WorldWideScience

Sample records for mfedb access functions

  1. MDI: Mathematica database interface for the MFEDB

    International Nuclear Information System (INIS)

    Wiley, J.C.; Miner, W.H. Jr.; Ross, D.W.

    1992-04-01

    We describe a new interface for the Magnetic Fusion Energy Database, MFEDB, which uses Mathematica reg-sign as a front end. MDI is a Mathematica package that defines a basic set of MFEDB access functions. The package will also accept standard SQL queries. Each function returns Mathematica-style lists, which can then be manipulated with any of the Mathematica functions. MDI also provides some utility functions for plotting and analyzing the data. The MDI package essentially makes the MFEDB an extension of Mathematica. The user may use any of the many Mathematica front-ends including telnet, X-Windows, or a notebook. The mdi.m package may be obtained by anonymous FTP from the MFEDB site or by use of netmfe, and E-mail database interface. MDI is a example of distributed computing. Behind the user interface, MDI calls an RPC client program that communicates with an RPC server on the MFEDB computer. It relies on the network communication capabilities of Mathematica to connect the user to a workstation running the Mathematica kernel. The Mathematica kernel is then connected to the MFEDB host workstation by a client/server pair of RPC processes. If the Mathematica kernel is to be run on the users' machine, the RPC client program must also be obtained and installed. The MDI RPC server is also available for users who would like to provide their own client software. The server returns ASCII tables from standards queries and may be accessed and processed by any program on the internet that has access to RPC services

  2. Combining sync&share functionality with filesystem-like access

    CERN Multimedia

    CERN. Geneva

    2014-01-01

    In our presentation we will analyse approaches to combine the sync & share functionality with file system-like access to data. While relatively small data volumes (GBs) can be distributed by sync&share application across user devices such as PCs, laptops and mobiles, interacting with really large data volumes (TBs, PBs) may require additional remote data access mechanism such as filesystem-like interface. We will discuss several ways for offering filesystem-like access in addition to sync & share functionality. Todays sync & share solutions may employ various data organisation in the back-end including local and distributed file systems and object stores. Therefore various approaches to providing the client with filesystem-like access are necessary in these systems. We will present possible options to integrate the filesystem-like access with sync&share functionality in the popular sync&share system. We will also show a NDS2 project solution where data backups and archives are kept sec...

  3. Using Operational Analysis to Improve Access to Pulmonary Function Testing

    Directory of Open Access Journals (Sweden)

    Ada Ip

    2016-01-01

    Full Text Available Background. Timely pulmonary function testing is crucial to improving diagnosis and treatment of pulmonary diseases. Perceptions of poor access at an academic pulmonary function laboratory prompted analysis of system demand and capacity to identify factors contributing to poor access. Methods. Surveys and interviews identified stakeholder perspectives on operational processes and access challenges. Retrospective data on testing demand and resource capacity was analyzed to understand utilization of testing resources. Results. Qualitative analysis demonstrated that stakeholder groups had discrepant views on access and capacity in the laboratory. Mean daily resource utilization was 0.64 (SD 0.15, with monthly average utilization consistently less than 0.75. Reserved testing slots for subspecialty clinics were poorly utilized, leaving many testing slots unfilled. When subspecialty demand exceeded number of reserved slots, there was sufficient capacity in the pulmonary function schedule to accommodate added demand. Findings were shared with stakeholders and influenced scheduling process improvements. Conclusion. This study highlights the importance of operational data to identify causes of poor access, guide system decision-making, and determine effects of improvement initiatives in a variety of healthcare settings. Importantly, simple operational analysis can help to improve efficiency of health systems with little or no added financial investment.

  4. The RNA Exosome Channeling and Direct Access Conformations Have Distinct In Vivo Functions

    Directory of Open Access Journals (Sweden)

    Jaeil Han

    2016-09-01

    Full Text Available The RNA exosome is a 3′–5′ ribonuclease complex that is composed of nine core subunits and an essential catalytic subunit, Rrp44. Two distinct conformations of Rrp44 were revealed in previous structural studies, suggesting that Rrp44 may change its conformation to exert its function. In the channeling conformation, (Rrp44ch, RNA accesses the active site after traversing the central channel of the RNA exosome, whereas in the other conformation, (Rrp44da, RNA gains direct access to the active site. Here, we show that the Rrp44da exosome is important for nuclear function of the RNA exosome. Defects caused by disrupting the direct access conformation are distinct from those caused by channel-occluding mutations, indicating specific functions for each conformation. Our genetic analyses provide in vivo evidence that the RNA exosome employs a direct-access route to recruit specific substrates, indicating that the RNA exosome uses alternative conformations to act on different RNA substrates.

  5. Comparing Accessibility Auditing Methods for Ebooks: Crowdsourced, Functionality-Led Versus Web Content Methodologies.

    Science.gov (United States)

    James, Abi; Draffan, E A; Wald, Mike

    2017-01-01

    This paper presents a gap analysis between crowdsourced functional accessibility evaluations of ebooks conducted by non-experts and the technical accessibility standards employed by developers. It also illustrates how combining these approaches can provide more appropriate information for a wider group of users with print impairments.

  6. INSTITUTION FOR THE AGED: ASSESSING THE CONDITIONS OF ACCESSIBILITY AND FUNCTIONALITY OF THE ELDERLY.

    Directory of Open Access Journals (Sweden)

    Raphaella Lomanto Santos de Almeida

    2015-04-01

    Full Text Available The study aim was to assess the capacity to undertake the Basic Activities of Daily Living (BADL of elderly residents of an Institution for the Aged (IA and their level of accessibility. This is an observational, descriptive, cross-sectional study. The level of independence for BADL was assessed by the Barthel Index and the degree of accessibility of IA was verified through a check-list, based on the Brazilian Standard (NBR 9050/2004, the Brazilian Association of Technical Standards (ABNT. Of the 62 seniors who participated in the study, 64.5% had some degree of functional dependence. Noteworthy the level of functional dependency for activities undertaken in the bathroom among elderly on wheelchair. The assessed physical structure does not fully follow the technical standards established by NBR 9050, with differences mainly in the parameters of bedrooms, bathrooms and stairs. Although much of the institutionalized elderly presenting advanced and most functional vulnerability ages, level of IA architectural accessibility is still insufficient. Rooms and bathrooms are the places with the highest deficit of accessibility and also higher prevalence of falls among the elderly residents. A good level of accessibility in IA, can be an important factor in improving the level of independence for everyday activities and to prevent the risk of falls.

  7. Bandwidth Analysis of Functional Interconnects Used as Test Access Mechanism

    NARCIS (Netherlands)

    Van den Berg, A.; Ren, P.; Marinissen, E.J.; Gaydadjiev, G.; Goossens, K.

    2010-01-01

    Test data travels through a System on Chip (SOC) from the chip pins to the Core-Under-Test (CUT) and vice versa via a Test Access Mechanism (TAM). Conventionally, a TAM is implemented using dedicated communication infrastructure. However, also existing functional interconnect, such as a bus or

  8. Bandwidth analysis of functional interconnects used as test access mechanism

    NARCIS (Netherlands)

    Berg, van den Ardy; Ren, P.; Marinissen, Erik Jan; Gaydadjiev, G.N.; Goossens, K.G.W.

    2010-01-01

    Test data travels through a System on Chip (SOC) from the chip pins to the Core-Under-Test (CUT) and vice versa via a Test Access Mechanism (TAM). Conventionally, a TAM is implemented using dedicated communication infrastructure. However, also existing functional interconnect, such as a bus or

  9. Reactivating Neural Circuits with Clinically Accessible Stimulation to Restore Hand Function in Persons with Tetraplegia

    Science.gov (United States)

    2017-09-01

    AWARD NUMBER: W81XWH-16-1-0395 TITLE: Reactivating Neural Circuits with Clinically Accessible Stimulation to Restore Hand Function in...estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data...Clinically Accessible Stimulation to Restore Hand Function in Persons with Tetraplegia 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S

  10. Overall accessibility to traveling by rail for the elderly with and without functional limitations: the whole-trip perspective.

    Science.gov (United States)

    Sundling, Catherine; Berglund, Birgitta; Nilsson, Mats E; Emardson, Ragne; Pendrill, Leslie R

    2014-12-01

    Elderly persons' perceived accessibility to railway traveling depends on their functional limitations/diseases, their functional abilities and their travel behaviors in interaction with the barriers encountered during whole trips. A survey was conducted on a random sample of 1000 city residents (65-85 years old; 57% response rate). The travels were perceived least accessible by respondents with severely reduced functional ability and by those with more than one functional limitation/disease (e.g., restricted mobility and chronic pain). Those who traveled "often", perceived the accessibility to be better than those who traveled less frequently. For travelers with high functional ability, the main barriers to more frequent traveling were travel costs and low punctuality. For those with low functional ability, one's own health was reported to be the main barrier. Our results clarify the links among existing functional limitations/functional abilities, the barriers encountered, the travel behavior, and the overall accessibility to traveling. By operationalizing the whole-trip concept as a chain of events, we deliver practical knowledge on vulnerable groups for decision-making to improve the transport environment for all.

  11. Overall Accessibility to Traveling by Rail for the Elderly with and without Functional Limitations: The Whole-Trip Perspective

    Directory of Open Access Journals (Sweden)

    Catherine Sundling

    2014-12-01

    Full Text Available Elderly persons’ perceived accessibility to railway traveling depends on their functional limitations/diseases, their functional abilities and their travel behaviors in interaction with the barriers encountered during whole trips. A survey was conducted on a random sample of 1000 city residents (65–85 years old; 57% response rate. The travels were perceived least accessible by respondents with severely reduced functional ability and by those with more than one functional limitation/disease (e.g., restricted mobility and chronic pain. Those who traveled “often”, perceived the accessibility to be better than those who traveled less frequently. For travelers with high functional ability, the main barriers to more frequent traveling were travel costs and low punctuality. For those with low functional ability, one’s own health was reported to be the main barrier. Our results clarify the links among existing functional limitations/functional abilities, the barriers encountered, the travel behavior, and the overall accessibility to traveling. By operationalizing the whole-trip concept as a chain of events, we deliver practical knowledge on vulnerable groups for decision-making to improve the transport environment for all.

  12. Access to Functionalized Steroid Side Chains via Modified Julia Olefination

    Science.gov (United States)

    Izgu, Enver Cagri; Burns, Aaron C.; Hoye, Thomas R.

    2011-01-01

    Various functionalized steroidal side chains were conveniently accessed by a modified Julia olefination strategy using a common sulfone donor and an appropriate α-branched aldehyde acceptor. For the coupling of these hindered classes of reaction partners (and in contrast to typically observed trends), the benzothiazolyl(BT)-sulfone anion gave superior outcomes compared to the phenyltetrazolyl(PT)-sulfone anion. PMID:21244047

  13. Offshoring and access to location-specific advantages - the impact of governance mode and function

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona; Motika, Agnes; Wæhrens, Brian Vejrum

    how access to particular offshoring advantages may provide this link. The results of a quantitative survey of more than 1000 Scandinavian firms show that certain offshoring factors (governance mode and type of offshored function) indeed impact the access a company acquires to certain offshoring...... advantages, which may explain the unpredictability of previous performance outcomes....

  14. Short- and long-term functional effects of percutaneous transluminal angioplasty in hemodialysis vascular access

    NARCIS (Netherlands)

    J. van der Linden (Joke); J.H. Smits (Johannes); J.H. Assink (Jan Hendrik); D.W. Wolterbeek (Derk); J.J. Zijlstra (Jan); G.H.T. de Jong (Gijs); M.A. van den Dorpel (Marinus); P.J. Blankestijn (Peter)

    2002-01-01

    textabstractThe efficacy of percutaneous transluminal angioplasty (PTA) is usually expressed as the angiographic result. Access flow (Qa) measurements offer a means to quantify the functional effects. This study was performed to evaluate the short-term functional and

  15. Genome-scale characterization of RNA tertiary structures and their functional impact by RNA solvent accessibility prediction.

    Science.gov (United States)

    Yang, Yuedong; Li, Xiaomei; Zhao, Huiying; Zhan, Jian; Wang, Jihua; Zhou, Yaoqi

    2017-01-01

    As most RNA structures are elusive to structure determination, obtaining solvent accessible surface areas (ASAs) of nucleotides in an RNA structure is an important first step to characterize potential functional sites and core structural regions. Here, we developed RNAsnap, the first machine-learning method trained on protein-bound RNA structures for solvent accessibility prediction. Built on sequence profiles from multiple sequence alignment (RNAsnap-prof), the method provided robust prediction in fivefold cross-validation and an independent test (Pearson correlation coefficients, r, between predicted and actual ASA values are 0.66 and 0.63, respectively). Application of the method to 6178 mRNAs revealed its positive correlation to mRNA accessibility by dimethyl sulphate (DMS) experimentally measured in vivo (r = 0.37) but not in vitro (r = 0.07), despite the lack of training on mRNAs and the fact that DMS accessibility is only an approximation to solvent accessibility. We further found strong association across coding and noncoding regions between predicted solvent accessibility of the mutation site of a single nucleotide variant (SNV) and the frequency of that variant in the population for 2.2 million SNVs obtained in the 1000 Genomes Project. Moreover, mapping solvent accessibility of RNAs to the human genome indicated that introns, 5' cap of 5' and 3' cap of 3' untranslated regions, are more solvent accessible, consistent with their respective functional roles. These results support conformational selections as the mechanism for the formation of RNA-protein complexes and highlight the utility of genome-scale characterization of RNA tertiary structures by RNAsnap. The server and its stand-alone downloadable version are available at http://sparks-lab.org. © 2016 Yang et al.; Published by Cold Spring Harbor Laboratory Press for the RNA Society.

  16. Accessing Autonomic Function Can Early Screen Metabolic Syndrome

    Science.gov (United States)

    Dai, Meng; Li, Mian; Yang, Zhi; Xu, Min; Xu, Yu; Lu, Jieli; Chen, Yuhong; Liu, Jianmin; Ning, Guang; Bi, Yufang

    2012-01-01

    Background Clinical diagnosis of the metabolic syndrome is time-consuming and invasive. Convenient instruments that do not require laboratory or physical investigation would be useful in early screening individuals at high risk of metabolic syndrome. Examination of the autonomic function can be taken as a directly reference and screening indicator for predicting metabolic syndrome. Methodology and Principal Findings The EZSCAN test, as an efficient and noninvasive technology, can access autonomic function through measuring electrochemical skin conductance. In this study, we used EZSCAN value to evaluate autonomic function and to detect metabolic syndrome in 5,887 participants aged 40 years or older. The EZSCAN test diagnostic accuracy was analyzed by receiver operating characteristic curves. Among the 5,815 participants in the final analysis, 2,541 were diagnosed as metabolic syndrome and the overall prevalence was 43.7%. Prevalence of the metabolic syndrome increased with the elevated EZSCAN risk level (p for trend metabolic syndrome components (p for trend metabolic syndrome after the multiple adjustments. The area under the curve of the EZSCAN test was 0.62 (95% confidence interval [CI], 0.61–0.64) for predicting metabolic syndrome. The optimal operating point for the EZSCAN value to detect a high risk of prevalent metabolic syndrome was 30 in this study, while the sensitivity and specificity were 71.2% and 46.7%, respectively. Conclusions and Significance In conclusion, although less sensitive and accurate when compared with the clinical definition of metabolic syndrome, we found that the EZSCAN test is a good and simple screening technique for early predicting metabolic syndrome. PMID:22916265

  17. The Association of Long-Functioning Hemodialysis Vascular Access with Prevalence of Left Ventricular Hypertrophy in Kidney Transplant Recipients

    Directory of Open Access Journals (Sweden)

    Aureliusz Kolonko

    2014-01-01

    Full Text Available Left ventricular hypertrophy (LVH is frequently observed in chronic dialysis patients and is also highly prevalent in kidney transplant recipients. This study evaluates the impact of long-functioning hemodialysis vascular access on LVH in single center cohort of kidney transplant recipients. 162 patients at 8.7 ± 1.8 years after kidney transplantation were enrolled. Echocardiography, carotid ultrasound, and assessment of pulse wave velocity were performed. LVH was defined based on left ventricular mass (LVM indexed for body surface area (BSA and height2.7. There were 67 patients with and 95 without patent vascular access. Both study groups were comparable with respect to gender, age, duration of dialysis therapy, and time after transplantation, kidney graft function, and cardiovascular comorbidities. Patients with patent vascular access were characterized by significantly elevated LVM and significantly greater percentage of LVH, based on LVMI/BSA (66.7 versus 48.4%, P=0.02. OR for LVH in patients with patent vascular access was 2.39 (1.19–4.76, P=0.01. Regression analyses confirmed an independent contribution of patent vascular access to higher LVM and increased prevalence of LVH. We concluded that long-lasting patent hemodialysis vascular access after kidney transplantation is associated with the increased prevalence of LVH in kidney transplant recipients.

  18. Attitude Accessibility as a Function of Emotionality.

    Science.gov (United States)

    Rocklage, Matthew D; Fazio, Russell H

    2018-04-01

    Despite the centrality of both attitude accessibility and attitude basis to the last 30 years of theoretical and empirical work concerning attitudes, little work has systematically investigated their relation. The research that does exist provides conflicting results and is not at all conclusive given the methodology that has been used. The current research uses recent advances in statistical modeling and attitude measurement to provide the most systematic examination of the relation between attitude accessibility and basis to date. Specifically, we use mixed-effects modeling which accounts for variation across individuals and attitude objects in conjunction with the Evaluative Lexicon (EL)-a linguistic approach that allows for the simultaneous measurement of an attitude's valence, extremity, and emotionality. We demonstrate across four studies, over 10,000 attitudes, and nearly 50 attitude objects that attitudes based on emotion tend to be more accessible in memory, particularly if the attitude is positive.

  19. 1001 Proteomes: a functional proteomics portal for the analysis of Arabidopsis thaliana accessions.

    Science.gov (United States)

    Joshi, Hiren J; Christiansen, Katy M; Fitz, Joffrey; Cao, Jun; Lipzen, Anna; Martin, Joel; Smith-Moritz, A Michelle; Pennacchio, Len A; Schackwitz, Wendy S; Weigel, Detlef; Heazlewood, Joshua L

    2012-05-15

    The sequencing of over a thousand natural strains of the model plant Arabidopsis thaliana is producing unparalleled information at the genetic level for plant researchers. To enable the rapid exploitation of these data for functional proteomics studies, we have created a resource for the visualization of protein information and proteomic datasets for sequenced natural strains of A. thaliana. The 1001 Proteomes portal can be used to visualize amino acid substitutions or non-synonymous single-nucleotide polymorphisms in individual proteins of A. thaliana based on the reference genome Col-0. We have used the available processed sequence information to analyze the conservation of known residues subject to protein phosphorylation among these natural strains. The substitution of amino acids in A. thaliana natural strains is heavily constrained and is likely a result of the conservation of functional attributes within proteins. At a practical level, we demonstrate that this information can be used to clarify ambiguously defined phosphorylation sites from phosphoproteomic studies. Protein sets of available natural variants are available for download to enable proteomic studies on these accessions. Together this information can be used to uncover the possible roles of specific amino acids in determining the structure and function of proteins in the model plant A. thaliana. An online portal to enable the community to exploit these data can be accessed at http://1001proteomes.masc-proteomics.org/

  20. Individuals with Access and Functional Needs

    Science.gov (United States)

    ... online tool helps people locate and access their electronic health records from a variety of sources. Plan for children ... in a busy room or to provide instant privacy, headphones to decrease auditory distractions, and comfort snacks ...

  1. EPICS: Channel Access security design

    International Nuclear Information System (INIS)

    Kraimer, M.; Hill, J.

    1994-05-01

    This document presents the design for implementing the requirements specified in: EPICS -- Channel Access Security -- functional requirements, Ned. D. Arnold, 03/09/92. Use of the access security system is described along with a summary of the functional requirements. The programmer's interface is given. Security protocol is described and finally aids for reading the access security code are provided

  2. Accessing autonomic function can early screen metabolic syndrome.

    Directory of Open Access Journals (Sweden)

    Kan Sun

    Full Text Available BACKGROUND: Clinical diagnosis of the metabolic syndrome is time-consuming and invasive. Convenient instruments that do not require laboratory or physical investigation would be useful in early screening individuals at high risk of metabolic syndrome. Examination of the autonomic function can be taken as a directly reference and screening indicator for predicting metabolic syndrome. METHODOLOGY AND PRINCIPAL FINDINGS: The EZSCAN test, as an efficient and noninvasive technology, can access autonomic function through measuring electrochemical skin conductance. In this study, we used EZSCAN value to evaluate autonomic function and to detect metabolic syndrome in 5,887 participants aged 40 years or older. The EZSCAN test diagnostic accuracy was analyzed by receiver operating characteristic curves. Among the 5,815 participants in the final analysis, 2,541 were diagnosed as metabolic syndrome and the overall prevalence was 43.7%. Prevalence of the metabolic syndrome increased with the elevated EZSCAN risk level (p for trend <0.0001. Moreover, EZSCAN value was associated with an increase in the number of metabolic syndrome components (p for trend <0.0001. Compared with the no risk group (EZSCAN value 0-24, participants at the high risk group (EZSCAN value: 50-100 had a 2.35 fold increased risk of prevalent metabolic syndrome after the multiple adjustments. The area under the curve of the EZSCAN test was 0.62 (95% confidence interval [CI], 0.61-0.64 for predicting metabolic syndrome. The optimal operating point for the EZSCAN value to detect a high risk of prevalent metabolic syndrome was 30 in this study, while the sensitivity and specificity were 71.2% and 46.7%, respectively. CONCLUSIONS AND SIGNIFICANCE: In conclusion, although less sensitive and accurate when compared with the clinical definition of metabolic syndrome, we found that the EZSCAN test is a good and simple screening technique for early predicting metabolic syndrome.

  3. Typology of person-environment fit constellations: a platform addressing accessibility problems in the built environment for people with functional limitations.

    Science.gov (United States)

    Slaug, Björn; Schilling, Oliver; Iwarsson, Susanne; Carlsson, Gunilla

    2015-09-02

    Making the built environment accessible for all regardless of functional capacity is an important goal for public health efforts. Considerable impediments to achieving this goal suggest the need for valid measurements of acccessibility and for greater attention to the complexity of person-environment fit issues. To address these needs, this study aimed to provide a methodological platform, useful for further research and instrument development within accessibility research. This was accomplished by the construction of a typology of problematic person-environment fit constellations, utilizing an existing methodology developed to assess and analyze accessibility problems in the built environment. By means of qualitative review and statistical methods we classified the person-environment fit components covered by an existing application which targets housing accessibility: the Housing Enabler (HE) instrument. The International Classification of Functioning, Disability and Health (ICF) was used as a conceptual framework. Qualitative classification principles were based on conceptual similarities and for quantitative analysis of similarities, Principal Component Analysis was carried out. We present a typology of problematic person-environment fit constellations classified along three dimensions: 1) accessibility problem range and severity 2) aspects of functioning 3) environmental context. As a result of the classification of the HE components, 48 typical person-environment fit constellations were recognised. The main contribution of this study is the proposed typology of person-environment fit constellations. The typology provides a methodological platform for the identification and quantification of problematic person-environment fit constellations. Its link to the globally accepted ICF classification system facilitates communication within the scientific and health care practice communities. The typology also highlights how relations between aspects of functioning

  4. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  5. ADNP-CSMA Random Multiple Access protocol application with the function of monitoring in Ad Hoc network

    Directory of Open Access Journals (Sweden)

    Zhan Gang

    2016-01-01

    Full Text Available In Ad Hoc networks,the net work of mobile nodes exchange information with their wireless transceiver equipment,the network throughput is in increased,compared to other such multiple hops network.Moreover along with the rapid development of modern information,communication business also will be increase.However,the access and adaptive of previous CSMA protocol are insufficient.According to these properties,this paper presents a kind of adaptive dual clock with monitoring function P-CSMA random multiple access protocol(ADNP-CSMA,and discusses two kinds of P-CSMA.ACK with monitoring function is introduced to maintain the stability of the whole system,and the introduction of dual clock mechanism reduces the channel of idle period.It calculate the system throughput expression through the method of average period,and the simulation results show that the system is constant in the case of high load throughput.

  6. Housing Accessibility Methodology Targeting Older People

    DEFF Research Database (Denmark)

    Helle, Tina

    accessibility problems before the planning of housing intervention strategies. It is also critical that housing standards addressing accessibility intended to accommodate people with functional limitations are valid in the sense that their definitions truly support accessibility. However, there is a paucity...... of valid and reliable assessment instruments targeting housing accessibility, and in-depth analysis of factors potentially impacting on reliability in complex assessment situations is remarkably absent. Moreover, the knowledge base informing the housing standards appears to be vague. We may therefore...... reasonably question the validity of the housing standards addressing accessibility. This thesis addresses housing accessibility methodology in general and the reliability of assessment and the validity of standards targeting older people with functional limitations and a dependence on mobility devices...

  7. Accessibility issues with long-term disabilities.

    Science.gov (United States)

    Sebring-Cale, Nancy J

    2008-06-01

    Home modifications for barrier-free accessibility will assist the physically challenged populations by increasing their independence. By providing an accessible environment, an individual can become more independent and require less assistance for functional activities, such as kitchen appliance access, door widening, open floor plan, elevated electric outlets, roll-under sinks, roll-in showers and MobiLife elevating wheelchair.

  8. Photosystem II function and dynamics in three widely used Arabidopsis thaliana accessions.

    Directory of Open Access Journals (Sweden)

    Lan Yin

    Full Text Available Columbia-0 (Col-0, Wassilewskija-4 (Ws-4, and Landsberg erecta-0 (Ler-0 are used as background lines for many public Arabidopsis mutant collections, and for investigation in laboratory conditions of plant processes, including photosynthesis and response to high-intensity light (HL. The photosystem II (PSII complex is sensitive to HL and requires repair to sustain its function. PSII repair is a multistep process controlled by numerous factors, including protein phosphorylation and thylakoid membrane stacking. Here we have characterized the function and dynamics of PSII complex under growth-light and HL conditions. Ws-4 displayed 30% more thylakoid lipids per chlorophyll and 40% less chlorophyll per carotenoid than Col-0 and Ler-0. There were no large differences in thylakoid stacking, photoprotection and relative levels of photosynthetic complexes among the three accessions. An increased efficiency of PSII closure was found in Ws-4 following illumination with saturation flashes or continuous light. Phosphorylation of the PSII D1/D2 proteins was reduced by 50% in Ws-4 as compared to Col-0 and Ler-0. An increase in abundance of the responsible STN8 kinase in response to HL treatment was found in all three accessions, but Ws-4 displayed 50% lower levels than Col-0 and Ler-0. Despite this, the HL treatment caused in Ws-4 the lagest extent of PSII inactivation, disassembly, D1 protein degradation, and the largest decrease in the size of stacked thylakoids. The dilution of chlorophyll-protein complexes with additional lipids and carotenoids in Ws-4 may represent a mechanism to facilitate lateral protein traffic in the membrane, thus compensating for the lack of a full complement of STN8 kinase. Nevertheless, additional PSII damage occurs in Ws-4, which exceeds the D1 protein synthesis capacity, thus leading to enhanced photoinhibition. Our findings are valuable for selection of appropriate background line for PSII characterization in Arabidopsis

  9. Housing accessibility problems for people with Parkinson's disease.

    Science.gov (United States)

    Slaug, B; Iwarsson, S; Ayala, J A; Nilsson, M H

    2017-11-01

    Promoting accessible housing for all citizens is high on the political agenda. Knowledge is, however, limited regarding housing accessibility problems for people with Parkinson's disease (PD). The objectives were to investigate housing accessibility problems among people with PD at different stages of disease severity and to analyze the potential impact of improved functional ability on accessibility problems. The study included 253 participants with PD (61% men; mean age 70 years). Disease severity was assessed by the Hoehn and Yahr (HY) I-V stages: HY I, n=50; II, n=73, III, n=66; IV-V, n=64. Using the Housing Enabler (HE) instrument, accessibility problems were investigated by combining assessments of the person's functional capacity with assessments of physical barriers in the housing environment into a person-environment fit measure (HE-score). To analyze potential impact of improved functional ability on housing accessibility problems, data simulation was applied. HE-scores differed significantly (Phousing accessibility problems for people with PD. The study also details environmental barriers that need specific attention when providing housing adaptation services. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  10. Vascular access: a never-ending story.

    Science.gov (United States)

    Hedin, U

    2014-12-01

    Vascular surgeons are more and more becoming responsible for "life-line" creation well functioning and maintenance of hemodialysis patients and to provide a well functioning and multidisciplinary access service together with nefrologists, dialysis staff, and interventional radiology. For many, this sometimes arduous surgery with associated complicated clinical decision making, becomes a constant and challenging burden but much through the appearance of national and international guidelines and especially the endovascular technology, feasible solutions are easily at hand and the life as an access surgeon more pleasant. Here, basics in dialysis access care are presented together with some examples of novel available solutions to troublesome clinical problems.

  11. Predictors of nonfunctional arteriovenous access at hemodialysis initiation and timing of access creation: A registry-based study.

    Directory of Open Access Journals (Sweden)

    Natalia Alencar de Pinho

    Full Text Available Determinants of nonfunctional arteriovenous (AV access, including timing of AV access creation, have not been sufficiently described. We studied 29 945 patients who had predialysis AV access placement and were included in the French REIN registry from 2005 through 2013. AV access was considered nonfunctional when dialysis began with a catheter. We estimated crude and adjusted odds ratio (OR with 95% confidence intervals (CI of nonfunctional versus functional AV access associated with case-mix, facility characteristics, and timing of AV access creation. Analyses were stratified by dialysis start condition (planned or as an emergency and comorbidity profile. Overall, 18% patients had nonfunctional AV access at hemodialysis initiation. In the group with planned dialysis start, female gender (OR 1.43, 95% CI 1.32-1.56, diabetes (OR 1.28, 95% CI 1.15-1.44, and a higher number of cardiovascular comorbidities (OR 1.27, 95% CI 1.09-1.49, and 1.31, 1.05-1.64, for 3 and >3 cardiovascular comorbidities versus none, respectively were independent predictors of nonfunctional AV access. A higher percentage of AV access creation at the region level was associated with a lower rate of nonfunctional AV access (OR 0.98, 95% CI 0.98-0.99 per 1% increase. The odds of nonfunctional AV access decreased as time from creation to hemodialysis initiation increased up to 3 months in nondiabetic patients with fewer than 2 cardiovascular comorbidities and 6 months in patients with diabetes or 2 or more such comorbidities. In conclusion, both patient characteristics and clinical practices may play a role in successful AV access use at hemodialysis initiation. Adjusting the timing of AV access creation to patients' comorbidity profiles may improve functional AV access rates.

  12. Accessibility of antiretroviral therapy in Ghana: Convenience of access

    African Journals Online (AJOL)

    Joyce Addo-Atuah * Joyce Addo-Atuah, BPharm, MSc, PhD, Assistant Professor, Touro College of Pharmacy, New York, USA. She was a PhD candidate at the University of Tennessee (UT), Memphis, USA, when the study was undertaken in Ghana. joyce.addo-atuah@touro.edu, Dick Gourley Dick Gourley, PharmD, Professor and Dean, UT College of Pharmacy during the study and major research advisor. , Greta Gourley Greta Gourley, PharmD/PhD, retired Associate Professor of Pharmaceutical Sciences at UT College of Pharmacy and research advisor. , Shelley I. White-Means Shelley I. White-Means, PhD, Professor and Chair, Health Outcomes and Policy Research Division of UT College of Pharmacy at time of the study and research advisor. , Robin J. Womeodu Robin J. Womeodu, MD, F.A.C.P., Associate Professor of Internal Medicine and Preventive Medicine at UT College of Medicine at time of study and research advisor. , Richard J. Faris Richard J. Faris, Assistant Professor at UT College of Pharmacy at time of study and research advisor. &

    2012-05-30

    May 30, 2012 ... The accuracy of any instructions, formulae, and drug doses ... The convenience of accessing antiretroviral therapy (ART) is ...... tious diseases, paediatrics, chest diseases, dermatology, public .... CD4 count, (2) a full blood count, (3) a liver function test, (4) ..... America: measures of the African brain drain.

  13. Functional Traits for Carbon Access in Macrophytes.

    Science.gov (United States)

    Stepien, Courtney C; Pfister, Catherine A; Wootton, J Timothy

    2016-01-01

    Understanding functional trait distributions among organisms can inform impacts on and responses to environmental change. In marine systems, only 1% of dissolved inorganic carbon in seawater exists as CO2. Thus the majority of marine macrophytes not only passively access CO2 for photosynthesis, but also actively transport CO2 and the more common bicarbonate (HCO3-, 92% of seawater dissolved inorganic carbon) into their cells. Because species with these carbon concentrating mechanisms (CCMs) are non-randomly distributed in ecosystems, we ask whether there is a phylogenetic pattern to the distribution of CCMs among algal species. To determine macrophyte traits that influence carbon uptake, we assessed 40 common macrophyte species from the rocky intertidal community of the Northeast Pacific Ocean to a) query whether macrophytes have a CCM and b) determine the evolutionary history of CCMs, using ancestral state reconstructions and stochastic character mapping based on previously published data. Thirty-two species not only depleted CO2, but also concentrated and depleted HCO3-, indicative of a CCM. While analysis of CCMs as a continuous trait in 30 families within Phylum Rhodophyta showed a significant phylogenetic signal under a Brownian motion model, analysis of CCMs as a discrete trait (presence or absence) indicated that red algal families are more divergent than expected in their CCM presence or absence; CCMs are a labile trait within the Rhodophyta. In contrast, CCMs were present in each of 18 Ochrophyta families surveyed, indicating that CCMs are highly conserved in the brown algae. The trait of CCM presence or absence was largely conserved within Families. Fifteen of 23 species tested also changed the seawater buffering capacity, or Total Alkalinity (TA), shifting DIC composition towards increasing concentrations of HCO3- and CO2 for photosynthesis. Manipulating the external TA of the local environment may influence carbon availability in boundary layers and

  14. Functional Traits for Carbon Access in Macrophytes

    Science.gov (United States)

    Pfister, Catherine A.; Wootton, J. Timothy

    2016-01-01

    Understanding functional trait distributions among organisms can inform impacts on and responses to environmental change. In marine systems, only 1% of dissolved inorganic carbon in seawater exists as CO2. Thus the majority of marine macrophytes not only passively access CO2 for photosynthesis, but also actively transport CO2 and the more common bicarbonate (HCO3-, 92% of seawater dissolved inorganic carbon) into their cells. Because species with these carbon concentrating mechanisms (CCMs) are non-randomly distributed in ecosystems, we ask whether there is a phylogenetic pattern to the distribution of CCMs among algal species. To determine macrophyte traits that influence carbon uptake, we assessed 40 common macrophyte species from the rocky intertidal community of the Northeast Pacific Ocean to a) query whether macrophytes have a CCM and b) determine the evolutionary history of CCMs, using ancestral state reconstructions and stochastic character mapping based on previously published data. Thirty-two species not only depleted CO2, but also concentrated and depleted HCO3-, indicative of a CCM. While analysis of CCMs as a continuous trait in 30 families within Phylum Rhodophyta showed a significant phylogenetic signal under a Brownian motion model, analysis of CCMs as a discrete trait (presence or absence) indicated that red algal families are more divergent than expected in their CCM presence or absence; CCMs are a labile trait within the Rhodophyta. In contrast, CCMs were present in each of 18 Ochrophyta families surveyed, indicating that CCMs are highly conserved in the brown algae. The trait of CCM presence or absence was largely conserved within Families. Fifteen of 23 species tested also changed the seawater buffering capacity, or Total Alkalinity (TA), shifting DIC composition towards increasing concentrations of HCO3- and CO2 for photosynthesis. Manipulating the external TA of the local environment may influence carbon availability in boundary layers and

  15. Mitsunobu mischief: Neighbor-directed histidine N(π)–alkylation provides access to peptides containing selectively functionalized imidazolium heterocycles

    Science.gov (United States)

    Qian, Wen-Jian

    2015-01-01

    There are few methodologies that yield peptides containing His residues with selective N(π), N(π)-bis-alkylated imidazole rings. We have found that, under certain conditions, on-resin Mitsunobu coupling of alcohols with peptides having a N(π)-alkylated His residue results in selective and high-yield alkylation of the imidazole N(π) nitrogen. The reaction requires the presence of a proximal phosphoric, carboxylic or sulfonic acid, and proceeds through an apparent intramolecular mechanism involving Mitsunobu intermediates. These transformations have particular application to phosphopeptides, where “charge masking” of one phosphoryl anionic charge by the cationic histidine imidazolium ion is now possible. This chemistry opens selective access to peptides containing differentially functionalized imidazolium heterocycles, which provide access to new classes of peptides and peptide mimetics. PMID:25739367

  16. Validation of Housing Standards Addressing Accessibility

    DEFF Research Database (Denmark)

    Helle, Tina

    2013-01-01

    The aim was to explore the use of an activity-based approach to determine the validity of a set of housing standards addressing accessibility. This included examination of the frequency and the extent of accessibility problems among older people with physical functional limitations who used...... participant groups were examined. Performing well-known kitchen activities was associated with accessibility problems for all three participant groups, in particular those using a wheelchair. The overall validity of the housing standards examined was poor. Observing older people interacting with realistic...... environments while performing real everyday activities seems to be an appropriate method for assessing accessibility problems....

  17. Assessing communication accessibility in the university classroom: towards a goal of universal hearing accessibility.

    Science.gov (United States)

    Cheesman, Margaret F; Jennings, Mary Beth; Klinger, Lisa

    2013-01-01

    Measures of accessibility typically focus on the physical environment and aspects relating to getting into and out of spaces. The transient sound environment is less well characterized in typical accessibility measures. Hearing accessibility measures can be based upon physical indices or functional assessment. The physical measures are indices that use signal-to-noise ratios to evaluate audibility while the functional assessment tool adopts universal design for hearing (UDH) principles derived from principles of universal design. The UDH principles include (1) Optimization of the hearing environment for all; (2) Optimization of interactions between persons and objects to promote better hearing in an environment; (3) Optimization of opportunities for people to have multiple choices of interactions with one another; (4) Optimization of opportunities for people to perform different activities in and across environments; (5) Optimization of opportunities for people to have safe, private, and secure use of the environment while minimizing distraction, interference, or cognitive loading; and (6) Optimization of opportunities for people to use the environment without extra steps for hearing access during preparatory, use and/or after use phases. This paper compares the two approaches using case examples from post-secondary classrooms in order to describe the potential advantages and limitations of each.

  18. Access 2010 All-in-One For Dummies

    CERN Document Server

    Barrows, Alison; Stockman, Joseph C

    2010-01-01

    The all-in-one reference to all aspects of Microsoft Access 2010. If you want to learn Microsoft Access inside and out, the nine minibooks in this easy-access reference are exactly what you need. Read the book cover to cover, or jump into any of the minibooks for the instruction and topics you need most. Learn how to connect Access to SQL Server, manipulate your data locally, use nifty new features from Office 2010 such as the enhanced Ribbon, create queries and macros like a champ, and much more. From the basics to advanced functions, it's what you need to make Access more accesssible.:; Show

  19. Web accessibility and open source software.

    Science.gov (United States)

    Obrenović, Zeljko

    2009-07-01

    A Web browser provides a uniform user interface to different types of information. Making this interface universally accessible and more interactive is a long-term goal still far from being achieved. Universally accessible browsers require novel interaction modalities and additional functionalities, for which existing browsers tend to provide only partial solutions. Although functionality for Web accessibility can be found as open source and free software components, their reuse and integration is complex because they were developed in diverse implementation environments, following standards and conventions incompatible with the Web. To address these problems, we have started several activities that aim at exploiting the potential of open-source software for Web accessibility. The first of these activities is the development of Adaptable Multi-Interface COmmunicator (AMICO):WEB, an infrastructure that facilitates efficient reuse and integration of open source software components into the Web environment. The main contribution of AMICO:WEB is in enabling the syntactic and semantic interoperability between Web extension mechanisms and a variety of integration mechanisms used by open source and free software components. Its design is based on our experiences in solving practical problems where we have used open source components to improve accessibility of rich media Web applications. The second of our activities involves improving education, where we have used our platform to teach students how to build advanced accessibility solutions from diverse open-source software. We are also partially involved in the recently started Eclipse projects called Accessibility Tools Framework (ACTF), the aim of which is development of extensible infrastructure, upon which developers can build a variety of utilities that help to evaluate and enhance the accessibility of applications and content for people with disabilities. In this article we briefly report on these activities.

  20. Automated Computer Access Request System

    Science.gov (United States)

    Snook, Bryan E.

    2010-01-01

    The Automated Computer Access Request (AutoCAR) system is a Web-based account provisioning application that replaces the time-consuming paper-based computer-access request process at Johnson Space Center (JSC). Auto- CAR combines rules-based and role-based functionality in one application to provide a centralized system that is easily and widely accessible. The system features a work-flow engine that facilitates request routing, a user registration directory containing contact information and user metadata, an access request submission and tracking process, and a system administrator account management component. This provides full, end-to-end disposition approval chain accountability from the moment a request is submitted. By blending both rules-based and rolebased functionality, AutoCAR has the flexibility to route requests based on a user s nationality, JSC affiliation status, and other export-control requirements, while ensuring a user s request is addressed by either a primary or backup approver. All user accounts that are tracked in AutoCAR are recorded and mapped to the native operating system schema on the target platform where user accounts reside. This allows for future extensibility for supporting creation, deletion, and account management directly on the target platforms by way of AutoCAR. The system s directory-based lookup and day-today change analysis of directory information determines personnel moves, deletions, and additions, and automatically notifies a user via e-mail to revalidate his/her account access as a result of such changes. AutoCAR is a Microsoft classic active server page (ASP) application hosted on a Microsoft Internet Information Server (IIS).

  1. Essential Medicines in Nigeria: Foregrounding Access to Affordable ...

    African Journals Online (AJOL)

    Abstract. Within every functional healthcare system, access to quality and affordable essential medicine stands out as one of the building blocks. However ... Keywords: Access to medicines, Essential medicines, Healthcare, Public health facilities, Counterfeit medicines, Traditional medicines, Health systems, Systems theory ...

  2. Airport Surface Access and Mobile Apps

    Directory of Open Access Journals (Sweden)

    Luis Martin-Domingo

    2015-02-01

    Full Text Available Purpose: Airport Surface Access faces two main opposite issues: (1 cars, being the main transport mode, contribute to the increasing level of congestion and pollution of cities; and (2 simultaneously, parking fees are one important source of airports commercial revenue, creating a dilemma for airports when facing the problem. Following the recent trend of air passengers travelling with Smartphone (78% in 2013, the purpose of this paper is to monitor the adoption of mobile Applications (Apps by airports and to analyze if the information and functions provided in those Apps can help to overcome the above two issues. Design/methodology/approach: 31 iPhone App of some of the largest European airports were evaluated in the lab using the evaluation model of Destinations Mobile Applications (Scolari and Fernández-Cavia 2014 adapted for for the Airport Surface Access on Airport Apps Findings and Originality/value: The Apps evaluated provided a very limited functionality to help passengers to plan and book their trips to/from the airports on public transports and gave high priority to parking information and services. Originality/value: Although Airport Surface Access has been a widely researched, the originality of this paper is the analysis of airport mobile Apps as a potential tool for airports to deal with the surface airport access problems.Access, Airports, Mobile Internet, Commercial Revenues

  3. IP access networks with QoS support

    Science.gov (United States)

    Sargento, Susana; Valadas, Rui J. M. T.; Goncalves, Jorge; Sousa, Henrique

    2001-07-01

    The increasing demand of new services and applications is pushing for drastic changes on the design of access networks targeted mainly for residential and SOHO users. Future access networks will provide full service integration (including multimedia), resource sharing at the packet level and QoS support. It is expected that using IP as the base technology, the ideal plug-and-play scenario, where the management actions of the access network operator are kept to a minimum, will be achieved easily. This paper proposes an architecture for access networks based on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols (e.g. in the routing and addressing functions). We discuss two possible steps in the evolution of access networks towards a more efficient support of IP based services. The first one still provides no QoS support and was designed with the goal of reusing as much as possible current technologies; it is based on tunneling to transport PPP sessions. The second one introduces QoS support through the use of emerging technologies and protocols. We illustrate the different phases of a multimedia Internet access session, when using SIP for session initiation, COPS for the management of QoS policies including the AAA functions and RSVP for resource reservation.

  4. Access Rights Distribution

    Directory of Open Access Journals (Sweden)

    T. M. Pestunova

    2011-03-01

    Full Text Available The main aspects of the development of the information system, which grants users the rights for access to automated information system resources on the basis of the organization business-processes, are considered. The conceptual, informational, functional models of the system, as well as a model, which allows to realize control while using various formal models (RBAC, DAC, MAC, are described.

  5. A generic coordinate system and a set of generic variables for MFE database

    International Nuclear Information System (INIS)

    Miner, W.H. Jr.; Ross, D.W.; Solano, E.R.; Valanju, P.M.; Wiley, J.C.

    1993-01-01

    Over the last several years, profile data from nine different tokamaks have been stored in the magnetic fusion energy database (MFEDB). These data sets have come from a variety of sources and most are given in different coordinate systems. In order to attempt any intermachine analysis, it is convenient to transform these data sets into one generic coordinate system and to choose a uniform set of variable names. The authors describe the data sets from each tokamak indicating the source of the data and the coordinate system in which it is given. Next, they discuss the generic coordinate that has been adopted and show how it is implemented for each tokamak. Finally, the generic naming convention that has been adopted is discussed. It follows closely that which was used by Christiansen et al. for the ITER Global Energy Confinement H-Mode Database. For further clarification, they discuss the characteristics of the magnetic geometry given a Fourier representation of the magnetic equilibria

  6. 78 FR 30226 - Accessibility Requirements for Internet Browsers

    Science.gov (United States)

    2013-05-22

    ... software, such as an Internet browser, that it provides. Among other things, this means that the functions... CG Docket No. 10-145; FCC 13-57] Accessibility Requirements for Internet Browsers AGENCY: Federal... Act requires Internet browsers built into mobile phones to be accessible to individuals who are blind...

  7. λ5-Phosphorus-Containing α-Diazo Compounds: A Valuable Tool for Accessing Phosphorus-Functionalized Molecules.

    Science.gov (United States)

    Marinozzi, Maura; Pertusati, Fabrizio; Serpi, Michaela

    2016-11-23

    The compounds characterized by the presence of a λ 5 -phosphorus functionality at the α-position with respect to the diazo moiety, here referred to as λ 5 -phosphorus-containing α-diazo compounds (PCDCs), represent a vast class of extremely versatile reagents in organic chemistry and are particularly useful in the preparation of phosphonate- and phosphinoxide-functionalized molecules. Indeed, thanks to the high reactivity of the diazo moiety, PCDCs can be induced to undergo a wide variety of chemical transformations. Among them are carbon-hydrogen, as well as heteroatom-hydrogen insertion reactions, cyclopropanation, ylide formation, Wolff rearrangement, and cycloaddition reactions. PCDCs can be easily prepared from readily accessible precursors by a variety of different methods, such as diazotization, Bamford-Stevens-type elimination, and diazo transfer reactions. This evidence along with their relative stability and manageability make them appealing tools in organic synthesis. This Review aims to demonstrate the ongoing utility of PCDCs in the modern preparation of different classes of phosphorus-containing compounds, phosphonates, in particular. Furthermore, to address the lack of precedent collective papers, this Review also summarizes the methods for PCDCs preparation.

  8. In Situ Representations and Access Consciousness in Neural Blackboard or Workspace Architectures

    OpenAIRE

    Frank van der Velde

    2018-01-01

    Phenomenal theories of consciousness assert that consciousness is based on specific neural correlates in the brain, which can be separated from all cognitive functions we can perform. If so, the search for robot consciousness seems to be doomed. By contrast, theories of functional or access consciousness assert that consciousness can be studied only with forms of cognitive access, given by cognitive processes. Consequently, consciousness and cognitive access cannot be fully dissociated. Here,...

  9. An open-access microfluidic model for lung-specific functional studies at an air-liquid interface.

    Science.gov (United States)

    Nalayanda, Divya D; Puleo, Christopher; Fulton, William B; Sharpe, Leilani M; Wang, Tza-Huei; Abdullah, Fizan

    2009-10-01

    In an effort to improve the physiologic relevance of existing in vitro models for alveolar cells, we present a microfluidic platform which provides an air-interface in a dynamic system combining microfluidic and suspended membrane culture systems. Such a system provides the ability to manipulate multiple parameters on a single platform along with ease in cell seeding and manipulation. The current study presents a comparison of the efficacy of the hybrid system with conventional platforms using assays analyzing the maintenance of function and integrity of A549 alveolar epithelial cell monolayer cultures. The hybrid system incorporates bio-mimetic nourishment on the basal side of the epithelial cells along with an open system on the apical side of the cells exposed to air allowing for easy access for assays.

  10. Airspace Operations Demo Functional Requirements Matrix

    Science.gov (United States)

    2005-01-01

    The Flight IPT assessed the reasonableness of demonstrating each of the Access 5 Step 1 functional requirements. The functional requirements listed in this matrix are from the September 2005 release of the Access 5 Functional Requirements Document. The demonstration mission considered was a notional Western US mission (WUS). The conclusion of the assessment is that 90% of the Access 5 Step 1 functional requirements can be demonstrated using the notional Western US mission.

  11. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  12. Improvement of dose evaluation system for employees at severe accident in a nuclear power plant. Introduction of the dose rate conversion coefficient and addition of the access route edit function

    International Nuclear Information System (INIS)

    Sasaki, Yasuhiro; Minami, Noritoshi; Yoshida, Yoshitaka

    2006-01-01

    Institute of Nuclear Safety System, Inc. had developed the dose evaluation system to evaluate the radiation dose of employees at severe accident in a nuclear power plant. This system has features, which are (1) the dose rate of any evaluation point can be evaluated, (2) the dose rate at any time can be evaluated in consideration of the change in the radioactive source, (3) the dose rate map in the plant can be displayed (4) the dose along the access route when moving can be evaluated, and it is possible to use it for examination of the accident management guideline on the dose side etc.. To upgrade the dose evaluation function of this system, the improvements had been done which were introduction of the dose rate conversion coefficient and addition of the access route edit function. By introducing the dose rate conversion coefficient, the calculation time of the dose rate map in the plant was shortened at about 20 seconds, and a new function to evaluate time-dependent dose rate of any evaluation point was added. By adding the access route edit function, it became possible to re-calculate the dose easily at the route change. (author)

  13. Access Agent Improving The Performance Of Access Control Lists

    Directory of Open Access Journals (Sweden)

    Thelis R. S.

    2015-08-01

    Full Text Available The main focus of the proposed research is maintaining the security of a network. Extranet is a popular network among most of the organizations where network access is provided to a selected group of outliers. Limiting access to an extranet can be carried out using Access Control Lists ACLs method. However handling the workload of ACLs is an onerous task for the router. The purpose of the proposed research is to improve the performance and to solidify the security of the ACLs used in a small organization. Using a high performance computer as a dedicated device to share and handle the router workload is suggested in order to increase the performance of the router when handling ACLs. Methods of detecting and directing sensitive data is also discussed in this paper. A framework is provided to help increase the efficiency of the ACLs in an organization network using the above mentioned procedures thus helping the organizations ACLs performance to be improved to be more secure and the system to perform faster. Inbuilt methods of Windows platform or Software for open source platforms can be used to make a computer function as a router. Extended ACL features allow the determining of the type of packets flowing through the router. Combining these mechanisms allows the ACLs to be improved and perform in a more efficient manner.

  14. Accessible solitons of fractional dimension

    Energy Technology Data Exchange (ETDEWEB)

    Zhong, Wei-Ping, E-mail: zhongwp6@126.com [Department of Electronic and Information Engineering, Shunde Polytechnic, Guangdong Province, Shunde 528300 (China); Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar); Belić, Milivoj [Texas A& M University at Qatar, P.O. Box 23874, Doha (Qatar); Zhang, Yiqi [Key Laboratory for Physical Electronics and Devices of the Ministry of Education & Shaanxi Key Lab of Information Photonic Technique, Xi’an Jiaotong University, Xi’an 710049 (China)

    2016-05-15

    We demonstrate that accessible solitons described by an extended Schrödinger equation with the Laplacian of fractional dimension can exist in strongly nonlocal nonlinear media. The soliton solutions of the model are constructed by two special functions, the associated Legendre polynomials and the Laguerre polynomials in the fraction-dimensional space. Our results show that these fractional accessible solitons form a soliton family which includes crescent solitons, and asymmetric single-layer and multi-layer necklace solitons. -- Highlights: •Analytic solutions of a fractional Schrödinger equation are obtained. •The solutions are produced by means of self-similar method applied to the fractional Schrödinger equation with parabolic potential. •The fractional accessible solitons form crescent, asymmetric single-layer and multilayer necklace profiles. •The model applies to the propagation of optical pulses in strongly nonlocal nonlinear media.

