form a soliton family which includes crescent solitons, and asymmetric single-layer and multi-layer necklace solitons. -- Highlights: •Analytic solutions of a fractional Schrödinger equation are obtained. •The solutions are produced by means of self-similar method applied to the fractional Schrödinger equation with parabolic potential. •The fractional accessible solitons form crescent, asymmetric single-layer and multilayer necklace profiles. •The model applies to the propagation of optical pulses in strongly nonlocal nonlinear media.

  13. Access Customized Forms

    OpenAIRE

    Cosma Emil; Jeflea Victor

    2010-01-01

    By using Word, Excel or PowerPoint one can automate routine operations using the VBA language (Visual Basic for Applications). This language is also used in Access, allowing access to data stored in tables or queries. Thus, Access and VBA resources can be used together. Access is designed for programming forms and reports (among other things), so there won’t be found any of the VBA editor’s specific forms.

  14. Accessing Electronic Journals.

    Science.gov (United States)

    McKay, Sharon Cline

    1999-01-01

    Discusses issues librarians need to consider when providing access to electronic journals. Topics include gateways; index and abstract services; validation and pay-per-view; title selection; integration with OPACs (online public access catalogs)or Web sites; paper availability; ownership versus access; usage restrictions; and services offered…

  15. Open access and beyond

    Directory of Open Access Journals (Sweden)

    Das Chhaya

    2006-09-01

    Full Text Available Abstract Uncensored exchange of scientific results hastens progress. Open Access does not stop at the removal of price and permission barriers; still, censorship and reading disabilities, to name a few, hamper access to information. Here, we invite the scientific community and the public to discuss new methods to distribute, store and manage literature in order to achieve unfettered access to literature.

  16. Preparation of magnetic graphene/mesoporous silica composites with phenyl-functionalized pore-walls as the restricted access matrix solid phase extraction adsorbent for the rapid extraction of parabens from water-based skin toners.

    Science.gov (United States)

    Feng, Jianan; He, Xinying; Liu, Xiaodan; Sun, Xueni; Li, Yan

    2016-09-23

    In this work, phenyl-functionalized magnetic graphene/mesoporous silica composites (MG-mSiO2-Ph) were prepared and applied as restricted access matrix solid phase extraction (RAM-SPE) adsorbents to determine the parabens in commercially available retail cosmetics. MG-mSiO2-Ph composites were synthesized by a surfactant-mediated co-condensation reaction in which mesoporous silica with phenyl-functionalized pore-walls was coated on a magnetic graphene sheet. The obtained nano-composites were proven to be of sufficient quality for an ideal RAM-SPE adsorbent with a large specific surface area of 369m(2)g(-1), uniform mesopores of 2.8nm, and special phenyl-functionalized pore-walls. Parabens, such as methyl paraben, ethyl paraben and propyl paraben, were extracted from water-based skin toners using one step of the RAM-SPE and were then analysed by a HPLC-DAD system. The SPE conditions were optimized by studying the parameters, such as the adsorbent amount, elution solvent type, adsorption time and desorption time, that influence the extraction efficiency. For each analyte, there were good linearities of approximately 0.10-120μgmL(-1) with determination coefficients (R(2))>0.995. The sensitivity was as low as 0.01-0.025μgmL(-1) for the LOD, and the percent recoveries were 98.37-105.84%. The intra-day and inter-day RSDs were 1.44-6.11% (n=6) and 3.12-11.70% (n=6), respectively. The results indicated that this method with novel RAM-SPE adsorbents is sensitive and convenient. The results also offered an attractive alternative for the extraction and determination of paraben preservatives in a complex matrix, such as cosmetics. Copyright © 2016 Elsevier B.V. All rights reserved.

  17. Access 2013 for dummies

    CERN Document Server

    Ulrich Fuller, Laurie

    2013-01-01

    The easy guide to Microsoft Access returns with updates on the latest version! Microsoft Access allows you to store, organize, view, analyze, and share data; the new Access 2013 release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. Access 2013 For Dummies covers all the new features of the latest version of Accessand serves as an ideal reference, combining the latest Access features with the basics of building usable databases. You'll learn how to create an app from the Welcome screen, get support

  18. Pro Access 2010 Development

    CERN Document Server

    Collins, Mark

    2011-01-01

    Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for Applications (VBA) tools for Access applications, integrate Access with SharePoint and other business systems, and much more. Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, co

  19. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  20. Validation of Housing Standards Addressing Accessibility

    DEFF Research Database (Denmark)

    Helle, Tina

    2013-01-01

    The aim was to explore the use of an activity-based approach to determine the validity of a set of housing standards addressing accessibility. This included examination of the frequency and the extent of accessibility problems among older people with physical functional limitations who used...... participant groups were examined. Performing well-known kitchen activities was associated with accessibility problems for all three participant groups, in particular those using a wheelchair. The overall validity of the housing standards examined was poor. Observing older people interacting with realistic...... environments while performing real everyday activities seems to be an appropriate method for assessing accessibility problems....

  1. Open Access @ DTU

    DEFF Research Database (Denmark)

    Ekstrøm, Jeannette

    Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all peer review...... articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access and related topics...... such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc....

  2. Vascular access: a never-ending story.

    Science.gov (United States)

    Hedin, U

    2014-12-01

    Vascular surgeons are more and more becoming responsible for "life-line" creation well functioning and maintenance of hemodialysis patients and to provide a well functioning and multidisciplinary access service together with nefrologists, dialysis staff, and interventional radiology. For many, this sometimes arduous surgery with associated complicated clinical decision making, becomes a constant and challenging burden but much through the appearance of national and international guidelines and especially the endovascular technology, feasible solutions are easily at hand and the life as an access surgeon more pleasant. Here, basics in dialysis access care are presented together with some examples of novel available solutions to troublesome clinical problems.

  3. A Comparative Analysis of Wiki Discretionary Access Control in a CONOPS Environment

    National Research Council Canada - National Science Library

    Crawford, Frederick L

    2008-01-01

    This research conducts a comparative analysis of discretionary access controls of current wikis by experimenting with their discretionary access controls and functionality, comparing the wiki software...

  4. Automated Computer Access Request System

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  5. Accessing and using chemical databases

    DEFF Research Database (Denmark)

    Nikolov, Nikolai Georgiev; Pavlov, Todor; Niemelä, Jay Russell

    2013-01-01

    Computer-based representation of chemicals makes it possible to organize data in chemical databases-collections of chemical structures and associated properties. Databases are widely used wherever efficient processing of chemical information is needed, including search, storage, retrieval......, and dissemination. Structure and functionality of chemical databases are considered. The typical kinds of information found in a chemical database are considered-identification, structural, and associated data. Functionality of chemical databases is presented, with examples of search and access types. More details...... are included about the OASIS database and platform and the Danish (Q)SAR Database online. Various types of chemical database resources are discussed, together with a list of examples....

  6. Migrants' access to healthcare

    DEFF Research Database (Denmark)

    Norredam, Marie

    2011-01-01

    There are strong pragmatic and moral reasons for receiving societies to address access to healthcare for migrants. Receiving societies have a pragmatic interest in sustaining migrants' health to facilitate integration; they also have a moral obligation to ensure migrants' access to healthcare...... according to international human rights principles. The intention of this thesis is to increase the understanding of migrants' access to healthcare by exploring two study aims: 1) Are there differences in migrants' access to healthcare compared to that of non-migrants? (substudy I and II); and 2) Why...... are there possible differences in migrants' access to healthcare compared to that of non-migrants? (substudy III and IV). The thesis builds on different methodological approaches using both register-based retrospective cohort design, cross-sectional design and survey methods. Two different measures of access were...

  7. Access Data Analysis Cookbook

    CERN Document Server

    Bluttman, Ken

    2008-01-01

    This book offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Whether you use Access 2007 or an earlier version, this book will teach you new methods to query data, different ways to move data in and out of Access, how to calculate answers to financial and investment issues, how to jump beyond SQL by manipulating data with VBA, and more.

  8. Strategic Accessibility Competition

    OpenAIRE

    Bacchiega, Emanuele; Randon, Emanuela; Zirulia, Lorenzo

    2010-01-01

    We analyze the effect of competition in market-accessibility enhancement among quality-differentiated firms. Firms are located in regions with different ex-ante transport costs to reach the final market. We characterize the equilibrium of the two-stage game in which firms first invest to improve market accessibility and then compete in prices. Efforts in accessibility improvement crucially depend on the interplay between the willingness to pay for the quality premium of the median consumer an...

  9. Are PDF Documents Accessible?

    Directory of Open Access Journals (Sweden)

    Mireia Ribera Turró

    2008-09-01

    Full Text Available Adobe PDF is one of the most widely used formats in scientific communications and in administrative documents. In its latest versions it has incorporated structural tags and improvements that increase its level of accessibility. This article reviews the concept of accessibility in the reading of digital documents and evaluates the accessibility of PDF according to the most widely established standards.

  10. Open Access Monitor - DK

    DEFF Research Database (Denmark)

    Svendsen, Michael; Hansen, Lars Asger Juel; Andersen, Dorte

    2017-01-01

    Open Access Monitor - DK (OAM-DK) is a 2-year DEFF funded [DEFF.2016-0018] national project running in 2017-2018 with the aim of collecting, documenting and administrating Open Access publishing costs. OAM-DK is lead by Copenhagen University Library under the Royal Danish Library with participation...... of all Danish University Libraries. This poster presents the first results of Open Access costs related to 2015 publications at the The University of Copenhagen....

  11. Demystifying Open Access

    International Nuclear Information System (INIS)

    Mele, Salvatore

    2007-01-01

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  12. OGIS Access System

    Data.gov (United States)

    National Archives and Records Administration — The OGIS Access System (OAS) provides case management, stakeholder collaboration, and public communications activities including a web presence via a web portal.

  13. Access 2013 bible

    CERN Document Server

    Alexander, Michael

    2013-01-01

    A comprehensive reference to the updated and new features of Access 2013 As the world's most popular database management tool, Access enables you to organize, present, analyze, and share data as well as build powerful database solutions. However, databases can be complex. That's why you need the expert guidance in this comprehensive reference. Access 2013 Bible helps you gain a solid understanding of database purpose, construction, and application so that whether you're new to Access or looking to upgrade to the 2013 version, this well-rounded resource provides you with a th

  14. Web Accessibility and Guidelines

    Science.gov (United States)

    Harper, Simon; Yesilada, Yeliz

    Access to, and movement around, complex online environments, of which the World Wide Web (Web) is the most popular example, has long been considered an important and major issue in the Web design and usability field. The commonly used slang phrase ‘surfing the Web’ implies rapid and free access, pointing to its importance among designers and users alike. It has also been long established that this potentially complex and difficult access is further complicated, and becomes neither rapid nor free, if the user is disabled. There are millions of people who have disabilities that affect their use of the Web. Web accessibility aims to help these people to perceive, understand, navigate, and interact with, as well as contribute to, the Web, and thereby the society in general. This accessibility is, in part, facilitated by the Web Content Accessibility Guidelines (WCAG) currently moving from version one to two. These guidelines are intended to encourage designers to make sure their sites conform to specifications, and in that conformance enable the assistive technologies of disabled users to better interact with the page content. In this way, it was hoped that accessibility could be supported. While this is in part true, guidelines do not solve all problems and the new WCAG version two guidelines are surrounded by controversy and intrigue. This chapter aims to establish the published literature related to Web accessibility and Web accessibility guidelines, and discuss limitations of the current guidelines and future directions.

  15. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  16. Accessibility of public services

    NARCIS (Netherlands)

    Poort, J.P.; Groot, I.; Kok, L.; de Graaf, D.; Hof, B.J.F.

    2005-01-01

    The accessibility of certain products and services to all people, irrespective of their income, age, health and geographical location is considered to be of great social importance. Think for instance of health care, education, electricity, and sanitation. Accessibility can be secured in a variety

  17. Market Access and Welfare

    DEFF Research Database (Denmark)

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    2015-01-01

    Well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. The present paper proposes a new set of tariff reforms that can achieve both...

  18. Standards and Access.

    Science.gov (United States)

    Fox, Tom

    1993-01-01

    Argues that easy claims about the relationship between language mastery and academic or economic access (made by both conservative commentators on education and mainstream writing teachers) are false and obscure real social and political boundaries, such as racism, sexism, elitism, and homophobia, that really do prevent access. (SR)

  19. A remark on accessibility

    International Nuclear Information System (INIS)

    Wu, Xinxing; Wang, Jianjun

    2016-01-01

    Highlights: • Obtain some characteristics of accessibility and Kato’s chaos. • Answer negatively a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. • A dynamical system is indecomposable if and only if it is weakly transitive. - Abstract: This note obtains some characteristics of accessibility and Kato’s chaos. Applying these results, an accessible dynamical system whose product system is not accessible is constructed, giving a negative answer to a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. Besides, it is proved that every transitive interval self-map is accessible.

  20. Prognostic value of normal stress myocardial perfusion imaging and ventricular function in Japanese asymptomatic patients with type 2 diabetes. A study of based on the J-ACCESS-2 database

    International Nuclear Information System (INIS)

    Matsuo, Shinro; Nakajima, Kenichi; Yamasaki, Yoshimitsu; Kashiwagi, Atsunori; Nishimura, Tsunehiko

    2010-01-01

    This study was designed to determine the clinical risk for hard events after normal single-photon emission computed tomography (SPECT) and to identify the predictors of increased risk in asymptomatic patients with diabetes mellitus, based on a Japanese Assessment of Cardiac Events and Survival Studies by quantitative gated SPECT (J-ACCESS)-2 study. A total of 513 consecutive asymptomatic patients who underwent stress 99m Tc-tetrofosmin SPECT in Japan were included in this study. Based on SPECT image and QGS data, 319 had a summed stress score ≤3, a summed difference score <2 and normal cardiac function (end-systolic volume ≤60 ml, males, ≤40 ml females; left ventricular ejection fraction ≥49%, males, ≥50% females). Myocardial perfusion was normal in 62% of this study population. During a 3-year follow-up, there were a total of 8 cardiac major events (2.5%): 2 cases of sudden death, 5 of acute coronary syndrome, and 1 of hospitalization because of congestive heart failure. The annual major event rate was 0.8%. Subjects undergoing coronary angiography had significantly more major events than those who did not among normal SPECT subjects (P=0.01). Kaplan-Meier analysis showed that the cardiac major events rate was very low, and subjects with normal SPECT can be considered as low risk among asymptomatic patients with diabetes. An excellent prognosis was associated with a normal SPECT in asymptomatic patients with diabetes, so these patients can be exempted from further invasive procedure. (author)

  1. Remote access to mathematical software

    International Nuclear Information System (INIS)

    Dolan, E.; Hovland, P.; More, J.; Norris, B.; Smith, B.

    2001-01-01

    The network-oriented application services paradigm is becoming increasingly common for scientific computing. The popularity of this approach can be attributed to the numerous advantages to both user and developer provided by network-enabled mathematical software. The burden of installing and maintaining complex systems is lifted from the user, while enabling developers to provide frequent updates without disrupting service. Access to software with similar functionality can be unified under the same interface. Remote servers can utilize potentially more powerful computing resources than may be available locally. We discuss some of the application services developed by the Mathematics and Computer Science Division at Argonne National Laboratory, including the Network Enabled Optimization System (NEOS) Server and the Automatic Differentiation of C (ADIC) Server, as well as preliminary work on Web access to the Portable Extensible Toolkit for Scientific Computing (PETSc). We also provide a brief survey of related work

  2. Pediatric vascular access

    International Nuclear Information System (INIS)

    Donaldson, James S.

    2006-01-01

    Pediatric interventional radiologists are ideally suited to provide vascular access services to children because of inherent safety advantages and higher success from using image-guided techniques. The performance of vascular access procedures has become routine at many adult interventional radiology practices, but this service is not as widely developed at pediatric institutions. Although interventional radiologists at some children's hospitals offer full-service vascular access, there is little or none at others. Developing and maintaining a pediatric vascular access service is a challenge. Interventionalists skilled in performing such procedures are limited at pediatric institutions, and institutional support from clerical staff, nursing staff, and technologists might not be sufficiently available to fulfill the needs of such a service. There must also be a strong commitment by all members of the team to support such a demanding service. There is a slippery slope of expected services that becomes steeper and steeper as the vascular access service grows. This review is intended primarily as general education for pediatric radiologists learning vascular access techniques. Additionally, the pediatric or adult interventional radiologist seeking to expand services might find helpful tips. The article also provides education for the diagnostic radiologist who routinely interprets radiographs containing vascular access devices. (orig.)

  3. Access 2010 for dummies

    CERN Document Server

    Ulrich Fuller, Laurie

    2010-01-01

    A friendly, step-by-step guide to the Microsoft Office database application Access may be the least understood and most challenging application in the Microsoft Office suite. This guide is designed to help anyone who lacks experience in creating and managing a database learn to use Access 2010 quickly and easily. In the classic For Dummies tradition, the book provides an education in Access, the interface, and the architecture of a database. It explains the process of building a database, linking information, sharing data, generating reports, and much more.As the Micr

  4. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  5. Access Agent Improving The Performance Of Access Control Lists

    Directory of Open Access Journals (Sweden)

    Thelis R. S.

    2015-08-01

    Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

  6. The conscious access hypothesis: Explaining the consciousness.

    Science.gov (United States)

    Prakash, Ravi

    2008-01-01

    The phenomenon of conscious awareness or consciousness is complicated but fascinating. Although this concept has intrigued the mankind since antiquity, exploration of consciousness from scientific perspectives is not very old. Among myriad of theories regarding nature, functions and mechanism of consciousness, off late, cognitive theories have received wider acceptance. One of the most exciting hypotheses in recent times has been the "conscious access hypotheses" based on the "global workspace model of consciousness". It underscores an important property of consciousness, the global access of information in cerebral cortex. Present article reviews the "conscious access hypothesis" in terms of its theoretical underpinnings as well as experimental supports it has received.

  7. Caracterização de acessos de bananeira com base na concentração de compostos funcionais Characterization of banana accessions with base on functional compounds

    Directory of Open Access Journals (Sweden)

    Edson Perito Amorim

    2011-04-01

    Full Text Available O objetivo deste trabalho foi determinar a concentração de polifenóis totais, flavonóides, vitamina C e carotenóides totais em 61 acessos de banana pertencentes ao Banco Ativo de Germoplasma de bananeira da Embrapa Mandioca e Fruticultura. Foram detectadas diferenças significativas para todas as características analisadas por meio da análise de variância. A média para os teores de polifenóis totais entre os 61 acessos de banana foi de 38,06mg 100g-1, com variação de 12,51mg 100g-1 para o triplóide 'Torp' a 257,80mg 100g-1 para o tetraplóide 'Teparod'. A média para flavonóides foi de 2,09mg 100g-1, variando de 0,85mg 100g-1 ('Maravilha' AAAB a 6,63mg 100g-1 ('Teparod' ABBB. Para vitamina C, a média foi de 21,60mg 100g-1, variando de 8,60mg 100g-1 (tetraplóide 'Bucaneiro' a 76,82mg 100g-1 (tetraplóide 'Teparod'. A média do teor de carotenóides totais foi de 4,34mg g-1, variando de 1,18mg g-1 ('Champa Madras', triplóide ABB a 19,24mg g-1 ('Saney', triplóide AAB. Os diplóides Modok Gier e NBA-14 apresentaram, respectivamente, quatro e cinco vezes mais carotenóides totais que as cultivares do grupo Cavendish ('Nanica', 'Willians' e 'Lacatan'. Esses resultados permitem concluir sobre a possibilidade da obtenção de cultivares com altos níveis de compostos funcionais por meio de cruzamentos e seleção. Cultivares com este perfil têm potencial como alimento funcional, ajudando a prevenir doenças, por meio da neutralização de radicais livres.The objective of this research was to determine the concentration of polyphenols, flavonols, vitamin C and carotenoid and in 61 banana accessions from Musa germplasm collection from Embrapa Cassava and Fruits, Brazil. Was detected significant differences for all characteristic analyzed in ANOVA. The average for polyphenols among the 61 accessions was of 38.06mg 100g-1, with variation of 12.51mg 100g-1 for the triploid 'Torp' to 257.80mg 100g-1 for the tetraploid 'Teparod'. The average

  8. Roundabouts and access management.

    Science.gov (United States)

    2014-03-01

    Transportation engineers and planners are becoming more interested in using roundabouts to address access : management and safety concerns in the transportation system. While roundabouts are being used increasingly in a : variety of contexts, existin...

  9. Market Access and Welfare

    DEFF Research Database (Denmark)

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    According to the literature, well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. Such conflict between welfare and market access...... objectives of trade policy is problematic and calls for finding alternative tariff reform rules that can achieve both objectives at the same time. The present paper contributes to this aim by using a new set of tariff reforms that are based on local optimality. Using such reforms it is shown that market...... access and consumer welfare will always be weakly compatible, in the sense that reforms based on each objective have the same signed effect on the other objective. For strong compatibility, whereby both objectives increase as a result of a locally optimal tariff reform, we derive both a necessary...

  10. KAUST Open Access policy

    KAUST Repository

    Baessa, Mohamed A.

    2017-01-01

    The library plays a critical role in facilitating open access for their researchers, from managing a repository to providing support and information on the OA publication process to their authors. Janis Tyhurst and Dr Imad

  11. Access to the city

    DEFF Research Database (Denmark)

    Andreasen, Manja Hoppe; Møller-Jensen, Lasse

    2017-01-01

    This paper is concerned with access to the city for urban residents living in the periphery of Dar es Salaam, Tanzania. The paper presents an analysis of the mobility practices of residents and investigates the mobility constraints they experience in relation to the limited accessibility provided...... mobility and access to the city for residents in the periphery. Regular mobility is an ingrained part of residents' livelihood strategies. The majority of households rely on one or more members regularly travelling to central parts of the city in relation to their livelihood activities. The analysis...... by road and traffic conditions and highlights how accessibility problems of peripheral settlements are not easily understood separately from the general dysfunctions of the overall mobility system of city....

  12. Critical Access Hospitals (CAH)

    Science.gov (United States)

    ... for Success Am I Rural? Evidence-based Toolkits Economic Impact Analysis Tool Community Health Gateway Sustainability Planning ... hospitals and improve access to healthcare by keeping essential services in rural communities. To accomplish this goal, ...

  13. Remote Network Access (RNA)

    National Research Council Canada - National Science Library

    2002-01-01

    .... Remote Network Access (RNA) includes or is associated with all communication devices/software, firewalls, intrusion detection systems and virus protection applications to ensure security of the OIG, DoD, Network from remote...

  14. Access/AML -

    Data.gov (United States)

    Department of Transportation — The AccessAML is a web-based internet single application designed to reduce the vulnerability associated with several accounts assinged to a single users. This is a...

  15. Access road reclamation

    International Nuclear Information System (INIS)

    Manson, T.; Blok, M.

    1997-01-01

    A general review of the measures involved in restoring abandoned access road sites in British Columbia was presented. Permits and licences are needed for the use of crown land for roads used by the petroleum and natural gas industry for exploration activities. However, the regulatory framework for road site reclamation is not well developed. The nature of access road reclamation is very site-specific. Some of the issues that are considered for all reclamation projects include slope stability, water control, revegetation, soil rehabilitation, access management and monitoring. The primary objective of reclaiming access road sites is to return the site to conditions that are equal or better than pre-disturbance conditions. Restoration measures must be approved by BC Environment and by the Department of Fisheries and Oceans where federal fisheries responsibilities are involved. 54 refs., 5 tabs., 3 figs

  16. Time dependent accessibility

    OpenAIRE

    Kaza, Nikhil

    2015-01-01

    Many place based accessibility studies ignore the time component. Relying on theoretical frameworks that treat distance between two fixed points as constant, these methods ignore the diurnal and seasonal changes in accessibility. Network distances between two nodes are dependent on the network structure and weight distribution on the edges. These weights can change quite frequently and the network structure itself is subject to modification because of availability and unavailability of links ...

  17. The universal access handbook

    CERN Document Server

    Stephanidis, Constantine

    2009-01-01

    In recent years, the field of Universal Access has made significant progress in consolidating theoretical approaches, scientific methods and technologies, as well as in exploring new application domains. Increasingly, professionals in this rapidly maturing area require a comprehensive and multidisciplinary resource that addresses current principles, methods, and tools. Written by leading international authorities from academic, research, and industrial organizations and nonmarket institutions, The Universal Access Handbook covers the unfolding scientific, methodological, technological, and pol

  18. Accessible Geoscience - Digital Fieldwork

    Science.gov (United States)

    Meara, Rhian

    2017-04-01

    Accessible Geoscience is a developing field of pedagogic research aimed at widening participation in Geography, Earth and Environmental Science (GEES) subjects. These subjects are often less commonly associated with disabilities, ethnic minorities, low income socio-economic groups and females. While advancements and improvements have been made in the inclusivity of these subject areas in recent years, access and participation of disabled students remains low. While universities are legally obligated to provide reasonable adjustments to ensure accessibility, the assumed incompatibility of GEES subjects and disability often deters students from applying to study these courses at a university level. Instead of making reasonable adjustments if and when they are needed, universities should be aiming to develop teaching materials, spaces and opportunities which are accessible to all, which in turn will allow all groups to participate in the GEES subjects. With this in mind, the Swansea Geography Department wish to enhance the accessibility of our undergraduate degree by developing digital field work opportunities. In the first instance, we intend to digitise three afternoon excursions which are run as part of a 1st year undergraduate module. Each of the field trips will be digitized into English- and Welsh-medium formats. In addition, each field trip will be digitized into British Sign Language (BSL) to allow for accessibility for D/deaf and hard of hearing students. Subtitles will also be made available in each version. While the main focus of this work is to provide accessible fieldwork opportunities for students with disabilities, this work also has additional benefits. Students within the Geography Department will be able to revisit the field trips, to revise and complete associated coursework. The use of digitized field work should not replace opportunities for real field work, but its use by the full cohort of students will begin to "normalize" accessible field

  19. CERN access cards

    CERN Multimedia

    HR Department

    2007-01-01

    Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.

  20. Vascular Access in Children

    International Nuclear Information System (INIS)

    Krishnamurthy, Ganesh; Keller, Marc S.

    2011-01-01

    Establishment of stable vascular access is one of the essential and most challenging procedures in a pediatric hospital. Many clinical specialties provide vascular service in a pediatric hospital. At the top of the “expert procedural pyramid” is the pediatric interventional radiologist, who is best suited and trained to deliver this service. Growing awareness regarding the safety and high success rate of vascular access using image guidance has led to increased demand from clinicians to provide around-the-clock vascular access service by pediatric interventional radiologists. Hence, the success of a vascular access program, with the pediatric interventional radiologist as the key provider, is challenging, and a coordinated multidisciplinary team effort is essential for success. However, there are few dedicated pediatric interventional radiologists across the globe, and also only a couple of training programs exist for pediatric interventions. This article gives an overview of the technical aspects of pediatric vascular access and provides useful tips for obtaining vascular access in children safely and successfully using image guidance.

  1. Youth access to tobacco.

    Science.gov (United States)

    Rigotti, N A

    1999-01-01

    To start smoking, young people need a supply of tobacco products. Reducing youth access to tobacco is a new approach to preventing tobacco use that has been a focus of federal, state, and local tobacco control efforts over the past decade. All 50 states ban tobacco sales to minors, but compliance is poor because laws are not enforced. Consequently, young people have little trouble obtaining tobacco products. Commercial sources of tobacco (stores and vending machines) are important for underage smokers, who often purchase their own cigarettes. Underage youths also obtain tobacco from noncommercial sources such as friends, relatives, older adolescents, and adults. Educating retailers about tobacco sales laws has not produced long-term improvement in their compliance. Active enforcement of tobacco sales laws changes retailer behavior, but whether this reduces young people's access to tobacco or their tobacco use is not clear. The effectiveness of new local, state, and federal actions that aim to reduce youth access to tobacco remains to be determined. Can enforcing tobacco sales laws reduce young people's access to tobacco? If so, will this prevent or delay the onset of their tobacco use? How will youths' sources of tobacco change as commercial sources are restricted? What are the social (noncommercial) sources of tobacco for minors and how can youths' access to tobacco from these sources be reduced? What is the impact of the new federal policies aimed at reducing youth access to tobacco? Do new state and local laws that ban youth possession or use of tobacco have a net positive or negative impact on youth attitudes, access to tobacco, or tobacco use? What is the relative effectiveness and cost-effectiveness of efforts to reduce the supply of tobacco compared to those that aim to reduce demand for tobacco? Will either work alone or are both necessary to achieve reductions in youth smoking?

  2. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  3. Enterprise Dynamic Access Control (EDAC)

    National Research Council Canada - National Science Library

    Fernandez, Richard

    2005-01-01

    .... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...

  4. Open Access Scholarly Publications as OER

    Directory of Open Access Journals (Sweden)

    Terry Anderson

    2013-06-01

    Full Text Available This paper presents the rationale, common practices, challenges, and some personal anecdotes from a journal editor on the production, use, and re-use of peer-reviewed scholarly articles as open educational resources (OER. The scholarly and professional discourse related to open educational resources has largely focused on open learning objects, courseware, and textbooks. However, especially in graduate education, articles published in scholarly journals are often a major component of the course content in formal education. In addition, open access journal articles are critical to expanding access to knowledge by scholars in the developing world and in fostering citizen science, by which everyone has access to the latest academic information and research results. In this article, I highlight some of the challenges, economic models, and evidence for quality of open access journal content and look at new affordances provided by the Net for enhanced functionality, access, and distribution.In the 17 years since I graduated with a doctorate degree, the climate and acceptance of open access publishing has almost reversed itself. I recall a conversation with my PhD supervisor in which he argued that publishing online was not a viable option as the product would not have permanency, scholarly recognition, or the prestige of a paper publication. His comments reflect the confusion between online resources and those described as open access, but as well illustrate the change in academic acceptance and use of open access products during the past decade. The evolution from paper to online production and consumption is a disruptive technology in which much lower cost and increased accessibility of online work opens the product to a completely new group of potential users. In the case of OER these consumers are primarily students, but certainly access to scholars from all parts of the globe and the availability to support citizen science (Silvertown, 2009

  5. Nuclear information access system

    International Nuclear Information System (INIS)

    Ham, C. H.; Yang, M. H.; Yoon, S. W.

    1998-01-01

    The energy supply in the countries, which have abundant energy resources, may not be affected by accepting the assertion of anti-nuclear and environment groups. Anti-nuclear movements in the countries which have little energy resources may cause serious problem in securing energy supply. Especially, it is distinct in Korea because she heavily depends on nuclear energy in electricity supply(nuclear share in total electricity supply is about 40%).The cause of social trouble surrounding nuclear energy is being involved with various circumstances. However, it is very important that we are not aware of the importance of information access and prepared for such a situation from the early stage of nuclear energy's development. In those matter, this paper analyzes the contents of nuclear information access system in France and Japan which have dynamic nuclear development program and presents the direction of the nuclear access regime through comparing Korean status and referring to progresses of the regime

  6. Sprawl and Accessibility

    Directory of Open Access Journals (Sweden)

    Robert Bruegmann

    2008-07-01

    Full Text Available This essay argues that many of the assumptions that have been made about sprawl are misleading or just wrong. Nowhere has this been more the case than in debates about transportation and access. Because of this, it is not surprising that a good many of the policies advocated by proponents of Smart Growth would almost certainly lead to reduced mobility and impaired accessibility for a large part of the population. At very least, the debates over sprawl have pitted private vs. public transportation in a way that has contributed to serious underfunding of transportation infrastructure of all kinds.