  15. PathwayAccess: CellDesigner plugins for pathway databases.

    Science.gov (United States)

    Van Hemert, John L; Dickerson, Julie A

    2010-09-15

    CellDesigner provides a user-friendly interface for graphical biochemical pathway description. Many pathway databases are not directly exportable to CellDesigner models. PathwayAccess is an extensible suite of CellDesigner plugins, which connect CellDesigner directly to pathway databases using respective Java application programming interfaces. The process is streamlined for creating new PathwayAccess plugins for specific pathway databases. Three PathwayAccess plugins, MetNetAccess, BioCycAccess and ReactomeAccess, directly connect CellDesigner to the pathway databases MetNetDB, BioCyc and Reactome. PathwayAccess plugins enable CellDesigner users to expose pathway data to analytical CellDesigner functions, curate their pathway databases and visually integrate pathway data from different databases using standard Systems Biology Markup Language and Systems Biology Graphical Notation. Implemented in Java, PathwayAccess plugins run with CellDesigner version 4.0.1 and were tested on Ubuntu Linux, Windows XP and 7, and MacOSX. Source code, binaries, documentation and video walkthroughs are freely available at http://vrac.iastate.edu/~jlv.

  16. How modification of accessible lysines to phenylalanine modulates the structural and functional properties of horseradish peroxidase: a simulation study.

    Directory of Open Access Journals (Sweden)

    Leila Navapour

    Full Text Available Horseradish Peroxidase (HRP is one of the most studied peroxidases and a great number of chemical modifications and genetic manipulations have been carried out on its surface accessible residues to improve its stability and catalytic efficiency necessary for biotechnological applications. Most of the stabilized derivatives of HRP reported to date have involved chemical or genetic modifications of three surface-exposed lysines (K174, K232 and K241. In this computational study, we altered these lysines to phenylalanine residues to model those chemical modifications or genetic manipulations in which these positively charged lysines are converted to aromatic hydrophobic residues. Simulation results implied that upon these substitutions, the protein structure becomes less flexible. Stability gains are likely to be achieved due to the increased number of stable hydrogen bonds, improved heme-protein interactions and more integrated proximal Ca2+ binding pocket. We also found a new persistent hydrogen bond between the protein moiety (F174 and the heme prosthetic group as well as two stitching hydrogen bonds between the connecting loops GH and F'F″ in mutated HRP. However, detailed analysis of functionally related structural properties and dynamical features suggests reduced reactivity of the enzyme toward its substrates. Molecular dynamics simulations showed that substitutions narrow the bottle neck entry of peroxide substrate access channel and reduce the surface accessibility of the distal histidine (H42 and heme prosthetic group to the peroxide and aromatic substrates, respectively. Results also demonstrated that the area and volume of the aromatic-substrate binding pocket are significantly decreased upon modifications. Moreover, the hydrophobic patch functioning as a binding site or trap for reducing aromatic substrates is shrunk in mutated enzyme. Together, the results of this simulation study could provide possible structural clues to explain

  17. Attentional priorities and access to short-term memory

    DEFF Research Database (Denmark)

    Gillebert, Celine; Dyrholm, Mads; Vangkilde, Signe Allerup

    2012-01-01

    The intraparietal sulcus (IPS) has been implicated in selective attention as well as visual short-term memory (VSTM). To contrast mechanisms of target selection, distracter filtering, and access to VSTM, we combined behavioral testing, computational modeling and functional magnetic resonance......, thereby displaying a significant interaction between the two factors. The interaction between target and distracter set size in IPS could not be accounted for by a simple explanation in terms of number of items accessing VSTM. Instead, it led us to a model where items accessing VSTM receive differential...

  18. The conscious access hypothesis: Explaining the consciousness.

    Science.gov (United States)

    Prakash, Ravi

    2008-01-01

    The phenomenon of conscious awareness or consciousness is complicated but fascinating. Although this concept has intrigued the mankind since antiquity, exploration of consciousness from scientific perspectives is not very old. Among myriad of theories regarding nature, functions and mechanism of consciousness, off late, cognitive theories have received wider acceptance. One of the most exciting hypotheses in recent times has been the "conscious access hypotheses" based on the "global workspace model of consciousness". It underscores an important property of consciousness, the global access of information in cerebral cortex. Present article reviews the "conscious access hypothesis" in terms of its theoretical underpinnings as well as experimental supports it has received.

  19. The Practice of Hospital Intranet Terminal Access Control Solution

    Institute of Scientific and Technical Information of China (English)

    QI Shi-tao; TANG Li-ming

    2016-01-01

    Along with the increasingly urgent management needs of intranet terminals in hospital, and large scaled deployment of terminal management system, terminal access control has become one of the standard functions of terminal management. This paper mainly aims at some simple research for the system construction of hospital intranet terminal access control.

  20. A Comparative Analysis of Wiki Discretionary Access Control in a CONOPS Environment

    National Research Council Canada - National Science Library

    Crawford, Frederick L

    2008-01-01

    This research conducts a comparative analysis of discretionary access controls of current wikis by experimenting with their discretionary access controls and functionality, comparing the wiki software...

  1. Unprecedented access to functional biodegradable polymers and coatings

    NARCIS (Netherlands)

    Lee, Jung Seok; Wang, Rong; Chen, Wei; Meng, Fenghua; Cheng, Ru; Deng, Chao; Feijen, Jan; Zhong, Zhiyuan

    2011-01-01

    The ever-growing biomedical technology such as tissue engineering, regenerative medicine, and controlled drug release intimately relies on the development of advanced functional biomaterials. Here, we report on versatile and robust synthesis of novel vinyl sulfone (VS)-functionalized biodegradable

  2. Functionality and homogeneity.

    NARCIS (Netherlands)

    2011-01-01

    Functionality and homogeneity are two of the five Sustainable Safety principles. The functionality principle aims for roads to have but one exclusive function and distinguishes between traffic function (flow) and access function (residence). The homogeneity principle aims at differences in mass,

  3. Pitfall of the Strongest Cells in Static Random Access Memory Physical Unclonable Functions

    Directory of Open Access Journals (Sweden)

    Mingyang Gong

    2018-06-01

    Full Text Available Static Random Access Memory (SRAM Physical Unclonable Functions (PUFs are some of the most popular PUFs that provide a highly-secured solution for secret key storage. Given that PUF responses are noisy, the key reconstruction must use error correcting code (ECC to reduce the noise. Repetition code is widely used in resource constrained systems as it is concise and lightweight, however, research has shown that repetition codes can lead to information leakage. In this paper we found that the strongest cell distribution in a SRAM array may leak information of the responses of SRAM PUF when the repetition code is directly applied. Experimentally, on an ASIC platform with the HHGRACE 0.13 μm process, we recovered 8.3% of the measured response using the strongest cells revealed by the helper data, and we finally obtained a clone response 79% similar to weak response using the public helper data. We therefore propose Error Resistant Fuzzy Extractor (ERFE, a 4-bit error tolerant fuzzy extractor, that extracts the value of the sum of the responses as a unique key and reduces the failure rate to 1.8 × 10−8 with 256 bit entropy.

  4. Human engineering considerations in designing a computerized controlled access security system

    International Nuclear Information System (INIS)

    Moore, J.W.; Banks, W.W.

    1988-01-01

    This paper describes a human engineering effort in the design of a major security system upgrade at Lawrence Livermore National Laboratory. This upgrade was to be accomplished by replacing obsolete and difficult-to-man (i.e., multiple operator task actions required) security equipment and systems with a new, automated, computer-based access control system. The initial task was to assist the electronic and mechanical engineering staff in designing a computerized security access system too functionally and ergonomically accommodate 100% of the Laboratory user population. The new computerized access system was intended to control entry into sensitive exclusion areas by requiring personnel to use an entry booth-based system and/or a remote access control panel system. The primary user interface with the system was through a control panel containing a magnetic card reader, function buttons, LCD display, and push-button keypad

  5. BioPortal: enhanced functionality via new Web services from the National Center for Biomedical Ontology to access and use ontologies in software applications.

    Science.gov (United States)

    Whetzel, Patricia L; Noy, Natalya F; Shah, Nigam H; Alexander, Paul R; Nyulas, Csongor; Tudorache, Tania; Musen, Mark A

    2011-07-01

    The National Center for Biomedical Ontology (NCBO) is one of the National Centers for Biomedical Computing funded under the NIH Roadmap Initiative. Contributing to the national computing infrastructure, NCBO has developed BioPortal, a web portal that provides access to a library of biomedical ontologies and terminologies (http://bioportal.bioontology.org) via the NCBO Web services. BioPortal enables community participation in the evaluation and evolution of ontology content by providing features to add mappings between terms, to add comments linked to specific ontology terms and to provide ontology reviews. The NCBO Web services (http://www.bioontology.org/wiki/index.php/NCBO_REST_services) enable this functionality and provide a uniform mechanism to access ontologies from a variety of knowledge representation formats, such as Web Ontology Language (OWL) and Open Biological and Biomedical Ontologies (OBO) format. The Web services provide multi-layered access to the ontology content, from getting all terms in an ontology to retrieving metadata about a term. Users can easily incorporate the NCBO Web services into software applications to generate semantically aware applications and to facilitate structured data collection.

  6. Coupling mode-destination accessibility with seismic risk assessment to identify at-risk communities

    International Nuclear Information System (INIS)

    Miller, Mahalia; Baker, Jack W.

    2016-01-01

    In this paper, we develop a framework for coupling mode-destination accessibility with quantitative seismic risk assessment to identify communities at high risk for travel disruptions after an earthquake. Mode-destination accessibility measures the ability of people to reach destinations they desire. We use a probabilistic seismic risk assessment procedure, including a stochastic set of earthquake events, ground-motion intensity maps, damage maps, and realizations of traffic and accessibility impacts. For a case study of the San Francisco Bay Area, we couple our seismic risk framework with a practical activity-based traffic model. As a result, we quantify accessibility risk probabilistically by community and household type. We find that accessibility varies more strongly as a function of travelers' geographic location than as a function of their income class, and we identify particularly at-risk communities. We also observe that communities more conducive to local trips by foot or bike are predicted to be less impacted by losses in accessibility. This work shows the potential to link quantitative risk assessment methodologies with high-resolution travel models used by transportation planners. Quantitative risk metrics of this type should have great utility for planners working to reduce risk to a region's infrastructure systems. - Highlights: • We couple mode-destination accessibility with probabilistic seismic risk assessment. • Results identify communities at high risk for post-earthquake travel disruptions. • Accessibility varies more as a function of home location than by income. • Our model predicts reduced accessibility risk for more walking-friendly communities.

  7. Accessible Knowledge - Knowledge on Accessibility

    DEFF Research Database (Denmark)

    Kirkeby, Inge Mette

    2015-01-01

    Although serious efforts are made internationally and nationally, it is a slow process to make our physical environment accessible. In the actual design process, architects play a major role. But what kinds of knowledge, including research-based knowledge, do practicing architects make use of when...... designing accessible environments? The answer to the question is crucially important since it affects how knowledge is distributed and how accessibility can be ensured. In order to get first-hand knowledge about the design process and the sources from which they gain knowledge, 11 qualitative interviews...... were conducted with architects with experience of designing for accessibility. The analysis draws on two theoretical distinctions. The first is research-based knowledge versus knowledge used by architects. The second is context-independent knowledge versus context-dependent knowledge. The practitioners...

  8. Quantitative analysis of access strategies to remote information in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach in...

  9. LANSCE personnel access control system (PACS)

    International Nuclear Information System (INIS)

    Sturrock, J.C.; Gallegos, F.R.; Hall, M.J.

    1997-01-01

    The Radiation Security System (RSS) at the Los Alamos Neutron Science Center (LANSCE) provides personnel protection from prompt radiation due to accelerated beam. The Personnel Access Control System (PACS) is a component of the RSS that is designed to prevent personnel access to areas where prompt radiation is a hazard. PACS was designed to replace several older personnel safety systems (PSS) with a single modem unified design. Lessons learned from the operation over the last 20 years were incorporated into a redundant sensor, single-point failure safe, fault tolerant, and tamper-resistant system that prevents access to the beam areas by controlling the access keys and beam stoppers. PACS uses a layered philosophy to the physical and electronic design. The most critical assemblies are battery backed up, relay logic circuits; less critical devices use Programmable Logic Controllers (PLCs) for timing functions and communications. Outside reviewers have reviewed the operational safety of the design. The design philosophy, lessons learned, hardware design, software design, operation, and limitations of the device are described

  10. Physiological genomics of response to soil drying in diverse Arabidopsis accessions.

    Science.gov (United States)

    Des Marais, David L; McKay, John K; Richards, James H; Sen, Saunak; Wayne, Tierney; Juenger, Thomas E

    2012-03-01

    Arabidopsis thaliana, like many species, is characterized by abundant genetic variation. This variation is rapidly being cataloged at the sequence level, but careful dissection of genetic variation in whole-organism responses to stresses encountered in the natural environment are lacking; this functional variation can be exploited as a natural mutant screen to determine gene function. Here, we document physiological and transcriptomic response to soil drying in 17 natural accessions of Arabidopsis. By imposing ecologically realistic stress conditions, we found that acclimation in Arabidopsis involved a strong signature of increased investment in photosynthesis, carbohydrate turnover, and root growth. Our results extend previous work in the Columbia accession suggesting that abscisic acid signaling pathways play an important role in drought stress response. We also identified several mechanisms, including an increase in leaf nitrogen concentration and upregulation of two-component signaling relays, that were common to most natural accessions but had not been identified in studies using only the Columbia accession. Principal component analysis reveals strong correlations between suites of genes and specific physiological responses to stress. The functional variants we identified may represent adaptive mutations in natural habitats and useful variants for agronomic improvement of crop species.

  11. Direct Functionalization of an Acid-Terminated Nanodiamond with Azide: Enabling Access to 4-Substituted-1,2,3-Triazole-Functionalized Particles.

    Science.gov (United States)

    Kennedy, Zachary C; Barrett, Christopher A; Warner, Marvin G

    2017-03-21

    Azides on the periphery of nanodiamond materials (ND) are of great utility because they have been shown to undergo Cu-catalyzed and Cu-free cycloaddition reactions with structurally diverse alkynes, affording particles tailored for applications in biology and materials science. However, current methods employed to access ND featuring azide groups typically require either harsh pretreatment procedures or multiple synthesis steps and use surface linking groups that may be susceptible to undesirable cleavage. Here we demonstrate an alternative single-step approach to producing linker-free, azide-functionalized ND. Our method was applied to low-cost, detonation-derived ND powders where surface carbonyl groups undergo silver-mediated decarboxylation and radical substitution with azide. ND with directly grafted azide groups were then treated with a variety of aliphatic, aromatic, and fluorescent alkynes to afford 1-(ND)-4-substituted-1,2,3-triazole materials under standard copper-catalyzed cycloaddition conditions. Surface modification steps were verified by characteristic infrared absorptions and elemental analyses. High loadings of triazole surface groups (up to 0.85 mmol g -1 ) were obtained as determined from thermogravimetric analysis. The azidation procedure disclosed is envisioned to become a valuable initial transformation in numerous future applications of ND.

  12. Intraosseous access in the military operational setting.

    Science.gov (United States)

    Vassallo, J; Horne, S; Smith, J E

    2014-01-01

    In an operational military environment, circulatory access can prove difficult for a variety of reasons including profound hypovolaemia, and limited first responder experience. With many injuries that cause catastrophic haemorrhage, such as traumatic limb amputations, circulatory access is needed as quickly as possible. Since 2006, the Defence Medical Services have been using the EZ-IO and FAST1 devices as a means of obtaining circulatory access. A prospective observational study was conducted between March and July 2011 at the Emergency Department, Camp Bastion, Afghanistan. All patients with an intraosseous device had data recorded that included if the device successfully flushed (functionality) and if any problems were encountered. 117 patients presented with a total of 195 devices: 149 were EZ-IO (76%) and 46 were FAST1 (24%). Functionality was recorded for 111 (57%), with 17 failing to function, yielding an overall success rate of 84.7%. Device failure was observed to be more prevalent in the humerus; inability to flush the device was the leading cause, followed by mechanical failure. There were 2 complications, device breaking on removal being the reason for both. The devices in the study were tested for a period of time following insertion (median 32 minutes), and still the success rates mirror those found in the literature. Observed differences between sites were not found to be significant with confidence intervals overlapping. Further work is proposed to investigate the long-term complications of intraosseous devices.

  13. Open Access Scholarly Publications as OER

    Directory of Open Access Journals (Sweden)

    Terry Anderson

    2013-06-01

    Full Text Available This paper presents the rationale, common practices, challenges, and some personal anecdotes from a journal editor on the production, use, and re-use of peer-reviewed scholarly articles as open educational resources (OER. The scholarly and professional discourse related to open educational resources has largely focused on open learning objects, courseware, and textbooks. However, especially in graduate education, articles published in scholarly journals are often a major component of the course content in formal education. In addition, open access journal articles are critical to expanding access to knowledge by scholars in the developing world and in fostering citizen science, by which everyone has access to the latest academic information and research results. In this article, I highlight some of the challenges, economic models, and evidence for quality of open access journal content and look at new affordances provided by the Net for enhanced functionality, access, and distribution.In the 17 years since I graduated with a doctorate degree, the climate and acceptance of open access publishing has almost reversed itself. I recall a conversation with my PhD supervisor in which he argued that publishing online was not a viable option as the product would not have permanency, scholarly recognition, or the prestige of a paper publication. His comments reflect the confusion between online resources and those described as open access, but as well illustrate the change in academic acceptance and use of open access products during the past decade. The evolution from paper to online production and consumption is a disruptive technology in which much lower cost and increased accessibility of online work opens the product to a completely new group of potential users. In the case of OER these consumers are primarily students, but certainly access to scholars from all parts of the globe and the availability to support citizen science (Silvertown, 2009

  14. The linked medical data access control framework.

    Science.gov (United States)

    Kamateri, Eleni; Kalampokis, Evangelos; Tambouris, Efthimios; Tarabanis, Konstantinos

    2014-08-01

    The integration of medical data coming from multiple sources is important in clinical research. Amongst others, it enables the discovery of appropriate subjects in patient-oriented research and the identification of innovative results in epidemiological studies. At the same time, the integration of medical data faces significant ethical and legal challenges that impose access constraints. Some of these issues can be addressed by making available aggregated instead of raw record-level data. In many cases however, there is still a need for controlling access even to the resulting aggregated data, e.g., due to data provider's policies. In this paper we present the Linked Medical Data Access Control (LiMDAC) framework that capitalizes on Linked Data technologies to enable controlling access to medical data across distributed sources with diverse access constraints. The LiMDAC framework consists of three Linked Data models, namely the LiMDAC metadata model, the LiMDAC user profile model, and the LiMDAC access policy model. It also includes an architecture that exploits these models. Based on the framework, a proof-of-concept platform is developed and its performance and functionality are evaluated by employing two usage scenarios. Copyright © 2014 Elsevier Inc. All rights reserved.

  15. Access to life’s essentials: office and food

    CERN Multimedia

    Joannah Caborn Wengler

    2012-01-01

    Have you noticed how the queues seem to be getting longer and longer in Restaurant 1 as more and more scientists are coming to work at CERN? GS (General Services) has the solution: a new chip in CERN access cards will allow you to pay automatically at the restaurant.   “We were going to replace the RFID (Radio Frequency Identification) chips currently in use because the manufacturer is phasing them out,” explains Rui Nunes, responsible for access cards at GS, “so we decided to use the opportunity to add some new functionalities.” From 1 April, all new cards that are issued or renewed will have the new DESFire EV1 RFID chip on them, and a machine to charge the cards using banknotes has already been installed between the bank and the kiosk in the main building. It will be fully functional in May, when the tills in Restaurant 1 will also be equipped with the readers for the new cards. “People who would like to replace their old access card and g...

  16. Changes in mu-opioid receptor expression and function in the mesolimbic system after long-term access to a palatable diet.

    Science.gov (United States)

    Pitman, Kimberley A; Borgland, Stephanie L

    2015-10-01

    The incidence of obesity in both adults and children is rising. In order to develop effective treatments for obesity, it is important to understand how diet can induce changes in the brain that could promote excessive intake of high-calorie foods and alter the efficacy of therapeutic targets. The mu-opioid receptor is involved in regulating the motivation for and hedonic reaction to food. Here, we review the literature examining changes in the expression and function of mu-opioid receptors in the mesolimbic system of rodents after extended access to a high-fat diet. We also review how maternal diet can induce long-term changes in the expression or function of mu-opioid receptors in the mesolimbic system of offspring. Understanding the behavioural and therapeutic implications of these changes requires further study. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. Making the library accessible for all a practical guide for librarians

    CERN Document Server

    Vincent, Jane

    2014-01-01

    Accessibility is becoming an issue that libraries can no longer ignore. Making the Library Accessible for All provides a holistic guide to accessibility that addresses common issues and gives strategies for responding to unique situations. This book is a single-source guide relevant to all library functions that librarians can easily refer to when planning, remediating, or evaluating for accessibility. It has a unique holistic perspective, as well as an emphasis on perceiving people with disabilities as providing resources to meet a common goal rather than as a population to be "served."

  18. Access Control Management for SCADA Systems

    Science.gov (United States)

    Hong, Seng-Phil; Ahn, Gail-Joon; Xu, Wenjuan

    The information technology revolution has transformed all aspects of our society including critical infrastructures and led a significant shift from their old and disparate business models based on proprietary and legacy environments to more open and consolidated ones. Supervisory Control and Data Acquisition (SCADA) systems have been widely used not only for industrial processes but also for some experimental facilities. Due to the nature of open environments, managing SCADA systems should meet various security requirements since system administrators need to deal with a large number of entities and functions involved in critical infrastructures. In this paper, we identify necessary access control requirements in SCADA systems and articulate access control policies for the simulated SCADA systems. We also attempt to analyze and realize those requirements and policies in the context of role-based access control that is suitable for simplifying administrative tasks in large scale enterprises.

  19. Poly-functional porous-organic polymers to access functionality – CO 2 sorption energetic relationships

    KAUST Repository

    Alkordi, Mohamed H.; Haikal, Rana R.; Hassan, Youssef S.; Emwas, Abdul-Hamid M.; Belmabkhout, Youssef

    2015-01-01

    Herein, we report a facile approach towards the construction of poly-functional porous organic polymers (POPs). The functional groups employed were selected to span the range of Lewis-base to neutral to Lewis-acid character. Our results underline the effect of chemical functionality on the observed Q for CO adsorption inside the material, being largest for functional groups with electron donating O- and N-centered Lewis base sites. Our systematic investigation within a family of POPs revealed a wide range for CO heat of adsorption (23.8-53.8 kJ mol) that is clearly associated with the chemical nature of the functional groups present. In addition, post-synthetic modification of POPs reported herein demonstrated a facile pathway to dramatically enhance carbon dioxide uptake energetics.

  20. Poly-functional porous-organic polymers to access functionality – CO 2 sorption energetic relationships

    KAUST Repository

    Alkordi, Mohamed H.

    2015-09-21

    Herein, we report a facile approach towards the construction of poly-functional porous organic polymers (POPs). The functional groups employed were selected to span the range of Lewis-base to neutral to Lewis-acid character. Our results underline the effect of chemical functionality on the observed Q for CO adsorption inside the material, being largest for functional groups with electron donating O- and N-centered Lewis base sites. Our systematic investigation within a family of POPs revealed a wide range for CO heat of adsorption (23.8-53.8 kJ mol) that is clearly associated with the chemical nature of the functional groups present. In addition, post-synthetic modification of POPs reported herein demonstrated a facile pathway to dramatically enhance carbon dioxide uptake energetics.

  1. GeneDig: a web application for accessing genomic and bioinformatics knowledge.

    Science.gov (United States)

    Suciu, Radu M; Aydin, Emir; Chen, Brian E

    2015-02-28

    With the exponential increase and widespread availability of genomic, transcriptomic, and proteomic data, accessing these '-omics' data is becoming increasingly difficult. The current resources for accessing and analyzing these data have been created to perform highly specific functions intended for specialists, and thus typically emphasize functionality over user experience. We have developed a web-based application, GeneDig.org, that allows any general user access to genomic information with ease and efficiency. GeneDig allows for searching and browsing genes and genomes, while a dynamic navigator displays genomic, RNA, and protein information simultaneously for co-navigation. We demonstrate that our application allows more than five times faster and efficient access to genomic information than any currently available methods. We have developed GeneDig as a platform for bioinformatics integration focused on usability as its central design. This platform will introduce genomic navigation to broader audiences while aiding the bioinformatics analyses performed in everyday biology research.

  2. Access Request Trustworthiness in Weighted Access Control Framework

    Institute of Scientific and Technical Information of China (English)

    WANG Lun-wei; LIAO Xiang-ke; WANG Huai-min

    2005-01-01

    Weighted factor is given to access control policies to express the importance of policy and its effect on access control decision. According to this weighted access control framework, a trustworthiness model for access request is also given. In this model, we give the measure of trustworthiness factor to access request, by using some idea of uncertainty reasoning of expert system, present and prove the parallel propagation formula of request trustworthiness factor among multiple policies, and get the final trustworthiness factor to decide whether authorizing. In this model, authorization decision is given according to the calculation of request trustworthiness factor, which is more understandable, more suitable for real requirement and more powerful for security enhancement than traditional methods. Meanwhile the finer access control granularity is another advantage.

  3. Accessing VA Healthcare During Large-Scale Natural Disasters.

    Science.gov (United States)

    Der-Martirosian, Claudia; Pinnock, Laura; Dobalian, Aram

    2017-01-01

    Natural disasters can lead to the closure of medical facilities including the Veterans Affairs (VA), thus impacting access to healthcare for U.S. military veteran VA users. We examined the characteristics of VA patients who reported having difficulty accessing care if their usual source of VA care was closed because of natural disasters. A total of 2,264 veteran VA users living in the U.S. northeast region participated in a 2015 cross-sectional representative survey. The study used VA administrative data in a complex stratified survey design with a multimode approach. A total of 36% of veteran VA users reported having difficulty accessing care elsewhere, negatively impacting the functionally impaired and lower income VA patients.

  4. Random Access to Grammar-Compressed Strings

    DEFF Research Database (Denmark)

    Bille, Philip; Landau, Gad M.; Raman, Rajeev

    2011-01-01

    (n) is the inverse of the kth row of Ackermann's function. Our representations also efficiently support decompression of any substring in S: we can decompress any substring of length m in the same complexity as a single random access query and ad- ditional O(m) time. Combining these results with fast algorithms...

  5. Application of functional analysis methods to assess human-dog interactions.

    Science.gov (United States)

    Feuerbacher, Erica N; Wynne, Clive D L

    2016-12-01

    Research on owner-dog relationships suggests that they have remarkable features, paralleling those of infant to parents. In this study, we investigated whether, after being separated, access to the owner would function as a reinforcer for domestic dog behavior. We then conducted a functional analysis to determine the specific functional reinforcer (e.g., owner access, attention). Our results demonstrate that owner access can function as a reinforcer. This has implications for understanding the owner-dog relationship and using owner access as a training tool. © 2016 Society for the Experimental Analysis of Behavior.

  6. Ready access to functionally embellished cis-hydrindanes and cis-decalins: protecting group-free total syntheses of (±)-Nootkatone and (±)-Noreremophilane.

    Science.gov (United States)

    Handore, Kishor L; Seetharamsingh, B; Reddy, D Srinivasa

    2013-08-16

    A simple and efficient synthesis of functionalized cis-hydrindanes and cis-decalins was achieved using a sequential Diels-Alder/aldol approach in a highly diastereoselective manner. The scope of this method was tested with a variety of substrates and was successfully applied to the synthesis of two natural products in racemic form. The highlights of the present work provide ready access to 13 new cis-hydrindanes/cis-decalins, a protecting group-free total synthesis of an insect repellent Nootkatone, and the first synthesis of a Noreremophilane using the shortest sequence.

  7. A System to Generate SignWriting for Video Tracks Enhancing Accessibility of Deaf People

    Directory of Open Access Journals (Sweden)

    Elena Verdú

    2017-12-01

    Full Text Available Video content has increased much on the Internet during last years. In spite of the efforts of different organizations and governments to increase the accessibility of websites, most multimedia content on the Internet is not accessible. This paper describes a system that contributes to make multimedia content more accessible on the Web, by automatically translating subtitles in oral language to SignWriting, a way of writing Sign Language. This system extends the functionality of a general web platform that can provide accessible web content for different needs. This platform has a core component that automatically converts any web page to a web page compliant with level AA of WAI guidelines. Around this core component, different adapters complete the conversion according to the needs of specific users. One adapter is the Deaf People Accessibility Adapter, which provides accessible web content for the Deaf, based on SignWritting. Functionality of this adapter has been extended with the video subtitle translator system. A first prototype of this system has been tested through different methods including usability and accessibility tests and results show that this tool can enhance the accessibility of video content available on the Web for Deaf people.

  8. Fosterage and Access to Schooling in Savelugu-Nanton, Ghana. CREATE Pathways to Access. Research Monograph No. 59

    Science.gov (United States)

    Rolleston, Caine

    2011-01-01

    Fosterage is an important cultural institution which serves to strengthen kinship solidarity among a range of other functions including meeting needs for child labour. Its effects on education are ambiguous. This study examines fostering as a possible contributor to the low levels of educational access and progress in the district using secondary…

  9. Asymptotic performance modelling of DCF protocol with prioritized channel access

    Science.gov (United States)

    Choi, Woo-Yong

    2017-11-01

    Recently, the modification of the DCF (Distributed Coordination Function) protocol by the prioritized channel access was proposed to resolve the problem that the DCF performance worsens exponentially as more nodes exist in IEEE 802.11 wireless LANs. In this paper, an asymptotic analytical performance model is presented to analyze the MAC performance of the DCF protocol with the prioritized channel access.

  10. Database theory and SQL practice using Access

    International Nuclear Information System (INIS)

    Kim, Gyeong Min; Lee, Myeong Jin

    2001-01-01

    This book introduces database theory and SQL practice using Access. It is comprised of seven chapters, which give description of understanding database with basic conception and DMBS, understanding relational database with examples of it, building database table and inputting data using access 2000, structured Query Language with introduction, management and making complex query using SQL, command for advanced SQL with understanding conception of join and virtual table, design on database for online bookstore with six steps and building of application with function, structure, component, understanding of the principle, operation and checking programming source for application menu.

  11. Direct Functionalization of an Acid-Terminated Nanodiamond with Azide: Enabling Access to 4-Substituted-1,2,3-Triazole-Functionalized Particles

    International Nuclear Information System (INIS)

    Kennedy, Zachary C.; Barrett, Christopher A.; Warner, Marvin G.

    2017-01-01

    Azides on the periphery of nanodiamond materials (ND) are of great utility because they have been shown to undergo Cu-catalyzed and Cu-free cycloaddition reactions with structurally diverse alkynes, affording particles tailored for applications in biology and materials science. However, current methods employed to access ND featuring azide groups typically require either harsh pretreatment procedures or multiple synthesis steps and use surface linking groups that may be susceptible to undesirable cleavage. Here in this paper we demonstrate an alternative single-step approach to producing linker-free, azide-functionalized ND. Our method was applied to low-cost, detonation-derived ND powders where surface carbonyl groups undergo silver-mediated decarboxylation and radical substitution with azide. ND with directly grafted azide groups were then treated with a variety of aliphatic, aromatic, and fluorescent alkynes to afford 1-(ND)-4-substituted-1,2,3-triazole materials under standard copper-catalyzed cycloaddition conditions. Surface modification steps were verified by characteristic infrared absorptions and elemental analyses. High loadings of triazole surface groups (up to 0.85 mmol g –1 ) were obtained as determined from thermogravimetric analysis. The azidation procedure disclosed is envisioned to become a valuable initial transformation in numerous future applications of ND.

  12. Web accessibility standards and disability: developing critical perspectives on accessibility.

    Science.gov (United States)

    Lewthwaite, Sarah

    2014-01-01

    Currently, dominant web accessibility standards do not respect disability as a complex and culturally contingent interaction; recognizing that disability is a variable, contrary and political power relation, rather than a biological limit. Against this background there is clear scope to broaden the ways in which accessibility standards are understood, developed and applied. Commentary. The values that shape and are shaped by legislation promote universal, statistical and automated approaches to web accessibility. This results in web accessibility standards conveying powerful norms fixing the relationship between technology and disability, irrespective of geographical, social, technological or cultural diversity. Web accessibility standards are designed to enact universal principles; however, they express partial and biopolitical understandings of the relation between disability and technology. These values can be limiting, and potentially counter-productive, for example, for the majority of disabled people in the "Global South" where different contexts constitute different disabilities and different experiences of web access. To create more robust, accessible outcomes for disabled people, research and standards practice should diversify to embrace more interactional accounts of disability in different settings. Implications for Rehabilitation Creating accessible experiences is an essential aspect of rehabilitation. Web standards promote universal accessibility as a property of an online resource or service. This undervalues the importance of the user's intentions, expertize, their context, and the complex social and cultural nature of disability. Standardized, universal approaches to web accessibility may lead to counterproductive outcomes for disabled people whose impairments and circumstances do not meet Western disability and accessibility norms. Accessible experiences for rehabilitation can be enhanced through an additional focus on holistic approaches to

  13. Plants: An International Scientific Open Access Journal to Publish All Facets of Plants, Their Functions and Interactions with the Environment and Other Living Organisms

    Science.gov (United States)

    Fernando, W.G. Dilantha

    2012-01-01

    Plants are one of the two major groups of living organisms that are an essential entity to the function of the biosphere. Plants can be found in all known parts of the earth, in all shapes and sizes. They include the green algae, mosses, ferns, vines, grasses, bushes, herbs, flowering plants and trees. Although some plants are parasitic, most produce their own food through photosynthesis. Most plants initiate from a seed. The importance of plants in the food chain dates back to ancient times. The first humans gathered wild plants for food. As settlements developed, food crops were cultivated, leading to selection of high-yielding cultivated varieties to feed the growing populations. Unlike plants, humans and other animals are unable to manufacture their own food. Therefore, they are dependent, directly or indirectly, on plants. Plants are found in natural ecosystems such as rain forests, and also in agricultural areas and urbanized settings. They are an essential part of our daily lives providing food, clean air, and important ecosystem functions. The study of plants and their function could be considered the most complex of interactions. From the time a seed germinates, it goes through a myriad of physiological processes that can be closely studied using modern tools and molecular biological methods. An open access journal such as Plants will give millions of readers access to that information around the world. PMID:27137635

  14. Comparison of Radial Access, Guided Femoral Access, and Non-Guided Femoral Access Among Women Undergoing Percutaneous Coronary Intervention.

    Science.gov (United States)

    Koshy, Linda M; Aberle, Laura H; Krucoff, Mitchell W; Hess, Connie N; Mazzaferri, Ernest; Jolly, Sanjit S; Jacobs, Alice; Gibson, C Michael; Mehran, Roxana; Gilchrist, Ian C; Rao, Sunil V

    2018-01-01

    This study was conducted to determine the association between radial access, guided femoral access, and non-guided femoral access on postprocedural bleeding and vascular complications after percutaneous coronary intervention (PCI). Bleeding events and major vascular complications after PCI are associated with increased morbidity, mortality, and cost. While the radial approach has been shown to be superior to the femoral approach in reducing bleeding and vascular complications, whether the use of micropuncture, fluoroscopy, or ultrasound mitigates these differences is unknown. We conducted a post hoc analysis of women in the SAFE-PCI for Women trial who underwent PCI and had the access method identified (n = 643). The primary endpoint of postprocedure bleeding or vascular complications occurring within 72 hours or at discharge was adjudicated by an independent clinical events committee and was compared based on three categories of access technique: radial, guided femoral (fluoroscopy, micropuncture, ultrasound), or non-guided femoral (none of the aforementioned). Differences between the groups were determined using multivariate logistic regression using radial access as the reference. Of the PCI population, 330 underwent radial access, 228 underwent guided femoral access, and 85 underwent non-guided femoral access. There was a statistically significant lower incidence of the primary endpoint with radial access vs non-guided femoral access; however, there was no significant difference between radial approach and femoral access guided by fluoroscopy, micropuncture, or ultrasound. This post hoc analysis demonstrates that while radial access is safer than non-guided femoral access, guided femoral access appears to be associated with similar bleeding events or vascular complications as radial access.

  15. Assessment of the accessibility legislation in Spain and its effective application

    Directory of Open Access Journals (Sweden)

    Jesús Hernández-Galán

    2014-10-01

    Full Text Available The existence of legislation on accessibility does not always imply it is enforced effectively. This article aims to answer the following question: Is the existence of accessibility legislation enough to make physical environments truly accessible?This study assesses the current Spanish legislation as well as any existing voluntary regulations in the country. This assessment is done chronologically, so as to show the historical evolution of the accessibility regulations in Spain.In order to determine whether accessibility legislation has been truly effectively enforced, the issue is studied as it affects Spanish municipalities with respect to urban planning, public buildings, public transportation and websites. The conclusion of this study is that the existence of accessibility legislation per se is not enough to ensure its practical application, and ultimately, to render physical environments, products and services accessible to the majority of the population regardless of their functional capabilities.

  16. Accessing and using chemical databases

    DEFF Research Database (Denmark)

    Nikolov, Nikolai Georgiev; Pavlov, Todor; Niemelä, Jay Russell

    2013-01-01

    Computer-based representation of chemicals makes it possible to organize data in chemical databases-collections of chemical structures and associated properties. Databases are widely used wherever efficient processing of chemical information is needed, including search, storage, retrieval......, and dissemination. Structure and functionality of chemical databases are considered. The typical kinds of information found in a chemical database are considered-identification, structural, and associated data. Functionality of chemical databases is presented, with examples of search and access types. More details...... are included about the OASIS database and platform and the Danish (Q)SAR Database online. Various types of chemical database resources are discussed, together with a list of examples....

  17. Converged wireline and wireless signal distribution in optical fiber access networks

    DEFF Research Database (Denmark)

    Prince, Kamau

    This thesis presents results obtained during the course of my doctoral studies into the transport of fixed and wireless signaling over a converged otpical access infrastructure. In the formulation, development and assessment of a converged paradigma for multiple-services delivery via optical access...... networking infrastructure, I have demonstrated increased functionalities with existing optical technologies and commercially available optoelectronic devices. I have developed novel systems for extending the range of optical access systems, and have demonstrated the repurposing of standard digital devices...

  18. Controlling Access to Input/Output Peripheral Devices

    Directory of Open Access Journals (Sweden)

    E. Y. Rodionov

    2010-03-01

    Full Text Available In this paper the author proposes a system that manages information security policy on enterprise. Problems related to managing information security policy on enterprise and access to peripheral devices in computer systems functioning under control of Microsoft Windows NT operating systems are considered.

  19. Broadband Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Broadband Access. Worldwide market for broadband access $30 Billion! Over 200 million broadband subscribers worldwide! Various Competing Broadband access. Digital Subscriber line; Wireless; Optical Fiber.

  20. Green's functions potential fields on surfaces

    CERN Document Server

    Melnikov, Yuri A

    2017-01-01

    This book is comprehensive in its classical mathematical physics presentation, providing the reader with detailed instructions for obtaining Green's functions from scratch. Green's functions is an instrument easily accessible to practitioners who are engaged in design and exploitation of machines and structures in modern engineering practice. To date, there are no books available on the market that are devoted to the Green's function formalism for equations covered in this volume. The reader, with an undergraduate background in applied mathematics, can become an active user of the Green's function approach. For the first time, Green's functions are discussed for a specific class of problems dealing with potential fields induced in thin-wall structures and therefore, the reader will have first-hand access to a novel issue. This Work is accessible to researchers in applied mathematics, mechanics, and relevant disciplines such as engineering, as well as to upper level undergraduates and graduate students.

  1. Authenticated IGMP for Controlling Access to Multicast Distribution Tree

    Science.gov (United States)

    Park, Chang-Seop; Kang, Hyun-Sun

    A receiver access control scheme is proposed to protect the multicast distribution tree from DoS attack induced by unauthorized use of IGMP, by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, a key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP (Content Provider), NSP (Network Service Provider), and group members.

  2. Estimating the intensity of ward admission and its effect on emergency department access block.

    Science.gov (United States)

    Luo, Wei; Cao, Jiguo; Gallagher, Marcus; Wiles, Janet

    2013-07-10

    Emergency department access block is an urgent problem faced by many public hospitals today. When access block occurs, patients in need of acute care cannot access inpatient wards within an optimal time frame. A widely held belief is that access block is the end product of a long causal chain, which involves poor discharge planning, insufficient bed capacity, and inadequate admission intensity to the wards. This paper studies the last link of the causal chain-the effect of admission intensity on access block, using data from a metropolitan hospital in Australia. We applied several modern statistical methods to analyze the data. First, we modeled the admission events as a nonhomogeneous Poisson process and estimated time-varying admission intensity with penalized regression splines. Next, we established a functional linear model to investigate the effect of the time-varying admission intensity on emergency department access block. Finally, we used functional principal component analysis to explore the variation in the daily time-varying admission intensities. The analyses suggest that improving admission practice during off-peak hours may have most impact on reducing the number of ED access blocks. Copyright © 2012 John Wiley & Sons, Ltd.

  3. Molecular accessibility in solvent swelled coals

    Energy Technology Data Exchange (ETDEWEB)

    Kispert, L.D.

    1993-02-01

    An EPR technique developed in this lab is being used to determine the pore size and number distribution changes after swelling the coal samples with various solvents. Stable nitroxide radical spin probes of different sizes, shapes and reactivity are dissolved in an appropriate solvent, the coal sample is added to the resulting solution, stirred over night at elevated temperature, filtered, washed with a non swelling solvent to eliminate any spin probes that are not trapped in the pores and the spin concentration is measured. Comparing these spin probe measurements to DRIFT data have shown that the relative number distribution of acidic functionalities can be accurately predicted by the spin probe method. The spin probe method had also been used to predict the increase in elongated voids in Pittsburgh No. 8 (APCS No. 4) upon swelling with pyridine in agreement with independent SANS data. NMR relaxation data show that it is possible to deduce the pore (accessibility) distribution as a function of size (up to 6 mn). It has also been possible by variable temperature and ENDOR measurements to determine the presence of hydrogen bonding as a function of pore shape and size. The advantage of the EPR method is that it permits molecules of selected shape and size to be used as probes of accessible regions of coal, thus providing information on the importance of molecular shape.

  4. Design of pulse waveform for waveform division multiple access UWB wireless communication system.

    Science.gov (United States)

    Yin, Zhendong; Wang, Zhirui; Liu, Xiaohui; Wu, Zhilu

    2014-01-01

    A new multiple access scheme, Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function, is presented. After studying the correlation properties of different categories of single wavelet functions, the one with the best correlation property will be chosen as the foundation for combined waveform. In the communication system, each user is assigned to different combined orthogonal waveform. Demonstrated by simulation, combined waveform is more suitable than single wavelet function to be a communication medium in WDMA system. Due to the excellent orthogonality, the bit error rate (BER) of multiuser with combined waveforms is so close to that of single user in a synchronous system. That is to say, the multiple access interference (MAI) is almost eliminated. Furthermore, even in an asynchronous system without multiuser detection after matched filters, the result is still pretty ideal and satisfactory by using the third combination mode that will be mentioned in the study.

  5. Considering User's Access Pattern in Multimedia File Systems

    Science.gov (United States)

    Cho, KyoungWoon; Ryu, YeonSeung; Won, Youjip; Koh, Kern

    2002-12-01

    Legacy buffer cache management schemes for multimedia server are grounded at the assumption that the application sequentially accesses the multimedia file. However, user access pattern may not be sequential in some circumstances, for example, in distance learning application, where the user may exploit the VCR-like function(rewind and play) of the system and accesses the particular segments of video repeatedly in the middle of sequential playback. Such a looping reference can cause a significant performance degradation of interval-based caching algorithms. And thus an appropriate buffer cache management scheme is required in order to deliver desirable performance even under the workload that exhibits looping reference behavior. We propose Adaptive Buffer cache Management(ABM) scheme which intelligently adapts to the file access characteristics. For each opened file, ABM applies either the LRU replacement or the interval-based caching depending on the Looping Reference Indicator, which indicates that how strong temporally localized access pattern is. According to our experiment, ABM exhibits better buffer cache miss ratio than interval-based caching or LRU, especially when the workload exhibits not only sequential but also looping reference property.

  6. Two-port access versus four-port access laparoscopic ovarian cystectomy.

    Science.gov (United States)

    Choi, Won-Kyu; Kim, Jang-Kew; Yang, Jung-Bo; Ko, Young-Bok; Nam, Sang-Lyun; Lee, Ki-Hwan

    2014-09-01

    This study was conducted to compare the surgical outcomes between two-port access and four-port access laparoscopic ovarian cystectomy. Four hundred and eighty nine patients who had received two-port access laparoscopic ovarian cystectomy (n=175) and four-port access laparoscopic ovarian cystectomy (n=314) in Chungnam National University Hospital from January 2009 to August 2012 were analyzed retrospectively. The data were compared between the bilaterality of the cysts and cyst diameter of less than 6 cm and 6 cm or more. There were no significant differences in patient's age, parity, body weight, body mass index and history of previous surgery between the two-port and four-port access laparoscopy group. Bilaterality of ovarian cysts was more in fourport access laparoscopy group (13.7% vs. 32.5%, P=0.000). There were no significant differences in operation time, hemoglobin change, hospital stay, adhesiolysis, transfusion, and insertion of hemo-vac between the two-port and four-port access laparoscopy group for size matched compare. However additional analgesics were more in four-port access laparoscopy group for unilateral ovarian cystectomy. Two-port access laparoscopic surgery was feasible and safe for unilateral and bilateral ovarian cystectomy compare with four-port access laparoscopic surgery.

  7. Autonomy and Housing Accessibility Among Powered Mobility Device Users

    Science.gov (United States)

    Brandt, Åse; Lexell, Eva Månsson; Iwarsson, Susanne

    2015-01-01

    OBJECTIVE. To describe environmental barriers, accessibility problems, and powered mobility device (PMD) users’ autonomy indoors and outdoors; to determine the home environmental barriers that generated the most housing accessibility problems indoors, at entrances, and in the close exterior surroundings; and to examine personal factors and environmental components and their association with indoor and outdoor autonomy. METHOD. This cross-sectional study was based on data collected from a sample of 48 PMD users with a spinal cord injury (SCI) using the Impact of Participation and Autonomy and the Housing Enabler instruments. Descriptive statistics and logistic regression were used. RESULTS. More years living with SCI predicted less restriction in autonomy indoors, whereas more functional limitations and accessibility problems related to entrance doors predicted more restriction in autonomy outdoors. CONCLUSION. To enable optimized PMD use, practitioners must pay attention to the relationship between client autonomy and housing accessibility problems. PMID:26356666

  8. Using Direct Sub-Level Entity Access to Improve Nuclear Stockpile Simulation Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Parker, Robert Y. [Brigham Young Univ., Provo, UT (United States)

    1999-08-01

    Direct sub-level entity access is a seldom-used technique in discrete-event simulation modeling that addresses the accessibility of sub-level entity information. The technique has significant advantages over more common, alternative modeling methods--especially where hierarchical entity structures are modeled. As such, direct sub-level entity access is often preferable in modeling nuclear stockpile, life-extension issues, an area to which it has not been previously applied. Current nuclear stockpile, life-extension models were demonstrated to benefit greatly from the advantages of direct sub-level entity access. In specific cases, the application of the technique resulted in models that were up to 10 times faster than functionally equivalent models where alternative techniques were applied. Furthermore, specific implementations of direct sub-level entity access were observed to be more flexible, efficient, functional, and scalable than corresponding implementations using common modeling techniques. Common modeling techniques (''unbatch/batch'' and ''attribute-copying'') proved inefficient and cumbersome in handling many nuclear stockpile modeling complexities, including multiple weapon sites, true defect analysis, and large numbers of weapon and subsystem types. While significant effort was required to enable direct sub-level entity access in the nuclear stockpile simulation models, the enhancements were worth the effort--resulting in more efficient, more capable, and more informative models that effectively addressed the complexities of the nuclear stockpile.

  9. Remote access to mathematical software

    International Nuclear Information System (INIS)

    Dolan, E.; Hovland, P.; More, J.; Norris, B.; Smith, B.

    2001-01-01

    The network-oriented application services paradigm is becoming increasingly common for scientific computing. The popularity of this approach can be attributed to the numerous advantages to both user and developer provided by network-enabled mathematical software. The burden of installing and maintaining complex systems is lifted from the user, while enabling developers to provide frequent updates without disrupting service. Access to software with similar functionality can be unified under the same interface. Remote servers can utilize potentially more powerful computing resources than may be available locally. We discuss some of the application services developed by the Mathematics and Computer Science Division at Argonne National Laboratory, including the Network Enabled Optimization System (NEOS) Server and the Automatic Differentiation of C (ADIC) Server, as well as preliminary work on Web access to the Portable Extensible Toolkit for Scientific Computing (PETSc). We also provide a brief survey of related work

  10. Open access

    NARCIS (Netherlands)

    Valkenburg, P.M.

    2015-01-01

    Open access week Van 19 tot en met 25 oktober 2015 vond wereldwijd de Open Access Week plaats. Tijdens deze week werden er over de hele wereld evenementen georganiseerd waar open access een rol speelt. Ook in Nederland zijn er diverse symposia, workshops en debatten georganiseerd zoals het debat in

  11. Search engines, the new bottleneck for content access

    NARCIS (Netherlands)

    van Eijk, N.; Preissl, B.; Haucap, J.; Curwen, P.

    2009-01-01

    The core function of a search engine is to make content and sources of information easily accessible (although the search results themselves may actually include parts of the underlying information). In an environment with unlimited amounts of information available on open platforms such as the

  12. Open Access @ DTU

    DEFF Research Database (Denmark)

    Ekstrøm, Jeannette

    Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all peer review...... articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access and related topics...... such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc....

  13. Random access with adaptive packet aggregation in LTE/LTE-A.

    Science.gov (United States)

    Zhou, Kaijie; Nikaein, Navid

    While random access presents a promising solution for efficient uplink channel access, the preamble collision rate can significantly increase when massive number of devices simultaneously access the channel. To address this issue and improve the reliability of the random access, an adaptive packet aggregation method is proposed. With the proposed method, a device does not trigger a random access for every single packet. Instead, it starts a random access when the number of aggregated packets reaches a given threshold. This method reduces the packet collision rate at the expense of an extra latency, which is used to accumulate multiple packets into a single transmission unit. Therefore, the tradeoff between packet loss rate and channel access latency has to be carefully selected. We use semi-Markov model to derive the packet loss rate and channel access latency as functions of packet aggregation number. Hence, the optimal amount of aggregated packets can be found, which keeps the loss rate below the desired value while minimizing the access latency. We also apply for the idea of packet aggregation for power saving, where a device aggregates as many packets as possible until the latency constraint is reached. Simulations are carried out to evaluate our methods. We find that the packet loss rate and/or power consumption are significantly reduced with the proposed method.

  14. Pharmaceutical market access in emerging markets: concepts, components, and future.

    Science.gov (United States)

    Kumar, Anuj; Juluru, Karthaveerya; Thimmaraju, Phani Kishore; Reddy, Jayachandra; Patil, Anand

    2014-01-01

    This article intends to consolidate the concepts of pharmaceutical market access and highlight its growing importance in emerging markets. Market access has gained considerable attention worldwide as countries try to contain their escalating healthcare expenditures amidst the global economic slowdown. This has resulted in governments adopting stricter measures for new product approval. Thus, pharmaceutical companies are finding it increasingly difficult to successfully address the specific challenges posed by various government and regulatory agencies and stakeholders. There is an increasing need to establish market access functions, especially in emerging markets, where the complex, dynamic healthcare landscape confounds product approval and uptake. Moreover, emerging markets are the engines of growth today, and, thus, performing in these markets is critical for the majority of pharmaceutical companies. To address the challenges posed by regulatory agencies and diverse stakeholders, a customized market access strategy is the need of the hour. A market access framework with specific tools and tactics will help companies to plan, implement, and monitor stakeholder engagement activities.

  15. Using speech recognition to enhance the Tongue Drive System functionality in computer access.

    Science.gov (United States)

    Huo, Xueliang; Ghovanloo, Maysam

    2011-01-01

    Tongue Drive System (TDS) is a wireless tongue operated assistive technology (AT), which can enable people with severe physical disabilities to access computers and drive powered wheelchairs using their volitional tongue movements. TDS offers six discrete commands, simultaneously available to the users, for pointing and typing as a substitute for mouse and keyboard in computer access, respectively. To enhance the TDS performance in typing, we have added a microphone, an audio codec, and a wireless audio link to its readily available 3-axial magnetic sensor array, and combined it with a commercially available speech recognition software, the Dragon Naturally Speaking, which is regarded as one of the most efficient ways for text entry. Our preliminary evaluations indicate that the combined TDS and speech recognition technologies can provide end users with significantly higher performance than using each technology alone, particularly in completing tasks that require both pointing and text entry, such as web surfing.