  7. Quantum random access memory

    OpenAIRE

    Giovannetti, Vittorio; Lloyd, Seth; Maccone, Lorenzo

    2007-01-01

    A random access memory (RAM) uses n bits to randomly address N=2^n distinct memory cells. A quantum random access memory (qRAM) uses n qubits to address any quantum superposition of N memory cells. We present an architecture that exponentially reduces the requirements for a memory call: O(log N) switches need be thrown instead of the N used in conventional (classical or quantum) RAM designs. This yields a more robust qRAM algorithm, as it in general requires entanglement among exponentially l...

  8. Disruption - Access cards service

    CERN Multimedia

    2014-01-01

    We would like to inform you that between 10 November and 15 December 2014, the access cards service in Building 55 will be disrupted, as the GS Department has decided to improve the facilities for users of this building. During the work, you will find the registration, biometric registration and dosimeter exchange services on the second floor of Building 55 and the vehicle sticker service on the ground floor along with the access cards service. We thank you for your understanding and apologise for any inconvenience caused.

  9. Central Venous Access

    International Nuclear Information System (INIS)

    Ganeshan, Arul; Warakaulle, Dinuke R.; Uberoi, Raman

    2007-01-01

    Central venous access plays an important role in the management of an ever-increasing population of patients ranging from those that are critically ill to patients with difficult clinical access. Interventional radiologists are key in delivering this service and should be familiar with the wide range of techniques and catheters now available to them. A comprehensive description of these catheters with regard to indications, technical aspects of catheterization, success rates, and associated early and late complications, as well as a review of various published guidelines on central venous catheter insertion are given in this article

  10. Editorial - Open Access and accessing openness

    Directory of Open Access Journals (Sweden)

    Yngve Nordkvelle

    2008-12-01

    Full Text Available Seminar.net enters it’s fourth year, and has reached a state of maturity in a number of meanings: it receives manuscripts from all continents, the articles are read from 134 countries, of which India represents the highest number of readers, a number of articles have been read by more than 10 000 interested persons, and the frequency of issues is now three per year, and will reach four by next year. Interested parties now approach us in order to learn about our policies and practices.It takes time to become established and influential in the sense that articles are cited and referred to in prestigious publications. Still, the most prestigious publications are on paper. Many countries now embark on a policy that rewards researchers that publish in international journals, preferably in English. National languages are rendered less significant. In the UK, the research assessment exercise (RAE, and several other countries with a publication or citation based reward system in research, tend to favour quantitative dimensions at the expense of the quality of the publication. International publishing houses are huge profit-making companies that over years have increased their profit rates, charging increasingly economically pressured higher education institution with high subscription rates. With the advent of electronic publishing their position is severely challenged. It has been noted that the most significant publication of the last couple of decades was an electronic publication: Tim Berners Lee published the protocol for the World Wide Web in 1990. It was never refereed, nor was controlled by appointed gatekeepers of the “establishment”. The number of Open Access publications is rising every day, and the number of e-journals for academic publishing is reaching higher and higher numbers. In a recent case The Faculty of Arts and Sciences at Harvard University decided, that Harvard employees must publish all their material simultaneously on the

  11. Functionality and homogeneity.

    NARCIS (Netherlands)

    2011-01-01

    Functionality and homogeneity are two of the five Sustainable Safety principles. The functionality principle aims for roads to have but one exclusive function and distinguishes between traffic function (flow) and access function (residence). The homogeneity principle aims at differences in mass,

  12. Web accessibility and open source software.

    Science.gov (United States)

    Obrenović, Zeljko

    2009-07-01

    A Web browser provides a uniform user interface to different types of information. Making this interface universally accessible and more interactive is a long-term goal still far from being achieved. Universally accessible browsers require novel interaction modalities and additional functionalities, for which existing browsers tend to provide only partial solutions. Although functionality for Web accessibility can be found as open source and free software components, their reuse and integration is complex because they were developed in diverse implementation environments, following standards and conventions incompatible with the Web. To address these problems, we have started several activities that aim at exploiting the potential of open-source software for Web accessibility. The first of these activities is the development of Adaptable Multi-Interface COmmunicator (AMICO):WEB, an infrastructure that facilitates efficient reuse and integration of open source software components into the Web environment. The main contribution of AMICO:WEB is in enabling the syntactic and semantic interoperability between Web extension mechanisms and a variety of integration mechanisms used by open source and free software components. Its design is based on our experiences in solving practical problems where we have used open source components to improve accessibility of rich media Web applications. The second of our activities involves improving education, where we have used our platform to teach students how to build advanced accessibility solutions from diverse open-source software. We are also partially involved in the recently started Eclipse projects called Accessibility Tools Framework (ACTF), the aim of which is development of extensible infrastructure, upon which developers can build a variety of utilities that help to evaluate and enhance the accessibility of applications and content for people with disabilities. In this article we briefly report on these activities.

  13. Complication with intraosseous access

    DEFF Research Database (Denmark)

    Hallas, Peter; Brabrand, Mikkel; Folkestad, Lars

    2013-01-01

    with aspiration of bone marrow (12.3%), and bended/broken needle (4.0%). When using an established IO access the reported complications were difficulties with injection fluid and drugs after IO insertion (7.4%), slow infusion (despite use of pressure bag) (8.8%), displacement after insertion (8...

  14. College Access Marketing

    Science.gov (United States)

    Tremblay, Christopher W.

    2011-01-01

    College Access Marketing (CAM) is a relatively new phenomenon that seeks to positively influence the college-going rate. This report defines CAM, describes CAM examples, and discusses how CAM seeks to counter barriers to college. It explores four main elements of CAM: information, marketing, advocacy, and social mobilization. Further, it…

  15. Funding scientific open access

    International Nuclear Information System (INIS)

    Canessa, E.; Fonda, C.; Zennaro, M.

    2006-11-01

    In order to reduce the knowledge divide, more Open Access Journals (OAJ) are needed in all languages and scholarly subject areas that exercise peer-review or editorial quality control. To finance needed costs, it is discussed why and how to sell target specific advertisement by associating ads to given scientific keywords. (author)

  16. Accessing vs Sourcing Knowledge

    DEFF Research Database (Denmark)

    Awate, Snehal; Larsen, Marcus M.; Mudambi, Ram

    2015-01-01

    to get on par with industry leaders. An in-depth comparison of knowledge flows reveals that within AMNEs, headquarters often serves the primary source of knowledge for R&D subsidiaries. In contrast, within EMNEs, headquarters accesses knowledge from R&D subsidiaries in advanced economies for innovation...

  17. KAUST Open Access policy

    KAUST Repository

    Baessa, Mohamed A.

    2017-03-07

    The transition to open access (OA) is being driven by funders, libraries, researchers and publishers around the world, and is having an impact on us all. It is inevitable that different countries, organisations and disciplines are moving at different rates towards an OA model, and it is this that we will focus on in this session. Drawing on experiences from across Europe and the Middle East we will provide perspectives from both a global publisher and institutions based in the region. Taylor & Francis take a flexible, evidence-based approach to open access, providing a choice of publication routes for our authors, and a choice of agreements for our library customers. Carolyn will outline some of the open access developments, opportunities and challenges at Taylor & Francis. The library plays a critical role in facilitating open access for their researchers, from managing a repository to providing support and information on the OA publication process to their authors. Janis Tyhurst and Dr Imad Bachir will each give an overview of how this is being managed by their institution. There will be an opportunity for questions and discussion with the panel.

  18. Open access to transmission

    International Nuclear Information System (INIS)

    Keith, D.M.

    1996-01-01

    For the past 12 to 15 years, the US electric power and energy industry and its federal regulators have been going through a prolonged exercise leading to opening up the national interconnected transmission grid for all qualified wholesale users to have open and equal access. The debates have been painful in a sense that not all parties - especially some of the transmission system owning utilities - believe that the concept of Open Access is achievable, due to technical constraints on the systems. The present Open Access activity is limited to wholesales transaction under the federal jurisdiction, but several states are either experimenting with or considering retail wheeling. In fact, the FERC - Federal Energy Regulatory Commission - has already expanded its view to embrace retail transmission, if the retail transaction involves the use of the interstate transmission systems which are under FERC's jurisdiction. This paper delves into some of the results of the technical cost and pricing analysis for open access. The statutes and resulting regulations are not addressed herein. (author). 1 fig

  19. The Open Access Dilemma

    Science.gov (United States)

    Pratt, Timothy

    2017-01-01

    Community colleges, with their commitment to open access, admit millions of students each year who are unprepared for college-level work, even though they have earned a high-school diploma. For decades the schools had a built-in base of students attracted to their open doors and relative affordability. But enrollment at public two-year college has…

  20. Coded Random Access

    DEFF Research Database (Denmark)

    Paolini, Enrico; Stefanovic, Cedomir; Liva, Gianluigi

    2015-01-01

    The rise of machine-to-machine communications has rekindled the interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered as ...

  1. Planning for Accessibility.

    Science.gov (United States)

    Spoor, Dana L.

    1997-01-01

    Argues that barrier-free designs should be incorporated in the first steps of school facility planning to avoid the difficulties in meeting Americans with Disabilities Act (ADA) guidelines during renovations. Explains why not all barriers need be removed to make a facility accessible to everyone. Discusses issues involving ADA guidelines and child…

  2. ACCESS Project: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Weller, Heiko [Robert Bosch, LLC, Farmington Hills, MI (United States)

    2015-04-01

    The ACCESS project addressed the development, testing, and demonstration of the proposed advanced technologies and the associated emission and fuel economy improvement at an engine dynamometer and on a full-scale vehicle. Improve fuel economy by 25% with minimum performance penalties Achieve SULEV level emissions with gasoline Demonstrate multi-mode combustion engine management system

  3. Multiple Access Communications

    DEFF Research Database (Denmark)

    This book constitutes the proceedings of the 9th International Workshop on Multiple Access Communications, MACOM 2016, held in Aalborg, Denmark, in November 2016. The 10 full papers presented in this volume were carefully reviewed and selected from 12 submissions. They were organized in topical...

  4. Kinds of Access

    DEFF Research Database (Denmark)

    Overgaard, Morten; Sandberg, Kristian

    2014-01-01

    that there is not only a theoretical, but also an empirical difference between different methods of reporting. We hypothesise that differences in the sensitivity of different scales may reveal that different types of access are used to issue direct reports about experiences and metacognitive reports about...

  5. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  6. Access 2010 All-in-One For Dummies

    CERN Document Server

    Barrows, Alison; Stockman, Joseph C

    2010-01-01

    The all-in-one reference to all aspects of Microsoft Access 2010. If you want to learn Microsoft Access inside and out, the nine minibooks in this easy-access reference are exactly what you need. Read the book cover to cover, or jump into any of the minibooks for the instruction and topics you need most. Learn how to connect Access to SQL Server, manipulate your data locally, use nifty new features from Office 2010 such as the enhanced Ribbon, create queries and macros like a champ, and much more. From the basics to advanced functions, it's what you need to make Access more accesssible.:; Show

  7. Digital Scholarship and Open Access

    Science.gov (United States)

    Losoff, Barbara; Pence, Harry E.

    2010-01-01

    Open access publications provide scholars with unrestricted access to the "conversation" that is the basis for the advancement of knowledge. The large number of open access journals, archives, and depositories already in existence demonstrates the technical and economic viability of providing unrestricted access to the literature that is the…

  8. Random Access to Grammar-Compressed Strings

    DEFF Research Database (Denmark)

    Bille, Philip; Landau, Gad M.; Raman, Rajeev

    2011-01-01

    (n) is the inverse of the kth row of Ackermann's function. Our representations also efficiently support decompression of any substring in S: we can decompress any substring of length m in the same complexity as a single random access query and ad- ditional O(m) time. Combining these results with fast algorithms...

  9. Support open access publishing

    DEFF Research Database (Denmark)

    Ekstrøm, Jeannette

    2013-01-01

    Projektet Support Open Access Publishing har til mål at få opdateret Sherpa/Romeo databasen (www.sherpa.ac.uk/romeo) med fagligt relevante, danske tidsskrifter. Projektet skal endvidere undersøge mulighederne for at få udviklet en database, hvor forskere på tværs af relevante tidsskriftsinformati......Projektet Support Open Access Publishing har til mål at få opdateret Sherpa/Romeo databasen (www.sherpa.ac.uk/romeo) med fagligt relevante, danske tidsskrifter. Projektet skal endvidere undersøge mulighederne for at få udviklet en database, hvor forskere på tværs af relevante...

  10. Analysing Access Control Specifications

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hansen, René Rydhof

    2009-01-01

    When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most...... common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker’s actions usually will be logged as permissible, standard actions—if they are logged at all....... Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set...

  11. Access to Research Inputs

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    2015-01-01

    The viability of modern open science norms and practices depends on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50 % more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry...

  12. Access to Research Inputs

    DEFF Research Database (Denmark)

    Czarnitzki, Dirk; Grimpe, Christoph; Pellens, Maikel

    The viability of modern open science norms and practices depend on public disclosure of new knowledge, methods, and materials. However, increasing industry funding of research can restrict the dissemination of results and materials. We show, through a survey sample of 837 German scientists in life...... sciences, natural sciences, engineering, and social sciences, that scientists who receive industry funding are twice as likely to deny requests for research inputs as those who do not. Receiving external funding in general does not affect denying others access. Scientists who receive external funding...... of any kind are, however, 50% more likely to be denied access to research materials by others, but this is not affected by being funded specifically by industry....

  13. IMPROVING ACCESS TO DRUGS

    Directory of Open Access Journals (Sweden)

    Max Joseph Herman

    2012-11-01

    Full Text Available Although essentially not all therapies need drug intervention, drugs is still an important components in health sector, either in preventive, curative, rehabilitative or promotion efforts. Hence the access to drugs is a main problem, either in international or national scale even to the smallest unit. The problem on access to drugs is very complicated and cannot be separated especially from pharmacy management problems; moreover in general from the overall lack of policy development and effective of health policy, and also the implementation process. With the policy development and effective health policy, rational drug uses, sufficient health service budget so a country can overcome the health problems. Besides infrastructures, regulations, distribution and cultural influences; the main obstacles for drug access is drugs affordability if the price of drugs is an important part and determined by many factors, especially the drug status whether is still patent orgenerics that significantly decrease cost of health cares and enhance the drugs affordability. The determination of essential drug prices in developing countries should based on equity principal so that poor people pay cheaper and could afford the essential drugs. WHO predicts two third of world population can not afford the essential drugs in which in developing countries, some are because of in efficient budget allocation in consequence of drug distribution management, including incorrect selection and allocation and also irrational uses. In part these could be overcome by enhancing performances on the allocation pharmacy needs, including the management of information system, inventory management, stock management and the distribution. Key words: access, drugs, essential drugs, generic drugs

  14. Telecommunication access to INIS

    International Nuclear Information System (INIS)

    Scheel, H.; Breitfeld, B.; Huebner, B.

    1983-01-01

    Proceeding from the features of on-line retrieval from the INIS data base, a description is given of the technical and organizational conditions established by the national INIS Centre of the GDR in using the INIS direct access service. Data are presented on the structure of search queries, retrieval precision, and connect time to the computer. Experience has shown that efficient dialogue searching necessitates the searcher's skill and familiarity with the system. (author)

  15. Direct access to INIS

    International Nuclear Information System (INIS)

    Zheludev, I.S.; Romanenko, A.G.

    1981-01-01

    Librarians, researchers, and information specialists throughout the world now have the opportunity for direct access to coverage of almost 95% of the world's literature dealing with the peaceful uses of atomic energy and nuclear science. This opportunity has been provided by the International Nuclear Information System (INIS) of the IAEA. INIS, with the voluntary collaboration of more than 60 of the Agency's Member States, maintains a comprehensive, computer-resident data-base, containing the bibliographic details plus informative abstracts of the bulk of the world's literature on nuclear science and technology. Since this data-base is growing at a rate of 75,000 items per year, and already contains more than 500,000 items, it is obviously important to be able to search this collection conveniently and efficiently. The usefulness of this ability is enhanced when other data-bases on related subjects are made available on an information network. During the early 1970s, on-line interrogation of large bibliographic data-bases became the accepted method for searching this type of information resource. Direct interaction between the searcher and the data-base provides quick feed-back resulting in improved literature listings for launching research and development projects. On-line access enables organizations which cannot store a large data-base on their own computer to expand the information resources at their command. Because of these advantages, INIS undertook to extend to interested Member States on-line access to its data-base in Vienna

  16. ADOPT Open Access

    CERN Multimedia

    2007-01-01

    Are you writing a theoretical paper? An experimental one? Or one about instrumentation? You can publish it in Open Access. Now. Read how... You might have heard about Open Access, the next big thing in scientific publishing. The idea is to make the results of your (publicly funded) research free to read for everyone out there ... not only those lucky ones who work in places where libraries can afford to purchase the expensive subscriptions to scientific journals. CERN, DESY and other particle physics institutes have accepted an offer by one of the leading journals in High Energy Physics, JHEP: our libraries will pay a special subscription fee, and, in exchange, all articles with at least one author from our institutes will be published in Open Access. Anyone, anywhere and anytime will be able to read them, without any financial barrier! If you are writing an instrumentation paper, you can submit it to JINST and benefit from the same offer. This is a major step forward in the planned conversion of existi...

  17. Open-Access Publishing

    Directory of Open Access Journals (Sweden)

    Nedjeljko Frančula

    2013-06-01

    Full Text Available Nature, one of the most prominent scientific journals dedicated one of its issues to recent changes in scientific publishing (Vol. 495, Issue 7442, 27 March 2013. Its editors stressed that words technology and revolution are closely related when it comes to scientific publishing. In addition, the transformation of research publishing is not as much a revolution than an attrition war in which all sides are buried. The most important change they refer to is the open-access model in which an author or an institution pays in advance for publishing a paper in a journal, and the paper is then available to users on the Internet free of charge.According to preliminary results of a survey conducted among 23 000 scientists by the publisher of Nature, 45% of them believes all papers should be published in open access, but at the same time 22% of them would not allow the use of papers for commercial purposes. Attitudes toward open access vary according to scientific disciplines, leading the editors to conclude the revolution still does not suit everyone.

  18. Airport Surface Access and Mobile Apps

    Directory of Open Access Journals (Sweden)

    Luis Martin-Domingo

    2015-02-01

    Full Text Available Purpose: Airport Surface Access faces two main opposite issues: (1 cars, being the main transport mode, contribute to the increasing level of congestion and pollution of cities; and (2 simultaneously, parking fees are one important source of airports commercial revenue, creating a dilemma for airports when facing the problem. Following the recent trend of air passengers travelling with Smartphone (78% in 2013, the purpose of this paper is to monitor the adoption of mobile Applications (Apps by airports and to analyze if the information and functions provided in those Apps can help to overcome the above two issues. Design/methodology/approach: 31 iPhone App of some of the largest European airports were evaluated in the lab using the evaluation model of Destinations Mobile Applications (Scolari and Fernández-Cavia 2014 adapted for for the Airport Surface Access on Airport Apps Findings and Originality/value: The Apps evaluated provided a very limited functionality to help passengers to plan and book their trips to/from the airports on public transports and gave high priority to parking information and services. Originality/value: Although Airport Surface Access has been a widely researched, the originality of this paper is the analysis of airport mobile Apps as a potential tool for airports to deal with the surface airport access problems.Access, Airports, Mobile Internet, Commercial Revenues

  19. The linked medical data access control framework.

    Science.gov (United States)

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios. Copyright © 2014 Elsevier Inc. All rights reserved.

  20. Database theory and SQL practice using Access

    International Nuclear Information System (INIS)

    Kim, Gyeong Min; Lee, Myeong Jin

    2001-01-01

    This book introduces database theory and SQL practice using Access. It is comprised of seven chapters, which give description of understanding database with basic conception and DMBS, understanding relational database with examples of it, building database table and inputting data using access 2000, structured Query Language with introduction, management and making complex query using SQL, command for advanced SQL with understanding conception of join and virtual table, design on database for online bookstore with six steps and building of application with function, structure, component, understanding of the principle, operation and checking programming source for application menu.

  1. Functional Poly(ε-caprolactone)s via Copolymerization of ε-Caprolactone and Pyridyl Disulfide-Containing Cyclic Carbonate: Controlled Synthesis and Facile Access to Reduction-Sensitive Biodegradable Graft Copolymer Micelles

    NARCIS (Netherlands)

    Chen, Wei; Zou, Yan; Jia, Junna; Meng, Fenghua; Cheng, Ru; Deng, Chao; Feijen, Jan; Zhong, Zhiyuan

    2013-01-01

    Pyridyl disulfide-functionalized cyclic carbonate (PDSC) monomer was obtained in four straightforward steps from 3-methyl-3-oxetanemethanol and exploited for facile preparation of functional poly(ε-caprolactone) (PCL) containing pendant pyridyl disulfide (PDS) groups via ring-opening

  2. Web accessibility standards and disability: developing critical perspectives on accessibility.

    Science.gov (United States)

    Lewthwaite, Sarah

    2014-01-01

    Currently, dominant web accessibility standards do not respect disability as a complex and culturally contingent interaction; recognizing that disability is a variable, contrary and political power relation, rather than a biological limit. Against this background there is clear scope to broaden the ways in which accessibility standards are understood, developed and applied. Commentary. The values that shape and are shaped by legislation promote universal, statistical and automated approaches to web accessibility. This results in web accessibility standards conveying powerful norms fixing the relationship between technology and disability, irrespective of geographical, social, technological or cultural diversity. Web accessibility standards are designed to enact universal principles; however, they express partial and biopolitical understandings of the relation between disability and technology. These values can be limiting, and potentially counter-productive, for example, for the majority of disabled people in the "Global South" where different contexts constitute different disabilities and different experiences of web access. To create more robust, accessible outcomes for disabled people, research and standards practice should diversify to embrace more interactional accounts of disability in different settings. Implications for Rehabilitation Creating accessible experiences is an essential aspect of rehabilitation. Web standards promote universal accessibility as a property of an online resource or service. This undervalues the importance of the user's intentions, expertize, their context, and the complex social and cultural nature of disability. Standardized, universal approaches to web accessibility may lead to counterproductive outcomes for disabled people whose impairments and circumstances do not meet Western disability and accessibility norms. Accessible experiences for rehabilitation can be enhanced through an additional focus on holistic approaches to

  3. Accessibility and inclusion informational

    Directory of Open Access Journals (Sweden)

    Mônica Sena de Souza

    2013-06-01

    Full Text Available Introduction: Discusses the role of information professionals in meeting the informational demands of people with disabilities in the information society. The librarian is crucial for the effectiveness and success in the informational inclusion of people with disabilities, considering also continuing education for their professional qualification.Objective: To provide reflections on the role of the librarian in serving users with disabilities, highlighting the need for improvement in information units, identified in the scientific literature with regard to accessibility.Methodology: Literature search, based on a review of literature in books and scientific papers, highlighting the main authors: Adams (2000, Mazzoni (2001 and Sassaki (1997, 2002, 2005.Results: The lack of informational access for people with disabilities hampers their social and political participation, hence, reduces its condition of citizenship.Conclusion: The librarian responsible for seeking continuing education, greater involvement in the events of the area and the constant search for job training, which will reflect on the best service the information needs of users with disabilities.

  4. Art : accessible, renewable technology

    International Nuclear Information System (INIS)

    Middleton, C.D.

    2004-01-01

    This paper focuses on the role of non-governmental organization (NGO) citizen groups in Ontario in the use and production of electricity. NGOs have the potential to act both directly on their own accord, and indirectly by pressuring government and others. Current demand for electricity is divided between industrial, commercial and residential users. Citizens have an important role to play in reducing energy demand. On the supply side, there is a revival of interest in renewable energy based on wind, photovoltaic and local-hydro technologies as a result of the escalating environmental and economic costs of coal and nuclear generation. However, citizen groups have greater interest and enthusiasm than technical expertise, creating a mismatch between technological solutions and human need or use of them. This paper discusses how this mismatch applies to renewable-energy technologies, many of which are not especially user-friendly, or accessible. While alternative technologies are increasingly welcomed by government, industry is developing a large and growing array of technological devices. In between this is the citizen, who, despite keen interest, can be overwhelmed by the complexity of the situation. This paper links the theoretical perspective to the real world with a discussion of the dynamics between people and renewable energy in citizen groups and makes particular reference to one group, Citizens for Renewable Energy, that has been making renewable energy technology more accessible to its members for over a decade

  5. Access Control Management for SCADA Systems

    Science.gov (United States)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  6. The Practice of Hospital Intranet Terminal Access Control Solution

    Institute of Scientific and Technical Information of China (English)

    QI Shi-tao; TANG Li-ming

    2016-01-01

    Along with the increasingly urgent management needs of intranet terminals in hospital, and large scaled deployment of terminal management system, terminal access control has become one of the standard functions of terminal management. This paper mainly aims at some simple research for the system construction of hospital intranet terminal access control.

  7. Essential Medicines in Nigeria: Foregrounding Access to Affordable ...

    African Journals Online (AJOL)

    Abstract. Within every functional healthcare system, access to quality and affordable essential medicine stands out as one of the building blocks. However ... Keywords: Access to medicines, Essential medicines, Healthcare, Public health facilities, Counterfeit medicines, Traditional medicines, Health systems, Systems theory ...

  8. Asymptotic performance modelling of DCF protocol with prioritized channel access

    Science.gov (United States)

    Choi, Woo-Yong

    2017-11-01

    Recently, the modification of the DCF (Distributed Coordination Function) protocol by the prioritized channel access was proposed to resolve the problem that the DCF performance worsens exponentially as more nodes exist in IEEE 802.11 wireless LANs. In this paper, an asymptotic analytical performance model is presented to analyze the MAC performance of the DCF protocol with the prioritized channel access.

  9. 78 FR 30226 - Accessibility Requirements for Internet Browsers

    Science.gov (United States)

    2013-05-22

    ... software, such as an Internet browser, that it provides. Among other things, this means that the functions... CG Docket No. 10-145; FCC 13-57] Accessibility Requirements for Internet Browsers AGENCY: Federal... Act requires Internet browsers built into mobile phones to be accessible to individuals who are blind...

  10. Predictors of nonfunctional arteriovenous access at hemodialysis initiation and timing of access creation: A registry-based study.

    Directory of Open Access Journals (Sweden)

    Natalia Alencar de Pinho

    Full Text Available Determinants of nonfunctional arteriovenous (AV access, including timing of AV access creation, have not been sufficiently described. We studied 29 945 patients who had predialysis AV access placement and were included in the French REIN registry from 2005 through 2013. AV access was considered nonfunctional when dialysis began with a catheter. We estimated crude and adjusted odds ratio (OR with 95% confidence intervals (CI of nonfunctional versus functional AV access associated with case-mix, facility characteristics, and timing of AV access creation. Analyses were stratified by dialysis start condition (planned or as an emergency and comorbidity profile. Overall, 18% patients had nonfunctional AV access at hemodialysis initiation. In the group with planned dialysis start, female gender (OR 1.43, 95% CI 1.32-1.56, diabetes (OR 1.28, 95% CI 1.15-1.44, and a higher number of cardiovascular comorbidities (OR 1.27, 95% CI 1.09-1.49, and 1.31, 1.05-1.64, for 3 and >3 cardiovascular comorbidities versus none, respectively were independent predictors of nonfunctional AV access. A higher percentage of AV access creation at the region level was associated with a lower rate of nonfunctional AV access (OR 0.98, 95% CI 0.98-0.99 per 1% increase. The odds of nonfunctional AV access decreased as time from creation to hemodialysis initiation increased up to 3 months in nondiabetic patients with fewer than 2 cardiovascular comorbidities and 6 months in patients with diabetes or 2 or more such comorbidities. In conclusion, both patient characteristics and clinical practices may play a role in successful AV access use at hemodialysis initiation. Adjusting the timing of AV access creation to patients' comorbidity profiles may improve functional AV access rates.

  11. NLM Emergency Access Initiative: FAQs

    Science.gov (United States)

    Facebook Visit us on Twitter Visit us on Youtube Emergency Access Initiative Home | Journals | Books | Online Databases | FAQs Take Short Survey FAQ What is the Emergency Access Initiative? The Emergency Access Initiative (EAI) is a collaborative partnership between NLM and participating publishers to

  12. Single access laparoscopic nephrectomy

    Directory of Open Access Journals (Sweden)

    Jay D Raman

    2008-01-01

    Full Text Available Laparoscopic nephrectomy has assumed a central role in the management of benign and malignant kidney diseases. While laparoscopy is less morbid than open surgery, it still requires several incisions each at least 1-2 cm in length. Each incision carries morbidity risks of bleeding, hernia and/or internal organ damage, and incrementally decreases cosmesis. An alternative to conventional laparoscopy is single access or keyhole surgery, which utilizes magnetic anchoring and guidance system (MAGS technology or articulating laparoscopic instruments. These technical innovations obviate the need to externally space trocars for triangulation, thus allowing for the creation of a small, solitary portal of entry into the abdomen. Laboratory and early clinical series demonstrate feasibility as well as safe and successful completion of keyhole nephrectomy. Future work is necessary to improve existing instrumentation, increase clinical experience, assess benefits of this surgical approach, and explore other potential applications for this technique.

  13. Accessibility Long Term Perspectives

    Directory of Open Access Journals (Sweden)

    Kay Axhausen

    2008-11-01

    Full Text Available Improved accessibility and its correlate lower generalized cost of contact, travel and transport have been sought by dynamic human societies for their economic and social benefits through- out recorded history. The paper will reflect about this process at a number of different spatial and temporal scales based on a conceptual model. Looking back at European history, it will trace the interaction between Christaller's logic of local market areas and the idea of (low contact cost network cities. Focusing on Switzerland since 1950 it will show how network investment changed the relative distribution of population and employment and how this interacted with changes in the preferences of the travelers. Using a recent snapshot of how a substantial sample of Swiss maintain their social networks over often very large areas, it will try to answer the question of what will happen in the future, if the current trend of ever lower costs of contact will persist.

  14. AccessCulture

    DEFF Research Database (Denmark)

    Valtysson, Bjarki

    of the European Union, and how its cultural policy responds to the changes that the digital paradigm has brought upon the field. The self-publishing features of various Web 2.0 platforms, along with the interactive and distributional potentials that the Internet offers, have given rise to what is referred to here...... in cultural production and consumption. The first part of this works looks at how these changes respond to the field of cultural policy, as well as suggesting a possible culturepolitical reaction in a model which I refer to as access culture. In terms of theoretical approach, the notion of digital cultural...... of YouTube, MySpace, Facebook and Flickr, along with lesser known platforms such as the animated short film Elephants Dream, the BBC's Creative Archive, various Internet artworks and the Internet Archive. I furthermore introduce the copyright system Creative Commons in order to suggest legal, widely...

  15. Access For All

    DEFF Research Database (Denmark)

    Andersen, Ove Kjeld; Hjulmand, Christian

    2005-01-01

    Approximately 30% of the Danish population has severe problems in reading everyday text. In the light of the increasing amount of text available on the Internet this poses a democratic challenge to ensure “equal access” to information. The Talking Internet service - Access For All (AFA) - offers...... a free Internet-based tool for reading aloud any marked text with a synthetic voice. The only requirements are a standard equipped PC running a recent Windows OS and an Internet connection. Experiences gathered from running the service for more than 28 months underline the viability of the concept....... There is a clear need for a free internet based Danish text-to-speech synthesizer. Furthermore, the current state of technology i.e. internet bandwidth, response time and server technology is sufficient for setting up an online automatic reading service that is used by steadily growing number of individuals...

  16. Chemists, Access, Statistics

    Science.gov (United States)

    Holmes, Jon L.

    2000-06-01

    New JCE Internet Feature at JCE Online Biographical Snapshots of Famous Chemists is a new JCE Internet feature on JCE Online. Edited by Barbara Burke, this feature provides biographical information on leading chemists, especially women and minority chemists, fostering the attitude that the practitioners of chemistry are as human as those who endeavor to learn about it. Currently, the column features biographical "snapshots" of 30 chemists. Each snapshot includes keywords and bibliography and several contain links to additional online information about the chemist. More biographical snapshots will appear in future installments. In addition, a database listing over 140 women and minority chemists is being compiled and will be made available online with the snapshots in the near future. The database includes the years of birth and death, gender and ethnicity, major and minor discipline, keywords to facilitate searching, and references to additional biographical information. We welcome your input into what we think is a very worthwhile resource. If you would like to provide additional biographical snapshots, see additional chemists added to the database, or know of additional references for those that are already in the database, please contact JCE Online or the feature editor. Your feedback is welcome and appreciated. You can find Biographical Snapshots of Famous Chemists starting from the JCE Online home page-- click the Features item under JCE Internet and then the Chemist Bios item. Access JCE Online without Name and Password We have recently been swamped by libraries requesting IP-number access to JCE Online. With the great benefit IP-number authentication gives to librarians (no user names and passwords to administer) and to their patrons (no need to remember and enter valid names and passwords) this is not surprising. If you would like access to JCE Online without the need to remember and enter a user name and password, you should tell your librarian about our

  17. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  18. Web services interface to EPICS channel access

    Institute of Scientific and Technical Information of China (English)

    DUAN Lei; SHEN Liren

    2008-01-01

    Web services is used in Experimental Physics and Industrial Control System (EPICS). Combined with EPICS Channel Access protocol, Web services' high usability, platform independence and language independence can be used to design a fully transparent and uniform software interface layer, which helps us complete channel data acquisition, modification and monitoring functions. This software interface layer, a cross-platform of cross-language,has good interopcrability and reusability.

  19. Web services interface to EPICS channel access

    International Nuclear Information System (INIS)

    Duan Lei; Shen Liren

    2008-01-01

    Web services is used in Experimental Physics and Industrial Control System (EPICS). Combined with EPICS Channel Access protocol, Web services high usability, platform independence and language independence can be used to design a fully transparent and uniform software interface layer, which helps us complete channel data acquisition, modification and monitoring functions. This software interface layer, a cross-platform of cross-language, has good interoperability and reusability. (authors)

  20. The conscious access hypothesis: Explaining the consciousness

    OpenAIRE

    Prakash, Ravi

    2008-01-01

    The phenomenon of conscious awareness or consciousness is complicated but fascinating. Although this concept has intrigued the mankind since antiquity, exploration of consciousness from scientific perspectives is not very old. Among myriad of theories regarding nature, functions and mechanism of consciousness, off late, cognitive theories have received wider acceptance. One of the most exciting hypotheses in recent times has been the ?conscious access hypotheses? based on the ?global workspac...

  1. Morphology, production, and chemical content performance of black rice Matesih accession with several comparisons

    Science.gov (United States)

    Nandariyah; Purwanto, E.; Meidini, A. N.

    2018-03-01

    Rice (Oryza sativa L.) is an important food crop in Indonesia. In Matesih area, Karanganyar, recently found new varieties of black rice cultured by local farmers which morphology and chemical content have not yet identified. The purpose of this research was to obtain information of morphology, production, and chemical content of black rice matesih accession and to compare the appearance in order to detect the superiority of black rice matesih accession with the comparison of other accession of black rice. There were four accessions of black rice tested, namely Matesih Accession, Klaten Accession, Toraja, and Cempo. Research data were divided into qualitative data which processed by scoring, and quantitative data are processed with simple descriptive statistic. The kinship test was done by using NTSYSpc program with SIMQual and SIMInt function. The observation of qualitative properties indicates that accession matesih has a form that is relatively similar to other accessions. Qualitatively, accession matesih superior at leaf length, leaf width, plant height and culm diameter. Klaten accession has higher production than accession matesih. Matesih accession has the advantage of having shorter period on heading time and harvest time than other accessions. Matesih accession has the highest amylose content, lower protein content than klaten accession and lower content of anthocyanin than toraja accession. The kinship analysis showed that matesih accession and klaten accession has close kinship.

  2. Public Access and Open Access: Is There a Difference? | Poster

    Science.gov (United States)

    By Robin Meckley, Contributing Writer, and Tracie Frederick, Guest Writer Open access and public access—are they different concepts or are they the same? What do they mean for the researchers at NCI at Frederick? “Open-access (OA) literature is digital, online, free of charge, and free of most copyright and licensing restrictions. What makes it possible is the Internet and the consent of the author or copyright-holder,” according to an open access website maintained by Peter Suber, director, Harvard Open Access Project.

  3. Accessing the ANW dictionary

    NARCIS (Netherlands)

    Moerdijk, F.; Tiberius, C.; Niestadt, J.; Zock, M.; Huang, C.-R.

    2008-01-01

    This paper describes the functional design of an interface for an online scholarly dictionary of contemporary standard Dutch, the ANW. One of the main innovations of the ANW is a twofold meaning description: definitions are accompanied by ‘semagrams’. In this paper we focus on the strategies that

  4. Accessing offshoring advantages

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona; Motika, Agnes; Wæhrens, Brian Vejrum

    2015-01-01

    . Assuming that different levels of synergy may exist between particular offshoring strategic decisions (choosing offshore outsourcing or captive offshoring and the type of function) and different offshoring advantages, this work advocates that the actual fact of realization of certain offshoring advantages...

  5. Intraosseous access in the military operational setting.

    Science.gov (United States)

    Vassallo, J; Horne, S; Smith, J E

    2014-01-01

    In an operational military environment, circulatory access can prove difficult for a variety of reasons including profound hypovolaemia, and limited first responder experience. With many injuries that cause catastrophic haemorrhage, such as traumatic limb amputations, circulatory access is needed as quickly as possible. Since 2006, the Defence Medical Services have been using the EZ-IO and FAST1 devices as a means of obtaining circulatory access. A prospective observational study was conducted between March and July 2011 at the Emergency Department, Camp Bastion, Afghanistan. All patients with an intraosseous device had data recorded that included if the device successfully flushed (functionality) and if any problems were encountered. 117 patients presented with a total of 195 devices: 149 were EZ-IO (76%) and 46 were FAST1 (24%). Functionality was recorded for 111 (57%), with 17 failing to function, yielding an overall success rate of 84.7%. Device failure was observed to be more prevalent in the humerus; inability to flush the device was the leading cause, followed by mechanical failure. There were 2 complications, device breaking on removal being the reason for both. The devices in the study were tested for a period of time following insertion (median 32 minutes), and still the success rates mirror those found in the literature. Observed differences between sites were not found to be significant with confidence intervals overlapping. Further work is proposed to investigate the long-term complications of intraosseous devices.

  6. Making Astronomy Accessible

    Science.gov (United States)

    Grice, Noreen A.

    2011-05-01

    A new semester begins, and your students enter the classroom for the first time. You notice a student sitting in a wheelchair or walking with assistance from a cane. Maybe you see a student with a guide dog or carrying a Braille computer. Another student gestures "hello” but then continues hand motions, and you realize the person is actually signing. You wonder why another student is using an electronic device to speak. Think this can't happen in your class? According to the U.S. Census, one out of every five Americans has a disability. And some disabilities, such as autism, dyslexia and arthritis, are considered "invisible” disabilities. This means you have a high probability that one of your students will have a disability. As an astronomy instructor, you have the opportunity to reach a wide variety of learners by using creative teaching strategies. I will share some suggestions on how to make astronomy and your part of the universe more accessible for everyone.

  7. Monographs and Open Access

    Directory of Open Access Journals (Sweden)

    Geoffrey Crossick

    2016-03-01

    Full Text Available This article presents the project that I led for HEFCE on the implications of OA (open access for monographs and other long-form research publications. The likely requirement that books should be OA if submitted to the REF (Research Excellence Framework after next means that OA development must be based on an understanding of the importance of the monograph in the AHSS (arts, humanities and social sciences as well as the challenges involved in making the transition to online OA. The project focused on three issues and each is summarized in turn in the article: What is the place of the monograph and other long-form publications in AHSS disciplines that makes it so important? What is happening to the monograph and is there a crisis as some suggest? What are the issues involved in moving monographs into a digital and OA environment – not just the challenge of effective business models but also many other aspects of sustaining and enhancing the qualities of the monograph? These include third-party rights, technical challenges, licences and the need for international collaboration.

  8. Remote direct memory access

    Science.gov (United States)

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  9. Vehicle barrier with access delay

    Science.gov (United States)

    Swahlan, David J; Wilke, Jason

    2013-09-03

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  10. Atomic memory access hardware implementations

    Science.gov (United States)

    Ahn, Jung Ho; Erez, Mattan; Dally, William J

    2015-02-17

    Atomic memory access requests are handled using a variety of systems and methods. According to one example method, a data-processing circuit having an address-request generator that issues requests to a common memory implements a method of processing the requests using a memory-access intervention circuit coupled between the generator and the common memory. The method identifies a current atomic-memory access request from a plurality of memory access requests. A data set is stored that corresponds to the current atomic-memory access request in a data storage circuit within the intervention circuit. It is determined whether the current atomic-memory access request corresponds to at least one previously-stored atomic-memory access request. In response to determining correspondence, the current request is implemented by retrieving data from the common memory. The data is modified in response to the current request and at least one other access request in the memory-access intervention circuit.

  11. Barriers to accessing urethroplasty.

    Science.gov (United States)

    Consolo, Michael J; Syed, Kirin K; Robison, Christopher; McFadden, Jacob; Shalowitz, David I; Brown, Gordon A; Sussman, David O; Figler, Bradley D

    2016-01-01

    Urethroplasty is an effective treatment for men with anterior urethral strictures, but is utilized less frequently than ineffective treatments such as internal urethrotomy. We sought to identify provider-level barriers to urethroplasty. An anonymous online survey was emailed to all Mid-Atlantic American Urological Association members. Six scenarios in which urethroplasty was the most appropriate treatment were presented. Primary outcome was recommendation for urethroplasty in ≥ three clinical scenarios. Other factors measured include practice zip code, urethroplasty training, and proximity to a urethroplasty surgeon. Multivariate logistic regression identified factors associated with increased likelihood of urethroplasty recommendation. Of 670 members emailed, 109 (16%) completed the survey. Final analysis included 88 respondents. Mean years in practice was 17.2. Most respondents received formal training in urethroplasty: 43 (49%) in residency, 5 (6%) in fellowship, and 10 (11%) in both; 48 respondents (55%) had a urethroplasty surgeon in their practice, whereas 18 (20%) had a urethroplasty surgeon within 45 minutes of his or her primary practice location. The only covariate that was associated with an increased likelihood of recommending urethroplasty in ≥ three scenarios was formal urethroplasty training. Most members (68%) reported no barriers to referring patients for urethroplasty; the most common barriers cited were long distance to urethroplasty surgeon (n 5 13, 15%) and concern about complications (n 5 8, 9%). Urethroplasty continues to be underutilized in men with anterior urethral strictures, potentially due to lack of knowledge dissemination and access to a urethroplasty surgeon. Appropriate urethroplasty utilization may increase with greater exposure to urethroplasty in training.

  12. Moving toward a universally accessible web: Web accessibility and education.

    Science.gov (United States)

    Kurt, Serhat

    2017-12-08

    The World Wide Web is an extremely powerful source of information, inspiration, ideas, and opportunities. As such, it has become an integral part of daily life for a great majority of people. Yet, for a significant number of others, the internet offers only limited value due to the existence of barriers which make accessing the Web difficult, if not impossible. This article illustrates some of the reasons that achieving equality of access to the online world of education is so critical, explores the current status of Web accessibility, discusses evaluative tools and methods that can help identify accessibility issues in educational websites, and provides practical recommendations and guidelines for resolving some of the obstacles that currently hinder the achievability of the goal of universal Web access.

  13. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  14. File access prediction using neural networks.

    Science.gov (United States)

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.

  15. Database Access through Java Technologies

    Directory of Open Access Journals (Sweden)

    Nicolae MERCIOIU

    2010-09-01

    Full Text Available As a high level development environment, the Java technologies offer support to the development of distributed applications, independent of the platform, providing a robust set of methods to access the databases, used to create software components on the server side, as well as on the client side. Analyzing the evolution of Java tools to access data, we notice that these tools evolved from simple methods that permitted the queries, the insertion, the update and the deletion of the data to advanced implementations such as distributed transactions, cursors and batch files. The client-server architectures allows through JDBC (the Java Database Connectivity the execution of SQL (Structured Query Language instructions and the manipulation of the results in an independent and consistent manner. The JDBC API (Application Programming Interface creates the level of abstractization needed to allow the call of SQL queries to any DBMS (Database Management System. In JDBC the native driver and the ODBC (Open Database Connectivity-JDBC bridge and the classes and interfaces of the JDBC API will be described. The four steps needed to build a JDBC driven application are presented briefly, emphasizing on the way each step has to be accomplished and the expected results. In each step there are evaluations on the characteristics of the database systems and the way the JDBC programming interface adapts to each one. The data types provided by SQL2 and SQL3 standards are analyzed by comparison with the Java data types, emphasizing on the discrepancies between those and the SQL types, but also the methods that allow the conversion between different types of data through the methods of the ResultSet object. Next, starting from the metadata role and studying the Java programming interfaces that allow the query of result sets, we will describe the advanced features of the data mining with JDBC. As alternative to result sets, the Rowsets add new functionalities that

  16. Housing accessibility problems for people with Parkinson's disease.

    Science.gov (United States)

    Slaug, B; Iwarsson, S; Ayala, J A; Nilsson, M H

    2017-11-01

    Promoting accessible housing for all citizens is high on the political agenda. Knowledge is, however, limited regarding housing accessibility problems for people with Parkinson's disease (PD). The objectives were to investigate housing accessibility problems among people with PD at different stages of disease severity and to analyze the potential impact of improved functional ability on accessibility problems. The study included 253 participants with PD (61% men; mean age 70 years). Disease severity was assessed by the Hoehn and Yahr (HY) I-V stages: HY I, n=50; II, n=73, III, n=66; IV-V, n=64. Using the Housing Enabler (HE) instrument, accessibility problems were investigated by combining assessments of the person's functional capacity with assessments of physical barriers in the housing environment into a person-environment fit measure (HE-score). To analyze potential impact of improved functional ability on housing accessibility problems, data simulation was applied. HE-scores differed significantly (Phousing accessibility problems for people with PD. The study also details environmental barriers that need specific attention when providing housing adaptation services. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  17. Funding and Implementing Universal Access

    International Development Research Centre (IDRC) Digital Library (Canada)

    The principles for the subsidy awards are based not only on the experience of ... the best-practice model for special funding to support access to communications .... Malaysia, Russia, Mongolia and elsewhere).5 The Ugandan model uses the ...... services or serve additional areas, access to radio spectrum and lower taxes.

  18. IV access in dental practice.

    LENUS (Irish Health Repository)

    Fitzpatrick, J J

    2009-04-01

    Intravenous (IV) access is a valuable skill for dental practitioners in emergency situations and in IV sedation. However, many people feel some apprehension about performing this procedure. This article explains the basic principles behind IV access, and the relevant anatomy and physiology, as well as giving a step-by-step guide to placing an IV cannula.

  19. Research Issues in Information Access.

    Science.gov (United States)

    Molholt, Pat

    1989-01-01

    Discusses traditional library approaches to access to information and the possible impact of information technologies, library automation, and artificial intelligence. Access issues raised by these technologies are identified and a research agenda to explore these issues is outlined. (31 references) (CLB)

  20. Editorial: Next Generation Access Networks

    Science.gov (United States)

    Ruffini, Marco; Cincotti, Gabriella; Pizzinat, Anna; Vetter, Peter

    2015-12-01

    Over the past decade we have seen an increasing number of operators deploying Fibre-to-the-home (FTTH) solutions in access networks, in order to provide home users with a much needed network access upgrade, to support higher peak rates, higher sustained rates and a better and more uniform broadband coverage of the territory.

  1. Achieving universal access to broadband

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders

    2009-01-01

    The paper discusses appropriate policy measures for achieving universal access to broadband services in Europe. Access can be delivered by means of many different technology solutions described in the paper. This means a greater degree of competition and affects the kind of policy measures...

  2. Guidelines for Outsourcing Remote Access.

    Science.gov (United States)

    Hassler, Ardoth; Neuman, Michael

    1996-01-01

    Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…

  3. Get the right access rights!

    CERN Multimedia

    Rosaria Marraffino

    2015-01-01

    On 11 May, a major change concerning the requirements to access the CERN beam facilities was put in place and implemented in ADaMS in order to reduce the number of courses that people who need access to multiple installations have to follow. This revision includes dedicated safety training courses that replace, in particular, the “Safety during LS1” e-learning course, which is now to be considered obsolete.   CERN’s Access Distribution and Management System (ADaMS). As of 11 May, an important improvement was implemented in ADaMS (CERN’s Access Distribution and Management System) regarding the requisites to access safety zones. This change is closely related to the introduction of a generic e-learning course ("CERN Beam Facilities") covering the common risks and systems present in CERN's beam facilities. Two e-learning courses are no longer valid, nor available on the SIR (Safety Information Registration) catalogue: the &ld...

  4. Phenomenal and access consciousness in olfaction.

    Science.gov (United States)

    Stevenson, Richard J

    2009-12-01

    Contemporary literature on consciousness, with some exceptions, rarely considers the olfactory system. In this article the characteristics of olfactory consciousness, viewed from the standpoint of the phenomenal (P)/access (A) distinction, are examined relative to the major senses. The review details several qualitative differences in both olfactory P consciousness (shifts in the felt location, universal synesthesia-like and affect-rich experiences, and misperceptions) and A consciousness (recovery from habituation, capacity for conscious processing, access to semantic and episodic memory, learning, attention, and in the serial-unitary nature of olfactory percepts). The basis for these differences is argued to arise from the functions that the olfactory system performs and from the unique neural architecture needed to instantiate them. These data suggest, at a minimum, that P and A consciousness are uniquely configured in olfaction and an argument can be made that the P and A distinction may not hold for this sensory system.

  5. BIODIVERSITY OF NATIONAL SQUASH CULTIVAR ACCESSIONS

    Directory of Open Access Journals (Sweden)

    A. F. Bukharov

    2017-01-01

    Full Text Available The squash is one of  the most  ancient plants, bearing numerous qualities. The squash gave high yield and is unpretentious plant, the fruit of which is long-stored and can be used as boiled, stewed, baked, fried product, and be added to bread, mush and pudding, and be prepared as puree, jam, candied fruit and other meals. Owing to useful characteristics the squash is a valuable source or raw  material for  food  canning  industry,  for  health-care and functional foodstuff production. Its best cultivar accessions contain to 30% of dry matter, to 12% of sugars  and  to  36%  of  carotene.  The  species  of  squash includes 4 subspecies and 20 varieties. One accession that came from Spain in 1937 served as an initial breeding accession for many other table cultivars for long time. For 80 years of national breeding program the many cultivars for  table  use have been released. There are the classic cultivars, such as ‘Mramornaya’, ‘Stolovaya Zimnaya’,  Gribovskaya Zimnaya’,  ‘Donskaya  Sladkaya’, ‘Michurinskaya’ that are selected or developed from first Spanish accession. This richness and originality of cultivar squash accessions should be carefully preserved. There are the new generation cultivars, such as ‘Kroshka’, ‘Malishka’,    ‘Rossiyanka’,    ‘Konfetka’,    ‘Moskvichka’, ‘Vnuchka’ and many others, which are short-tendrils and suitable for  modern  mechanized cultivation  technology. Moreover the development of new cultivars, bearing resistance to biotic and abiotic stress is the main goal of nearest breeding program.

  6. Data access performance through parallelization and vectored access. Some results

    International Nuclear Information System (INIS)

    Furano, F; Hanushevsky, A

    2008-01-01

    High Energy Physics data processing and analysis applications typically deal with the problem of accessing and processing data at high speed. Recent studies, development and test work have shown that the latencies due to data access can often be hidden by parallelizing them with the data processing, thus giving the ability to have applications which process remote data with a high level of efficiency. Techniques and algorithms able to reach this result have been implemented in the client side of the Scalla/xrootd system, and in this contribution we describe the results of some tests done in order to compare their performance and characteristics. These techniques, if used together with multiple streams data access, can also be effective in allowing to efficiently and transparently deal with data repositories accessible via a Wide Area Network

  7. Biometrics: Accessibility challenge or opportunity?

    Science.gov (United States)

    Blanco-Gonzalo, Ramon; Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  8. Biometrics: Accessibility challenge or opportunity?

    Science.gov (United States)

    Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products. PMID:29565989

  9. Biometrics: Accessibility challenge or opportunity?

    Directory of Open Access Journals (Sweden)

    Ramon Blanco-Gonzalo

    Full Text Available Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  10. Assessing communication accessibility in the university classroom: towards a goal of universal hearing accessibility.

    Science.gov (United States)

    Cheesman, Margaret F; Jennings, Mary Beth; Klinger, Lisa

    2013-01-01

    Measures of accessibility typically focus on the physical environment and aspects relating to getting into and out of spaces. The transient sound environment is less well characterized in typical accessibility measures. Hearing accessibility measures can be based upon physical indices or functional assessment. The physical measures are indices that use signal-to-noise ratios to evaluate audibility while the functional assessment tool adopts universal design for hearing (UDH) principles derived from principles of universal design. The UDH principles include (1) Optimization of the hearing environment for all; (2) Optimization of interactions between persons and objects to promote better hearing in an environment; (3) Optimization of opportunities for people to have multiple choices of interactions with one another; (4) Optimization of opportunities for people to perform different activities in and across environments; (5) Optimization of opportunities for people to have safe, private, and secure use of the environment while minimizing distraction, interference, or cognitive loading; and (6) Optimization of opportunities for people to use the environment without extra steps for hearing access during preparatory, use and/or after use phases. This paper compares the two approaches using case examples from post-secondary classrooms in order to describe the potential advantages and limitations of each.

  11. Airspace Operations Demo Functional Requirements Matrix

    Science.gov (United States)

    2005-01-01

    The Flight IPT assessed the reasonableness of demonstrating each of the Access 5 Step 1 functional requirements. The functional requirements listed in this matrix are from the September 2005 release of the Access 5 Functional Requirements Document. The demonstration mission considered was a notional Western US mission (WUS). The conclusion of the assessment is that 90% of the Access 5 Step 1 functional requirements can be demonstrated using the notional Western US mission.

  12. SM18 Visits and Access

    CERN Multimedia

    2012-01-01

      VISITS The rules and conditions to be followed for visits in the SM18 Hall are laid out in the EDMS 1205328 document. No visit is allowed without prior reservation.   ACCESS Special access right is needed ONLY from 7 p.m. to 7 a.m. and during week-ends. From 1 December, the current SM18 access database will be closed and a new one “SM18-OWH outside normal hours” started from scratch. Requests, via EDH SM18-OWH, will have to be duly justified.   For further information, please contact Evelyne Delucinge.

  13. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  14. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    Potter, K.; Littenberg, L.

    1977-01-01

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  15. Increasing Access to Special Collections

    Directory of Open Access Journals (Sweden)

    Ricky Erway

    2012-01-01

    Full Text Available In an environment where we increasingly have access to a collective collection of digitized books, special collections will become increasingly invisible if they are not accessible online. In an era of increasing expectations and decreasing budgets, finding ways to streamline some of our processes is the best way to enable us to do more with less. This report details a number of investigations into how access to special collections can be increased. It includes guidance running the gamut from digitization and rights management to policies and procedures.

  16. SMEs, banks and the spatial differentiation of access to finance

    OpenAIRE

    Zhao, T.; Jones-Evans, D.

    2016-01-01

    By utilizing the SME Finance Monitor and a unique dataset on the geographical location of all bank branches in 11 UK economic regions, this paper examines the relevance of spatial differentiation on SMEs’ access to bank finance during the period of economic weakness following the 2007 financial crisis. We find evidence suggesting the presence of a regional-specific effect on SMEs’ access to bank finance. Our findings show that greater functional distance between bank headquarters and branches...

  17. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Science.gov (United States)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  18. Acessibilidade e paralelismo na interpretação do pronome sujeito e o contraste pro/pronome em português Accessibility, parallel function and the pro/pronoun contrast in Portuguese

    Directory of Open Access Journals (Sweden)

    Letícia Maria Sicuro CORRÊA

    1998-01-01

    Full Text Available O contraste pro/pronome em orações coordenadas em português é aqui explorado de modo a distinguirem-se os procedimentos através dos quais formas pronominais sujeito são interpretadas em diferentes contextos sintáticos e discursivos — através de estratégias de seleção de um antecedente lingüístico ou da recuperação "automática" de uma representação mantida particularmente ativada na memória de trabalho. Dois experimentos são relatados. O primeiro testa a hipótese de que o vínculo sintático entre a oração que contém a forma pronominal e a que contém seus possíveis antecedentes define condições de processamento que favorecem o uso de um ou de outro procedimento de interpretação. O segundo testa a hipótese de que o grau de ativação de uma dada representação na memória de trabalho (definido em relação a um sistema que opera em três níveis afeta o modo como o sujeito pronominal de orações independentes é interpretado no discurso. Verifica-se que o contraste pro/ pronome pode ser re-estabelecido fora do âmbito de sentenças complexas uma vez que haja alteração local do foco da referência. A natureza deste contraste é discutida levando-se em conta as condições de processamento nas quais este se manifesta.The contrastive interpretation of pro and pronoun in co-ordinate sentences by Portuguese speakers is explored here, as a means of distinguishing the procedures whereby pronominal forms are interpreted in different syntactic/discourse contexts - by means of a search-identification strategy (such as the parallel function strategy or by means of the "automatic" recovery of a representation which is maintained particularly activated in working memory. Two experiments are reported. The first one tests the hypothesis that the kind of syntactic relationship that holds between the clause containing the pronominal form and the one containing possible antecedents defines processing conditions that favour one

  19. Attentional priorities and access to short-term memory

    DEFF Research Database (Denmark)

    Gillebert, Celine; Dyrholm, Mads; Vangkilde, Signe Allerup

    2012-01-01

    The intraparietal sulcus (IPS) has been implicated in selective attention as well as visual short-term memory (VSTM). To contrast mechanisms of target selection, distracter filtering, and access to VSTM, we combined behavioral testing, computational modeling and functional magnetic resonance......, thereby displaying a significant interaction between the two factors. The interaction between target and distracter set size in IPS could not be accounted for by a simple explanation in terms of number of items accessing VSTM. Instead, it led us to a model where items accessing VSTM receive differential...

  20. Open Access von A bis Z

    OpenAIRE

    Stieg, Kerstin; Pavlovic, Karlo

    2012-01-01

    The glossary „Open Access from A to Z“ comprises essential key terms on Open Access such as arXiv, The Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities, the Budapest Open Access Initiative (BOAI), Creative Commons (CC), the Directory of Open Access Books (DOAB), the Directory of Open Access Journals (DOAJ), the Directory of Open Access Repositories (OpenDOAR), the EU project Digital Repository Infrastructure Vision for European Research (DRIVER), the Finch Report,...

  1. Molecular accessibility in solvent swelled coals

    Energy Technology Data Exchange (ETDEWEB)

    Kispert, L.D.

    1993-02-01

    An EPR technique developed in this lab is being used to determine the pore size and number distribution changes after swelling the coal samples with various solvents. Stable nitroxide radical spin probes of different sizes, shapes and reactivity are dissolved in an appropriate solvent, the coal sample is added to the resulting solution, stirred over night at elevated temperature, filtered, washed with a non swelling solvent to eliminate any spin probes that are not trapped in the pores and the spin concentration is measured. Comparing these spin probe measurements to DRIFT data have shown that the relative number distribution of acidic functionalities can be accurately predicted by the spin probe method. The spin probe method had also been used to predict the increase in elongated voids in Pittsburgh No. 8 (APCS No. 4) upon swelling with pyridine in agreement with independent SANS data. NMR relaxation data show that it is possible to deduce the pore (accessibility) distribution as a function of size (up to 6 mn). It has also been possible by variable temperature and ENDOR measurements to determine the presence of hydrogen bonding as a function of pore shape and size. The advantage of the EPR method is that it permits molecules of selected shape and size to be used as probes of accessible regions of coal, thus providing information on the importance of molecular shape.

  2. Computer access security code system

    Science.gov (United States)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  3. Computer Security Systems Enable Access.

    Science.gov (United States)

    Riggen, Gary

    1989-01-01

    A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)

  4. Perceptual integration without conscious access.

    Science.gov (United States)

    Fahrenfort, Johannes J; van Leeuwen, Jonathan; Olivers, Christian N L; Hogendoorn, Hinze

    2017-04-04

    The visual system has the remarkable ability to integrate fragmentary visual input into a perceptually organized collection of surfaces and objects, a process we refer to as perceptual integration. Despite a long tradition of perception research, it is not known whether access to consciousness is required to complete perceptual integration. To investigate this question, we manipulated access to consciousness using the attentional blink. We show that, behaviorally, the attentional blink impairs conscious decisions about the presence of integrated surface structure from fragmented input. However, despite conscious access being impaired, the ability to decode the presence of integrated percepts remains intact, as shown through multivariate classification analyses of electroencephalogram (EEG) data. In contrast, when disrupting perception through masking, decisions about integrated percepts and decoding of integrated percepts are impaired in tandem, while leaving feedforward representations intact. Together, these data show that access consciousness and perceptual integration can be dissociated.

  5. Benin - Access to Land - Urban

    Data.gov (United States)

    Millennium Challenge Corporation — This is not a performance evaluation by an independent evaluator, but rather a review by the MCC former Benin Access to Land Project Lead of project implementation,...

  6. Electric Energy Access in Bangladesh

    Directory of Open Access Journals (Sweden)

    Muhammad Taheruzzaman

    2016-07-01

    Full Text Available This paper represents the overall electrical energy profile and access in Bangladesh. In the recent past Bangladesh has been experiencing shortage of electricity, and about 42 % of population no access to the electricity. The electricity consumption has rapidly increased over last decade. The demand and consumption will intensify in the remote future as overall development and future growth. To set “vision 2021” of Bangladesh; government of Bangladesh has devoted to ensuring access of affordable and reliable electricity for all by 2021. In the modern time, energy is the vital ingredient for socioeconomic growth in the developing country i.e., alleviating poverty. Along with electricity access in Bangladesh strived to become middle income country by 2021. Bangladesh has experienced that energy consumption inclines to increase rapidly when per capita income researches between US$ 1,000 and US$ 10,000, and a country’s

  7. Open Access Myths and Realities

    Directory of Open Access Journals (Sweden)

    Francisco José GARCÍA-PEÑALVO

    2017-04-01

    Full Text Available The first editorial of EKS volume 18 retakes a recurrent theme in this journal: the Open Access, in this case to reflect on some of the myths that are still very ingrained in the scientific community.