  16. Courthouses as Spaces of Recognition, Functionality and Access to Law and Justice: A Portuguese Reflection

    Directory of Open Access Journals (Sweden)

    Patrìcia Branco

    2016-09-01

    Full Text Available One of the most overlooked topics at the level of reflection regarding law and the legal system, has been the courthouse architecture. Architecture organizes and structures space, making it intelligible, understandable, and capable of being interpreted as possible, being that the exterior and interior, as well as materials and objects present therein can facilitate or inhibit our activities through how they mean and represent certain messages. Hence it becomes necessary to make an analysis of the spaces of justice - and here I have in mind the Courthouse as a privileged public space of justice – taking into consideration the circumstances of time, place of jurisdiction, the historical, political, regulatory, and socio-cultural contexts, as well as legal tradition. Thus, and by analyzing the trends (international and national of development of construction and / or adaptation (types of buildings and internal organization, focusing on different infrastructures and accessibility and respective use, including, here, the representations and spatial practices of the real actors (professionals and users, I propose to consider the importance of regarding courthouses as spaces of justice, through the lenses given by the functions of recognition, functionality and access to law and justice. Uno de los temas sobre los que menos se ha reflexionado en el ámbito del derecho y el sistema legal ha sido la arquitectura de los juzgados. La arquitectura organiza y estructura el espacio, haciéndolo inteligible, comprensible y capaz de interpretarlo como algo posible, ya que el exterior y el interior, así como los materiales y objetos presentes, pueden facilitar o inhibir nuestras actividades mediante la forma en que emiten y representan ciertos mensajes. Por lo tanto, es necesario realizar un análisis de los espacios de la Justicia - y aquí se entiende el juzgado como un espacio público privilegiado de la Justicia - teniendo en cuenta las circunstancias de

  17. SMEs, banks and the spatial differentiation of access to finance

    OpenAIRE

    Zhao, T.; Jones-Evans, D.

    2016-01-01

    By utilizing the SME Finance Monitor and a unique dataset on the geographical location of all bank branches in 11 UK economic regions, this paper examines the relevance of spatial differentiation on SMEs’ access to bank finance during the period of economic weakness following the 2007 financial crisis. We find evidence suggesting the presence of a regional-specific effect on SMEs’ access to bank finance. Our findings show that greater functional distance between bank headquarters and branches...

  18. Access Denied! Contrasting Data Access in the United States and Ireland

    Directory of Open Access Journals (Sweden)

    Grogan Samuel

    2016-07-01

    Full Text Available The ability of an Internet user to access data collected about himself as a result of his online activity is a key privacy safeguard. Online, data access has been overshadowed by other protections such as notice and choice. This paper describes attitudes about data access. 873 US and Irish Internet users participated in a survey designed to examine views on data access to information held by online companies and data brokers. We observed low levels of awareness of access mechanisms along with a high desire for access in both participant groups. We tested three proposed access systems in keeping with industry programs and regulatory proposals. User response was positive. We conclude that access remains an important privacy protection that is inadequately manifested in practice. Our study provides insight for lawmakers and policymakers, as well as computer scientists who implement these systems.

  19. Integrity Based Access Control Model for Multilevel XML Document

    Institute of Scientific and Technical Information of China (English)

    HONG Fan; FENG Xue-bin; HUANO Zhi; ZHENG Ming-hui

    2008-01-01

    XML's increasing popularity highlights the security demand for XML documents. A mandatory access control model for XML document is presented on the basis of investigation of the function dependency of XML documents and discussion of the integrity properties of multilevel XML document. Then, the algorithms for decomposition/recovery multilevel XML document into/from single level document are given, and the manipulation rules for typical operations of XQuery and XUpdate: QUERY, INSERT,UPDATE, and REMOVE, are elaborated. The multilevel XML document access model can meet the requirement of sensitive information processing application.

  20. Enhancing Access to and Quality of Basic Education through Head Teachers' Leadership Functions

    Science.gov (United States)

    Oni, J. O.; Jegede, A. A.; Osisami, R. A.; Illo, C. O.; Lawal, R. O.; Fabinu, F. A.

    2016-01-01

    Basic education is the fundamental requirement for idiosyncratic and societal development. The individual child needs to have access to it and acquire it qualitatively. The sum total of all the knowledge attitude, skills and competences that the Nigerian child today acquires have been declared to be on the decline. Every stakeholder: teacher,…

  1. Accessibility and sensory experiences

    DEFF Research Database (Denmark)

    Ryhl, Camilla

    2010-01-01

    and accessibility. Sensory accessibility accommodates aspects of a sensory disability and describes architectural design requirements needed to ensure access to architectural experiences. In the context of architecture accessibility has become a design concept of its own. It is generally described as ensuring...... physical access to the built environment by accommodating physical disabilities. While the existing concept of accessibility ensures the physical access of everyone to a given space, sensory accessibility ensures the choice of everyone to stay and be able to participate and experience....

  2. Evaluation of perception on environmental movement: accessibility centered in the user

    Directory of Open Access Journals (Sweden)

    Éden Fernando Batista Ferreira

    2013-04-01

    Full Text Available Introduction: The discussion about accessibility in urban environments is observed in several studies,but the vast majority focuses attention on structural elements and not the user. Objective: This study proposes a method of assessing urban environmental movement, from the point of view of its users, to identify the relationship between perceived barriers and facilitators in the environment movement and aspects of the body functions and structures and the users’ participation in activities, which denotes the degree of accessibility of these people in this space. Method: It describes a case study in Belem, Para state, utilizing a method of assessing the perception of users, based on indicators of environmental factors, activity and participation, structure and functions of the body, highlighted by the International Classification of Functioning, Disability and Health – ICF. Results:The main finding of this study indicates that people’s perceptions about their environment directly influences the movement involved in their occupations. Conclusion: Studies with this content are relevant and necessary in our current society, because they reveal how changes in major urban centers influence the accessibility and involvement of people in their occupations, thereby directly interfering with their health, quality of life, and participation in society.

  3. Lexical semantic access and letter access are involved in different aspects of reading

    DEFF Research Database (Denmark)

    Poulsen, Mads

    ). In this subset sample, both letter access and lexical access accounted for unique variance in reading fluency. The pattern of effects for lexical access did not change by controlling for serial rapid naming (RAN). Conclusions: The results suggest that letter access and lexical access are important for different......Purpose: This study investigated the effects of lexical access speed and letter access speed on reading fluency and reading comprehension. We hypothesized that 1) letter access speed would correlate with reading fluency but not comprehension, while 2) lexical access speed would influence reading...... comprehension. For readers who are struggling with recoding, most of the reading effort is probably tied up with recoding, leaving little to be explained by lexical access. Therefore we expected that 3) lexical access speed would primarily predict reading fluency for readers who were no longer struggling...

  4. Urban search mobile platform modeling in hindered access conditions

    Science.gov (United States)

    Barankova, I. I.; Mikhailova, U. V.; Kalugina, O. B.; Barankov, V. V.

    2018-05-01

    The article explores the control system simulation and the design of the experimental model of the rescue robot mobile platform. The functional interface, a structural functional diagram of the mobile platform control unit, and a functional control scheme for the mobile platform of secure robot were modeled. The task of design a mobile platform for urban searching in hindered access conditions is realized through the use of a mechanical basis with a chassis and crawler drive, a warning device, human heat sensors and a microcontroller based on Arduino platforms.

  5. File access prediction using neural networks.

    Science.gov (United States)

    Patra, Prashanta Kumar; Sahu, Muktikanta; Mohapatra, Subasish; Samantray, Ronak Kumar

    2010-06-01

    One of the most vexing issues in design of a high-speed computer is the wide gap of access times between the memory and the disk. To solve this problem, static file access predictors have been used. In this paper, we propose dynamic file access predictors using neural networks to significantly improve upon the accuracy, success-per-reference, and effective-success-rate-per-reference by using neural-network-based file access predictor with proper tuning. In particular, we verified that the incorrect prediction has been reduced from 53.11% to 43.63% for the proposed neural network prediction method with a standard configuration than the recent popularity (RP) method. With manual tuning for each trace, we are able to improve upon the misprediction rate and effective-success-rate-per-reference using a standard configuration. Simulations on distributed file system (DFS) traces reveal that exact fit radial basis function (RBF) gives better prediction in high end system whereas multilayer perceptron (MLP) trained with Levenberg-Marquardt (LM) backpropagation outperforms in system having good computational capability. Probabilistic and competitive predictors are the most suitable for work stations having limited resources to deal with and the former predictor is more efficient than the latter for servers having maximum system calls. Finally, we conclude that MLP with LM backpropagation algorithm has better success rate of file prediction than those of simple perceptron, last successor, stable successor, and best k out of m predictors.

  6. Data access and its implementation at Wendelstein 7-X

    Energy Technology Data Exchange (ETDEWEB)

    Bluhm, T. [Max-Planck-Institute fuer Plasmaphysik, Teilinstitut Greifswald, Wendelsteinstr. 1, 17491 Greifswald (Germany)], E-mail: torsten.bluhm@ipp.mpg.de; Heimann, P. [Max-Planck-Institute fuer Plasmaphysik, Boltzmannstr. 2, 85748 Garching (Germany); Hennig, Ch. [Max-Planck-Institute fuer Plasmaphysik, Teilinstitut Greifswald, Wendelsteinstr. 1, 17491 Greifswald (Germany); Kroiss, H. [Max-Planck-Institute fuer Plasmaphysik, Boltzmannstr. 2, 85748 Garching (Germany); Kuehner, G. [Max-Planck-Institute fuer Plasmaphysik, Teilinstitut Greifswald, Wendelsteinstr. 1, 17491 Greifswald (Germany); Maier, J. [Max-Planck-Institute fuer Plasmaphysik, Boltzmannstr. 2, 85748 Garching (Germany); Riemann, H. [Max-Planck-Institute fuer Plasmaphysik, Teilinstitut Greifswald, Wendelsteinstr. 1, 17491 Greifswald (Germany); Zilker, M. [Max-Planck-Institute fuer Plasmaphysik, Boltzmannstr. 2, 85748 Garching (Germany)

    2008-04-15

    The increasing number of data acquisition stations and setups in laboratory environments at Wendelstein 7-X does already produce a considerable amount of data by now. Diagnosticians want to view the acquired data in a comfortable way and use them for calculations in their own test and analysis algorithms. To prepare for full operation of W7-X, a reasonable approach is to provide data access methods that stay as close as possible to the final data access concept. This requires taking care of the special needs of W7-X regarding continuously acquired data, segment based parameter switching and synchronization of data from different diagnostics. Therefore, a data access interface has been designed and implemented considering continuous data acquisition as well as usability and performance issues. The interface and its usage in different software environments (e.g. high level scientific programming languages) will be explained. Also, the integration of user defined off line analysis algorithms will be described. Additionally, the DataBrowser will be presented. The DataBrowser is a Java application that can browse continuously acquired data of different kind, provides several types of plots including zooming functions to display the data and the corresponding parameters and offers export functions to save selected data locally.

  7. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  8. Public Access and Open Access: Is There a Difference? | Poster

    Science.gov (United States)

    By Robin Meckley, Contributing Writer, and Tracie Frederick, Guest Writer Open access and public access—are they different concepts or are they the same? What do they mean for the researchers at NCI at Frederick? “Open-access (OA) literature is digital, online, free of charge, and free of most copyright and licensing restrictions. What makes it possible is the Internet and the consent of the author or copyright-holder,” according to an open access website maintained by Peter Suber, director, Harvard Open Access Project.

  9. Moving toward a universally accessible web: Web accessibility and education.

    Science.gov (United States)

    Kurt, Serhat

    2017-12-08

    The World Wide Web is an extremely powerful source of information, inspiration, ideas, and opportunities. As such, it has become an integral part of daily life for a great majority of people. Yet, for a significant number of others, the internet offers only limited value due to the existence of barriers which make accessing the Web difficult, if not impossible. This article illustrates some of the reasons that achieving equality of access to the online world of education is so critical, explores the current status of Web accessibility, discusses evaluative tools and methods that can help identify accessibility issues in educational websites, and provides practical recommendations and guidelines for resolving some of the obstacles that currently hinder the achievability of the goal of universal Web access.

  10. A Pilot Randomized Controlled Trial of the ACCESS Program: A Group Intervention to Improve Social, Adaptive Functioning, Stress Coping, and Self-Determination Outcomes in Young Adults with Autism Spectrum Disorder

    Science.gov (United States)

    Oswald, Tasha M.; Winder-Patel, Breanna; Ruder, Steven; Xing, Guibo; Stahmer, Aubyn; Solomon, Marjorie

    2018-01-01

    The purpose of this pilot randomized controlled trial was to investigate the acceptability and efficacy of the Acquiring Career, Coping, Executive control, Social Skills (ACCESS) Program, a group intervention tailored for young adults with autism spectrum disorder (ASD) to enhance critical skills and beliefs that promote adult functioning,…

  11. Access Customized Forms

    OpenAIRE

    Cosma Emil; Jeflea Victor

    2010-01-01

    By using Word, Excel or PowerPoint one can automate routine operations using the VBA language (Visual Basic for Applications). This language is also used in Access, allowing access to data stored in tables or queries. Thus, Access and VBA resources can be used together. Access is designed for programming forms and reports (among other things), so there won’t be found any of the VBA editor’s specific forms.

  12. Measuring and Comparing Hospital Accessibility for Palm Beach County's Elderly and Nonelderly Populations During a Hurricane.

    Science.gov (United States)

    Prasad, Shivangi

    2017-09-18

    To determine whether, during a hurricane, geographic accessibility to hospitals with emergency care is compromised disproportionately for the elderly than for the nonelderly. The locations of hospitals with emergency health care and a subset of those hospitals functional during a hurricane were compared with the distribution of the elderly population at the block group level in Palm Beach County, Florida. Geographic Information Systems (GIS) proximity analysis (minimum distance to closest hospital) and cumulative distribution functions were used to measure and compare hospital accessibility during normal and hurricane conditions for the elderly and nonelderly populations. Accessibility to closest functional hospital during a hurricane was compromised disproportionately for the elderly. Geographic accessibility to emergency health care is compromised disproportionately for the elderly in Palm Beach County. Compounding the risk is the likelihood of the elderly experiencing a greater health care need during a hurricane. This poses a community public health crisis and calls for effective and collaborative planning between health professionals and disaster planners to address the health care needs of the elderly. (Disaster Med Public Health Preparedness. 2017;page 1 of 5).

  13. Design and Implementation of a Library and Information Science Open Access Journal Union Catalogue System

    Directory of Open Access Journals (Sweden)

    Sinn-Cheng Lin

    2017-03-01

    Full Text Available Open access is a mode of academic communication that has been on the rise in recent years, but open access academic resources are widely dispersed across the internet, making it occasionally inconvenient in terms of its use. This research is focused on library and information science, using the OAIS reference model as the system framework, two open access platform, DOAJ and E-LIS as the data sources, and through system implementation develop a “library and information science open access journal union catalogue” system. Using the OAI-PMH protocol as the data interoperability standard, and LAMP as the development environment, four major functionalities: injest, archiving, management and access of information were designed, developed, and integrated into system build. Actual testing and verification showed this system is able to successfully collect data from DOAJ and E-LIS open journal resources related to library and information science. The system is now active and functional, and can be used by researchers in the library and science information field.

  14. Open access

    CERN Document Server

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder consent, and many authors, musicians, filmmakers, and other creators who depend on royalties are understandably unwilling to give their consent. But for 350 years, scholars have written peer-reviewed journal articles for impact, not for money, and are free to consent to open access without losing revenue. In this concise introduction, Peter Suber tells us what open access is and isn't, how it benefits authors and readers of research, how we pay for it, how it avoids copyright problems, how it has moved from the periphery to the mainstream, and what its future may hold. Distilling a decade of Suber's influential writing and thinking about open access, this is the indispe...

  15. BIODIVERSITY OF NATIONAL SQUASH CULTIVAR ACCESSIONS

    Directory of Open Access Journals (Sweden)

    A. F. Bukharov

    2017-01-01

    Full Text Available The squash is one of  the most  ancient plants, bearing numerous qualities. The squash gave high yield and is unpretentious plant, the fruit of which is long-stored and can be used as boiled, stewed, baked, fried product, and be added to bread, mush and pudding, and be prepared as puree, jam, candied fruit and other meals. Owing to useful characteristics the squash is a valuable source or raw  material for  food  canning  industry,  for  health-care and functional foodstuff production. Its best cultivar accessions contain to 30% of dry matter, to 12% of sugars  and  to  36%  of  carotene.  The  species  of  squash includes 4 subspecies and 20 varieties. One accession that came from Spain in 1937 served as an initial breeding accession for many other table cultivars for long time. For 80 years of national breeding program the many cultivars for  table  use have been released. There are the classic cultivars, such as ‘Mramornaya’, ‘Stolovaya Zimnaya’,  Gribovskaya Zimnaya’,  ‘Donskaya  Sladkaya’, ‘Michurinskaya’ that are selected or developed from first Spanish accession. This richness and originality of cultivar squash accessions should be carefully preserved. There are the new generation cultivars, such as ‘Kroshka’, ‘Malishka’,    ‘Rossiyanka’,    ‘Konfetka’,    ‘Moskvichka’, ‘Vnuchka’ and many others, which are short-tendrils and suitable for  modern  mechanized cultivation  technology. Moreover the development of new cultivars, bearing resistance to biotic and abiotic stress is the main goal of nearest breeding program.

  16. EntrezAJAX: direct web browser access to the Entrez Programming Utilities

    Directory of Open Access Journals (Sweden)

    Pallen Mark J

    2010-06-01

    Full Text Available Abstract Web applications for biology and medicine often need to integrate data from Entrez services provided by the National Center for Biotechnology Information. However, direct access to Entrez from a web browser is not possible due to 'same-origin' security restrictions. The use of "Asynchronous JavaScript and XML" (AJAX to create rich, interactive web applications is now commonplace. The ability to access Entrez via AJAX would be advantageous in the creation of integrated biomedical web resources. We describe EntrezAJAX, which provides access to Entrez eUtils and is able to circumvent same-origin browser restrictions. EntrezAJAX is easily implemented by JavaScript developers and provides identical functionality as Entrez eUtils as well as enhanced functionality to ease development. We provide easy-to-understand developer examples written in JavaScript to illustrate potential uses of this service. For the purposes of speed, reliability and scalability, EntrezAJAX has been deployed on Google App Engine, a freely available cloud service. The EntrezAJAX webpage is located at http://entrezajax.appspot.com/

  17. From spatial to social accessibility: How socio-economic factors can affect accessibility?

    OpenAIRE

    Mercier , Aurélie

    2016-01-01

    The concept of accessibility cannot only focus on " spatial accessibility " measurement but has to integer a " social accessibility " level to take into account individual inequalities and socioeconomic disparities to access to urban opportunities. In this context, this contribution focuses on socioeconomic disparities integration on accessibility measurement, considering the Lyon case study. The paper is divided into three parts The first part aims to present a method for integrating the soc...

  18. Accessibility

    DEFF Research Database (Denmark)

    Brooks, Anthony Lewis

    2017-01-01

    This contribution is timely as it addresses accessibility in regards system hardware and software aligned with introduction of the Twenty-First Century Communications and Video Accessibility Act (CVAA) and adjoined game industry waiver that comes into force January 2017. This is an act created...... by the USA Federal Communications Commission (FCC) to increase the access of persons with disabilities to modern communications, and for other purposes. The act impacts advanced communications services and products including text messaging; e-mail; instant messaging; video communications; browsers; game...... platforms; and games software. However, the CVAA has no legal status in the EU. This text succinctly introduces and questions implications, impact, and wider adoption. By presenting the full CVAA and game industry waiver the text targets to motivate discussions and further publications on the subject...

  19. 75 FR 47304 - Accessible Mobile Phone Options for People Who Are Blind, Deaf-Blind, or Have Low Vision

    Science.gov (United States)

    2010-08-05

    ... FEDERAL COMMUNICATIONS COMMISSION [CG Docket No. 10-145; DA 10-1324] Accessible Mobile Phone... phone features and functions in the current marketplace that are not accessible for people who are blind... wireless phones--particularly among less expensive or moderately-priced handset models--that are accessible...

  20. Interoperable Access to NCAR Research Data Archive Collections

    Science.gov (United States)

    Schuster, D.; Ji, Z.; Worley, S. J.; Manross, K.

    2014-12-01

    The National Center for Atmospheric Research (NCAR) Research Data Archive (RDA) provides free access to 600+ observational and gridded dataset collections. The RDA is designed to support atmospheric and related sciences research, updated frequently where datasets have ongoing production, and serves data to 10,000 unique users annually. The traditional data access options include web-based direct archive file downloads, user selected data subsets and format conversions produced by server-side computations, and client and cURL-based APIs for routine scripted data retrieval. To enhance user experience and utility, the RDA now also offers THREDDS Data Server (TDS) access for many highly valued dataset collections. TDS offered datasets are presented as aggregations, enabling users to access an entire dataset collection, that can be comprised of 1000's of files, through a single virtual file. The OPeNDAP protocol, supported by the TDS, allows compatible tools to open and access these virtual files remotely, and make the native data file format transparent to the end user. The combined functionality (TDS/OPeNDAP) gives users the ability to browse, select, visualize, and download data from a complete dataset collection without having to transfer archive files to a local host. This presentation will review the TDS basics and describe the specific TDS implementation on the RDA's diverse archive of GRIB-1, GRIB-2, and gridded NetCDF formatted dataset collections. Potential future TDS implementation on in-situ observational dataset collections will be discussed. Illustrative sample cases will be used to highlight the end users benefits from this interoperable data access to the RDA.

  1. Selectively bred crossed high-alcohol-preferring mice drink to intoxication and develop functional tolerance, but not locomotor sensitization during free-choice ethanol access.

    Science.gov (United States)

    Matson, Liana M; Kasten, Chelsea R; Boehm, Stephen L; Grahame, Nicholas J

    2014-01-01

    Crossed high-alcohol-preferring (cHAP) mice were selectively bred from a cross of the HAP1 × HAP2 replicate lines and demonstrate blood ethanol concentrations (BECs) during free-choice drinking reminiscent of those observed in alcohol-dependent humans. In this report, we investigated the relationship between free-choice drinking, intoxication, tolerance, and sensitization in cHAP mice. We hypothesized that initially mice would become ataxic after drinking alcohol, but that increased drinking over days would be accompanied by increasing tolerance to the ataxic effects of ethanol (EtOH). Male and female cHAP mice had free-choice access to 10% EtOH and water (E), while Water mice (W) had access to water alone. In experiment 1, the first drinking experience was monitored during the dark portion of the cycle. Once E mice reached an average intake rate of ≥1.5 g/kg/h, they, along with W mice, were tested for footslips on a balance beam, and BECs were assessed. In experiments 2, 3, and 4, after varying durations of free-choice 10% EtOH access (0, 3, 14, or 21 days), mice were challenged with 20% EtOH and tested for number of footslips on a balance beam or locomotor stimulant response. Blood was sampled for BEC determination. We found that cHAP mice rapidly acquire alcohol intakes that lead to ataxia. Over time, cHAP mice developed behavioral tolerance to the ataxic effects of alcohol, paralleled by escalating alcohol consumption. However, locomotor sensitization did not develop following 14 days of free-choice EtOH access. Overall, we observed increases in free-choice drinking with extended alcohol access paralleled by increases in functional tolerance, but not locomotor sensitization. These data support our hypothesis that escalating free-choice drinking over days in cHAP mice is driven by tolerance to alcohol's behavioral effects. These data are the first to demonstrate that escalating free-choice consumption is accompanied by increasing alcohol tolerance. In

  2. Morphology, production, and chemical content performance of black rice Matesih accession with several comparisons

    Science.gov (United States)

    Nandariyah; Purwanto, E.; Meidini, A. N.

    2018-03-01

    Rice (Oryza sativa L.) is an important food crop in Indonesia. In Matesih area, Karanganyar, recently found new varieties of black rice cultured by local farmers which morphology and chemical content have not yet identified. The purpose of this research was to obtain information of morphology, production, and chemical content of black rice matesih accession and to compare the appearance in order to detect the superiority of black rice matesih accession with the comparison of other accession of black rice. There were four accessions of black rice tested, namely Matesih Accession, Klaten Accession, Toraja, and Cempo. Research data were divided into qualitative data which processed by scoring, and quantitative data are processed with simple descriptive statistic. The kinship test was done by using NTSYSpc program with SIMQual and SIMInt function. The observation of qualitative properties indicates that accession matesih has a form that is relatively similar to other accessions. Qualitatively, accession matesih superior at leaf length, leaf width, plant height and culm diameter. Klaten accession has higher production than accession matesih. Matesih accession has the advantage of having shorter period on heading time and harvest time than other accessions. Matesih accession has the highest amylose content, lower protein content than klaten accession and lower content of anthocyanin than toraja accession. The kinship analysis showed that matesih accession and klaten accession has close kinship.

  3. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  4. A System to Generate SignWriting for Video Tracks Enhancing Accessibility of Deaf People

    OpenAIRE

    Elena Verdú; Cristina Pelayo G-Bustelo; Ángeles Martínez Sánchez; Rubén Gonzalez-Crespo

    2017-01-01

    Video content has increased much on the Internet during last years. In spite of the efforts of different organizations and governments to increase the accessibility of websites, most multimedia content on the Internet is not accessible. This paper describes a system that contributes to make multimedia content more accessible on the Web, by automatically translating subtitles in oral language to Sign Writing, a way of writing Sign Language. This system extends the functionality of a general we...

  5. The shipper as the architect of contractual relations in access to natural gas networks

    International Nuclear Information System (INIS)

    Codognet, Marc-Kevin

    2005-01-01

    Transportation and contractual arrangements are in the kernel of the natural gas reform in Europe. Since third party can access to pipelines, those who wish to ship gas between two locations of a gas network have to arrange transportation services. Natural gas transportation is a set of contractual arrangements and has become a complex contracting process. This paper aims at analyzing the typical economic functions of shippers in third-party access regimes in the natural gas industry in a transaction costs approach. Shippers provide and combine intermediation functions in transportation services markets: information management, matching, bundling and transactions guarantees. In this context, the shipper has appeared as a particular market intermediary specialized in transportation arrangements in the new regime of third party access in the natural gas industry. (Author)

  6. Web services interface to EPICS channel access

    Institute of Scientific and Technical Information of China (English)

    DUAN Lei; SHEN Liren

    2008-01-01

    Web services is used in Experimental Physics and Industrial Control System (EPICS). Combined with EPICS Channel Access protocol, Web services' high usability, platform independence and language independence can be used to design a fully transparent and uniform software interface layer, which helps us complete channel data acquisition, modification and monitoring functions. This software interface layer, a cross-platform of cross-language,has good interopcrability and reusability.

  7. Web services interface to EPICS channel access

    International Nuclear Information System (INIS)

    Duan Lei; Shen Liren

    2008-01-01

    Web services is used in Experimental Physics and Industrial Control System (EPICS). Combined with EPICS Channel Access protocol, Web services high usability, platform independence and language independence can be used to design a fully transparent and uniform software interface layer, which helps us complete channel data acquisition, modification and monitoring functions. This software interface layer, a cross-platform of cross-language, has good interoperability and reusability. (authors)

  8. Demystifying Open Access

    International Nuclear Information System (INIS)

    Mele, Salvatore

    2007-01-01

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  9. A Qualitative Study of Barriers to Accessing Water, Sanitation and Hygiene for Disabled People in Malawi.

    Science.gov (United States)

    White, Sian; Kuper, Hannah; Itimu-Phiri, Ambumulire; Holm, Rochelle; Biran, Adam

    2016-01-01

    Globally, millions of people lack access to improved water, sanitation and hygiene (WASH). Disabled people, disadvantaged both physically and socially, are likely to be among those facing the greatest inequities in WASH access. This study explores the WASH priorities of disabled people and uses the social model of disability and the World Health Organization's International Classification of Functioning, Disability and Health (ICF) framework to look at the relationships between impairments, contextual factors and barriers to WASH access. 36 disabled people and 15 carers from urban and rural Malawi were purposively selected through key informants. The study employed a range of qualitative methods including interviews, emotion mapping, free-listing of priorities, ranking, photo voice, observation and WASH demonstrations. A thematic analysis was conducted using nVivo 10. WASH access affected all participants and comprised almost a third of the challenges of daily living identified by disabled people. Participants reported 50 barriers which related to water and sanitation access, personal and hand hygiene, social attitudes and participation in WASH programs. No two individuals reported facing the same set of barriers. This study found that being female, being from an urban area and having limited wealth and education were likely to increase the number and intensity of the barriers faced by an individual. The social model proved useful for classifying the majority of barriers. However, this model was weaker when applied to individuals who were more seriously disabled by their body function. This study found that body function limitations such as incontinence, pain and an inability to communicate WASH needs are in and of themselves significant barriers to adequate WASH access. Understanding these access barriers is important for the WASH sector at a time when there is a global push for equitable access.

  10. Unified Access Architecture for Large-Scale Scientific Datasets

    Science.gov (United States)

    Karna, Risav

    2014-05-01

    Data-intensive sciences have to deploy diverse large scale database technologies for data analytics as scientists have now been dealing with much larger volume than ever before. While array databases have bridged many gaps between the needs of data-intensive research fields and DBMS technologies (Zhang 2011), invocation of other big data tools accompanying these databases is still manual and separate the database management's interface. We identify this as an architectural challenge that will increasingly complicate the user's work flow owing to the growing number of useful but isolated and niche database tools. Such use of data analysis tools in effect leaves the burden on the user's end to synchronize the results from other data manipulation analysis tools with the database management system. To this end, we propose a unified access interface for using big data tools within large scale scientific array database using the database queries themselves to embed foreign routines belonging to the big data tools. Such an invocation of foreign data manipulation routines inside a query into a database can be made possible through a user-defined function (UDF). UDFs that allow such levels of freedom as to call modules from another language and interface back and forth between the query body and the side-loaded functions would be needed for this purpose. For the purpose of this research we attempt coupling of four widely used tools Hadoop (hadoop1), Matlab (matlab1), R (r1) and ScaLAPACK (scalapack1) with UDF feature of rasdaman (Baumann 98), an array-based data manager, for investigating this concept. The native array data model used by an array-based data manager provides compact data storage and high performance operations on ordered data such as spatial data, temporal data, and matrix-based data for linear algebra operations (scidbusr1). Performances issues arising due to coupling of tools with different paradigms, niche functionalities, separate processes and output

  11. Access To The PMM's Pixel Database

    Science.gov (United States)

    Monet, D.; Levine, S.

    1999-12-01

    The U.S. Naval Observatory Flagstaff Station is in the process of enabling access to the Precision Measuring Machine (PMM) program's pixel database. The initial release will include the pixels from the PMM's scans of the Palomar Observatory Sky Survey I (POSS-I) -O and -E surveys, the Whiteoak Extension, the European Southern Observatory-R survey, the Science and Engineering Council-J, -EJ, and -ER surveys, and the Anglo- Australian Observatory-R survey. (The SERC-ER and AAO-R surveys are currently incomplete.) As time allows, access to the POSS-II -J, -F, and -N surveys, the Palomar Infrared Milky Way Atlas, the Yale/San Juan Southern Proper Motion survey, and plates rejected by various surveys will be added. (POSS-II -J and -F are complete, but -N was never finished.) Eventually, some 10 Tbytes of pixel data will be available. Due to funding and technology limitations, the initial interface will have only limited functionality, and access time will be slow since the archive is stored on Digital Linear Tape (DLT). Usage of the pixel data will be restricted to non-commercial, scientific applications, and agreements on copyright issues have yet to be finalized. The poster presentation will give the URL.

  12. Turkish-German Access to Higher Education: An Historical and Democratic Theory Analysis, 1960-2010

    Science.gov (United States)

    Gonzalez, Roger Geertz

    2012-01-01

    This article looks at access to higher education in Germany. For a number of reasons, explained in this article, higher education is presently an elite system that privileges ethnic Germans while preventing Turkish-Germans from gaining sufficient access into academe. If Germany is to become a fully functioning multicultural democracy with equal…

  13. Overview: Routes to Open Access

    OpenAIRE

    Tullney, Marco; van Wezenbeek, Wilma

    2017-01-01

    Slides of an overview presentation given at a CESAER workshop on Open Access, February 2nd, 2017, in Brussels Cover major routes to more open access as discussed in the Task Force Open Science of CESAER: (national) open access strategies open access mandates open access incentives open access awareness open access publishing open access infrastructure

  14. Functional Magnetic Resonance Imaging

    Science.gov (United States)

    Voos, Avery; Pelphrey, Kevin

    2013-01-01

    Functional magnetic resonance imaging (fMRI), with its excellent spatial resolution and ability to visualize networks of neuroanatomical structures involved in complex information processing, has become the dominant technique for the study of brain function and its development. The accessibility of in-vivo pediatric brain-imaging techniques…

  15. Accessing Electronic Journals.

    Science.gov (United States)

    McKay, Sharon Cline

    1999-01-01

    Discusses issues librarians need to consider when providing access to electronic journals. Topics include gateways; index and abstract services; validation and pay-per-view; title selection; integration with OPACs (online public access catalogs)or Web sites; paper availability; ownership versus access; usage restrictions; and services offered…

  16. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  17. Random Access to Grammar-Compressed Strings and Trees

    DEFF Research Database (Denmark)

    Bille, Philip; Landau, Gad M.; Raman, Rajeev

    2015-01-01

    representations of S achieving O(log N) random access time, and either O(n · αk(n)) construction time and space on the pointer machine model, or O(n) construction time and space on the RAM. Here, αk(n) is the inverse of the kth row of Ackermann's function. Our representations also efficiently support...

  18. Accessing memory

    Science.gov (United States)

    Yoon, Doe Hyun; Muralimanohar, Naveen; Chang, Jichuan; Ranganthan, Parthasarathy

    2017-09-26

    A disclosed example method involves performing simultaneous data accesses on at least first and second independently selectable logical sub-ranks to access first data via a wide internal data bus in a memory device. The memory device includes a translation buffer chip, memory chips in independently selectable logical sub-ranks, a narrow external data bus to connect the translation buffer chip to a memory controller, and the wide internal data bus between the translation buffer chip and the memory chips. A data access is performed on only the first independently selectable logical sub-rank to access second data via the wide internal data bus. The example method also involves locating a first portion of the first data, a second portion of the first data, and the second data on the narrow external data bus during separate data transfers.

  19. Functional EIAO DW, R2.2

    DEFF Research Database (Denmark)

    Thomsen, Christian; Pedersen, Torben Bach; Frøkjær, Jens

    In this document, the functional specification and architecture for the EIAO DW is presented. EIAO DW is a data warehouse that holds results from the European Internet Accessibility Observatory (EIAO) project. These results are mainly on the accessibility to disabled users of web resources...

  20. Gender Barriers to Access to Antiretroviral Therapy and its Link to ...

    African Journals Online (AJOL)

    Gender Barriers to Access to Antiretroviral Therapy and its Link to ... to assess executive function, verbal fluency, working memory, learning memory, recall, ... there were no gender differences in performance in the neuropsychological testing.

  1. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  2. Transparency of Biobank Access in Canada: An Assessment of Industry Access and the Availability of Information on Access Policies and Resulting Research.

    Science.gov (United States)

    Gibson, Shannon G; Axler, Renata E; Lemmens, Trudo

    2017-12-01

    A key issue impacting public trust in biobanks is how these resources are utilized, including who is given access to biobank data and samples. To assess the conditions under which researchers are given access to Canadian biobanks, we reviewed websites and contacted Canadian biobanks to determine the availability of information on access policies and procedures; research resulting from access biobank data and samples; and conditions on private industry access to biobanks. We also conducted expert interviews with key Canadian stakeholders ( n = 11) to obtain their perspectives on biobank transparency and access policies. Among 21 Canadian biobanks, there was wide variation in the access information made publicly available, and the majority of these allowed access by industry applicants. Biobanks should be governed by the principles of transparency, accountability, and accessibility, and attention must be given to the conditions around the commercialization of biobank-based research.

  3. Peripheral Venous Access Ports: Outcomes Analysis in 109 Patients

    International Nuclear Information System (INIS)

    Bodner, Leonard J.; Nosher, John L.; Patel, Kaushik M.; Siegel, Randall L.; Biswal, Rajiv; Gribbin, Christopher E.; Tokarz, Robert

    2000-01-01

    Purpose: To perform a retrospective outcomes analysis of central venous catheters with peripheral venous access ports, with comparison to published data.Methods: One hundred and twelve central venous catheters with peripherally placed access ports were placed under sonographic guidance in 109 patients over a 4-year period. Ports were placed for the administration of chemotherapy, hyperalimentation, long-term antibiotic therapy, gamma-globulin therapy, and frequent blood sampling. A vein in the upper arm was accessed in each case and the catheter was passed to the superior vena cava or right atrium. Povidone iodine skin preparation was used in the first 65 port insertions. A combination of Iodophor solution and povidone iodine solution was used in the last 47 port insertions. Forty patients received low-dose (1 mg) warfarin sodium beginning the day after port insertion. Three patients received higher doses of warfarin sodium for preexistent venous thrombosis. Catheter performance and complications were assessed and compared with published data.Results: Access into the basilic or brachial veins was obtained in all cases. Ports remained functional for a total of 28,936 patient days. The port functioned in 50% of patients until completion of therapy, or the patient's expiration. Ports were removed prior to completion of therapy in 18% of patients. Eleven patients (9.9% of ports placed) suffered an infectious complication (0.38 per thousand catheter-days)-in nine, at the port implantation site, in two along the catheter. In all 11 instances the port was removed. Port pocket infection in the early postoperative period occurred in three patients (4.7%) receiving a Betadine prep vs two patients (4.2%) receiving a standard O.R. prep. This difference was not statistically significant (p = 0.9). Venous thrombosis occurred in three patients (6.8%) receiving warfarin sodium and in two patients (3%) not receiving warfarin sodium. This difference was not statistically significant

  4. Professional Access 2013 programming

    CERN Document Server

    Hennig, Teresa; Hepworth, George; Yudovich, Dagi (Doug)

    2013-01-01

    Authoritative and comprehensive coverage for building Access 2013 Solutions Access, the most popular database system in the world, just opened a new frontier in the Cloud. Access 2013 provides significant new features for building robust line-of-business solutions for web, client and integrated environments.  This book was written by a team of Microsoft Access MVPs, with consulting and editing by Access experts, MVPs and members of the Microsoft Access team. It gives you the information and examples to expand your areas of expertise and immediately start to develop and upgrade projects. Exp

  5. Access 2010 Programmer's Reference

    CERN Document Server

    Hennig, Teresa; Griffith, Geoffrey L

    2010-01-01

    A comprehensive guide to programming for Access 2010 and 2007. Millions of people use the Access database applications, and hundreds of thousands of developers work with Access daily. Access 2010 brings better integration with SQL Server and enhanced XML support; this Wrox guide shows developers how to take advantage of these and other improvements. With in-depth coverage of VBA, macros, and other programming methods for building Access applications, this book also provides real-world code examples to demonstrate each topic.: Access is the leading database that is used worldwide; While VBA rem

  6. JISC Open Access Briefing Paper

    OpenAIRE

    Swan, Alma

    2005-01-01

    What Open Access is. What Open Access is not. How is Open Access provided? Open Access archives or repositories. Open Access journals. Why should authors provide Open Access to their work? Further information and resources

  7. A Comparison of Functional Behavioral Assessment and Functional Analysis Methodology among Students with Mild Disabilities

    Science.gov (United States)

    Lewis, Timothy J.; Mitchell, Barbara S.; Harvey, Kristin; Green, Ambra; McKenzie, Jennifer

    2015-01-01

    Functional behavioral assessment (FBA) and functional analyses (FA) are grounded in the applied behavior analysis principle that posits problem behavior is functionally related to the environment in which it occurs and is maintained by either providing access to reinforcing outcomes or allowing the individual to avoid or escape that which they…

  8. A PRELIMINARY STUDY FOR DEVELOPING ACCESSIBLE MOOC SERVICES

    Directory of Open Access Journals (Sweden)

    Francisco Iniesto

    2016-11-01

    Full Text Available The flexibility of the MOOC service allows students to learn at their own time, place and pace, enhancing continuous communication and interaction between all participants in knowledge and community building. This model especially benefits people with disabilities, which can improve therefore their level of employability and social inclusion, reaching a better quality of life. Unfortunately the access to MOOC platforms present severe barriers: there is a lack of accessibility on the learning resources, the communicating tools and personalized user interfaces. All these issues add extra difficulties such as the need to develop specific digital or even social skills for students with functional diversity. In this context, MOOCs are leading a revolutionary computer and mobile-based scenario along with social technologies that will emerge new kinds of learning applications that enhance communication and collaboration processes. For that reason, this paper describes the need for designing an information model and related specifications to support a new strategy for delivering accessible MOOC courses to learners with special needs, in terms of their preferences and context of use based on a particular application profile. This user profile’s design is based on standard metadata schemas, data that provides information about other data, regarding the achievement of accessibility from content to user preferences.

  9. Access 2013 bible

    CERN Document Server

    Alexander, Michael

    2013-01-01

    A comprehensive reference to the updated and new features of Access 2013 As the world's most popular database management tool, Access enables you to organize, present, analyze, and share data as well as build powerful database solutions. However, databases can be complex. That's why you need the expert guidance in this comprehensive reference. Access 2013 Bible helps you gain a solid understanding of database purpose, construction, and application so that whether you're new to Access or looking to upgrade to the 2013 version, this well-rounded resource provides you with a th

  10. The conscious access hypothesis: Explaining the consciousness

    OpenAIRE

    Prakash, Ravi

    2008-01-01

    The phenomenon of conscious awareness or consciousness is complicated but fascinating. Although this concept has intrigued the mankind since antiquity, exploration of consciousness from scientific perspectives is not very old. Among myriad of theories regarding nature, functions and mechanism of consciousness, off late, cognitive theories have received wider acceptance. One of the most exciting hypotheses in recent times has been the ?conscious access hypotheses? based on the ?global workspac...

  11. Pediatric vascular access

    International Nuclear Information System (INIS)

    Donaldson, James S.

    2006-01-01

    Pediatric interventional radiologists are ideally suited to provide vascular access services to children because of inherent safety advantages and higher success from using image-guided techniques. The performance of vascular access procedures has become routine at many adult interventional radiology practices, but this service is not as widely developed at pediatric institutions. Although interventional radiologists at some children's hospitals offer full-service vascular access, there is little or none at others. Developing and maintaining a pediatric vascular access service is a challenge. Interventionalists skilled in performing such procedures are limited at pediatric institutions, and institutional support from clerical staff, nursing staff, and technologists might not be sufficiently available to fulfill the needs of such a service. There must also be a strong commitment by all members of the team to support such a demanding service. There is a slippery slope of expected services that becomes steeper and steeper as the vascular access service grows. This review is intended primarily as general education for pediatric radiologists learning vascular access techniques. Additionally, the pediatric or adult interventional radiologist seeking to expand services might find helpful tips. The article also provides education for the diagnostic radiologist who routinely interprets radiographs containing vascular access devices. (orig.)

  12. Report: Improvements Needed in CSB’s Identity and Access Management and Incident Response Security Functions

    Science.gov (United States)

    Report #18-P-0030, October 30, 2017. Weaknesses in the Identity and Access Management and Incident Response metric domains leave the CSB vulnerable to attacks occurring and not being detected in a timely manner.

  13. MAST's Integrated Data Access Management system: IDAM

    International Nuclear Information System (INIS)

    Muir, D.G.; Appel, L.; Conway, N.J.; Kirk, A.; Martin, R.; Meyer, H.; Storrs, J.; Taylor, D.; Thomas-Davies, N.; Waterhouse, J.

    2008-01-01

    A new Integrated Data Access Management system, IDAM, has been created to address specific data management issues of the MAST spherical Tokamak. For example, this system enables access to numerous file formats, both legacy and modern (IDA, Ufile, netCDF, HDF5, MDSPlus, PPF, JPF). It adds data quality values at the signal level, and automatically corrects for problems in data: in timings, calibrations, and labelling. It also builds new signals from signal components. The IDAM data server uses a hybrid XML-relational database to record how data are accessed, whether locally or remotely, and how alias and generic signal names are mapped to true names. Also, XML documents are used to encode the details of data corrections, as well as definitions of composite signals and error models. The simple, user friendly, API and accessor function library, written in C on Linux, is available for applications in C, C++, IDL and Fortran-90/95/2003 with good performance: a MAST plasma current trace (28 kbytes of data), requested using a generic name and with data corrections applied, is delivered over a 100 Mbit/s network in ∼13 ms

  14. Phenomenal and access consciousness in olfaction.

    Science.gov (United States)

    Stevenson, Richard J

    2009-12-01

    Contemporary literature on consciousness, with some exceptions, rarely considers the olfactory system. In this article the characteristics of olfactory consciousness, viewed from the standpoint of the phenomenal (P)/access (A) distinction, are examined relative to the major senses. The review details several qualitative differences in both olfactory P consciousness (shifts in the felt location, universal synesthesia-like and affect-rich experiences, and misperceptions) and A consciousness (recovery from habituation, capacity for conscious processing, access to semantic and episodic memory, learning, attention, and in the serial-unitary nature of olfactory percepts). The basis for these differences is argued to arise from the functions that the olfactory system performs and from the unique neural architecture needed to instantiate them. These data suggest, at a minimum, that P and A consciousness are uniquely configured in olfaction and an argument can be made that the P and A distinction may not hold for this sensory system.

  15. Designing User Manuals for the Online Public Access Catalog.

    Science.gov (United States)

    Seiden, Peggy; Sullivan, Patricia

    1986-01-01

    Describes the process of developing and revising a brochure to guide library patrons in conducting an author search on an online public access catalog in order to demonstrate the application of four steps in production of a functional document--analysis; planning; development; evaluation, testing, and revision. Three sources are given. (EJS)

  16. Molecular accessibility in solvent swelled coals. Quarterly report

    Energy Technology Data Exchange (ETDEWEB)

    Kispert, L.D.

    1993-02-01

    An EPR technique developed in this lab is being used to determine the pore size and number distribution changes after swelling the coal samples with various solvents. Stable nitroxide radical spin probes of different sizes, shapes and reactivity are dissolved in an appropriate solvent, the coal sample is added to the resulting solution, stirred over night at elevated temperature, filtered, washed with a non swelling solvent to eliminate any spin probes that are not trapped in the pores and the spin concentration is measured. Comparing these spin probe measurements to DRIFT data have shown that the relative number distribution of acidic functionalities can be accurately predicted by the spin probe method. The spin probe method had also been used to predict the increase in elongated voids in Pittsburgh No. 8 (APCS No. 4) upon swelling with pyridine in agreement with independent SANS data. NMR relaxation data show that it is possible to deduce the pore (accessibility) distribution as a function of size (up to 6 mn). It has also been possible by variable temperature and ENDOR measurements to determine the presence of hydrogen bonding as a function of pore shape and size. The advantage of the EPR method is that it permits molecules of selected shape and size to be used as probes of accessible regions of coal, thus providing information on the importance of molecular shape.

  17. 18 CFR 358.5 - Independent functioning rule.

    Science.gov (United States)

    2010-04-01

    ... its marketing function employees. (b) Separation of functions. (1) A transmission provider is prohibited from permitting its marketing function employees to: (i) Conduct transmission functions; or (ii... differs in any way from the access available to other transmission customers. (2) A transmission provider...

  18. Open Orchestration Cloud Radio Access Network (OOCRAN) Testbed

    OpenAIRE

    Floriach-Pigem, Marti; Xercavins-Torregrosa, Guillem; Marojevic, Vuk; Gelonch-Bosch, Antoni

    2017-01-01

    The Cloud radio access network (C-RAN) offers a revolutionary approach to cellular network deployment, management and evolution. Advances in software-defined radio (SDR) and networking technology, moreover, enable delivering software-defined everything through the Cloud. Resources will be pooled and dynamically allocated leveraging abstraction, virtualization, and consolidation techniques; processes will be automated using common application programming interfaces; and network functions and s...

  19. Medium Access Control Protocols for Cognitive Radio Ad Hoc Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Mahdi Zareei

    2017-09-01

    Full Text Available New wireless network paradigms will demand higher spectrum use and availability to cope with emerging data-hungry devices. Traditional static spectrum allocation policies cause spectrum scarcity, and new paradigms such as Cognitive Radio (CR and new protocols and techniques need to be developed in order to have efficient spectrum usage. Medium Access Control (MAC protocols are accountable for recognizing free spectrum, scheduling available resources and coordinating the coexistence of heterogeneous systems and users. This paper provides an ample review of the state-of-the-art MAC protocols, which mainly focuses on Cognitive Radio Ad Hoc Networks (CRAHN. First, a description of the cognitive radio fundamental functions is presented. Next, MAC protocols are divided into three groups, which are based on their channel access mechanism, namely time-slotted protocol, random access protocol and hybrid protocol. In each group, a detailed and comprehensive explanation of the latest MAC protocols is presented, as well as the pros and cons of each protocol. A discussion on future challenges for CRAHN MAC protocols is included with a comparison of the protocols from a functional perspective.

  20. Using the structure-function linkage database to characterize functional domains in enzymes.

    Science.gov (United States)

    Brown, Shoshana; Babbitt, Patricia

    2014-12-12

    The Structure-Function Linkage Database (SFLD; http://sfld.rbvi.ucsf.edu/) is a Web-accessible database designed to link enzyme sequence, structure, and functional information. This unit describes the protocols by which a user may query the database to predict the function of uncharacterized enzymes and to correct misannotated functional assignments. The information in this unit is especially useful in helping a user discriminate functional capabilities of a sequence that is only distantly related to characterized sequences in publicly available databases. Copyright © 2014 John Wiley & Sons, Inc.

  1. Surveillance of Hemodialysis Vascular Access with Ultrasound Vector Flow Imaging

    DEFF Research Database (Denmark)

    Brandt, Andreas Hjelm; Olesen, Jacob Bjerring; Lindskov Hansen, Kristoffer

    2015-01-01

    -functioning vascular access with as few complications as possible and preferred vascular access is an AVF. Dysfunction due to stenosis is a common complication, and regular monitoring of volume flow is recommended to preserve AVF patency. UDT is considered the gold standard for volume flow surveillance, but VFI has...... proven to be more precise, when performing single repeated instantaneous measurements. Three patients with AVF were monitored with UDT and VFI monthly for five months. A commercial ultrasound scanner with a 9 MHz linear array transducer with integrated VFI was used to obtain data. UDT values were...... be used for surveillance of volume flow....

  2. Open access

    African Journals Online (AJOL)

    Prof. Dennis Ocholla

    The argument that access to information is an instrumental and individual as well as ... and Dean School of Information Studies, University of Wisconsin, Milwaukee, USA. ... to scholarly publications and can be in any digital format, including text, movies and ... language barriers, censorship, lack of access to the Internet and ...

  3. Reduction of Equipment Access Time through Cyber Plant Navigation

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Jang Soo; Goo, Ja Sung; Kim, Yong Yi [Korea Hydro and Nuclera Power Co., Daejeon (Korea, Republic of)

    2012-05-15

    Safe and effective on-the-job training at a nuclear power plant has been gaining its importance in South Korea and in the UAE. As a solution to this, a cyber plant has been developed based on 3D model design data. It allows its users to access equipment and components in a virtual reality without risks or danger of potential radiation exposure and also increases their familiarity with NPP structures. Equipped with navigation functions similar to those of the applications installed in automobiles and smart phones, this application displays the shortest route to reach the target equipment and predicts estimated access time and radiation exposure dose. This application has contributed to the reduction of equipment access time, and therefore has facilitated early response to abnormal conditions, reduced radiation exposure dose, and maximized the effects of OJT at nuclear power plants. This paper will look at the realization of the cyber plant, the operations of the cyber plant, and how cyber plant applications can be applied further

  4. Reduction of Equipment Access Time through Cyber Plant Navigation

    International Nuclear Information System (INIS)

    Suh, Jang Soo; Goo, Ja Sung; Kim, Yong Yi

    2012-01-01

    Safe and effective on-the-job training at a nuclear power plant has been gaining its importance in South Korea and in the UAE. As a solution to this, a cyber plant has been developed based on 3D model design data. It allows its users to access equipment and components in a virtual reality without risks or danger of potential radiation exposure and also increases their familiarity with NPP structures. Equipped with navigation functions similar to those of the applications installed in automobiles and smart phones, this application displays the shortest route to reach the target equipment and predicts estimated access time and radiation exposure dose. This application has contributed to the reduction of equipment access time, and therefore has facilitated early response to abnormal conditions, reduced radiation exposure dose, and maximized the effects of OJT at nuclear power plants. This paper will look at the realization of the cyber plant, the operations of the cyber plant, and how cyber plant applications can be applied further

  5. Perceptions of the first family physicians to adopt advanced access in the province of Quebec, Canada.

    Science.gov (United States)

    Breton, Mylaine; Maillet, Lara; Paré, Isabelle; Abou Malham, Sabina; Touati, Nassera

    2017-10-01

    In Quebec, several primary care physicians have made the transition to the advanced access model to address the crisis of limited access to primary care. The objectives are to describe the implementation of the advanced access model, as perceived by the first family physicians; to analyze the factors influencing the implementation of its principles; and to document the physicians' perceptions of its effects on their practice, colleagues and patients. Qualitative methods were used to explore, through semi-structured interviews, the experiences of 21 family physicians who had made the transition to advanced access. Of the 21 physicians, 16 succeeded in adopting all five advanced access principles to varying degrees. Core implementation issues revolved around the dynamics of collaboration between physicians, nurses and other colleagues. Secretaries' functions, in particular, had to be expanded. Facilitating factors were mainly related to the physicians' leadership and the professional resources available in the organizations. Impediments related to resource availability and team functioning were also encountered. This is the first exploratory study to examine the factors influencing the adoption of the advanced access model conducted with early-adopter family physicians. The lessons drawn will inform discussions on scaling up to other settings experiencing the same problems. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  6. Access 2013 for dummies

    CERN Document Server

    Ulrich Fuller, Laurie

    2013-01-01

    The easy guide to Microsoft Access returns with updates on the latest version! Microsoft Access allows you to store, organize, view, analyze, and share data; the new Access 2013 release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. Access 2013 For Dummies covers all the new features of the latest version of Accessand serves as an ideal reference, combining the latest Access features with the basics of building usable databases. You'll learn how to create an app from the Welcome screen, get support

  7. Pro Access 2010 Development

    CERN Document Server

    Collins, Mark

    2011-01-01

    Pro Access 2010 Development is a fundamental resource for developing business applications that take advantage of the features of Access 2010 and the many sources of data available to your business. In this book, you'll learn how to build database applications, create Web-based databases, develop macros and Visual Basic for Applications (VBA) tools for Access applications, integrate Access with SharePoint and other business systems, and much more. Using a practical, hands-on approach, this book will take you through all the facets of developing Access-based solutions, such as data modeling, co

  8. Functionalized silica materials for electrocatalysis

    Indian Academy of Sciences (India)

    To increase the efficiency of the electrocatalytic process and to increase the electrochemical accessibility of the immobilized electrocatalysts, functionalized and non-functionalized mesoporous organo-silica (MCM41-type-materials) are used in this study. These materials possess several suitable properties to be durable ...

  9. Learning Task Knowledge from Dialog and Web Access

    Directory of Open Access Journals (Sweden)

    Vittorio Perera

    2015-06-01

    Full Text Available We present KnoWDiaL, an approach for Learning and using task-relevant Knowledge from human-robot Dialog and access to the Web. KnoWDiaL assumes that there is an autonomous agent that performs tasks, as requested by humans through speech. The agent needs to “understand” the request, (i.e., to fully ground the task until it can proceed to plan for and execute it. KnoWDiaL contributes such understanding by using and updating a Knowledge Base, by dialoguing with the user, and by accessing the web. We believe that KnoWDiaL, as we present it, can be applied to general autonomous agents. However, we focus on our work with our autonomous collaborative robot, CoBot, which executes service tasks in a building, moving around and transporting objects between locations. Hence, the knowledge acquired and accessed consists of groundings of language to robot actions, and building locations, persons, and objects. KnoWDiaL handles the interpretation of voice commands, is robust regarding speech recognition errors, and is able to learn commands involving referring expressions in an open domain, (i.e., without requiring a lexicon. We present in detail the multiple components of KnoWDiaL, namely a frame-semantic parser, a probabilistic grounding model, a web-based predicate evaluator, a dialog manager, and the weighted predicate-based Knowledge Base. We illustrate the knowledge access and updates from the dialog and Web access, through detailed and complete examples. We further evaluate the correctness of the predicate instances learned into the Knowledge Base, and show the increase in dialog efficiency as a function of the number of interactions. We have extensively and successfully used KnoWDiaL in CoBot dialoguing and accessing the Web, and extract a few corresponding example sequences from captured videos.

  10. Parallel Access of Out-Of-Core Dense Extendible Arrays

    Energy Technology Data Exchange (ETDEWEB)

    Otoo, Ekow J; Rotem, Doron

    2007-07-26

    Datasets used in scientific and engineering applications are often modeled as dense multi-dimensional arrays. For very large datasets, the corresponding array models are typically stored out-of-core as array files. The array elements are mapped onto linear consecutive locations that correspond to the linear ordering of the multi-dimensional indices. Two conventional mappings used are the row-major order and the column-major order of multi-dimensional arrays. Such conventional mappings of dense array files highly limit the performance of applications and the extendibility of the dataset. Firstly, an array file that is organized in say row-major order causes applications that subsequently access the data in column-major order, to have abysmal performance. Secondly, any subsequent expansion of the array file is limited to only one dimension. Expansions of such out-of-core conventional arrays along arbitrary dimensions, require storage reorganization that can be very expensive. Wepresent a solution for storing out-of-core dense extendible arrays that resolve the two limitations. The method uses a mapping function F*(), together with information maintained in axial vectors, to compute the linear address of an extendible array element when passed its k-dimensional index. We also give the inverse function, F-1*() for deriving the k-dimensional index when given the linear address. We show how the mapping function, in combination with MPI-IO and a parallel file system, allows for the growth of the extendible array without reorganization and no significant performance degradation of applications accessing elements in any desired order. We give methods for reading and writing sub-arrays into and out of parallel applications that run on a cluster of workstations. The axial-vectors are replicated and maintained in each node that accesses sub-array elements.

  11. Data access performance through parallelization and vectored access. Some results

    International Nuclear Information System (INIS)

    Furano, F; Hanushevsky, A

    2008-01-01

    High Energy Physics data processing and analysis applications typically deal with the problem of accessing and processing data at high speed. Recent studies, development and test work have shown that the latencies due to data access can often be hidden by parallelizing them with the data processing, thus giving the ability to have applications which process remote data with a high level of efficiency. Techniques and algorithms able to reach this result have been implemented in the client side of the Scalla/xrootd system, and in this contribution we describe the results of some tests done in order to compare their performance and characteristics. These techniques, if used together with multiple streams data access, can also be effective in allowing to efficiently and transparently deal with data repositories accessible via a Wide Area Network

  12. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  13. Evaluation of the Tellabs 1150 GPON multiservice access platform

    Energy Technology Data Exchange (ETDEWEB)

    Brenkosh, Joseph Peter [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Wolf, Jimmie V. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-11-01

    For over two years, Sandia National Laboratories has been using a Gigabit Passive Optical Network (GPON) access layer for selected networks. The GPON equipment includes the Tellabs 1150 Multiservice Access Platform (MSAP) Optical Line Terminal (OLT), the Tellabs ONT709 and ONT709GP Optical Network Terminals (ONTs), and the Panorama PON Network Manager. In late 2013, the Tellabs equipment was updated to Software Release FP27.1_015130. Because a new software release has the potential to affect performance and functionality, it needed to be thoroughly tested. This report documents that testing. It also provides a comparison between the current release and the previous Software Release FP25.5.1_013274 that was being used.

  14. Cilostazol May Improve Maturation Rates and Durability of Vascular Access for Hemodialysis.

    Science.gov (United States)

    Russell, Todd E; Kasper, Gregory C; Seiwert, Andrew J; Comerota, Anthony J; Lurie, Fedor

    2017-04-01

    Cilostazol is effective in controlling pathophysiological pathways similar or identical to those involved in nonmaturation and failure of the arteriovenous access. This case-control study examined whether cilostazol would improve maturation rates and durability of vascular access for hemodialysis. The treatment group included 33 patients who received cilostazol for ≥30 days prior to creation of a dialysis access and continued with cilostazol therapy for ≥60 days after surgery. The matched (gender, age, race, diabetes, and the year of surgery) control group included 116 patients who underwent the same procedure but did not receive cilostazol prior to and at least 3 months after surgery. Primary outcomes were maturation and, for those that matured, time of functioning access, defined as the time from the first use to irreparable failure of the access. Secondary outcomes were time to maturation, complications, and time to first complication. Study group patients were 3.8 times more likely to experience fistula maturation compared to the controls (88% vs 66%, RR = 3.8, 95% confidence interval: 1.3-11.6, P = .016). Fewer patients in the study group had complications (76% vs 92%, P = .025), and the time from construction of the fistula to the first complication was longer (345.6 ± 441 days vs 198.3 ± 185.0 days, P = .025). Time to maturation was similar in both groups (119.3 ± 62.9 days vs 100.2 ± 61.7 days, P = .2). However, once matured, time to failure was significantly longer in the treatment group (903.7 ± 543.6 vs 381.6 ± 317.2 days, P = .001). Multivariate analysis confirmed that the likelihood of maturation was significantly higher in the treatment group patients. These results suggest that dialysis access patients may benefit from preoperative and postoperative cilostazol therapy. If confirmed by a randomized trial, this treatment will have a major beneficial impact on patients dependent on a well-functioning access for their hemodialysis.

  15. Towards an HTTP Ecosystem for HEP Data Access

    International Nuclear Information System (INIS)

    Furano, Fabrizio; Devresse, Adrien; Keeble, Oliver; Hellmich, Martin; Ayllón, Alejandro Álvarez

    2014-01-01

    In this contribution we present a vision for the use of the HTTP protocol for data access and data management in the context of HEP. The evolution of the DPM/LFC software stacks towards a modern framework that can be plugged into Apache servers triggered various initiatives that successfully demonstrated the use of HTTP-based protocols for data access, federation and transfer. This includes the evolution of the FTS3 system towards being able to manage third-party transfers using HTTP. Given the flexibility of the methods, the feature set may also include a subset of the SRM functionality that is relevant to disk systems. The application domain for such an ecosystem of services goes from large scale, Gridlike computing to the data access from laptops, profiting from tools that are shared with the Web community, like browsers, clients libraries and others. Particular focus was put into emphasizing the flexibility of the frameworks, which can interface with a very broad range of components, data stores, catalogues and metadata stores, including the possibility of building high performance dynamic federations of endpoints that build on the fly the feeling of a unique, seamless very efficient system. The overall goal is to leverage standards and standard practices, and use them to provide the higher level functionalities that are needed to fulfil the complex problem of Data Access in HEP. Other points of interest are about harmonizing the possibilities given by the HTTP/WebDAV protocols with existing frameworks like ROOT and already existing Storage Federations based on the XROOTD framework. We also provide quantitative evaluations of the performance that is achievable using HTTP for remote transfer and remote I/O in the context of HEP data. The idea is to contribute the parts that can make possible an ecosystem of services and applications, where the HEP-related features are covered, and the door is open to standard solutions and tools provided by third parties, in the

  16. Empirical model for the Earth's cosmic ray shadow at 400 KM: prohibited cosmic ray access

    International Nuclear Information System (INIS)

    Humble, J.E.; Smart, D.F.; Shea, M.A.

    1985-01-01

    The possibility of constructing a unit sphere of access that describes the cosmic radiation allowed to an Earth-orbiting spacecraft is discussed. It is found that it is possible to model the occluded portion of the cosmic ray sphere of access as a circular projection with a diameter bounded by the satellite-Earth horizon. Maintaining tangency at the eastern edge of the spacecraft-Earth horizon, this optically occluded area is projected downward by an angle beta which is a function of the magnetic field inclination and cosmic ray arrival direction. This projected plane, corresponding to the forbidden area of cosmic ray access, is bounded by the spacecraft-Earth horizon in easterly directions, and is rotated around the vertical axis by an angle alpha from the eastern direction, where the angle alpha is a function of the offset dipole latitude of the spacecraft

  17. Open Access

    Science.gov (United States)

    Suber, Peter

    2012-01-01

    The Internet lets us share perfect copies of our work with a worldwide audience at virtually no cost. We take advantage of this revolutionary opportunity when we make our work "open access": digital, online, free of charge, and free of most copyright and licensing restrictions. Open access is made possible by the Internet and copyright-holder…

  18. Migrants' access to healthcare

    DEFF Research Database (Denmark)

    Norredam, Marie

    2011-01-01

    There are strong pragmatic and moral reasons for receiving societies to address access to healthcare for migrants. Receiving societies have a pragmatic interest in sustaining migrants' health to facilitate integration; they also have a moral obligation to ensure migrants' access to healthcare...... according to international human rights principles. The intention of this thesis is to increase the understanding of migrants' access to healthcare by exploring two study aims: 1) Are there differences in migrants' access to healthcare compared to that of non-migrants? (substudy I and II); and 2) Why...... are there possible differences in migrants' access to healthcare compared to that of non-migrants? (substudy III and IV). The thesis builds on different methodological approaches using both register-based retrospective cohort design, cross-sectional design and survey methods. Two different measures of access were...

  19. Secure Access Control and Authority Delegation Based on Capability and Context Awareness for Federated IoT

    DEFF Research Database (Denmark)

    Anggorojati, Bayu; Mahalle, Parikshit N.; Prasad, Neeli R.

    2013-01-01

    Access control is a critical functionality in Internet of Things (IoT), and it is particularly promising to make access control secure, efficient and generic in a distributed environment. Another an important property of access control system in the IoT is flexibility which can be achieved...... by access or authority delegation. Delegation mechanisms in access control that have been studied until now have been intended mainly for a system that has no resource constraint, such as a web-based system, which is not very suitable for a highly pervasive system such as IoT. This chapter presents...... the Capability-based Context Aware Access Control (CCAAC) model including the authority delegation method, along with specification and protocol evaluation intended for federated Machine-to-Machine (M2M)/IoT. By using the identity and capability-based access control approach together with the contextual...

  20. Association of State Access Standards With Accessibility to Specialists for Medicaid Managed Care Enrollees.

    Science.gov (United States)

    Ndumele, Chima D; Cohen, Michael S; Cleary, Paul D

    2017-10-01

    Medicaid recipients have consistently reported less timely access to specialists than patients with other types of coverage. By 2018, state Medicaid agencies will be required by the Center for Medicare and Medicaid Services (CMS) to enact time and distance standards for managed care organizations to ensure an adequate supply of specialist physicians for enrollees; however, there have been no published studies of whether these policies have significant effects on access to specialty care. To compare ratings of access to specialists for adult Medicaid and commercial enrollees before and after the implementation of specialty access standards. We used Consumer Assessment of Healthcare Providers and Systems survey data to conduct a quasiexperimental difference-in-differences (DID) analysis of 20 163 nonelderly adult Medicaid managed care (MMC) enrollees and 54 465 commercially insured enrollees in 5 states adopting access standards, and 37 290 MMC enrollees in 5 matched states that previously adopted access standards. Reported access to specialty care in the previous 6 months. Seven thousand six hundred ninety-eight (69%) Medicaid enrollees and 28 423 (75%) commercial enrollees reported that it was always or usually easy to get an appointment with a specialist before the policy implementation (or at baseline) compared with 11 889 (67%) of Medicaid enrollees in states that had previously implemented access standards. Overall, there was no significant improvement in timely access to specialty services for MMC enrollees in the period following implementation of standard(s) (adjusted difference-in-differences, -1.2 percentage points; 95% CI, -2.7 to 0.1), nor was there any impact of access standards on insurance-based disparities in access (0.6 percentage points; 95% CI, -4.3 to 5.4). There was heterogeneity across states, with 1 state that implemented both time and distance standards demonstrating significant improvements in access and reductions in disparities

  1. Fishing Access Areas

    Data.gov (United States)

    Vermont Center for Geographic Information — The Vermont Fish & Wildlife Department maintains developed fishing access areas. These sites provide public access to waters in Vermont for shore fishing...

  2. Interventional radiology in the provision and maintenance of long-term central venous access

    International Nuclear Information System (INIS)

    Lyon, S.M.; Given, M.; Marshall, N.L.

    2008-01-01

    Establishing and maintaining venous access forms an increasing proportion of the workload in interventional radiology. Several patient groups require medium-term to long-term venous catheters for a variety of purposes, including chemotherapy, long-term antimicrobials, parenteral nutrition, short-term access for haemodialysis or exhausted haemodialysis. Often, these catheters are required for treatment and frequent blood testing, which can quickly exhaust the peripheral veins. Venous access devices include implantable catheters (ports), tunnelled catheters and peripherally inserted central catheters, which have different functions, advantages and limitations. Imaging-guided placement is the preferred method of insertion in many institutions because of higher success rates and radiologists are well suited to address catheter complications.

  3. Broadband Optical Access Technologies to Converge towards a Broadband Society in Europe

    Science.gov (United States)

    Coudreuse, Jean-Pierre; Pautonnier, Sophie; Lavillonnière, Eric; Didierjean, Sylvain; Hilt, Benoît; Kida, Toshimichi; Oshima, Kazuyoshi

    This paper provides insights on the status of broadband optical access market and technologies in Europe and on the expected trends for the next generation optical access networks. The final target for most operators, cities or any other player is of course FTTH (Fibre To The Home) deployment although we can expect intermediate steps with copper or wireless technologies. Among the two candidate architectures for FTTH, PON (Passive Optical Network) is by far the most attractive and cost effective solution. We also demonstrate that Ethernet based optical access network is very adequate to all-IP networks without any incidence on the level of quality of service. Finally, we provide feedback from a FTTH pilot network in Colmar (France) based on Gigabit Ethernet PON technology. The interest of this pilot lies on the level of functionality required for broadband optical access networks but also on the development of new home network configurations.

  4. [Public control and equity of access to hospitals under non-State public administration].

    Science.gov (United States)

    Carneiro Junior, Nivaldo; Elias, Paulo Eduardo

    2006-10-01

    To analyze social health organizations in the light of public control and the guarantee of equity of access to health services. Utilizing the case study technique, two social health organizations in the metropolitan region of São Paulo were selected. The analytical categories were equity of access and public control, and these were based on interviews with key informants and technical-administrative reports. It was observed that the overall funding and administrative control of the social health organizations are functions of the state administrator. The presence of a local administrator is important for ensuring equity of access. Public control is expressed through supervisory actions, by means of accounting and financial procedures. Equity of access and public control are not taken into consideration in the administration of these organizations. The central question lies in the capacity of the public authorities to have a presence in implementing this model at the local level, thereby ensuring equity of access and taking public control into consideration.

  5. Web Accessibility and Guidelines

    Science.gov (United States)

    Harper, Simon; Yesilada, Yeliz

    Access to, and movement around, complex online environments, of which the World Wide Web (Web) is the most popular example, has long been considered an important and major issue in the Web design and usability field. The commonly used slang phrase ‘surfing the Web’ implies rapid and free access, pointing to its importance among designers and users alike. It has also been long established that this potentially complex and difficult access is further complicated, and becomes neither rapid nor free, if the user is disabled. There are millions of people who have disabilities that affect their use of the Web. Web accessibility aims to help these people to perceive, understand, navigate, and interact with, as well as contribute to, the Web, and thereby the society in general. This accessibility is, in part, facilitated by the Web Content Accessibility Guidelines (WCAG) currently moving from version one to two. These guidelines are intended to encourage designers to make sure their sites conform to specifications, and in that conformance enable the assistive technologies of disabled users to better interact with the page content. In this way, it was hoped that accessibility could be supported. While this is in part true, guidelines do not solve all problems and the new WCAG version two guidelines are surrounded by controversy and intrigue. This chapter aims to establish the published literature related to Web accessibility and Web accessibility guidelines, and discuss limitations of the current guidelines and future directions.

  6. Development of an access control system for the LHD experimental hall

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Uda, T.; Yamanishi, H.; Miyake, H.; Tanahashi, S.; Motozima, O.

    2000-01-01

    pumping are permitted to enter into the LHD controlled area. We call this function a group control. In the group control system, persons are classified into necessary several groups, and each group is connected to one or more operation modes. We think that the concept of this control system is our original one. In the presentation, we will introduce the present system of access control, especially interlock signals and a group control. These functions will be made good use to eradicate careless mistakes relating to the LHD control and the plasma experiments. (author)

  7. Neighborhood crime and access to health-enabling resources in Chicago

    Directory of Open Access Journals (Sweden)

    Elizabeth L. Tung

    2018-03-01

    Full Text Available Neighborhood crime may be an important social determinant of health in many high-poverty, urban communities, yet little is known about its relationship with access to health-enabling resources. We recruited an address-based probability sample of 267 participants (ages ≥35 years on Chicago's South Side between 2012 and 2013. Participants were queried about their perceptions of neighborhood safety and prior experiences of neighborhood crime. Survey data were paired to a comprehensive, directly-observed census of the built environment on the South Side of Chicago. Multivariable logistic regression models were used to examine access to health-enabling resources (potential and realized access as a function of neighborhood crime (self-reported neighborhood safety and prior experience of theft or property crime, adjusting for sociodemographic characteristics and self-reported health status. Low potential access was defined as a resident having nearest resources >1 mile from home; poor realized access was defined as bypassing nearby potential resources to use resources >1 mile from home. Poor neighborhood safety was associated with low potential access to large grocery stores (AOR = 1.73, 95% CI = 1.04, 2.87, pharmacies (AOR = 2.24, 95% CI = 1.33, 3.77, and fitness resources (AOR = 1.93, 95% CI = 1.15, 3.24, but not small grocery stores. Any prior experience of neighborhood crime was associated with higher adjusted odds of bypassing nearby pharmacies (AOR = 3.78, 95% CI = 1.11, 12.87. Neighborhood crime may be associated with important barriers to accessing health-enabling resources in urban communities with high rates of crime. Keywords: Built environment, Neighborhood crime, Access to resources, Social determinants of health, Obesity, Hypertension

  8. Android Access Control Extension

    Directory of Open Access Journals (Sweden)

    Anton Baláž

    2015-12-01

    Full Text Available The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with per-program profiles. Profiles can allow capabilities like network access, raw socket access, and the permission to read, write, or execute files on matching paths. Module supplements the traditional Android capability access control model by providing mandatory access control (MAC based on path. This extension increases security of access to system objects in a device and allows creating security sandboxes per application.

  9. Notified Access: Extending Remote Memory Access Programming Models for Producer-Consumer Synchronization

    KAUST Repository

    Belli, Roberto; Hoefler, Torsten

    2015-01-01

    Remote Memory Access (RMA) programming enables direct access to low-level hardware features to achieve high performance for distributed-memory programs. However, the design of RMA programming schemes focuses on the memory access and less on the synchronization. For example, in contemporary RMA programming systems, the widely used producer-consumer pattern can only be implemented inefficiently, incurring in an overhead of an additional round-trip message. We propose Notified Access, a scheme where the target process of an access can receive a completion notification. This scheme enables direct and efficient synchronization with a minimum number of messages. We implement our scheme in an open source MPI-3 RMA library and demonstrate lower overheads (two cache misses) than other point-to-point synchronization mechanisms for each notification. We also evaluate our implementation on three real-world benchmarks, a stencil computation, a tree computation, and a Colicky factorization implemented with tasks. Our scheme always performs better than traditional message passing and other existing RMA synchronization schemes, providing up to 50% speedup on small messages. Our analysis shows that Notified Access is a valuable primitive for any RMA system. Furthermore, we provide guidance for the design of low-level network interfaces to support Notified Access efficiently.

  10. Notified Access: Extending Remote Memory Access Programming Models for Producer-Consumer Synchronization

    KAUST Repository

    Belli, Roberto

    2015-05-01

    Remote Memory Access (RMA) programming enables direct access to low-level hardware features to achieve high performance for distributed-memory programs. However, the design of RMA programming schemes focuses on the memory access and less on the synchronization. For example, in contemporary RMA programming systems, the widely used producer-consumer pattern can only be implemented inefficiently, incurring in an overhead of an additional round-trip message. We propose Notified Access, a scheme where the target process of an access can receive a completion notification. This scheme enables direct and efficient synchronization with a minimum number of messages. We implement our scheme in an open source MPI-3 RMA library and demonstrate lower overheads (two cache misses) than other point-to-point synchronization mechanisms for each notification. We also evaluate our implementation on three real-world benchmarks, a stencil computation, a tree computation, and a Colicky factorization implemented with tasks. Our scheme always performs better than traditional message passing and other existing RMA synchronization schemes, providing up to 50% speedup on small messages. Our analysis shows that Notified Access is a valuable primitive for any RMA system. Furthermore, we provide guidance for the design of low-level network interfaces to support Notified Access efficiently.

  11. Strategic Accessibility Competition

    OpenAIRE

    Bacchiega, Emanuele; Randon, Emanuela; Zirulia, Lorenzo

    2010-01-01

    We analyze the effect of competition in market-accessibility enhancement among quality-differentiated firms. Firms are located in regions with different ex-ante transport costs to reach the final market. We characterize the equilibrium of the two-stage game in which firms first invest to improve market accessibility and then compete in prices. Efforts in accessibility improvement crucially depend on the interplay between the willingness to pay for the quality premium of the median consumer an...

  12. Performance analysis of quantum access network using code division multiple access model

    International Nuclear Information System (INIS)

    Hu Linxi; Yang Can; He Guangqiang

    2017-01-01

    A quantum access network has been implemented by frequency division multiple access and time division multiple access, while code division multiple access is limited for its difficulty to realize the orthogonality of the code. Recently, the chaotic phase shifters were proposed to guarantee the orthogonality by different chaotic signals and spread the spectral content of the quantum states. In this letter, we propose to implement the code division multiple access quantum network by using chaotic phase shifters and synchronization. Due to the orthogonality of the different chaotic phase shifter, every pair of users can faithfully transmit quantum information through a common channel and have little crosstalk between different users. Meanwhile, the broadband spectra of chaotic signals efficiently help the quantum states to defend against channel loss and noise. (paper)

  13. Design for Accessibility

    DEFF Research Database (Denmark)

    Herriott, Richard

    2012-01-01

    A report on how nine rail builder, operators and transport designers deal with design for accessibility......A report on how nine rail builder, operators and transport designers deal with design for accessibility...

  14. Atomic memory access hardware implementations

    Science.gov (United States)

    Ahn, Jung Ho; Erez, Mattan; Dally, William J

    2015-02-17

    Atomic memory access requests are handled using a variety of systems and methods. According to one example method, a data-processing circuit having an address-request generator that issues requests to a common memory implements a method of processing the requests using a memory-access intervention circuit coupled between the generator and the common memory. The method identifies a current atomic-memory access request from a plurality of memory access requests. A data set is stored that corresponds to the current atomic-memory access request in a data storage circuit within the intervention circuit. It is determined whether the current atomic-memory access request corresponds to at least one previously-stored atomic-memory access request. In response to determining correspondence, the current request is implemented by retrieving data from the common memory. The data is modified in response to the current request and at least one other access request in the memory-access intervention circuit.

  15. Vascular access in pediatric patients in the emergency department: types of access, indications, and complications [digest].

    Science.gov (United States)

    Whitney, Rachel; Langhan, Melissa; Pade, Kathryn H

    2017-06-22

    Vascular access is a potentially life-saving procedure that is a mainstay of emergency medicine practice. There are a number of challenges associated with obtaining and maintaining vascular access, and the choice of the route of access and equipment used will depend on patient- and provider-specific factors. In this issue, the indications and complications of peripheral intravenous access, intraosseous access, and central venous access are reviewed. Timely and effective assessment and management of difficult-access patients, pain control techniques that can assist vascular access, and contraindications to each type of vascular access are also discussed. [Points & Pearls is a digest of Pediatric Emergency Medicine Practice].

  16. Forbidden Access

    CERN Multimedia

    C. Colloca TS/FM

    2004-01-01

    TS/FM group informs you that, for the replacement of the door of the main entrance at bldg. 500, the access will be closed to the public between 19 and 30 July 2004. Access to the Main Building complex will be assured at any time through both of the side doors and from bldg. 64. For more information, please contact 73273. C. Colloca TS/FM

  17. A remark on accessibility

    International Nuclear Information System (INIS)

    Wu, Xinxing; Wang, Jianjun

    2016-01-01

    Highlights: • Obtain some characteristics of accessibility and Kato’s chaos. • Answer negatively a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. • A dynamical system is indecomposable if and only if it is weakly transitive. - Abstract: This note obtains some characteristics of accessibility and Kato’s chaos. Applying these results, an accessible dynamical system whose product system is not accessible is constructed, giving a negative answer to a question in [Li R, Wang H, Zhao Y. Kato’s chaos in duopoly games. Chaos Solit Fract 2016;84:69–72]. Besides, it is proved that every transitive interval self-map is accessible.

  18. Modern energy access to all in rural India: An integrated implementation strategy

    International Nuclear Information System (INIS)

    Balachandra, P.

    2011-01-01

    Expanding energy access to the rural population of India presents a critical challenge for its government. The presence of 364 million people without access to electricity and 726 million who rely on biomass for cooking indicate both the failure of past policies and programs, and the need for a radical redesign of the current system. We propose an integrated implementation framework with recommendations for adopting business principles with innovative institutional, regulatory, financing and delivery mechanisms. The framework entails establishment of rural energy access authorities and energy access funds, both at the national and regional levels, to be empowered with enabling regulatory policies, capital resources and the support of multi-stakeholder partnership. These institutions are expected to design, lead, manage and monitor the rural energy interventions. At the other end, trained entrepreneurs would be expected to establish bioenergy-based micro-enterprises that will produce and distribute energy carriers to rural households at an affordable cost. The ESCOs will function as intermediaries between these enterprises and the international carbon market both in aggregating carbon credits and in trading them under CDM. If implemented, such a program could address the challenges of rural energy empowerment by creating access to modern energy carriers and climate change mitigation. - Highlights: ► Expanding rural energy access in India is critical with majority lacking access to modern energy. ► Innovative and integrated implementation strategy for achieving universal rural energy access. ► Design of an integrated rural energy policy and proposal for new institutional mechanism. ► Establishing rural energy access authorities and energy access funds as supporting mechanisms. ► Bioenergy-based micro-enterprises for delivering energy services at an affordable cost.

  19. Accessibility observations of visually impaired users using the South African National Accessibility Portal

    CSIR Research Space (South Africa)

    Coetzee, L

    2008-05-01

    Full Text Available . Improving web site accessibility has proven to be a challenging task with a myriad of standards, accessibility testing tools and few technical guides for implementation. This paper presents the South African National Accessibility Portal (NAP), which is used...

  20. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  1. 36 CFR 9.32 - Access.

    Science.gov (United States)

    2010-07-01

    ... MANAGEMENT Non-Federal Oil and Gas Rights § 9.32 Access. (a) No access on, across or through lands or waters... access is by foot, pack animal, or designated road. Persons using designated roads for access to such a...

  2. Vascular Access in Children

    International Nuclear Information System (INIS)

    Krishnamurthy, Ganesh; Keller, Marc S.

    2011-01-01

    Establishment of stable vascular access is one of the essential and most challenging procedures in a pediatric hospital. Many clinical specialties provide vascular service in a pediatric hospital. At the top of the “expert procedural pyramid” is the pediatric interventional radiologist, who is best suited and trained to deliver this service. Growing awareness regarding the safety and high success rate of vascular access using image guidance has led to increased demand from clinicians to provide around-the-clock vascular access service by pediatric interventional radiologists. Hence, the success of a vascular access program, with the pediatric interventional radiologist as the key provider, is challenging, and a coordinated multidisciplinary team effort is essential for success. However, there are few dedicated pediatric interventional radiologists across the globe, and also only a couple of training programs exist for pediatric interventions. This article gives an overview of the technical aspects of pediatric vascular access and provides useful tips for obtaining vascular access in children safely and successfully using image guidance.

  3. Cognitive-communication disorder following right hemisphere stroke: exploring rehabilitation access and outcomes.

    Science.gov (United States)

    Hewetson, Ronelle; Cornwell, Petrea; Shum, David

    2017-07-01

    Rehabilitation positively influences return to activities and social roles in people with aphasia. The cognitive-communication disorder (CCD) found following a right hemisphere stroke has been less extensively researched with rehabilitation access and outcomes yet to be determined. To document rehabilitation access and outcomes for people with CCD post-stroke; and compare outcomes based on presence (viz CCD; aphasia) or absence of communication impairment. A retrospective chart audit was completed for patients with first onset unilateral stroke, with a hospital length of stay (LOS) of at least two days and a communication assessment by a speech pathologist. Data extracted included presence and severity of communication impairment, access to and LOS in a rehabilitation unit, and functional outcome measures recorded at rehabilitation discharge. The majority of the 115 patients who met inclusion criteria were living independently (n = 112, 97.4%) at the time of stroke. CCD (66%) was diagnosed with similar frequency to aphasia (68%). The presence of communication impairment did not result in significant differences in rehabilitation LOS and discharge destination when compared to hemispheric strokes without communication impairment. Severity of CCD was an independent predictor of functional gain by rehabilitation discharge. People with CCD require comparable access to rehabilitation as people with aphasia, and severity of CCD should be considered in determining rehabilitation LOS. A large number of people are discharged with ongoing CCD which warrants exploration of potential participation restrictions created by the communication impairment.

  4. Informatics and Society: The Challenge of Improving IT Accessibility

    Directory of Open Access Journals (Sweden)

    Bruce Diamond

    2005-12-01

    Full Text Available Information technology (IT is an important part of society and has assumed an increasing role in education, medicine, commercial, leisure, and sociopolitical applications. However, while progress in developing IT hardware and software has advanced, our understanding of user needs and how these needs can be translated into more accessible and effective system design lags behind. The challenge that we face is rooted in the fact that many individuals across this planet who are differently-abled due to aging, developmental or neurologic conditions or to individual differences in learning, face obstacles in using and accessing IT. The central thesis of this paper is that the effective delivery of IT to the differently-abled is contingent on deriving enough information about user populations to allow for the development and use of personalized interfaces and customized content. To this end, it is proposed that a combination of adaptive hypermedia and cognitive adaptive strategies integrating metadata architecture for representing the results of cognitive and functional assessments be designed and implemented. Keywords: Information technology, accessibility, differently-abled, adaptive hypermedia, informatics

  5. ARCAS (ACACIA Regional Climate-data Access System) -- a Web Access System for Climate Model Data Access, Visualization and Comparison

    Science.gov (United States)

    Hakkarinen, C.; Brown, D.; Callahan, J.; hankin, S.; de Koningh, M.; Middleton-Link, D.; Wigley, T.

    2001-05-01

    A Web-based access system to climate model output data sets for intercomparison and analysis has been produced, using the NOAA-PMEL developed Live Access Server software as host server and Ferret as the data serving and visualization engine. Called ARCAS ("ACACIA Regional Climate-data Access System"), and publicly accessible at http://dataserver.ucar.edu/arcas, the site currently serves climate model outputs from runs of the NCAR Climate System Model for the 21st century, for Business as Usual and Stabilization of Greenhouse Gas Emission scenarios. Users can select, download, and graphically display single variables or comparisons of two variables from either or both of the CSM model runs, averaged for monthly, seasonal, or annual time resolutions. The time length of the averaging period, and the geographical domain for download and display, are fully selectable by the user. A variety of arithmetic operations on the data variables can be computed "on-the-fly", as defined by the user. Expansions of the user-selectable options for defining analysis options, and for accessing other DOD-compatible ("Distributed Ocean Data System-compatible") data sets, residing at locations other than the NCAR hardware server on which ARCAS operates, are planned for this year. These expansions are designed to allow users quick and easy-to-operate web-based access to the largest possible selection of climate model output data sets available throughout the world.

  6. Fixing Accessibility Issues in Open-Source Teaching Repositories

    Directory of Open Access Journals (Sweden)

    Francisco Javier Díaz

    2017-12-01

    Full Text Available In the LINTI, New Information Technologies Research Laboratory at the Computer Science School, in the National University of La Plata, it is being developed a project that involves the integration of the repository, implemented using DSpace, with different tools and platforms used in academic tasks. Accessibility is a process that cuts across all software development stages, so when using a free software product it is important to evaluate it in order to correct faults if it´s necessary. This article describes a DSpace repository accessibility validation, using screen readers for manual test, automatic validation with software tools and experimental test with users with and without disabilities. The evaluation involves the proper basic functions and the implemented extensions. The original DSpace software was extended through the integration with different tools and platforms, such as Moodle LMS, the library management system called Meran, file management services like DropBox and GoogleDrive and the social network Facebook.  The tools used during accessibility evaluation were Examinator, Google ChromeVox and one entirely implemented in the LINTI, called SiMor. The experimental tests were made with blind and deaf persons, most of them college students. All the validation results are detailed using tables and graphs, where it can observe the measured values. It is also described the changes that was necessary to carry out in the repository to improve the user experience and ensure Web service accessibility.

  7. A JEE RESTful service to access Conditions Data in ATLAS

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00081940; Gallas, Elizabeth

    2015-01-01

    Usage of Conditions Data in ATLAS is extensive for offline reconstruction and analysis (e.g.: alignment, calibration, data quality). The system is based on the LCG Conditions Database infrastructure, with read and write access via an ad hoc C++ API (COOL), a system which was developed before Run 1 data taking began. The infrastructure dictates that the data is organized into separate schemata (assigned to subsystems/groups storing distinct and independent sets of conditions), making it difficult to access information from several schemata at the same time. We have thus created PL/SQL functions containing queries to provide content extraction at multi-schema level. The PL/SQL API has been exposed to external clients by means of a Java application providing DB access via RESTful services, deployed inside an application server (JBoss WildFly). The services allow navigation over multiple schemata via simple URLs. The data can be retrieved either in XML or JSON formats, via simple clients (like curl or Web browser...

  8. A JEE RESTful service to access Conditions Data in ATLAS

    CERN Document Server

    Formica, Andrea; The ATLAS collaboration

    2015-01-01

    Usage of Conditions Data in ATLAS is extensive for offline reconstruction and analysis (for example: alignment, calibration, data quality). The system is based on the LCG Conditions Database infrastructure, with read and write access via an ad hoc C++ API (COOL), a system which was developed before Run 1 data taking began. The infrastructure dictates that the data is organized into separate schemas (assigned to subsystems/groups storing distinct and independent sets of conditions), making it difficult to access information from several schemas at the same time. We have thus created PL/SQL functions containing queries to provide content extraction at multi-schema level. The PL/SQL API has been exposed to external clients by means of an intermediate java application server (JBoss), where an application delivering access to the DB via RESTful services has been deployed. The services allow navigation over multiple schema content, via simple URLs. The queried data can be retrieved either in XML or JSON formats, vi...

  9. A JEE RESTful service to access Conditions Data in ATLAS

    Science.gov (United States)

    Formica, Andrea; Gallas, E. J.

    2015-12-01

    Usage of condition data in ATLAS is extensive for offline reconstruction and analysis (e.g. alignment, calibration, data quality). The system is based on the LCG Conditions Database infrastructure, with read and write access via an ad hoc C++ API (COOL), a system which was developed before Run 1 data taking began. The infrastructure dictates that the data is organized into separate schemas (assigned to subsystems/groups storing distinct and independent sets of conditions), making it difficult to access information from several schemas at the same time. We have thus created PL/SQL functions containing queries to provide content extraction at multi-schema level. The PL/SQL API has been exposed to external clients by means of a Java application providing DB access via REST services, deployed inside an application server (JBoss WildFly). The services allow navigation over multiple schemas via simple URLs. The data can be retrieved either in XML or JSON formats, via simple clients (like curl or Web browsers).

  10. Local Nucleosome Dynamics Facilitate Chromatin Accessibility in Living Mammalian Cells

    Directory of Open Access Journals (Sweden)

    Saera Hihara

    2012-12-01

    Full Text Available Genome information, which is three-dimensionally organized within cells as chromatin, is searched and read by various proteins for diverse cell functions. Although how the protein factors find their targets remains unclear, the dynamic and flexible nature of chromatin is likely crucial. Using a combined approach of fluorescence correlation spectroscopy, single-nucleosome imaging, and Monte Carlo computer simulations, we demonstrate local chromatin dynamics in living mammalian cells. We show that similar to interphase chromatin, dense mitotic chromosomes also have considerable chromatin accessibility. For both interphase and mitotic chromatin, we observed local fluctuation of individual nucleosomes (∼50 nm movement/30 ms, which is caused by confined Brownian motion. Inhibition of these local dynamics by crosslinking impaired accessibility in the dense chromatin regions. Our findings show that local nucleosome dynamics drive chromatin accessibility. We propose that this local nucleosome fluctuation is the basis for scanning genome information.

  11. Access road reclamation

    International Nuclear Information System (INIS)

    Manson, T.; Blok, M.

    1997-01-01

    A general review of the measures involved in restoring abandoned access road sites in British Columbia was presented. Permits and licences are needed for the use of crown land for roads used by the petroleum and natural gas industry for exploration activities. However, the regulatory framework for road site reclamation is not well developed. The nature of access road reclamation is very site-specific. Some of the issues that are considered for all reclamation projects include slope stability, water control, revegetation, soil rehabilitation, access management and monitoring. The primary objective of reclaiming access road sites is to return the site to conditions that are equal or better than pre-disturbance conditions. Restoration measures must be approved by BC Environment and by the Department of Fisheries and Oceans where federal fisheries responsibilities are involved. 54 refs., 5 tabs., 3 figs

  12. Unified double- and single-sided homogeneous Green's function representations

    Science.gov (United States)

    Wapenaar, Kees; van der Neut, Joost; Slob, Evert

    2016-06-01

    In wave theory, the homogeneous Green's function consists of the impulse response to a point source, minus its time-reversal. It can be represented by a closed boundary integral. In many practical situations, the closed boundary integral needs to be approximated by an open boundary integral because the medium of interest is often accessible from one side only. The inherent approximations are acceptable as long as the effects of multiple scattering are negligible. However, in case of strongly inhomogeneous media, the effects of multiple scattering can be severe. We derive double- and single-sided homogeneous Green's function representations. The single-sided representation applies to situations where the medium can be accessed from one side only. It correctly handles multiple scattering. It employs a focusing function instead of the backward propagating Green's function in the classical (double-sided) representation. When reflection measurements are available at the accessible boundary of the medium, the focusing function can be retrieved from these measurements. Throughout the paper, we use a unified notation which applies to acoustic, quantum-mechanical, electromagnetic and elastodynamic waves. We foresee many interesting applications of the unified single-sided homogeneous Green's function representation in holographic imaging and inverse scattering, time-reversed wave field propagation and interferometric Green's function retrieval.

  13. Straight configuration saphenous vein transposition to popliteal artery for vascular access.

    Science.gov (United States)

    Caco, Gentian; Golemi, Dhurata; Likaj, Eriola

    2017-03-21

    The saphenous vein is commonly used as a vascular graft in peripheral artery surgery but rarely used for vascular access. The literature on straight configuration saphenous vein transposition to the popliteal artery is scarce. Here we present two cases of straight configuration saphenous vein transposition to the popliteal artery for vascular access, the surgical technique and respective follow-up. Two young men, aged 29 and 36 years, were chosen for lower-limb vascular access for hemodialysis. The first patient was paraplegic since birth. He used his arms to move so upper extremity vascular access was avoided. The second patient presented with an infected upper extremity arteriovenous graft (AVG) and after multiple closed AVFs he had no more available arm veins. Both patients received autologous lower extremity straight configuration saphenous vein transpositions to the popliteal artery under spinal anesthesia in May and October 2012, respectively. Cannulation of the fistula was allowed after one month. There were no early complications. Slight swelling on the leg appeared in one of the patients. Both fistulas were still functional after 36 and 32 months, respectively. The straight configuration saphenous vein transposition to popliteal artery is simple to perform, offers a long and straight segment for cannulation and may be a suitable autologous vascular access in selected patients.

  14. Roles of Solvent Accessibility and Gene Expression in Modeling Protein Sequence Evolution

    OpenAIRE

    Kuangyu Wang; Shuhui Yu; Xiang Ji; Clemens Lakner; Alexander Griffing; Jeffrey L. Thorne

    2015-01-01

    Models of protein evolution tend to ignore functional constraints, although structural constraints are sometimes incorporated. Here we propose a probabilistic framework for codon substitution that evaluates joint effects of relative solvent accessibility (RSA), a structural constraint; and gene expression, a functional constraint. First, we explore the relationship between RSA and codon usage at the genomic scale as well as at the individual gene scale. Motivated by these results, we construc...

  15. Digital Scholarship and Open Access

    Science.gov (United States)

    Losoff, Barbara; Pence, Harry E.

    2010-01-01

    Open access publications provide scholars with unrestricted access to the "conversation" that is the basis for the advancement of knowledge. The large number of open access journals, archives, and depositories already in existence demonstrates the technical and economic viability of providing unrestricted access to the literature that is the…

  16. Resource description and access 2013 revision

    CERN Document Server

    2013-01-01

    This e-book contains the 2013 Revision of RDA: Resource Description and Access, and includes the July 2013 Update. This e-book offers links within the RDA text and the capability of running rudimentary searches of RDA, but please note that this e-book does not have the full range of content or functionality provided by the subscription product RDA Toolkit. Included: A full accumulation of RDA- the revision contains a full set of all current RDA instructions. It replaces the previous version of RDA Print as opposed to being an update packet to that version. RDA has gone through many changes sin

  17. Optimizing Cooperative Cognitive Radio Networks with Opportunistic Access

    KAUST Repository

    Zafar, Ammar; Alouini, Mohamed-Slim; Chen, Yunfei; Radaydeh, Redha M.

    2012-01-01

    Optimal resource allocation for cooperative cognitive radio networks with opportunistic access to the licensed spectrum is studied. Resource allocation is based on minimizing the symbol error rate at the receiver. Both the cases of all-participate relaying and selective relaying are considered. The objective function is derived and the constraints are detailed for both scenarios. It is then shown that the objective functions and the constraints are nonlinear and nonconvex functions of the parameters of interest, that is, source and relay powers, symbol time, and sensing time. Therefore, it is difficult to obtain closed-form solutions for the optimal resource allocation. The optimization problem is then solved using numerical techniques. Numerical results show that the all-participate system provides better performance than its selection counterpart, at the cost of greater resources. © 2012 Ammar Zafar et al.

  18. Optimizing Cooperative Cognitive Radio Networks with Opportunistic Access

    KAUST Repository

    Zafar, Ammar

    2012-09-16

    Optimal resource allocation for cooperative cognitive radio networks with opportunistic access to the licensed spectrum is studied. Resource allocation is based on minimizing the symbol error rate at the receiver. Both the cases of all-participate relaying and selective relaying are considered. The objective function is derived and the constraints are detailed for both scenarios. It is then shown that the objective functions and the constraints are nonlinear and nonconvex functions of the parameters of interest, that is, source and relay powers, symbol time, and sensing time. Therefore, it is difficult to obtain closed-form solutions for the optimal resource allocation. The optimization problem is then solved using numerical techniques. Numerical results show that the all-participate system provides better performance than its selection counterpart, at the cost of greater resources. © 2012 Ammar Zafar et al.

  19. Monitoring User-Based Accessibility Assessment in Urban Environments and in Public Buildings

    Directory of Open Access Journals (Sweden)

    Gintaras Stauskis

    2018-04-01

    Full Text Available The research features analysis of user-experience-based accessibility assessment and progress monitoring of buildings and public spaces; this analysis is used as a tool for facilitating the development of humane, socially sustainable and an inclusive urban environment. A group of users representing people with different kinds of disabilities, the elderly and families with children was created to assess the quality of access to various buildings with different functions and locations across Vilnius and in Singapore. A school, two hospitals, a rehab centre and two offices were selected for access monitoring in Vilnius City, while a hotel, a café and two metro stations with public squares were chosen for access assessment in Singapore. As the same method was principally applied to assess accessibility of selected buildings in Vilnius City in 2000 and 2017 and in Singapore in 2012, the article draws a comparative analysis of access levels in these two cities located in different global regions. The results show a definite improvement of access quality over time and also identify the critical aspects in this process. The segment of plot planning represents the lowest quality of access for all assessed building types as compared to the building segment and the external–internal element segments. The paper also draws conclusions that access improvement is a continuous process of implementing advanced urban policy instruments, and city planners can contribute to it by constantly analysing and presenting to public the monitoring data about the progress in access improvement. Comparing the assessment results between Vilnius City and Singapore – cities that are located in different global regions and in different socio-economic environments – provides a practical tool for benchmarking and setting the priorities for this process.

  20. Advanced Encoding for Multilingual Access in a Terminological Data Base

    DEFF Research Database (Denmark)

    Leroyer, Patrick; L'Homme, Marie-Claude; Robichaud, Benoît

    2010-01-01

    This paper describes new functionalities implemented in a terminological database (TDB) in order to allow efficient editing of and access to multilingual data. The functionalities are original in the sense that they allow users of the database to retrieve the equivalents not only of headwords...... between equivalents can be established automatically. Examples are taken from the fields of computing and the Internet and focus on English and French. However, the model can easily be extended to other fields and languages provided that the data is available and encoded properly....

  1. The impact of energy labels and accessibility on office rents

    International Nuclear Information System (INIS)

    Kok, Nils; Jennen, Maarten

    2012-01-01

    Energy consumption in the commercial property sector offers an important opportunity for conserving resources. In this study, we evaluate the financial implications of two elements of “sustainability” – energy efficiency and accessibility – in the market for commercial real estate. An empirical analysis of some 1100 leasing transactions in the Netherlands over the 2005–2010 period shows that buildings designated as inefficient (with an EU energy performance certificate D or worse) command rental levels that are some 6.5 percent lower as compared to energy efficient, but otherwise similar buildings (labeled A, B or C). Furthermore, this study shows that office buildings in multi-functional areas, with access to public transport and facilities, achieve rental premiums over mono-functional office districts. For policymakers, the results documented in this paper provide an indication on the effectiveness of the EU energy performance certificate as a market signal in the commercial property sector. The findings documented here are also relevant for investors in European office markets, as the importance of energy efficiency and locational diversification is bound to increase following stricter environmental regulation and changing tenant preferences. - Highlights: ► Built environment plays important role in reduction of greenhouse gas emissions. ► Energy certification of buildings may increase transparency and awareness. ► Tenants pay lower rent for less efficient commercial office buildings. ► Accessibility important determinant of commercial office rents.

  2. Early transcriptional response of soybean contrasting accessions to root dehydration.

    Directory of Open Access Journals (Sweden)

    José Ribamar Costa Ferreira Neto

    Full Text Available Drought is a significant constraint to yield increase in soybean. The early perception of water deprivation is critical for recruitment of genes that promote plant tolerance. DeepSuperSAGE libraries, including one control and a bulk of six stress times imposed (from 25 to 150 min of root dehydration for drought-tolerant and sensitive soybean accessions, allowed to identify new molecular targets for drought tolerance. The survey uncovered 120,770 unique transcripts expressed by the contrasting accessions. Of these, 57,610 aligned with known cDNA sequences, allowing the annotation of 32,373 unitags. A total of 1,127 unitags were up-regulated only in the tolerant accession, whereas 1,557 were up-regulated in both as compared to their controls. An expression profile concerning the most representative Gene Ontology (GO categories for the tolerant accession revealed the expression "protein binding" as the most represented for "Molecular Function", whereas CDPK and CBL were the most up-regulated protein families in this category. Furthermore, particular genes expressed different isoforms according to the accession, showing the potential to operate in the distinction of physiological behaviors. Besides, heat maps comprising GO categories related to abiotic stress response and the unitags regulation observed in the expression contrasts covering tolerant and sensitive accessions, revealed the unitags potential for plant breeding. Candidate genes related to "hormone response" (LOX, ERF1b, XET, "water response" (PUB, BMY, "salt stress response" (WRKY, MYB and "oxidative stress response" (PER figured among the most promising molecular targets. Additionally, nine transcripts (HMGR, XET, WRKY20, RAP2-4, EREBP, NAC3, PER, GPX5 and BMY validated by RT-qPCR (four different time points confirmed their differential expression and pointed that already after 25 minutes a transcriptional reorganization started in response to the new condition, with important

  3. CORAL Server and CORAL Server Proxy: Scalable Access to Relational Databases from CORAL Applications

    CERN Document Server

    Valassi, A; Kalkhof, A; Salnikov, A; Wache, M

    2011-01-01

    The CORAL software is widely used at CERN for accessing the data stored by the LHC experiments using relational database technologies. CORAL provides a C++ abstraction layer that supports data persistency for several backends and deployment models, including local access to SQLite files, direct client access to Oracle and MySQL servers, and read-only access to Oracle through the FroNTier web server and cache. Two new components have recently been added to CORAL to implement a model involving a middle tier "CORAL server" deployed close to the database and a tree of "CORAL server proxy" instances, with data caching and multiplexing functionalities, deployed close to the client. The new components are meant to provide advantages for read-only and read-write data access, in both offline and online use cases, in the areas of scalability and performance (multiplexing for several incoming connections, optional data caching) and security (authentication via proxy certificates). A first implementation of the two new c...