  8. Charter Halibut Limited Access Program

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This limited access system limits the number of charter vessels that may participate in the guided sport fishery for halibut in area 2C and 3A. NMFS issues a charter...

  9. Water Access Sites in Minnesota

    Data.gov (United States)

    Minnesota Department of Natural Resources — This data shows the approximate locations of boat accesses in the state. This is not a comprehensive list but one that was generated through a cooperative effort....

  10. Accessible Electronic and Information Technology

    Science.gov (United States)

    This Policy establishes EPA's responsibilities and procedures for making its Electronic and Information Technology (EIT) products accessible to all people, including people with disabilities, in accordance with Section 508 of the Rehabilitation Act.

  11. Assuring Access to Affordable Coverage

    Data.gov (United States)

    U.S. Department of Health & Human Services — Under the Affordable Care Act, millions of uninsured Americans will gain access to affordable coverage through Affordable Insurance Exchanges and improvements in...

  12. MCBS Access to Care PUF

    Data.gov (United States)

    U.S. Department of Health & Human Services — The MCBS 2013 Access to Care public use file (MCBS PUF) provides the first publically available MCBS file for researchers interested in the health, health care use,...

  13. Textual information access statistical models

    CERN Document Server

    Gaussier, Eric

    2013-01-01

    This book presents statistical models that have recently been developed within several research communities to access information contained in text collections. The problems considered are linked to applications aiming at facilitating information access:- information extraction and retrieval;- text classification and clustering;- opinion mining;- comprehension aids (automatic summarization, machine translation, visualization).In order to give the reader as complete a description as possible, the focus is placed on the probability models used in the applications

  14. PathwayAccess: CellDesigner plugins for pathway databases.

    Science.gov (United States)

    Van Hemert, John L; Dickerson, Julie A

    2010-09-15

    CellDesigner provides a user-friendly interface for graphical biochemical pathway description. Many pathway databases are not directly exportable to CellDesigner models. PathwayAccess is an extensible suite of CellDesigner plugins, which connect CellDesigner directly to pathway databases using respective Java application programming interfaces. The process is streamlined for creating new PathwayAccess plugins for specific pathway databases. Three PathwayAccess plugins, MetNetAccess, BioCycAccess and ReactomeAccess, directly connect CellDesigner to the pathway databases MetNetDB, BioCyc and Reactome. PathwayAccess plugins enable CellDesigner users to expose pathway data to analytical CellDesigner functions, curate their pathway databases and visually integrate pathway data from different databases using standard Systems Biology Markup Language and Systems Biology Graphical Notation. Implemented in Java, PathwayAccess plugins run with CellDesigner version 4.0.1 and were tested on Ubuntu Linux, Windows XP and 7, and MacOSX. Source code, binaries, documentation and video walkthroughs are freely available at http://vrac.iastate.edu/~jlv.

  15. Resource description and access 2013 revision

    CERN Document Server

    2013-01-01

    This e-book contains the 2013 Revision of RDA: Resource Description and Access, and includes the July 2013 Update. This e-book offers links within the RDA text and the capability of running rudimentary searches of RDA, but please note that this e-book does not have the full range of content or functionality provided by the subscription product RDA Toolkit. Included: A full accumulation of RDA- the revision contains a full set of all current RDA instructions. It replaces the previous version of RDA Print as opposed to being an update packet to that version. RDA has gone through many changes sin

  16. Specialization of Generic Array Accesses After Inlining

    Directory of Open Access Journals (Sweden)

    Ryohei Tokuda

    2017-02-01

    Full Text Available We have implemented an optimization that specializes type-generic array accesses after inlining of polymorphic functions in the native-code OCaml compiler. Polymorphic array operations (read and write in OCaml require runtime type dispatch because of ad hoc memory representations of integer and float arrays. It cannot be removed even after being monomorphized by inlining because the intermediate language is mostly untyped. We therefore extended it with explicit type application like System F (while keeping implicit type abstraction by means of unique identifiers for type variables. Our optimization has achieved up to 21% speed-up of numerical programs.

  17. Cardea: Dynamic Access Control in Distributed Systems

    Science.gov (United States)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  18. Functional Magnetic Resonance Imaging

    Science.gov (United States)

    Voos, Avery; Pelphrey, Kevin

    2013-01-01

    Functional magnetic resonance imaging (fMRI), with its excellent spatial resolution and ability to visualize networks of neuroanatomical structures involved in complex information processing, has become the dominant technique for the study of brain function and its development. The accessibility of in-vivo pediatric brain-imaging techniques…

  19. MAST's Integrated Data Access Management system: IDAM

    International Nuclear Information System (INIS)

    Muir, D.G.; Appel, L.; Conway, N.J.; Kirk, A.; Martin, R.; Meyer, H.; Storrs, J.; Taylor, D.; Thomas-Davies, N.; Waterhouse, J.

    2008-01-01

    A new Integrated Data Access Management system, IDAM, has been created to address specific data management issues of the MAST spherical Tokamak. For example, this system enables access to numerous file formats, both legacy and modern (IDA, Ufile, netCDF, HDF5, MDSPlus, PPF, JPF). It adds data quality values at the signal level, and automatically corrects for problems in data: in timings, calibrations, and labelling. It also builds new signals from signal components. The IDAM data server uses a hybrid XML-relational database to record how data are accessed, whether locally or remotely, and how alias and generic signal names are mapped to true names. Also, XML documents are used to encode the details of data corrections, as well as definitions of composite signals and error models. The simple, user friendly, API and accessor function library, written in C on Linux, is available for applications in C, C++, IDL and Fortran-90/95/2003 with good performance: a MAST plasma current trace (28 kbytes of data), requested using a generic name and with data corrections applied, is delivered over a 100 Mbit/s network in ∼13 ms

  20. Access To The PMM's Pixel Database

    Science.gov (United States)

    Monet, D.; Levine, S.

    1999-12-01

    The U.S. Naval Observatory Flagstaff Station is in the process of enabling access to the Precision Measuring Machine (PMM) program's pixel database. The initial release will include the pixels from the PMM's scans of the Palomar Observatory Sky Survey I (POSS-I) -O and -E surveys, the Whiteoak Extension, the European Southern Observatory-R survey, the Science and Engineering Council-J, -EJ, and -ER surveys, and the Anglo- Australian Observatory-R survey. (The SERC-ER and AAO-R surveys are currently incomplete.) As time allows, access to the POSS-II -J, -F, and -N surveys, the Palomar Infrared Milky Way Atlas, the Yale/San Juan Southern Proper Motion survey, and plates rejected by various surveys will be added. (POSS-II -J and -F are complete, but -N was never finished.) Eventually, some 10 Tbytes of pixel data will be available. Due to funding and technology limitations, the initial interface will have only limited functionality, and access time will be slow since the archive is stored on Digital Linear Tape (DLT). Usage of the pixel data will be restricted to non-commercial, scientific applications, and agreements on copyright issues have yet to be finalized. The poster presentation will give the URL.

  1. Accessing patient-centered care using the advanced access model.

    Science.gov (United States)

    Tantau, Catherine

    2009-01-01

    Waits and delays for healthcare are legendary. These delays are not only frustrating and potentially hazardous for patients and providers but also represent significant cost to office practices. The traditional medical model that defines urgent care versus routine care is a vain and futile attempt to sort demand. This approach is at constant odds with patients' definition of urgency. Trusting patients to determine when and how they want to access care makes sense from a customer service perspective. If approached systematically using the principles of Advanced Access, patient demand patterns can be tracked to forecast demand. These demand patterns become the template for deploying the resources necessary to meet patients' needs. Although not a simple journey, the transformation to Advanced Access provides an entree to patient-centered care where patients can say, "I get exactly the care I want and need, when I want and need it."

  2. In Situ Representations and Access Consciousness in Neural Blackboard or Workspace Architectures

    OpenAIRE

    Frank van der Velde

    2018-01-01

    Phenomenal theories of consciousness assert that consciousness is based on specific neural correlates in the brain, which can be separated from all cognitive functions we can perform. If so, the search for robot consciousness seems to be doomed. By contrast, theories of functional or access consciousness assert that consciousness can be studied only with forms of cognitive access, given by cognitive processes. Consequently, consciousness and cognitive access cannot be fully dissociated. Here,...

  3. Vascular access for home haemodialysis.

    Science.gov (United States)

    Al Shakarchi, Julien; Day, C; Inston, N

    2018-03-01

    Home haemodialysis has been advocated due to improved quality of life. However, there are very little data on the optimum vascular access for it. A retrospective cohort study was carried on all patients who initiated home haemodialysis between 2011 and 2016 at a large university hospital. Access-related hospital admissions and interventions were used as primary outcome measures. Our cohort consisted of 74 patients. On initiation of home haemodialysis, 62 individuals were using an arteriovenous fistula as vascular access, while the remaining were on a tunnelled dialysis catheter. Of the 12 patients who started on a tunnelled dialysis catheter, 5 were subsequently converted to either an arteriovenous fistula ( n = 4) or an arteriovenous graft ( n = 1). During the period of home haemodialysis use, four arteriovenous fistula failed or thrombosed with patients continuing on home haemodialysis using an arteriovenous graft ( n = 3) or a tunnelled dialysis catheter ( n = 1). To maintain uninterrupted home haemodialysis, interventional rates were 0.32 per arteriovenous fistula/arteriovenous graft access-year and 0.4 per tunnelled dialysis catheter access-year. Hospital admission rates for patients on home haemodialysis were 0.33 per patient-year. Our study has shown that home haemodialysis can be safely and independently performed at home within a closely managed home haemodialysis programme. The authors also advocate the use of arteriovenous fistulas for this cohort of patients due to both low complication and intervention rates.

  4. A new convenient access to highly functionalized (E)-2-arylvinyl ...

    Indian Academy of Sciences (India)

    Administrator

    The esterification of phenols using anhydrides or acyl halides as esterifying agent is one of the most routinely used transformation in organic synthesis. While this method was applied in the synthesis of. 4-acyloxy-(E)-2-arylvinyl bromides, the yield was poor mainly due to the formation of by-product un- der condition of acid ...

  5. Three essays on access pricing

    Science.gov (United States)

    Sydee, Ahmed Nasim

    In the first essay, a theoretical model is developed to determine the time path of optimal access price in the telecommunications industry. Determining the optimal access price is an important issue in the economics of telecommunications. Setting a high access price discourages potential entrants; a low access price, on the other hand, amounts to confiscation of private property because the infrastructure already built by the incumbent is sunk. Furthermore, a low access price does not give the incumbent incentives to maintain the current network and to invest in new infrastructures. Much of the existing literature on access pricing suffers either from the limitations of a static framework or from the assumption that all costs are avoidable. The telecommunications industry is subject to high stranded costs and, therefore, to address this issue a dynamic model is imperative. This essay presents a dynamic model of one-way access pricing in which the compensation involved in deregulatory taking is formalized and then analyzed. The short run adjustment after deregulatory taking has occurred is carried out and discussed. The long run equilibrium is also analyzed. A time path for the Ramsey price is shown as the correct dynamic price of access. In the second essay, a theoretical model is developed to determine the time path of optimal access price for an infrastructure that is characterized by congestion and lumpy investment. Much of the theoretical literature on access pricing of infrastructure prescribes that the access price be set at the marginal cost of the infrastructure. In proposing this rule of access pricing, the conventional analysis assumes that infrastructure investments are infinitely divisible so that it makes sense to talk about the marginal cost of investment. Often it is the case that investments in infrastructure are lumpy and can only be made in large chunks, and this renders the marginal cost concept meaningless. In this essay, we formalize a model of

  6. Online Access Patterns and Students

    Directory of Open Access Journals (Sweden)

    Nasir Butrous

    2011-04-01

    Full Text Available The paper follows accessing patterns of five cohorts of postgraduate students enrolled in a core unit within a master of business administration (MBA program. The unit is designed to provide numerous opportunities for student participation in Discussion Boards using Blackboard technology. Discussion Boards create numerous opportunities for interaction amongst online learners to share and exchange their experiences, creating a sense of a virtual community. Relationships between accessing patterns for each week of the semester for each student are explored in relation to their performance using course statistics generated by the Blackboard technology. Close examination of the significant differences in access patterns to the course window and its components of communication, content, and student areas reveal middle of the semester (week 7 as the common critical point that differentiates high achieving students from low achieving students. Identifying critical points provides the faculty staff member an opportunity to introduce intervention strategies in order to improve the learning experience of all the students.

  7. Personalizing Access to Learning Networks

    DEFF Research Database (Denmark)

    Dolog, Peter; Simon, Bernd; Nejdl, Wolfgang

    2008-01-01

    In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address in this fra......In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address...... in this framework, enabling personalized access to federated learning repositories with a vast number of learning offers. Our infrastructure includes personalization strategies both at the query and the query results level. Query rewriting is based on learning and language preferences; rule-based and ranking...

  8. Accessibility of antiretroviral therapy in Ghana: Convenience of access

    African Journals Online (AJOL)

    SAHARA-J: Journal of Social Aspects of HIV/AIDS. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 9, No 2 (2012) >. Log in or Register to get access to full text downloads.

  9. IP access networks with QoS support

    Science.gov (United States)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  10. Achieving Universal Access to Broadband

    Directory of Open Access Journals (Sweden)

    Morten FALCH

    2009-01-01

    Full Text Available The paper discusses appropriate policy measures for achieving universal access to broadband services in Europe. Access can be delivered by means of many different technology solutions described in the paper. This means a greater degree of competition and affects the kind of policy measures to be applied. The paper concludes that other policy measure than the classical universal service obligation are in play, and discusses various policy measures taking the Lisbon process as a point of departure. Available policy measures listed in the paper include, universal service obligation, harmonization, demand stimulation, public support for extending the infrastructure, public private partnerships (PPP, and others.

  11. Market access through bound tariffs

    DEFF Research Database (Denmark)

    Sala, Davide; Yalcin, Erdal; Schröder, Philipp

    2010-01-01

    on the risk that exporters face in destination markets. The present paper formalizes the underlying interaction of risk, fixed export costs and firms' market entry decisions based on techniques known from the real options literature; doing so we highlight the important role of bound tariffs at the extensive...... margin of trade. We find that bound tariffs are more effective with higher risk destination markets, that a large binding overhang may still command substantial market access, and that reductions in bound tariffs generate effective market access even when bound rates are above current and longterm...

  12. Market Access through Bound Tariffs

    DEFF Research Database (Denmark)

    Sala, Davide; Schröder, Philipp J.H.; Yalcin, Erdal

    on the risk that exporters face in destination markets. The present paper formalizes the underlying interaction of risk, fixed export costs and firms' market entry decisions based on techniques known from the real options literature; doing so we highlight the important role of bound tariffs at the extensive...... margin of trade. We find that bound tariffs are more effective with higher risk destination markets, that a large binding overhang may still command substantial market access, and that reductions in bound tariffs generate effective market access even when bound rates are above current and long...

  13. SCOAP3 and Open Access

    CERN Document Server

    Mele, Salvatore; D'Agostino, Dan; Dyas-Correia, Sharon

    2009-01-01

    SCOAP3 is an innovative Open Access initiative for publishing in high-energy physics. The model is viewed by many as a potential solution to multiple issues related to the financial crisis, the peer review system, scholarly communication, and the need to support institutional repositories. This installment of “The Balance Point” presents articles written by three Open Access advocates, outlining the SCOAP3 proposal, benefits of participation, and some of the roles libraries, publishers and scientists can play in making important changes to scholarly communication. Contributors discuss scalability and transferability issues of SCOAP3, as well as other matters of concern.

  14. Autonomy and Housing Accessibility Among Powered Mobility Device Users

    Science.gov (United States)

    Brandt, Åse; Lexell, Eva Månsson; Iwarsson, Susanne

    2015-01-01

    OBJECTIVE. To describe environmental barriers, accessibility problems, and powered mobility device (PMD) users’ autonomy indoors and outdoors; to determine the home environmental barriers that generated the most housing accessibility problems indoors, at entrances, and in the close exterior surroundings; and to examine personal factors and environmental components and their association with indoor and outdoor autonomy. METHOD. This cross-sectional study was based on data collected from a sample of 48 PMD users with a spinal cord injury (SCI) using the Impact of Participation and Autonomy and the Housing Enabler instruments. Descriptive statistics and logistic regression were used. RESULTS. More years living with SCI predicted less restriction in autonomy indoors, whereas more functional limitations and accessibility problems related to entrance doors predicted more restriction in autonomy outdoors. CONCLUSION. To enable optimized PMD use, practitioners must pay attention to the relationship between client autonomy and housing accessibility problems. PMID:26356666

  15. Access inequalities addressed by audit.

    Science.gov (United States)

    Singh, Rajiv; Pentland, Brian

    2005-08-01

    The Disability Discrimination Act (1995) protects disabled people from discrimination in access to services, facilities and goods as well as in education and employment. All hospitals have an inherent duty to enable access to services but this will now be enshrined in law. As the health sector has most contact with disability, it may be expected that most hospitals would already be in a good position to comply with the Act, especially one treating many patients with disability. However we identified many problems in a rehabilitation hospital setting by means of a simple access audit in March 2004. Recommendations were set out and by March 2005 considerable improvements had been made costing Pound 100,000. Although many necessary changes will be expensive, not all problems identified require costly correction. Many simply involve a change in staff attitudes and practices. We recommend that all hospitals start to identify the changes needed under the Act by means of a simple access audit that can be carried out by hospital staff with no specialist equipment.

  16. Proximity Displays for Access Control

    Science.gov (United States)

    Vaniea, Kami

    2012-01-01

    Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…

  17. Access to Specialized Surgical Care

    African Journals Online (AJOL)

    The ANNALS of AFRICAN SURGERY. January 2016 Volume 13 Issue 1 1. EDITORIAL. Access to Specialized Surgical Care. Saidi H. University of Nairobi. Correspondence to: Prof Hassan Saidi, P.O Box 30196-00100, Nairobi. Email: hsaid2ke@yahoo.com. Ann Afr Surg. 2016;13(1):1-2. The narrative of surgical disease in ...

  18. Arts Accessibility for the Deaf.

    Science.gov (United States)

    Bergman, Eugene

    The booklet provides information and resources for cultural organizations and institutions interested in making the arts accessible to deaf citizens. Preliminary information includes a discussion of deafness in America and the deaf in the history of the arts and notes that the era of silent films was the golden age of cinema. Listed are 36…

  19. Access to Experimental Cancer Drugs

    Science.gov (United States)

    An experimental drug has been tested in the lab and with animals and approved for testing in people by the FDA, but can’t yet be advertised, sold, or prescribed. Experimental drugs may be available through clinical trials or expanded access programs - learn more about these programs and how to talk to your doctor.

  20. Perceptual integration without conscious access

    NARCIS (Netherlands)

    Fahrenfort, Johannes J.; Van Leeuwen, Jonathan; Olivers, Christian N.L.; Hogendoorn, Hinze

    2017-01-01

    The visual system has the remarkable ability to integrate fragmentary visual input into a perceptually organized collection of surfaces and objects, a process we refer to as perceptual integration. Despite a long tradition of perception research, it is not known whether access to consciousness is

  1. Access to effective health care

    DEFF Research Database (Denmark)

    Høy, Bente

    2015-01-01

    Access to effective healthcare is in particular challenging for vulnerable and socially disadvantaged patients. Patients with chronic conditions are over-represented in these lower socioeconomic (LSES) groups. No generic review integrating the evidence on Self-Management support interventions in ...

  2. Easing access for lifelong learners

    DEFF Research Database (Denmark)

    Müller, Romina; Remdisch, Sabine; Köhler, Katharina

    2015-01-01

    developmental stages. This article maps the development in Denmark, Finland, Germany and England using a case study approach deploying data triangulation from a national and institutional perspective. It explores the extent/commonality of structural factors for easing access for students engaging in lifelong...

  3. Equal Access but Unequal Outcomes

    DEFF Research Database (Denmark)

    Jæger, Mads Meier

    2009-01-01

    with respect to Danish children's choice of secondary education. Denmark is well-suited for this study because access to secondary education is particularly meritocratic. The empirical analysis shows that all three channels through which cultural capital affects educational success are important....

  4. Publishing in Open Access Journals

    International Development Research Centre (IDRC) Digital Library (Canada)

    mbrunet

    While most open access journals are peer‐reviewed and high quality, there are a number of ... Publisher has a negative reputation (e.g., documented examples in Chronicle of Higher Education, ... A key part of Canada's aid program, IDRC supports research in developing countries to promote growth and development.

  5. The Inevitability of Open Access

    Science.gov (United States)

    Lewis, David W.

    2012-01-01

    Open access (OA) is an alternative business model for the publication of scholarly journals. It makes articles freely available to readers on the Internet and covers the costs associated with publication through means other than subscriptions. This article argues that Gold OA, where all of the articles of a journal are available at the time of…

  6. Estimating Open Access in NARCIS

    NARCIS (Netherlands)

    Bode, Emil; Braukmann, Ricarda; Doorn, P.K.

    2017-01-01

    This poster shows the state of open access in the Netherlands according to NARCIS, the national portal for information on Dutch science. The number of open and closed publications in NARCIS analysed, per type of publication, per year for PhD dissertations and articles, along with a percentage of OA

  7. Public Access ICT across Cultures

    International Development Research Centre (IDRC) Digital Library (Canada)

    3 Impact of Public Access to ICT Skills on Job Prospects in Rwanda ... reform and information and communication technology (ICT) policies, particularly in developing countries. ... (From internal memoranda prepared by Amy Mahan, 2008) ..... little decision-making autonomy, power, or financial control within the household.

  8. Access, Intellectual Freedom and Libraries.

    Science.gov (United States)

    Darling, Richard L.

    1979-01-01

    Reviews attitudes toward censorship in the United States throughout its history in relation to the nation and its institutions. The library is recognized as an institution in which censorship has no place, due to its creed of information access and intellectual freedom for all. (MBR)

  9. Measuring Access to Learning Opportunities.

    Science.gov (United States)

    Hawley, Willis D., Ed.; Ready, Timothy, Ed.

    This study examined the continued relevance and adequacy of the Elementary and Secondary School Civil Rights Compliance Report (E&S Survey) as a tool for enforcing civil rights laws in education, monitoring quality of access to learning opportunities, and research on other current issues of educational policy and practice. The Committee on…

  10. Open Access Publishing with Drupal

    Directory of Open Access Journals (Sweden)

    Nina McHale

    2011-10-01

    Full Text Available In January 2009, the Colorado Association of Libraries (CAL suspended publication of its print quarterly journal, Colorado Libraries, as a cost-saving measure in a time of fiscal uncertainty. Printing and mailing the journal to its 1300 members cost CAL more than $26,000 per year. Publication of the journal was placed on an indefinite hiatus until the editorial staff proposed an online, open access format a year later. The benefits to migrating to open access included: significantly lower costs; a green platform; instant availability of content; a greater level of access to users with disabilities; and a higher level of visibility of the journal and the association. The editorial staff chose Drupal, including the E-journal module, and while Drupal is notorious for its steep learning curve—which exacerbated delays to content that had been created before the publishing hiatus—the fourth electronic issue was published recently at coloradolibrariesjournal.org. This article will discuss both the benefits and challenges of transitioning to an open access model and the choice Drupal as a platform over other more established journal software options.

  11. Ballistic representation for kinematic access

    Science.gov (United States)

    Alfano, Salvatore

    2011-01-01

    This work uses simple two-body orbital dynamics to initially determine the kinematic access for a ballistic vehicle. Primarily this analysis was developed to assess when a rocket body might conjunct with an orbiting satellite platform. A family of access opportunities can be represented as a volume for a specific rocket relative to its launch platform. Alternately, the opportunities can be represented as a geographical footprint relative to aircraft or satellite position that encompasses all possible launcher locations for a specific rocket. A thrusting rocket is treated as a ballistic vehicle that receives all its energy at launch and follows a coasting trajectory. To do so, the rocket's burnout energy is used to find its equivalent initial velocity for a given launcher's altitude. Three kinematic access solutions are then found that account for spherical Earth rotation. One solution finds the maximum range for an ascent-only trajectory while another solution accommodates a descending trajectory. In addition, the ascent engagement for the descending trajectory is used to depict a rapid access scenario. These preliminary solutions are formulated to address ground-, sea-, or air-launched vehicles.

  12. Accessibility of antiretroviral therapy in Ghana: convenience of access.

    Science.gov (United States)

    Addo-Atuah, Joyce; Gourley, Dick; Gourley, Greta; White-Means, Shelley I; Womeodu, Robin J; Faris, Richard J; Addo, Nii Akwei

    2012-01-01

    The convenience of accessing antiretroviral therapy (ART) is important for initial access to care and subsequent adherence to ART. We conducted a qualitative study of people living with HIV/AIDS (PLWHA) and ART healthcare providers in Ghana in 2005. The objective of this study was to explore the participants' perceived convenience of accessing ART by PLWHA in Ghana. The convenience of accessing ART was evaluated from the reported travel and waiting times to receive care, the availability, or otherwise, of special considerations, with respect to the waiting time to receive care, for those PLWHA who were in active employment in the formal sector, the frequency of clinic visits before and after initiating ART, and whether the PLWHA saw the same or different providers at each clinic visit (continuity of care). This qualitative study used in-depth interviews based on Yin's case-study research design to collect data from 20 PLWHA and 24 ART healthcare providers as study participants. • Reported travel time to receive ART services ranged from 2 to 12 h for 30% of the PLWHA. • Waiting time to receive care was from 4 to 9 h. • While known government workers, such as teachers, were attended to earlier in some of the centres, this was not a consistent practice in all the four ART centres studied. • The PLWHA corroborated the providers' description of the procedure for initiating and monitoring ART in Ghana. • PLWHA did not see the same provider every time, but they were assured that this did not compromise the continuity of their care. Our study suggests that convenience of accessing ART is important to both PLWHA and ART healthcare providers, but the participants alluded to other factors, including open provider-patient communication, which might explain the PLWHA's understanding of the constraints under which they were receiving care. The current nation-wide coverage of the ART programme in Ghana, however, calls for the replication of this study to identify

  13. Controlling Access to Suicide Means

    Directory of Open Access Journals (Sweden)

    Miriam Iosue

    2011-12-01

    Full Text Available Background: Restricting access to common means of suicide, such as firearms, toxic gas, pesticides and other, has been shown to be effective in reducing rates of death in suicide. In the present review we aimed to summarize the empirical and clinical literature on controlling the access to means of suicide. Methods: This review made use of both MEDLINE, ISI Web of Science and the Cochrane library databases, identifying all English articles with the keywords “suicide means”, “suicide method”, “suicide prediction” or “suicide prevention” and other relevant keywords. Results: A number of factors may influence an individual’s decision regarding method in a suicide act, but there is substantial support that easy access influences the choice of method. In many countries, restrictions of access to common means of suicide has lead to lower overall suicide rates, particularly regarding suicide by firearms in USA, detoxification of domestic and motor vehicle gas in England and other countries, toxic pesticides in rural areas, barriers at jumping sites and hanging, by introducing “safe rooms” in prisons and hospitals. Moreover, decline in prescription of barbiturates and tricyclic antidepressants (TCAs, as well as limitation of drugs pack size for paracetamol and salicylate has reduced suicides by overdose, while increased prescription of SSRIs seems to have lowered suicidal rates. Conclusions: Restriction to means of suicide may be particularly effective in contexts where the method is popular, highly lethal, widely available, and/or not easily substituted by other similar methods. However, since there is some risk of means substitution, restriction of access should be implemented in conjunction with other suicide prevention strategies.

  14. Open Access. Chapter 6 of Scholarly Communication for Librarians.

    OpenAIRE

    Morrison, Heather

    2008-01-01

    In-depth overview of open access, covering definitions (open access publishing, open access archives, gratis and libre, open access works versus open access processes), major statements and declarations, types of open access, major initiatives, trends, advocacy and lobbying.

  15. Flexible Access Control for Dynamic Collaborative Environments

    NARCIS (Netherlands)

    Dekker, M.A.C.

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect

  16. Equity for open-access journal publishing.

    Directory of Open Access Journals (Sweden)

    Stuart M Shieber

    2009-08-01

    Full Text Available Open-access journals, which provide access to their scholarly articles freely and without limitations, are at a systematic disadvantage relative to traditional closed-access journal publishing and its subscription-based business model. A simple, cost-effective remedy to this inequity could put open-access publishing on a path to become a sustainable, efficient system.

  17. 36 CFR 9.32 - Access.

    Science.gov (United States)

    2010-07-01

    ... MANAGEMENT Non-Federal Oil and Gas Rights § 9.32 Access. (a) No access on, across or through lands or waters... access is by foot, pack animal, or designated road. Persons using designated roads for access to such a...

  18. 36 CFR 1191.1 - Accessibility guidelines.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Accessibility guidelines... COMPLIANCE BOARD AMERICANS WITH DISABILITIES ACT (ADA) ACCESSIBILITY GUIDELINES FOR BUILDINGS AND FACILITIES; ARCHITECTURAL BARRIERS ACT (ABA) ACCESSIBILITY GUIDELINES § 1191.1 Accessibility guidelines. (a) The...

  19. OPACs: The User and Subject Access.

    Science.gov (United States)

    Carson, Elizabeth

    1985-01-01

    This survey of the literature reveals user and professional opinions of changes in subject access features available for online public access catalogs. Highlights include expanded access to fields already incorporated into traditional MARC record, access to context of the record, and design of the user interface. Twenty-four references are cited.…

  20. Random Access to Grammar-Compressed Strings and Trees

    DEFF Research Database (Denmark)

    Bille, Philip; Landau, Gad M.; Raman, Rajeev

    2015-01-01

    representations of S achieving O(log N) random access time, and either O(n · αk(n)) construction time and space on the pointer machine model, or O(n) construction time and space on the RAM. Here, αk(n) is the inverse of the kth row of Ackermann's function. Our representations also efficiently support...

  1. Search engines, the new bottleneck for content access

    NARCIS (Netherlands)

    van Eijk, N.; Preissl, B.; Haucap, J.; Curwen, P.

    2009-01-01

    The core function of a search engine is to make content and sources of information easily accessible (although the search results themselves may actually include parts of the underlying information). In an environment with unlimited amounts of information available on open platforms such as the

  2. Controlling Access to Input/Output Peripheral Devices

    Directory of Open Access Journals (Sweden)

    E. Y. Rodionov

    2010-03-01

    Full Text Available In this paper the author proposes a system that manages information security policy on enterprise. Problems related to managing information security policy on enterprise and access to peripheral devices in computer systems functioning under control of Microsoft Windows NT operating systems are considered.