  4. Design and Implementation of an IoT Access Point for Smart Home

    Directory of Open Access Journals (Sweden)

    Chih-Yung Chang

    2015-12-01

    Full Text Available Network communication and micro-electro-mechanical embedded technologies have attracted much attention in recent years. Through these technologies, the capabilities of sensing, identification, and communication can be embedded in various smart devices. These smart devices can automatically connect to the Internet and form an intelligent network called Internet of Things (IoT. However, these devices are embedded with different wireless communication interfaces such as Wi-Fi and ZigBee. This paper presents the design and implementation of an IoT access point that supports functionalities of coordination of various wireless transmission protocols. Based on the existing Wi-Fi access point, we have embedded a ZigBee module and implemented ZigBee and UPnP protocols into the designed IoT access point, which supports ZigBee communication capabilities over the Internet.

  5. Massachusetts health reform and access for children with special health care needs.

    Science.gov (United States)

    Smith, Anna Jo; Chien, Alyna T

    2014-08-01

    Children with special health care needs (CSHCN) face unique challenges in accessing affordable health care. Massachusetts implemented major health reform in 2006; little is known about the impact of this state's health reform on uninsurance, access to care, and financial protection for privately and publicly insured CSHCN. We used a difference-in-differences (DD) approach to compare uninsurance, access to primary and specialty care, and financial protection in Massachusetts versus other states and Washington, DC before and after Massachusetts health reform. Parent-reported data were used from the 2005-2006 and 2009-2010 National Survey of Children with Special Health Care Needs and adjusted for age, gender, race/ethnicity, non-English language at home, and functional difficulties. Postreform, living in Massachusetts was not associated with significant decreases in uninsurance or increases in access to primary care for CSHCN. For privately insured CSHCN, Massachusetts was associated with increased access to specialists (DD = 6.0%; P ≤ .001) postreform. For publicly insured CSHCN, however, there was a significant decrease in access to prescription medications (DD = -7.2%; P = .003) postreform. Living in Massachusetts postreform was not associated with significant changes in financial protection compared with privately or publicly insured CSHCN in other states. Massachusetts health reform likely improved access to specialists for privately insured CSHCN but did not decrease instances of uninsurance, increase access to primary care, or improve financial protection for CSHCN in general. Comparable provisions within the Affordable Care Act may produce similarly modest outcomes for CSHCN. Copyright © 2014 by the American Academy of Pediatrics.

  6. The INIS database on another efficient site... and on free access

    International Nuclear Information System (INIS)

    Libmann, F.

    2009-01-01

    This article presents the INIS database, its history, document type content, and availability. It stresses on the recent opening of the database to free access, on the functionality of the searching interface and on the quality of the work and the professionalism of the database producers. (J.S.)

  7. Evolution of the Data Access Protocol in Response to Community Needs

    Science.gov (United States)

    Gallagher, J.; Caron, J. L.; Davis, E.; Fulker, D.; Heimbigner, D.; Holloway, D.; Howe, B.; Moe, S.; Potter, N.

    2012-12-01

    Under the aegis of the OPULS (OPeNDAP-Unidata Linked Servers) Project, funded by NOAA, version 2 of OPeNDAP's Data Access Protocol (DAP2) is being updated to version 4. DAP4 is the first major upgrade in almost two decades and will embody three main areas of advancement. First, the data-model extensions developed by the OPULS team focus on three areas: Better support for coverages, access to HDF5 files and access to relational databases. DAP2 support for coverages (defined as a sampled functions) was limited to simple rectangular coverages that work well for (some) model outputs and processed satellite data but that cannot represent trajectories or satellite swath data, for example. We have extended the coverage concept in DAP4 to remove these limitations. These changes are informed by work at Unidata on the Common Data Model and also by the OGC's abstract coverages specification. In a similar vein, we have extended DAP2's support for relations by including the concept of foreign keys, so that tables can be explicitly related to one another. Second, the web interfaces - web services - that provides access to data using via DAP will be more clearly defined and use other (, orthogonal), standards where they are appropriate. An important case is the XML interface, which provides a cleaner way to build other response media types such as JSON and RDF (for metadata) and to build support for Atom, thus simplify the integration of DAP servers with tools that support OpenSearch. Input from the ESIP federation and work performed with IOOS have informed our choices here. Last, DAP4-compliant servers will support richer data-processing capabilities than DAP2, enabling a wider array of server functions that manipulate data before returning values. Two projects currently are exploring just what can be done even with DAP2's server-function model: The MIIC project at LARC and OPULS itself (with work performed at the University of Washington). Both projects have demonstrated that

  8. Open Access von A bis Z

    OpenAIRE

    Stieg, Kerstin; Pavlovic, Karlo

    2012-01-01

    The glossary „Open Access from A to Z“ comprises essential key terms on Open Access such as arXiv, The Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities, the Budapest Open Access Initiative (BOAI), Creative Commons (CC), the Directory of Open Access Books (DOAB), the Directory of Open Access Journals (DOAJ), the Directory of Open Access Repositories (OpenDOAR), the EU project Digital Repository Infrastructure Vision for European Research (DRIVER), the Finch Report,...

  9. Probabilistic models for access strategies to dynamic information elements

    DEFF Research Database (Denmark)

    Hansen, Martin Bøgsted; Olsen, Rasmus L.; Schwefel, Hans-Peter

    In various network services (e.g., routing and instances of context-sensitive networking) remote access to dynamically changing information elements is a required functionality. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach...... initiated by the requesting entity, and two versions of proactive approaches in which the entity that contains the information element actively propagates its changes to potential requesters, either (2) periodically or (3) triggered by changes of the information element. This paper develops probabilistic...... for information elements spread over a large number of network nodes are provided, which allow to draw conclusions on scalability properties. The impact of different distribution types for the network delays as well as for the time between changes of the information element on the mismatch probability...

  10. A Conceptual Framework of Mapping Access to Health Care across EU Countries: The Patient Access Initiative.

    Science.gov (United States)

    Souliotis, Kyriakos; Hasardzhiev, Stanimir; Agapidaki, Eirini

    Research evidence suggests that access to health care is the key influential factor for improved population health outcomes and health care system sustainability. Although the importance of addressing barriers in access to health care across European countries is well documented, little has been done to improve the situation. This is due to different definitions, approaches and policies, and partly due to persisting disparities in access within and between European countries. To bridge this gap, the Patient Access Partnership (PACT) developed (a) the '5As' definition of access, which details the five critical elements (adequacy, accessibility, affordability, appropriateness, and availability) of access to health care, (b) a multi-stakeholders' approach for mapping access, and (c) a 13-item questionnaire based on the 5As definition in an effort to address these obstacles and to identify best practices. These tools are expected to contribute effectively to addressing access barriers in practice, by suggesting a common framework and facilitating the exchange of knowledge and expertise, in order to improve access to health care between and within European countries. © 2016 S. Karger AG, Basel.

  11. A novel consortium of Lactobacillus rhamnosus and Streptococcus thermophilus for increased access to functional fermented foods

    NARCIS (Netherlands)

    Kort, R.; Westerik, N.; Mariela Serrano, L.; Douillard, F.P.; Gottstein, W.; Mukisa, I.M.; Tuijn, C.J.; Basten, L.; Hafkamp, B.; Meijer, W.C.; Teusink, B.; Vos, W.M.; Reid, G.; Sybesma, W.

    2015-01-01

    Background: The lactic acid bacterium Lactobacillus rhamnosus GG is the most studied probiotic bacterium with proven health benefits upon oral intake, including the alleviation of diarrhea. The mission of the Yoba for Life foundation is to provide impoverished communities in Africa increased access

  12. Long-term reliable physically unclonable function based on oxide tunnel barrier breakdown on two-transistors two-magnetic-tunnel-junctions cell-based embedded spin transfer torque magnetoresistive random access memory

    Science.gov (United States)

    Takaya, Satoshi; Tanamoto, Tetsufumi; Noguchi, Hiroki; Ikegami, Kazutaka; Abe, Keiko; Fujita, Shinobu

    2017-04-01

    Among the diverse applications of spintronics, security for internet-of-things (IoT) devices is one of the most important. A physically unclonable function (PUF) with a spin device (spin transfer torque magnetoresistive random access memory, STT-MRAM) is presented. Oxide tunnel barrier breakdown is used to realize long-term stability for PUFs. A secure PUF has been confirmed by evaluating the Hamming distance of a 32-bit STT-MRAM-PUF fabricated using 65 nm CMOS technology.

  13. Guide on Project Web Access of SFR R and D and Technology Monitoring System

    International Nuclear Information System (INIS)

    Lee, Dong Uk; Won, Byung Chool; Lee, Yong Bum; Kim, Young In; Hahn, Do Hee

    2008-09-01

    The SFR R and D and technology monitoring system based on the MS enterprise project management is developed for systematic effective management of 'Development of Basic Key Technologies for Gen IV SFR' project which was performed under the Mid- and Long-term Nuclear R and D Program sponsored by the Ministry of Education, Science and Technology. This system is a tool for project management based on web access. Therefore this manual is a detailed guide for Project Web Access(PWA). Section 1 describes the common guide for using of system functions such as project server 2007 client connection setting, additional outlook function setting etc. The section 2 describes the guide for system administrator. It is described the guide for project management in section 3, 4

  14. Guide on Project Web Access of SFR R and D and Technology Monitoring System

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Dong Uk; Won, Byung Chool; Lee, Yong Bum; Kim, Young In; Hahn, Do Hee

    2008-09-15

    The SFR R and D and technology monitoring system based on the MS enterprise project management is developed for systematic effective management of 'Development of Basic Key Technologies for Gen IV SFR' project which was performed under the Mid- and Long-term Nuclear R and D Program sponsored by the Ministry of Education, Science and Technology. This system is a tool for project management based on web access. Therefore this manual is a detailed guide for Project Web Access(PWA). Section 1 describes the common guide for using of system functions such as project server 2007 client connection setting, additional outlook function setting etc. The section 2 describes the guide for system administrator. It is described the guide for project management in section 3, 4.

  15. Planetary data in education: tool development for access to the Planetary Data System

    Science.gov (United States)

    Atkinson, C. H.; Andres, P. M.; Liggett, P. K.; Lowes, L. L.; Sword, B. J.

    2003-01-01

    In this session we will describe and demonstrate the interface to the PDS access tools and functions developed for the scientific community, and discuss the potential for its utilization in K-14 formal and informal settings.

  16. Dissemination of 3D Visualizations of Complex Function Data for the NIST Digital Library of Mathematical Functions

    Directory of Open Access Journals (Sweden)

    Qiming Wang

    2007-03-01

    Full Text Available The National Institute of Standards and Technology (NIST is developing a digital library to replace the widely used National Bureau of Standards Handbook of Mathematical Functions published in 1964. The NIST Digital Library of Mathematical Functions (DLMF will include formulas, methods of computation, references, and links to software for over forty functions. It will be published both in hardcopy format and as a website featuring interactive navigation, a mathematical equation search, 2D graphics, and dynamic interactive 3D visualizations. This paper focuses on the development and accessibility of the 3D visualizations for the digital library. We examine the techniques needed to produce accurate computations of function data, and through a careful evaluation of several prototypes, we address the advantages and disadvantages of using various technologies, including the Virtual Reality Modeling Language (VRML, interactive embedded graphics, and video capture to render and disseminate the visualizations in an environment accessible to users on various platforms.

  17. Embedding multiple self-organisation functionalities in future radio access networks

    NARCIS (Netherlands)

    Jansen, T.; Amirijoo, M.; Türke, U.; Jorguseski, L.; Zetterberg, K.; Nascimento, J.R.V. do; Schmelz, L.C.; Turk, J.; Balan, I.

    2009-01-01

    Wireless network operators today allocate considerable manual effort in managing their networks. A viable solution for lowering the manual effort is to introduce self-organisation functionalities. In this paper we discuss the challenges that are encountered when embedding multiple self-organisation

  18. Enterprise Dynamic Access Control (EDAC)

    National Research Council Canada - National Science Library

    Fernandez, Richard

    2005-01-01

    .... Resources can represent software applications, web services and even facility access. An effective access control model should be capable of evaluating resource access based on user characteristics and environmentals...

  19. Disruptive technological advances in vascular access for dialysis: an overview.

    Science.gov (United States)

    Yeo, Wee-Song; Ng, Qin Xiang

    2017-11-29

    End-stage kidney disease (ESKD), one of the most prevalent diseases in the world and with increasing incidence, is associated with significant morbidity and mortality. Current available modes of renal replacement therapy (RRT) include dialysis and renal transplantation. Though renal transplantation is the preferred and ideal mode of RRT, this modality may not be available to all patients with ESKD. Moreover, renal transplant recipients are constantly at risk of complications associated with immunosuppression and immunosuppressant use, and posttransplant lymphoproliferative disorder. Dialysis may be the only available modality in certain patients. However, dialysis has its limitations, which include issues associated with lack of vascular access, risks of infections and vascular thrombosis, decreased quality of life, and absence of biosynthetic functions of the kidney. In particular, the creation and maintenance of hemodialysis vascular access in children poses a unique set of challenges to the pediatric nephrologist owing to the smaller vessel diameters and vascular hyperreactivity compared with adult patients. Vascular access issues continue to be one of the major limiting factors prohibiting the delivery of adequate dialysis in ESKD patients and is the Achilles' heel of hemodialysis. This review aims to provide a critical overview of disruptive technological advances and innovations for vascular access. Novel strategies in preventing neointimal hyperplasia, novel bioengineered products, grafts and devices for vascular access will be discussed. The potential impact of these solutions on improving the morbidity encountered by dialysis patients will also be examined.

  20. Accessibility of antiretroviral therapy in Ghana: convenience of access.

    Science.gov (United States)

    Addo-Atuah, Joyce; Gourley, Dick; Gourley, Greta; White-Means, Shelley I; Womeodu, Robin J; Faris, Richard J; Addo, Nii Akwei

    2012-01-01

    The convenience of accessing antiretroviral therapy (ART) is important for initial access to care and subsequent adherence to ART. We conducted a qualitative study of people living with HIV/AIDS (PLWHA) and ART healthcare providers in Ghana in 2005. The objective of this study was to explore the participants' perceived convenience of accessing ART by PLWHA in Ghana. The convenience of accessing ART was evaluated from the reported travel and waiting times to receive care, the availability, or otherwise, of special considerations, with respect to the waiting time to receive care, for those PLWHA who were in active employment in the formal sector, the frequency of clinic visits before and after initiating ART, and whether the PLWHA saw the same or different providers at each clinic visit (continuity of care). This qualitative study used in-depth interviews based on Yin's case-study research design to collect data from 20 PLWHA and 24 ART healthcare providers as study participants. • Reported travel time to receive ART services ranged from 2 to 12 h for 30% of the PLWHA. • Waiting time to receive care was from 4 to 9 h. • While known government workers, such as teachers, were attended to earlier in some of the centres, this was not a consistent practice in all the four ART centres studied. • The PLWHA corroborated the providers' description of the procedure for initiating and monitoring ART in Ghana. • PLWHA did not see the same provider every time, but they were assured that this did not compromise the continuity of their care. Our study suggests that convenience of accessing ART is important to both PLWHA and ART healthcare providers, but the participants alluded to other factors, including open provider-patient communication, which might explain the PLWHA's understanding of the constraints under which they were receiving care. The current nation-wide coverage of the ART programme in Ghana, however, calls for the replication of this study to identify

  1. Strict optical orthogonal codes for purely asynchronous code-division multiple-access applications

    Science.gov (United States)

    Zhang, Jian-Guo

    1996-12-01

    Strict optical orthogonal codes are presented for purely asynchronous optical code-division multiple-access (CDMA) applications. The proposed code can strictly guarantee the peaks of its cross-correlation functions and the sidelobes of any of its autocorrelation functions to have a value of 1 in purely asynchronous data communications. The basic theory of the proposed codes is given. An experiment on optical CDMA systems is also demonstrated to verify the characteristics of the proposed code.

  2. Facilitating Full-text Access to Biomedical Literature Using Open Access Resources.

    Science.gov (United States)

    Kang, Hongyu; Hou, Zhen; Li, Jiao

    2015-01-01

    Open access (OA) resources and local libraries often have their own literature databases, especially in the field of biomedicine. We have developed a method of linking a local library to a biomedical OA resource facilitating researchers' full-text article access. The method uses a model based on vector space to measure similarities between two articles in local library and OA resources. The method achieved an F-score of 99.61%. This method of article linkage and mapping between local library and OA resources is available for use. Through this work, we have improved the full-text access of the biomedical OA resources.

  3. Standards and Access.

    Science.gov (United States)

    Fox, Tom

    1993-01-01

    Argues that easy claims about the relationship between language mastery and academic or economic access (made by both conservative commentators on education and mainstream writing teachers) are false and obscure real social and political boundaries, such as racism, sexism, elitism, and homophobia, that really do prevent access. (SR)

  4. Print Media and ICT Access and Use among Female Academics in ...

    African Journals Online (AJOL)

    Literacy for women in the academics requires constant access and use of current and quality information from the media and their associated technologies. This paper discusses the challenges to functional literacy for women academics in the University of Jos and explains how their academic literacy can be enhanced to ...

  5. Accessing patient-centered care using the advanced access model.

    Science.gov (United States)

    Tantau, Catherine

    2009-01-01

    Waits and delays for healthcare are legendary. These delays are not only frustrating and potentially hazardous for patients and providers but also represent significant cost to office practices. The traditional medical model that defines urgent care versus routine care is a vain and futile attempt to sort demand. This approach is at constant odds with patients' definition of urgency. Trusting patients to determine when and how they want to access care makes sense from a customer service perspective. If approached systematically using the principles of Advanced Access, patient demand patterns can be tracked to forecast demand. These demand patterns become the template for deploying the resources necessary to meet patients' needs. Although not a simple journey, the transformation to Advanced Access provides an entree to patient-centered care where patients can say, "I get exactly the care I want and need, when I want and need it."

  6. Are PDF Documents Accessible?

    Directory of Open Access Journals (Sweden)

    Mireia Ribera Turró

    2008-09-01

    Full Text Available Adobe PDF is one of the most widely used formats in scientific communications and in administrative documents. In its latest versions it has incorporated structural tags and improvements that increase its level of accessibility. This article reviews the concept of accessibility in the reading of digital documents and evaluates the accessibility of PDF according to the most widely established standards.

  7. Open access and beyond

    Directory of Open Access Journals (Sweden)

    Das Chhaya

    2006-09-01

    Full Text Available Abstract Uncensored exchange of scientific results hastens progress. Open Access does not stop at the removal of price and permission barriers; still, censorship and reading disabilities, to name a few, hamper access to information. Here, we invite the scientific community and the public to discuss new methods to distribute, store and manage literature in order to achieve unfettered access to literature.

  8. Accessible Geoscience - Digital Fieldwork

    Science.gov (United States)

    Meara, Rhian

    2017-04-01

    Accessible Geoscience is a developing field of pedagogic research aimed at widening participation in Geography, Earth and Environmental Science (GEES) subjects. These subjects are often less commonly associated with disabilities, ethnic minorities, low income socio-economic groups and females. While advancements and improvements have been made in the inclusivity of these subject areas in recent years, access and participation of disabled students remains low. While universities are legally obligated to provide reasonable adjustments to ensure accessibility, the assumed incompatibility of GEES subjects and disability often deters students from applying to study these courses at a university level. Instead of making reasonable adjustments if and when they are needed, universities should be aiming to develop teaching materials, spaces and opportunities which are accessible to all, which in turn will allow all groups to participate in the GEES subjects. With this in mind, the Swansea Geography Department wish to enhance the accessibility of our undergraduate degree by developing digital field work opportunities. In the first instance, we intend to digitise three afternoon excursions which are run as part of a 1st year undergraduate module. Each of the field trips will be digitized into English- and Welsh-medium formats. In addition, each field trip will be digitized into British Sign Language (BSL) to allow for accessibility for D/deaf and hard of hearing students. Subtitles will also be made available in each version. While the main focus of this work is to provide accessible fieldwork opportunities for students with disabilities, this work also has additional benefits. Students within the Geography Department will be able to revisit the field trips, to revise and complete associated coursework. The use of digitized field work should not replace opportunities for real field work, but its use by the full cohort of students will begin to "normalize" accessible field

  9. The assessment of exploitation process of power for access control system

    Science.gov (United States)

    Wiśnios, Michał; Paś, Jacek

    2017-10-01

    The safety of public utility facilities is a function not only of effectiveness of the electronic safety systems, used for protection of property and persons, but it also depends on the proper functioning of their power supply systems. The authors of the research paper analysed the power supply systems, which are used in buildings for the access control system that is integrated with the closed-circuit TV. The Access Control System is a set of electronic, electromechanical and electrical devices and the computer software controlling the operation of the above-mentioned elements, which is aimed at identification of people, vehicles allowed to cross the boundary of the reserved area, to prevent from crossing the reserved area and to generate the alarm signal informing about the attempt of crossing by an unauthorised entity. The industrial electricity with appropriate technical parameters is a basis of proper functioning of safety systems. Only the electricity supply to the systems is not equivalent to the operation continuity provision. In practice, redundant power supply systems are used. In the carried out reliability analysis of the power supply system, various power circuits of the system were taken into account. The reliability and operation requirements for this type of system were also included.

  10. Unified double- and single-sided homogeneous Green’s function representations

    Science.gov (United States)

    van der Neut, Joost; Slob, Evert

    2016-01-01

    In wave theory, the homogeneous Green’s function consists of the impulse response to a point source, minus its time-reversal. It can be represented by a closed boundary integral. In many practical situations, the closed boundary integral needs to be approximated by an open boundary integral because the medium of interest is often accessible from one side only. The inherent approximations are acceptable as long as the effects of multiple scattering are negligible. However, in case of strongly inhomogeneous media, the effects of multiple scattering can be severe. We derive double- and single-sided homogeneous Green’s function representations. The single-sided representation applies to situations where the medium can be accessed from one side only. It correctly handles multiple scattering. It employs a focusing function instead of the backward propagating Green’s function in the classical (double-sided) representation. When reflection measurements are available at the accessible boundary of the medium, the focusing function can be retrieved from these measurements. Throughout the paper, we use a unified notation which applies to acoustic, quantum-mechanical, electromagnetic and elastodynamic waves. We foresee many interesting applications of the unified single-sided homogeneous Green’s function representation in holographic imaging and inverse scattering, time-reversed wave field propagation and interferometric Green’s function retrieval. PMID:27436983

  11. Do Access to Improved Water Source and Sanitation Facility Accelerate Economic Growth in Bangladesh?

    Directory of Open Access Journals (Sweden)

    Sandip SARKER

    2016-04-01

    Full Text Available This paper examines the relationship among access to improved water, sanitation and economic growth in Bangladesh through co-integration and vector error correction model (VECM over the period 1991 to 2014. Bangladesh has registered remarkable progress in achieving major Millennium Development Goals (MDG. Today nearly 87% of our total population has access to improved water sources and 60% have access to improved sanitation facilities which is contributing significantly towards human development in Bangladesh. Therefore we want to test whether access to improved water and sanitation accelerates economic growth in Bangladesh through a time series analysis. The Johansen co-integration tests indicate that there is long run association among the variables. The vector error correction model indicates that there is a long run causality running from improved sanitation facilities (% of population with access and improved water source (% of population with access to gross domestic product in Bangladesh. Similarly in the short run a causal relationship has been found among the variables as well. Further impulse response function and variance decomposition results say that improved sanitation facilities (% of population with access and improved water source (% of population with access can explain the major variations in our economic growth. The implication of our findings is that in Bangladesh an increase in improved access to water and sanitation is likely to positively affect our economic growth in the long run. Keeping in mind about Sustainable Development Goals (SDG, policymakers in Bangladesh need to pay special attention to ensure greater access to improved water and sanitation to boost our economic growth & development.

  12. Step 1: Human System Interface (HSI) Functional Requirements Document (FRD). Version 2

    Science.gov (United States)

    2006-01-01

    This Functional Requirements Document (FRD) establishes a minimum set of Human System Interface (HSI) functional requirements to achieve the Access 5 Vision of "operating High Altitude, Long Endurance (HALE) Unmanned Aircraft Systems (UAS) routinely, safely, and reliably in the National Airspace System (NAS)". Basically, it provides what functions are necessary to fly UAS in the NAS. The framework used to identify the appropriate functions was the "Aviate, Navigate, Communicate, and Avoid Hazards" structure identified in the Access 5 FRD. As a result, fifteen high-level functional requirements were developed. In addition, several of them have been decomposed into low-level functional requirements to provide more detail.

  13. Access Data Analysis Cookbook

    CERN Document Server

    Bluttman, Ken

    2008-01-01

    This book offers practical recipes to solve a variety of common problems that users have with extracting Access data and performing calculations on it. Whether you use Access 2007 or an earlier version, this book will teach you new methods to query data, different ways to move data in and out of Access, how to calculate answers to financial and investment issues, how to jump beyond SQL by manipulating data with VBA, and more.

  14. Open Access Monitor - DK

    DEFF Research Database (Denmark)

    Svendsen, Michael; Hansen, Lars Asger Juel; Andersen, Dorte

    2017-01-01

    Open Access Monitor - DK (OAM-DK) is a 2-year DEFF funded [DEFF.2016-0018] national project running in 2017-2018 with the aim of collecting, documenting and administrating Open Access publishing costs. OAM-DK is lead by Copenhagen University Library under the Royal Danish Library with participation...... of all Danish University Libraries. This poster presents the first results of Open Access costs related to 2015 publications at the The University of Copenhagen....

  15. Access French

    CERN Document Server

    Grosz, Bernard

    2014-01-01

    Access is the major new language series designed with the needs of today's generation of students firmly in mind. Whether learning for leisure or business purposes or working towards a curriculum qualification, Access French is specially designed for adults of all ages and gives students a thorough grounding in all the skills required to understand, speak, read and write contemporary French from scratch. The coursebook consists of 10 units covering different topic areas, each of which includes Language Focus panels explaining the structures covered and a comprehensive glossary. Learning tips

  16. Rural women and violence situation: access and accessibility limits to the healthcare network.

    Science.gov (United States)

    Costa, Marta Cocco da; Silva, Ethel Bastos da; Soares, Joannie Dos Santos Fachinelli; Borth, Luana Cristina; Honnef, Fernanda

    2017-07-13

    To analyze the access and accessibility to the healthcare network of women dwelling in rural contexts undergoing violence situation, as seen from the professionals' speeches. A qualitative, exploratory, descriptive study with professionals from the healthcare network services about coping with violence in four municipalities in the northern region of Rio Grande do Sul. The information derived from interviews, which have been analyzed by thematic modality. (Lack of) information of women, distance, restricted access to transportation, dependence on the partner and (lack of) attention by professionals to welcome women undergoing violence situation and (non)-articulation of the network are factors that limit the access and, as a consequence, they result in the lack of confrontation of this problem. To bring closer the services which integrate the confrontation network of violence against women and to qualify professionals to welcome these situations are factors that can facilitate the access and adhesion of rural women to the services.

  17. Access to destinations : annual accessibility measure for the Twin Cities Metropolitan Region.

    Science.gov (United States)

    2012-11-01

    This report summarizes previous phases of the Access to Destinations project and applies the techniques developed : over the course of the project to conduct an evaluation of accessibility in the Twin Cities metropolitan region for : 2010. It describ...

  18. Regulatory accessibility and social influences on state self-control.

    Science.gov (United States)

    vanDellen, Michelle R; Hoyle, Rick H

    2010-02-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals' state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-control leads to increases in state self-control and thinking of others with bad trait or state self-control leads to decreases in state self-control. Study 5 provides evidence that the salience of significant others influences both regulatory accessibility and state self-control. Combined, these studies suggest that the effects of social influences on state self-control occur through multiple mechanisms.

  19. Spatial accessibility to basic public health services in South Sudan

    Directory of Open Access Journals (Sweden)

    Peter M. Macharia

    2017-05-01

    Full Text Available At independence in 2011, South Sudan’s health sector was almost non-existent. The first national health strategic plan aimed to achieve an integrated health facility network that would mean that 70% of the population were within 5 km of a health service provider. Publically available data on functioning and closed health facilities, population distribution, road networks, land use and elevation were used to compute the fraction of the population within 1 hour walking distance of the nearest public health facility offering curative services. This metric was summarised for each of the 78 counties in South Sudan and compared with simpler metrics of the proportion of the population within 5 km of a health facility. In 2016, it is estimated that there were 1747 public health facilities, out of which 294 were non-functional in part due to the on-going civil conflict. Access to a service provider was poor with only 25.7% of the population living within one-hour walking time to a facility and 28.6% of the population within 5 km. These metrics, when applied sub-nationally, identified the same high priority, most vulnerable counties. Simple metrics based upon population distribution and location of facilities might be as valuable as more complex models of health access, where attribute data on travel routes are imperfect or incomplete and sparse. Disparities exist in South Sudan among counties and those with the poorest health access should be targeted for priority expansion of clinical services.

  20. Shared access protocol (SAP) in femtocell channel resources for cellular coverage enhancement

    KAUST Repository

    Magableh, Amer M.

    2012-12-01

    Femtocells are promising techniques employed in cellular systems to enhance the indoor coverage, especially in areas with high density and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named shared access protocol (SAP), that enables the unlicensed macro-cell user equipments (MC-UE) to communicate with partially closed access femtocell base stations and hence, improves and enhances the overall system performance in closed environments. For the proposed system model, we obtain, in closed-form, the main signal-to-interference plus noise ratio (SINR) characteristics, including the probability density function (PDF) and the cumulative distribution function (CDF). In addition, these expressions are further used to derive several performance metrics in closed-form, such as, the average bit error rate (BER), outage probability, and the average channel capacity for the proposed SAP herein. Furthermore, Monte-carlo simulations as well as numerical results are provided showing a good match that ensures and confirms the correctness of the derived expressions. © 2012 IEEE.

  1. Error free physically unclonable function with programmed resistive random access memory using reliable resistance states by specific identification-generation method

    Science.gov (United States)

    Tseng, Po-Hao; Hsu, Kai-Chieh; Lin, Yu-Yu; Lee, Feng-Min; Lee, Ming-Hsiu; Lung, Hsiang-Lan; Hsieh, Kuang-Yeu; Chung Wang, Keh; Lu, Chih-Yuan

    2018-04-01

    A high performance physically unclonable function (PUF) implemented with WO3 resistive random access memory (ReRAM) is presented in this paper. This robust ReRAM-PUF can eliminated bit flipping problem at very high temperature (up to 250 °C) due to plentiful read margin by using initial resistance state and set resistance state. It is also promised 10 years retention at the temperature range of 210 °C. These two stable resistance states enable stable operation at automotive environments from -40 to 125 °C without need of temperature compensation circuit. The high uniqueness of PUF can be achieved by implementing a proposed identification (ID)-generation method. Optimized forming condition can move 50% of the cells to low resistance state and the remaining 50% remain at initial high resistance state. The inter- and intra-PUF evaluations with unlimited separation of hamming distance (HD) are successfully demonstrated even under the corner condition. The number of reproduction was measured to exceed 107 times with 0% bit error rate (BER) at read voltage from 0.4 to 0.7 V.

  2. Physical Access Control Database -

    Data.gov (United States)

    Department of Transportation — This data set contains the personnel access card data (photo, name, activation/expiration dates, card number, and access level) as well as data about turnstiles and...

  3. Access to the city

    DEFF Research Database (Denmark)

    Andreasen, Manja Hoppe; Møller-Jensen, Lasse

    2017-01-01

    This paper is concerned with access to the city for urban residents living in the periphery of Dar es Salaam, Tanzania. The paper presents an analysis of the mobility practices of residents and investigates the mobility constraints they experience in relation to the limited accessibility provided...... mobility and access to the city for residents in the periphery. Regular mobility is an ingrained part of residents' livelihood strategies. The majority of households rely on one or more members regularly travelling to central parts of the city in relation to their livelihood activities. The analysis...... by road and traffic conditions and highlights how accessibility problems of peripheral settlements are not easily understood separately from the general dysfunctions of the overall mobility system of city....

  4. The TJ-II Relational Database Access Library: A User's Guide

    International Nuclear Information System (INIS)

    Sanchez, E.; Portas, A. B.; Vega, J.

    2003-01-01

    A relational database has been developed to store data representing physical values from TJ-II discharges. This new database complements the existing TJ-EI raw data database. This database resides in a host computer running Windows 2000 Server operating system and it is managed by SQL Server. A function library has been developed that permits remote access to these data from user programs running in computers connected to TJ-II local area networks via remote procedure cali. In this document a general description of the database and its organization are provided. Also given are a detailed description of the functions included in the library and examples of how to use these functions in computer programs written in the FORTRAN and C languages. (Author) 8 refs

  5. NLM Emergency Access Initiative: FAQs

    Science.gov (United States)

    Facebook Visit us on Twitter Visit us on Youtube Emergency Access Initiative Home | Journals | Books | Online Databases | FAQs Take Short Survey FAQ What is the Emergency Access Initiative? The Emergency Access Initiative (EAI) is a collaborative partnership between NLM and participating publishers to

  6. The “SAFARI” Technique Using Retrograde Access Via Peroneal Artery Access

    International Nuclear Information System (INIS)

    Zhuang, Kun Da; Tan, Seck Guan; Tay, Kiang Hiong

    2012-01-01

    The “SAFARI” technique or subintimal arterial flossing with antegrade–retrograde intervention is a method for recanalisation of chronic total occlusions (CTOs) when subintimal angioplasty fails. Retrograde access is usually obtained via the popliteal, distal anterior tibial artery (ATA)/dorsalis pedis (DP), or distal posterior tibial artery (PTA). Distal access via the peroneal artery has not been described and has a risk of continued bleeding, leading to compartment syndrome due to its deep location. We describe our experience in two patients with retrograde access via the peroneal artery and the use of balloon-assisted hemostasis for these retrograde punctures. This approach may potentially give more options for endovascular interventions in lower limb CTOs.

  7. Application of an access technology delivery protocol to two children with cerebral palsy.

    Science.gov (United States)

    Mumford, Leslie; Chau, Tom

    2015-07-14

    This study further delineates the merits and limitations of the Access Technology Delivery Protocol (ATDP) through its application to two children with severe disabilities. We conducted mixed methods case studies to demonstrate the ATDP with two children with no reliable means of access to an external device. Evaluations of response efficiency, satisfaction, goal attainment, technology use and participation were made after 8 and 16 weeks of training with custom access technologies. After 16 weeks, one child's switch offered improved response efficiency, high teacher satisfaction and increased participation. The other child's switch resulted in improved satisfaction and switch effectiveness but lower overall efficiency. The latter child was no longer using his switch by the end of the study. These contrasting findings indicate that changes to any contextual factors that may impact the user's switch performance should mandate a reassessment of the access pathway. Secondly, it is important to ensure that individuals who will be responsible for switch training be identified at the outset and engaged throughout the ATDP. Finally, the ATDP should continue to be tested with individuals with severe disabilities to build an evidence base for the delivery of response efficient access solutions. Implications for Rehabilitation A data-driven, comprehensive access technology delivery protocol for children with complex communication needs could help to mitigate technology abandonment. Successful adoption of an access technology requires personalized design, training of the technology user, the teaching staff, the caregivers and other communication partners, and integration with functional activities.

  8. Biometrics: Accessibility challenge or opportunity?

    Science.gov (United States)

    Blanco-Gonzalo, Ramon; Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  9. Biometrics: Accessibility challenge or opportunity?

    Science.gov (United States)

    Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael

    2018-01-01

    Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products. PMID:29565989

  10. Functional foods, nutriceuticals and health | Gernah | Nigerian Food ...

    African Journals Online (AJOL)

    Journal Home > Vol 28, No 2 (2010) >. Log in or Register to get access ... This work reviewed the types, uses and effects of functional foods and nutriceuticals on human health (advantages and disadvantages). The different types of functional ...

  11. 36 CFR 1191.1 - Accessibility guidelines.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Accessibility guidelines... COMPLIANCE BOARD AMERICANS WITH DISABILITIES ACT (ADA) ACCESSIBILITY GUIDELINES FOR BUILDINGS AND FACILITIES; ARCHITECTURAL BARRIERS ACT (ABA) ACCESSIBILITY GUIDELINES § 1191.1 Accessibility guidelines. (a) The...

  12. Holistic approaches to e-learning accessibility

    OpenAIRE

    Phipps, Lawrie; Kelly, Brian

    2006-01-01

    The importance of accessibility to digital e-learning resources is widely acknowledged. The World Wide Web Consortium Web Accessibility Initiative has played a leading role in promoting the importance of accessibility and developing guidelines that can help when developing accessible web resources. The accessibility of e-learning resources provides additional challenges. While it is important to consider the technical and resource related aspects of e-learning when designing and developing re...

  13. LHAPDF6: parton density access in the LHC precision era

    International Nuclear Information System (INIS)

    Buckley, Andy; Ferrando, James; Nordstroem, Karl; Lloyd, Stephen; Page, Ben; Ruefenacht, Martin; Schoenherr, Marek; Watt, Graeme

    2015-01-01

    The Fortran LHAPDF library has been a long-term workhorse in particle physics, providing standardised access to parton density functions for experimental and phenomenological purposes alike, following on from the venerable PDFLIB package. During Run 1 of the LHC, however, several fundamental limitations in LHAPDF's design have became deeply problematic, restricting the usability of the library for important physics-study procedures and providing dangerous avenues by which to silently obtain incorrect results. In this paper we present the LHAPDF 6 library, a ground-up re-engineering of the PDFLIB/LHAPDF paradigm for PDF access which removes all limits on use of concurrent PDF sets, massively reduces static memory requirements, offers improved CPU performance, and fixes fundamental bugs in multi-set access to PDF metadata. The new design, restricted for now to interpolated PDFs, uses centralised numerical routines and a powerful cascading metadata system to decouple software releases from provision of new PDF data and allow completely general parton content. More than 200 PDF sets have been migrated from LHAPDF 5 to the new universal data format, via a stringent quality control procedure. LHAPDF 6 is supported by many Monte Carlo generators and other physics programs, in some cases via a full set of compatibility routines, and is recommended for the demanding PDF access needs of LHC Run 2 and beyond. (orig.)

  14. LHAPDF6: parton density access in the LHC precision era

    Energy Technology Data Exchange (ETDEWEB)

    Buckley, Andy; Ferrando, James; Nordstroem, Karl [University of Glasgow, School of Physics and Astronomy, Glasgow (United Kingdom); Lloyd, Stephen [University of Edinburgh, School of Physics and Astronomy, Edinburgh (United Kingdom); Page, Ben [Universidad de Granada, Departamento de Fisica Teorica y del Cosmos y CAFPE, Granada (Spain); Ruefenacht, Martin [University of Edinburgh, School of Informatics, Edinburgh (United Kingdom); Schoenherr, Marek [Universitaet Zuerich, Physik-Institut, Zurich (Switzerland); Watt, Graeme [Durham University, Institute for Particle Physics Phenomenology, Durham (United Kingdom)

    2015-03-01

    The Fortran LHAPDF library has been a long-term workhorse in particle physics, providing standardised access to parton density functions for experimental and phenomenological purposes alike, following on from the venerable PDFLIB package. During Run 1 of the LHC, however, several fundamental limitations in LHAPDF's design have became deeply problematic, restricting the usability of the library for important physics-study procedures and providing dangerous avenues by which to silently obtain incorrect results. In this paper we present the LHAPDF 6 library, a ground-up re-engineering of the PDFLIB/LHAPDF paradigm for PDF access which removes all limits on use of concurrent PDF sets, massively reduces static memory requirements, offers improved CPU performance, and fixes fundamental bugs in multi-set access to PDF metadata. The new design, restricted for now to interpolated PDFs, uses centralised numerical routines and a powerful cascading metadata system to decouple software releases from provision of new PDF data and allow completely general parton content. More than 200 PDF sets have been migrated from LHAPDF 5 to the new universal data format, via a stringent quality control procedure. LHAPDF 6 is supported by many Monte Carlo generators and other physics programs, in some cases via a full set of compatibility routines, and is recommended for the demanding PDF access needs of LHC Run 2 and beyond. (orig.)

  15. The Function to Serve: A Social-Justice-Oriented Investigation of Community College Mission Statements

    Science.gov (United States)

    Andrade, Luis M.; Lundberg, Carol A.

    2018-01-01

    This study investigated the ways that mission statements from 70 Hispanic-serving community colleges communicated their commitment to their Hispanic-serving function. Reference specifically to the Hispanic-serving function was absent, but references to culture and access were relatively common. Findings describe the ways culture and access were…

  16. Specialization of Generic Array Accesses After Inlining

    Directory of Open Access Journals (Sweden)

    Ryohei Tokuda

    2017-02-01

    Full Text Available We have implemented an optimization that specializes type-generic array accesses after inlining of polymorphic functions in the native-code OCaml compiler. Polymorphic array operations (read and write in OCaml require runtime type dispatch because of ad hoc memory representations of integer and float arrays. It cannot be removed even after being monomorphized by inlining because the intermediate language is mostly untyped. We therefore extended it with explicit type application like System F (while keeping implicit type abstraction by means of unique identifiers for type variables. Our optimization has achieved up to 21% speed-up of numerical programs.

  17. Quantitative analysis of access strategies to remoteinformation in network services

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Schwefel, Hans-Peter; Hansen, Martin Bøgsted

    2006-01-01

    of analytic models to compute different performance metrics for these approaches, with special focus on the so-called mismatch probability. The results of the analytic models allow for design decisions on which strategy to implement for specific input parameters (change rate of the information element......Remote access to dynamically changing information elements is a required functionality for various network services, including routing and instances of context-sensitive networking. Three fundamentally different strategies for such access are investigated in this paper: (1) a reactive approach...... initiated by the requesting entity, and two versions of proactive approaches in which the entity that contains the information element actively propagates its changes to potential requesters, either (2) periodically or triggered by changes of the information element (3). This paper first develops a set...

  18. Open Access and ORCID poster presentation

    DEFF Research Database (Denmark)

    Elbæk, Mikael Karstensen; Ekstrøm, Jeannette

    2014-01-01

    and related topics such as copyright, DTU Orbit, Open Access journals, APCs, Vouchers etc. ORCID ORCID – Open Research & Contributor ID – is an internationally recognized and widely used researcher-ID. ORCID makes it easy to reuse your data across disciplines, publishers and databases – all you need to do......Open Access Open Access is high on the agenda in Denmark and internationally. Denmark has announced a national strategy for Open Access that aims to achieve Open Access to 80% in 2017 and 100% in 2022 to peer review research articles. All public Danish funders as well as H2020 requires that all...... peer review articles that is an outcome of their funding will be Open Access. Uploading your full texts (your final author manuscript after review ) to DTU Orbit is a fundamental part of providing Open Access to your research. We are here to answer all your questions with regards to Open Access...

  19. Access to Law : is it here to stay? | CRDI - Centre de recherches ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Transparency of legal procedures is one of the tenets of a well functioning democracy. Until the arrival of the Internet, legal professionals and the public could only obtain primary sources of law through packages sold by commercial publishers. Since then the "open access to law" movement, supported by legal information ...

  20. Human Systems Integration: Requirements and Functional Decomposition

    Science.gov (United States)

    Berson, Barry; Gershzohn, Gary; Boltz, Laura; Wolf, Russ; Schultz, Mike

    2005-01-01

    This deliverable was intended as an input to the Access 5 Policy and Simulation Integrated Product Teams. This document contains high-level pilot functionality for operations in the National Airspace System above FL430. Based on the derived pilot functions the associated pilot information and control requirements are given.

  1. Functional data analysis

    CERN Document Server

    Ramsay, J O

    1997-01-01

    Scientists today collect samples of curves and other functional observations. This monograph presents many ideas and techniques for such data. Included are expressions in the functional domain of such classics as linear regression, principal components analysis, linear modelling, and canonical correlation analysis, as well as specifically functional techniques such as curve registration and principal differential analysis. Data arising in real applications are used throughout for both motivation and illustration, showing how functional approaches allow us to see new things, especially by exploiting the smoothness of the processes generating the data. The data sets exemplify the wide scope of functional data analysis; they are drwan from growth analysis, meterology, biomechanics, equine science, economics, and medicine. The book presents novel statistical technology while keeping the mathematical level widely accessible. It is designed to appeal to students, to applied data analysts, and to experienced researc...

  2. Information on Open Access

    African Journals Online (AJOL)

    Open Access (OA), defined most simply, means free full text online. There are over 130 Open Access journals hosted on the AJOL website. You can find a full list of these journals here: OA journals on AJOL ...

  3. Evaluation of MRI issues for an access port with a radiofrequency identification (RFID) tag.

    Science.gov (United States)

    Titterington, Blake; Shellock, Frank G

    2013-10-01

    A medical implant that contains metal, such as an RFID tag, must undergo proper MRI testing to ensure patient safety and to determine that the function of the RFID tag is not compromised by exposure to MRI conditions. Therefore, the objective of this investigation was to assess MRI issues for a new access port that incorporates an RFID tag. Samples of the access port with an RFID tag (Medcomp Power Injectable Port with CertainID; Medcomp, Harleysville, PA) were evaluated using standard protocols to assess magnetic field interactions (translational attraction and torque; 3-T), MRI-related heating (3-T), artifacts (3-T), and functional changes associated with different MRI conditions (nine samples, exposed to different MRI conditions at 1.5-T and 3-T). Magnetic field interactions were not substantial and will pose no hazards to patients. MRI-related heating was minimal (highest temperature change, 1.7°C; background temperature rise, 1.6°C). Artifacts were moderate in size in relation to the device. Exposures to MRI conditions at 1.5-T and 3-T did not alter or damage the functional aspects of the RFID tag. Based on the findings of the test, this new access port with an RFID tag is acceptable (or, MR conditional, using current MRI labeling terminology) for patients undergoing MRI examinations at 1.5-T/64-MHz and 3-T/128-MHz. Copyright © 2013 Elsevier Inc. All rights reserved.

  4. Approximate Networking for Universal Internet Access

    Directory of Open Access Journals (Sweden)

    Junaid Qadir

    2017-12-01

    Full Text Available Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, global Internet. In this paper, we argue that instead of an exclusive focus on a utopian goal of universally accessible “ideal networking” (in which we have a high throughput and quality of service as well as low latency and congestion, we should consider providing “approximate networking” through the adoption of context-appropriate trade-offs. In this regard, we propose to leverage the advances in the emerging trend of “approximate computing” that rely on relaxing the bounds of precise/exact computing to provide new opportunities for improving the area, power, and performance efficiency of systems by orders of magnitude by embracing output errors in resilient applications. Furthermore, we propose to extend the dimensions of approximate computing towards various knobs available at network layers. Approximate networking can be used to provision “Global Access to the Internet for All” (GAIA in a pragmatically tiered fashion, in which different users around the world are provided a different context-appropriate (but still contextually functional Internet experience.

  5. Youth access to tobacco.

    Science.gov (United States)

    Rigotti, N A

    1999-01-01

    To start smoking, young people need a supply of tobacco products. Reducing youth access to tobacco is a new approach to preventing tobacco use that has been a focus of federal, state, and local tobacco control efforts over the past decade. All 50 states ban tobacco sales to minors, but compliance is poor because laws are not enforced. Consequently, young people have little trouble obtaining tobacco products. Commercial sources of tobacco (stores and vending machines) are important for underage smokers, who often purchase their own cigarettes. Underage youths also obtain tobacco from noncommercial sources such as friends, relatives, older adolescents, and adults. Educating retailers about tobacco sales laws has not produced long-term improvement in their compliance. Active enforcement of tobacco sales laws changes retailer behavior, but whether this reduces young people's access to tobacco or their tobacco use is not clear. The effectiveness of new local, state, and federal actions that aim to reduce youth access to tobacco remains to be determined. Can enforcing tobacco sales laws reduce young people's access to tobacco? If so, will this prevent or delay the onset of their tobacco use? How will youths' sources of tobacco change as commercial sources are restricted? What are the social (noncommercial) sources of tobacco for minors and how can youths' access to tobacco from these sources be reduced? What is the impact of the new federal policies aimed at reducing youth access to tobacco? Do new state and local laws that ban youth possession or use of tobacco have a net positive or negative impact on youth attitudes, access to tobacco, or tobacco use? What is the relative effectiveness and cost-effectiveness of efforts to reduce the supply of tobacco compared to those that aim to reduce demand for tobacco? Will either work alone or are both necessary to achieve reductions in youth smoking?

  6. Access control system operation

    International Nuclear Information System (INIS)

    Barnes, L.D.

    1981-06-01

    An automated method for the control and monitoring of personnel movement throughout the site was developed under contract to the Department of Energy by Allied-General Nuclear Services (AGNS) at the Barnwell Nuclear Fuel Plant (BNFP). These automated features provide strict enforcement of personnel access policy without routine patrol officer involvement. Identification methods include identification by employee ID number, identification by voice verification and identification by physical security officer verification. The ability to grant each level of access authority is distributed over the organization to prevent any single individual at any level in the organization from being capable of issuing an authorization for entry into sensitive areas. Each access event is recorded. As access events occur, the inventory of both the entered and the exited control area is updated so that a current inventory is always available for display. The system has been operated since 1979 in a development mode and many revisions have been implemented in hardware and software as areas were added to the system. Recent changes have involved the installation of backup systems and other features required to achieve a high reliability. The access control system and recent operating experience are described

  7. Biometrics: Accessibility challenge or opportunity?

    Directory of Open Access Journals (Sweden)

    Ramon Blanco-Gonzalo

    Full Text Available Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.

  8. Availability and Accessibility in an Open Access Institutional Repository: A Case Study

    Science.gov (United States)

    Lee, Jongwook; Burnett, Gary; Vandegrift, Micah; Baeg, Jung Hoon; Morris, Richard

    2015-01-01

    Introduction: This study explores the extent to which an institutional repository makes papers available and accessible on the open Web by using 170 journal articles housed in DigiNole Commons, the institutional repository at Florida State University. Method: To analyse the repository's impact on availability and accessibility, we conducted…

  9. Market Access and Welfare

    DEFF Research Database (Denmark)

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    According to the literature, well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. Such conflict between welfare and market access...... objectives of trade policy is problematic and calls for finding alternative tariff reform rules that can achieve both objectives at the same time. The present paper contributes to this aim by using a new set of tariff reforms that are based on local optimality. Using such reforms it is shown that market...... access and consumer welfare will always be weakly compatible, in the sense that reforms based on each objective have the same signed effect on the other objective. For strong compatibility, whereby both objectives increase as a result of a locally optimal tariff reform, we derive both a necessary...

  10. Cognitive function and the agreement between self-reported and accelerometer-accessed physical activity.

    Science.gov (United States)

    Herbolsheimer, Florian; Riepe, Matthias W; Peter, Richard

    2018-02-21

    Numerous studies have reported weak or moderate correlations between self-reported and accelerometer-assessed physical activity. One explanation is that self-reported physical activity might be biased by demographic, cognitive or other factors. Cognitive function is one factor that could be associated with either overreporting or underreporting of daily physical activity. Difficulties in remembering past physical activities might result in recall bias. Thus, the current study examines whether the cognitive function is associated with differences between self-reported and accelerometer-assessed physical activity. Cross-sectional data from the population-based Activity and Function in the Elderly in Ulm study (ActiFE) were used. A total of 1172 community-dwelling older adults (aged 65-90 years) wore a uniaxial accelerometer (activPAL unit) for a week. Additionally, self-reported physical activity was assessed using the LASA Physical Activity Questionnaire (LAPAQ). Cognitive function was measured with four items (immediate memory, delayed memory, recognition memory, and semantic fluency) from the Consortium to Establish a Registry for Alzheimer's Disease Total Score (CERAD-TS). Mean differences of self-reported and accelerometer-assessed physical activity (MPA) were associated with cognitive function in men (r s  = -.12, p = .002) but not in women. Sex-stratified multiple linear regression analyses showed that MPA declined with high cognitive function in men (β = -.13; p = .015). Results suggest that self-reported physical activity should be interpreted with caution in older populations, as cognitive function was one factor that explained the differences between objective and subjective physical activity measurements.

  11. Problems and Concerns Regarding Access Control System Construction in Radiation Facilities Based on the NIFS Experience

    International Nuclear Information System (INIS)

    Kawano, T.; Inoue, N.; Sakuma, Y.; Motojima, O.

    2001-01-01

    Full text: In 1998, access control system for the large helical device (LHD) experimental hall was constructed and put into operation at the National Institute for Fusion Science (NIFS) in Toki, Japan. Since then, the system has been continuously improved. It now controls access into the LHD controlled area through four entrances. The system has five turnstile gates and enables control of access at the four entrances. The system is always checking whether the shielding doors are open or closed at eight positions. The details pertaining to the construction of the system were reported at IRPA-10 held in Hiroshima, Japan, in 2000. Based on our construction experience of the NIFS access control system, we will discuss problems related to software and operational design of the system. We will also discuss some concerns regarding the use of the system in radiation facilities. The problems we will present concern, among other thing, individual registration, time control, turnstile control, interlock signal control, data aggregation and transactions, automatic and manual control, and emergency procedures. For example, in relation to the time control and turnstile control functions, we will discuss the gate-opening time interval for an access event, the timing of access data recording, date changing, turn bar control, double access, and access error handling. (author)

  12. Access 2010 for dummies

    CERN Document Server

    Ulrich Fuller, Laurie

    2010-01-01

    A friendly, step-by-step guide to the Microsoft Office database application Access may be the least understood and most challenging application in the Microsoft Office suite. This guide is designed to help anyone who lacks experience in creating and managing a database learn to use Access 2010 quickly and easily. In the classic For Dummies tradition, the book provides an education in Access, the interface, and the architecture of a database. It explains the process of building a database, linking information, sharing data, generating reports, and much more.As the Micr

  13. Deployment of Remotely-Accessible Robotics Laboratory

    Directory of Open Access Journals (Sweden)

    Richard Balogh

    2012-03-01

    Full Text Available Robotnacka is an autonomous drawing mobile robot, designed for eaching beginners in the Logo programming language. It can also be used as an experimental platform, in our case in a remotely accessible robotic laboratory with the possibility to control the robots via the Internet. In addition to a basic version of the robot a version equipped with a gripper is available too, one with a wireless camera, and one with additional ultrasonic distance sensors. The laboratory is available on-line permanently and provides a simple way to incorporate robotics in teaching mathematics, programming and other subjects. The laboratory has been in use several years. We provide description of its functionality and summarize our experience.

  14. Functional specification and architecture of EIAO DW, R2.2

    DEFF Research Database (Denmark)

    Pedersen, Torben Bach; Thomsen, Christian

    In this document, the functional specification and architecture for the EIAO DW is presented. EIAO DW is a data warehouse that holds results from the European Internet Accessibility Observatory (EIAO) project. These results are mainly on the accessibility to disabled users of web resources...

  15. Medical smart cards: health care access in your pocket.

    Science.gov (United States)

    Krohn, R W

    2000-01-01

    The wallet-sized medical smart card, embedded with a programmable computer chip, stores and transmits a cardholder's clinical, insurance coverage and biographical information. When fully deployed, smart cards will conduct many functions at the point of care, from claims submission to medical records updates in real time. Ultimately, the smart card will make the individual patient record and all clinical and economic transactions within that patient log as portable, accessible and secure as an ATM account.

  16. Regulatory Accessibility and Social Influences on State Self-Control

    OpenAIRE

    vanDellen, Michelle R.; Hoyle, Rick H.

    2009-01-01

    The current work examined how social factors influence self-control. Current conceptions of state self-control treat it largely as a function of regulatory capacity. The authors propose that state self-control might also be influenced by social factors because of regulatory accessibility. Studies 1 through 4 provide evidence that individuals’ state self-control is influenced by the trait and state self-control of salient others such that thinking of others with good trait or state self-contro...

  17. OPACs: The User and Subject Access.

    Science.gov (United States)

    Carson, Elizabeth

    1985-01-01

    This survey of the literature reveals user and professional opinions of changes in subject access features available for online public access catalogs. Highlights include expanded access to fields already incorporated into traditional MARC record, access to context of the record, and design of the user interface. Twenty-four references are cited.…

  18. The AAS Working Group on Accessibility and Disability (WGAD) Year 1 Highlights and Database Access

    Science.gov (United States)

    Knierman, Karen A.; Diaz Merced, Wanda; Aarnio, Alicia; Garcia, Beatriz; Monkiewicz, Jacqueline A.; Murphy, Nicholas Arnold

    2017-06-01

    The AAS Working Group on Accessibility and Disability (WGAD) was formed in January of 2016 with the express purpose of seeking equity of opportunity and building inclusive practices for disabled astronomers at all educational and career stages. In this presentation, we will provide a summary of current activities, focusing on developing best practices for accessibility with respect to astronomical databases, publications, and meetings. Due to the reliance of space sciences on databases, it is important to have user centered design systems for data retrieval. The cognitive overload that may be experienced by users of current databases may be mitigated by use of multi-modal interfaces such as xSonify. Such interfaces would be in parallel or outside the original database and would not require additional software efforts from the original database. WGAD is partnering with the IAU Commission C1 WG Astronomy for Equity and Inclusion to develop such accessibility tools for databases and methods for user testing. To collect data on astronomical conference and meeting accessibility considerations, WGAD solicited feedback from January AAS attendees via a web form. These data, together with upcoming input from the community and analysis of accessibility documents of similar conferences, will be used to create a meeting accessibility document. Additionally, we will update the progress of journal access guidelines and our social media presence via Twitter. We recommend that astronomical journals form committees to evaluate the accessibility of their publications by performing user-centered usability studies.

  19. Time dependent accessibility

    OpenAIRE

    Kaza, Nikhil

    2015-01-01

    Many place based accessibility studies ignore the time component. Relying on theoretical frameworks that treat distance between two fixed points as constant, these methods ignore the diurnal and seasonal changes in accessibility. Network distances between two nodes are dependent on the network structure and weight distribution on the edges. These weights can change quite frequently and the network structure itself is subject to modification because of availability and unavailability of links ...

  20. CERN access cards

    CERN Multimedia

    HR Department

    2007-01-01

    Holders of CERN access cards are reminded that the card is an official document. It is important to carry it with you at all times when you are on the site. This applies also to those on standby duty who are called out for emergency interventions. As announced in Weekly Bulletin 13/2006, any loss or theft of access cards must be declared to the competent external authorities.

  1. Open Access Publishing - Strengths and Strategies

    Science.gov (United States)

    Rasmussen, Martin

    2010-05-01

    The journal crisis and the demand for free accessibility to the results of publicly funded research were the main drivers of the Open Access movement since the late 1990's. Besides many academic institutions that support the different ways of Open Access publishing, there is a growing number of publishing houses that are specialized on this new access and business model of scholarly literature. The lecture provides an overview of the different kinds of Open Access publishing, discusses the variety of underlying business models, names the advantages and potentials for researches and the public, and overcomes some objections against Open Access. Besides the increased visibility and information supply, the topic of copyrights and exploitation rights will be discussed. Furthermore, it is a central aim of the presentation to show that Open Access does not only support full peer-review, but also provides the potential for even enhanced quality assurance. The financing of business models based on open accessible literature is another important part to be outlined in the lecture.

  2. Does Technical Success of Angioplasty in Dysfunctional Hemodialysis Accesses Correlate with Access Patency?

    Energy Technology Data Exchange (ETDEWEB)

    Sidhu, Arshdeep; Tan, Kong T.; Noel-Lamy, Maxime; Simons, Martin E.; Rajan, Dheeraj K., E-mail: dheeraj.rajan@uhn.ca [University Health Network, University of Toronto, Division of Vascular and Interventional Radiology, Peter Munk Cardiac Center (Canada)

    2016-10-15

    PurposeTo study if <30 % residual stenosis post angioplasty (PTA) correlates with primary access circuit patency, and if any variables predict technical success.Materials and MethodsA prospective observational study was performed between January 2009 and December 2012, wherein 76 patients underwent 154 PTA events in 56 prosthetic grafts (AVG) and 98 autogenous fistulas (AVF). Data collected included patient age, gender, lesion location and laterality, access type and location, number of prior interventions, and transonic flow rates pre- and postintervention. Impact of technical outcome on access patency was assessed. Univariate logistic regression was used to assess the impact of variables on technical success with significant factors assessed with a multiple variable model.ResultsTechnical success rates of PTA in AVFs and AVGs were 79.6 and 76.7 %, respectively. Technical failures of PTA were associated with an increased risk of patency loss among circuits with AVFs (p < 0.05), but not with AVGs (p = 0.7). In AVFs, primary access patency rates between technical successes and failures at three and 6 months were 74.4 versus 61.9 % (p = 0.3) and 53.8 versus 23.8 % (p < 0.05), respectively. In AVGs, primary access patency rates between technical successes and failures at three and six months were 72.1 versus 53.9 % (p = 0.5) and 33.6 versus 38.5 % (p = 0.8), respectively. Transonic flow rates did not significantly differ among technically successful or failed outcomes at one or three months.ConclusionTechnical failures of PTA had a significant impact on access patency among AVFs with a trend toward poorer access patency within AVGs.

  3. Does Technical Success of Angioplasty in Dysfunctional Hemodialysis Accesses Correlate with Access Patency?

    International Nuclear Information System (INIS)

    Sidhu, Arshdeep; Tan, Kong T.; Noel-Lamy, Maxime; Simons, Martin E.; Rajan, Dheeraj K.

    2016-01-01

    PurposeTo study if <30 % residual stenosis post angioplasty (PTA) correlates with primary access circuit patency, and if any variables predict technical success.Materials and MethodsA prospective observational study was performed between January 2009 and December 2012, wherein 76 patients underwent 154 PTA events in 56 prosthetic grafts (AVG) and 98 autogenous fistulas (AVF). Data collected included patient age, gender, lesion location and laterality, access type and location, number of prior interventions, and transonic flow rates pre- and postintervention. Impact of technical outcome on access patency was assessed. Univariate logistic regression was used to assess the impact of variables on technical success with significant factors assessed with a multiple variable model.ResultsTechnical success rates of PTA in AVFs and AVGs were 79.6 and 76.7 %, respectively. Technical failures of PTA were associated with an increased risk of patency loss among circuits with AVFs (p < 0.05), but not with AVGs (p = 0.7). In AVFs, primary access patency rates between technical successes and failures at three and 6 months were 74.4 versus 61.9 % (p = 0.3) and 53.8 versus 23.8 % (p < 0.05), respectively. In AVGs, primary access patency rates between technical successes and failures at three and six months were 72.1 versus 53.9 % (p = 0.5) and 33.6 versus 38.5 % (p = 0.8), respectively. Transonic flow rates did not significantly differ among technically successful or failed outcomes at one or three months.ConclusionTechnical failures of PTA had a significant impact on access patency among AVFs with a trend toward poorer access patency within AVGs.

  4. ITS Multi-path Communications Access Decision Scheme

    Directory of Open Access Journals (Sweden)

    Miroslav Svitek

    2008-02-01

    Full Text Available Intelligent Transport Systems (ITS require widely spread and guarantied quality communications services. Method of ITS decomposition to set of subsystems and quantification of communications subsystems parameters is introduced. Due to typical complexity of the IST solution and mobility as the typical system elements property idea of communications systems with multipath multivendor structures is adopted. Resolution of seamless switching within a set of available wireless access solutions is presented. CALM based system or specifically designed and configured L3/L2 switching can be relevant solution for multi-path access communication system. These systems meet requirements of the seamless secure communications functionality within even extensive cluster of moving objects. Competent decision processes based on precisely quantified system requirements and each performance indicator tolerance range must be implemented to keep service up and running with no influence of continuously changing conditions in time and served space. Method of different paths service quality evaluation and selection of the best possible active communications access path is introduced. Proposed approach is based on Kalman filtering, which separates reasonable part of noise and also allows prediction of the individual parameters near future behavior. Presented classification algorithm applied on filtered measured data combined with deterministic parameters is trained using training data, i.e. combination of parameters vectors line and relevant decisions. Quality of classification is dependent on the size and quality of the training sets. This method is studied within projects e-Ident, DOTEK and SRATVU which are elaborating results of project CAMNA.

  5. Efficient Access Control in Multimedia Social Networks

    Science.gov (United States)

    Sachan, Amit; Emmanuel, Sabu

    Multimedia social networks (MMSNs) have provided a convenient way to share multimedia contents such as images, videos, blogs, etc. Contents shared by a person can be easily accessed by anybody else over the Internet. However, due to various privacy, security, and legal concerns people often want to selectively share the contents only with their friends, family, colleagues, etc. Access control mechanisms play an important role in this situation. With access control mechanisms one can decide the persons who can access a shared content and who cannot. But continuously growing content uploads and accesses, fine grained access control requirements (e.g. different access control parameters for different parts in a picture), and specific access control requirements for multimedia contents can make the time complexity of access control to be very large. So, it is important to study an efficient access control mechanism suitable for MMSNs. In this chapter we present an efficient bit-vector transform based access control mechanism for MMSNs. The proposed approach is also compatible with other requirements of MMSNs, such as access rights modification, content deletion, etc. Mathematical analysis and experimental results show the effectiveness and efficiency of our proposed approach.

  6. Equity for open-access journal publishing.

    Directory of Open Access Journals (Sweden)

    Stuart M Shieber

    2009-08-01

    Full Text Available Open-access journals, which provide access to their scholarly articles freely and without limitations, are at a systematic disadvantage relative to traditional closed-access journal publishing and its subscription-based business model. A simple, cost-effective remedy to this inequity could put open-access publishing on a path to become a sustainable, efficient system.

  7. Does Access Trump Ownership? Exploring Consumer Acceptance of Access-Based Consumption in the Case of Smartphones

    Directory of Open Access Journals (Sweden)

    Flora Poppelaars

    2018-06-01

    Full Text Available Value creation in a circular economy is based on products being returned after use. In the case of smartphones, most are never returned and tend to be kept in drawers. Smartphone access services (e.g., leasing or upgrade have been experimented with in the Netherlands but have been largely unsuccessful. This study explores the reasons why consumers rejected these access-based smartphone services and is one of the very few to address this topic. The findings are compared with the case of car access services, which are socially better accepted, to identify potential areas for improvement. The qualitative study consists of in-depth interviews with consumers (n = 18 who either adopted and used a smartphone or car access service, or had considered a new smartphone or car but did not choose access-based consumption. The findings of this small-scale study suggest that the main reasons for the rejection of smartphone access services are a lack of awareness, misunderstanding of terms and conditions, and unsatisfactory compensation for their sacrifice of not owning. Smartphone access providers could thus clearly communicate customers’ rights and responsibilities, offer an excellent service experience (especially during repair by taking over the burdens of ownership, and stimulate the societal logic shift from ownership to access.

  8. Virtual Hubs for facilitating access to Open Data

    Science.gov (United States)

    Mazzetti, Paolo; Latre, Miguel Á.; Ernst, Julia; Brumana, Raffaella; Brauman, Stefan; Nativi, Stefano

    2015-04-01

    set of five Virtual Hubs (VHs) at national level in France, Germany, Italy, Poland, Spain and an additional one at the European level. VHs will be provided according to the cloud Software-as-a-Services model. The main expected impact of VHs is the creation of new business opportunities opening up access to Research Data and Public Sector Information. Therefore, ENERGIC-OD addresses not only end-users, who will have the opportunity to access the VH through a geo-portal, but also application developers who will be able to access VH functionalities through simple Application Programming Interfaces (API). ENERGIC-OD Consortium will develop ten different applications on top of the deployed VHs. They aim to demonstrate how VHs facilitate the development of new and multidisciplinary applications based on the full exploitation of (open) GI, hence stimulating innovation and business activities.

  9. A service-oriented data access control model

    Science.gov (United States)

    Meng, Wei; Li, Fengmin; Pan, Juchen; Song, Song; Bian, Jiali

    2017-01-01

    The development of mobile computing, cloud computing and distributed computing meets the growing individual service needs. Facing with complex application system, it's an urgent problem to ensure real-time, dynamic, and fine-grained data access control. By analyzing common data access control models, on the basis of mandatory access control model, the paper proposes a service-oriented access control model. By regarding system services as subject and data of databases as object, the model defines access levels and access identification of subject and object, and ensures system services securely to access databases.

  10. Accessibility of public services

    NARCIS (Netherlands)

    Poort, J.P.; Groot, I.; Kok, L.; de Graaf, D.; Hof, B.J.F.

    2005-01-01

    The accessibility of certain products and services to all people, irrespective of their income, age, health and geographical location is considered to be of great social importance. Think for instance of health care, education, electricity, and sanitation. Accessibility can be secured in a variety

  11. Market Access and Welfare

    DEFF Research Database (Denmark)

    Raimondos-Møller, Pascalis; Woodland, Alan D.

    2015-01-01

    Well known tariff reform rules that are guaranteed to increase welfare will not necessarily increase market access, while rules that are guaranteed to increase market access will not necessarily increase welfare. The present paper proposes a new set of tariff reforms that can achieve both...

  12. Microsoft Access Small Business Solutions State-of-the-Art Database Models for Sales, Marketing, Customer Management, and More Key Business Activities

    CERN Document Server

    Hennig, Teresa; Linson, Larry; Purvis, Leigh; Spaulding, Brent

    2010-01-01

    Database models developed by a team of leading Microsoft Access MVPs that provide ready-to-use solutions for sales, marketing, customer management and other key business activities for most small businesses. As the most popular relational database in the world, Microsoft Access is widely used by small business owners. This book responds to the growing need for resources that help business managers and end users design and build effective Access database solutions for specific business functions. Coverage includes::; Elements of a Microsoft Access Database; Relational Data Model; Dealing with C

  13. Accessibility of Real Estate by Transportation as a Determinant of the Development of Suburban Real Estate Markets – Case Study

    Directory of Open Access Journals (Sweden)

    Wolny Ada

    2016-03-01

    Full Text Available The aim of this article is to show the accessibility of real estate by transportation as a factor that significantly determines the decision to acquire it. Direct access to a public road, or access to an internal road that provides communication with the public road, are a factor affecting the value of real estate. In addition, this factor is taken into account in the process of changing the function of the area, especially in determining zoning and land use. The decision of purchasing real estate often depends on transportation accessibility, because it has an impact on developing the selected plot.

  14. Modeling coding-sequence evolution within the context of residue solvent accessibility.

    Science.gov (United States)

    Scherrer, Michael P; Meyer, Austin G; Wilke, Claus O

    2012-09-12

    Protein structure mediates site-specific patterns of sequence divergence. In particular, residues in the core of a protein (solvent-inaccessible residues) tend to be more evolutionarily conserved than residues on the surface (solvent-accessible residues). Here, we present a model of sequence evolution that explicitly accounts for the relative solvent accessibility of each residue in a protein. Our model is a variant of the Goldman-Yang 1994 (GY94) model in which all model parameters can be functions of the relative solvent accessibility (RSA) of a residue. We apply this model to a data set comprised of nearly 600 yeast genes, and find that an evolutionary-rate ratio ω that varies linearly with RSA provides a better model fit than an RSA-independent ω or an ω that is estimated separately in individual RSA bins. We further show that the branch length t and the transition-transverion ratio κ also vary with RSA. The RSA-dependent GY94 model performs better than an RSA-dependent Muse-Gaut 1994 (MG94) model in which the synonymous and non-synonymous rates individually are linear functions of RSA. Finally, protein core size affects the slope of the linear relationship between ω and RSA, and gene expression level affects both the intercept and the slope. Structure-aware models of sequence evolution provide a significantly better fit than traditional models that neglect structure. The linear relationship between ω and RSA implies that genes are better characterized by their ω slope and intercept than by just their mean ω.

  15. Modeling coding-sequence evolution within the context of residue solvent accessibility

    Directory of Open Access Journals (Sweden)

    Scherrer Michael P

    2012-09-01

    Full Text Available Abstract Background Protein structure mediates site-specific patterns of sequence divergence. In particular, residues in the core of a protein (solvent-inaccessible residues tend to be more evolutionarily conserved than residues on the surface (solvent-accessible residues. Results Here, we present a model of sequence evolution that explicitly accounts for the relative solvent accessibility of each residue in a protein. Our model is a variant of the Goldman-Yang 1994 (GY94 model in which all model parameters can be functions of the relative solvent accessibility (RSA of a residue. We apply this model to a data set comprised of nearly 600 yeast genes, and find that an evolutionary-rate ratio ω that varies linearly with RSA provides a better model fit than an RSA-independent ω or an ω that is estimated separately in individual RSA bins. We further show that the branch length t and the transition-transverion ratio κ also vary with RSA. The RSA-dependent GY94 model performs better than an RSA-dependent Muse-Gaut 1994 (MG94 model in which the synonymous and non-synonymous rates individually are linear functions of RSA. Finally, protein core size affects the slope of the linear relationship between ω and RSA, and gene expression level affects both the intercept and the slope. Conclusions Structure-aware models of sequence evolution provide a significantly better fit than traditional models that neglect structure. The linear relationship between ω and RSA implies that genes are better characterized by their ω slope and intercept than by just their mean ω.

  16. The 'SAFARI' Technique Using Retrograde Access Via Peroneal Artery Access

    Energy Technology Data Exchange (ETDEWEB)

    Zhuang, Kun Da, E-mail: zkunda@gmail.com [Singapore General Hospital, Interventional Radiology Centre (Singapore); Tan, Seck Guan [Singapore General Hospital, Department of General Surgery (Singapore); Tay, Kiang Hiong [Singapore General Hospital, Interventional Radiology Centre (Singapore)

    2012-08-15

    The 'SAFARI' technique or subintimal arterial flossing with antegrade-retrograde intervention is a method for recanalisation of chronic total occlusions (CTOs) when subintimal angioplasty fails. Retrograde access is usually obtained via the popliteal, distal anterior tibial artery (ATA)/dorsalis pedis (DP), or distal posterior tibial artery (PTA). Distal access via the peroneal artery has not been described and has a risk of continued bleeding, leading to compartment syndrome due to its deep location. We describe our experience in two patients with retrograde access via the peroneal artery and the use of balloon-assisted hemostasis for these retrograde punctures. This approach may potentially give more options for endovascular interventions in lower limb CTOs.

  17. Dual-mode ultraflow access networks: a hybrid solution for the access bottleneck

    Science.gov (United States)

    Kazovsky, Leonid G.; Shen, Thomas Shunrong; Dhaini, Ahmad R.; Yin, Shuang; De Leenheer, Marc; Detwiler, Benjamin A.

    2013-12-01

    Optical Flow Switching (OFS) is a promising solution for large Internet data transfers. In this paper, we introduce UltraFlow Access, a novel optical access network architecture that offers dual-mode service to its end-users: IP and OFS. With UltraFlow Access, we design and implement a new dual-mode control plane and a new dual-mode network stack to ensure efficient connection setup and reliable and optimal data transmission. We study the impact of the UltraFlow system's design on the network throughput. Our experimental results show that with an optimized system design, near optimal (around 10 Gb/s) OFS data throughput can be attained when the line rate is 10Gb/s.

  18. Representations of Multiple-Valued Logic Functions

    CERN Document Server

    Stankovic, Radomir S

    2012-01-01

    Compared to binary switching functions, multiple-valued functions offer more compact representations of the information content of signals modeled by logic functions and, therefore, their use fits very well in the general settings of data compression attempts and approaches. The first task in dealing with such signals is to provide mathematical methods for their representation in a way that will make their application in practice feasible.Representation of Multiple-Valued Logic Functions is aimed at providing an accessible introduction to these mathematical techniques that are necessary for ap

  19. System performances of optical space code-division multiple-access-based fiber-optic two-dimensional parallel data link.

    Science.gov (United States)

    Nakamura, M; Kitayama, K

    1998-05-10

    Optical space code-division multiple access is a scheme to multiplex and link data between two-dimensional processors such as smart pixels and spatial light modulators or arrays of optical sources like vertical-cavity surface-emitting lasers. We examine the multiplexing characteristics of optical space code-division multiple access by using optical orthogonal signature patterns. The probability density function of interference noise in interfering optical orthogonal signature patterns is calculated. The bit-error rate is derived from the result and plotted as a function of receiver threshold, code length, code weight, and number of users. Furthermore, we propose a prethresholding method to suppress the interference noise, and we experimentally verify that the method works effectively in improving system performance.

  20. Accessible Earth: Enhancing diversity in the Geosciences through accessible course design

    Science.gov (United States)

    Bennett, R. A.; Lamb, D. A.

    2017-12-01

    The tradition of field-based instruction in the geoscience curriculum, which culminates in a capstone geological field camp, presents an insurmountable barrier to many disabled students who might otherwise choose to pursue geoscience careers. There is a widespread perception that success as a practicing geoscientist requires direct access to outcrops and vantage points available only to those able to traverse inaccessible terrain. Yet many modern geoscience activities are based on remotely sensed geophysical data, data analysis, and computation that take place entirely from within the laboratory. To challenge the perception of geoscience as a career option only for the non-disabled, we have created the capstone Accessible Earth Study Abroad Program, an alternative to geologic field camp for all students, with a focus on modern geophysical observation systems, computational thinking, data science, and professional development.In this presentation, we will review common pedagogical approaches in geosciences and current efforts to make the field more inclusive. We will review curricular access and inclusivity relative to a wide range of learners and provide examples of accessible course design based on our experiences in teaching a study abroad course in central Italy, and our plans for ongoing assessment, refinement, and dissemination of the effectiveness of our efforts.

  1. Vehicle barrier with access delay

    Science.gov (United States)

    Swahlan, David J; Wilke, Jason

    2013-09-03

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  2. On the performance of shared access control strategy for femtocells

    KAUST Repository

    Magableh, Amer M.

    2013-02-18

    Femtocells can be employed in cellular systems to enhance the indoor coverage, especially in the areas with high capacity growing demands and high traffic rates. In this paper, we propose an efficient resource utilization protocol, named as shared access protocol (SAP), to enable the unauthorized macrocell user equipment to communicate with partially closed-access femtocell base station to improve and enhance the system performance. The system model considers a femtocell that is equipped with a total of N separated antennas or channels to multiplex independent traffic. Then, a set of N1 channels is used for closed access only by the authorized users, and the remaining set of channel resources can be used for open access by either authorized or unauthorized users upon their demands and spatial locations. For this system model, we obtain the signal-to-interference ratio characteristics, such as the distribution and the moment generating function, in closed forms for two fading models of indoor and outdoor environments. The signal-tointerference ratio statistics are then used to derive some important performance measures of the proposed SAP in closed form, such as the average bit error rate, outage probability, and average channel capacity for the two fading models under consideration. Numerical results for the obtained expressions are provided and supported by Monte Carlo simulations to validate the analytical development and study the effectiveness of the proposed SAP under different conditions. Copyright © 2012 John Wiley and Sons, Ltd.

  3. Bank Access Control of Electronic Payment Based on SPKI%基于SPKI电子支付中的银行端访问控制

    Institute of Scientific and Technical Information of China (English)

    王茜; 王富强; 傅鹤岗; 朱庆生

    2003-01-01

    In the system of electronic payment based on SPKI, access control of bank acts as the important function of identification, protecting customer's privacy and ensuring payment. The paper proposes the model of bank access control, and describes the frame and the steps of the access control. Finally, the paper analyzes the characteristics of the model.

  4. Achieving open access to conservation science.

    Science.gov (United States)

    Fuller, Richard A; Lee, Jasmine R; Watson, James E M

    2014-12-01

    Conservation science is a crisis discipline in which the results of scientific enquiry must be made available quickly to those implementing management. We assessed the extent to which scientific research published since the year 2000 in 20 conservation science journals is publicly available. Of the 19,207 papers published, 1,667 (8.68%) are freely downloadable from an official repository. Moreover, only 938 papers (4.88%) meet the standard definition of open access in which material can be freely reused providing attribution to the authors is given. This compares poorly with a comparable set of 20 evolutionary biology journals, where 31.93% of papers are freely downloadable and 7.49% are open access. Seventeen of the 20 conservation journals offer an open access option, but fewer than 5% of the papers are available through open access. The cost of accessing the full body of conservation science runs into tens of thousands of dollars per year for institutional subscribers, and many conservation practitioners cannot access pay-per-view science through their workplace. However, important initiatives such as Research4Life are making science available to organizations in developing countries. We urge authors of conservation science to pay for open access on a per-article basis or to choose publication in open access journals, taking care to ensure the license allows reuse for any purpose providing attribution is given. Currently, it would cost $51 million to make all conservation science published since 2000 freely available by paying the open access fees currently levied to authors. Publishers of conservation journals might consider more cost effective models for open access and conservation-oriented organizations running journals could consider a broader range of options for open access to nonmembers such as sponsorship of open access via membership fees. © 2014 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of the Society for

  5. Rural Community Development Strategy beyond the Access to Information

    DEFF Research Database (Denmark)

    Akther, Farzana

    2012-01-01

    Telecenters is one of the promising models recognized by the United Nations (UN) to achieve the global access of ICTs. This paper provides insight in the role and usages of Information and Communication Technology for Development (ICT4D) projects with a specific focus of telecenters in developing...... the policy and actual practices of rural community with respect of ICT development.......Telecenters is one of the promising models recognized by the United Nations (UN) to achieve the global access of ICTs. This paper provides insight in the role and usages of Information and Communication Technology for Development (ICT4D) projects with a specific focus of telecenters in developing...... country Bangladesh. This study covers four aspects of the functioning of telecenters grounded in social, economical and action resources: ‘situated success’, ‘information culture and tradition’, ‘typology of resources’ and ‘functioning’. The study contributes to the theory and practice of ICT...

  6. Checklist "Open Access Policies": Analysis of the Open Access Policies of Public Universities in Austria

    Directory of Open Access Journals (Sweden)

    Bruno Bauer

    2016-12-01

    Full Text Available This checklist provides an overview of the Open Access policies implemented at Austrian universities and extramural research institutions. Furthermore, the polices adopted at nine public universities are analyzed and the respective text modules are categorized thematically. The second part of the checklist presents measures for the promotion of Open Access following the implementation of an Open Access policy.

  7. 36 CFR 1194.31 - Functional performance criteria.

    Science.gov (United States)

    2010-07-01

    ... BARRIERS COMPLIANCE BOARD ELECTRONIC AND INFORMATION TECHNOLOGY ACCESSIBILITY STANDARDS Functional... technology used by people who are deaf or hard of hearing shall be provided. (d) Where audio information is...

  8. Three essays on access pricing

    Science.gov (United States)

    Sydee, Ahmed Nasim

    In the first essay, a theoretical model is developed to determine the time path of optimal access price in the telecommunications industry. Determining the optimal access price is an important issue in the economics of telecommunications. Setting a high access price discourages potential entrants; a low access price, on the other hand, amounts to confiscation of private property because the infrastructure already built by the incumbent is sunk. Furthermore, a low access price does not give the incumbent incentives to maintain the current network and to invest in new infrastructures. Much of the existing literature on access pricing suffers either from the limitations of a static framework or from the assumption that all costs are avoidable. The telecommunications industry is subject to high stranded costs and, therefore, to address this issue a dynamic model is imperative. This essay presents a dynamic model of one-way access pricing in which the compensation involved in deregulatory taking is formalized and then analyzed. The short run adjustment after deregulatory taking has occurred is carried out and discussed. The long run equilibrium is also analyzed. A time path for the Ramsey price is shown as the correct dynamic price of access. In the second essay, a theoretical model is developed to determine the time path of optimal access price for an infrastructure that is characterized by congestion and lumpy investment. Much of the theoretical literature on access pricing of infrastructure prescribes that the access price be set at the marginal cost of the infrastructure. In proposing this rule of access pricing, the conventional analysis assumes that infrastructure investments are infinitely divisible so that it makes sense to talk about the marginal cost of investment. Often it is the case that investments in infrastructure are lumpy and can only be made in large chunks, and this renders the marginal cost concept meaningless. In this essay, we formalize a model of

  9. Open Access og Den Bibliometriske Forskningsindikator

    DEFF Research Database (Denmark)

    Dorch, Bertil

    2011-01-01

    I sine "Anbefalinger til implementering af Open Access i Danmark" foreslår det nationale Open Access Udvalget blandet andet, at Den Bibliometriske Forskningsindikator (BFI) bør koordineres med en national Open Access-politik. I dette paper, der er baseret på et blogindlæg, fremfører forfatteren...... fire grunde til, hvorfor han synes det er en dårlig idé at koble Open Access til BFI....

  10. Access control and interlock system at the Advanced Photon Source

    International Nuclear Information System (INIS)

    Forrestal, J.; Hogrefe, R.; Knott, M.; McDowell, W.; Reigle, D.; Solita, L.; Koldenhoven, R.; Haid, D.

    1997-01-01

    The Advanced Photon Source (APS) consists of a linac, position accumulator ring (PAR), booster synchrotron, storage ring, and up to 70 experimental beamlines. The Access Control and Interlock System (ACIS) utilizes redundant programmable logic controllers (PLCs) and a third hard-wired chain to protect personnel from prompt radiation generated by the linac, PAR, synchrotron, and storage ring. This paper describes the ACIS's design philosophy, configuration, hardware, functionality, validation requirements, and operational experience

  11. Modeling and Recognizing Policy Conflicts with Resource Access Requests on Protected Health Information

    Directory of Open Access Journals (Sweden)

    Raik Kuhlisch

    2017-07-01

    Full Text Available This article discusses potential clashes between different types of security policies that regulate resource access requests on clinical patient data in hospitals by employees. Attribute-based Access Control (ABAC is proposed as a proper means for such regulation. A proper representation of ABAC policies must include a handling of policy attributes among different policy types. In this article, we propose a semantic policy model with predefined policy conflict categories. A conformance verification function detects erroneous, clashing or mutually susceptible rules early during the policy planning phase. The model and conflicts are used in a conceptual application environment and evaluated in a technical experiment during an interoperability test event.

  12. Get the right access rights!

    CERN Multimedia

    Rosaria Marraffino

    2015-01-01

    On 11 May, a major change concerning the requirements to access the CERN beam facilities was put in place and implemented in ADaMS in order to reduce the number of courses that people who need access to multiple installations have to follow. This revision includes dedicated safety training courses that replace, in particular, the “Safety during LS1” e-learning course, which is now to be considered obsolete.   CERN’s Access Distribution and Management System (ADaMS). As of 11 May, an important improvement was implemented in ADaMS (CERN’s Access Distribution and Management System) regarding the requisites to access safety zones. This change is closely related to the introduction of a generic e-learning course ("CERN Beam Facilities") covering the common risks and systems present in CERN's beam facilities. Two e-learning courses are no longer valid, nor available on the SIR (Safety Information Registration) catalogue: the &ld...

  13. Evaluating the Impact of China’s Rail Network Expansions on Local Accessibility: A Market Potential Approach

    Directory of Open Access Journals (Sweden)

    Wenjie Wu

    2016-05-01

    Full Text Available This paper uses a market potential approach to examine the evolution of the rail transport network of China and its spatial distributional impacts on local accessibility, with a particular focus on high-speed rail improvements. Accessibility is measured by using a “market potential” function that was derived from the general equilibrium model of the economic geography literature, and is empirically calculated based on Geographical Information System (GIS techniques. A key finding, albeit from a highly stylized model, is that rail improvements may help raise territorial polarizing patterns across counties. The results point to the profound implications of railroad network expansion on the accessibility dynamics in periphery regions relative to core regions.

  14. An Access Control Framework for Reflective Middleware

    Institute of Scientific and Technical Information of China (English)

    Gang Huang; Lian-Shan Sun

    2008-01-01

    Reflective middleware opens up the implementation details of middleware platform and applications at runtime for improving the adaptability of middleware-based systems. However, such openness brings new challenges to access control of the middleware-based systems.Some users can access the system via reflective entities, which sometimes cannot be protected by access control mechanisms of traditional middleware. To deliver high adaptability securely, reflective middleware should be equipped with proper access control mechanisms for potential access control holes induced by reflection. One reason of integrating these mechanisms in reflective middleware is that one goal of reflective middleware is to equip applications with reflection capabilities as transparent as possible. This paper studies how to design a reflective J2EE middlewarePKUAS with access control in mind. At first, a computation model of reflective system is built to identify all possible access control points induced by reflection. Then a set of access control mechanisms, including the wrapper of MBeans and a hierarchy of Java class loaders, are equipped for controlling the identified access control points. These mechanisms together with J2EE access control mechanism form the access control framework for PKUAS. The paper evaluates the security and the performance overheads of the framework in quality and quantity.

  15. Functionalism and consciousness.

    Science.gov (United States)

    Shoemaker, S

    1993-01-01

    It is widely held that a mental state and the subject's introspective belief about it are always 'distinct existences' and only contingently connected. This suggests that for each sort of mental state there could be a creature that is introspectively 'blind' with respect to states of that sort, meaning that while it is capable of having such states, and of conceiving of itself as having them, it is totally without introspective access to its states of that sort. It is argued here that introspective blindness with respect to many sorts of mental states, in particular beliefs and sensory states, is not a possibility, because it is incompatible with requirements of rationality that are internal to the functional roles that are constitutive of these states. Introspective accessibility is essential to the functional roles of such mental states when the conceptual and cognitive resources of the subject of those states are sufficiently rich to make beliefs and thoughts about them a possibility. This is a version of the view that such states are necessarily self-intimating and is incompatible with the perceptual model of introspection favoured by some functionalists as well as by many non-functionalists.

  16. Access Control Based on Trail Inference

    Directory of Open Access Journals (Sweden)

    ALBARELO, P. C.

    2015-06-01

    Full Text Available Professionals are constantly seeking qualification and consequently increasing their knowledge in their area of expertise. Thus, it is interesting to develop a computer system that knows its users and their work history. Using this information, even in the case of professional role change, the system could allow the renewed authorization for activities, based on previously authorized use. This article proposes a model for user access control that is embedded in a context-aware environment. The model applies the concept of trails to manage access control, recording activities usage in contexts and applying this history as a criterion to grant new accesses. Despite the fact that previous related research works consider contexts, none of them uses the concept of trails. Hence, the main contribution of this work is the use of a new access control criterion, namely, the history of previous accesses (trails. A prototype was implemented and applied in an evaluation based on scenarios. The results demonstrate the feasibility of the proposal, allowing for access control systems to use an alternative way to support access rights.

  17. Computer access security code system

    Science.gov (United States)

    Collins, Earl R., Jr. (Inventor)

    1990-01-01

    A security code system for controlling access to computer and computer-controlled entry situations comprises a plurality of subsets of alpha-numeric characters disposed in random order in matrices of at least two dimensions forming theoretical rectangles, cubes, etc., such that when access is desired, at least one pair of previously unused character subsets not found in the same row or column of the matrix is chosen at random and transmitted by the computer. The proper response to gain access is transmittal of subsets which complete the rectangle, and/or a parallelepiped whose opposite corners were defined by first groups of code. Once used, subsets are not used again to absolutely defeat unauthorized access by eavesdropping, and the like.

  18. Holistic approaches to e-learning accessibility

    Directory of Open Access Journals (Sweden)

    Lawrie Phipps

    2006-12-01

    Full Text Available The importance of accessibility to digital e-learning resources is widely acknowledged. The World Wide Web Consortium Web Accessibility Initiative has played a leading role in promoting the importance of accessibility and developing guidelines that can help when developing accessible web resources. The accessibility of e-learning resources provides additional challenges. While it is important to consider the technical and resource related aspects of e-learning when designing and developing resources for students with disabilities, there is a need to consider pedagogic and contextual issues as well. A holistic framework is therefore proposed and described, which in addition to accessibility issues takes into account learner needs, learning outcomes, local factors, infrastructure, usability and quality assurance. The practical application and implementation of this framework is discussed and illustrated through the use of examples and case studies.

  19. Mini access guide to simplify calyceal access during percutaneous nephrolithotomy: A novel device

    Directory of Open Access Journals (Sweden)

    Puskar Shyam Chowdhury

    2017-01-01

    Conclusion: The MAG is a simple, portable, cheap, and novel assistant to achieve successful PCNL puncture. It would be of great help for novices to establish access during their learning phase of PCNL. It would also be an asset toward significantly decreasing the radiation dose during PCNL access.

  20. Using Geographic Information Systems and Spatial Analysis Methods to Assess Household Water Access and Sanitation Coverage in the SHINE Trial.

    Science.gov (United States)

    Ntozini, Robert; Marks, Sara J; Mangwadu, Goldberg; Mbuya, Mduduzi N N; Gerema, Grace; Mutasa, Batsirai; Julian, Timothy R; Schwab, Kellogg J; Humphrey, Jean H; Zungu, Lindiwe I

    2015-12-15

    Access to water and sanitation are important determinants of behavioral responses to hygiene and sanitation interventions. We estimated cluster-specific water access and sanitation coverage to inform a constrained randomization technique in the SHINE trial. Technicians and engineers inspected all public access water sources to ascertain seasonality, function, and geospatial coordinates. Households and water sources were mapped using open-source geospatial software. The distance from each household to the nearest perennial, functional, protected water source was calculated, and for each cluster, the median distance and the proportion of households within 1500 m of such a water source. Cluster-specific sanitation coverage was ascertained using a random sample of 13 households per cluster. These parameters were included as covariates in randomization to optimize balance in water and sanitation access across treatment arms at the start of the trial. The observed high variability between clusters in both parameters suggests that constraining on these factors was needed to reduce risk of bias. © The Author 2015. Published by Oxford University Press for the Infectious Diseases Society of America.

  1. USING THE INTERNATIONAL SCIENTOMETRIC DATABASES OF OPEN ACCESS IN SCIENTIFIC RESEARCH

    Directory of Open Access Journals (Sweden)

    O. Galchevska

    2015-05-01

    Full Text Available In the article the problem of the use of international scientometric databases in research activities as web-oriented resources and services that are the means of publication and dissemination of research results is considered. Selection criteria of scientometric platforms of open access in conducting scientific researches (coverage Ukrainian scientific periodicals and publications, data accuracy, general characteristics of international scientometrics database, technical, functional characteristics and their indexes are emphasized. The review of the most popular scientometric databases of open access Google Scholar, Russian Scientific Citation Index (RSCI, Scholarometer, Index Copernicus (IC, Microsoft Academic Search is made. Advantages of usage of International Scientometrics database Google Scholar in conducting scientific researches and prospects of research that are in the separation of cloud information and analytical services of the system are determined.

  2. Toward discovery science of human brain function

    DEFF Research Database (Denmark)

    Biswal, Bharat B; Mennes, Maarten; Zuo, Xi-Nian

    2010-01-01

    Although it is being successfully implemented for exploration of the genome, discovery science has eluded the functional neuroimaging community. The core challenge remains the development of common paradigms for interrogating the myriad functional systems in the brain without the constraints...... individual's functional connectome exhibits unique features, with stable, meaningful interindividual differences in connectivity patterns and strengths. Comprehensive mapping of the functional connectome, and its subsequent exploitation to discern genetic influences and brain-behavior relationships...... in the brain. To initiate discovery science of brain function, the 1000 Functional Connectomes Project dataset is freely accessible at www.nitrc.org/projects/fcon_1000/....

  3. Perti Net-Based Workflow Access Control Model

    Institute of Scientific and Technical Information of China (English)

    陈卓; 骆婷; 石磊; 洪帆

    2004-01-01

    Access control is an important protection mechanism for information systems. This paper shows how to make access control in workflow system. We give a workflow access control model (WACM) based on several current access control models. The model supports roles assignment and dynamic authorization. The paper defines the workflow using Petri net. It firstly gives the definition and description of the workflow, and then analyzes the architecture of the workflow access control model (WACM). Finally, an example of an e-commerce workflow access control model is discussed in detail.

  4. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  5. Effectiveness of integrated care including therapeutic assertive community treatment in severe schizophrenia-spectrum and bipolar I disorders: Four-year follow-up of the ACCESS II study.

    Science.gov (United States)

    Schöttle, Daniel; Schimmelmann, Benno G; Ruppelt, Friederike; Bussopulos, Alexandra; Frieling, Marietta; Nika, Evangelia; Nawara, Luise Antonia; Golks, Dietmar; Kerstan, Andrea; Lange, Matthias; Schödlbauer, Michael; Daubmann, Anne; Wegscheider, Karl; Rohenkohl, Anja; Sarikaya, Gizem; Sengutta, Mary; Luedecke, Daniel; Wittmann, Linus; Ohm, Gunda; Meigel-Schleiff, Christina; Gallinat, Jürgen; Wiedemann, Klaus; Bock, Thomas; Karow, Anne; Lambert, Martin

    2018-01-01

    The ACCESS-model offers integrated care including assertive community treatment to patients with psychotic disorders. ACCESS proved more effective compared to standard care (ACCESS-I study) and was successfully implemented into clinical routine (ACCESS-II study). In this article, we report the 4-year outcomes of the ACCESS-II study. Between May 2007 and December 2013, 115 patients received continuous ACCESS-care. We hypothesized that the low 2-year disengagement and hospitalization rates and significant improvements in psychopathology, functioning, and quality of life could be sustained over 4 years. Over 4 years, only 10 patients disengaged from ACCESS. Another 23 left for practical reasons and were successfully transferred to other services. Hospitalization rates remained low (13.0% in year 3; 9.1% in year 4). Involuntary admissions decreased from 35% in the 2 years prior to ACCESS to 8% over 4 years in ACCESS. Outpatient contacts remained stably high at 2.0-2.4 per week. We detected significant improvements in psychopathology (effect size d = 0.79), illness severity (d = 1.29), level of functioning (d = 0.77), quality of life (d = 0.47) and stably high client satisfaction (d = 0.02) over 4 years. Most positive effects were observed within the first 2 years with the exception of illness severity, which further improved from year 2 to 4. Within continuous intensive 4-year ACCESS-care, sustained improvements in psychopathology, functioning, quality of life, low service disengagement and re-hospitalization rates, as well as low rates of involuntary treatment, were observed in contrast to other studies, which reported a decline in these parameters once a specific treatment model was stopped. Yet, stronger evidence to prove these results is required. Clinical Trial Registration Number: NCT01888627.

  6. Replacing the Ethernet access mechanism with the real-time access mechanism of Twentenet

    NARCIS (Netherlands)

    Pras, Aiko

    1989-01-01

    The way in which a Local Area Network access mechanism (Medium Access Control protocol) designed for a specific type of physical service can be used on top of another type of physical service is discussed using a particular example. In the example, an Ethernet physical layer is used to provide

  7. 76 FR 67440 - Market Access Agreement

    Science.gov (United States)

    2011-11-01

    ... FARM CREDIT ADMINISTRATION Market Access Agreement AGENCY: Farm Credit Administration. ACTION: Notice of Draft Second Amended and Restated Market Access Agreement; request for comments. SUMMARY: The... Market Access Agreement (the ``Restated MAA'') is entered into among AgFirst Farm Credit Bank, AgriBank...

  8. The role of advertising in financing open access journals

    OpenAIRE

    Frantsvåg, Jan Erik

    2010-01-01

    In a number of articles or books, advertising is pointed to as a possible way of financing open access (OA) journals. Very little work seems to have been done on finding out how advertising actually functions as a source of financing for OA journals. A survey was carried out to explore the field, both why journals did not employ advertising, and how advertising was employed. The findings show little uptake of advertising among OA journals, and indicate that there is a lack of understanding of...

  9. Development of a statistically based access delay timeline methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Rivera, W. Gary; Robinson, David Gerald; Wyss, Gregory Dane; Hendrickson, Stacey M. Langfitt

    2013-02-01

    The charter for adversarial delay is to hinder access to critical resources through the use of physical systems increasing an adversarys task time. The traditional method for characterizing access delay has been a simple model focused on accumulating times required to complete each task with little regard to uncertainty, complexity, or decreased efficiency associated with multiple sequential tasks or stress. The delay associated with any given barrier or path is further discounted to worst-case, and often unrealistic, times based on a high-level adversary, resulting in a highly conservative calculation of total delay. This leads to delay systems that require significant funding and personnel resources in order to defend against the assumed threat, which for many sites and applications becomes cost prohibitive. A new methodology has been developed that considers the uncertainties inherent in the problem to develop a realistic timeline distribution for a given adversary path. This new methodology incorporates advanced Bayesian statistical theory and methodologies, taking into account small sample size, expert judgment, human factors and threat uncertainty. The result is an algorithm that can calculate a probability distribution function of delay times directly related to system risk. Through further analysis, the access delay analyst or end user can use the results in making informed decisions while weighing benefits against risks, ultimately resulting in greater system effectiveness with lower cost.

  10. Perilous terra incognita--open-access journals.

    Science.gov (United States)

    Balon, Richard

    2014-04-01

    The author focuses on a new rapidly spreading practice of publication in open-access journals. The pros and cons of open-access journals are discussed. Publishing in these journals may be cost prohibitive for educators and junior faculty members. Some authors may be lured by the ease of publishing in open-access journals (and their, at times, inflated self-description, e.g., "international", "scientific"), and their possibly valuable contributions will escape the attention of Academic Psychiatry readership in the vast sea of open-access journals. The readership may be flooded with a large number of low-quality articles (maybe not even properly peer-reviewed) from open-access journals. It may take some time to sort out what is and what is not relevant and useful. Open-access publishing represents a problematic and controversial practice and may be associated with a conflict of interest for the editors and publishers of these journals.

  11. Access/AML -

    Data.gov (United States)

    Department of Transportation — The AccessAML is a web-based internet single application designed to reduce the vulnerability associated with several accounts assinged to a single users. This is a...

  12. Open access to transmission

    International Nuclear Information System (INIS)

    Keith, D.M.

    1996-01-01

    For the past 12 to 15 years, the US electric power and energy industry and its federal regulators have been going through a prolonged exercise leading to opening up the national interconnected transmission grid for all qualified wholesale users to have open and equal access. The debates have been painful in a sense that not all parties - especially some of the transmission system owning utilities - believe that the concept of Open Access is achievable, due to technical constraints on the systems. The present Open Access activity is limited to wholesales transaction under the federal jurisdiction, but several states are either experimenting with or considering retail wheeling. In fact, the FERC - Federal Energy Regulatory Commission - has already expanded its view to embrace retail transmission, if the retail transaction involves the use of the interstate transmission systems which are under FERC's jurisdiction. This paper delves into some of the results of the technical cost and pricing analysis for open access. The statutes and resulting regulations are not addressed herein. (author). 1 fig

  13. A spatial analysis of variations in health access: linking geography, socio-economic status and access perceptions

    Science.gov (United States)

    2011-01-01

    Background This paper analyses the relationship between public perceptions of access to general practitioners (GPs) surgeries and hospitals against health status, car ownership and geographic distance. In so doing it explores the different dimensions associated with facility access and accessibility. Methods Data on difficulties experienced in accessing health services, respondent health status and car ownership were collected through an attitudes survey. Road distances to the nearest service were calculated for each respondent using a GIS. Difficulty was related to geographic distance, health status and car ownership using logistic generalized linear models. A Geographically Weighted Regression (GWR) was used to explore the spatial non-stationarity in the results. Results Respondent long term illness, reported bad health and non-car ownership were found to be significant predictors of difficulty in accessing GPs and hospitals. Geographic distance was not a significant predictor of difficulty in accessing hospitals but was for GPs. GWR identified the spatial (local) variation in these global relationships indicating locations where the predictive strength of the independent variables was higher or lower than the global trend. The impacts of bad health and non-car ownership on the difficulties experienced in accessing health services varied spatially across the study area, whilst the impacts of geographic distance did not. Conclusions Difficulty in accessing different health facilities was found to be significantly related to health status and car ownership, whilst the impact of geographic distance depends on the service in question. GWR showed how these relationships were varied across the study area. This study demonstrates that the notion of access is a multi-dimensional concept, whose composition varies with location, according to the facility being considered and the health and socio-economic status of the individual concerned. PMID:21787394

  14. Pulse patterning effect in optical pulse division multiplexing for flexible single wavelength multiple access optical network

    Science.gov (United States)

    Jung, Sun-Young; Kim, Chang-Hun; Han, Sang-Kook

    2018-05-01

    A demand for high spectral efficiency requires multiple access within a single wavelength, but the uplink signals are significantly degraded because of optical beat interference (OBI) in intensity modulation/direct detection system. An optical pulse division multiplexing (OPDM) technique was proposed that could effectively reduce the OBI via a simple method as long as near-orthogonality is satisfied, but the condition was strict, and thus, the number of multiplexing units was very limited. We propose pulse pattern enhanced OPDM (e-OPDM) to reduce the OBI and improve the flexibility in multiple access within a single wavelength. The performance of the e-OPDM and patterning effect are experimentally verified after 23-km single mode fiber transmission. By employing pulse patterning in OPDM, the tight requirement was relaxed by extending the optical delay dynamic range. This could support more number of access with reduced OBI, which could eventually enhance a multiple access function.

  15. The LHC access system LACS and LASS

    CERN Document Server

    Ninin, P

    2005-01-01

    The LHC complex is divided into a number of zones with different levels of access controls.Inside the interlocked areas, the personnel protection is ensured by the LHC Access System.The system is made of two parts:the LHC Access Safety System and the LHC Access Control System. During machine operation,the LHC Access Safety System ensures the collective protection of the personnel against the radiation hazards arising from the operation of the accelerator by interlocking the LHC key safety elements. When the beams are off, the LHC Access Control System regulates the access to the accelerator and its many subsystems.It allows a remote, local or automatic operation of the access control equipment which verifies and identifies all users entering the controlled areas.The global architecture of the LHC Access System is now designed and is being validated to ensure that it meets the safety requirements for operation of the LHC.A pilot installation will be tested in the summer 2005 to validate the concept with the us...