  3. Designing User Manuals for the Online Public Access Catalog.

    Science.gov (United States)

    Seiden, Peggy; Sullivan, Patricia

    1986-01-01

    Describes the process of developing and revising a brochure to guide library patrons in conducting an author search on an online public access catalog in order to demonstrate the application of four steps in production of a functional document--analysis; planning; development; evaluation, testing, and revision. Three sources are given. (EJS)

  4. Holistic approaches to e-learning accessibility

    OpenAIRE

    Phipps, Lawrie; Kelly, Brian

    2006-01-01

    The importance of accessibility to digital e-learning resources is widely acknowledged. The World Wide Web Consortium Web Accessibility Initiative has played a leading role in promoting the importance of accessibility and developing guidelines that can help when developing accessible web resources. The accessibility of e-learning resources provides additional challenges. While it is important to consider the technical and resource related aspects of e-learning when designing and developing re...

  5. Accessing and disclosing protected resources

    DEFF Research Database (Denmark)

    Olesen, Henning; Khajuria, Samant

    2015-01-01

    Today, data is money. Whether it is private users' personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization measures to be deployed. Enabling...... advanced user controlled privacy is essential to realize the visions of 5G applications and services. For service providers and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user...... the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources and possibly give them control of how their data will be used by service providers....

  6. AIDA: Accelerator Integrated Data Access

    International Nuclear Information System (INIS)

    MacKenzie, Ronald R.

    2002-01-01

    All Control Systems that grow to any size have a variety of data that are stored in different formats on different nodes in the network. Examples include sensor value and status, archived sensor data, device oriented support data and relationships, message logs, application and machine configurations etc. Each type of data typically has a different programming interface. Higher-level applications need to access a logically related set of data that is in different data stores and may require different processing. AIDA is envisioned to be a distributed service that allows applications access to this wide variety of Control System data in a consistent way that is language and machine independent. It has the additional goal of providing an object-oriented layer for constructing applications on top of multiple existing conventional systems like EPICS or the SLC Control System. Motivation, design overview and current status will be presented

  7. Open access for REF2020

    Directory of Open Access Journals (Sweden)

    Simon Kerridge

    2014-03-01

    Full Text Available Open access (OA may have been the ‘big thing’ in 2013 but the OA juggernaut is still rolling and plans are now afoot for the requirements for the ‘next REF’ (which from now on we will refer to as REF2020. In 2013, on behalf of the four UK Funding Councils, the Higher Education Funding Council for England (HEFCE undertook a two-stage consultation exercise on open access requirements for articles submitted to REF2020. There are a number of nuances and caveats to the current proposals. This article will reflect on what the probable rules might be, and their implications for research managers, administrators and institutional repository managers alike.

  8. Right of access to energy

    International Nuclear Information System (INIS)

    Delgado Triana, Yanelys; Fariñas Wong, Ernesto Yoel

    2015-01-01

    Energy is essential for the development of our life and for the development of production capacity. However, a number of people worldwide without this living, specifically power. To the extent that increase energy needs for domestic, industrial and agricultural use, each day more indispensable need access to this recognition as a human right or fundamental respect is made, so some questions in this paper are required both denominations, being essential to consider the emergence and evolution of these. An analysis of the international protection they receive the right of access to energy services, although currently there are no international treaties that specifically recognize it also performs a number of initiatives that promote its preservation manifested and recognized in several abstractly legal instruments, such as declarations, covenants and conventions. (full text)

  9. Accessing the VO with Python

    Science.gov (United States)

    Plante, R.; Fitzpatrick, M.; Graham, M.; Tody, D.; Young, W.

    2014-05-01

    We introduce two products for accessing the VO from Python: PyVO and VOClient. PyVO is built on the widely-used Astropy package and is well suited for integrating automated access to astronomical data into highly customizable scripts and applications for data analysis in Python. VOClient is built on a collection of C-libraries and is well suited for integrating with multi-language analysis packages. It also provides a framework for integrating legacy software into the Python environment. In this demo, we will run through several examples demonstrate basic data discovery and retrieval of data. This includes finding archives containing data of interest (VO registry), retrieving datasets (SIA, SSA), and exploring (Cone Search, SLAP). VOClient features some extended capabilities including the ability to communicate to other desktop applications from a script using the SAMP protocol.

  10. Approximate Networking for Universal Internet Access

    Directory of Open Access Journals (Sweden)

    Junaid Qadir

    2017-12-01

    Full Text Available Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, global Internet. In this paper, we argue that instead of an exclusive focus on a utopian goal of universally accessible “ideal networking” (in which we have a high throughput and quality of service as well as low latency and congestion, we should consider providing “approximate networking” through the adoption of context-appropriate trade-offs. In this regard, we propose to leverage the advances in the emerging trend of “approximate computing” that rely on relaxing the bounds of precise/exact computing to provide new opportunities for improving the area, power, and performance efficiency of systems by orders of magnitude by embracing output errors in resilient applications. Furthermore, we propose to extend the dimensions of approximate computing towards various knobs available at network layers. Approximate networking can be used to provision “Global Access to the Internet for All” (GAIA in a pragmatically tiered fashion, in which different users around the world are provided a different context-appropriate (but still contextually functional Internet experience.

  11. Enhancing Ocean Research Data Access

    Science.gov (United States)

    Chandler, Cynthia; Groman, Robert; Shepherd, Adam; Allison, Molly; Arko, Robert; Chen, Yu; Fox, Peter; Glover, David; Hitzler, Pascal; Leadbetter, Adam; Narock, Thomas; West, Patrick; Wiebe, Peter

    2014-05-01

    The Biological and Chemical Oceanography Data Management Office (BCO-DMO) works in partnership with ocean science investigators to publish data from research projects funded by the Biological and Chemical Oceanography Sections and the Office of Polar Programs Antarctic Organisms & Ecosystems Program at the U.S. National Science Foundation. Since 2006, researchers have been contributing data to the BCO-DMO data system, and it has developed into a rich repository of data from ocean, coastal and Great Lakes research programs. While the ultimate goal of the BCO-DMO is to ensure preservation of NSF funded project data and to provide open access to those data, achievement of those goals is attained through a series of related phases that benefits from active collaboration and cooperation with a large community of research scientists as well as curators of data and information at complementary data repositories. The BCO-DMO is just one of many intermediate data management centers created to facilitate long-term preservation of data and improve access to ocean research data. Through partnerships with other data management professionals and active involvement in local and global initiatives, BCO-DMO staff members are working to enhance access to ocean research data available from the online BCO-DMO data system. Continuing efforts in use of controlled vocabulary terms, development of ontology design patterns and publication of content as Linked Open Data are contributing to improved discovery and availability of BCO-DMO curated data and increased interoperability of related content available from distributed repositories. We will demonstrate how Semantic Web technologies (e.g. RDF/XML, SKOS, OWL and SPARQL) have been integrated into BCO-DMO data access and delivery systems to better serve the ocean research community and to contribute to an expanding global knowledge network.

  12. Information Access for Disabled Students

    OpenAIRE

    Cypaite, Asta; Šerkšnien, Justina; Rudžioniene, Jurgita

    2008-01-01

    Disabled students who makes relatively small part of the academic society are in risk to disappear among all other students, due to their communication and mobility difficulties have less possibilities to satisfy their needs, ensuring their rights to qualitative studies, equal opportunities in the labor market and social integration. A topic about information accessibility for disabled students is extremely important because of their information exclusion in their study process at the un...

  13. Fosterage and Access to Schooling in Savelugu-Nanton, Ghana. CREATE Pathways to Access. Research Monograph No. 59

    Science.gov (United States)

    Rolleston, Caine

    2011-01-01

    Fosterage is an important cultural institution which serves to strengthen kinship solidarity among a range of other functions including meeting needs for child labour. Its effects on education are ambiguous. This study examines fostering as a possible contributor to the low levels of educational access and progress in the district using secondary…

  14. Vertical and horizontal access configurations

    International Nuclear Information System (INIS)

    Spampinato, P.T.

    1987-01-01

    A number of configuration features and maintenance operations are influenced by the choice of whether a design is based on vertical or horizontal access for replacing reactor components. The features which are impacted most include the first wall/blanket segmentation, the poloidal field coil locations, the toroidal field coil number and size, access port size for in-vessel components, and facilities. Since either configuration can be made to work, the choice between the two is not clear cut because both have certain advantages. It is apparent that there are large cost benefits in the poloidal field coil system for ideal coil locations for high elongation plasmas and marginal savings for the INTOR case. If we assume that a new tokamak design will require a higher plasma elongation, the recommendation is to arrange the poloidal field coils in a cost-effective manner while providing reasonable midplane access for heating interfaces and test modules. If a new design study is not based on a high elongation plasma, it still appears prudent to consider this approach so that in-vessel maintenance can be accomplished without moving very massive structures such as the bulk shield. 10 refs., 29 figs., 3 tabs

  15. Accessing and disclosing protected resources

    DEFF Research Database (Denmark)

    Olesen, Henning; Khajuria, Samant

    2014-01-01

    TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers and enterpr......TODAY, DATA IS MONEY. Whether it is private users’ personal data or confidential data and assets belonging to service providers, all parties have a strong need to protect their resources when interacting with each other, i.e. for access control and authorization. For service providers...... and enterprises resources are usually well safeguarded, while private users are often missing the tools and the know-how to protect their own data and preserve their privacy. The user’s personal data have become an economic asset, not necessarily to the owners of these data, but to the service providers, whose...... business mod- els often includes the use of these data. In this paper we focus on the user – service provider interaction and discuss how recent technological progress, in particular the framework of User Managed Access (UMA), can enable users to understand the value of their protected resources...

  16. [Vascular access guidelines for hemodialysis].

    Science.gov (United States)

    Rodríguez Hernández, J A; González Parra, E; Julián Gutiérrez, J M; Segarra Medrano, A; Almirante, B; Martínez, M T; Arrieta, J; Fernández Rivera, C; Galera, A; Gallego Beuter, J; Górriz, J L; Herrero, J A; López Menchero, R; Ochando, A; Pérez Bañasco, V; Polo, J R; Pueyo, J; Ruiz, Camps I; Segura Iglesias, R

    2005-01-01

    Quality of vascular access (VA) has a remarkable influence in hemodialysis patients outcomes. Dysfunction of VA represents a capital cause of morbi-mortality of these patients as well an increase in economical. Spanish Society of Neprhology, aware of the problem, has decided to carry out a revision of the issue with the aim of providing help in comprehensión and treatment related with VA problems, and achieving an homogenization of practices in three mayor aspects: to increase arteriovenous fistula utilization as first vascular access, to increment vascular access monitoring practice and rationalise central catheters use. We present a consensus document elaborated by a multidisciplinar group composed by nephrologists, vascular surgeons, interventional radiologysts, infectious diseases specialists and nephrological nurses. Along six chapters that cover patient education, creation of VA, care, monitoring, complications and central catheters, we present the state of the art and propose guidelines for the best practice, according different evidence based degrees, with the intention to provide help at the professionals in order to make aproppiate decissions. Several quality standars are also included.

  17. Predatory Open Access in Rehabilitation.

    Science.gov (United States)

    Manca, Andrea; Martinez, Gianluca; Cugusi, Lucia; Dragone, Daniele; Mercuro, Giuseppe; Deriu, Franca

    2017-05-01

    Increasingly scholars and researchers are being solicited by predatory open access journals seeking manuscript submissions and abusing the author-pays model by charging authors with publishing fees without any or proper peer review. Such questionable editorial practices are threatening the reputation and credibility of scholarly publishing. To date, no investigation has been conducted on this phenomenon in the field of rehabilitation. This study attempts to identify specific predatory journals operating in this field to quantify the phenomenon and its geographic distribution. Beall's List has been used to this end which, although not perfect, is a comprehensive and up-to-date report of predatory publishers. Of the 1113 publishers on the list, 59 journals were identified, for a total of 5610 published articles. The median number of articles published by each journal was 21, and the median amount of article processing charges was $499. Only 1 out of 59 journals was included in the Directory of Open Access Journals, whereas 7 (12%) were indexed by PubMed. Most of the publishers were based in India (36%) followed by the United States (25%) and Pakistan (5%), and 25% were without a verifiable address. The data indicate that the threat of predatory publishing in rehabilitation is real. Physiatrists, physiotherapists, researchers, and academics operating in this field are advised to use the tools available to recognize predatory practices before considering publishing in open access journals. Copyright © 2017 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  18. Access to IEEE Electronic Library

    CERN Multimedia

    2007-01-01

    From 2007, the CERN Library now offers readers online access to the complete IEEE Electronic Library (Institute of Electrical and Electronics Engineers). This new licence gives unlimited online access to all IEEE and IET (previously IEE) journals and proceedings as well as all current IEEE standards and selected archived ones. Some of the titles offer volumes back to 1913. This service currently represents more than 1,400,000 full-text articles! This leading engineering information resource replaces the previous service, a sub-product of the IEEE database called 'IEEE Enterprise', which offered online access to the complete collection of IEEE journals and proceedings, but with limited features. The service had become so popular that the CERN Working Group for Acquisitions recommended that the Library subscribe to the complete IEEE Electronic Library for 2007. Usage statistics for recent months showed there was a demand for the service from a large community of CERN users and we were aware that many users h...

  19. Support the Open Access Movement

    CERN Multimedia

    2005-01-01

    CERN's Executive Board recently endorsed a new policy of open access to the laboratory's results: Continuing CERN action on Open Access (OA) [http://cds.cern.ch/record/828991/files/open-2005-006.pdf]. What does this policy mean for you? CERN authors have two responsibilities: Submit your document to the CERN Document Server; Consider submitting future articles to an Open Access journal. Since 2001, Operational Circular No. 6 has required every CERN author (Staff member, Fellow, or any Associated member of personnel who is allowed to use CERN as his affiliation) to submit a copy of their scientific documents to the CERN Document Server (CDS). For some groups all approved documents are submitted by the secretary (see the Departments' policies at: http://library.cern.ch/cern_publications/cern_publication_policy.html). Each author should personally also ensure the submission of any other articles which are not added in this way, such as conference contributions and review articles. It is not sufficient to re...

  20. Survey on Cloud Radio Access Network

    Directory of Open Access Journals (Sweden)

    Reeta Chhatani

    2016-01-01

    Full Text Available The existing wireless network will face the challenge of data tsunami in the near future. Densification of network will deal huge data traffic but will increase the interferences and network cost. At the same time, the existing wireless network is underutilized due to dynamic traffic. To deal with this adverse scenario, a change in the current network architecture is required. Based on virtualization, Cloud Radio Access Network (CRAN was proposed for wireless network. In CRAN the functionality of base station will be distributed into base band unit (BBU and remote radio heads (RRH which will achieve benefits of centralization. This paper presents a survey on CRAN centring on optimized resource allocation, energy efficiency and throughput maximization under fronthaul capacity. The existing solution and future opportunities in CRAN are also summarized.

  1. Accessing Specific Peptide Recognition by Combinatorial Chemistry

    DEFF Research Database (Denmark)

    Li, Ming

    Molecular recognition is at the basis of all processes for life, and plays a central role in many biological processes, such as protein folding, the structural organization of cells and organelles, signal transduction, and the immune response. Hence, my PhD project is entitled “Accessing Specific...... Peptide Recognition by Combinatorial Chemistry”. Molecular recognition is a specific interaction between two or more molecules through noncovalent bonding, such as hydrogen bonding, metal coordination, van der Waals forces, π−π, hydrophobic, or electrostatic interactions. The association involves kinetic....... Combinatorial chemistry was invented in 1980s based on observation of functional aspects of the adaptive immune system. It was employed for drug development and optimization in conjunction with high-throughput synthesis and screening. (chapter 2) Combinatorial chemistry is able to rapidly produce many thousands...

  2. Deployment of Remotely-Accessible Robotics Laboratory

    Directory of Open Access Journals (Sweden)

    Richard Balogh

    2012-03-01

    Full Text Available Robotnacka is an autonomous drawing mobile robot, designed for eaching beginners in the Logo programming language. It can also be used as an experimental platform, in our case in a remotely accessible robotic laboratory with the possibility to control the robots via the Internet. In addition to a basic version of the robot a version equipped with a gripper is available too, one with a wireless camera, and one with additional ultrasonic distance sensors. The laboratory is available on-line permanently and provides a simple way to incorporate robotics in teaching mathematics, programming and other subjects. The laboratory has been in use several years. We provide description of its functionality and summarize our experience.

  3. Vascular access in pediatric patients in the emergency department: types of access, indications, and complications [digest].

    Science.gov (United States)

    Whitney, Rachel; Langhan, Melissa; Pade, Kathryn H

    2017-06-22

    Vascular access is a potentially life-saving procedure that is a mainstay of emergency medicine practice. There are a number of challenges associated with obtaining and maintaining vascular access, and the choice of the route of access and equipment used will depend on patient- and provider-specific factors. In this issue, the indications and complications of peripheral intravenous access, intraosseous access, and central venous access are reviewed. Timely and effective assessment and management of difficult-access patients, pain control techniques that can assist vascular access, and contraindications to each type of vascular access are also discussed. [Points & Pearls is a digest of Pediatric Emergency Medicine Practice].

  4. 75 FR 47304 - Accessible Mobile Phone Options for People Who Are Blind, Deaf-Blind, or Have Low Vision

    Science.gov (United States)

    2010-08-05

    ... FEDERAL COMMUNICATIONS COMMISSION [CG Docket No. 10-145; DA 10-1324] Accessible Mobile Phone... phone features and functions in the current marketplace that are not accessible for people who are blind... wireless phones--particularly among less expensive or moderately-priced handset models--that are accessible...

  5. Assessment of the accessibility legislation in Spain and its effective application

    Directory of Open Access Journals (Sweden)

    Jesús Hernández-Galán

    2014-10-01

    Full Text Available The existence of legislation on accessibility does not always imply it is enforced effectively. This article aims to answer the following question: Is the existence of accessibility legislation enough to make physical environments truly accessible?This study assesses the current Spanish legislation as well as any existing voluntary regulations in the country. This assessment is done chronologically, so as to show the historical evolution of the accessibility regulations in Spain.In order to determine whether accessibility legislation has been truly effectively enforced, the issue is studied as it affects Spanish municipalities with respect to urban planning, public buildings, public transportation and websites. The conclusion of this study is that the existence of accessibility legislation per se is not enough to ensure its practical application, and ultimately, to render physical environments, products and services accessible to the majority of the population regardless of their functional capabilities.

  6. Integrity Based Access Control Model for Multilevel XML Document

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; FENG Xue-bin; HUANO Zhi; ZHENG Ming-hui

    2008-01-01

    XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT,UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application.

  7. Surveillance of Hemodialysis Vascular Access with Ultrasound Vector Flow Imaging

    DEFF Research Database (Denmark)

    Brandt, Andreas Hjelm; Olesen, Jacob Bjerring; Lindskov Hansen, Kristoffer

    2015-01-01

    -functioning vascular access with as few complications as possible and preferred vascular access is an AVF. Dysfunction due to stenosis is a common complication, and regular monitoring of volume flow is recommended to preserve AVF patency. UDT is considered the gold standard for volume flow surveillance, but VFI has...... proven to be more precise, when performing single repeated instantaneous measurements. Three patients with AVF were monitored with UDT and VFI monthly for five months. A commercial ultrasound scanner with a 9 MHz linear array transducer with integrated VFI was used to obtain data. UDT values were...... be used for surveillance of volume flow....

  8. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  9. Self-Access Centers: Maximizing Learners’ Access to Center Resources

    Directory of Open Access Journals (Sweden)

    Mark W. Tanner

    2010-09-01

    Full Text Available Originally published in TESL-EJ March 2009, Volume 12, Number 4 (http://tesl-ej.org/ej48/a2.html. Reprinted with permission from the authors.Although some students have discovered how to use self-access centers effectively, the majority appear to be unaware of available resources. A website and database of materials were created to help students locate materials and use the Self-Access Study Center (SASC at Brigham Young University’s English Language Center (ELC more effectively. Students took two surveys regarding their use of the SASC. The first survey was given before the website and database were made available. A second survey was administered 12 weeks after students had been introduced to the resource. An analysis of the data shows that students tend to use SASC resources more autonomously as a result of having a web-based database. The survey results suggest that SAC managers can encourage more autonomous use of center materials by provided a website and database to help students find appropriate materials to use to learn English.

  10. Functional Credentials

    Directory of Open Access Journals (Sweden)

    Deuber Dominic

    2018-04-01

    Full Text Available A functional credential allows a user to anonymously prove possession of a set of attributes that fulfills a certain policy. The policies are arbitrary polynomially computable predicates that are evaluated over arbitrary attributes. The key feature of this primitive is the delegation of verification to third parties, called designated verifiers. The delegation protects the privacy of the policy: A designated verifier can verify that a user satisfies a certain policy without learning anything about the policy itself. We illustrate the usefulness of this property in different applications, including outsourced databases with access control. We present a new framework to construct functional credentials that does not require (non-interactive zero-knowledge proofs. This is important in settings where the statements are complex and thus the resulting zero-knowledge proofs are not efficient. Our construction is based on any predicate encryption scheme and the security relies on standard assumptions. A complexity analysis and an experimental evaluation confirm the practicality of our approach.

  11. A System to Generate SignWriting for Video Tracks Enhancing Accessibility of Deaf People

    OpenAIRE

    Elena Verdú; Cristina Pelayo G-Bustelo; Ángeles Martínez Sánchez; Rubén Gonzalez-Crespo

    2017-01-01

    Video content has increased much on the Internet during last years. In spite of the efforts of different organizations and governments to increase the accessibility of websites, most multimedia content on the Internet is not accessible. This paper describes a system that contributes to make multimedia content more accessible on the Web, by automatically translating subtitles in oral language to Sign Writing, a way of writing Sign Language. This system extends the functionality of a general we...

  12. Converged wireline and wireless signal distribution in optical fiber access networks

    DEFF Research Database (Denmark)

    Prince, Kamau

    This thesis presents results obtained during the course of my doctoral studies into the transport of fixed and wireless signaling over a converged otpical access infrastructure. In the formulation, development and assessment of a converged paradigma for multiple-services delivery via optical access...... networking infrastructure, I have demonstrated increased functionalities with existing optical technologies and commercially available optoelectronic devices. I have developed novel systems for extending the range of optical access systems, and have demonstrated the repurposing of standard digital devices...

  13. Comparison of Radial Access, Guided Femoral Access, and Non-Guided Femoral Access Among Women Undergoing Percutaneous Coronary Intervention.

    Science.gov (United States)

    Koshy, Linda M; Aberle, Laura H; Krucoff, Mitchell W; Hess, Connie N; Mazzaferri, Ernest; Jolly, Sanjit S; Jacobs, Alice; Gibson, C Michael; Mehran, Roxana; Gilchrist, Ian C; Rao, Sunil V

    2018-01-01

    This study was conducted to determine the association between radial access, guided femoral access, and non-guided femoral access on postprocedural bleeding and vascular complications after percutaneous coronary intervention (PCI). Bleeding events and major vascular complications after PCI are associated with increased morbidity, mortality, and cost. While the radial approach has been shown to be superior to the femoral approach in reducing bleeding and vascular complications, whether the use of micropuncture, fluoroscopy, or ultrasound mitigates these differences is unknown. We conducted a post hoc analysis of women in the SAFE-PCI for Women trial who underwent PCI and had the access method identified (n = 643). The primary endpoint of postprocedure bleeding or vascular complications occurring within 72 hours or at discharge was adjudicated by an independent clinical events committee and was compared based on three categories of access technique: radial, guided femoral (fluoroscopy, micropuncture, ultrasound), or non-guided femoral (none of the aforementioned). Differences between the groups were determined using multivariate logistic regression using radial access as the reference. Of the PCI population, 330 underwent radial access, 228 underwent guided femoral access, and 85 underwent non-guided femoral access. There was a statistically significant lower incidence of the primary endpoint with radial access vs non-guided femoral access; however, there was no significant difference between radial approach and femoral access guided by fluoroscopy, micropuncture, or ultrasound. This post hoc analysis demonstrates that while radial access is safer than non-guided femoral access, guided femoral access appears to be associated with similar bleeding events or vascular complications as radial access.

  14. Enterprise wide transparent information access

    International Nuclear Information System (INIS)

    Brown, J.

    1995-05-01

    The information management needs of the Department of Energy (DOE) represents a fertile domain for the development of highly sophisticated yet intuitive enterprise-wide computing solutions. These solutions must support business operations, research agendas, technology development efforts, decision support, and other application areas with a user base ranging from technical staff to the highest levels of management. One area of primary interest is in the Environmental Restoration and Waste Management Branch of DOE. In this arena, the issue of tracking and managing nuclear waste related to the long legacy of prior defense production and research programs is one of high visibility and great concern. The Tank Waste Information Network System (TWINS) application has been created by the Pacific Northwest Laboratory (PNL) for the DOE to assist in managing and accessing the information related to this mission. The TWINS solution addresses many of the technical issues faced by other efforts to provide integrated information access to a wide variety of stakeholders. TWINS provides secure transparent access to distributed heterogeneous multimedia information sources from around the DOE complex. The users interact with the information through a consistent user interface that presents the desired data in a common format regardless of the structure of the source information. The solutions developed by the TWINS project represent an integration of several technologies and products that can be applied to other mission areas within DOE and other government agencies. These solutions are now being applied to public and private sector problem domains as well. The successful integration and inter-operation of both commercial and custom modules into a flexible and extensible information architecture will help ensure that new problems facing DOE and other clients can be addressed more rapidly in the future by re-use of existing tools and techniques proven viable through the TWINS efforts

  15. LERU roadmap towards Open Access.

    Science.gov (United States)

    Ayris, Paul; Björnshauge, Lars; Collier, Mel; Ferwerda, Eelco; Jacobs, Neil; Sinikara, Kaisa; Swan, Alma; de Bries, Saskia; van Wesenbeeck, Astrid

    2015-09-01

    Money which is not directly spent on research and education, even though it is largely taxpayers´ money. As Harvard University already denounced in 2012, many large journal publishers have rendered the situation "fiscally unsustainable and academically restrictive", with some journals costing as much as $40,000 per year (and publishers drawing profits of 35% or more). If one of the wealthiest universities in the world can no longer afford it, who can? It is easy to picture the struggle of European universities with tighter budgets. In addition to subscription costs, academic research funding is also largely affected by "Article Processing Charges" (APC), which come at an additional cost of €2000/article, on average, when making individual articles Gold Open Access. Some publishers are in this way even being paid twice for the same content ("double dipping"). In the era of Open Science, Open Access to publications is one of the cornerstones of the new research paradigm and business models must support this transition. It should be one of the principal objectives of Commissioner Carlos Moedas and the Dutch EU Presidency (January-June 2016) to ensure that this transition happens. Further developing the EU´s leadership in research and innovation largely depends on it. With this statement "Moving Forwards on Open Access", LERU calls upon all universities, research institutes, research funders and researchers to sign this statement and give a clear signal towards the European Commission and the Dutch EU Presidency. Copyright© by the Spanish Society for Microbiology and Institute for Catalan Studies.

  16. Open access to scientific publishing

    Directory of Open Access Journals (Sweden)

    Janne Beate Reitan

    2016-12-01

    Full Text Available Interest in open access (OA to scientific publications is steadily increasing, both in Norway and internationally. From the outset, FORMakademisk has been published as a digital journal, and it was one of the first to offer OA in Norway. We have since the beginning used Open Journal Systems (OJS as publishing software. OJS is part of the Public Knowledge Project (PKP, which was created by Canadian John Willinsky and colleagues at the Faculty of Education at the University of British Columbia in 1998. The first version of OJS came as an open source software in 2001. The programme is free for everyone to use and is part of a larger collective movement wherein knowledge is shared. When FORMakademisk started in 2008, we received much help from the journal Acta Didactic (n.d. at the University of Oslo, which had started the year before us. They had also translated the programme to Norwegian. From the start, we were able to publish in both Norwegian and English. Other journals have used FORMakademisk as a model and source of inspiration when starting or when converting from subscription-based print journals to electronic OA, including the Journal of Norwegian Media Researchers [Norsk medietidsskrift]. It is in this way that the movement around PKP works and continues to grow to provide free access to research. As the articles are OA, they are also easily accessible to non-scientists. We also emphasise that the language should be readily available, although it should maintain a high scientific quality. Often there may be two sides of the same coin. We on the editorial team are now looking forward to adopting the newly developed OJS 3 this spring, with many new features and an improved design for users, including authors, peer reviewers, editors and readers.

  17. Teach yourself visually Access 2013

    CERN Document Server

    McFedries, Paul

    2013-01-01

    The easy, visual way to learn this popular database program Part of the Office 2013 productivity suite, Access enables you to organize, present, analyze, and share data on a network or over the web. With this Visual guide to show you how, you'll master the fundamentals of this robust database application in no time. Clear, step-by-step instructions are illustrated with full-color screen shots that show exactly what you should see on your screen. Learn to enter new records; create, edit, and design tables and forms; develop queries that generate specific reports; add smart tags to y

  18. Accessing social rights in Denmark

    DEFF Research Database (Denmark)

    Jacqueson, Catherine

    2015-01-01

    are in decreasing order Polish, German and British nationals. Debates among politicians reflected in the media have since the enlargement of the EU to 10 new Member States in 2004 focused on and off on the issue of access by migrants to social benefits and the issue of social tourism. The debate and discussions...... 2014. The reason for that is the government’s change of practice in administrating family benefits, granting them to all Union citizens lawfully residing in Denmark without any requirement of prior residence in the country. This change was the result of a request from the European Commission...

  19. Urban search mobile platform modeling in hindered access conditions

    Science.gov (United States)

    Barankova, I. I.; Mikhailova, U. V.; Kalugina, O. B.; Barankov, V. V.

    2018-05-01

    The article explores the control system simulation and the design of the experimental model of the rescue robot mobile platform. The functional interface, a structural functional diagram of the mobile platform control unit, and a functional control scheme for the mobile platform of secure robot were modeled. The task of design a mobile platform for urban searching in hindered access conditions is realized through the use of a mechanical basis with a chassis and crawler drive, a warning device, human heat sensors and a microcontroller based on Arduino platforms.

  20. 5 CFR 2606.203 - Granting access.

    Science.gov (United States)

    2010-01-01

    ... Access to Records and Accounting of Disclosures § 2606.203 Granting access. (a) The methods for allowing... documentation will be required for the disclosure to the data subject of information required to be made...

  1. Internet Accessibility: Challenges before the African Nations

    African Journals Online (AJOL)

    Internet Accessibility: Challenges Before The African Nations. 207. Information ... increasing internet access in Africa (Jensen, ... bite, particularly in the area of policy ... especially the urban and rural poor. ... supply, but electricity power supply.

  2. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  3. Open Access and ORCID poster presentation

    DEFF Research Database (Denmark)

    Elbæk, Mikael Karstensen; Ekstrøm, Jeannette

    2014-01-01

    and related topics such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc. ORCID ORCID – Open Research & Contributor ID – is an internationally recognized and widely used researcher-ID. ORCID makes it easy to reuse your data across disciplines, publishers and databases – all you need to do......Open Access Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all...... peer review articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access...

  4. Accessing Sexual and Reproductive Health Information and ...

    African Journals Online (AJOL)

    Accessing Sexual and Reproductive Health Information and Services: A Mixed Methods Study of Young ... PROMOTING ACCESS TO AFRICAN RESEARCH ... and services in Soweto, South Africa using quantitative and qualitative methods.