  16. Organizing for access with FRBR, RDA, linked data, and beyond

    CERN Document Server

    Hsieh-Yee, Ingrid P

    2018-01-01

    "Organizing for Access with FRBR, RDA, Linked Data, and Beyond" provides a current, insightful discussion of the new opportunities and challenges posed by the management of big datasets. It explains how to apply Functional Requirements for Bibliographic Records (FRBR) and (Resource Description and Access) RDA to create cataloging records for various types of resources--skills that will help systems librarians, reference librarians, and digital resources librarians to transform their professional practices and give them an invaluable competitive edge. This book is ideal as a primary textbook for a range of LIS courses, such as courses on cataloging and/or managing audiovisual collections and continuing education workshops on cataloging audiovisual materials (including music or film collections). It presents a critical assessment of the advantages and limitations of using RDA for managing information resources and data, explains how to increase the benefit and relevancy of library data and records, and discuss...

  17. Flow chemistry kinetic studies reveal reaction conditions for ready access to unsymmetrical trehalose analogues.

    Science.gov (United States)

    Patel, Mitul K; Davis, Benjamin G

    2010-10-07

    Monofunctionalization of trehalose, a widely-found symmetric plant disaccharide, was studied in a microreactor to give valuable kinetic insights that have allowed improvements in desymmetrization yields and the development of a reaction sequence for large scale monofunctionalizations that allow access to probes of trehalose's biological function.

  18. The brain, a choice subject for radioisotopic functional imaging

    International Nuclear Information System (INIS)

    Maziere, B.

    1996-01-01

    Progresses realized in the use of radioisotopes and in tomographic imaging techniques have permitted to access to the visualization of the human body functions. The application of this radioisotopic functional imaging (or emission tomography functional imaging) has been particularly fruitful in the study of brain functioning. This method is the only exploratory method for the biochemical aspects of the cerebral functioning and is used both by the physiologist and the therapist. (J.S.)

  19. Resequencing 50 accessions of cultivated and wild rice yields markers for identifying agronomically important genes

    DEFF Research Database (Denmark)

    Xu, Xun; Liu, Xin; Ge, Song

    2012-01-01

    Rice is a staple crop that has undergone substantial phenotypic and physiological changes during domestication. Here we resequenced the genomes of 40 cultivated accessions selected from the major groups of rice and 10 accessions of their wild progenitors (Oryza rufipogon and Oryza nivara) to >15 x...... diversity in cultivated but not wild rice, which represent candidate regions selected during domestication. Some of these variants are associated with important biological features, whereas others have yet to be functionally characterized. The molecular markers we have identified should be valuable...... raw data coverage. We investigated genome-wide variation patterns in rice and obtained 6.5 million high-quality single nucleotide polymorphisms (SNPs) after excluding sites with missing data in any accession. Using these population SNP data, we identified thousands of genes with significantly lower...

  20. Evaluation of the AccessIT Project and the Distance LearningProgramme on Digitization

    Directory of Open Access Journals (Sweden)

    Bülent Yılmaz

    2013-11-01

    Full Text Available AccessIT is an EU-funded project under EU’s Education and Culture Program aiming to digitize a certain amount of sources that are part of the cultural heritage, to transfer them to Europeana, and to sustain the education infrastructure to achieve this goal in the partner countries of Greece, Poland, Serbia, Turkey and UK. In this study, in addition to the general evaluation of the AccessIT Project, it is aimed to investigate the awareness of participants in thefield on digitization and digital content management, their self-efficiency perceptions, and to evaluate the education program based on the data acquired from the survey of544participants who were enrolled in the distance education program offered within the scope of the project.It was found out in the study that the AccessIT Project has had an important function in Turkey and the distance education program significantly contributed to participants ’ self-efficiency perceptions about digitization.

  1. RURAL-URBAN DIFFERENCES IN NURSING HOME ACCESS, QUALITY AND COST

    OpenAIRE

    Yu, Wei; Bradford, Garnett L.

    1995-01-01

    Rural-urban differences in the supply of nursing home services as hypothesized to be jointly affected by competitive and regulatory forces, government policies, and the cost structure. Study findings indicate that rural services are slightly less accessible and lower in quality. A translog cost share function reveals no difference in the operating cost structure of rural and urban homes. Cost shares for nursing care are directly related to the degree of skilled nursing provided by homes. Sign...

  2. Strategies to improve smallholders' market access

    NARCIS (Netherlands)

    Tilburg, van A.; Schalkwyk, van H.D.

    2011-01-01

    Smallholders, especially in less developed countries, have encountered several challenges in gaining access to markets. Market access includes the ability to obtain necessary farm inputs and farm services, and the ability to deliver farm products to buyers. Market access was less of a problem in the

  3. 75 FR 76729 - Market Access Agreement

    Science.gov (United States)

    2010-12-09

    ... FARM CREDIT ADMINISTRATION Market Access Agreement AGENCY: Farm Credit Administration. ACTION: Notice of approval of the draft amendment to the amended and restated market access agreement. SUMMARY... Credit Bank of Wichita and the Western Farm Credit Bank under Section 7.12 of the Market Access Agreement...

  4. Mobile and Accessible Learning for MOOCs

    Science.gov (United States)

    Sharples, Mike; Kloos, Carlos Delgado; Dimitriadis, Yannis; Garlatti, Serge; Specht, Marcus

    2015-01-01

    Many modern web-based systems provide a "responsive" design that allows material and services to be accessed on mobile and desktop devices, with the aim of providing "ubiquitous access." Besides offering access to learning materials such as podcasts and videos across multiple locations, mobile, wearable and ubiquitous…

  5. Open Access kortlægning 2011

    DEFF Research Database (Denmark)

    Elbæk, Mikael; Hansen, Tove Juul; Larsen, Asger V.

    Denne rapport viser, at det faglige domæne er en meget stærk faktor i forhold til, hvor stor en andel af forskningsoutputtet, der er open access. Rapporten viser, at der er forskelle mellem universiteterne som ikke alene kan forklares med faglige faktorer, men forklaringerne må findes andre steder......, det kunne være lokale procedurer, kultur eller strukturer (politikker). Dette tager rapporten dog ikke stilling til. Andelen af gylden open access ligger relativt stabilt på tværs af universiteterne, med en andel mellem 6 – 10 % af den samlede publicering i peer reviewede tidsskrifter. Dermed er grøn...... open access den væsentligste faktor som adskiller universiteternes samlede open access andel. Endvidere viser rapporten, at der er et meget stort uudnyttet open access potentiale på alle universiteterne. Faktisk kunne mere end 5.000 flere BFI-pointgivende artikler være open access, dvs. at 71 % af det...

  6. Access Contested

    International Development Research Centre (IDRC) Digital Library (Canada)

    Transforming Global Information and Communication Markets: The Political Economy of ... 8 Control and Resistance: Attacks on Burmese Opposition Media 153 ...... “Reluctant Gatekeepers: Corporate Ethics on a Filtered Internet,” in Access ...

  7. Flexible Access Control for Dynamic Collaborative Environments

    NARCIS (Netherlands)

    Dekker, M.A.C.

    2009-01-01

    Access control is used in computer systems to control access to confidential data. In this thesis we focus on access control for dynamic collaborative environments where multiple users and systems access and exchange data in an ad hoc manner. In such environments it is difficult to protect

  8. Central Venous Access

    International Nuclear Information System (INIS)

    Ganeshan, Arul; Warakaulle, Dinuke R.; Uberoi, Raman

    2007-01-01

    Central venous access plays an important role in the management of an ever-increasing population of patients ranging from those that are critically ill to patients with difficult clinical access. Interventional radiologists are key in delivering this service and should be familiar with the wide range of techniques and catheters now available to them. A comprehensive description of these catheters with regard to indications, technical aspects of catheterization, success rates, and associated early and late complications, as well as a review of various published guidelines on central venous catheter insertion are given in this article

  9. Access control, security, and trust a logical approach

    CERN Document Server

    Chin, Shiu-Kai

    2010-01-01

    Access Control, Security, Trust, and Logic Deconstructing Access Control Decisions A Logical Approach to Access Control PRELIMINARIES A Language for Access ControlSets and Relations Syntax SemanticsReasoning about Access Control Logical RulesFormal Proofs and Theorems Soundness of Logical RulesBasic Concepts Reference Monitors Access Control Mechanisms: Tickets and Lists Authentication Security PoliciesConfidentiality, Integrity, and Availability Discretionary Security Policies Mandatory Security Policies Military Security Policies Commercial PoliciesDISTRIBUTED ACCESS CONTROL Digital Authenti

  10. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  11. Open access: changing global science publishing.

    Science.gov (United States)

    Gasparyan, Armen Yuri; Ayvazyan, Lilit; Kitas, George D

    2013-08-01

    The article reflects on open access as a strategy of changing the quality of science communication globally. Successful examples of open-access journals are presented to highlight implications of archiving in open digital repositories for the quality and citability of research output. Advantages and downsides of gold, green, and hybrid models of open access operating in diverse scientific environments are described. It is assumed that open access is a global trend which influences the workflow in scholarly journals, changing their quality, credibility, and indexability.

  12. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  13. Lightweight methodology to improve web accessibility

    CSIR Research Space (South Africa)

    Greeff, M

    2009-10-01

    Full Text Available to improve score. Colour Contrast Fujitsu ColorSelector [9] Each colour combination has to be selected manually. Didn’t identify colour contrast problems that were highlighted by the other two tools. JuicyStudio Colour Contrast Analyser Firefox..., but this is not tested by AccessKeys AccessColor. However, AccessKeys AccessColor provides a link to the specific line in the code where the problem occurs. This is not provided by JuicyStudio Colour Contrast Analyser. According to these two tools, many colour...

  14. Web Accessibility in Romania: The Conformance of Municipal Web Sites to Web Content Accessibility Guidelines

    OpenAIRE

    Costin PRIBEANU; Ruxandra-Dora MARINESCU; Paul FOGARASSY-NESZLY; Maria GHEORGHE-MOISII

    2012-01-01

    The accessibility of public administration web sites is a key quality attribute for the successful implementation of the Information Society. The purpose of this paper is to present a second review of municipal web sites in Romania that is based on automated accessibility checking. A number of 60 web sites were evaluated against WCAG 2.0 recommendations. The analysis of results reveals a relatively low web accessibility of municipal web sites and highlights several aspects. Firstly, a slight ...

  15. The Effect of Hypertension on Neurocognitive Functioning and ...

    African Journals Online (AJOL)

    Log in or Register to get access to full text downloads. ... The objectives of this study were to investigate the effect of hypertension on neurocognitive functioning and quality of life. Design: The study was ... Conclusion: Quality of life seems to be more affected than neurocognitive functioning in the hypertensives in this study.

  16. Access to scientific publications: the scientist's perspective.

    Directory of Open Access Journals (Sweden)

    Yegor Voronin

    Full Text Available BACKGROUND: Scientific publishing is undergoing significant changes due to the growth of online publications, increases in the number of open access journals, and policies of funders and universities requiring authors to ensure that their publications become publicly accessible. Most studies of the impact of these changes have focused on the growth of articles available through open access or the number of open-access journals. Here, we investigated access to publications at a number of institutes and universities around the world, focusing on publications in HIV vaccine research--an area of biomedical research with special importance to the developing world. METHODS AND FINDINGS: We selected research papers in HIV vaccine research field, creating: 1 a first set of 50 most recently published papers with keywords "HIV vaccine" and 2 a second set of 200 articles randomly selected from those cited in the first set. Access to the majority (80% of the recently published articles required subscription, while cited literature was much more accessible (67% freely available online. Subscriptions at a number of institutions around the world were assessed for providing access to subscription-only articles from the two sets. The access levels varied widely, ranging among institutions from 20% to 90%. Through the WHO-supported HINARI program, institutes in low-income countries had access comparable to that of institutes in the North. Finally, we examined the response rates for reprint requests sent to corresponding authors, a method commonly used before internet access became widespread. Contacting corresponding authors with requests for electronic copies of articles by email resulted in a 55-60% success rate, although in some cases it took up to 1.5 months to get a response. CONCLUSIONS: While research articles are increasingly available on the internet in open access format, institutional subscriptions continue to play an important role. However

  17. Why the nth-root function is not a rational function

    Science.gov (United States)

    Dobbs, David E.

    2017-11-01

    The set of functions ? is linearly independent over ? (with respect to any open subinterval of (0, ∞)). The titular result is a corollary for any integer n ≥ 2 (and the domain [0, ∞)). Some more accessible proofs of that result are also given. Let F be a finite field of characteristic p and cardinality pk. Then the pth-root function F → F is a polynomial function of degree at most pk - 2 if pk ≠ 2 (resp., the identity function if pk = 2). Also, for any integer n ≥ 2, every element of F has an nth root in F if and only if, for each prime number q dividing n, q is not a factor of pk - 1. Various parts of this note could find classroom use in courses at various levels, on precalculus, calculus or abstract algebra. A final section addresses educational benefits of such coverage and offers some recommendations to practitioners.

  18. Cardea: Dynamic Access Control in Distributed Systems

    Science.gov (United States)

    Lepro, Rebekah

    2004-01-01

    Modern authorization systems span domains of administration, rely on many different authentication sources, and manage complex attributes as part of the authorization process. This . paper presents Cardea, a distributed system that facilitates dynamic access control, as a valuable piece of an inter-operable authorization framework. First, the authorization model employed in Cardea and its functionality goals are examined. Next, critical features of the system architecture and its handling of the authorization process are then examined. Then the S A M L and XACML standards, as incorporated into the system, are analyzed. Finally, the future directions of this project are outlined and connection points with general components of an authorization system are highlighted.

  19. Is open access sufficient? A review of the quality of open-access nursing journals.

    Science.gov (United States)

    Crowe, Marie; Carlyle, Dave

    2015-02-01

    The present study aims to review the quality of open-access nursing journals listed in the Directory of Open Access Journals that published papers in 2013 with a nursing focus, written in English, and were freely accessible. Each journal was reviewed in relation to their publisher, year of commencement, number of papers published in 2013, fee for publication, indexing, impact factor, and evidence of requirements for ethics and disclosure statements. The quality of the journals was assessed by impact factors and the requirements for indexing in PubMed. A total of 552 were published in 2013 in the 19 open-access nursing journals that met the inclusion criteria. No journals had impact factors listed in Web of Knowledge, but three had low Scopus impact factors. Only five journals were indexed with PubMed. The quality of the 19 journals included in the review was evaluated as inferior to most subscription-fee journals. Mental health nursing has some responsibility to the general public, and in particular, consumers of mental health services and their families, for the quality of papers published in open-access journals. The way forward might involve dual-platform publication or a process that enables assessment of how research has improved clinical outcomes. © 2014 Australian College of Mental Health Nurses Inc.

  20. Seeing with the nano-eye: accessing structure, function, and dynamics of matter on its natural length and time scales

    Science.gov (United States)

    Raschke, Markus

    2015-03-01

    To understand and ultimately control the properties of most functional materials, from molecular soft-matter to quantum materials, requires access to the structure, coupling, and dynamics on the elementary time and length scales that define the microscopic interactions in these materials. To gain the desired nanometer spatial resolution with simultaneous spectroscopic specificity we combine scanning probe microscopy with different optical, including coherent, nonlinear, and ultrafast spectroscopies. The underlying near-field interaction mediated by the atomic-force or scanning tunneling microscope tip provides the desired deep-sub wavelength nano-focusing enabling few-nm spatial resolution. I will introduce our generalization of the approach in terms of the near-field impedance matching to a quantum system based on special optical antenna-tip designs. The resulting enhanced and qualitatively new forms of light-matter interaction enable measurements of quantum dynamics in an interacting environment or to image the electromagnetic local density of states of thermal radiation. Other applications include the inter-molecular coupling and dynamics in soft-matter hetero-structures, surface plasmon interferometry as a probe of electronic structure and dynamics in graphene, and quantum phase transitions in correlated electron materials. These examples highlight the general applicability of the new near-field microscopy approach, complementing emergent X-ray and electron imaging tools, aiming towards the ultimate goal of probing matter on its most elementary spatio-temporal level.

  1. ADOPT Open Access

    CERN Multimedia

    2007-01-01

    Are you writing a theoretical paper? An experimental one? Or one about instrumentation? You can publish it in Open Access. Now. Read how... You might have heard about Open Access, the next big thing in scientific publishing. The idea is to make the results of your (publicly funded) research free to read for everyone out there ... not only those lucky ones who work in places where libraries can afford to purchase the expensive subscriptions to scientific journals. CERN, DESY and other particle physics institutes have accepted an offer by one of the leading journals in High Energy Physics, JHEP: our libraries will pay a special subscription fee, and, in exchange, all articles with at least one author from our institutes will be published in Open Access. Anyone, anywhere and anytime will be able to read them, without any financial barrier! If you are writing an instrumentation paper, you can submit it to JINST and benefit from the same offer. This is a major step forward in the planned conversion of existi...

  2. Open-Access Publishing

    Directory of Open Access Journals (Sweden)

    Nedjeljko Frančula

    2013-06-01

    Full Text Available Nature, one of the most prominent scientific journals dedicated one of its issues to recent changes in scientific publishing (Vol. 495, Issue 7442, 27 March 2013. Its editors stressed that words technology and revolution are closely related when it comes to scientific publishing. In addition, the transformation of research publishing is not as much a revolution than an attrition war in which all sides are buried. The most important change they refer to is the open-access model in which an author or an institution pays in advance for publishing a paper in a journal, and the paper is then available to users on the Internet free of charge.According to preliminary results of a survey conducted among 23 000 scientists by the publisher of Nature, 45% of them believes all papers should be published in open access, but at the same time 22% of them would not allow the use of papers for commercial purposes. Attitudes toward open access vary according to scientific disciplines, leading the editors to conclude the revolution still does not suit everyone.

  3. Microsoft DirectAccess best practices and troubleshooting

    CERN Document Server

    Krause, Jordan

    2013-01-01

    This book covers best practices and acts as a complete guide to DirectAccess and automatic remote access.Microsoft DirectAccess Best Practices and Troubleshooting is an ideal guide for any existing or future DirectAccess administrator and system administrators who are working on Windows Server 2012. This book will also be beneficial for someone with a basic knowledge of networking and deployment of Microsoft operating systems and software who wants to learn the intricacies of DirectAccess and its interfaces.

  4. World Summit embraces Open Access, libraries

    CERN Multimedia

    Kaser, D

    2004-01-01

    "The long-anticipated "first phase" meeting of the World Summit on the Information Society (WSIS), held in Geneva in December, was supposed to have been about equal access. It turned out being equally about open access as leading scientific organizations pushed their open-access initiative onto the World Summit agenda" (1 page)

  5. 77 FR 66052 - Program Access Rules

    Science.gov (United States)

    2012-10-31

    ... delivered, cable-affiliated RSNs in the 2010 Program Access Order. 3. With respect to the first element (the... exclusive contract involving a cable-affiliated RSN is an ``unfair act.'' In the 2010 Program Access Order... Agreements 18. ACA also urges the Commission to revise the program access rules to prohibit cable-affiliated...

  6. Remote Memory Access Protocol Target Node Intellectual Property

    Science.gov (United States)

    Haddad, Omar

    2013-01-01

    The MagnetoSpheric Multiscale (MMS) mission had a requirement to use the Remote Memory Access Protocol (RMAP) over its SpaceWire network. At the time, no known intellectual property (IP) cores were available for purchase. Additionally, MMS preferred to implement the RMAP functionality with control over the low-level details of the design. For example, not all the RMAP standard functionality was needed, and it was desired to implement only the portions of the RMAP protocol that were needed. RMAP functionality had been previously implemented in commercial off-the-shelf (COTS) products, but the IP core was not available for purchase. The RMAP Target IP core is a VHDL (VHSIC Hardware Description Language description of a digital logic design suitable for implementation in an FPGA (field-programmable gate array) or ASIC (application-specific integrated circuit) that parses SpaceWire packets that conform to the RMAP standard. The RMAP packet protocol allows a network host to access and control a target device using address mapping. This capability allows SpaceWire devices to be managed in a standardized way that simplifies the hardware design of the device, as well as the development of the software that controls the device. The RMAP Target IP core has some features that are unique and not specified in the RMAP standard. One such feature is the ability to automatically abort transactions if the back-end logic does not respond to read/write requests within a predefined time. When a request times out, the RMAP Target IP core automatically retracts the request and returns a command response with an appropriate status in the response packet s header. Another such feature is the ability to control the SpaceWire node or router using RMAP transactions in the extended address range. This allows the SpaceWire network host to manage the SpaceWire network elements using RMAP packets, which reduces the number of protocols that the network host needs to support.

  7. KAUST Open Access policy

    KAUST Repository

    Baessa, Mohamed A.

    2017-03-07

    The transition to open access (OA) is being driven by funders, libraries, researchers and publishers around the world, and is having an impact on us all. It is inevitable that different countries, organisations and disciplines are moving at different rates towards an OA model, and it is this that we will focus on in this session. Drawing on experiences from across Europe and the Middle East we will provide perspectives from both a global publisher and institutions based in the region. Taylor & Francis take a flexible, evidence-based approach to open access, providing a choice of publication routes for our authors, and a choice of agreements for our library customers. Carolyn will outline some of the open access developments, opportunities and challenges at Taylor & Francis. The library plays a critical role in facilitating open access for their researchers, from managing a repository to providing support and information on the OA publication process to their authors. Janis Tyhurst and Dr Imad Bachir will each give an overview of how this is being managed by their institution. There will be an opportunity for questions and discussion with the panel.

  8. Survey on Cloud Radio Access Network

    Directory of Open Access Journals (Sweden)

    Reeta Chhatani

    2016-01-01

    Full Text Available The existing wireless network will face the challenge of data tsunami in the near future. Densification of network will deal huge data traffic but will increase the interferences and network cost. At the same time, the existing wireless network is underutilized due to dynamic traffic. To deal with this adverse scenario, a change in the current network architecture is required. Based on virtualization, Cloud Radio Access Network (CRAN was proposed for wireless network. In CRAN the functionality of base station will be distributed into base band unit (BBU and remote radio heads (RRH which will achieve benefits of centralization. This paper presents a survey on CRAN centring on optimized resource allocation, energy efficiency and throughput maximization under fronthaul capacity. The existing solution and future opportunities in CRAN are also summarized.

  9. 49 CFR 238.114 - Rescue access windows.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 4 2010-10-01 2010-10-01 false Rescue access windows. 238.114 Section 238.114... § 238.114 Rescue access windows. (a) Number and location. Except as provided in paragraph (a)(1)(ii) of... rescue access windows. At least one rescue access window shall be located in each side of the car...

  10. An introduction to functional programming through lambda calculus

    CERN Document Server

    Michaelson, Greg

    2011-01-01

    Well-respected text for computer science students provides an accessible introduction to functional programming. Cogent examples illuminate the central ideas, and numerous exercises offer reinforcement. Includes solutions. 1989 edition.

  11. The Ica-Atom using as access platform, dissemination and description of archival documents public institutions

    Directory of Open Access Journals (Sweden)

    Eliseu dos Santos Lima

    2016-12-01

    Full Text Available Introduction: Information technology has caused changes in various segments of society. In archival area its presence is remarkable, so much that lately has increased the quantity of institutions that make use of computerized systems, repositories and platforms that automate activities such as description, diffusion, and even provide access to archival documentary heritage. Objective: To discuss the functionality and usefulness of the platform International Archives Council - Access to Memory (ICA-AtoM in archival description of activities, dissemination and access to archival documentary heritage. Methodology: bibliographical research, drawn from the archival legislation, especially through research resulting from Master's dissertations, articles published in journals of the Science field of Information and manuals produced by members of the Group of CNPq-UFSM Research: Electronic Management of archival documents - Ged / A. Results: It was observed that the platform is used to describe both the permanent documents, and to provide access to information recorded in current and intermediate documents, in order to streamline access to documentary resources of public institutions. Conclusions: It is considered that the ICA-Atom besides serving the description, can provide an authentic environment for the secure storage and as a source of evidence of digital and digitized institutional documents, as well as to provide for preservation and long term access if It is connected to a RDC-Arq, like Archivematica, for example.

  12. Open Access Publishing: What Authors Want

    Science.gov (United States)

    Nariani, Rajiv; Fernandez, Leila

    2012-01-01

    Campus-based open access author funds are being considered by many academic libraries as a way to support authors publishing in open access journals. Article processing fees for open access have been introduced recently by publishers and have not yet been widely accepted by authors. Few studies have surveyed authors on their reasons for publishing…

  13. Ultrasonography-guided peripheral intravenous access versus traditional approaches in patients with difficult intravenous access.

    Science.gov (United States)

    Costantino, Thomas G; Parikh, Aman K; Satz, Wayne A; Fojtik, John P

    2005-11-01

    We assess the success rate of emergency physicians in placing peripheral intravenous catheters in difficult-access patients who were unsuccessfully cannulated by emergency nurses. A technique using real-time ultrasonographic guidance by 2 physicians was compared with traditional approaches using palpation and landmark guidance. This was a prospective, systematically allocated study of all patients requiring intravenous access who presented to 2 university hospitals between October 2003 and March 2004. Inclusion criterion was the inability of any available nurse to obtain intravenous access after at least 3 attempts on a subgroup of patients who had a history of difficult intravenous access because of obesity, history of intravenous drug abuse, or chronic medical problems. Exclusion criterion was the need for central venous access. Patients presenting on odd days were allocated to the ultrasonographic-guided group, and those presenting on even days were allocated to the traditional-approach group. Endpoints were successful cannulation, number of sticks, time, and patient satisfaction. Sixty patients were enrolled, 39 on odd days and 21 on even days. Success rate was greater for the ultrasonographic group (97%) versus control (33%), difference in proportions of 64% (95% confidence interval [CI] 39% to 71%). The ultrasonographic group required less overall time (13 minutes versus 30 minutes, for a difference of 17 [95% CI 0.8 to 25.6]), less time to successful cannulation from first percutaneous puncture (4 minutes versus 15 minutes, for a difference of 11 [95% CI 8.2 to 19.4]), and fewer percutaneous punctures (1.7 versus 3.7, for a difference of 2.0 [95% CI 1.27 to 2.82]) and had greater patient satisfaction (8.7 versus 5.7, for a difference of 3.0 [95% CI 1.82 to 4.29]) than the traditional landmark approach. Ultrasonographic-guided peripheral intravenous access is more successful than traditional "blind" techniques, requires less time, decreases the number of

  14. Experimental protocol to assess the tourism vehicles accessibility based on heart rate and access time measurements

    Energy Technology Data Exchange (ETDEWEB)

    Alcala Fazio, E.; Alvarez Fernandez, N.

    2016-07-01

    The objective of the Project is to define an experimental protocol for the accessibility assessment of the transport vehicles, by analysing the evolution of the effort and time variables consumed by a target group –Persons of Reduced Mobility (PMRs). This protocol consisted in tests of accessibility on a sample of 6 passenger cars (class M1) by 8 elderly people carrying a heart rate monitor, and whose access manoeuvres were recorded by video cameras. Based on the Hilloskorpi et al. [1] model and by developing a method of truncation of the heart rate (HR) tests records - eliminating the component of the work biologically needed by the organism to keep its basal metabolic rate from the work each person performed – it was possible to evaluate how much energy each individual invested in each access manoeuver. Immediately after each test, and after the whole round of vehicles, each participant was surveyed for a subjective assessment of the difficulty of accessing to the cars. According to each of the above results, the HR objective measurements and the subjective opinion about the ease of access experienced by each individual, the vehicles were ranked by order of accessibility to the front and rear seats. The result of both rankings showed the orders of the similar vehicles, the potential of the method and a fair closeness between its results and the subjective, but real and unequivocal, judgments of the participants. (Author)

  15. An optimal probabilistic multiple-access scheme for cognitive radios

    KAUST Repository

    Hamza, Doha R.; Aï ssa, Sonia

    2012-01-01

    We study a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. The SU senses the channel at the beginning of the slot. If found free, it transmits with probability 1. If busy, it transmits with a certain access probability that is a function of its queue length and whether it has a new packet arrival. Both users, i.e., the PU and the SU, transmit with a fixed transmission rate by employing a truncated channel inversion power control scheme. We consider the case of erroneous sensing. The goal of the SU is to optimize its transmission scheduling policy to minimize its queueing delay under constraints on its average transmit power and the maximum tolerable primary outage probability caused by the miss detection of the PU. We consider two schemes regarding the secondary's reaction to transmission errors. Under the so-called delay-sensitive (DS) scheme, the packet received in error is removed from the queue to minimize delay, whereas under the delay-tolerant (DT) scheme, the said packet is kept in the buffer and is retransmitted until correct reception. Using the latter scheme, there is a probability of buffer loss that is also constrained to be lower than a certain specified value. We also consider the case when the PU maintains an infinite buffer to store its packets. In the latter case, we modify the SU access scheme to guarantee the stability of the PU queue. We show that the performance significantly changes if the realistic situation of a primary queue is considered. In all cases, although the delay minimization problem is nonconvex, we show that the access policies can be efficiently obtained using linear programming and grid search over one or two parameters. © 1967-2012 IEEE.

  16. An optimal probabilistic multiple-access scheme for cognitive radios

    KAUST Repository

    Hamza, Doha R.

    2012-09-01

    We study a time-slotted multiple-access system with a primary user (PU) and a secondary user (SU) sharing the same channel resource. The SU senses the channel at the beginning of the slot. If found free, it transmits with probability 1. If busy, it transmits with a certain access probability that is a function of its queue length and whether it has a new packet arrival. Both users, i.e., the PU and the SU, transmit with a fixed transmission rate by employing a truncated channel inversion power control scheme. We consider the case of erroneous sensing. The goal of the SU is to optimize its transmission scheduling policy to minimize its queueing delay under constraints on its average transmit power and the maximum tolerable primary outage probability caused by the miss detection of the PU. We consider two schemes regarding the secondary\\'s reaction to transmission errors. Under the so-called delay-sensitive (DS) scheme, the packet received in error is removed from the queue to minimize delay, whereas under the delay-tolerant (DT) scheme, the said packet is kept in the buffer and is retransmitted until correct reception. Using the latter scheme, there is a probability of buffer loss that is also constrained to be lower than a certain specified value. We also consider the case when the PU maintains an infinite buffer to store its packets. In the latter case, we modify the SU access scheme to guarantee the stability of the PU queue. We show that the performance significantly changes if the realistic situation of a primary queue is considered. In all cases, although the delay minimization problem is nonconvex, we show that the access policies can be efficiently obtained using linear programming and grid search over one or two parameters. © 1967-2012 IEEE.

  17. Eu accession to the ECHR: Enlarging the human rights protection in Europe

    Directory of Open Access Journals (Sweden)

    Krstić Ivana

    2016-01-01

    Full Text Available This paper deals with the importance of the EU accession to the ECHR, as the most significant regional instrument for human rights protection. The paper outlines the evolution of the idea of the accession to the ECHR, different stages of that process, as well as a Draft agreement which attempted to resolve some complex legal issues relating to the specific nature of the EU legal system. In the second part of this paper, the Opinion 2/13 of the CJEU from December 2014 has been analyzed, which basically interrupted the entire accession process. It is noted that currently the ECtHR has only an indirect constitutional control over the EU's legal order by examining laws of the Member States. The EU accession to the ECHR would allow examination of all acts and measures in the EU from the human rights perspective, including those over which the CJEU does not have full oversight function. Therefore, the authors argue that due to the establishment of legal certainty and external control over acts of the EU institutions, it is necessary to find a way for the continuation of the accession process, as soon as possible. There are two possible scenarios: a re-negotiation of the agreement on accession, or modification of the EU Treaties. Both solutions seem almost impossible in the created political milieu. However, there is a hope that negotiations will continue due to the influence of the Avotiņš judgment from May 2016 in which the ECtHR upheld the principle of equal protection from the Bosphorus case, pointing to the importance of maintaining mutual trust between two courts, as well as the need for the establishment of greater credibility and EU strengthening after Brexit.

  18. Break-glass handling exceptional situations in access control

    CERN Document Server

    Petritsch, Helmut

    2014-01-01

    Helmut Petritsch describes the first holistic approach to Break-Glass which covers the whole life-cycle: from access control modeling (pre-access), to logging the security-relevant system state during Break-Glass accesses (at-access), and the automated analysis of Break-Glass accesses (post-access). Break-Glass allows users to override security restrictions in exceptional situations. While several Break-Glass models specific to given access control models have already been discussed in research (e.g., extending RBAC with Break-Glass), the author introduces a generic Break-Glass model. The pres

  19. Increasing Access to Special Collections

    Directory of Open Access Journals (Sweden)

    Ricky Erway

    2012-01-01

    Full Text Available In an environment where we increasingly have access to a collective collection of digitized books, special collections will become increasingly invisible if they are not accessible online. In an era of increasing expectations and decreasing budgets, finding ways to streamline some of our processes is the best way to enable us to do more with less. This report details a number of investigations into how access to special collections can be increased. It includes guidance running the gamut from digitization and rights management to policies and procedures.

  20. Sprawl and Accessibility

    Directory of Open Access Journals (Sweden)

    Robert Bruegmann

    2008-07-01

    Full Text Available This essay argues that many of the assumptions that have been made about sprawl are misleading or just wrong. Nowhere has this been more the case than in debates about transportation and access. Because of this, it is not surprising that a good many of the policies advocated by proponents of Smart Growth would almost certainly lead to reduced mobility and impaired accessibility for a large part of the population. At very least, the debates over sprawl have pitted private vs. public transportation in a way that has contributed to serious underfunding of transportation infrastructure of all kinds.

  1. Open Access to Research Data Accessing, using and publishing collections of textual data in digital literary studies

    OpenAIRE

    Schöch, Christof

    2015-01-01

    Introduction What is open access to research data? Related issues A closer look What can you do with open research data? What is required from research data? Do resources fulfil these requirements? Why is getting access good, but giving access better? Current issues Some challenges Main hindrance: Legal issues Conclusions Recommended readings

  2. Workshop AccessibleTV "Accessible User Interfaces for Future TV Applications"

    Science.gov (United States)

    Hahn, Volker; Hamisu, Pascal; Jung, Christopher; Heinrich, Gregor; Duarte, Carlos; Langdon, Pat

    Approximately half of the elderly people over 55 suffer from some type of typically mild visual, auditory, motor or cognitive impairment. For them interaction, especially with PCs and other complex devices is sometimes challenging, although accessible ICT applications could make much of a difference for their living quality. Basically they have the potential to enable or simplify participation and inclusion in their surrounding private and professional communities. However, the availability of accessible user interfaces being capable to adapt to the specific needs and requirements of users with individual impairments is very limited. Although there are a number of APIs [1, 2, 3, 4] available for various platforms that allow developers to provide accessibility features within their applications, today none of them provides features for the automatic adaptation of multimodal interfaces being capable to automatically fit the individual requirements of users with different kinds of impairments. Moreover, the provision of accessible user interfaces is still expensive and risky for application developers, as they need special experience and effort for user tests. Today many implementations simply neglect the needs of elderly people, thus locking out a large portion of their potential users. The workshop is organized as part of the dissemination activity for the European-funded project GUIDE "Gentle user interfaces for elderly people", which aims to address this situation with a comprehensive approach for the realization of multimodal user interfaces being capable to adapt to the needs of users with different kinds of mild impairments. As application platform, GUIDE will mainly target TVs and Set-Top Boxes, such as the emerging Connected-TV or WebTV platforms, as they have the potential to address the needs of the elderly users with applications such as for home automation, communication or continuing education.

  3. Barriers and facilitators to intraosseous access in adult resuscitations when peripheral intravenous access is not achievable.

    Science.gov (United States)

    James Cheung, Warren; Rosenberg, Hans; Vaillancourt, Christian

    2014-03-01

    Studies suggest that intraosseous (IO) access is underutilized in adult resuscitations, despite recommendations from advanced trauma and cardiac life support guidelines. The objective was to determine factors associated with IO access use by physicians during adult resuscitations when intravenous (IV) access is not immediately achievable. This study was an online survey among physicians purposefully recruited from various clinical care areas at three teaching hospitals. Questions were generated from the qualitative results of 20 iterative interviews, verified for internal validity, and piloted. The interview guide was based on the constructs of the Theory of Planned Behavior (TPB), which elicits salient attitudes, social influences, and control beliefs that potentially influence intention to use IO access. Recruitment took place in September 2012 until reaching more than 100% of the required sample size (n = 200). Internal consistency was measured using Cronbach's alpha, and the effect of TPB constructs and specific beliefs were assessed with regression analyses. For the 205 respondents, the mean age was 35 years (range = 20 to 66 years), and 53.3% were male. Participants' departmental affiliations were 50.3% emergency medicine (EM), 16.9% internal medicine, 14.9% anesthesia, 10.8% general surgery, and 7.2% critical care. Residents comprised 60.7% of the sample, and 39.3% were attending physicians. Median intention to use IO access when IV is not immediately achievable was 4.67 (interquartile range [IQR] = 4 to 5) out of 5 (5 highest) and predicted by the following TPB constructs: attitudes (AdjCoefficients = 0.504; 95% confidence interval [CI] = 0.334 to 0.673), social influences (AdjCoefficients = 0.285; 95% CI = 0.172 to 0.398), and control beliefs (AdjCoefficients 0.217; 95% CI = 0.113 to 0.320). Physicians were more likely to use IO access if they believed that it provided rapid vascular access for delivering large volumes of fluids, could prevent delays in

  4. Access 2013 all-in-one for dummies

    CERN Document Server

    Barrows, Alison; Taylor, Allen G

    2013-01-01

    Get started with the new Access 2013 with this impressive all-in-one reference! Microsoft Access allows you to store, organize, view, analyze, and share data; the new release enables you to build even more powerful, custom database solutions that integrate with the web and enterprise data sources. This compilation of nine indispensible minibooks is exactly what you need to get up to speed on the latest changes to Access. This easy-to-understand resource provides both new and experienced Access users with invaluable advice for connecting Access to SQL Server, manipulating data local

  5. Research Issues in Information Access.

    Science.gov (United States)

    Molholt, Pat

    1989-01-01

    Discusses traditional library approaches to access to information and the possible impact of information technologies, library automation, and artificial intelligence. Access issues raised by these technologies are identified and a research agenda to explore these issues is outlined. (31 references) (CLB)

  6. High accessible experimental information on CPD experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hasegawa, M. [RIAM, Kyushu University, Kasuga, Fukuoka 816-8580 (Japan)], E-mail: hasegawa@triam.kyushu-u.ac.jp; Nakamura, K.; Higashijima, A.; Kawasaki, S.; Nakashima, H.; Sato, K.N.; Zushi, H.; Hanada, K.; Sakamoto, M.; Idei, H. [RIAM, Kyushu University, Kasuga, Fukuoka 816-8580 (Japan)

    2008-04-15

    On CPD [1] (Compact PWI experimental Device) experiment, information of electronic logbook and sequence status are distributed by Web services to prepare future experimental environment such as steady state operation and remote participation. Hence, all the researchers can acquire information with a Web browser installed on a personal computer if they are connected to the Internet. However, to carry a notebook computer all the time is a burden to researchers. Furthermore, the researchers may not be always connected to the Internet. Mobile phones are superior in portability compared to notebook computers, and are easy to connect with Internet through the wireless network of the telecom carriers. Moreover, since recent mobile phones have full browsing function, their affinities to the Web services are becoming high. On this account, Web services for mobile phones are developed to access experimental information. For sequence monitoring, a mobile application MIDlet that utilizes special functions of mobile phone such as sound and vibration is also developed to draw attentions of researchers to sequence status.

  7. High accessible experimental information on CPD experiment

    International Nuclear Information System (INIS)

    Hasegawa, M.; Nakamura, K.; Higashijima, A.; Kawasaki, S.; Nakashima, H.; Sato, K.N.; Zushi, H.; Hanada, K.; Sakamoto, M.; Idei, H.

    2008-01-01

    On CPD [1] (Compact PWI experimental Device) experiment, information of electronic logbook and sequence status are distributed by Web services to prepare future experimental environment such as steady state operation and remote participation. Hence, all the researchers can acquire information with a Web browser installed on a personal computer if they are connected to the Internet. However, to carry a notebook computer all the time is a burden to researchers. Furthermore, the researchers may not be always connected to the Internet. Mobile phones are superior in portability compared to notebook computers, and are easy to connect with Internet through the wireless network of the telecom carriers. Moreover, since recent mobile phones have full browsing function, their affinities to the Web services are becoming high. On this account, Web services for mobile phones are developed to access experimental information. For sequence monitoring, a mobile application MIDlet that utilizes special functions of mobile phone such as sound and vibration is also developed to draw attentions of researchers to sequence status

  8. Student Access to and Skills in Using Technology in an Open and Distance Learning Context

    Directory of Open Access Journals (Sweden)

    Hanlie Liebenberg

    2012-10-01

    Full Text Available Amidst the different challenges facing higher education, and particularly distance education (DE and open distance learning (ODL, access to information and communication technology (ICT and students’ abilities to use ICTs are highly contested issues in the South African higher education landscape. While there are various opinions about the scope and definition of the digital divide, increasing empirical evidence questions the uncritical use of the notion of the digital divide in South African and international higher education discourses.In the context of the University of South Africa (Unisa as a mega ODL institution, students’ access to technology and their functional competence are some of the critical issues to consider as Unisa prepares our graduates for an increasingly digital and networked world.This paper discusses a descriptive study that investigated students’ access to technology and their capabilities in using technology, within the broader discourse of the “digital divide.” Results support literature that challenges a simplistic understanding of the notion of the “digital divide” and reveal that the nature of access is varied.

  9. Design mobile satellite system architecture as an integral part of the cellular access digital network

    Science.gov (United States)

    Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.

    1988-01-01

    The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.

  10. An access-technology agnostic delivery model for ICT4D services

    CSIR Research Space (South Africa)

    Herselman, M

    2012-02-01

    Full Text Available systems outlined by Bieber, Mcfall, Rice, and Gurstein (2007). Their deliberations, however, do not address the issue of access-technology agnostic delivery of information. Furthermore, many of the proposed content distribution models involved a single... be implemented. The ?Black Box Testing Technique? (Krichen & Tripakis, 2004) was adopted; this technique hides the complexities of the system components and only focuses on the system functionality as viewed from the end- user perspective in accordance...

  11. Video Game Accessibility: A Legal Approach

    Directory of Open Access Journals (Sweden)

    George Powers

    2015-02-01

    Full Text Available Video game accessibility may not seem of significance to some, and it may sound trivial to anyone who does not play video games. This assumption is false. With the digitalization of our culture, video games are an ever increasing part of our life. They contribute to peer to peer interactions, education, music and the arts. A video game can be created by hundreds of musicians and artists, and they can have production budgets that exceed modern blockbuster films. Inaccessible video games are analogous to movie theaters without closed captioning or accessible facilities. The movement to have accessible video games is small, unorganized and misdirected. Just like the other battles to make society accessible were accomplished through legislation and law, the battle for video game accessibility must be focused toward the law and not the market.

  12. Functional fixedness in a technologically sparse culture.

    Science.gov (United States)

    German, Tim P; Barrett, H Clark

    2005-01-01

    Problem solving can be inefficient when the solution requires subjects to generate an atypical function for an object and the object's typical function has been primed. Subjects become "fixed" on the design function of the object, and problem solving suffers relative to control conditions in which the object's function is not demonstrated. In the current study, such functional fixedness was demonstrated in a sample of adolescents (mean age of 16 years) among the Shuar of Ecuadorian Amazonia, whose technologically sparse culture provides limited access to large numbers of artifacts with highly specialized functions. This result suggests that design function may universally be the core property of artifact concepts in human semantic memory.

  13. Protein Solvent-Accessibility Prediction by a Stacked Deep Bidirectional Recurrent Neural Network

    Directory of Open Access Journals (Sweden)

    Buzhong Zhang

    2018-05-01

    Full Text Available Residue solvent accessibility is closely related to the spatial arrangement and packing of residues. Predicting the solvent accessibility of a protein is an important step to understand its structure and function. In this work, we present a deep learning method to predict residue solvent accessibility, which is based on a stacked deep bidirectional recurrent neural network applied to sequence profiles. To capture more long-range sequence information, a merging operator was proposed when bidirectional information from hidden nodes was merged for outputs. Three types of merging operators were used in our improved model, with a long short-term memory network performing as a hidden computing node. The trained database was constructed from 7361 proteins extracted from the PISCES server using a cut-off of 25% sequence identity. Sequence-derived features including position-specific scoring matrix, physical properties, physicochemical characteristics, conservation score and protein coding were used to represent a residue. Using this method, predictive values of continuous relative solvent-accessible area were obtained, and then, these values were transformed into binary states with predefined thresholds. Our experimental results showed that our deep learning method improved prediction quality relative to current methods, with mean absolute error and Pearson’s correlation coefficient values of 8.8% and 74.8%, respectively, on the CB502 dataset and 8.2% and 78%, respectively, on the Manesh215 dataset.

  14. Protein Solvent-Accessibility Prediction by a Stacked Deep Bidirectional Recurrent Neural Network.

    Science.gov (United States)

    Zhang, Buzhong; Li, Linqing; Lü, Qiang

    2018-05-25

    Residue solvent accessibility is closely related to the spatial arrangement and packing of residues. Predicting the solvent accessibility of a protein is an important step to understand its structure and function. In this work, we present a deep learning method to predict residue solvent accessibility, which is based on a stacked deep bidirectional recurrent neural network applied to sequence profiles. To capture more long-range sequence information, a merging operator was proposed when bidirectional information from hidden nodes was merged for outputs. Three types of merging operators were used in our improved model, with a long short-term memory network performing as a hidden computing node. The trained database was constructed from 7361 proteins extracted from the PISCES server using a cut-off of 25% sequence identity. Sequence-derived features including position-specific scoring matrix, physical properties, physicochemical characteristics, conservation score and protein coding were used to represent a residue. Using this method, predictive values of continuous relative solvent-accessible area were obtained, and then, these values were transformed into binary states with predefined thresholds. Our experimental results showed that our deep learning method improved prediction quality relative to current methods, with mean absolute error and Pearson's correlation coefficient values of 8.8% and 74.8%, respectively, on the CB502 dataset and 8.2% and 78%, respectively, on the Manesh215 dataset.

  15. Access to Parks for Youth as an Environmental Justice Issue: Access Inequalities and Possible Solutions

    Directory of Open Access Journals (Sweden)

    Alessandro Rigolon

    2014-04-01

    Full Text Available Although repeated contact with nature helps foster mental and physical health among young people, their contact with nature has been diminishing over the last few decades. Also, low-income and ethnic minority children have even less contact with nature than white middle-income children. In this study, we compared accessibility to play in parks for young people from different income and racial backgrounds in Denver, Colorado. Park access for children and youth was measured using a geographic information system (GIS. Each neighborhood was classified according to income level, residential density, and distance from downtown; and then each park was classified based on formal and informal play, and level of intimacy. Comparisons between neighborhoods show that that low-income neighborhoods have the lowest access and high-income neighborhoods have the highest access to parks, and that differences are even higher for parks with play amenities and high levels of intimacy. To overcome this issue, the paper proposes a framework for action to improve access to parks for low-income children and youth and to help planners, decision makers and advocacy groups prioritize park investments.

  16. Complications of Central Venous Totally Implantable Access Port: Internal Jugular Versus Subclavian Access

    Directory of Open Access Journals (Sweden)

    Pil Young Jung

    Full Text Available Background: Totally implantable access port (TIAP provides reliable, long term vascular access with minimal risk of infection and allows patients normal physical activity. With wide use of ports, new complications have been encountered. We analyzed TIAP related complications and evaluated the outcomes of two different percutaneous routes of access to superior vena cava. Methods: All 172 patients who underwent port insertion with internal jugular approach (Group 1, n = 92 and subclavian approach (Group 2, n = 79 between August 2011 and May 2013 in a single center were analyzed, retrospectively. Medical records were analyzed to compare the outcomes and the occurrence of port related complications between two different percutaneous routes of access to superior vena cava. Results: Median follow-up for TIAP was 278 days (range, 1-1868. Twenty four complications were occurred (14.0%, including pneumothorax (n = 1, 0.6%, migration/malposition (n = 4, 2.3%, pinch-off syndrome (n = 4, 2.3%, malfunction (n = 2, 1.1%, infection (n = 8, 4.7%, and venous thrombosis (n = 5, 2.9%. The overall incidence was 8.7% and 20.3% in each group (p = 0.030. Mechanical complications except infectious and thrombotic complications were more often occurred in group 2 (p = 0.033. The mechanical complication free probability is significantly higher in group 1 (p = 0.040. Conclusions: We suggest that the jugular access should be chosen in patients who need long term catheterization because of high incidence of mechanical complication, such as pinch-off syndrome.

  17. Secondary access based on sensing and primary ARQ feedback in spectrum sharing systems

    KAUST Repository

    Hamza, Doha R.

    2012-04-01

    In the context of primary/secondary spectrum sharing, we propose a randomized secondary access strategy with access probabilities that are a function of both the primary automatic repeat request (ARQ) feedback and the spectrum sensing outcome. The primary terminal operates in a time slotted fashion and is active only when it has a packet to send. The primary receiver can send a positive acknowledgment (ACK) when the received packet is decoded correctly. Lack of ARQ feedback is interpreted as erroneous reception or inactivity. We call this the explicit ACK scheme. The primary receiver may also send a negative acknowledgment (NACK) when the packet is received in error. Lack of ARQ feedback is interpreted as an ACK or no-transmission. This is called the explicit NACK scheme. Under both schemes, when the primary feedback is interpreted as a NACK, the secondary user assumes that there will be retransmission in the next slot and accesses the channel with a certain probability. When the primary feedback is interpreted as an ACK, the secondary user accesses the channel with either one of two probabilities based on the sensing outcome. Under these settings, we find the three optimal access probabilities via maximizing the secondary throughput given a constraint on the primary throughput. We compare the performance of the explicit ACK and explicit NACK schemes and contrast them with schemes based on either sensing or primary ARQ feedback only. © 2012 IEEE.

  18. Conviviality-driven access control policy

    NARCIS (Netherlands)

    El Kateb, Donia; Zannone, N.; Moawad, Assaad; Caire, Patrice; Nain, Grégory; Mouelhi, Tejeddine; Le Traon, Yves

    2015-01-01

    Nowadays many organizations experience security incidents due to unauthorized access to information. To reduce the risk of such incidents, security policies are often employed to regulate access to information. Such policies, however, are often too restrictive, and users do not have the rights

  19. Self-taught axillary vein access without venography for pacemaker implantation: prospective randomized comparison with the cephalic vein access.

    Science.gov (United States)

    Squara, Fabien; Tomi, Julien; Scarlatti, Didier; Theodore, Guillaume; Moceri, Pamela; Ferrari, Emile

    2017-12-01

    Axillary vein access for pacemaker implantation is uncommon in many centres because of the lack of training in this technique. We assessed whether the introduction of the axillary vein technique was safe and efficient as compared with cephalic vein access, in a centre where no operators had any previous experience in axillary vein puncture. Patients undergoing pacemaker implantation were randomized to axillary or cephalic vein access. All three operators had no experience nor training in axillary vein puncture, and self-learned the technique by reading a published review. Axillary vein puncture was fluoroscopy-guided without contrast venography. Cephalic access was performed by dissection of delto-pectoral groove. Venous access success, venous access duration (from skin incision to guidewire or lead in superior vena cava), procedure duration, X-ray exposure, and peri-procedural (1 month) complications were recorded. results We randomized 74 consecutive patients to axillary (n = 37) or cephalic vein access (n = 37). Axillary vein was successfully accessed in 30/37 (81.1%) patients vs. 28/37 (75.7%) of cephalic veins (P = 0.57). Venous access time was shorter in axillary group than in cephalic group [5.7 (4.4-8.3) vs. 12.2 (10.5-14.8) min, P < 0.001], as well as procedure duration [34.8 (30.6-38.4) vs. 42.0 (39.1-46.6) min, P = 0.043]. X-ray exposure and peri-procedural overall complications were comparable in both groups. Axillary puncture was safe and faster than cephalic access even for the five first procedures performed by each operator. Self-taught axillary vein puncture for pacemaker implantation seems immediately safe and faster than cephalic vein access, when performed by electrophysiologists trained to pacemaker implantation but not to axillary vein puncture. Published on behalf of the European Society of Cardiology. All rights reserved. © The Author 2017. For Permissions, please email: journals.permissions@oup.com.

  20. COPRED: prediction of fold, GO molecular function and functional residues at the domain level.

    Science.gov (United States)

    López, Daniel; Pazos, Florencio

    2013-07-15

    Only recently the first resources devoted to the functional annotation of proteins at the domain level started to appear. The next step is to develop specific methodologies for predicting function at the domain level based on these resources, and to implement them in web servers to be used by the community. In this work, we present COPRED, a web server for the concomitant prediction of fold, molecular function and functional sites at the domain level, based on a methodology for domain molecular function prediction and a resource of domain functional annotations previously developed and benchmarked. COPRED can be freely accessed at http://csbg.cnb.csic.es/copred. The interface works in all standard web browsers. WebGL (natively supported by most browsers) is required for the in-line preview and manipulation of protein 3D structures. The website includes a detailed help section and usage examples. pazos@cnb.csic.es.