  5. Accessing VA Healthcare During Large-Scale Natural Disasters.

    Science.gov (United States)

    Der-Martirosian, Claudia; Pinnock, Laura; Dobalian, Aram

    2017-01-01

    Natural disasters can lead to the closure of medical facilities including the Veterans Affairs (VA), thus impacting access to healthcare for U.S. military veteran VA users. We examined the characteristics of VA patients who reported having difficulty accessing care if their usual source of VA care was closed because of natural disasters. A total of 2,264 veteran VA users living in the U.S. northeast region participated in a 2015 cross-sectional representative survey. The study used VA administrative data in a complex stratified survey design with a multimode approach. A total of 36% of veteran VA users reported having difficulty accessing care elsewhere, negatively impacting the functionally impaired and lower income VA patients.

  6. Local Nucleosome Dynamics Facilitate Chromatin Accessibility in Living Mammalian Cells

    Directory of Open Access Journals (Sweden)

    Saera Hihara

    2012-12-01

    Full Text Available Genome information, which is three-dimensionally organized within cells as chromatin, is searched and read by various proteins for diverse cell functions. Although how the protein factors find their targets remains unclear, the dynamic and flexible nature of chromatin is likely crucial. Using a combined approach of fluorescence correlation spectroscopy, single-nucleosome imaging, and Monte Carlo computer simulations, we demonstrate local chromatin dynamics in living mammalian cells. We show that similar to interphase chromatin, dense mitotic chromosomes also have considerable chromatin accessibility. For both interphase and mitotic chromatin, we observed local fluctuation of individual nucleosomes (∼50 nm movement/30 ms, which is caused by confined Brownian motion. Inhibition of these local dynamics by crosslinking impaired accessibility in the dense chromatin regions. Our findings show that local nucleosome dynamics drive chromatin accessibility. We propose that this local nucleosome fluctuation is the basis for scanning genome information.

  7. Turkish-German Access to Higher Education: An Historical and Democratic Theory Analysis, 1960-2010

    Science.gov (United States)

    Gonzalez, Roger Geertz

    2012-01-01

    This article looks at access to higher education in Germany. For a number of reasons, explained in this article, higher education is presently an elite system that privileges ethnic Germans while preventing Turkish-Germans from gaining sufficient access into academe. If Germany is to become a fully functioning multicultural democracy with equal…

  8. Quantitative analysis of access strategies to remote information in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach in...

  9. Open Access og Den Bibliometriske Forskningsindikator

    DEFF Research Database (Denmark)

    Dorch, Bertil

    2011-01-01

    I sine "Anbefalinger til implementering af Open Access i Danmark" foreslår det nationale Open Access Udvalget blandet andet, at Den Bibliometriske Forskningsindikator (BFI) bør koordineres med en national Open Access-politik. I dette paper, der er baseret på et blogindlæg, fremfører forfatteren...... fire grunde til, hvorfor han synes det er en dårlig idé at koble Open Access til BFI....

  10. Wireless Multi Hop Access Networks and Protocols

    OpenAIRE

    Nilsson Plymoth, Anders

    2007-01-01

    As more and more applications and services in our society now depend on the Internet, it is important that dynamically deployed wireless multi hop networks are able to gain access to the Internet and other infrastructure networks and services. This thesis proposes and evaluates solutions for providing multi hop Internet Access. It investigates how ad hoc networks can be combined with wireless and mesh networks in order to create wireless multi hop access networks. When several access points t...

  11. World Summit embraces Open Access, libraries

    CERN Multimedia

    Kaser, D

    2004-01-01

    "The long-anticipated "first phase" meeting of the World Summit on the Information Society (WSIS), held in Geneva in December, was supposed to have been about equal access. It turned out being equally about open access as leading scientific organizations pushed their open-access initiative onto the World Summit agenda" (1 page)

  12. Open Access Publishing: What Authors Want

    Science.gov (United States)

    Nariani, Rajiv; Fernandez, Leila

    2012-01-01

    Campus-based open access author funds are being considered by many academic libraries as a way to support authors publishing in open access journals. Article processing fees for open access have been introduced recently by publishers and have not yet been widely accepted by authors. Few studies have surveyed authors on their reasons for publishing…

  13. Telecentres, Access and Development: Experience and Lessons ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Universal access to ICTs has in recent years become a policy goal for many national ... is able to make use of a publicly available resource, such as information and ... access centres (public telephones, cybercafes, telecentres, business centres, etc.) ... The book examines the relationship between shared access centres, the ...

  14. Gender and access to land in Senegal

    International Development Research Centre (IDRC) Digital Library (Canada)

    bequests, gifts and loans emerge as the principal means of access to land. These types of access prior to the law on state land property (assignment) still retain a large social legitimacy. Often, these forms of access (family allowance, legacy) in which men are privileged, serve as reference for local officials who administer ...

  15. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  16. Strategies to improve smallholders' market access

    NARCIS (Netherlands)

    Tilburg, van A.; Schalkwyk, van H.D.

    2011-01-01

    Smallholders, especially in less developed countries, have encountered several challenges in gaining access to markets. Market access includes the ability to obtain necessary farm inputs and farm services, and the ability to deliver farm products to buyers. Market access was less of a problem in the

  17. 77 FR 66052 - Program Access Rules

    Science.gov (United States)

    2012-10-31

    ... delivered, cable-affiliated RSNs in the 2010 Program Access Order. 3. With respect to the first element (the... exclusive contract involving a cable-affiliated RSN is an ``unfair act.'' In the 2010 Program Access Order... Agreements 18. ACA also urges the Commission to revise the program access rules to prohibit cable-affiliated...

  18. 76 FR 67440 - Market Access Agreement

    Science.gov (United States)

    2011-11-01

    ... FARM CREDIT ADMINISTRATION Market Access Agreement AGENCY: Farm Credit Administration. ACTION: Notice of Draft Second Amended and Restated Market Access Agreement; request for comments. SUMMARY: The... Market Access Agreement (the ``Restated MAA'') is entered into among AgFirst Farm Credit Bank, AgriBank...

  19. 75 FR 76729 - Market Access Agreement

    Science.gov (United States)

    2010-12-09

    ... FARM CREDIT ADMINISTRATION Market Access Agreement AGENCY: Farm Credit Administration. ACTION: Notice of approval of the draft amendment to the amended and restated market access agreement. SUMMARY... Credit Bank of Wichita and the Western Farm Credit Bank under Section 7.12 of the Market Access Agreement...

  20. Five Steps to an Accessible Classroom Website

    Science.gov (United States)

    Amundson, Linda

    2009-01-01

    When teachers or technology coordinators publish a website, they are providing a product for a diverse group of people. That's why website design should follow accessibility guidelines. Websites should be accessible to those with visual, hearing, movement, cognitive, and speech disabilities. Good design means greater accessibility for all. This…

  1. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  2. Mobile and Accessible Learning for MOOCs

    Science.gov (United States)

    Sharples, Mike; Kloos, Carlos Delgado; Dimitriadis, Yannis; Garlatti, Serge; Specht, Marcus

    2015-01-01

    Many modern web-based systems provide a "responsive" design that allows material and services to be accessed on mobile and desktop devices, with the aim of providing "ubiquitous access." Besides offering access to learning materials such as podcasts and videos across multiple locations, mobile, wearable and ubiquitous…

  3. Access to Information and Privacy | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    As a Crown corporation, IDRC is subject to Canada's laws on access to information and privacy protection. The following resources will help you learn more about IDRC and the access to information and privacy acts, including instructions for submitting an access to information or privacy act (ATIP) request. IDRC and ATIP ...

  4. High accessible experimental information on CPD experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hasegawa, M. [RIAM, Kyushu University, Kasuga, Fukuoka 816-8580 (Japan)], E-mail: hasegawa@triam.kyushu-u.ac.jp; Nakamura, K.; Higashijima, A.; Kawasaki, S.; Nakashima, H.; Sato, K.N.; Zushi, H.; Hanada, K.; Sakamoto, M.; Idei, H. [RIAM, Kyushu University, Kasuga, Fukuoka 816-8580 (Japan)

    2008-04-15

    On CPD [1] (Compact PWI experimental Device) experiment, information of electronic logbook and sequence status are distributed by Web services to prepare future experimental environment such as steady state operation and remote participation. Hence, all the researchers can acquire information with a Web browser installed on a personal computer if they are connected to the Internet. However, to carry a notebook computer all the time is a burden to researchers. Furthermore, the researchers may not be always connected to the Internet. Mobile phones are superior in portability compared to notebook computers, and are easy to connect with Internet through the wireless network of the telecom carriers. Moreover, since recent mobile phones have full browsing function, their affinities to the Web services are becoming high. On this account, Web services for mobile phones are developed to access experimental information. For sequence monitoring, a mobile application MIDlet that utilizes special functions of mobile phone such as sound and vibration is also developed to draw attentions of researchers to sequence status.

  5. High accessible experimental information on CPD experiment

    International Nuclear Information System (INIS)

    Hasegawa, M.; Nakamura, K.; Higashijima, A.; Kawasaki, S.; Nakashima, H.; Sato, K.N.; Zushi, H.; Hanada, K.; Sakamoto, M.; Idei, H.

    2008-01-01

    On CPD [1] (Compact PWI experimental Device) experiment, information of electronic logbook and sequence status are distributed by Web services to prepare future experimental environment such as steady state operation and remote participation. Hence, all the researchers can acquire information with a Web browser installed on a personal computer if they are connected to the Internet. However, to carry a notebook computer all the time is a burden to researchers. Furthermore, the researchers may not be always connected to the Internet. Mobile phones are superior in portability compared to notebook computers, and are easy to connect with Internet through the wireless network of the telecom carriers. Moreover, since recent mobile phones have full browsing function, their affinities to the Web services are becoming high. On this account, Web services for mobile phones are developed to access experimental information. For sequence monitoring, a mobile application MIDlet that utilizes special functions of mobile phone such as sound and vibration is also developed to draw attentions of researchers to sequence status

  6. Early transcriptional response of soybean contrasting accessions to root dehydration.

    Directory of Open Access Journals (Sweden)

    José Ribamar Costa Ferreira Neto

    Full Text Available Drought is a significant constraint to yield increase in soybean. The early perception of water deprivation is critical for recruitment of genes that promote plant tolerance. DeepSuperSAGE libraries, including one control and a bulk of six stress times imposed (from 25 to 150 min of root dehydration for drought-tolerant and sensitive soybean accessions, allowed to identify new molecular targets for drought tolerance. The survey uncovered 120,770 unique transcripts expressed by the contrasting accessions. Of these, 57,610 aligned with known cDNA sequences, allowing the annotation of 32,373 unitags. A total of 1,127 unitags were up-regulated only in the tolerant accession, whereas 1,557 were up-regulated in both as compared to their controls. An expression profile concerning the most representative Gene Ontology (GO categories for the tolerant accession revealed the expression "protein binding" as the most represented for "Molecular Function", whereas CDPK and CBL were the most up-regulated protein families in this category. Furthermore, particular genes expressed different isoforms according to the accession, showing the potential to operate in the distinction of physiological behaviors. Besides, heat maps comprising GO categories related to abiotic stress response and the unitags regulation observed in the expression contrasts covering tolerant and sensitive accessions, revealed the unitags potential for plant breeding. Candidate genes related to "hormone response" (LOX, ERF1b, XET, "water response" (PUB, BMY, "salt stress response" (WRKY, MYB and "oxidative stress response" (PER figured among the most promising molecular targets. Additionally, nine transcripts (HMGR, XET, WRKY20, RAP2-4, EREBP, NAC3, PER, GPX5 and BMY validated by RT-qPCR (four different time points confirmed their differential expression and pointed that already after 25 minutes a transcriptional reorganization started in response to the new condition, with important

  7. Lexical semantic access and letter access are involved in different aspects of reading

    DEFF Research Database (Denmark)

    Poulsen, Mads

    ). In this subset sample, both letter access and lexical access accounted for unique variance in reading fluency. The pattern of effects for lexical access did not change by controlling for serial rapid naming (RAN). Conclusions: The results suggest that letter access and lexical access are important for different......Purpose: This study investigated the effects of lexical access speed and letter access speed on reading fluency and reading comprehension. We hypothesized that 1) letter access speed would correlate with reading fluency but not comprehension, while 2) lexical access speed would influence reading...... comprehension. For readers who are struggling with recoding, most of the reading effort is probably tied up with recoding, leaving little to be explained by lexical access. Therefore we expected that 3) lexical access speed would primarily predict reading fluency for readers who were no longer struggling...

  8. Pharmaceutical market access in emerging markets: concepts, components, and future.

    Science.gov (United States)

    Kumar, Anuj; Juluru, Karthaveerya; Thimmaraju, Phani Kishore; Reddy, Jayachandra; Patil, Anand

    2014-01-01

    This article intends to consolidate the concepts of pharmaceutical market access and highlight its growing importance in emerging markets. Market access has gained considerable attention worldwide as countries try to contain their escalating healthcare expenditures amidst the global economic slowdown. This has resulted in governments adopting stricter measures for new product approval. Thus, pharmaceutical companies are finding it increasingly difficult to successfully address the specific challenges posed by various government and regulatory agencies and stakeholders. There is an increasing need to establish market access functions, especially in emerging markets, where the complex, dynamic healthcare landscape confounds product approval and uptake. Moreover, emerging markets are the engines of growth today, and, thus, performing in these markets is critical for the majority of pharmaceutical companies. To address the challenges posed by regulatory agencies and diverse stakeholders, a customized market access strategy is the need of the hour. A market access framework with specific tools and tactics will help companies to plan, implement, and monitor stakeholder engagement activities.

  9. Considering User's Access Pattern in Multimedia File Systems

    Science.gov (United States)

    Cho, KyoungWoon; Ryu, YeonSeung; Won, Youjip; Koh, Kern

    2002-12-01

    Legacy buffer cache management schemes for multimedia server are grounded at the assumption that the application sequentially accesses the multimedia file. However, user access pattern may not be sequential in some circumstances, for example, in distance learning application, where the user may exploit the VCR-like function(rewind and play) of the system and accesses the particular segments of video repeatedly in the middle of sequential playback. Such a looping reference can cause a significant performance degradation of interval-based caching algorithms. And thus an appropriate buffer cache management scheme is required in order to deliver desirable performance even under the workload that exhibits looping reference behavior. We propose Adaptive Buffer cache Management(ABM) scheme which intelligently adapts to the file access characteristics. For each opened file, ABM applies either the LRU replacement or the interval-based caching depending on the Looping Reference Indicator, which indicates that how strong temporally localized access pattern is. According to our experiment, ABM exhibits better buffer cache miss ratio than interval-based caching or LRU, especially when the workload exhibits not only sequential but also looping reference property.

  10. Disruptive technological advances in vascular access for dialysis: an overview.

    Science.gov (United States)

    Yeo, Wee-Song; Ng, Qin Xiang

    2017-11-29

    End-stage kidney disease (ESKD), one of the most prevalent diseases in the world and with increasing incidence, is associated with significant morbidity and mortality. Current available modes of renal replacement therapy (RRT) include dialysis and renal transplantation. Though renal transplantation is the preferred and ideal mode of RRT, this modality may not be available to all patients with ESKD. Moreover, renal transplant recipients are constantly at risk of complications associated with immunosuppression and immunosuppressant use, and posttransplant lymphoproliferative disorder. Dialysis may be the only available modality in certain patients. However, dialysis has its limitations, which include issues associated with lack of vascular access, risks of infections and vascular thrombosis, decreased quality of life, and absence of biosynthetic functions of the kidney. In particular, the creation and maintenance of hemodialysis vascular access in children poses a unique set of challenges to the pediatric nephrologist owing to the smaller vessel diameters and vascular hyperreactivity compared with adult patients. Vascular access issues continue to be one of the major limiting factors prohibiting the delivery of adequate dialysis in ESKD patients and is the Achilles' heel of hemodialysis. This review aims to provide a critical overview of disruptive technological advances and innovations for vascular access. Novel strategies in preventing neointimal hyperplasia, novel bioengineered products, grafts and devices for vascular access will be discussed. The potential impact of these solutions on improving the morbidity encountered by dialysis patients will also be examined.

  11. Perceptual consciousness overflows cognitive access.

    Science.gov (United States)

    Block, Ned

    2011-12-01

    One of the most important issues concerning the foundations of conscious perception centers on the question of whether perceptual consciousness is rich or sparse. The overflow argument uses a form of 'iconic memory' to argue that perceptual consciousness is richer (i.e., has a higher capacity) than cognitive access: when observing a complex scene we are conscious of more than we can report or think about. Recently, the overflow argument has been challenged both empirically and conceptually. This paper reviews the controversy, arguing that proponents of sparse perception are committed to the postulation of (i) a peculiar kind of generic conscious representation that has no independent rationale and (ii) an unmotivated form of unconscious representation that in some cases conflicts with what we know about unconscious representation. Copyright © 2011 Elsevier Ltd. All rights reserved.

  12. Efficient access of compressed data

    International Nuclear Information System (INIS)

    Eggers, S.J.; Shoshani, A.

    1980-06-01

    A compression technique is presented that allows a high degree of compression but requires only logarithmic access time. The technique is a constant suppression scheme, and is most applicable to stable databases whose distribution of constants is fairly clustered. Furthermore, the repeated use of the technique permits the suppression of a multiple number of different constants. Of particular interest is the application of the constant suppression technique to databases the composite key of which is made up of an incomplete cross product of several attribute domains. The scheme for compressing the full cross product composite key is well known. This paper, however, also handles the general, incomplete case by applying the constant suppression technique in conjunction with a composite key suppression scheme

  13. Digital autonomous terminal access communications

    Science.gov (United States)

    Novacki, S.

    1987-01-01

    A significant problem for the Bus Monitor Unit is to identify the source of a given transmission. This problem arises from the fact that the label which identifies the source of the transmission as it is put into the bus is intercepted by the Digital Autonomous Terminal Access Communications (DATAC) terminal and removed from the transmission. Thus, a given subsystem will see only data associated with a label and never the identifying label itself. The Bus Monitor must identify the source of the transmission so as to be able to provide some type of error identification/location in the event that some problem with the data transmission occurs. Steps taken to alleviate this problem by modifications to the DATAC terminal are discussed.

  14. Planetary data in education: tool development for access to the Planetary Data System

    Science.gov (United States)

    Atkinson, C. H.; Andres, P. M.; Liggett, P. K.; Lowes, L. L.; Sword, B. J.

    2003-01-01

    In this session we will describe and demonstrate the interface to the PDS access tools and functions developed for the scientific community, and discuss the potential for its utilization in K-14 formal and informal settings.

  15. Gender Barriers to Access to Antiretroviral Therapy and its Link to ...

    African Journals Online (AJOL)

    Gender Barriers to Access to Antiretroviral Therapy and its Link to ... to assess executive function, verbal fluency, working memory, learning memory, recall, ... there were no gender differences in performance in the neuropsychological testing.

  16. Data Access System for Hydrology

    Science.gov (United States)

    Whitenack, T.; Zaslavsky, I.; Valentine, D.; Djokic, D.

    2007-12-01

    As part of the CUAHSI HIS (Consortium of Universities for the Advancement of Hydrologic Science, Inc., Hydrologic Information System), the CUAHSI HIS team has developed Data Access System for Hydrology or DASH. DASH is based on commercial off the shelf technology, which has been developed in conjunction with a commercial partner, ESRI. DASH is a web-based user interface, developed in ASP.NET developed using ESRI ArcGIS Server 9.2 that represents a mapping, querying and data retrieval interface over observation and GIS databases, and web services. This is the front end application for the CUAHSI Hydrologic Information System Server. The HIS Server is a software stack that organizes observation databases, geographic data layers, data importing and management tools, and online user interfaces such as the DASH application, into a flexible multi- tier application for serving both national-level and locally-maintained observation data. The user interface of the DASH web application allows online users to query observation networks by location and attributes, selecting stations in a user-specified area where a particular variable was measured during a given time interval. Once one or more stations and variables are selected, the user can retrieve and download the observation data for further off-line analysis. The DASH application is highly configurable. The mapping interface can be configured to display map services from multiple sources in multiple formats, including ArcGIS Server, ArcIMS, and WMS. The observation network data is configured in an XML file where you specify the network's web service location and its corresponding map layer. Upon initial deployment, two national level observation networks (USGS NWIS daily values and USGS NWIS Instantaneous values) are already pre-configured. There is also an optional login page which can be used to restrict access as well as providing a alternative to immediate downloads. For large request, users would be notified via

  17. EPICS channel access using websocket

    International Nuclear Information System (INIS)

    Uchiyama, A.; Furukawa, K.; Higurashi, Y.

    2012-01-01

    Web technology is useful as a means of widely disseminating accelerator and beam status information. For this purpose, WebOPI was implemented by SNS as a web-based system using Ajax (asynchronous JavaScript and XML) with EPICS. On the other hand, it is often necessary to control the accelerator from different locations as well as the central control room during beam operation and maintenance. However, it is not realistic to replace the GUI-based operator interface (OPI) with a Web-based system using Ajax technology because of interactive performance issue. Therefore, as a next generation OPI over the web using EPICS Channel Access (CA), we developed a client system based on WebSocket, which is a new protocol provided by the Internet Engineering Task Force (IETF) for Web-based systems. WebSocket is a web technology that provides bidirectional, full-duplex communication channels over a single TCP connection. By utilizing Node.js and the WebSocket access library called Socket.IO, a WebSocket server was implemented. Node.js is a server-side JavaScript language built on the Google V8 JavaScript Engine. In order to construct the WebSocket server as an EPICS CA client, an add-on for Node.js was developed in C/C++ using the EPICS CA library, which is included in the EPICS base. As a result, for accelerator operation, Web-based client systems became available not only in the central control room but also with various types of equipment. (author)

  18. Making the library accessible for all a practical guide for librarians

    CERN Document Server

    Vincent, Jane

    2014-01-01

    Accessibility is becoming an issue that libraries can no longer ignore. Making the Library Accessible for All provides a holistic guide to accessibility that addresses common issues and gives strategies for responding to unique situations. This book is a single-source guide relevant to all library functions that librarians can easily refer to when planning, remediating, or evaluating for accessibility. It has a unique holistic perspective, as well as an emphasis on perceiving people with disabilities as providing resources to meet a common goal rather than as a population to be "served."

  19. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  20. Functionalized silica materials for electrocatalysis

    Indian Academy of Sciences (India)

    To increase the efficiency of the electrocatalytic process and to increase the electrochemical accessibility of the immobilized electrocatalysts, functionalized and non-functionalized mesoporous organo-silica (MCM41-type-materials) are used in this study. These materials possess several suitable properties to be durable ...

  1. Open Orchestration Cloud Radio Access Network (OOCRAN) Testbed

    OpenAIRE

    Floriach-Pigem, Marti; Xercavins-Torregrosa, Guillem; Marojevic, Vuk; Gelonch-Bosch, Antoni

    2017-01-01

    The Cloud radio access network (C-RAN) offers a revolutionary approach to cellular network deployment, management and evolution. Advances in software-defined radio (SDR) and networking technology, moreover, enable delivering software-defined everything through the Cloud. Resources will be pooled and dynamically allocated leveraging abstraction, virtualization, and consolidation techniques; processes will be automated using common application programming interfaces; and network functions and s...

  2. Access control and interlock system at the Advanced Photon Source

    International Nuclear Information System (INIS)

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D.

    1997-01-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS's design philosophy, configuration, hardware, functionality, validation requirements, and operational experience

  3. Medical smart cards: health care access in your pocket.

    Science.gov (United States)

    Krohn, R W

    2000-01-01

    The wallet-sized medical smart card, embedded with a programmable computer chip, stores and transmits a cardholder's clinical, insurance coverage and biographical information. When fully deployed, smart cards will conduct many functions at the point of care, from claims submission to medical records updates in real time. Ultimately, the smart card will make the individual patient record and all clinical and economic transactions within that patient log as portable, accessible and secure as an ATM account.

  4. From spatial to social accessibility: How socio-economic factors can affect accessibility?

    OpenAIRE

    Mercier , Aurélie

    2016-01-01

    The concept of accessibility cannot only focus on " spatial accessibility " measurement but has to integer a " social accessibility " level to take into account individual inequalities and socioeconomic disparities to access to urban opportunities. In this context, this contribution focuses on socioeconomic disparities integration on accessibility measurement, considering the Lyon case study. The paper is divided into three parts The first part aims to present a method for integrating the soc...

  5. ACCESS Sub-system Performance

    Science.gov (United States)

    Kaiser, Mary Elizabeth; Morris, Matthew J.; Aldoroty, Lauren Nicole; Godon, David; Pelton, Russell; McCandliss, Stephan R.; Kurucz, Robert L.; Kruk, Jeffrey W.; Rauscher, Bernard J.; Kimble, Randy A.; Wright, Edward L.; Benford, Dominic J.; Gardner, Jonathan P.; Feldman, Paul D.; Moos, H. Warren; Riess, Adam G.; Bohlin, Ralph; Deustua, Susana E.; Dixon, William Van Dyke; Sahnow, David J.; Lampton, Michael; Perlmutter, Saul

    2016-01-01

    ACCESS: Absolute Color Calibration Experiment for Standard Stars is a series of rocket-borne sub-orbital missions and ground-based experiments designed to leverage significant technological advances in detectors, instruments, and the precision of the fundamental laboratory standards used to calibrate these instruments to enable improvements in the precision of the astrophysical flux scale through the transfer of laboratory absolute detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass.A cross wavelength calibration of the astrophysical flux scale to this level of precision over this broad a bandpass is relevant for the data used to probe fundamental astrophysical problems such as the SNeIa photometry based measurements used to constrain dark energy theories.We will describe the strategy for achieving this level of precision, the payload and calibration configuration, present sub-system test data, and the status and preliminary performance of the integration and test of the spectrograph and telescope. NASA APRA sounding rocket grant NNX14AH48G supports this work.

  6. ACCESS: Detector Control and Performance

    Science.gov (United States)

    Morris, Matthew J.; Kaiser, M.; McCandliss, S. R.; Rauscher, B. J.; Kimble, R. A.; Kruk, J. W.; Wright, E. L.; Bohlin, R.; Kurucz, R. L.; Riess, A. G.; Pelton, R.; Deustua, S. E.; Dixon, W. V.; Sahnow, D. J.; Mott, D. B.; Wen, Y.; Benford, D. J.; Gardner, J. P.; Feldman, P. D.; Moos, H. W.; Lampton, M.; Perlmutter, S.; Woodgate, B. E.

    2014-01-01

    ACCESS, Absolute Color Calibration Experiment for Standard Stars, is a series of rocket-borne sub-orbital missions and ground-based experiments that will enable improvements in the precision of the astrophysical flux scale through the transfer of absolute laboratory detector standards from the National Institute of Standards and Technology (NIST) to a network of stellar standards with a calibration accuracy of 1% and a spectral resolving power of 500 across the 0.35 to 1.7 micron bandpass (companion poster, Kaiser et al.). The flight detector and detector spare have been selected and integrated with their electronics and flight mount. The controller electronics have been flight qualified. Vibration testing to launch loads and thermal vacuum testing of the detector, mount, and housing have been successfully performed. Further improvements to the flight controller housing have been made. A cryogenic ground test system has been built. Dark current and read noise tests have been performed, yielding results consistent with the initial characterization tests of the detector performed by Goddard Space Flight Center’s Detector Characterization Lab (DCL). Detector control software has been developed and implemented for ground testing. Performance and integration of the detector and controller with the flight software will be presented. NASA APRA sounding rocket grant NNX08AI65G supports this work.

  7. EASIER ACCESS TO STANDARDS DOCUMENTATION

    CERN Multimedia

    2001-01-01

    Many organizations issuing standards offer reduced prices for publications to their members. Paying a membership fee, even a site membership fee, can therefore be worthwhile - even if relatively few standards are needed. The Library is now exploring the possibility, in collaboration with the rest of the CERN community, of joining standards-issuing organizations. So why not share your costs with the rest of the organization wherever this can be done without violating copyright or access regulations? The Library now provides documentation and other member services from IPC, the Association Connecting Electronics Industries (http://www.ipc.org/html/fsabout.htm) at favourable prices for the entire CERN population. For more information, or if you are a member of any other organization which provides services which could be shared CERN-wide, please contact library.desk@cern.ch . We remind all users of international standards, that CERN has special agreements with ISO and IEC (see Bulletin 50/2000). You can order st...

  8. Open areas and open access

    International Nuclear Information System (INIS)

    Thorndike, A.M.

    1978-01-01

    One objective of the two open areas in the present ISABELLE design is to provide flexibility with respect to the size and shape of experimental equipment that would eventually be installed there. No permanent building would be installed initially. A second objective of the design of open areas is to keep initial costs as low as practicable. Another objective is open access. This note explores this idea and some design concepts based on it. It would permit inserting large pieces of experimental equipment quickly and removing them with equal ease and speed. Entire experiments would be moved in a single piece (or a few) by building them on movable platforms with capacities of up to about 1000 tons per platform. Most experiments could be built on a single platform or on a few. The shielding must also be moved. It must also be organized into a small number of large units. A scheme using large tanks filled with water is described. It is important to make the equipment on a given platform as complete and self-contained as possible, with a minimum of interconnections for power, coolant, controls, data transmission, etc. 5 figures

  9. Dynamic computing random access memory

    International Nuclear Information System (INIS)

    Traversa, F L; Bonani, F; Pershin, Y V; Di Ventra, M

    2014-01-01

    The present von Neumann computing paradigm involves a significant amount of information transfer between a central processing unit and memory, with concomitant limitations in the actual execution speed. However, it has been recently argued that a different form of computation, dubbed memcomputing (Di Ventra and Pershin 2013 Nat. Phys. 9 200–2) and inspired by the operation of our brain, can resolve the intrinsic limitations of present day architectures by allowing for computing and storing of information on the same physical platform. Here we show a simple and practical realization of memcomputing that utilizes easy-to-build memcapacitive systems. We name this architecture dynamic computing random access memory (DCRAM). We show that DCRAM provides massively-parallel and polymorphic digital logic, namely it allows for different logic operations with the same architecture, by varying only the control signals. In addition, by taking into account realistic parameters, its energy expenditures can be as low as a few fJ per operation. DCRAM is fully compatible with CMOS technology, can be realized with current fabrication facilities, and therefore can really serve as an alternative to the present computing technology. (paper)

  10. Worldwide open access: UK leadership?

    Directory of Open Access Journals (Sweden)

    Stevan Harnad

    2013-03-01

    Full Text Available The web is destined to become humankind's cognitive commons, where digital knowledge is jointly created and freely shared. The UK has been a leader in the global movement toward open access (OA to research but recently its leadership has been derailed by the joint influence of the publishing industry lobby from without and well-intentioned but premature and unhelpful over-reaching from within the OA movement itself. The result has been the extremely counterproductive ‘Finch Report’ followed by a new draft of the Research Councils UK (RCUK OA mandate, downgrading the role of cost-free OA self-archiving of research publications (‘green OA’ in favor of paying subscription publishers over and above subscriptions, out of scarce research funds, in exchange for making single articles OA (‘hybrid gold OA’. The motivation of the new policy is to reform publication and to gain certain re-use rights (CC-BY, but the likely effect would be researcher resistance, very little OA and a waste of research funds. There is still time to fix the RCUK mandate and restore the UK's leadership by taking a few very specific steps to clarify and strengthen the green component by adding a mechanism for monitoring and verifying compliance, with consequences for non-compliance, along lines also being adopted in the EC and the US.