  1. Perceptual integration without conscious access.

    Science.gov (United States)

    Fahrenfort, Johannes J; van Leeuwen, Jonathan; Olivers, Christian N L; Hogendoorn, Hinze

    2017-04-04

    The visual system has the remarkable ability to integrate fragmentary visual input into a perceptually organized collection of surfaces and objects, a process we refer to as perceptual integration. Despite a long tradition of perception research, it is not known whether access to consciousness is required to complete perceptual integration. To investigate this question, we manipulated access to consciousness using the attentional blink. We show that, behaviorally, the attentional blink impairs conscious decisions about the presence of integrated surface structure from fragmented input. However, despite conscious access being impaired, the ability to decode the presence of integrated percepts remains intact, as shown through multivariate classification analyses of electroencephalogram (EEG) data. In contrast, when disrupting perception through masking, decisions about integrated percepts and decoding of integrated percepts are impaired in tandem, while leaving feedforward representations intact. Together, these data show that access consciousness and perceptual integration can be dissociated.

  2. Electric Energy Access in Bangladesh

    Directory of Open Access Journals (Sweden)

    Muhammad Taheruzzaman

    2016-07-01

    Full Text Available This paper represents the overall electrical energy profile and access in Bangladesh. In the recent past Bangladesh has been experiencing shortage of electricity, and about 42 % of population no access to the electricity. The electricity consumption has rapidly increased over last decade. The demand and consumption will intensify in the remote future as overall development and future growth. To set “vision 2021” of Bangladesh; government of Bangladesh has devoted to ensuring access of affordable and reliable electricity for all by 2021. In the modern time, energy is the vital ingredient for socioeconomic growth in the developing country i.e., alleviating poverty. Along with electricity access in Bangladesh strived to become middle income country by 2021. Bangladesh has experienced that energy consumption inclines to increase rapidly when per capita income researches between US$ 1,000 and US$ 10,000, and a country’s

  3. Next Generation Access Network Deployment in Croatia: Optical Access Networks and Current IoT/5G Status

    Science.gov (United States)

    Breskovic, Damir; Sikirica, Mladen; Begusic, Dinko

    2018-05-01

    This paper gives an overview and background of optical access network deployment in Croatia. Optical access network development in Croatia has been put into a global as well as in the European Union context. All the challenges and the driving factors for optical access networks deployment are considered. Optical access network architectures that have been deployed by most of the investors in Croatian telecommunication market are presented, as well as the architectures that are in early phase of deployment. Finally, an overview on current status of mobile networks of the fifth generation and Internet of Things is given.

  4. From Web accessibility to Web adaptability.

    Science.gov (United States)

    Kelly, Brian; Nevile, Liddy; Sloan, David; Fanou, Sotiris; Ellison, Ruth; Herrod, Lisa

    2009-07-01

    This article asserts that current approaches to enhance the accessibility of Web resources fail to provide a solid foundation for the development of a robust and future-proofed framework. In particular, they fail to take advantage of new technologies and technological practices. The article introduces a framework for Web adaptability, which encourages the development of Web-based services that can be resilient to the diversity of uses of such services, the target audience, available resources, technical innovations, organisational policies and relevant definitions of 'accessibility'. The article refers to a series of author-focussed approaches to accessibility through which the authors and others have struggled to find ways to promote accessibility for people with disabilities. These approaches depend upon the resource author's determination of the anticipated users' needs and their provision. Through approaches labelled as 1.0, 2.0 and 3.0, the authors have widened their focus to account for contexts and individual differences in target audiences. Now, the authors want to recognise the role of users in determining their engagement with resources (including services). To distinguish this new approach, the term 'adaptability' has been used to replace 'accessibility'; new definitions of accessibility have been adopted, and the authors have reviewed their previous work to clarify how it is relevant to the new approach. Accessibility 1.0 is here characterised as a technical approach in which authors are told how to construct resources for a broadly defined audience. This is known as universal design. Accessibility 2.0 was introduced to point to the need to account for the context in which resources would be used, to help overcome inadequacies identified in the purely technical approach. Accessibility 3.0 moved the focus on users from a homogenised universal definition to recognition of the idiosyncratic needs and preferences of individuals and to cater for them. All of

  5. Fast and Efficient XML Data Access for Next-Generation Mass Spectrometry.

    Science.gov (United States)

    Röst, Hannes L; Schmitt, Uwe; Aebersold, Ruedi; Malmström, Lars

    2015-01-01

    In mass spectrometry-based proteomics, XML formats such as mzML and mzXML provide an open and standardized way to store and exchange the raw data (spectra and chromatograms) of mass spectrometric experiments. These file formats are being used by a multitude of open-source and cross-platform tools which allow the proteomics community to access algorithms in a vendor-independent fashion and perform transparent and reproducible data analysis. Recent improvements in mass spectrometry instrumentation have increased the data size produced in a single LC-MS/MS measurement and put substantial strain on open-source tools, particularly those that are not equipped to deal with XML data files that reach dozens of gigabytes in size. Here we present a fast and versatile parsing library for mass spectrometric XML formats available in C++ and Python, based on the mature OpenMS software framework. Our library implements an API for obtaining spectra and chromatograms under memory constraints using random access or sequential access functions, allowing users to process datasets that are much larger than system memory. For fast access to the raw data structures, small XML files can also be completely loaded into memory. In addition, we have improved the parsing speed of the core mzML module by over 4-fold (compared to OpenMS 1.11), making our library suitable for a wide variety of algorithms that need fast access to dozens of gigabytes of raw mass spectrometric data. Our C++ and Python implementations are available for the Linux, Mac, and Windows operating systems. All proposed modifications to the OpenMS code have been merged into the OpenMS mainline codebase and are available to the community at https://github.com/OpenMS/OpenMS.

  6. Fast and Efficient XML Data Access for Next-Generation Mass Spectrometry.

    Directory of Open Access Journals (Sweden)

    Hannes L Röst

    Full Text Available In mass spectrometry-based proteomics, XML formats such as mzML and mzXML provide an open and standardized way to store and exchange the raw data (spectra and chromatograms of mass spectrometric experiments. These file formats are being used by a multitude of open-source and cross-platform tools which allow the proteomics community to access algorithms in a vendor-independent fashion and perform transparent and reproducible data analysis. Recent improvements in mass spectrometry instrumentation have increased the data size produced in a single LC-MS/MS measurement and put substantial strain on open-source tools, particularly those that are not equipped to deal with XML data files that reach dozens of gigabytes in size.Here we present a fast and versatile parsing library for mass spectrometric XML formats available in C++ and Python, based on the mature OpenMS software framework. Our library implements an API for obtaining spectra and chromatograms under memory constraints using random access or sequential access functions, allowing users to process datasets that are much larger than system memory. For fast access to the raw data structures, small XML files can also be completely loaded into memory. In addition, we have improved the parsing speed of the core mzML module by over 4-fold (compared to OpenMS 1.11, making our library suitable for a wide variety of algorithms that need fast access to dozens of gigabytes of raw mass spectrometric data.Our C++ and Python implementations are available for the Linux, Mac, and Windows operating systems. All proposed modifications to the OpenMS code have been merged into the OpenMS mainline codebase and are available to the community at https://github.com/OpenMS/OpenMS.

  7. libChEBI: an API for accessing the ChEBI database.

    Science.gov (United States)

    Swainston, Neil; Hastings, Janna; Dekker, Adriano; Muthukrishnan, Venkatesh; May, John; Steinbeck, Christoph; Mendes, Pedro

    2016-01-01

    ChEBI is a database and ontology of chemical entities of biological interest. It is widely used as a source of identifiers to facilitate unambiguous reference to chemical entities within biological models, databases, ontologies and literature. ChEBI contains a wealth of chemical data, covering over 46,500 distinct chemical entities, and related data such as chemical formula, charge, molecular mass, structure, synonyms and links to external databases. Furthermore, ChEBI is an ontology, and thus provides meaningful links between chemical entities. Unlike many other resources, ChEBI is fully human-curated, providing a reliable, non-redundant collection of chemical entities and related data. While ChEBI is supported by a web service for programmatic access and a number of download files, it does not have an API library to facilitate the use of ChEBI and its data in cheminformatics software. To provide this missing functionality, libChEBI, a comprehensive API library for accessing ChEBI data, is introduced. libChEBI is available in Java, Python and MATLAB versions from http://github.com/libChEBI, and provides full programmatic access to all data held within the ChEBI database through a simple and documented API. libChEBI is reliant upon the (automated) download and regular update of flat files that are held locally. As such, libChEBI can be embedded in both on- and off-line software applications. libChEBI allows better support of ChEBI and its data in the development of new cheminformatics software. Covering three key programming languages, it allows for the entirety of the ChEBI database to be accessed easily and quickly through a simple API. All code is open access and freely available.

  8. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  9. Understanding and improving access to prompt and effective malaria treatment and care in rural Tanzania: the ACCESS Programme.

    Science.gov (United States)

    Hetzel, Manuel W; Iteba, Nelly; Makemba, Ahmed; Mshana, Christopher; Lengeler, Christian; Obrist, Brigit; Schulze, Alexander; Nathan, Rose; Dillip, Angel; Alba, Sandra; Mayumana, Iddy; Khatib, Rashid A; Njau, Joseph D; Mshinda, Hassan

    2007-06-29

    Prompt access to effective treatment is central in the fight against malaria. However, a variety of interlinked factors at household and health system level influence access to timely and appropriate treatment and care. Furthermore, access may be influenced by global and national health policies. As a consequence, many malaria episodes in highly endemic countries are not treated appropriately. The ACCESS Programme aims at understanding and improving access to prompt and effective malaria treatment and care in a rural Tanzanian setting. The programme's strategy is based on a set of integrated interventions, including social marketing for improved care seeking at community level as well as strengthening of quality of care at health facilities. This is complemented by a project that aims to improve the performance of drug stores. The interventions are accompanied by a comprehensive set of monitoring and evaluation activities measuring the programme's performance and (health) impact. Baseline data demonstrated heterogeneity in the availability of malaria treatment, unavailability of medicines and treatment providers in certain areas as well as quality problems with regard to drugs and services. The ACCESS Programme is a combination of multiple complementary interventions with a strong evaluation component. With this approach, ACCESS aims to contribute to the development of a more comprehensive access framework and to inform and support public health professionals and policy-makers in the delivery of improved health services.

  10. OpenAPC. Open-Access-Publikationskosten als Open Data

    OpenAIRE

    Tullney, Marco

    2015-01-01

    Präsentationsfolien zum Vortrag „OpenAPC. Open-Access-Publikationskosten als Open Data“ in der Session „Ausgestaltung eines wissenschaftsadäquaten APC-Marktes: Grundsätze, Finanzierungsansätze und Management“ der Open-Access-Tage 2015 in Zürich (https://www.open-access.net/community/open-access-tage/open-access-tage-2015-zuerich/programm/#c1974)

  11. Achieving universal access to broadband

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders

    2009-01-01

    The paper discusses appropriate policy measures for achieving universal access to broadband services in Europe. Access can be delivered by means of many different technology solutions described in the paper. This means a greater degree of competition and affects the kind of policy measures...

  12. A Meta-analysis of randomized clinical trials assessing hemodialysis access thrombosis based on access flow monitoring: Where do we stand?

    Science.gov (United States)

    Muchayi, Timothy; Salman, Loay; Tamariz, Leonardo J; Asif, Arif; Rizvi, Abid; Lenz, Oliver; Vazquez-Padron, Roberto I.; Tabbara, Marwan; Contreras, Gabriel

    2015-01-01

    The National Kidney Foundation Kidney Disease Outcomes Quality Initiative recommends the routine use of hemodialysis arteriovenous (AV) access surveillance to detect hemodynamically significant stenoses and appropriately correct them to reduce the incidence of thrombosis and to improve accesses patency rates. Access blood flow monitoring is considered as one of the preferred surveillance method for both AV fistulas (AVF) and AV grafts (AVG); however, published studies have reported conflicting results of its utility that led healthcare professionals to doubt the benefits of this surveillance method. We performed a meta-analysis of the published randomized controlled trials (RCTs) of AV access surveillance using access blood flow monitoring. Our hypothesis was that access blood flow monitoring lowers the risk of AV access thrombosis and that the outcome differs between AVF and AVG. The estimated overall pooled risk ratio (RR) of thrombosis was 0.87 (95% confidence interval [CI], 0.67 to 1.13) favoring access blood flow monitoring. The pooled RR of thrombosis were 0.64 (95% CI, 0.41 to 1.01) and 1.06 (95% CI, 0.77 to 1.46) in the subgroups of only AVF and only AVG, respectively. Our results added to the uncertainty of access blood flow monitoring as a surveillance method of hemodialysis accesses. PMID:25644548

  13. SM18 Visits and Access

    CERN Multimedia

    2012-01-01

      VISITS The rules and conditions to be followed for visits in the SM18 Hall are laid out in the EDMS 1205328 document. No visit is allowed without prior reservation.   ACCESS Special access right is needed ONLY from 7 p.m. to 7 a.m. and during week-ends. From 1 December, the current SM18 access database will be closed and a new one “SM18-OWH outside normal hours” started from scratch. Requests, via EDH SM18-OWH, will have to be duly justified.   For further information, please contact Evelyne Delucinge.

  14. Effects of feed access after hatch and inclusion of fish oil and medium chain fatty acids in a pre-starter diet on broiler chicken growth performance and humoral immunity

    NARCIS (Netherlands)

    Lamot, D.M.; Klein, van der S.A.S.; Linde, van de I.B.; Wijtten, P.J.A.; Kemp, B.; Brand, van den H.; Lammers, A.

    2016-01-01

    Delayed feed and water access is known to impair growth performance of day old broiler chickens. Although effects of feed access on growth performance and immune function of broilers have been examined before, effects of dietary composition and its potential interaction with feed access are

  15. Open Access. Chapter 6 of Scholarly Communication for Librarians.

    OpenAIRE

    Morrison, Heather

    2008-01-01

    In-depth overview of open access, covering definitions (open access publishing, open access archives, gratis and libre, open access works versus open access processes), major statements and declarations, types of open access, major initiatives, trends, advocacy and lobbying.

  16. Systems security and functional readiness

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1988-01-01

    In Protective Programming Planning, it is important that every facility or installation be configured to support the basic functions and mission of the using organization. This paper addresses the process of identifying the key functional operations of our facilities in Europe and providing the security necessary to keep them operating in natural and man-made threat environments. Functional Readiness is important since many of our existing facilities in Europe were not constructed to meet the demands of today's requirements. There are increased requirements for real-time systems with classified terminals and stringent access control, tempest and other electronic protection devices. One must prioritize the operations of these systems so that essential functions are provided even when the facilities are affected by overt or covert hostile activities

  17. Gaining Access.

    Science.gov (United States)

    Wand, Sean; Thermos, Adam C.

    1998-01-01

    Explains the issues to consider before a college decides to purchase a card-access system. The benefits of automation, questions involving implementation, the criteria for technology selection, what typical card technology involves, privacy concerns, and the placement of card readers are discussed. (GR)

  18. Accessing remote data bases using microcomputers

    OpenAIRE

    Saul, Peter D.

    1985-01-01

    General practitioners' access to remote data bases using microcomputers is increasing, making even the most obscure information readily available. Some of the systems available to general practitioners in the UK are described and the methods of access are outlined. General practitioners should be aware of the advances in technology; data bases are increasing in size, the cost of access is falling and their use is becoming easier.

  19. Threats and risks to information security: a practical analysis of free access wireless networks

    Science.gov (United States)

    Quirumbay, Daniel I.; Coronel, Iván. A.; Bayas, Marcia M.; Rovira, Ronald H.; Gromaszek, Konrad; Tleshova, Akmaral; Kozbekova, Ainur

    2017-08-01

    Nowadays, there is an ever-growing need to investigate, consult and communicate through the internet. This need leads to the intensification of free access to the web in strategic and functional points for the benefit of the community. However, this open access is also related to the increase of information insecurity. The existing works on computer security primarily focus on the development of techniques to reduce cyber-attacks. However, these approaches do not address the sector of inexperienced users who have difficulty understanding browser settings. Two methods can solve this problem: first the development of friendly browsers with intuitive setups for new users and on the other hand, by implementing awareness programs on essential security without deepening on technical information. This article addresses an analysis of the vulnerabilities of wireless equipment that provides internet service in the open access zones and the potential risks that could be found when using these means.

  20. The universal access handbook

    CERN Document Server

    Stephanidis, Constantine

    2009-01-01

    In recent years, the field of Universal Access has made significant progress in consolidating theoretical approaches, scientific methods and technologies, as well as in exploring new application domains. Increasingly, professionals in this rapidly maturing area require a comprehensive and multidisciplinary resource that addresses current principles, methods, and tools. Written by leading international authorities from academic, research, and industrial organizations and nonmarket institutions, The Universal Access Handbook covers the unfolding scientific, methodological, technological, and pol

  1. Guidelines for Outsourcing Remote Access.

    Science.gov (United States)

    Hassler, Ardoth; Neuman, Michael

    1996-01-01

    Discusses the advantages and disadvantages of outsourcing remote access to campus computer networks and the Internet, focusing on improved service, cost-sharing, partnerships with vendors, supported protocols, bandwidth, scope of access, implementation, support, network security, and pricing. Includes a checklist for a request for proposals on…

  2. Code division multiple-access techniques in optical fiber networks. II - Systems performance analysis

    Science.gov (United States)

    Salehi, Jawad A.; Brackett, Charles A.

    1989-08-01

    A technique based on optical orthogonal codes was presented by Salehi (1989) to establish a fiber-optic code-division multiple-access (FO-CDMA) communications system. The results are used to derive the bit error rate of the proposed FO-CDMA system as a function of data rate, code length, code weight, number of users, and receiver threshold. The performance characteristics for a variety of system parameters are discussed. A means of reducing the effective multiple-access interference signal by placing an optical hard-limiter at the front end of the desired optical correlator is presented. Performance calculations are shown for the FO-CDMA with an ideal optical hard-limiter, and it is shown that using a optical hard-limiter would, in general, improve system performance.

  3. No accession-specific effect of rhizosphere soil communities on the growth and competition of Arabidopsis thaliana accessions.

    Directory of Open Access Journals (Sweden)

    Anna G Aguilera

    Full Text Available Soil communities associated with specific plant species affect individual plants' growth and competitive ability. Limited evidence suggests that unique soil communities can also differentially influence growth and competition at the ecotype level. Previous work with Arabidopsis thaliana has shown that accessions produce distinct and reproducible rhizosphere bacterial communities, with significant differences in both species composition and relative abundance. We tested the hypothesis that soil communities uniquely affect the growth and reproduction of the plant accessions with which they are associated. Specifically, we examined the growth of four accessions when exposed to their own soil communities and the communities generated by each of the other three accessions. To do this we planted focal accessions inside a ring of six plants that created a "background" soil community. We grew focal plants in this design in three separate soil treatments: non-sterile soil, sterilized soil, and "preconditioned" soil. We preconditioned soil by growing accessions in non-sterile soil for six weeks before the start of the experiment. The main experiment was harvested after seven weeks of growth and we recorded height, silique number, and dry weight of each focal plant. Plants grown in the preconditioned soil treatment showed less growth relative to the non-sterile and sterile soil treatments. In addition, plants in the sterile soil grew larger than those in non-sterile soil. However, we saw no interaction between soil treatment and background accession. We conclude that the soil communities have a negative net impact on Arabidopsis thaliana growth, and that the unique soil communities associated with each accession do not differentially affect growth and competition of study species.

  4. Supporting Indoor Navigation Using Access Rights to Spaces Based on Combined Use of IndoorGML and LADM Models

    Directory of Open Access Journals (Sweden)

    Abdullah Alattas

    2017-11-01

    Full Text Available The aim of this research is to investigate the combined use of IndoorGML and the Land Administration Domain Model (LADM to define the accessibility of the indoor spaces based on the ownership and/or the functional right for use. The users of the indoor spaces create a relationship with the space depending on the type of the building and the function of the spaces. The indoor spaces of each building have different usage functions and associated users. By defining the user types of the indoor spaces, LADM makes it possible to establish a relationship between the indoor spaces and the users. LADM assigns rights, restrictions, and responsibilities to each indoor space, which indicates the accessible spaces for each type of user. The three-dimensional (3D geometry of the building will be impacted by assigning such functional rights, and will provide additional knowledge to path computation for an individual or a group of users. As a result, the navigation process will be more appropriate and simpler because the navigation path will avoid all of the non-accessible spaces based on the rights of the party. The combined use of IndoorGML and LADM covers a broad range of information classes: (indoor 3D cell spaces, connectivity, spatial units/boundaries, (access/use rights and restrictions, parties/persons/actors, and groups of them. The new specialized classes for individual students, individual staff members, groups of students, groups of staff members are able to represent cohorts of education programmes and the organizational structure (organogram: faculty, department, group. The model is capable to represent the access times to lecture rooms (based on education/teaching schedules, use rights of meeting rooms, opening hours of offices, etc. The two original standard models remain independent in our approach, we do not propose yet another model, but applications can fully benefit of the potential of the combined use, which is an important contribution

  5. Financing low carbon energy access in Africa

    International Nuclear Information System (INIS)

    Gujba, Haruna; Thorne, Steve; Mulugetta, Yacob; Rai, Kavita; Sokona, Youba

    2012-01-01

    Modern energy access in Africa is critical to meeting a wide range of developmental challenges including poverty reduction and the Millennium Development Goals (MDGs). Despite having a huge amount and variety of energy resources, modern energy access in the continent is abysmal, especially Sub-Saharan Africa. Only about 31% of the Sub-Saharan African population have access to electricity while traditional biomass energy accounts for over 80% of energy consumption in many Sub-Saharan African countries. With energy use per capita among the lowest in the world, there is no doubt that Africa will need to increase its energy consumption to drive economic growth and human development. Africa also faces a severe threat from global climate change with vulnerabilities in several key areas or sectors in the continent including agriculture, water supply, energy, etc. Low carbon development provides opportunities for African countries to improve and expand access to modern energy services while also building low-emission and climate-resilient economies. However, access to finance from different sources will be critical in achieving these objectives. This paper sets out to explore the financial instruments available for low carbon energy access in Africa including the opportunities, markets and risks in low carbon energy investments in the continent. - Highlights: ► Access to finance will be critical to achieving low carbon energy access in Africa. ► Domestic finance will be important in leveraging private finance. ► Private sector participation in modern and clean energy in Africa is still low. ► Many financing mechanisms exist for low carbon energy access in Africa. ► The right institutional frameworks are critical to achieving low carbon energy access in Africa.

  6. Open-access publishing for pharmacy-focused journals.

    Science.gov (United States)

    Clauson, Kevin A; Veronin, Michael A; Khanfar, Nile M; Lou, Jennie Q

    2008-08-15

    Pharmacy-focused journals that are available in open-access (OA), freely accessible, hybrid, or traditional formats were identified. Relevant journals were accessed from PubMed, International Pharmaceutical Abstracts, EMBASE, and the Pharmacology and Pharmacy category of Thomson Scientific Journal Citation Reports. Criteria were established to select journals that satisfied the definition of pharmacy focused. Journals were assessed based on accessibility, copyright transfer requirements, and restrictions. If tracked, the journal's impact factor (IF) was identified according to classification, and medians were calculated for each journal category. A total of 317 pharmacy-focused journals were identified. The majority of pharmacy-focused journals identified were traditional/non-OA (n = 240). A smaller number of journals were freely accessible/ non-OA (n = 37), freely accessible/non-OA with content restrictions (n = 20), or freely available/non-OA with date restrictions (n = 18). The fewest number of journals were completely OA (n = 2). The median IF for the 185 journals whose IF was tracked was 2.029. The median IF for freely accessible and hybrid journals (n = 42) was 2.550, whereas the median IF for traditional journals (n = 143) was 1.900. A very small number of pharmacy-focused journals adhere to the OA paradigm of access. However, journals that adopt some elements of the OA model, chiefly free accessibility, may be more likely to be cited than traditional journals. Pharmacy practitioners, educators, and researchers could benefit from the advantages that OA offers but should understand its financial disadvantages.

  7. CAC on a MAC: setting up a DOD Common Access Card reader on the Macintosh OS X operating system

    OpenAIRE

    Hopfner, Phil

    2006-01-01

    The Naval Postgraduate School, along with many other Department of Defense (DOD) organizations, utilizes the ActivCard USB Common Access Card (CAC) readers. The CAC readers in conjunction with the user's Smart Card enables access to DOD PKI-enabled websites and allows the user to send signed and encrypted email utilizing the DOD Public Key Infrastructure (PKI). Microsoft Windows systems utilize the ActivCard Gold middleware software to enable CAC reader functionality. This software packag...

  8. Maintenance of vascular access patency in pediatrics

    International Nuclear Information System (INIS)

    Hoffer, F.A.; Wyly, J.B.; Fellows, K.E.; Harmon, W.; Levey, R.H.

    1986-01-01

    The patency of vascular access shunts and fistulae has been prolonged by a combined surgical and radiological approach that includes percutaneous transluminal angioplasty (PTA), surgical revision, thrombectomy, and thrombolysis. Over the last 3 years, 35 vascular accesses in 27 patients were found to have angiographic abnormality. PTA was performed 32 times of 19 accesses and 7 PTAs resulted in patent accesses by the end of the study. Surgical revision was performed 9 times on 8 accesses and 2 of the surgical revisions resulted in a patent access by the end of the study. Concerning Thomas femoral shunts, PTA prolonged the patency by 2.2 months and surgical revision by 3.8 months per procedure. Concerning arteriovenous (AV) fistulae, PTA prolonged the patency by 4.3 months and surgical revision by 3.5 months per procedure. A combination of procedures effectively doubles the duration of patency of Thomas femoral shunts and almost triples the duration of patency of AV fistulae in children. Forty-one percent of these accesses remain open 1 year following the initiation of these procedures. (orig.)

  9. Checklist of accessibility in Web informational environments

    Directory of Open Access Journals (Sweden)

    Christiane Gomes dos Santos

    2017-01-01

    Full Text Available This research deals with the process of search, navigation and retrieval of information by the person with blindness in web environment, focusing on knowledge of the areas of information recovery and architecture, to understanding the strategies used by these people to access the information on the web. It aims to propose the construction of an accessibility verification instrument, checklist, to be used to analyze the behavior of people with blindness in search actions, navigation and recovery sites and pages. It a research exploratory and descriptive of qualitative nature, with the research methodology, case study - the research to establish a specific study with the simulation of search, navigation and information retrieval using speech synthesis system, NonVisual Desktop Access, in assistive technologies laboratory, to substantiate the construction of the checklist for accessibility verification. It is considered the reliability of performed research and its importance for the evaluation of accessibility in web environment to improve the access of information for people with limited reading in order to be used on websites and pages accessibility check analysis.

  10. The outcome and complications of the DiaTAP bioCarbon button-graft vascular access device in haemodialysis patients: a two-year experience.

    Science.gov (United States)

    Paul, M D; Parfrey, P; Marshall, D; Aldrete, V; Purchase, L; Gault, H

    1986-01-01

    The outcome and complications which developed in 8 hemodialysis patients who received 12 DiaTAP bioCarbon button vascular-access devices were reviewed. All patients had a poor vascular access history. Three of twelve devices have been replaced because of thrombosis and two because of infection. Four patients have had 10 episodes of reduced blood flow. Streptokinase infusion into the DiaTAP button led to improved blood flow in 8 of 10 episodes. The 6-month survival rate of the DiaTAP access device was 67% and the average functioning life was 9.4 months. It was a valuable form of access when others had failed.

  11. Web accessibility of public universities in Andalusia

    Directory of Open Access Journals (Sweden)

    Luis Alejandro Casasola Balsells

    2017-06-01

    Full Text Available This paper describes an analysis conducted in 2015 to evaluate the accessibility of content on Andalusian public university websites. In order to determinate whether these websites are accessible, an assessment has been carried out to check conformance with the latest Web Content Accessibility Guidelines (WCAG 2.0 established by the World Wide Web Consortium (W3C. For this purpose, we have designed a methodology for analysis that combines the use of three automatic tools (eXaminator, MINHAP web accessibility tool, and TAW with a manual analysis to provide a greater reliability and validity of the results. Although the results are acceptable overall, a detailed analysis shows that more is still needed for achieving full accessibility for the entire university community. In this respect, we suggest several corrections to common accessibility errors for facilitating the design of university web portals.

  12. Access to Investigational Drugs: FDA Expanded Access Programs or "Right-to-Try" Legislation?

    Science.gov (United States)

    Holbein, M E Blair; Berglund, Jelena P; Weatherwax, Kevin; Gerber, David E; Adamo, Joan E

    2015-10-01

    The Food and Drug Administration Expanded Access (EA) program and "Right-to-Try" legislation aim to provide seriously ill patients who have no other comparable treatment options to gain access to investigational drugs and biological agents. Physicians and institutions need to understand these programs to respond to questions and requests for access. FDA EA programs and state and federal legislative efforts to provide investigational products to patients by circumventing FDA regulations were summarized and compared. The FDA EA program includes Single Patient-Investigational New Drug (SP-IND), Emergency SP-IND, Intermediate Sized Population IND, and Treatment IND. Approval rates for all categories exceed 99%. Approval requires FDA and Institutional Review Board (IRB) approval, and cooperation of the pharmaceutical partner is essential. "Right-to-Try" legislation bypasses some of these steps, but provides no regulatory or safety oversight. The FDA EA program is a reasonable option for patients for whom all other therapeutic interventions have failed. The SP-IND not only provides patient access to new drugs, but also maintains a balance between immediacy and necessary patient protection. Rather than circumventing existing FDA regulations through proposed legislation, it seems more judicious to provide the knowledge and means to meet the EA requirements. © 2015 Wiley Periodicals, Inc.

  13. The Relationship between of Rural Accessibility and Development

    Directory of Open Access Journals (Sweden)

    Thomas Soseco

    2016-09-01

    Full Text Available Rural accessibility has been an important situation to enhance people living. Lack of access limiting people’s opportunity to not only economic choices but also educational and health aspects. Various studies found that there was a positive relationship between better accessibility and poverty, health, and educational measurements. One indicator to measure accessibility is Rural Access Index (RAI, which developed by The Worldbank. Eventhough Indonesia has quite high RAI, but in realty Indonesia still experience large disparity of road condition in its regions. Accessibility became big problems because it may cause worse effect on wider aspects, for instance health. Health, which proxied by infant mortality rate, is worse in villages with poor acessibility. Thus, government must do adequate efforts to enhance accessibility and at the same time make sure that more villages can gain better access.

  14. Developing a Holistic Approach for E-Learning Accessibility

    Directory of Open Access Journals (Sweden)

    Brian Kelly

    2004-10-01

    Full Text Available The importance of accessibility to digital resources is now widely acknowledged. The W3C WAI has played a significant role in promoting the importance of accessibility and developing a framework for accessible Web resources. The accessibility of e-learning provides additional challenges that may not be faced when providing access to other Web resources. The authors argue that there is a need for a more sophisticated model for addressing e-learning accessibility which takes into account the usability of e-learning, pedagogic issues and student learning styles in addition to technical and resource issues. The authors expand on these issues and propose a holistic model for the development of accessible e-learning resources.

  15. UK Renal Registry 16th annual report: chapter 14 2012 multisite dialysis access audit in England, Northern Ireland and Wales and 2011 PD one year follow-up: national and centre-specific analyses.

    Science.gov (United States)

    Briggs, Victoria; Pitcher, David; Shaw, Catriona; Fluck, Richard; Wilkie, Martin

    2013-01-01

    Dialysis access should be timely, minimise complications and maintain functionality. Good functional access is required for renal replacement therapy (RRT) to be successful. The aim of the combined vascular and peritoneal dialysis access audit was to examine practice patterns with respect to dialysis access and highlight variations in practice between renal centres. The UK Renal Registry collected centre-specific information on vascular and peritoneal access outcome measures including patient demographics, dialysis access type (at start of dialysis and three months after start of dialysis), surgical assessment and access functionality. The combined access audit covered incident haemodialysis (HD) and peritoneal dialysis (PD) patients in 2012 from England, Northern Ireland and Wales. Centres who had reported data on incident PD patients for the previous audit in 2011 were additionally asked to provide one year follow up data for this group. Fifty-one centres in England, Wales and Northern Ireland (representing 82% of all centres) returned data on first access from 3,720 incident HD patients and 1,018 incident PD patients. A strong relationship was seen between surgical assessment and the likelihood of starting HD with an arteriovenous fistula (AVF). Type of first access was related to the length of time known to renal services with higher numbers of AVFs and PD catheters used in patients known to renal services for at least one year. Three month and one year outcomes of HD and PD access were poorly reported. This audit provides information on important patient related outcome measures with the potential to lead to an improvement in access provision. This represents an important advance, however data collection remains suboptimal. There is wide practice variation across the England, Wales and Northern Ireland in provision of both HD and PD access which requires further exploration. © 2014 S. Karger AG, Basel.

  16. Insurance + Access ≠ Health Care: Typology of Barriers to Health Care Access for Low-Income Families

    Science.gov (United States)

    DeVoe, Jennifer E.; Baez, Alia; Angier, Heather; Krois, Lisa; Edlund, Christine; Carney, Patricia A.

    2007-01-01

    PURPOSE Public health insurance programs have expanded coverage for the poor, and family physicians provide essential services to these vulnerable populations. Despite these efforts, many Americans do not have access to basic medical care. This study was designed to identify barriers faced by low-income parents when accessing health care for their children and how insurance status affects their reporting of these barriers. METHODS A mixed methods analysis was undertaken using 722 responses to an open-ended question on a health care access survey instrument that asked low-income Oregon families, “Is there anything else you would like to tell us?” Themes were identified using immersion/crystallization techniques. Pertinent demographic attributes were used to conduct matrix coded queries. RESULTS Families reported 3 major barriers: lack of insurance coverage, poor access to services, and unaffordable costs. Disproportionate reporting of these themes was most notable based on insurance status. A higher percentage of uninsured parents (87%) reported experiencing difficulties obtaining insurance coverage compared with 40% of those with insurance. Few of the uninsured expressed concerns about access to services or health care costs (19%). Access concerns were the most common among publicly insured families, and costs were more often mentioned by families with private insurance. Families made a clear distinction between insurance and access, and having one or both elements did not assure care. Our analyses uncovered a 3-part typology of barriers to health care for low-income families. CONCLUSIONS Barriers to health care can be insurmountable for low-income families, even those with insurance coverage. Patients who do not seek care in a family medicine clinic are not necessarily getting their care elsewhere. PMID:18025488

  17. Accessibility: global gateway to health literacy.

    Science.gov (United States)

    Perlow, Ellen

    2010-01-01

    Health literacy, cited as essential to achieving Healthy People 2010's goals to "increase quality and years of healthy life" and to "eliminate health disparities," is defined by Healthy People as "the degree to which individuals have the capacity to obtain, process, and understand basic health information and services needed to make appropriate health decisions." Accessibility, by definition, the aforementioned "capacity to obtain," thus is health literacy's primary prerequisite. Accessibility's designation as the global gateway to health literacy is predicated also on life's realities: global aging and climate change, war and terrorism, and life-extending medical and technological advances. People with diverse access needs are health professionals' raison d'être. However, accessibility, consummately cross-cultural and universal, is virtually absent as a topic of health promotion and practice research and scholarly discussion of health literacy and equity. A call to action to place accessibility in its rightful premier position on the profession's agenda is issued.

  18. Attributes Enhanced Role-Based Access Control Model

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.; Krishnan, Ram

    2015-01-01

    as an important area of research. In this paper, we propose an access control model that combines the two models in a novel way in order to unify their benefits. Our approach provides a fine-grained access control mechanism that not only takes contextual information into account while making the access control...... decisions but is also suitable for applications where access to resources is controlled by exploiting contents of the resources in the policy....

  19. Funding and Implementing Universal Access

    International Development Research Centre (IDRC) Digital Library (Canada)

    The principles for the subsidy awards are based not only on the experience of ... the best-practice model for special funding to support access to communications .... Malaysia, Russia, Mongolia and elsewhere).5 The Ugandan model uses the ...... services or serve additional areas, access to radio spectrum and lower taxes.

  20. Possibilities of Independent Learning in Two Self-Access Facilities of an Iranian University

    Directory of Open Access Journals (Sweden)

    Afshin Mohammadi

    2014-09-01

    Full Text Available The roles that self-access centers play in language learners’ development of autonomy considerably vary in accordance with the institutional features attributed to their structure and the services they offer. As part of a larger study which assessed 100 learners’ readiness for autonomy, this paper reports on the status quo of two facilities at the humanities faculty of an Iranian university, based on English-as-Foreign-Language (EFL learners’ views and practices. Seven undergraduate EFL learners from various years of study were asked to describe the ways in which they exploit self-access services for language learning purposes and express their opinions vis-à-vis their functionality through semi-structured interviews. Findings reveal that most learners preferred not to attend the computer center, principally because, the Internet, as the most widely acknowledged service, had become available in other places around the university, such as in the dormitory. The reasons for this reluctance are highlighted, along with a presentation of some suggestions for upgrading learners’ participation in self-access language learning in similar contexts.

  1. RSARF: Prediction of residue solvent accessibility from protein sequence using random forest method

    KAUST Repository

    Ganesan, Pugalenthi; Kandaswamy, Krishna Kumar Umar; Chou -, Kuochen; Vivekanandan, Saravanan; Kolatkar, Prasanna R.

    2012-01-01

    Prediction of protein structure from its amino acid sequence is still a challenging problem. The complete physicochemical understanding of protein folding is essential for the accurate structure prediction. Knowledge of residue solvent accessibility gives useful insights into protein structure prediction and function prediction. In this work, we propose a random forest method, RSARF, to predict residue accessible surface area from protein sequence information. The training and testing was performed using 120 proteins containing 22006 residues. For each residue, buried and exposed state was computed using five thresholds (0%, 5%, 10%, 25%, and 50%). The prediction accuracy for 0%, 5%, 10%, 25%, and 50% thresholds are 72.9%, 78.25%, 78.12%, 77.57% and 72.07% respectively. Further, comparison of RSARF with other methods using a benchmark dataset containing 20 proteins shows that our approach is useful for prediction of residue solvent accessibility from protein sequence without using structural information. The RSARF program, datasets and supplementary data are available at http://caps.ncbs.res.in/download/pugal/RSARF/. - See more at: http://www.eurekaselect.com/89216/article#sthash.pwVGFUjq.dpuf

  2. Functional classification of the Gauteng provincial road network using the South African road classification and access management manual (TRH26)

    CSIR Research Space (South Africa)

    Veramoothea, P

    2015-08-01

    Full Text Available and safety. This approach can be standardised throughout the country to make inferences to road safety, speed regulation, driver behaviour, traffic studies and accessibility to services....

  3. Understanding and improving access to prompt and effective malaria treatment and care in rural Tanzania: the ACCESS Programme

    Directory of Open Access Journals (Sweden)

    Alba Sandra

    2007-06-01

    Full Text Available Abstract Background Prompt access to effective treatment is central in the fight against malaria. However, a variety of interlinked factors at household and health system level influence access to timely and appropriate treatment and care. Furthermore, access may be influenced by global and national health policies. As a consequence, many malaria episodes in highly endemic countries are not treated appropriately. Project The ACCESS Programme aims at understanding and improving access to prompt and effective malaria treatment and care in a rural Tanzanian setting. The programme's strategy is based on a set of integrated interventions, including social marketing for improved care seeking at community level as well as strengthening of quality of care at health facilities. This is complemented by a project that aims to improve the performance of drug stores. The interventions are accompanied by a comprehensive set of monitoring and evaluation activities measuring the programme's performance and (health impact. Baseline data demonstrated heterogeneity in the availability of malaria treatment, unavailability of medicines and treatment providers in certain areas as well as quality problems with regard to drugs and services. Conclusion The ACCESS Programme is a combination of multiple complementary interventions with a strong evaluation component. With this approach, ACCESS aims to contribute to the development of a more comprehensive access framework and to inform and support public health professionals and policy-makers in the delivery of improved health services.

  4. An Optimal Medium Access Control with Partial Observations for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Servetto Sergio D

    2005-01-01

    Full Text Available We consider medium access control (MAC in multihop sensor networks, where only partial information about the shared medium is available to the transmitter. We model our setting as a queuing problem in which the service rate of a queue is a function of a partially observed Markov chain representing the available bandwidth, and in which the arrivals are controlled based on the partial observations so as to keep the system in a desirable mildly unstable regime. The optimal controller for this problem satisfies a separation property: we first compute a probability measure on the state space of the chain, namely the information state, then use this measure as the new state on which the control decisions are based. We give a formal description of the system considered and of its dynamics, we formalize and solve an optimal control problem, and we show numerical simulations to illustrate with concrete examples properties of the optimal control law. We show how the ergodic behavior of our queuing model is characterized by an invariant measure over all possible information states, and we construct that measure. Our results can be specifically applied for designing efficient and stable algorithms for medium access control in multiple-accessed systems, in particular for sensor networks.

  5. Digitisation for access to preserved documents

    Directory of Open Access Journals (Sweden)

    Majlis Bremer-Laamanen

    2003-06-01

    Full Text Available Today the digitisation of our collections is a goal for libraries all over Europe. The choices we make in digitisation and preservation now will have a significant impact on the future. Do we only emphasise access? How do we enable access and preserve our originals in a qualitative and productive way? What will actually be left of our cultural heritage in the next millennium? In this paper I am going to look at promoting access to preserved originals mirrored by the experience at the Helsinki University Library, the National Library of Finland: · Preservation activities as platform for digitisation and OCR · Processing access to collections · The future - looking ahead

  6. Secure external access to CERN's services to replace VPN

    CERN Multimedia

    2005-01-01

    CERN has recently experienced several computer security incidents caused by people opening VPN connections and (unknown to them) allowing malicious software to enter CERN. VPN should be used to connect to CERN only in extreme and exceptional circumstances and it is formally discouraged as a general solution. If incidents continue, the availability of the service will need to be reviewed. Recommended methods of connecting to CERN from the Internet for common functionalities such as e-mail, access to CERN web or file servers and interactive sessions on CERN systems are described at http://cern.ch/security/vpn

  7. Accessibility of antiretroviral therapy in Ghana: Convenience of access

    African Journals Online (AJOL)

    SAHARA-J: Journal of Social Aspects of HIV/AIDS. Journal Home · ABOUT THIS JOURNAL · Advanced Search · Current Issue · Archives · Journal Home > Vol 9, No 2 (2012) >. Log in or Register to get access to full text downloads.

  8. Extending AAA operational model for profile-based access control in ethernet-based Neutral Access Networks

    NARCIS (Netherlands)

    Matias, J.; Jacob, E.; Demchenko, Y.; de Laat, C.; Gommans, L.; Macías López, E.M.; Bogliolo, A.; Perry, M.; Ran, M

    2010-01-01

    Neutral Access Networks (NAN) have appeared as a new model to overcome some restrictions and lack of flexibility that are present currently in broadband access networks. NAN brings new business opportunities by opening this market to new stakeholders. Although the NAN model is accepted, there are

  9. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  10. Access control system for ISABELLE

    International Nuclear Information System (INIS)

    Potter, K.; Littenberg, L.

    1977-01-01

    An access system based on the one now in operation at the CERN ISR is recommended. Access doors would presumably be located at the entrances to the utility tunnels connecting the support buildings with the ring. Persons requesting access would insert an identity card into a scanner to activate the system. The request would be autologged, the keybank adjacent to the door would be unlocked and ISABELLE operations would be notified. The operator would then select the door, activating a TV-audio link. The person requesting entry would draw a key from the bank, show it and his film badge to the operator who would enable the door release

  11. Barriers in access to home care services among ethnic minority and Dutch elderly--a qualitative study.

    Science.gov (United States)

    Suurmond, Jeanine; Rosenmöller, Doenja L; El Mesbahi, Hakima; Lamkaddem, Majda; Essink-Bot, Marie-Louise

    2016-02-01

    Ethnic minority elderly have a high prevalence of functional limitations and chronic conditions compared to Dutch elderly. However, their use of home care services is low compared to Dutch elderly. Explore the barriers to access to home care services for Turkish, Moroccan Surinamese and ethnic Dutch elderly. Qualitative semi-structured group interviews and individual interviews. The Netherlands. Seven group interviews (n=50) followed by individual interviews (n=5) were conducted, in the preferred language of the participants. Results were ordered and reported according to a framework of access to health care services. This framework describes five dimensions of accessibility to generate access to health care services, from the perspective of the users: ability to perceive health needs, ability to seek health care, ability to reach, ability to pay and ability to engage. This study shows that while barriers are common among all groups, several specific barriers in access to home care services exist for ethnic minority elderly. Language and communication barriers as well as limited networks and a preference for informal care seem to mutually enforce each other, resulting in many barriers during the navigation process to home care. In order to provide equal access to home care for all who need it, the language and communication barriers should be tackled by home care services and home care nurses. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. Implementing a Data Quality Strategy to Simplify Access to Data

    Science.gov (United States)

    Druken, K. A.; Trenham, C. E.; Evans, B. J. K.; Richards, C. J.; Wang, J.; Wyborn, L. A.

    2016-12-01

    To ensure seamless programmatic access for data analysis (including machine learning), standardization of both data and services is vital. At the Australian National Computational Infrastructure (NCI) we have developed a Data Quality Strategy (DQS) that currently provides processes for: (1) the consistency of data structures in the underlying High Performance Data (HPD) platform; (2) quality control through compliance with recognized community standards; and (3) data quality assurance through demonstrated functionality across common platforms, tools and services. NCI hosts one of Australia's largest repositories (10+ PBytes) of research data collections spanning datasets from climate, coasts, oceans and geophysics through to astronomy, bioinformatics and the social sciences. A key challenge is the application of community-agreed data standards to the broad set of Earth systems and environmental data that are being used. Within these disciplines, data span a wide range of gridded, ungridded (i.e., line surveys, point clouds), and raster image types, as well as diverse coordinate reference projections and resolutions. By implementing our DQS we have seen progressive improvement in the quality of the datasets across the different subject domains, and through this, the ease by which the users can programmatically access the data, either in situ or via web services. As part of its quality control procedures, NCI has developed a compliance checker based upon existing domain standards. The DQS also includes extensive Functionality Testing which include readability by commonly used libraries (e.g., netCDF, HDF, GDAL, etc.); accessibility by data servers (e.g., THREDDS, Hyrax, GeoServer), validation against scientific analysis and programming platforms (e.g., Python, Matlab, QGIS); and visualization tools (e.g., ParaView, NASA Web World Wind). These tests ensure smooth interoperability between products and services as well as exposing unforeseen requirements and

  13. Open-Access-Kooperationen in Österreich: Open Access Network Austria und E-Infrastructures Austria – aktuelle Entwicklungen seit 2012

    Directory of Open Access Journals (Sweden)

    Bauer, Bruno

    2014-12-01

    Full Text Available [english] The Berlin Declaration on Open Access to scientific knowledge was published in October 2003. All over the world initiatives and projects were started. However, in Austria Open Access got little attention over many years. This was confirmed by a study among Austrian universities on behalf of the Council of Austrian University Libraries. Finally at the turn of the year 2012/2013 the Open Access Network Austria and the university infrastructure project E-Infrastructure Austria were started to push Open Access in Austria on a national level. So 10 years after the Berlin Declaration Austria set up the preconditions to establish sustainable Open Access.

  14. Wireless Multi Hop Access Networks and Protocols

    OpenAIRE

    Nilsson Plymoth, Anders

    2007-01-01

    As more and more applications and services in our society now depend on the Internet, it is important that dynamically deployed wireless multi hop networks are able to gain access to the Internet and other infrastructure networks and services. This thesis proposes and evaluates solutions for providing multi hop Internet Access. It investigates how ad hoc networks can be combined with wireless and mesh networks in order to create wireless multi hop access networks. When several access points t...

  15. Functionally Graded Materials Database

    Science.gov (United States)

    Kisara, Katsuto; Konno, Tomomi; Niino, Masayuki

    2008-02-01

    Functionally Graded Materials Database (hereinafter referred to as FGMs Database) was open to the society via Internet in October 2002, and since then it has been managed by the Japan Aerospace Exploration Agency (JAXA). As of October 2006, the database includes 1,703 research information entries with 2,429 researchers data, 509 institution data and so on. Reading materials such as "Applicability of FGMs Technology to Space Plane" and "FGMs Application to Space Solar Power System (SSPS)" were prepared in FY 2004 and 2005, respectively. The English version of "FGMs Application to Space Solar Power System (SSPS)" is now under preparation. This present paper explains the FGMs Database, describing the research information data, the sitemap and how to use it. From the access analysis, user access results and users' interests are discussed.

  16. The Access Pricing Problem: A Synthesis.

    OpenAIRE

    Armstrong, Mark; Doyle, Chris; Vickers, John

    1996-01-01

    The Baumol-Willig efficient component pricing rule states that it is efficient to set the price of access to an essential facility equal to the direct cost of access plus the opportunity cost to the integrated access provider. The authors analyze the relevant notion of 'opportunity cost' under various assumptions about demand and supply conditions, including product differentiation, bypass, and substitution possibilities, which all reduce opportunity cost compared to the benchmark case. They ...

  17. Features and selection of vascular access devices.

    Science.gov (United States)

    Sansivero, Gail Egan

    2010-05-01

    To review venous anatomy and physiology, discuss assessment parameters before vascular access device (VAD) placement, and review VAD options. Journal articles, personal experience. A number of VAD options are available in clinical practice. Access planning should include comprehensive assessment, with attention to patient participation in the planning and selection process. Careful consideration should be given to long-term access needs and preservation of access sites. Oncology nurses are uniquely suited to perform a key role in VAD planning and placement. With knowledge of infusion therapy, anatomy and physiology, device options, and community resources, nurses can be key leaders in preserving vascular access and improving the safety and comfort of infusion therapy. Copyright 2010 Elsevier Inc. All rights reserved.

  18. Energy access. Current situation, challenges and outlook

    International Nuclear Information System (INIS)

    2014-07-01

    Globally over 1.3 billion people do not have access to electricity and 2.6 billion people rely on the traditional use of biomass for cooking. Energy access is one of the major challenges of the 21. century as it is a lever for both economic and human development, at individual and national level. Moreover, energy access represents a high-potential market and offers a lot of opportunities for private companies and industrials. In this publication, ENEA lays out the current situation of energy access (actors, actual and future needs, existing technological solutions, markets). The publication addresses the main issues energy access has to face: energy price, equipment financing, distribution, scale-up, and environmental performances

  19. Grøn Open Access i Praksis

    DEFF Research Database (Denmark)

    Open Access indikatoren påviste et uudnyttet potentiale på ca 60%, men hvorfor er der så ikke mere Open Access indhold?. I det konkrete arbejde med forskningsregistrering og registrering af post-prints støder bibliotekerne på en række udfordringer, som vanskeliggør institutionernes muligheder...... for at nå de nationale Open Access mål. Det er for eksempel inden for områderne rettigheder og licenser, tilladte Open Access versioner, embargoperioder m.m., at vi støder på problemer. Det er disse meget konkrete udfordringer, der arbejdes med i det kommende DEFF projekt ”Grøn Open Access i praksis”....

  20. Understanding the political economy and key drivers of energy access in addressing national energy access priorities and policies

    International Nuclear Information System (INIS)

    Rehman, I.H.; Kar, Abhishek; Banerjee, Manjushree; Kumar, Preeth; Shardul, Martand; Mohanty, Jeevan; Hossain, Ijaz

    2012-01-01

    Globally, 1.5 billion people lack access to electricity and nearly 3 billion lack access to modern cooking energy options. Of the world’s “energy poor”, 95% are in Asia and Sub-Saharan Africa. Within Asia, almost 80% of electricity-deprived and 86% of biomass-dependent populations are in the “Big 5” countries: Bangladesh, China, India, Indonesia, and Pakistan. In this paper, we discuss the broad contours of the political economy of energy access in these countries. The political economy is assessed through an examination of three sustainability objectives: accessibility of physical infrastructure; energy service delivery; and conformance to social goals. The key areas of concern include emphasis on supply-driven grid electricity; vested power dynamics favouring affluent and urban areas; unreliability of energy service provision; and misdirected and misappropriated subsidies. The above-mentioned issues are responsible for limiting accelerated achievement of universal energy access in the “Big 5” countries and need to be addressed through innovative approaches. The paper emphasizes the need for firm commitments, policy convergence, and the implementation of 'pro-poor' equitable energy policies through a broad-based energy framework of bench-marked, technology-neutral energy provisioning that ensures reliability and equity. It highlights the need for reorienting of the subsidy regime and incorporating energy service delivery indicators in monitoring and reporting mechanisms. - Highlights: ► Limited emphasis on improved cooking programmes relative to electrification schemes. ► Strong disparity between rural and urban electrification and LPG access. ► Grid extension and subsidy on cooking fuels has limited success. ► Electricity access does not indicate transition to better cooking options. ► Technology neutrality in choosing suitable alternatives may led to improved access. ► There is need to re-orient energy subsidies and incentives.