  11. Open areas and open access

    International Nuclear Information System (INIS)

    Thorndike, A.M.

    1979-01-01

    The main objective of the two open areas in the present ISABELLE design has been to provide flexibility with respect to the size and shape of experimental equipment that would eventually be installed there. No permanent building would be installed initially. One possibility would be to enclose each experiment in a temporary structure that would provide weatherproofing and shielding; another possibility would be to erect a permanent building at a later time, when experience has made the needs clearer than they are at present. The secondary objective of the design of open areas has been to keep initial costs as low as practicable. Another objective might be added, however, which we indicate by the term ''open access.'' This note will explore this idea and some design concepts based on it. In the ISABELLE 1977 summer workshop there was considerable discussion of the importance of techniques for inserting large pieces of experimental equipment quickly and removing them with equal ease and speed. Since enclosed halls have certain restrictions in this respect, open areas may be helpful in providing this feature. If the mechanical and electrical aspects could be handled quickly, one might even attempt to reduce the time spent on bureaucratic procedures in order to expedite the introduction of new experiments and new ideas in these areas

  12. Learning Task Knowledge from Dialog and Web Access

    Directory of Open Access Journals (Sweden)

    Vittorio Perera

    2015-06-01

    Full Text Available We present KnoWDiaL, an approach for Learning and using task-relevant Knowledge from human-robot Dialog and access to the Web. KnoWDiaL assumes that there is an autonomous agent that performs tasks, as requested by humans through speech. The agent needs to “understand” the request, (i.e., to fully ground the task until it can proceed to plan for and execute it. KnoWDiaL contributes such understanding by using and updating a Knowledge Base, by dialoguing with the user, and by accessing the web. We believe that KnoWDiaL, as we present it, can be applied to general autonomous agents. However, we focus on our work with our autonomous collaborative robot, CoBot, which executes service tasks in a building, moving around and transporting objects between locations. Hence, the knowledge acquired and accessed consists of groundings of language to robot actions, and building locations, persons, and objects. KnoWDiaL handles the interpretation of voice commands, is robust regarding speech recognition errors, and is able to learn commands involving referring expressions in an open domain, (i.e., without requiring a lexicon. We present in detail the multiple components of KnoWDiaL, namely a frame-semantic parser, a probabilistic grounding model, a web-based predicate evaluator, a dialog manager, and the weighted predicate-based Knowledge Base. We illustrate the knowledge access and updates from the dialog and Web access, through detailed and complete examples. We further evaluate the correctness of the predicate instances learned into the Knowledge Base, and show the increase in dialog efficiency as a function of the number of interactions. We have extensively and successfully used KnoWDiaL in CoBot dialoguing and accessing the Web, and extract a few corresponding example sequences from captured videos.

  13. Interoperable Access to NCAR Research Data Archive Collections

    Science.gov (United States)

    Schuster, D.; Ji, Z.; Worley, S. J.; Manross, K.

    2014-12-01

    The National Center for Atmospheric Research (NCAR) Research Data Archive (RDA) provides free access to 600+ observational and gridded dataset collections. The RDA is designed to support atmospheric and related sciences research, updated frequently where datasets have ongoing production, and serves data to 10,000 unique users annually. The traditional data access options include web-based direct archive file downloads, user selected data subsets and format conversions produced by server-side computations, and client and cURL-based APIs for routine scripted data retrieval. To enhance user experience and utility, the RDA now also offers THREDDS Data Server (TDS) access for many highly valued dataset collections. TDS offered datasets are presented as aggregations, enabling users to access an entire dataset collection, that can be comprised of 1000's of files, through a single virtual file. The OPeNDAP protocol, supported by the TDS, allows compatible tools to open and access these virtual files remotely, and make the native data file format transparent to the end user. The combined functionality (TDS/OPeNDAP) gives users the ability to browse, select, visualize, and download data from a complete dataset collection without having to transfer archive files to a local host. This presentation will review the TDS basics and describe the specific TDS implementation on the RDA's diverse archive of GRIB-1, GRIB-2, and gridded NetCDF formatted dataset collections. Potential future TDS implementation on in-situ observational dataset collections will be discussed. Illustrative sample cases will be used to highlight the end users benefits from this interoperable data access to the RDA.

  14. Advanced Encoding for Multilingual Access in a Terminological Data Base

    DEFF Research Database (Denmark)

    Leroyer, Patrick; L'Homme, Marie-Claude; Robichaud, Benoît

    2010-01-01

    This paper describes new functionalities implemented in a terminological database (TDB) in order to allow efficient editing of and access to multilingual data. The functionalities are original in the sense that they allow users of the database to retrieve the equivalents not only of headwords...... between equivalents can be established automatically. Examples are taken from the fields of computing and the Internet and focus on English and French. However, the model can easily be extended to other fields and languages provided that the data is available and encoded properly....

  15. Holistic approaches to e-learning accessibility

    Directory of Open Access Journals (Sweden)

    Lawrie Phipps

    2006-12-01

    Full Text Available The importance of accessibility to digital e-learning resources is widely acknowledged. The World Wide Web Consortium Web Accessibility Initiative has played a leading role in promoting the importance of accessibility and developing guidelines that can help when developing accessible web resources. The accessibility of e-learning resources provides additional challenges. While it is important to consider the technical and resource related aspects of e-learning when designing and developing resources for students with disabilities, there is a need to consider pedagogic and contextual issues as well. A holistic framework is therefore proposed and described, which in addition to accessibility issues takes into account learner needs, learning outcomes, local factors, infrastructure, usability and quality assurance. The practical application and implementation of this framework is discussed and illustrated through the use of examples and case studies.

  16. Perilous terra incognita--open-access journals.

    Science.gov (United States)

    Balon, Richard

    2014-04-01

    The author focuses on a new rapidly spreading practice of publication in open-access journals. The pros and cons of open-access journals are discussed. Publishing in these journals may be cost prohibitive for educators and junior faculty members. Some authors may be lured by the ease of publishing in open-access journals (and their, at times, inflated self-description, e.g., "international", "scientific"), and their possibly valuable contributions will escape the attention of Academic Psychiatry readership in the vast sea of open-access journals. The readership may be flooded with a large number of low-quality articles (maybe not even properly peer-reviewed) from open-access journals. It may take some time to sort out what is and what is not relevant and useful. Open-access publishing represents a problematic and controversial practice and may be associated with a conflict of interest for the editors and publishers of these journals.

  17. Web accessibility of public universities in Andalusia

    Directory of Open Access Journals (Sweden)

    Luis Alejandro Casasola Balsells

    2017-06-01

    Full Text Available This paper describes an analysis conducted in 2015 to evaluate the accessibility of content on Andalusian public university websites. In order to determinate whether these websites are accessible, an assessment has been carried out to check conformance with the latest Web Content Accessibility Guidelines (WCAG 2.0 established by the World Wide Web Consortium (W3C. For this purpose, we have designed a methodology for analysis that combines the use of three automatic tools (eXaminator, MINHAP web accessibility tool, and TAW with a manual analysis to provide a greater reliability and validity of the results. Although the results are acceptable overall, a detailed analysis shows that more is still needed for achieving full accessibility for the entire university community. In this respect, we suggest several corrections to common accessibility errors for facilitating the design of university web portals.

  18. Health Literacy and Access to Care

    Science.gov (United States)

    Janke, Alex

    2016-01-01

    Despite well-documented links between low health literacy, low rates of health insurance coverage, and poor health outcomes, there has been almost no research on the relationship between low health literacy and self-reported access to care. This study analyzed a large, nationally representative sample of community-dwelling adults ages 50 and older to estimate the relationship between low health literacy and self-reported difficulty obtaining care. We found that individuals with low health literacy were significantly more likely than individuals with adequate health literacy to delay or forego needed care or to report difficulty finding a provider, even after controlling for other factors including health insurance coverage, employment, race/ethnicity, poverty, and general cognitive function. They were also more likely to lack a usual source of care, although this result was only marginally significant after controlling for other factors. The results show that in addition to any obstacles that low health literacy creates within the context of the clinical encounter, low health literacy also reduces the probability that people get in the door of the health care system in a timely way. PMID:27043757

  19. Media and youth: access, exposure, and privatization.

    Science.gov (United States)

    Roberts, D F

    2000-08-01

    To describe U.S. youth's access and exposure to the full array of media, as well as the social contexts in which media exposure occurs. A cross-sectional national random sample of 2065 adolescents aged 8 through 18 years, including oversamples of African-American and Hispanic youth, completed questionnaires about use of television, videotapes, movies, computers, video games, radio, compact discs, tape players, books, newspapers, and magazines. U.S. youngsters are immersed in media. Most households contain most media (computers and video game systems are the exception); the majority of youth have their own personal media. The average youth devotes 6 3/4 h to media; simultaneous use of multiple media increases exposure to 8 h of media messages daily. Overall, media exposure and exposure to individual media vary as a function of age, gender, race/ethnicity, and family socioeconomic level. Television remains the dominant medium. About one-half of the youth sampled uses a computer daily. A substantial proportion of children's and adolescents' media use occurs in the absence of parents. American youth devote more time to media than to any other waking activity, as much as one-third of each day. This demands increased parental attention and research into the effects of such extensive exposure.

  20. Accessing the diffracted wavefield by coherent subtraction

    Science.gov (United States)

    Schwarz, Benjamin; Gajewski, Dirk

    2017-10-01

    Diffractions have unique properties which are still rarely exploited in common practice. Aside from containing subwavelength information on the scattering geometry or indicating small-scale structural complexity, they provide superior illumination compared to reflections. While diffraction occurs arguably on all scales and in most realistic media, the respective signatures typically have low amplitudes and are likely to be masked by more prominent wavefield components. It has been widely observed that automated stacking acts as a directional filter favouring the most coherent arrivals. In contrast to other works, which commonly aim at steering the summation operator towards fainter contributions, we utilize this directional selection to coherently approximate the most dominant arrivals and subtract them from the data. Supported by additional filter functions which can be derived from wave front attributes gained during the stacking procedure, this strategy allows for a fully data-driven recovery of faint diffractions and makes them accessible for further processing. A complex single-channel field data example recorded in the Aegean sea near Santorini illustrates that the diffracted background wavefield is surprisingly rich and despite the absence of a high channel count can still be detected and characterized, suggesting a variety of applications in industry and academia.

  1. ROMANIA'S EU ACCESSION. GAINS AND LOSSES (I

    Directory of Open Access Journals (Sweden)

    Caba Stefan

    2012-07-01

    Full Text Available EU accession has brought, as expected, many changes in economic, social and cultural domains. An important chapter is the trade dynamics and how this dynamic has been modified over time by changes in the legal status of Romania's relations with certain trading partners. In this paper we present data on trade with countries with which Romania has concluded trade agreements before accession. Data presentation and analysis continues in "Romania's EU accession. Gains and losses (II".

  2. Accessing remote data bases using microcomputers

    OpenAIRE

    Saul, Peter D.

    1985-01-01

    General practitioners' access to remote data bases using microcomputers is increasing, making even the most obscure information readily available. Some of the systems available to general practitioners in the UK are described and the methods of access are outlined. General practitioners should be aware of the advances in technology; data bases are increasing in size, the cost of access is falling and their use is becoming easier.

  3. The Access Pricing Problem: A Synthesis.

    OpenAIRE

    Armstrong, Mark; Doyle, Chris; Vickers, John

    1996-01-01

    The Baumol-Willig efficient component pricing rule states that it is efficient to set the price of access to an essential facility equal to the direct cost of access plus the opportunity cost to the integrated access provider. The authors analyze the relevant notion of 'opportunity cost' under various assumptions about demand and supply conditions, including product differentiation, bypass, and substitution possibilities, which all reduce opportunity cost compared to the benchmark case. They ...

  4. Optical Subsystems for Next Generation Access Networks

    DEFF Research Database (Denmark)

    Lazaro, J.A; Polo, V.; Schrenk, B.

    2011-01-01

    Recent optical technologies are providing higher flexibility to next generation access networks: on the one hand, providing progressive FTTx and specifically FTTH deployment, progressively shortening the copper access network; on the other hand, also opening fixed-mobile convergence solutions...... in next generation PON architectures. It is provided an overview of the optical subsystems developed for the implementation of the proposed NG-Access Networks....

  5. Achieving open access to conservation science.

    Science.gov (United States)

    Fuller, Richard A; Lee, Jasmine R; Watson, James E M

    2014-12-01

    Conservation science is a crisis discipline in which the results of scientific enquiry must be made available quickly to those implementing management. We assessed the extent to which scientific research published since the year 2000 in 20 conservation science journals is publicly available. Of the 19,207 papers published, 1,667 (8.68%) are freely downloadable from an official repository. Moreover, only 938 papers (4.88%) meet the standard definition of open access in which material can be freely reused providing attribution to the authors is given. This compares poorly with a comparable set of 20 evolutionary biology journals, where 31.93% of papers are freely downloadable and 7.49% are open access. Seventeen of the 20 conservation journals offer an open access option, but fewer than 5% of the papers are available through open access. The cost of accessing the full body of conservation science runs into tens of thousands of dollars per year for institutional subscribers, and many conservation practitioners cannot access pay-per-view science through their workplace. However, important initiatives such as Research4Life are making science available to organizations in developing countries. We urge authors of conservation science to pay for open access on a per-article basis or to choose publication in open access journals, taking care to ensure the license allows reuse for any purpose providing attribution is given. Currently, it would cost $51 million to make all conservation science published since 2000 freely available by paying the open access fees currently levied to authors. Publishers of conservation journals might consider more cost effective models for open access and conservation-oriented organizations running journals could consider a broader range of options for open access to nonmembers such as sponsorship of open access via membership fees. © 2014 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of the Society for

  6. Functional data analysis

    CERN Document Server

    Ramsay, J O

    1997-01-01

    Scientists today collect samples of curves and other functional observations. This monograph presents many ideas and techniques for such data. Included are expressions in the functional domain of such classics as linear regression, principal components analysis, linear modelling, and canonical correlation analysis, as well as specifically functional techniques such as curve registration and principal differential analysis. Data arising in real applications are used throughout for both motivation and illustration, showing how functional approaches allow us to see new things, especially by exploiting the smoothness of the processes generating the data. The data sets exemplify the wide scope of functional data analysis; they are drwan from growth analysis, meterology, biomechanics, equine science, economics, and medicine. The book presents novel statistical technology while keeping the mathematical level widely accessible. It is designed to appeal to students, to applied data analysts, and to experienced researc...

  7. The LHC access system LACS and LASS

    CERN Document Server

    Ninin, P

    2005-01-01

    The LHC complex is divided into a number of zones with different levels of access controls.Inside the interlocked areas, the personnel protection is ensured by the LHC Access System.The system is made of two parts:the LHC Access Safety System and the LHC Access Control System. During machine operation,the LHC Access Safety System ensures the collective protection of the personnel against the radiation hazards arising from the operation of the accelerator by interlocking the LHC key safety elements. When the beams are off, the LHC Access Control System regulates the access to the accelerator and its many subsystems.It allows a remote, local or automatic operation of the access control equipment which verifies and identifies all users entering the controlled areas.The global architecture of the LHC Access System is now designed and is being validated to ensure that it meets the safety requirements for operation of the LHC.A pilot installation will be tested in the summer 2005 to validate the concept with the us...

  8. Open access: changing global science publishing.

    Science.gov (United States)

    Gasparyan, Armen Yuri; Ayvazyan, Lilit; Kitas, George D

    2013-08-01

    The article reflects on open access as a strategy of changing the quality of science communication globally. Successful examples of open-access journals are presented to highlight implications of archiving in open digital repositories for the quality and citability of research output. Advantages and downsides of gold, green, and hybrid models of open access operating in diverse scientific environments are described. It is assumed that open access is a global trend which influences the workflow in scholarly journals, changing their quality, credibility, and indexability.

  9. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  10. Lightweight methodology to improve web accessibility

    CSIR Research Space (South Africa)

    Greeff, M

    2009-10-01

    Full Text Available to improve score. Colour Contrast Fujitsu ColorSelector [9] Each colour combination has to be selected manually. Didn’t identify colour contrast problems that were highlighted by the other two tools. JuicyStudio Colour Contrast Analyser Firefox..., but this is not tested by AccessKeys AccessColor. However, AccessKeys AccessColor provides a link to the specific line in the code where the problem occurs. This is not provided by JuicyStudio Colour Contrast Analyser. According to these two tools, many colour...

  11. Access to scientific publications: the scientist's perspective.

    Directory of Open Access Journals (Sweden)

    Yegor Voronin

    Full Text Available BACKGROUND: Scientific publishing is undergoing significant changes due to the growth of online publications, increases in the number of open access journals, and policies of funders and universities requiring authors to ensure that their publications become publicly accessible. Most studies of the impact of these changes have focused on the growth of articles available through open access or the number of open-access journals. Here, we investigated access to publications at a number of institutes and universities around the world, focusing on publications in HIV vaccine research--an area of biomedical research with special importance to the developing world. METHODS AND FINDINGS: We selected research papers in HIV vaccine research field, creating: 1 a first set of 50 most recently published papers with keywords "HIV vaccine" and 2 a second set of 200 articles randomly selected from those cited in the first set. Access to the majority (80% of the recently published articles required subscription, while cited literature was much more accessible (67% freely available online. Subscriptions at a number of institutions around the world were assessed for providing access to subscription-only articles from the two sets. The access levels varied widely, ranging among institutions from 20% to 90%. Through the WHO-supported HINARI program, institutes in low-income countries had access comparable to that of institutes in the North. Finally, we examined the response rates for reprint requests sent to corresponding authors, a method commonly used before internet access became widespread. Contacting corresponding authors with requests for electronic copies of articles by email resulted in a 55-60% success rate, although in some cases it took up to 1.5 months to get a response. CONCLUSIONS: While research articles are increasingly available on the internet in open access format, institutional subscriptions continue to play an important role. However

  12. EQUITABLE ACCESS TO HEALTH SERVICE IN BANYUWANGI

    Directory of Open Access Journals (Sweden)

    Lusi Herawati Sunyoto Usman Mark Zuidgeest

    2012-06-01

    as indicators. Flowmap tool is used to analyze catchment area of each health facility using different transport modes choice:becak and public transport for poor group and motorcycle and car for non-poor group with different travel time within 30, 60 and more than 60 minutes. It is concluded that there was an accessibility difference between poor and non-poor group. The accessibility to the health facilities of poor group was lower than non-poor group. This condition occurred because the government policy of equitable access to health service facility did not pay attention to accessibility of poor group.

  13. Expanding global access to radiotherapy.

    Science.gov (United States)

    Atun, Rifat; Jaffray, David A; Barton, Michael B; Bray, Freddie; Baumann, Michael; Vikram, Bhadrasain; Hanna, Timothy P; Knaul, Felicia M; Lievens, Yolande; Lui, Tracey Y M; Milosevic, Michael; O'Sullivan, Brian; Rodin, Danielle L; Rosenblatt, Eduardo; Van Dyk, Jacob; Yap, Mei Ling; Zubizarreta, Eduardo; Gospodarowicz, Mary

    2015-09-01

    Radiotherapy is a critical and inseparable component of comprehensive cancer treatment and care. For many of the most common cancers in low-income and middle-income countries, radiotherapy is essential for effective treatment. In high-income countries, radiotherapy is used in more than half of all cases of cancer to cure localised disease, palliate symptoms, and control disease in incurable cancers. Yet, in planning and building treatment capacity for cancer, radiotherapy is frequently the last resource to be considered. Consequently, worldwide access to radiotherapy is unacceptably low. We present a new body of evidence that quantifies the worldwide coverage of radiotherapy services by country. We show the shortfall in access to radiotherapy by country and globally for 2015-35 based on current and projected need, and show substantial health and economic benefits to investing in radiotherapy. The cost of scaling up radiotherapy in the nominal model in 2015-35 is US$26·6 billion in low-income countries, $62·6 billion in lower-middle-income countries, and $94·8 billion in upper-middle-income countries, which amounts to $184·0 billion across all low-income and middle-income countries. In the efficiency model the costs were lower: $14·1 billion in low-income, $33·3 billion in lower-middle-income, and $49·4 billion in upper-middle-income countries-a total of $96·8 billion. Scale-up of radiotherapy capacity in 2015-35 from current levels could lead to saving of 26·9 million life-years in low-income and middle-income countries over the lifetime of the patients who received treatment. The economic benefits of investment in radiotherapy are very substantial. Using the nominal cost model could produce a net benefit of $278·1 billion in 2015-35 ($265·2 million in low-income countries, $38·5 billion in lower-middle-income countries, and $239·3 billion in upper-middle-income countries). Investment in the efficiency model would produce in the same period an even

  14. Phonemes: Lexical access and beyond.

    Science.gov (United States)

    Kazanina, Nina; Bowers, Jeffrey S; Idsardi, William

    2018-04-01

    Phonemes play a central role in traditional theories as units of speech perception and access codes to lexical representations. Phonemes have two essential properties: they are 'segment-sized' (the size of a consonant or vowel) and abstract (a single phoneme may be have different acoustic realisations). Nevertheless, there is a long history of challenging the phoneme hypothesis, with some theorists arguing for differently sized phonological units (e.g. features or syllables) and others rejecting abstract codes in favour of representations that encode detailed acoustic properties of the stimulus. The phoneme hypothesis is the minority view today. We defend the phoneme hypothesis in two complementary ways. First, we show that rejection of phonemes is based on a flawed interpretation of empirical findings. For example, it is commonly argued that the failure to find acoustic invariances for phonemes rules out phonemes. However, the lack of invariance is only a problem on the assumption that speech perception is a bottom-up process. If learned sublexical codes are modified by top-down constraints (which they are), then this argument loses all force. Second, we provide strong positive evidence for phonemes on the basis of linguistic data. Almost all findings that are taken (incorrectly) as evidence against phonemes are based on psycholinguistic studies of single words. However, phonemes were first introduced in linguistics, and the best evidence for phonemes comes from linguistic analyses of complex word forms and sentences. In short, the rejection of phonemes is based on a false analysis and a too-narrow consideration of the relevant data.

  15. A PRELIMINARY STUDY FOR DEVELOPING ACCESSIBLE MOOC SERVICES

    Directory of Open Access Journals (Sweden)

    Francisco Iniesto

    2016-11-01

    Full Text Available The flexibility of the MOOC service allows students to learn at their own time, place and pace, enhancing continuous communication and interaction between all participants in knowledge and community building. This model especially benefits people with disabilities, which can improve therefore their level of employability and social inclusion, reaching a better quality of life. Unfortunately the access to MOOC platforms present severe barriers: there is a lack of accessibility on the learning resources, the communicating tools and personalized user interfaces. All these issues add extra difficulties such as the need to develop specific digital or even social skills for students with functional diversity. In this context, MOOCs are leading a revolutionary computer and mobile-based scenario along with social technologies that will emerge new kinds of learning applications that enhance communication and collaboration processes. For that reason, this paper describes the need for designing an information model and related specifications to support a new strategy for delivering accessible MOOC courses to learners with special needs, in terms of their preferences and context of use based on a particular application profile. This user profile’s design is based on standard metadata schemas, data that provides information about other data, regarding the achievement of accessibility from content to user preferences.

  16. Fixing Accessibility Issues in Open-Source Teaching Repositories

    Directory of Open Access Journals (Sweden)

    Francisco Javier Díaz

    2017-12-01

    Full Text Available In the LINTI, New Information Technologies Research Laboratory at the Computer Science School, in the National University of La Plata, it is being developed a project that involves the integration of the repository, implemented using DSpace, with different tools and platforms used in academic tasks. Accessibility is a process that cuts across all software development stages, so when using a free software product it is important to evaluate it in order to correct faults if it´s necessary. This article describes a DSpace repository accessibility validation, using screen readers for manual test, automatic validation with software tools and experimental test with users with and without disabilities. The evaluation involves the proper basic functions and the implemented extensions. The original DSpace software was extended through the integration with different tools and platforms, such as Moodle LMS, the library management system called Meran, file management services like DropBox and GoogleDrive and the social network Facebook.  The tools used during accessibility evaluation were Examinator, Google ChromeVox and one entirely implemented in the LINTI, called SiMor. The experimental tests were made with blind and deaf persons, most of them college students. All the validation results are detailed using tables and graphs, where it can observe the measured values. It is also described the changes that was necessary to carry out in the repository to improve the user experience and ensure Web service accessibility.

  17. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  18. LHAPDF6: parton density access in the LHC precision era

    Energy Technology Data Exchange (ETDEWEB)

    Buckley, Andy; Ferrando, James; Nordstroem, Karl [University of Glasgow, School of Physics and Astronomy, Glasgow (United Kingdom); Lloyd, Stephen [University of Edinburgh, School of Physics and Astronomy, Edinburgh (United Kingdom); Page, Ben [Universidad de Granada, Departamento de Fisica Teorica y del Cosmos y CAFPE, Granada (Spain); Ruefenacht, Martin [University of Edinburgh, School of Informatics, Edinburgh (United Kingdom); Schoenherr, Marek [Universitaet Zuerich, Physik-Institut, Zurich (Switzerland); Watt, Graeme [Durham University, Institute for Particle Physics Phenomenology, Durham (United Kingdom)

    2015-03-01

    The Fortran LHAPDF library has been a long-term workhorse in particle physics, providing standardised access to parton density functions for experimental and phenomenological purposes alike, following on from the venerable PDFLIB package. During Run 1 of the LHC, however, several fundamental limitations in LHAPDF's design have became deeply problematic, restricting the usability of the library for important physics-study procedures and providing dangerous avenues by which to silently obtain incorrect results. In this paper we present the LHAPDF 6 library, a ground-up re-engineering of the PDFLIB/LHAPDF paradigm for PDF access which removes all limits on use of concurrent PDF sets, massively reduces static memory requirements, offers improved CPU performance, and fixes fundamental bugs in multi-set access to PDF metadata. The new design, restricted for now to interpolated PDFs, uses centralised numerical routines and a powerful cascading metadata system to decouple software releases from provision of new PDF data and allow completely general parton content. More than 200 PDF sets have been migrated from LHAPDF 5 to the new universal data format, via a stringent quality control procedure. LHAPDF 6 is supported by many Monte Carlo generators and other physics programs, in some cases via a full set of compatibility routines, and is recommended for the demanding PDF access needs of LHC Run 2 and beyond. (orig.)

  19. LHAPDF6: parton density access in the LHC precision era

    International Nuclear Information System (INIS)

    Buckley, Andy; Ferrando, James; Nordstroem, Karl; Lloyd, Stephen; Page, Ben; Ruefenacht, Martin; Schoenherr, Marek; Watt, Graeme

    2015-01-01

    The Fortran LHAPDF library has been a long-term workhorse in particle physics, providing standardised access to parton density functions for experimental and phenomenological purposes alike, following on from the venerable PDFLIB package. During Run 1 of the LHC, however, several fundamental limitations in LHAPDF's design have became deeply problematic, restricting the usability of the library for important physics-study procedures and providing dangerous avenues by which to silently obtain incorrect results. In this paper we present the LHAPDF 6 library, a ground-up re-engineering of the PDFLIB/LHAPDF paradigm for PDF access which removes all limits on use of concurrent PDF sets, massively reduces static memory requirements, offers improved CPU performance, and fixes fundamental bugs in multi-set access to PDF metadata. The new design, restricted for now to interpolated PDFs, uses centralised numerical routines and a powerful cascading metadata system to decouple software releases from provision of new PDF data and allow completely general parton content. More than 200 PDF sets have been migrated from LHAPDF 5 to the new universal data format, via a stringent quality control procedure. LHAPDF 6 is supported by many Monte Carlo generators and other physics programs, in some cases via a full set of compatibility routines, and is recommended for the demanding PDF access needs of LHC Run 2 and beyond. (orig.)

  20. A System to Generate SignWriting for Video Tracks Enhancing Accessibility of Deaf People

    Directory of Open Access Journals (Sweden)

    Elena Verdú

    2017-12-01

    Full Text Available Video content has increased much on the Internet during last years. In spite of the efforts of different organizations and governments to increase the accessibility of websites, most multimedia content on the Internet is not accessible. This paper describes a system that contributes to make multimedia content more accessible on the Web, by automatically translating subtitles in oral language to SignWriting, a way of writing Sign Language. This system extends the functionality of a general web platform that can provide accessible web content for different needs. This platform has a core component that automatically converts any web page to a web page compliant with level AA of WAI guidelines. Around this core component, different adapters complete the conversion according to the needs of specific users. One adapter is the Deaf People Accessibility Adapter, which provides accessible web content for the Deaf, based on SignWritting. Functionality of this adapter has been extended with the video subtitle translator system. A first prototype of this system has been tested through different methods including usability and accessibility tests and results show that this tool can enhance the accessibility of video content available on the Web for Deaf people.

  1. 45 CFR 98.31 - Parental access.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Parental access. 98.31 Section 98.31 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION CHILD CARE AND DEVELOPMENT FUND Program Operations (Child Care Services)-Parental Rights and Responsibilities § 98.31 Parental access. The...

  2. Particle physicists want to expand open access

    CERN Multimedia

    Kaiser, Jocelyn

    2006-01-01

    "Particle physicists have come up with a novel way to promote free, immediate access to journal articles. Led by CERN, the gian lab near Geneva, Switzerland, they want to raise at least $6 million a year to begin buying open access to all published papers in their field." (1 page)

  3. Access control and service-oriented architectures

    NARCIS (Netherlands)

    Leune, C.J.

    2007-01-01

    Access Control and Service-Oriented Architectures" investigates in which way logical access control can be achieved effectively, in particular in highly dynamic environments such as service-oriented architectures (SOA's). The author combines state-of-the-art best-practice and projects these onto the

  4. Access to finance - An unfinished agenda

    NARCIS (Netherlands)

    Beck, T.H.L.; Demirgüc-Kunt, A.

    2008-01-01

    Recent data compilations show that many poor and nonpoor people in many developing countries face a high degree of financial exclusion and high barriers in access to finance. Theory and empirical evidence point to the critical role that improved access to finance has in promoting growth and reducing

  5. Examining data access and use in science

    Energy Technology Data Exchange (ETDEWEB)

    Yan, E.; Zhao, M.

    2016-07-01

    In this research-in-progress paper, we provide preliminary evidence of data access and use in scientific literature based on a content analysis of 600 stratified sampled PLOS ONE publications. Results show that data access and use varied greatly from one paper to another in terms of how datasets were collected, referenced, and curated. (Author)

  6. VARIABILITY IN ETHIOPIAN CORIANDER ACCESSIONS FOR ...

    African Journals Online (AJOL)

    Administrator

    2010-05-25

    May 25, 2010 ... En faisant l'analyse combinée de la variance sur les sites, les accessions ont significativement ... hectare of coriander allows honey bees to collect about 500 kg of .... breeding programme to evaluate coriander accessions for ...

  7. Easy Access: Auditing the System Network

    Science.gov (United States)

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  8. Accelerating access to energy services : Way forward

    NARCIS (Netherlands)

    Rehman, Ibrahim Hafeezur; Sreekumar, Arun; Gill, Bigsna; Worrell, Ernst

    2018-01-01

    As nearly a fifth of the world's population still lives without access to electricity and double that number with no access to modern cooking technologies, both public and private sector players have invested resources in developing infrastructure to address this energy gap. While there have been

  9. Development of Disruptive Open Access Journals

    Science.gov (United States)

    Anderson, Terry; McConkey, Brigette

    2009-01-01

    Open access (OA) publication has emerged, with disruptive effects, as a major outlet for scholarly publication. OA publication is usually associated with on-line distribution and provides access to scholarly publications to anyone, anywhere--regardless of their ability to pay subscription fees or their association with an educational institution.…

  10. Librarians and Libraries Supporting Open Access Publishing

    Science.gov (United States)

    Richard, Jennifer; Koufogiannakis, Denise; Ryan, Pam

    2009-01-01

    As new models of scholarly communication emerge, librarians and libraries have responded by developing and supporting new methods of storing and providing access to information and by creating new publishing support services. This article will examine the roles of libraries and librarians in developing and supporting open access publishing…

  11. Open Access, Education Research, and Discovery

    Science.gov (United States)

    Furlough, Michael

    2010-01-01

    Background/Context: The open access movement has successfully drawn attention to economic and political aspects of scholarly communication through a significant body of commentary that debates the merits of open access and the potential damage it may do to scholarly publishing. Researchers within the field of education research, notably John…

  12. Health Care Access among Deaf People

    Science.gov (United States)

    Kuenburg, Alexa; Fellinger, Paul; Fellinger, Johannes

    2016-01-01

    Access to health care without barriers is a clearly defined right of people with disabilities as stated by the UN Convention on the Rights of People with Disabilities. The present study reviews literature from 2000 to 2015 on access to health care for deaf people and reveals significant challenges in communication with health providers and gaps in…

  13. Particle physicists want to expand open access

    CERN Multimedia

    Kaiser, Jocelyn

    2006-01-01

    "Particle physicists have come up with a novel way to promote free, immediate access to journal articles. Led by CERN, the giant lab near Geneva, Switzerland, thay want to raise at lesat $6 million a year to begin buying open access to all published papers in their field." (1/2 page)

  14. Reducing Tariffs According to WTO Accession Rules

    DEFF Research Database (Denmark)

    Fosse, Henrik Barslund; Raimondos-Møller, Pascalis

    2012-01-01

    When Vietnam joined the World Trade Organization (WTO) in 2007 it was granted an accession period up to 2014. During this period tariffs would have to fall according to the accession agreement. This paper evaluates this 2007–2014 trade liberalization by building an applied general equilibrium model...

  15. Increasing Access and Relevance in Distance Education

    Science.gov (United States)

    Mendenhall, Robert W.

    2009-01-01

    Access to higher education is subject to many factors including affordability, time and geography. Distance education can deliver education to those that live far from a campus. Some of that distance education may be synchronous, or live, requiring students to be available at certain times. Flexibility and access are increased when the instruction…

  16. Teaching Accessibility Standards to Generation Y Students

    Science.gov (United States)

    Klitzing, Sandra

    2011-01-01

    The Americans with Disabilities Act (ADA) of 1990 mandated that facilities and programs are accessible, so people with disabilities can be included in all aspects of community life including recreation (Dattilo, 2002). Understanding accessibility standards is not an easy task. Educators are faced with the challenge of teaching technical content,…

  17. Conviviality-driven access control policy

    NARCIS (Netherlands)

    El Kateb, Donia; Zannone, N.; Moawad, Assaad; Caire, Patrice; Nain, Grégory; Mouelhi, Tejeddine; Le Traon, Yves

    2015-01-01

    Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights

  18. Open Access to Mexican Academic Production

    Science.gov (United States)

    Adame, Silvia I.; Llorens, Luis

    2016-01-01

    This paper presents a description of the metadata harvester software development. This system provides access to reliable and quality educational resources, shared by Mexican Universities through their repositories, to anyone with Internet Access. We present the conceptual and contextual framework, followed by the technical basis, the results and…

  19. 76 FR 77998 - Market Access Agreement

    Science.gov (United States)

    2011-12-15

    ... FARM CREDIT ADMINISTRATION Market Access Agreement AGENCY: Farm Credit Administration. ACTION: Notice of approval of the Draft Second Amended and Restated Market Access Agreement. SUMMARY: The Farm Credit Administration (FCA) announces that it has approved the Draft Second Amended and Restated Market...

  20. Accessing antiretroviral therapy for children: Caregivers' voices

    African Journals Online (AJOL)

    Margaret (Maggie) Williams

    ScienceDirect journal homepage: http://ees.elsevier.com/hsag/default.asp ... inability of their caregivers to travel the distance requisite to accessing ... and describe the experiences of caregivers accessing ART for .... In this study credibility was facilitated by the researchers ensuring that .... educational assets to assist them.

  1. National Radiobiology Archives Distributed Access user's manual

    International Nuclear Information System (INIS)

    Watson, C.; Smith, S.; Prather, J.

    1991-11-01

    This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems

  2. Open Access op de kaart gezet

    NARCIS (Netherlands)

    den Hollander, Franciscus

    Open Access, de vrije toegang tot wetenschappelijke informatie, wint terrein: informatie is in toenemende mate openbaar toegankelijk. Het Open Accessjaar 2009 werd op 2 februari van dit jaar afgesloten met een drukbezocht symposium in de Beurs van Berlage in Amsterdam. Dat Open Access nu echt op de

  3. Open Access publicering på Metropol

    DEFF Research Database (Denmark)

    Azbi, Trine; Larsen, Bente; Møbjerg, Anna Christine Meinertz

    Resultater af en afdækning og analyse af Open Access (OA) publicering på Professionshøjskolen Metropol......Resultater af en afdækning og analyse af Open Access (OA) publicering på Professionshøjskolen Metropol...

  4. Accessible Collaborative Learning Using Mobile Devices

    Science.gov (United States)

    Wald, Mike; Li, Yunjia; Draffan, E. A.

    2014-01-01

    This paper describes accessible collaborative learning using mobile devices with mobile enhancements to Synote, the freely available, award winning, open source, web based application that makes web hosted recordings easier to access, search, manage, and exploit for all learners, teachers and other users. Notes taken live during lectures using…

  5. Fermilab Security Site Access Request Database

    Science.gov (United States)

    Fermilab Security Site Access Request Database Use of the online version of the Fermilab Security Site Access Request Database requires that you login into the ESH&Q Web Site. Note: Only Fermilab generated from the ESH&Q Section's Oracle database on May 27, 2018 05:48 AM. If you have a question

  6. Correlates of Access to Business Research Databases

    Science.gov (United States)

    Gottfried, John C.

    2010-01-01

    This study examines potential correlates of business research database access through academic libraries serving top business programs in the United States. Results indicate that greater access to research databases is related to enrollment in graduate business programs, but not to overall enrollment or status as a public or private institution.…

  7. Open Access Publishing - Strengths and Strategies

    Science.gov (United States)

    Rasmussen, Martin

    2010-05-01

    The journal crisis and the demand for free accessibility to the results of publicly funded research were the main drivers of the Open Access movement since the late 1990's. Besides many academic institutions that support the different ways of Open Access publishing, there is a growing number of publishing houses that are specialized on this new access and business model of scholarly literature. The lecture provides an overview of the different kinds of Open Access publishing, discusses the variety of underlying business models, names the advantages and potentials for researches and the public, and overcomes some objections against Open Access. Besides the increased visibility and information supply, the topic of copyrights and exploitation rights will be discussed. Furthermore, it is a central aim of the presentation to show that Open Access does not only support full peer-review, but also provides the potential for even enhanced quality assurance. The financing of business models based on open accessible literature is another important part to be outlined in the lecture.

  8. Access to Information in the Nordic Countries

    DEFF Research Database (Denmark)

    Jørgensen, Oluf

    Access to Information in the Nordic Countries explains and compares the legal rules determining public access to documents and data in Sweden, Finland, Denmark, Norway, and Iceland. In addition, international rules emanating from the United Nations, the Council of Europe and the European Union...

  9. Photonic-assisted ultrafast THz wireless access

    DEFF Research Database (Denmark)

    Yu, Xianbin; Chen, Ying; Galili, Michael

    THz technology has been considered feasible for ultrafast wireless data communi- cation, to meet the increasing demand on next-generation fast wireless access, e.g., huge data file transferring and fast mobile data stream access. This talk reviews recent progress in high-speed THz wireless...

  10. Iinformation accessibility and farmers manageriability of guinea ...

    African Journals Online (AJOL)

    The study examined the farmers' access to information and their manageriability of the intervention programme in the study area. To achieve the objective, there was need to determine farmers' information accessibility and manageriability of guinea worm intervention package; then determine farmers satisfaction with the ...

  11. Open access publishing in physics gains momentum

    CERN Multimedia

    2006-01-01

    "The first meeting of European particle physics funding agencies took place today at CERN to establish a consortium for Open Access publishing in particle physics, SCOAP3. This is the first time an antire scientific field is exploring the conversion of its reader-paid journals into an author-paid Open Access format." (1 page)

  12. Open-Access Electronic Textbooks: An Overview

    Science.gov (United States)

    Ovadia, Steven

    2011-01-01

    Given the challenging economic climate in the United States, many academics are looking to open-access electronic textbooks as a way to provide students with traditional textbook content at a more financially advantageous price. Open access refers to "the free and widely available information throughout the World Wide Web. Once an article's…

  13. Accessibility Guidelines for Astronomy and Astrophysics Meetings

    Science.gov (United States)

    Monkiewicz, Jacqueline; Murphy, Nicholas; Diaz-Merced, Wanda Liz; Aarnio, Alicia; Knierman, Karen; AAS Working Group for Accessibility and Disability

    2018-01-01

    Attendance at meetings and conferences is a critical component of an astronomer's professional life, providing opportunities for presenting one's work, staying current in the field, career networking, and scientific collaboration. Exclusion from these gatherings due to lack of accessibility and accommodation failure is a reality for disabled astronomers, and contributes substantially to low levels of representation in the senior-most levels of the field. We present a preview of the AAS Working Group for Accessibility and Disability's best practice recommendations for meetings accessibility. Applying the principles of universal access and barrier-free design, we model a paradigm of anticipating and removing accessibility barriers in advance, rather than putting the burden of requesting accommodation solely on disabled astronomers and students. We cite several professional and nonprofessional societies identified as meetings accessibility exemplars, and model our guidelines on their best practices. We establish standards for accessibility budgeting, venue choice, publication of policies online, designating point persons, and identifying barriers. We make recommendations for oral and poster presentations, event registration, receptions and banquets, excursions, and other typical conference activities. For meetings which are constrained by fixed budgets and venue choice, we identify a number of low cost/high reward accessibility steps which might still have a large beneficial impact. We likewise provide adapted recommendations for low budget meetings. THIS IS A POSTER LOCATED IN THE AAS BOOTH

  14. Travel time variability and airport accessibility

    NARCIS (Netherlands)

    Koster, P.R.; Kroes, E.P.; Verhoef, E.T.

    2011-01-01

    We analyze the cost of access travel time variability for air travelers. Reliable access to airports is important since the cost of missing a flight is likely to be high. First, the determinants of the preferred arrival times at airports are analyzed. Second, the willingness to pay (WTP) for

  15. Web Based Remote Access Microcontroller Laboratory

    OpenAIRE

    H. Çimen; İ. Yabanova; M. Nartkaya; S. M. Çinar

    2008-01-01

    This paper presents a web based remote access microcontroller laboratory. Because of accelerated development in electronics and computer technologies, microcontroller-based devices and appliances are found in all aspects of our daily life. Before the implementation of remote access microcontroller laboratory an experiment set is developed by teaching staff for training microcontrollers. Requirement of technical teaching and industrial applications are considered when expe...

  16. Students' Motivation to Access Academic Advising Services

    Science.gov (United States)

    Henning, Marcus A.

    2009-01-01

    The interrelationships between motivation for choosing a program of study, intention to access academic advisors, academic difficulty, and actual appointments with academic advisors were based on student self-reports of motivation and intentions. In addition, academic achievement measures and data on student access to academic advisors were…

  17. The impact of energy labels and accessibility on office rents

    International Nuclear Information System (INIS)

    Kok, Nils; Jennen, Maarten

    2012-01-01

    Energy consumption in the commercial property sector offers an important opportunity for conserving resources. In this study, we evaluate the financial implications of two elements of “sustainability” – energy efficiency and accessibility – in the market for commercial real estate. An empirical analysis of some 1100 leasing transactions in the Netherlands over the 2005–2010 period shows that buildings designated as inefficient (with an EU energy performance certificate D or worse) command rental levels that are some 6.5 percent lower as compared to energy efficient, but otherwise similar buildings (labeled A, B or C). Furthermore, this study shows that office buildings in multi-functional areas, with access to public transport and facilities, achieve rental premiums over mono-functional office districts. For policymakers, the results documented in this paper provide an indication on the effectiveness of the EU energy performance certificate as a market signal in the commercial property sector. The findings documented here are also relevant for investors in European office markets, as the importance of energy efficiency and locational diversification is bound to increase following stricter environmental regulation and changing tenant preferences. - Highlights: ► Built environment plays important role in reduction of greenhouse gas emissions. ► Energy certification of buildings may increase transparency and awareness. ► Tenants pay lower rent for less efficient commercial office buildings. ► Accessibility important determinant of commercial office rents.

  18. Access to life’s essentials: office and food

    CERN Multimedia

    Joannah Caborn Wengler

    2012-01-01

    Have you noticed how the queues seem to be getting longer and longer in Restaurant 1 as more and more scientists are coming to work at CERN? GS (General Services) has the solution: a new chip in CERN access cards will allow you to pay automatically at the restaurant.   “We were going to replace the RFID (Radio Frequency Identification) chips currently in use because the manufacturer is phasing them out,” explains Rui Nunes, responsible for access cards at GS, “so we decided to use the opportunity to add some new functionalities.” From 1 April, all new cards that are issued or renewed will have the new DESFire EV1 RFID chip on them, and a machine to charge the cards using banknotes has already been installed between the bank and the kiosk in the main building. It will be fully functional in May, when the tills in Restaurant 1 will also be equipped with the readers for the new cards. “People who would like to replace their old access card and g...

  19. Spatial accessibility to basic public health services in South Sudan

    Directory of Open Access Journals (Sweden)

    Peter M. Macharia

    2017-05-01

    Full Text Available At independence in 2011, South Sudan’s health sector was almost non-existent. The first national health strategic plan aimed to achieve an integrated health facility network that would mean that 70% of the population were within 5 km of a health service provider. Publically available data on functioning and closed health facilities, population distribution, road networks, land use and elevation were used to compute the fraction of the population within 1 hour walking distance of the nearest public health facility offering curative services. This metric was summarised for each of the 78 counties in South Sudan and compared with simpler metrics of the proportion of the population within 5 km of a health facility. In 2016, it is estimated that there were 1747 public health facilities, out of which 294 were non-functional in part due to the on-going civil conflict. Access to a service provider was poor with only 25.7% of the population living within one-hour walking time to a facility and 28.6% of the population within 5 km. These metrics, when applied sub-nationally, identified the same high priority, most vulnerable counties. Simple metrics based upon population distribution and location of facilities might be as valuable as more complex models of health access, where attribute data on travel routes are imperfect or incomplete and sparse. Disparities exist in South Sudan among counties and those with the poorest health access should be targeted for priority expansion of clinical services.

  20. Data access and its implementation at Wendelstein 7-X

    Energy Technology Data Exchange (ETDEWEB)

    Bluhm, T. [Max-Planck-Institute fuer Plasmaphysik, Teilinstitut Greifswald, Wendelsteinstr. 1, 17491 Greifswald (Germany)], E-mail: torsten.bluhm@ipp.mpg.de; Heimann, P. [Max-Planck-Institute fuer Plasmaphysik, Boltzmannstr. 2, 85748 Garching (Germany); Hennig, Ch. [Max-Planck-Institute fuer Plasmaphysik, Teilinstitut Greifswald, Wendelsteinstr. 1, 17491 Greifswald (Germany); Kroiss, H. [Max-Planck-Institute fuer Plasmaphysik, Boltzmannstr. 2, 85748 Garching (Germany); Kuehner, G. [Max-Planck-Institute fuer Plasmaphysik, Teilinstitut Greifswald, Wendelsteinstr. 1, 17491 Greifswald (Germany); Maier, J. [Max-Planck-Institute fuer Plasmaphysik, Boltzmannstr. 2, 85748 Garching (Germany); Riemann, H. [Max-Planck-Institute fuer Plasmaphysik, Teilinstitut Greifswald, Wendelsteinstr. 1, 17491 Greifswald (Germany); Zilker, M. [Max-Planck-Institute fuer Plasmaphysik, Boltzmannstr. 2, 85748 Garching (Germany)

    2008-04-15

    The increasing number of data acquisition stations and setups in laboratory environments at Wendelstein 7-X does already produce a considerable amount of data by now. Diagnosticians want to view the acquired data in a comfortable way and use them for calculations in their own test and analysis algorithms. To prepare for full operation of W7-X, a reasonable approach is to provide data access methods that stay as close as possible to the final data access concept. This requires taking care of the special needs of W7-X regarding continuously acquired data, segment based parameter switching and synchronization of data from different diagnostics. Therefore, a data access interface has been designed and implemented considering continuous data acquisition as well as usability and performance issues. The interface and its usage in different software environments (e.g. high level scientific programming languages) will be explained. Also, the integration of user defined off line analysis algorithms will be described. Additionally, the DataBrowser will be presented. The DataBrowser is a Java application that can browse continuously acquired data of different kind, provides several types of plots including zooming functions to display the data and the corresponding parameters and offers export functions to save selected data locally.

  1. Random access with adaptive packet aggregation in LTE/LTE-A.

    Science.gov (United States)

    Zhou, Kaijie; Nikaein, Navid

    While random access presents a promising solution for efficient uplink channel access, the preamble collision rate can significantly increase when massive number of devices simultaneously access the channel. To address this issue and improve the reliability of the random access, an adaptive packet aggregation method is proposed. With the proposed method, a device does not trigger a random access for every single packet. Instead, it starts a random access when the number of aggregated packets reaches a given threshold. This method reduces the packet collision rate at the expense of an extra latency, which is used to accumulate multiple packets into a single transmission unit. Therefore, the tradeoff between packet loss rate and channel access latency has to be carefully selected. We use semi-Markov model to derive the packet loss rate and channel access latency as functions of packet aggregation number. Hence, the optimal amount of aggregated packets can be found, which keeps the loss rate below the desired value while minimizing the access latency. We also apply for the idea of packet aggregation for power saving, where a device aggregates as many packets as possible until the latency constraint is reached. Simulations are carried out to evaluate our methods. We find that the packet loss rate and/or power consumption are significantly reduced with the proposed method.

  2. Access Denied! Contrasting Data Access in the United States and Ireland

    Directory of Open Access Journals (Sweden)

    Grogan Samuel

    2016-07-01

    Full Text Available The ability of an Internet user to access data collected about himself as a result of his online activity is a key privacy safeguard. Online, data access has been overshadowed by other protections such as notice and choice. This paper describes attitudes about data access. 873 US and Irish Internet users participated in a survey designed to examine views on data access to information held by online companies and data brokers. We observed low levels of awareness of access mechanisms along with a high desire for access in both participant groups. We tested three proposed access systems in keeping with industry programs and regulatory proposals. User response was positive. We conclude that access remains an important privacy protection that is inadequately manifested in practice. Our study provides insight for lawmakers and policymakers, as well as computer scientists who implement these systems.

  3. Access to destinations : annual accessibility measure for the Twin Cities Metropolitan Region.

    Science.gov (United States)

    2012-11-01

    This report summarizes previous phases of the Access to Destinations project and applies the techniques developed : over the course of the project to conduct an evaluation of accessibility in the Twin Cities metropolitan region for : 2010. It describ...

  4. Energy access. Current situation, challenges and outlook

    International Nuclear Information System (INIS)

    2014-07-01

    Globally over 1.3 billion people do not have access to electricity and 2.6 billion people rely on the traditional use of biomass for cooking. Energy access is one of the major challenges of the 21. century as it is a lever for both economic and human development, at individual and national level. Moreover, energy access represents a high-potential market and offers a lot of opportunities for private companies and industrials. In this publication, ENEA lays out the current situation of energy access (actors, actual and future needs, existing technological solutions, markets). The publication addresses the main issues energy access has to face: energy price, equipment financing, distribution, scale-up, and environmental performances

  5. Features and selection of vascular access devices.

    Science.gov (United States)

    Sansivero, Gail Egan

    2010-05-01

    To review venous anatomy and physiology, discuss assessment parameters before vascular access device (VAD) placement, and review VAD options. Journal articles, personal experience. A number of VAD options are available in clinical practice. Access planning should include comprehensive assessment, with attention to patient participation in the planning and selection process. Careful consideration should be given to long-term access needs and preservation of access sites. Oncology nurses are uniquely suited to perform a key role in VAD planning and placement. With knowledge of infusion therapy, anatomy and physiology, device options, and community resources, nurses can be key leaders in preserving vascular access and improving the safety and comfort of infusion therapy. Copyright 2010 Elsevier Inc. All rights reserved.

  6. Accessibility: global gateway to health literacy.

    Science.gov (United States)

    Perlow, Ellen

    2010-01-01

    Health literacy, cited as essential to achieving Healthy People 2010's goals to "increase quality and years of healthy life" and to "eliminate health disparities," is defined by Healthy People as "the degree to which individuals have the capacity to obtain, process, and understand basic health information and services needed to make appropriate health decisions." Accessibility, by definition, the aforementioned "capacity to obtain," thus is health literacy's primary prerequisite. Accessibility's designation as the global gateway to health literacy is predicated also on life's realities: global aging and climate change, war and terrorism, and life-extending medical and technological advances. People with diverse access needs are health professionals' raison d'être. However, accessibility, consummately cross-cultural and universal, is virtually absent as a topic of health promotion and practice research and scholarly discussion of health literacy and equity. A call to action to place accessibility in its rightful premier position on the profession's agenda is issued.

  7. Water access, water scarcity, and climate change.

    Science.gov (United States)

    Mukheibir, Pierre

    2010-05-01

    This article investigates the approaches of the various discourses operating in the water sector and how they address the issues of scarcity and equitable access under projected climate change impacts. Little synergy exists between the different approaches dealing with these issues. Whilst being a sustainable development and water resources management issue, a holistic view of access, scarcity and the projected impacts of climate change is not prevalent in these discourses. The climate change discourse too does not adequately bridge the gap between these issues. The projected impacts of climate change are likely to exacerbate the problems of scarcity and equitable access unless appropriate adaptation strategies are adopted and resilience is built. The successful delivery of accessible water services under projected climate change impacts therefore lies with an extension of the adaptive water management approach to include equitable access as a key driver.

  8. Teenagers’ access to contraception in Mexico City

    Directory of Open Access Journals (Sweden)

    Sofía Gómez-Inclán

    2017-05-01

    Full Text Available Objective. To study and understand the phenomenon of access to contraceptive methods in Mexican teenages, through the use of the Levesque model, which allows for the observation of both the system and the system and the user´s participation in the access process. Materials and methods. A qualitative study was conducted with focus groups technique in a middle and high school of Mexico City. Results. The perception of ability to access to health care is limited, teenagers do not know the mechanisms of care or supply of contraceptive methods. Prejudices of service providers provoke a negative reaction. The family is a source of information for adolescents to make decisions. Conclusions. The model allowed the assessment of access to contraceptive methods in teenagers. It were identified dif­ferent aspects that act as barriers to access and may inform health care providers about this population in their sexual and reproductive health.

  9. Video Game Accessibility: A Legal Approach

    Directory of Open Access Journals (Sweden)

    George Powers

    2015-02-01

    Full Text Available Video game accessibility may not seem of significance to some, and it may sound trivial to anyone who does not play video games. This assumption is false. With the digitalization of our culture, video games are an ever increasing part of our life. They contribute to peer to peer interactions, education, music and the arts. A video game can be created by hundreds of musicians and artists, and they can have production budgets that exceed modern blockbuster films. Inaccessible video games are analogous to movie theaters without closed captioning or accessible facilities. The movement to have accessible video games is small, unorganized and misdirected. Just like the other battles to make society accessible were accomplished through legislation and law, the battle for video game accessibility must be focused toward the law and not the market.

  10. Functional EIAO DW, R2.2

    DEFF Research Database (Denmark)

    Thomsen, Christian; Pedersen, Torben Bach; Frøkjær, Jens

    In this document, the functional specification and architecture for the EIAO DW is presented. EIAO DW is a data warehouse that holds results from the European Internet Accessibility Observatory (EIAO) project. These results are mainly on the accessibility to disabled users of web resources...

  11. Financing low carbon energy access in Africa

    International Nuclear Information System (INIS)

    Gujba, Haruna; Thorne, Steve; Mulugetta, Yacob; Rai, Kavita; Sokona, Youba

    2012-01-01

    Modern energy access in Africa is critical to meeting a wide range of developmental challenges including poverty reduction and the Millennium Development Goals (MDGs). Despite having a huge amount and variety of energy resources, modern energy access in the continent is abysmal, especially Sub-Saharan Africa. Only about 31% of the Sub-Saharan African population have access to electricity while traditional biomass energy accounts for over 80% of energy consumption in many Sub-Saharan African countries. With energy use per capita among the lowest in the world, there is no doubt that Africa will need to increase its energy consumption to drive economic growth and human development. Africa also faces a severe threat from global climate change with vulnerabilities in several key areas or sectors in the continent including agriculture, water supply, energy, etc. Low carbon development provides opportunities for African countries to improve and expand access to modern energy services while also building low-emission and climate-resilient economies. However, access to finance from different sources will be critical in achieving these objectives. This paper sets out to explore the financial instruments available for low carbon energy access in Africa including the opportunities, markets and risks in low carbon energy investments in the continent. - Highlights: ► Access to finance will be critical to achieving low carbon energy access in Africa. ► Domestic finance will be important in leveraging private finance. ► Private sector participation in modern and clean energy in Africa is still low. ► Many financing mechanisms exist for low carbon energy access in Africa. ► The right institutional frameworks are critical to achieving low carbon energy access in Africa.

  12. Minimally invasive basilic vein transposition in the arm or forearm for autogenous haemodialysis access: A less morbid alternative to the conventional technique

    Directory of Open Access Journals (Sweden)

    Ankush Jairath

    2017-06-01

    Conclusion: Minimally invasive dissection of the basilic vein for vascular access transposition is a safe, reliable procedure with patency and functional outcomes comparable with those of conventional BVT.

  13. Checklist "Open Access Policies": Analysis of the Open Access Policies of Public Universities in Austria

    Directory of Open Access Journals (Sweden)

    Bruno Bauer

    2016-12-01

    Full Text Available This checklist provides an overview of the Open Access policies implemented at Austrian universities and extramural research institutions. Furthermore, the polices adopted at nine public universities are analyzed and the respective text modules are categorized thematically. The second part of the checklist presents measures for the promotion of Open Access following the implementation of an Open Access policy.

  14. Accessibility observations of visually impaired users using the South African National Accessibility Portal

    CSIR Research Space (South Africa)

    Coetzee, L

    2008-05-01

    Full Text Available . Improving web site accessibility has proven to be a challenging task with a myriad of standards, accessibility testing tools and few technical guides for implementation. This paper presents the South African National Accessibility Portal (NAP), which is used...

  15. Quantitative analysis of access strategies to remoteinformation in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    of analytic models to compute different performance metrics for these approaches, with special focus on the so-called mismatch probability. The results of the analytic models allow for design decisions on which strategy to implement for specific input parameters (change rate of the information element......Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach...... initiated by the requesting entity, and two versions of proactive approaches in which the entity that contains the information element actively propagates its changes to potential requesters, either (2) periodically or triggered by changes of the information element (3). This paper first develops a set...

  16. Regulatory accessibility and social influences on state self-control.

    Science.gov (United States)

    vanDellen, Michelle R; Hoyle, Rick H

    2010-02-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals' state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-control leads to increases in state self-control and thinking of others with bad trait or state self-control leads to decreases in state self-control. Study 5 provides evidence that the salience of significant others influences both regulatory accessibility and state self-control. Combined, these studies suggest that the effects of social influences on state self-control occur through multiple mechanisms.

  17. Organizing for access with FRBR, RDA, linked data, and beyond

    CERN Document Server

    Hsieh-Yee, Ingrid P

    2018-01-01

    "Organizing for Access with FRBR, RDA, Linked Data, and Beyond" provides a current, insightful discussion of the new opportunities and challenges posed by the management of big datasets. It explains how to apply Functional Requirements for Bibliographic Records (FRBR) and (Resource Description and Access) RDA to create cataloging records for various types of resources--skills that will help systems librarians, reference librarians, and digital resources librarians to transform their professional practices and give them an invaluable competitive edge. This book is ideal as a primary textbook for a range of LIS courses, such as courses on cataloging and/or managing audiovisual collections and continuing education workshops on cataloging audiovisual materials (including music or film collections). It presents a critical assessment of the advantages and limitations of using RDA for managing information resources and data, explains how to increase the benefit and relevancy of library data and records, and discuss...

  18. Rural Community Development Strategy beyond the Access to Information

    DEFF Research Database (Denmark)

    Akther, Farzana

    2012-01-01

    Telecenters is one of the promising models recognized by the United Nations (UN) to achieve the global access of ICTs. This paper provides insight in the role and usages of Information and Communication Technology for Development (ICT4D) projects with a specific focus of telecenters in developing...... the policy and actual practices of rural community with respect of ICT development.......Telecenters is one of the promising models recognized by the United Nations (UN) to achieve the global access of ICTs. This paper provides insight in the role and usages of Information and Communication Technology for Development (ICT4D) projects with a specific focus of telecenters in developing...... country Bangladesh. This study covers four aspects of the functioning of telecenters grounded in social, economical and action resources: ‘situated success’, ‘information culture and tradition’, ‘typology of resources’ and ‘functioning’. The study contributes to the theory and practice of ICT...

  19. Evaluation of the Tellabs 1150 GPON multiservice access platform

    Energy Technology Data Exchange (ETDEWEB)

    Brenkosh, Joseph Peter [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Wolf, Jimmie V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-11-01

    For over two years, Sandia National Laboratories has been using a Gigabit Passive Optical Network (GPON) access layer for selected networks. The GPON equipment includes the Tellabs 1150 Multiservice Access Platform (MSAP) Optical Line Terminal (OLT), the Tellabs ONT709 and ONT709GP Optical Network Terminals (ONTs), and the Panorama PON Network Manager. In late 2013, the Tellabs equipment was updated to Software Release FP27.1_015130. Because a new software release has the potential to affect performance and functionality, it needed to be thoroughly tested. This report documents that testing. It also provides a comparison between the current release and the previous Software Release FP25.5.1_013274 that was being used.

  20. Probabilistic models for access strategies to dynamic information elements

    DEFF Research Database (Denmark)

    Hansen, Martin Bøgsted; Olsen, Rasmus L.; Schwefel, Hans-Peter

    In various network services (e.g., routing and instances of context-sensitive networking) remote access to dynamically changing information elements is a required functionality. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach...... initiated by the requesting entity, and two versions of proactive approaches in which the entity that contains the information element actively propagates its changes to potential requesters, either (2) periodically or (3) triggered by changes of the information element. This paper develops probabilistic...... for information elements spread over a large number of network nodes are provided, which allow to draw conclusions on scalability properties. The impact of different distribution types for the network delays as well as for the time between changes of the information element on the mismatch probability...